Sale of Equipment with sub-equipment attached

Hi fellow members,
We have a business scenario where two different serialized materials are assembled into a single composite unit and sold to the customer. The single unit sold to the customer also has a serial number on it. We are required to track the serial numbers of the individual components as well when the main unit is sold.
There is a sub-equipment option that could be used to attach the individual serialized devices to the main equipment. However, seek the following inputs from you:
a. Is there a way where the equipments can be attached to the main equipment master record automatically when the composite unit has been produced ?
b. If we sell the main unit, the system status of the equipment record gets recorded as ECUS. Will this also change the system status of the sub-equipments to ECUS ?
c. What is the approach to be used if we would like to create one composite unit from two individual materials without the use of a production / sub-contracting order ? Can this be done via a direct movement type ?
Appreciate your help
Regards
Rohit Zalani

Hi
The scenario you described is a production process & if you map it through PP order processing it can be tracked through its cycle. However you have following alternative as workaround-
1. Create the finished material as equipment with serialised material & with construction type feature.
2. Create a material BOM of the main material & you will get a structure of two material.
3. Component material can be serialised for their own identity.
4. You maintain the equipment master if required for the main equipments, no need to creatre equipment view of the component material.
5. Further your question- If we sell the main unit, the system status of the equipment record gets recorded as ECUS. Will this also change the system status of the sub-equipments to ECUS ?
Ans- No equipment status are maintained individually
Regards
Shakti

Similar Messages

  • Equipment or Sub-Equipment

    Dear All,
    I have an requirement, my client has CNC machines and press machines for production. The machines have coolant tanks for CNC's and measuring devices in case of press machines.
    How do i represent these machines in my system, as a equipment, Assembly, sub-equipment or utility.
    Your valuable inputs are awaited.
    Points Assured, Thnkx.
    Regards,
    Rashmi

    Hello Rashmi,
    this is a very good question and we all go through it when we first start with SAP PM. I believe that there might be different answers and different solutions to one given situation.
    It is good to understand the basic use of the different SAP objects (although you could almost make any use of them, there are still some guidelines).
    Functional locations should be used for objects which remain more static, like a building ... It also provides you with an hierarchical structure in its name, what is usefull to represent a geographical or logical organisation, or such upper levels. It provides you with a nice structure list through use of IH01 transaction. To that structure, you can attach materials boms and/or equipments.
    Equipment and sub-equipment should be used for objects which can be installed and dismantled into/from functional locations, like a table in a buidling ... It provides you with the usage list which is able to track the changes you make on the equipment. Unlike the functional location, you do not visualize the structure in its name, but you can attach as many sub-equipments as you want below.
    The subject is too vast to capture it all in a few sentences.
    In your example, i would represent the CNC machines and press as functional locations (if you do not move them often) and related equipments as equipments and sub-equipments which you can install and dismantle into/from machines if this is part of your business process to do so. If not, then everything could simply be functional locations.
    I hope this will help you.
    Eric.

  • Table Link between Equipment and Sub-equipment

    Hi all
    My requirement is this
    I have one mobile set with a serial number. for that mobile set i have one battery with a serial number, now i want to link both the serial numbers, one as main and another as sub item
    I tried by maintaining the battery serial number as sub-equipment in the main mobile set equipment number master,
    Let me know the table link between equipment and sub-equipment
    I want a report based on the input mobile set equipment number what are all the sub-equipment associated with the main equipment
    Also suggest is there any other approach,
    Regards
    Amuthan M

    Hi
    EQUZ is the table,if u give the sub equipment in equipment field and execute.you can find the main equipment in superior equipment field

  • Creating Equipment With Same Equipment No. In Different Maintenance Plant

    Dear Gurus,
    Is it possible to create equipment with same equipment No. (external Numbering) in different maintenance plant of same company code?
    We have 2 plants, plant 1000 & plant 1100 & the geographlocal locations are different. These 2 manufacturing plants belong to same company code. We have implemented plant maintenance system for plant 1000 & now want to roll out the same system at plant 1100. In plant 1000 we have equipment with equipment No. M323 (External Number). Now we want to create equipment with same no. in plant 1100. How can this be done? or is it necessary to have different no.? please advice.
    Regards,
    Abhijit Khandekar

