Performance and Reliability of Computer System
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 1, January 2013

Performance and Reliability of Computer System

D.S Kushwaha, Jyotsna Sinha

The system needs to be auditable, reliable, and manageable from a security point of view and must provide records to the security control supervisor, so that system performance, security safeguards, and user activities can be monitored. The computer system reliability is the main criteria to choose any configuration to solve the problems. The Poisson distribution suffers from the same problems as the Exponential Distribution in that the design must be stable and random failures such as when assessing component failures on an established system. After the test, failure rates can be estimated statistically using well-proven techniques. The above indicates the reasons provided according to the source of the information, so it is necessary to define failure more precisely. To avoid confusion with the other types of failure, it is better to define those seen by the user as incidents or, where the whole computer stops, as system interruptions or system failures. With all these various types of failure, the term mean time between failures becomes ambiguous and needs clarifying.

Keywords: reliability, bathtub curve, burn in, bedding in, wear out

Edition: Volume 2 Issue 1, January 2013

Pages: 120 - 127

Share this Article

How to Cite this Article?

D.S Kushwaha, Jyotsna Sinha, "Performance and Reliability of Computer System", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSR13010157, Volume 2 Issue 1, January 2013, 120 - 127

154 PDF Views | 116 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'reliability'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1147 - 1150

Enhance QoS of Lossy Wireless Sensor Network by In-Network Data Aggregation

Harshada Kupade, Madhav Ingle

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 528 - 532

Knowledge Fusion Technique Using Classifier Ensemble by Combining the Sets of Classification Rules

Jaydeep B. Patil, Vaishali Nandedkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 2264 - 2273

A New View on Method-calls and Contracts to Facilitate Developers in making their Design Decisions

Dr. G. Manoj Someswar, M. Ratna Raju

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1959 - 1962

A Survey on Performance and Energy Management in Cloud Computing

Pratima D. Nerkar, Suresh B. Rathod

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2433 - 2435

Using Functional Point Analysis and Test Point Analysis Reducing Maintenance Cost of Software

Samadhan E. Kadam, Amol K. Kadam, Dr. S. D. Joshi

Share this Article

Similar Articles with Keyword 'bedding in'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1899 - 1903

Design of Application to Detect Images Embedded with Malicious Programs

Robert T. R. Shoniwa, Geogen George

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 1, January 2013

Pages: 120 - 127

Performance and Reliability of Computer System

D.S Kushwaha, Jyotsna Sinha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 5, May 2013

Pages: 266 - 270

Data Security through more robust DCT based methodology and Assessment in terms of PSNR

Ajit Singh, Swati Aggarwal

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 372 - 376

Image Steganography using DWT and Data Encryption Standard (DES)

Ketan Shah, Swati Kaul, Manoj S.Dhande

Share this Article
Top