Thursday, August 9, 2012

IE Article Review :- Improvement of the Reliability of Automatic Manufacture Systems by Using FTA Technique



National Institute of Industrial Engineering
 
Industrial Engineering (PGDIE-42)





Review Paper Summary on

Improvement of the Reliability of Automatic Manufacture Systems by Using FTA Technique







Submitted to                                                       Submitted by
Dr. KVSS Narayan Rao                                          Abhinav Gautam (Roll no-03)
                                   
            


                                                                                                       











Article Details:

Title:

 Improvement of the Reliability of Automatic Manufacture Systems by Using FTA Technique

Authors:

A.       Mahdi Karbasian,
B.      Mahdi Rostami Mehr,
C.      Mojgan Agharajabi

Published in:

International Journal of Industrial Engineering & Production Research,
 Volume 23, Number 2
Page no (85-89)
June 2012

Abstract


In recent years, many manufacturing industries for promoting their efficiency have tended to use the automatic manufacturing systems. Expanding automatic systems and to increase their complexity are representing the necessity of studying a proper functional quality and using reliable equipment in such systems more than ever. In this direction, the technique of fault tree analysis (FTA), along with using other techniques such as failure mode and effect analysis (FMEA) reveals the incorrect performance states (modes) in system in order to know these modes exactly may prevent their occurrence and increase their function quality. In this study, the approaches may increase the reliability of performance in an industrial robot are studied by FTA technique as a case study to show improvement in performance of equipments on automatic systems to reduce their destruction (fault) during the work, and finally access to an automatic manufacturing systems with high reliability.







 

Review

FBD Sketch to Four- Free Degree Robot
Determining the potential modes of destruction is required to know and analyze  the system perfectly. Here, there is the system of cannibalization having four free- degree that has been designed in order to move spares in the weight of maximum 500 gr [3].
In this robot have been used strong steel arms and seven serves of dc motor with the moment about 30 kg and much other electronic hardware.



FTA Plan
A Rooty conflict with maker elements of undesirable modes in the phase of planning will cause to promote the performance level in system. After recognition errors by FTA as a logical model from up to down such as designing assistant, the system analyzing may be considered, and possible destruction of system is evaluated. This analysis is followed by using three procedures:
1- To draw the fault tree.
2- To determine the possibility of fault
3- To know and estimating critical sets resulted in the occurrence of top event.

Drawing Reliability Block Diagram of System
By surveying RBD, we compute total reliability of system. Moreover, it is purposed to increase reliability of B1 and B2 components with respect to it is as series in system. But for computing reliability of electronic components, Mil – HDBK – 217 standard is used, and Mech Rel software is used for estimating reliability of mechanical pieces.

FMEA Plan to Present Proposed Measures
After finding potential fault modes, to prioritize and knowing the causes, are the next step. For this, the FMEA technique is used. This method is a systematic method of recognizing, and prioritizing the fault in a system or product. It acts according to the prevention law. One of the success elements in this technique is the time of its performance and has been planned it, that would be a measure before event, not an exercise after being revealed the difficulties.

Conclusion

By using the planned algorithm on the base of FBD, FTA and FMEA tools, the below results can be achieved:
1) Recognizing the potential fault roots in the first levels of planning.
2) Determining the cause of potential faults
3) Prioritizing of the faults for corrective actions
4) Performing of necessary actions in order to reduce or delete the potential Failure

Friday, August 3, 2012

Review of Article :- IPv6 Tunneling Over IPV4



National Institute of Industrial Engineering
Industrial Engineering (PGDIE-42)





Review Paper Summary on

 IPv6 Tunneling Over IPV4






Submitted to                                                       Submitted by
Dr. KVSS Narayan Rao                                          Abhinav Gautam (Roll no-03)
                                   














Article Details:

Title:

IPv6 Tunneling Over IPV4

Authors:

  1. Sankara Narayanan
  2. M.Syed Khaja Mohideen
  3. M.Chithik Raja
Department of Information Technology
Salalah College of Technology
Sultanate of Oman

Published in:

IJCSI International Journal of Computer Science Issues,
 Vol. 9, Issue 2, No 2,
March 2012

Abstract


Due to the huge growth of the internet users, mobile users using internet connection makes development and implementation of IPv6 as an alternate solution. IPv6 is a long anticipated upgrade to the internet's main communication protocol, which is called IPv4. The current address space provided by IPv4, with only4, 294, 967, 296 addresses. Nowadays IPv6 tunneling over IPv4 are widely used to form the global IPv6 Internet. The IPv6 128-bit address scheme it should provide enough addresses for everyone's computer. Tunneling provides a path to use an existing IPv4 to IPv6. This paper describes typical IPv6 tunneling and tunnel broker's deployment in real IP networks.

Review

A next-generation Internet Protocol [1] , known first as IPng and then as IPv6, has been under development by the Internet Engineering Task Force (IETF) for several years to replace the current Internet Protocol known as IPv4.

Of major importance during the development of IPv6 has been how to do the transition away from IPv4, and towards IPv6. The work on transition strategies, tools, and mechanisms has been part of the basic IPv6 design effort from the beginning

These transition design efforts resulted in a basic Transition Mechanisms specification for IPv6 hosts and routers [4] that specifies the use of a Dual IP layer providing complete support for both IPv4 and IPv6 in hosts and routers, and IPv6-over-IPv4 tunneling , encapsulating IPv6 packets within IPv4 headers to carry them over IPv4 routing infrastructures.
Of great concern to transition strategy planners is how to provide connectivity between IPv6-enabled end-user sites (also known as routing domains ) when they do not yet have a reasonable (or any) choice of Internet Service Provider (ISP) that provides native IPv6 transport services. One way to provide IPv6 connectivity between end-user sites (when native IPv6 service does not exist) is to use IPv6-over-IPv4 encapsulation (tunneling) between them, similar to the technique currently used in the 6bone [5] IPv6 testbed network. This requires complexity for both end-user sites, and the networks providing the tunneling service (for instance, the 6bone backbone ISPs), in creating, managing, and operating manually configured tunnels.
Simplest Use of 6to4
The simplest scenario for 6to4 is when several sites start to use IPv6 alongside IPv4, and have no native IPv6 ISP service available. Thus each site identifies a router to run dual stack (that is, IPv4 and IPv6 together) and 6to4 tunneling, ensuring that this router has a globally routable IPv4 address (that is, not in private IPv4 address space).
Sending and Receiving Rules for 6to4 Routers
When the requesting site's 6to4 router sees that it must send a packet to another site (that is, there is a nonlocal destination), and that the next hop destination prefix contains the special 6to4 Top Level Aggregation (TLA) value of 2002::/16, the IPv6 packet is encapsulated in an IPv4 packet using an IPv4 protocol type of 41, as defined in the Transition Mechanisms.

A Video explaining IPv6 Tunneling Over IPV4.

Conclusion

Network industry expects a gradual transition to IPv6 in near future. The IPv6 addressing protocol solves the problem of IP address exhaustion, because IPv4 and IPv6 are incompatible, the general public, businesses of all size and federal agencies will eventually need to replace or upgrade every element in their communications scheme.