Abstract

Until the first two decades of the 21st century, as part of the Enterprise Resourse Planning (ERP), the Manufacturing Execution System (MES) and related systems have undergone development in both complexity and efficiency. In the field of production technology, there are many sources of work nowadays to get a detailed picture of the solutions offered by MES. The purpose of this article is to give a comprehensive overview of the MES solutions that currently used in industry. In addition to the general structure of the systems and Holonic MES are briefly described. Special attencion is paid to various collaborative systems that complement the MES. The additional manufacturing tools for MES is also described shematically in this article.

Highlights

  • Today, competition among global companies and mutual interdependence among market players has led to a significant increase in competition between companies

  • The purpose of this article is to give a comprehensive overview of the Manufacturing Execution System (MES) solutions that currently used in industry

  • In order to achieve this, there is a great need for the transformation and acceleration of the information flow during production, to which can be used the Manufacturing Information Bus (MIB) for Cyber Physical Manufacturing System (CPMS) too [1]

Read more

Summary

Introduction

Competition among global companies and mutual interdependence among market players has led to a significant increase in competition between companies. There is still much to be done to ensure that MES provides the required vertical and horizontal integration within a company. This emerging problem with such a complex system can be examined from a number of sides. With the focus on mobility, portability and flexibility as aspects, wireless Networked Control Systems (NCS) are becoming increasingly important [2]. This is complemented by a variety of solutions used in Smart Manufacturing (SM), which, with professional application, can achieve significant resource savings. There is a need to become more and more important in the case of larger – scale, more vulnerable corporate IT systems cyber security issues

Objectives
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.