Browse Definitions :
Definition

rafts, skirts and brims

Contributor(s): Matthew Haughn

Rafts, skirts and brims are structures created at the base of the bottom of a 3D print. These structures are temporary and used to improve print reliability and quality.

All three of these initially printed structures provide a starting point for prints. All three serve to prime the print head and provide a chance to observe any issues before the actual printed part begins.

Rafts provide a wider base than that of the print. The raft's wider base can help adhesion, prevent warping and act as a foundation of support to models that have a small footprint. The print of the model is gapped from the raft and while the raft adheres to the bed, it is easily separated from the print leaving a high-quality finish.

Skirts make a surrounding outline around the print before starting on its actual structure. Skirts do not touch the print nor do they provide support. They serve to prime the printer head and ensure proper flow of filament. Skirts are also used to check adhesion for any leveling issues that come up. Of the three structures, skirts take the least time and use the least amount of filament.

Brims are like a skirt that touches the print sides. They improve adhesion and provide support like a raft, but do not extend underneath the print. Brims use less filament and time than printing rafts. As with skirts, they can reveal initial problems before the print begins.

Rafts, skirts and brims do use up filament and these structures are often discarded. Despite this waste, they are justifiable since they save time and waste in printed parts while also improving quality. A whole wasted print uses more time and filament than a number of these preliminary structures.

This was last updated in December 2017

Continue Reading About rafts, skirts and brims

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • challenge-response authentication

    In information security, challenge-response authentication is a type of authentication protocol where one entity presents a ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • exbibyte (EiB)

    An exbibyte (EiB) is a unit used to measure data capacity.

  • zebibyte (ZiB)

    A zebibyte (ZiB) is a unit used to measure computing and storage capacity.

  • tiered storage

    Tiered storage is a way to assign different categories of data to various types of storage media with the objective of reducing ...

Close