• Products
    • Our Products
    • Relyence FMEA
    • Relyence FRACAS
    • Relyence Fault Tree
    • Relyence Reliability Prediction
    • Relyence RBD
    • Relyence RCM
    • Relyence Maintainability Prediction
    • Relyence Weibull
    • Relyence ALT
    • Relyence Studio
  • Industries
    • Industries Overview
    • Aerospace
    • Automotive
    • Commercial
    • Consumer Products
    • Defense
    • Healthcare
    • Manufacturing
    • Medical
    • Oil & Gas
    • Telecom
  • Services
    • Our Services
    • Training
    • Implementation
    • Technical Support
    • Resources
  • Blog
  • About Us
    • Our Team
    • Join Us
    • Why Relyence
    • Contact Us
  • Support

Call us today! 724.832.1900

wecare@relyence.com
My Account
RelyenceRelyence
  • Products
    • Our Products
    • Relyence FMEA
    • Relyence FRACAS
    • Relyence Fault Tree
    • Relyence Reliability Prediction
    • Relyence RBD
    • Relyence RCM
    • Relyence Maintainability Prediction
    • Relyence Weibull
    • Relyence ALT
    • Relyence Studio
  • Industries
    • Industries Overview
    • Aerospace
    • Automotive
    • Commercial
    • Consumer Products
    • Defense
    • Healthcare
    • Manufacturing
    • Medical
    • Oil & Gas
    • Telecom
  • Services
    • Our Services
    • Training
    • Implementation
    • Technical Support
    • Resources
  • Blog
  • About Us
    • Our Team
    • Join Us
    • Why Relyence
    • Contact Us
  • Support

Fault Tree Analysis as a Means to Promote Safety

Home » Fault Tree Analysis as a Means to Promote Safety
FTA As a Means to Promote Safety Cover Image

Fault Tree Analysis as a Means to Promote Safety

January 24, 2022 Fault Tree, Quality, Reliability

This article is an excerpt from our “Fault Tree Analysis as a Means to Promote Safety” white paper.

Safety is a key element in product design and is a vital aspect of design engineering. It is one of the core elements of RAMS programs, or the study of reliability, availability, maintainability and safety in product design and manufacturing. In particular, safety analysis seeks to eliminate or mitigate overall risk by evaluating ways to prevent harm to people and the environment by a product, system or process.

There are various risk assessment techniques used for safety analysis. They include Fault Tree Analysis (FTA), Failure Mode and Effects Analysis (FMEA) or Failure Mode, Effects and Criticality Analysis (FMECA), Event Tree Analysis (ETA), What-If analysis, Hazard and Operability analysis (HAZOP), Incident BowTie, and others.  FTA is a deductive procedure used to determine the various combinations of hardware failures, software failures, human errors, and other events that could cause undesired events (referred to as top events) at the system level.

This article focuses on providing an introductory look at FTA and its role in promoting safety. We review basics about FTA, including what it is, its history, its uses, and advantages. A thorough review of qualitative and quantitative FTA results, including minimal cut sets (MCS), quantitative metrics such as unavailability, and importance measures, is included. The article concludes with general guidance on how FTA qualitative and quantitative results can be used to design inherently safer products and systems.

Included in our white paper is an example of the usage of FTA as part of the safety analysis for a potential safety hazard of a vehicle engine compartment fire. We proceed in a step-by-step manner through the FTA process to mitigate the risk of this hazard:

  1. Building the Fault Tree by defining the top-level event then proceeding to define and develop contributing factors to that top event
  2. Performing qualitative and quantitative analysis including cut sets, calculation metrics, and importance measures
  3. Taking the steps required to improve the safety of the product or process

Infographic of How to Perform FTA

Understanding Logic and Event Symbols

To effectively use FTA, you need to understand the basics of the Logic and Event symbols used in fault tree analysis. You will need to use both Logic symbols and Event symbols.

Logic symbols, like Boolean AND and OR gates, can help you to link branches of the fault tree together.

  • The AND gate is used to indicate that the output, or the event represented by the AND gate, occurs if and only if all input events occur.
    • In a simple 2-input example, a text message fails to send (the undesired event) if one cannot connect to Wi-Fi (one input event) AND there is no cellular signal (a second input event). So, we’d have two Event symbols connected by the AND Logic symbol.
  • The OR gate is used to indicate that the output, or the event represented by the OR gate, occurs if and only if at least one of the input events occur.
    • For example, you might lose control of a drone if you fly too far out of range (one input event) OR a strong wind gust occurs (a second input event). Either of those events or both can cause the event represented by the OR gate (loss of control of the drone) to be true.

Event symbols are used to represent primary or simpler events. They are terminal events in any fault tree branch. Commonly used types are Basic and Undeveloped events.

  • Basic events are most commonly used to model hardware failures (i.e., capacitor C12 fails short), software failures, human errors, and other terminal events.
  • Undeveloped events are much like Basic events, but often are used to represent events that could be further developed (if time and resources allow and the need arises).
  • Examples of basic and/or undeveloped events include:
    • Cannot connect to Wi-Fi
    • No cellular signal
    • Fly too far out of range
    • Strong wind gust occurs

In the generic fault tree pictured here, we have both Logic symbols and Event symbols as well as text to help define the Top, Intermediate and Terminal events.

FT Gates & Events Example

  1. The text that defines the undesired top event.
  2. The text that defines the contributors to that top event, some intermediate events.
  3. Logic Symbols define how those events, alone or in some combination, impact the next higher event.
  4. Terminal events for each branch (text-based descriptions included) are all defined with their Event symbols.
  5. Logic symbols that define how the terminal events contribute to the intermediate events.

This is just a simple fault tree used for explanation purposes. Fault trees can grow quite large and contain many levels and branches.