    Dear Friend
    As Equipment master data is client specific, you cannot have the same equipment number for same category of equipment, though plants are different.
    Yes, you can do it if equipment categories are different.
    I hope this will resolve your query if not let me know.
    Regards
    Makarand Gurjar
    SAP PM consultant

  • IE01 Create Equipment with reference

    Hello,
    I have an existing equipment with an asset# attached to it.
    I then create another equipment (IE01) with reference to that equipment. This will automatically bring in the asset# to my new equipment but I don't want.
    So, is there any User-Exit or BADI that I can remove this asset value at the point of saving (IE01) or even before that? I have tried with some User-Exits (IEQM0001, IEQM0002, IEQM0003, IEQM0007) and BADIs (BADI_CCM_FULLY_EQUI, EQUI_UPDATE) but it doesn't work.
    Thanks in advance for your help.

    Radhika,
    On Initial Screen IE01 = Equipment Cat
    Then In General Screen = Description, and other data optional and required.
    Locatin Tab = Main Plant and Location
    Organisation = Cost center
    Structure = if this equipement is under any other equipment or function location then click on right hand   box and mention the fnction location or equipment.
    Now you can save.
    Riyaj

  • Difference between Sub-Equipment & Equipment BOM

    Can Anybody Please tel me the difference between Sub-Equipment & Equipment BOM ?
    Since both are Sub-part of the Equipment , on what basis these two items are differentiated ?

    Sub-equipment:
    Suppose there is a overhead cranes in a coal yard, and your client mapped coal yard as functional location and cranes as eq-1 in SAP.
    but a overhaed crane has many equipment like -
    1. LT motor (long travel)
    2. CT motor (cross travel )
    3. gear boxes
    so u can categorise all above equipment as sub-equipment in SAP and each sub-equipment having one superior equipment as eq-1 (crane no. 1)
    Eq BOM:
    Equipment BOMs are used to describe the structure of equipment and to assign spare parts to equipment for maintenance purposes.
    simply, what are the components and quantity being used to make this equipment.
    electric motor having component like
    1. bearing
    2. nut-bolt
    3. casing
    4. armature
    5. winding
    6. carbon brush
    like may be more than 50 components.

  • Report to show the list of Equipment with Attachment.

    Hi Experts,
    i have attached a file in Equipment Master IE02. Any report can show the list of equipment with attachments?
    Please advise.
    Thank You
    Best Regards

    If you are using IE02, then i think you are using object services - I have never seen a way to view these in an equipment list.  You can only view these while looking at the equipment.   If you use DMS (tcode CV01N) these will show on IE07 as well as in the notification or work order when you use this equipment.

  • Best Practices with sub-par equipment

    Hi guys, I am needing some suggestions for the best way to capture and edit with the equipment I have to work with. Basically, I have the following:
    (1) Panasonic AG-DVC20P DV-Cam with Firewire connection
    (1) Kodak Easyshare z812
    (1) Zoom h4 digital audio recorder
    I have been capturing video with the two cameras. The quality of video from the Kodak camera is surprisingly good for low-action footage (the color is much more vibrant than the Panasonic DV-cam). I have been using it as a second camera angle. However, it doesn't give any timecode. I have to sync it to the audio manually. Also, I have been recording audio in MP3 with the h4. This seems to get out of sync with the DV over a period of about 10 minutes at which point it becomes very noticeable. I am working on editing a 3-hour long event and it is very time-consuming. I guess my question is how can I streamline things?
    • Has anyone else experienced drift in the audio with the H4? I recorded in MP3. If I record in WAV will it minimize the drift? I have been opening the MP3 in Quicktime and exporting as an audio-only Quicktime MOV.
    • Is there an advantage to syncing the two video tracks as Multi-Clips? I haven't really delved into that possibility.
    Thanks!

    With regard to the 29.97/30 thing, you'll find that video people are idiosyncratically imprecise about that. We say 60 when we mean 59.94, we say 30 when we mean 29.97 and we say 24 when we mean 23.976.
    We're quirky.
    Whenever somebody says one of those nice, round numbers, you can assume they're really talking about the corresponding ugly fraction.
    Unless they're film people, in which case +24 means 24, dangit.+

