TechnoNews

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, December 20, 2012

Hardware knowledge: cutting the crankshaft causes and countermeasures -hardware, crankshaft, bearings

Posted on 5:06 AM by Unknown
Crankshaft caused by cutting and countermeasures: crankshaft erosion, especially by the crank pin and bearing oil film between the failure to develop an effective, so that the crank journal and bearing a direct result of the conflict. Erosion occurs when crankshaft, they run the white smoke that offers various metal boom and even the crankshaft and the bearing will not lead to turn the lock. It should therefore be the cause of their not correctly analyze and assess.
/> 1, poor quality oil: 1) poor quality oil. Using oil quality and viscosity grade level or lower varieties are mixed with the oil, allowing power consumption below the usual oil, oil mixing process using a lot of dust and diesel engine operating temperature is too high because oil oxidation metamorphosis. Oxidative degradation of the oil black, dull, higher concentration, using two fingers, rotate the oil, may feel dust and other contaminants. If he is found on the current situation with oil, it must change with time. 2) dilution of the oil. As part of the diesel engine fuel injection pump lubrication with forced lubrication, and Oil Road once. The fuel oil pump seal failures chamber diesel oil is diluted, deterioration of engine oil. Seeps more than the broken set or trachoma flow holes in the cooling water in oil oil is more slender. The top diesel can (cylinder head level, valve body, the cylinder head housing), whether steam or droplets. If, in order to increase the use of oil, decreased concentration, reducing viscosity, and the oily residue oil is represented in the mixed fuel. Import the valve door />
2, not enough oil reserves, oil is lower pressure: pioneer insufficient oil stocks, oil pressure, insufficient flow of the diesel engine lubricating oil, and then can not be guaranteed crankshaft journal and bearing lubricant between the films. The amount of oil in the oil pan and oil pressure gauge reading and check out additional checks whether the blockage of oil pipelines, exits and other anomalies.
/> 3, crankshaft journal and the bearing clearance too large or too small: 1) crankpin and has its own too much space, which can lead to low oil pressure, does not constitute sufficient film oil. 2), the crankshaft bearing journals and is very small, because the gap between the crank pin and thickness of oil film bearing is inadequate or movie. If the gap is too big or too time available micron check table quantities cylinder bore journal bearing, bearing size, where the distance is calculated, can also be measured directly using a feeler gauge distance.
/> 4, crankshaft and cylinder geometry of super-diversity: 1) the larger crankshaft concentricity tolerance, so that the journal and the bearing clearance is less or no gap, lack of lubrication or no lubrication film. 2) The cylinder block main bearing bore concentricity tolerance, which is in the neck and shaft bearing gap is too small or no gap, insufficient lubrication or no lubrication film. 3) The cylinder and main bearing bore perpendicularity what crankpin spindle collar gap is too small or no gap, insufficient lubrication or no lubrication film. Overhauled used in new machines or diesel engines will not be long in the case and often generate the phenomenon. Determine the geometry of the part tolerance firsthand shake to switch to diesel crankshaft (not effort), and then connecting rod of pine-cylinder diesel engine main bearing caps and unloading of the cap, then turn the crankshaft. Change depending on the size of the torque of the rotating crankshaft, to indicate different (but the difference in size too, need the disintegration of diesel engines to submit to specific content).
Email ThisBlogThis!Share to XShare to Facebook
Posted in Hardware | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Space with windows
    Whatever may retail space, one of the most important parts of your design, window space. The right place dressed from the very beginning, an...
  • Germany tops the European list of Cybercrime for maximum active bot
    Germany all the other European countries in cybercrime. In 2010 alone, Symantec discovered 286 million new global threats for businesses and...
  • Wireless Networking Equipment, A useful Guide
    Do you want to set up a wireless network? Imagine what kind of equipment is required for your wireless network? It is a very useful guide fo...
  • IT Disaster Recovery Quick Start Guide
    If you've ever spent a few days in the hope of recovering nerves vital data, you know that if your technology is not available, your bus...
  • Development delayed
    Every child follows a particular path of growth and development called milestone in the development. Developmental delay occurs when childre...
  • Remove PrivacyRight - Easy PrivacyRight from your computer
    What PrivacyRight? /> PrivacyRight rogue anti-spyware program. This means PrivacyRight a false application that pretends itself as a anti...
  • Science and Technology Interface
    The most important consideration should be the integration of science and technology. We have established the boundaries between science an...
  • Voltage controlled oscillator Fine-tuning of the Communication Systems division
    The technological world, communication Contact the geographical boundaries easier and faster help is not as easy as it sounds. Understand...
  • Nintendo developing
    If you look at the whole picture, you notice the gaming industry is a factor only for a short time, since the '70s. It took about a deca...
  • Features of E-Mail Encryption: Why do you use email encryption software
    In case depends on email for business, make sure that e-mail archiving software installed in your community. This plan can shield all the in...

Categories

  • Computing
  • Hardware
  • Internet
  • IT Management
  • Mobile Tech
  • Security
  • Servers
  • Software
  • Technology

Blog Archive

  • ►  2013 (181)
    • ►  June (15)
    • ►  May (31)
    • ►  April (33)
    • ►  March (32)
    • ►  February (29)
    • ►  January (41)
  • ▼  2012 (45)
    • ▼  December (45)
      • Personal Computer Monitoring for Safety and Security
      • Japan Committed Server Virtual Server vs. Japan
      • HTC 3452 Touch Smartphone
      • Commissioning Policies for Control of Open Source ...
      • Mobile Phone Contract Deal: Excellent Deal For Hi-...
      • How to Improve Network Security: Tips to improve t...
      • V-Tech? S marvelous Educational Toys
      • Computer Network Security-Privacy is important to ...
      • 3D Rendering Services
      • How to Improve Network Security
      • Office Space Lloyds
      • Sony Ericsson Elm, a Hi-Tech, Eco Friendly Phone
      • Managed IT: requirements for business
      • BlackBerry smartphones Review
      • Wonderful iPad App
      • Hardware knowledge: cutting the crankshaft causes ...
      • Orlando improvisation managed IT services
      • Efficient data storage at an affordable price
      • Reliable Internet Internet hosting Critiques
      • Audit security
      • IP Telephony System: The Future of Communications
      • International Science News
      • Leadership Versus Management - Change Is Just Abou...
      • Personality Development
      • Better partnership with Unified Communications
      • Buying and selling of blue chips
      • RAM Requirements for Laptop
      • Privacy and snooping
      • The Homeless Approach High Techs
      • Departure Control Policy - How to Remove Privacy C...
      • Cars Games
      • Your Road Trip Checklist: Backup Camera System Tec...
      • Best 3D Software
      • Share and Watch Christmas Videos or Movies on the go
      • Affrodable Android Tablet PC
      • Using Cloud Storage for Disaster Recovery
      • Discover Forensic Science
      • Battle Ground Mobile Devices and Operating Systems
      • Smart Money - Disaster Recovery Planning
      • STC Technologies - STC Technologies Facilities
      • McAfee Endpoint Encryption Remove - How to 100% Un...
      • Marketing on the Internet
      • Protection of malware - Do companies have to take ...
      • Finding a hotspot in freshwater fishing
      • Data Recovery Hardware
Powered by Blogger.

About Me

Unknown
View my complete profile