Abstract
Until the first two decades of the 21st century, as part of the Enterprise Resourse Planning (ERP), the Manufacturing Execution System (MES) and related systems have undergone development in both complexity and efficiency. In the field of production technology, there are many sources of work nowadays to get a detailed picture of the solutions offered by MES. The purpose of this article is to give a comprehensive overview of the MES solutions that currently used in industry. In addition to the general structure of the systems and Holonic MES are briefly described. Special attencion is paid to various collaborative systems that complement the MES. The additional manufacturing tools for MES is also described shematically in this article.
Highlights
Today, competition among global companies and mutual interdependence among market players has led to a significant increase in competition between companies
The purpose of this article is to give a comprehensive overview of the Manufacturing Execution System (MES) solutions that currently used in industry
In order to achieve this, there is a great need for the transformation and acceleration of the information flow during production, to which can be used the Manufacturing Information Bus (MIB) for Cyber Physical Manufacturing System (CPMS) too [1]
Summary
Competition among global companies and mutual interdependence among market players has led to a significant increase in competition between companies. There is still much to be done to ensure that MES provides the required vertical and horizontal integration within a company. This emerging problem with such a complex system can be examined from a number of sides. With the focus on mobility, portability and flexibility as aspects, wireless Networked Control Systems (NCS) are becoming increasingly important [2]. This is complemented by a variety of solutions used in Smart Manufacturing (SM), which, with professional application, can achieve significant resource savings. There is a need to become more and more important in the case of larger – scale, more vulnerable corporate IT systems cyber security issues
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.