  • PP work center integration with PM equipment

    Hello PM Guru's,
    I have a requirement for my client who is producing glass bottles.
    The single line producing glass, consist of some 10 stages of processing. The entire line is an integrated one. Like this line equipment they are having around 30 line apprx. During PP implementation, they had considered that line as only one work center/per line and established hourly entry of production confirmation.
    Now, during PM implementation, they wanted to consider that line as one equipment, and its sections as either as assembly/sub-equipment.
    Currently, if one section fails, the remaining sections runs, and the breakdown are considered as 1/10th.
    They are prepared to create dummy PP work center for their sections individually.
    Also, they don't want to attach that single PP work center to that entire equipment and its assembly/sub-equipment, because they don't want to have the impact of breakdown stoppage of single section into the whole line. (Due to discrete manufacturing set-up)
    They also want to have OEE established, section-wise. Please let me know, for this scenario, how to map that line equipement, and integarte with the PP work center.
    Thank you with regards,
    Sekar

    Hi
    If you want to interface between PP &PM. then only you have to think of disturbing already inplmented PP.
    Interface between PP& PP means , when PM order is created due to schedule breakdown on a particlur equipment, it should be unaavailble for planning for production.
    In your update , you have not mentioned  clearly this point.
    Is it rquired or not.
    Pl. update.
    Regards
    YMREDDY

  • Should I use Sub-Equipment Hierarchy for sub-systems (first post)?

    I am 2 months into the maintenance manager role for a fleet of Locomotives and it has been decided to use SAP PM by senior management based on a separate business arm requirements.
    I believe for this to be successful the first step is to get the structure right so that data is collected in the most logical manner.
    I intend to use SAP to schedule all maintenance tasks based on measuring points and dates of previous work orders, capture system and sub-system failure history, capture costs and parts usage and trend performance of subsystems based on their own and system level measuring points.
    I have been told that all locomotives are assigned to a single functional location within the business model. The individual locomotives themselves are assigned as separate pieces of equipment in this functional location.
    Within the individual locomotives there are a series of subsystems that have associated maintenance requirements based on time and usage and they are serial number tracked. These items are exchanged between the locomotives and the warehouse upon failure, upgrade or overhaul and include:
    AC traction Motors
    Wheelsets
    Diesel Engine
    Main Generator
    Auxiliary Generator
    Dynostarter
    Gearbox
    Compressors
    Traction motor blowers (Fans)
    Radiator fans and AC radiator fan motors
    Is it logical to put these as sub-equipment within an Equipment Hierarchy with the Locomotive being the superior equipment?
    Should notifications regarding their failure be assigned to the Superior Equipment (Locomotive) or the Sub-Equipment and what are the implications of each? If assigned to sub-systems can I still report on system reliability by "rolling up" the failures?
    Do the measuring points (e.g. kilometres) assigned to the Superior Equipment (Locomotive) accumulate to the Sub-Equipment automatically and does installation and removal from different Locomotives with different kilometres affect this? For example a traction motor in Locomotive 001 is installed from 100,000 to 360,000 locomotive kilometres and then it is installed in Locomotive 002 from 300,000 to the current 340,000 locomotive kilometres. Does SAP accumulate 300,000 kilometres of life to the traction motor sub system based on its superior equipment's measuring points?
    I have many more questions to come that I will most likely solve through experimentation and future questions, but in order to hit the ground running I would appreciate your feedback if any of you have similar experiences.
    Thanks in advance
    Glenn Sanders

    In SAP, you can define "N" no. of hierarchies for Functional Location & Equipment.
    But in the reporting, you can get the costs at Functional Location level & Equipment level at next. Its not possible to have Sub Functional Location level or Sub Equipment Level.
    Also, you have mentioned that you will interchange the Sub components between Locomotives. Also, you want to maintain those using Serial Numbers. You can define these Sub Components as Assemblies with Serial Numbers so that Equipment can be created for those combinations.
    To maintain Measuring Point for Sub Components, Equipment should be created. In SAP, you have the option to transfer the Measuring Points from One Equipment (Superior Equipment) to another Equipment (Sub Equipment).
    While interchanging the Sub Component from One Locomotive to another Locomotive, without Measurement Reading Transfer, you can dismantle & install the same.

  • Relating sub equipment and the operation

    Hi All,
    How can i relate the sub equipment with operation of a PM order ? I am getting the the order details through "BAPI_ALM_ORDER_GET_DETAIL" but nor able to make out which operation/activity corresponds to which sub-equipment.
    Please help.
    Thanks,
    Nagraj

    It appears that you cannot determine which equipment belongs to which operation via the data in this BAPI
    You would need to do some post-processing.
    PeteA

  • Is my Mac Air equipped with security software?