And while AND and OR gates are the most commonly used Logic symbols and Basic and Undeveloped events are the most commonly used Event symbols, there are others you can incorporate where needed. Many of the most common examples of Logic symbols and Event symbols are pictured below.

FTA Gate Types

FTA Event Types

Learn more about Logic gates and Event symbols in our in-depth overview.

To learn more about the construction of Fault Trees and their uses as part of your safety analysis processes, download the white paper.

Discover More

Fault Tree Analysis as a Means to Promote Safety covers the following topics:

  1. What is Safety Analysis?
    1. Historical Roots of Safety Analysis
    2. The Need for Safety Analysis
  2. Risk Assessment Techniques Used for Safety Analysis
  3. What is Fault Tree Analysis?
    1. Are you New to Fault Tree Analysis?
    2. History of Fault Tree Analysis
    3. Uses of Fault Tree Analysis
    4. Benefits of Fault Tree Analysis
    5. Challenges of Fault Tree Analysis
  4. Fault Tree Analysis Basics
    1. Understanding Logic and Event Symbols
    2. Preparing for Fault Tree Construction
    3. Understanding Rule and Conventions for Fault Tree Construction
  5. How to Perform FTA: A Step-by-Step Example
    1. Step 1: Build the Fault Tree
      1. Define the Top-Level Failure or Event
      2. Define Contributing Factors to the Top-Level Failure
      3. Develop the Contributing Factors
    2. Step 2: Perform Qualitative and/or Quantitative Fault Tree Analysis
      1. Evaluate Cut Sets
      2. Calculate Metrics
      3. Analyze Importance Measures
    3. Step 3: Take Steps to Improve the Safety of your Product or Process
      1. Using Minimal Cut Set Analysis to Improve Safety
      2. Using Fault Tree Analysis Metrics to Improve Safety
      3. Using Reliability Importance Measures to Improve Safety
  6. Conclusion

Download the full white paper here. To learn more about Relyence Fault Tree and all our additional reliability and quality tools in our Relyence Studio platform, feel free to contact us or schedule a personalized demonstration webinar. Or give us a free trial run today!

Tags: Availabilitydashboardfault treefmeaFTAMTBFMTTFMTTRReliabilitysafety
Share

You also might be interested in

The Reliability Prediction Analysis Process A Best Practices Approach

The Reliability Prediction Analysis Process: A Best Practices Approach

May 31, 2022

Reliability Prediction is one of the most common techniques used by[...]

AIAG & VDA FMEA Cover Image

A Guide to AIAG & VDA FMEAs in Relyence

May 2, 2022

FMEA, or Failure Mode and Effects Analysis, and is a[...]

A Guide to Using Foundation FMEAs in Relyence FMEA Graphic

A Guide to Using Foundation FMEAs in Relyence FMEA

Mar 21, 2022

Failure Mode and Effects Analysis, or FMEA, is a well-organized,[...]

Search

Recent Posts

  • Best Practices for FRACAS Success
  • Welcome to Relyence 2025 Release 1!
  • Q&A with Our Team: How to Use and Organize Relyence Knowledge Banks
  • The Essentials of Relyence Knowledge Banks
  • An In-Depth Review of Fault Tree Analysis Calculation Methods

Categories

  • 217Plus
  • ALT
  • ANSI/VITA 51.1
  • CAPA
  • China's GJB/z 299
  • Dashboard
  • Fault Tree
  • FMEA
  • FRACAS
  • Fundamentals
  • General
  • How-to
  • IEC 61709
  • Knowledge Bank
  • Life Data Analysis
  • Maintainability Prediction
  • MIL-HDBK-217
  • MTBF
  • News
  • NPRD/EPRD
  • NSWC Mechanical
  • Quality
  • RBD
  • RCM
  • Reliability
  • Reliability Block Diagram
  • Reliability Centered Maintenance
  • Reliability Growth
  • Reliability Prediction
  • Reliability Studio
  • RGA
  • Telcordia
  • Weibull

Tags

8D AIAG AIAG & VDA always-in-sync AP Availability China's GJB/z 299 Control Plan COPQ CP dashboard DFMEA EPRD failure mode fault tree fmea FMECA Foundation FMEA fracas FTA GJB/z 299 Intelligent Part Mapping ISO-9001 Knowledge Bank MIL-HDBK-217 MIL-STD-1629 MTBF MTTF MTTR NPRD PFMEA process flow Process Flow Diagram QMS RBD Redundancy Reliability Reliability Block Diagram reliability prediction RPN standby Telcordia Weibull What-If? Workflow

Connect with us

Start your free trial today! Try for Free!
Relyence Corporation logo

At Relyence, we have a passion for always improving. We believe in always creating, always innovating, and always being the best. We believe that in the software world, and in the technology space, we must always be moving ahead. We need to keep pace with all the new technological innovations, as well as new methodologies in industries. We continually work on product development, new capabilities, feature enhancement, and ever improving our tools.

AIAG Member Logo

FIND US HERE

  • Relyence Corporation
  • 540 Pellis Road, Greensburg, PA 15601
  • 724.832.1900
  • wecare@relyence.com
  • https://relyence.com

Privacy Policy

Terms of Service

Sitemap

FRESH FROM OUR BLOG

  • Best Practices for FRACAS Success
  • Welcome to Relyence 2025 Release 1!
  • Q&A with Our Team: How to Use and Organize Relyence Knowledge Banks

© 2025 Relyence Corporation All Rights Reserved. Relyence® is a registered trademark of Relyence Corporation.

  • Try for Free!
Prev Next
Relyence
Manage Consent

To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent may adversely affect certain features and functions.

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Relyence
Manage Consent

To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent may adversely affect certain features and functions.

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}