    Just bought a Macbook - Air.  Does it come equipped with security if I want to purchase something on line?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to bypass Apple's oversight, or the oversight could fail in a particular case due to human error.
    For most purposes, applications recognized by Gatekeeper as signed, including App Store products, can be considered safe. Note, however, that at least one trojan for iOS (not for OS X) was briefly distributed by a developer in Russia through the iTunes App Store. That store is under the same oversight by Apple as the Mac App Store, so the protection shouldn't be considered absolute. App Store products may prompt for access to private data, such as your contacts. Think before granting that access. OS X security is based on user input. Never click anything reflexively.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. Beyond XProtect, Gatekeeper, and MRT, there’s no evidence of any benefit from other automated protection against malware. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications should not be trusted if they do something unexpected, such as asking for permission to access your contacts or your location for no apparent reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software  ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but if they get a false sense of security from it, they may feel free to do things that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • Equipment ---- Sub-Equipment heirarchy Requirements

    Dear All,
    While assiging super Equipment to Equipment do we need to confirm anything in master data , ie .Do we have any mandatory master data that have to be same??? or anything
    plz guide
    rgrds
    DM

    hi
    there is no mandatory field for this ,if you have created with max amount of data in superior equipment then some fields will be automatically copied to your sub equipment while creating
    regards
    thyagarajan

  • ITunes Match won't recognize my MBA equipped with a new SSD

    Hi,
    Here's the situation: I replaced the SSD in my late 2010 MBA to add storage space. Everything went perfectly well and I have been using it for weeks, no problem whatsoever with any of my iCould stuff - calednar entries, contacts etc. as everything was transferred over by making a back-up of the old SSD onto the new one and re-instlaling Mavericks to the new one.
    I also have been using iTunes Match for years and love it: ATV, IOS devices are all connected and work perfectly. Until I tried using iTunes Match on the MBA equipped with the new SSD. Note that my iTunes music (not the library file) sits in an external drive connected to my Home network which I don't currentl have access to. That's also teh reason why I signed up for Match: once synced, I didn't have to connect to tht drive and could travel while still having access to all my music.
    The library only sees two local songs that were downloaded recenrly after I purchased them on the iTunes Store. I'm still using the same Apple ID nothing changed, but iTunes isn't showing any of my iTunes Match songs in there. I checked Match had been turned on (it is), I checked that I didn't max out on the number of devices (I haven't) and even checked availability of iTunes Match in other countries (temporarily in France), but otherwise residing in the US.
    So now, when I try to "add this computer" to iTunes Match, it gives me the following error:
    Only one library can be matched at a time. If you continue, the other iTunes Match session will be stopped and this computer's library will be matched instead.
    => Seeing that the "old" library and the "new" one technically come from the same Mac (only now it has a new SSD drive), I'm at a loss and scared to have all of my previously synced/matched songs deleted from itunes Match if I only sync the two local files that were just downloaded/purchased.  <=
    Would appreciate any help or suggestions please.
    Thank you in advance!

    wandererny wrote:
    Only one library can be matched at a time. If you continue, the other iTunes Match session will be stopped and this computer's library will be matched instead.
    Hi,
    You often get this message when match thinks that you already have a match in progess on another computer.
    If you are happy that all your music is on your new hard drive (or if it is only in the cloud), you should select "this computer".
    Jim

  • I'm trying to insall Adobe Photoshop CS3 on a new ASUS ASM11BB001O computer equipped with 64-bit Windows 7.  I use a "bundle" approach, first loading Photoshop 6, then upgrading with CS upgrade and then CS3 upgrade.  The installation goes smoothly until I

    I'm trying to install Adobe Photoshop CS3 on a new ASUS ASM11BB001O computer equipped with 64-bit Windows 7.  I use a "bundle" approach, first loading Photoshop 6, then upgrading with CS upgrade and then CS3 upgrade.  The installation goes smoothly until I add PS CS, and then it balks at the "accept" Adobe conditions screen.  I have two other (Gateway) computers with Windows 7, 64-bit, on both of which the PS-6, CS-CS3 pathway worked fine.  Any thoughts on how to get this working?  Thanks

    If your goal is to install and activate CS5 there is no need to install anything preceding it.  You will only need to have the serial number from the preceding version that you upgrade from (CS3 I guess).

Maybe you are looking for