SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
 
 
Control Specialists Ltd. PO Box 1048 Warrington Cheshire WA1 9BU United Kingdom. Tel +44(0)1925 824003
 
 
Profinet Frame Analysis 
Workshop 
 
INTRODUCTION 
 
This workshop will introduce you to Profinet Frame Analysis using Wireshark.  The type of traffic 
that will be captured for offline analysis will be dependent upon the point in the network that you 
are capturing from and the method used. WireShark is a free to download, established method of 
frame analysis and is used extensively in the IT world. 
 
ETHERNET FRAME STRUCTURE (GENERAL) 
 
The format of an Ethernet Frame is shown below. The structure and contents of the Data part of 
the frame are dependent upon the protocol being used of which there are many. 
 
 
 
   
Profinet Frame Analysis using Wireshark    Version 1.0 
____________________________________________________________________________ 
________________________________________________________________________________ 
www.controlspecialists.co.uk    2 
 
ETHERNET FRAME STRUCTURE (WIRESHARK ‐ PNIO) 
 
 
COMMON PROTOCOLS 
 
For  each  frame,  Wireshark  will  identify  the  protocol  that  the  frame  conforms  to.  For  Profinet 
networks, the most common are:‐ 
 
 ARP (Address Resolution Protocol) 
 
This is a protocol that is used to associate the hardware (MAC) address of a device with an IP 
address. Initially, a request is made using the format “who has this IP address? Send answer to 
me”.  The  response  from  the  device  with  the  given  IP  address  is  “I  have  the  requested  IP 
address  and  my  MAC  address  is  as  follows”.  By  definition,  ARP’s  are  sent  to  broadcast 
addresses so that every device has the opportunity of responding. 
 
 LLDP (Link Layer Discovery Protocol) 
 
A protocol used by devices to announce their presence on the network and their capabilities. 
This Protocol can be used by a Profinet System to determine who is connected to who and for 
automatic  assignment  of  a  device  name  to  a  device  when  a  replacement  is  added  to  the 
network. 
   
Profinet Frame Analysis using Wireshark    Version 1.0 
____________________________________________________________________________ 
________________________________________________________________________________ 
www.controlspecialists.co.uk    3 
 
 PN‐DCP (Discovery and Configuration Protocol)  
 
This is a Profinet‐specific protocol that has two main functions: 
 
1. Used  by  the  Supervisor  (PC)  to  assign  a  unique  name  (Siemens  Primary  Setup  Tool  / 
Procentec Netilities). 
2. Used by the IO Controller (CPU) to assign a unique IP address (as defined in the hardware 
config) in conjunction with ARP above. 
 
 PNIO‐CM (Profinet IO Context Manager) 
This is a Profinet‐specific protocol that is used to configure the AR (Application Relations) and 
CR  (Communication  Relations)  between  a  controller  and  an  IO  device.  This  process  will 
ultimately determine the amount and type of data that will be transmitted between the pair.  
 
There are several stages of the start‐up procedure using the Context Manager with the flow 
usually being as follows:‐ 
 
 CONNECT request from IO Controller followed by a CONNECT response from IO Device 
 WRITE request from IO Controller followed by a WRITE response from IO Device 
 DCONTROL request from IO Controller followed by a DCONTROL response from IO Device 
 CCONTROL request from IO Controller followed by a CCONTROL response from IO Device 
 
 PN‐PTCP (Precision Transparent Clock Protocol) 
 
This is a layer 2 Profinet‐specific protocol used to ensure time synchronisation on the network. 
 
 PNIO 
 
Profinet Data Exchange Traffic 
 
 PNIO‐AL 
 
Profinet Alarm Events 
 
   
Profinet Frame Analysis using Wireshark    Version 1.0 
____________________________________________________________________________ 
________________________________________________________________________________ 
www.controlspecialists.co.uk    4 
 
NETWORK 1 
 
 
EX01  Start‐Up, Data Exchange, Loss of Module 
 
EX01 ‐ FRAME CAPTURE 
 
 Put the CPU into STOP Mode and remove power from it. 
 Launch WireShark. 
 Select the Interface that Wireshark will capture frames from. 
 Start the Capturing process. 
 Apply power to the CPU. 
 After approx. 15s, put the CPU into RUN mode. 
 After a further 15s, remove an IO module. 
 Insert the module back into its slot shortly after. 
 Stop the capture process after approx. 30s. 
 
   
Profinet Frame Analysis using Wireshark    Version 1.0 
____________________________________________________________________________ 
________________________________________________________________________________ 
www.controlspecialists.co.uk    5 
 
EX01  Start‐Up, Data Exchange, Loss of Module (Continued) 
 
EX01 ‐ FRAME ANALYSIS 
 
 Click  on  the  “Profinet  DCP”  Filter  Expression  Button  and  observe  to  CPU 
setting the IP addresses of the Profinet devices. 
 Click on the “ARP” Filter Expression Button and observe the CPU looking for 
devices with specific IP addresses. 
 Click  on  the  “Profinet  CM”  Filter  Expression  Button  and  look  for  PNIO‐CM 
entries that show the CONNECT – WRITE – APP READY start‐up procedure. 
 Click on the “Profinet Data (Good)” Filter Expression Button and look for PNIO 
entries that show data exchange. 
 Click on the “Profinet Data (Bad)” Filter Expression Button and look for PNIO 
entries that show data exchange. 
 Click on the “Profinet Alarms” Filter Expression Button and look for PNIO‐AL 
entries that show alarm events. 
 
EX02  Duplicate Device Name 
 
EX02 ‐ FRAME CAPTURE 
 
 Put the CPU into STOP Mode. 
 Make a direct Ethernet connection from the laptop to the IM153‐3. 
 Use the Primary Setup Tool to rename the device to “wago‐750‐370” – 
without the quotes. 
 Connect the IM153‐3 onto the original network. 
 Put the CPU into RUN Mode. 
 Note the status of the IM153‐3: 
_______________________________________ 
 Note the status of the WAGO 750‐370 
_______________________________________ 
 Remove power from the CPU for a few seconds and then reapply. 
 Wait a few seconds for the PLC to go into RUN mode. 
 Note the status of the IM153‐3: 
_______________________________________ 
 Note the status of the WAGO 750‐370: 
_______________________________________ 
Profinet Frame Analysis using Wireshark    Version 1.0 
____________________________________________________________________________ 
________________________________________________________________________________ 
www.controlspecialists.co.uk    6 
 Launch WireShark. 
 Select the Interface that Wireshark will capture frames from. 
 Start the Capturing process. 
 Stop the capture process after approx. 30s. 
 
EX02  Duplicate Device Name (Continued) 
EX02 ‐ FRAME ANALYSIS 
 
 
 Click on the “Profinet DCP” Filter Expression Button and observe attempts by 
the CPU to find the Profinet devices. 
 
__________________________________________________________________ 
 

Contenu connexe

Tendances

OpenSCAP Overview(security scanning for docker image and container)
OpenSCAP Overview(security scanning for docker image and container)OpenSCAP Overview(security scanning for docker image and container)
OpenSCAP Overview(security scanning for docker image and container)Jooho Lee
 
C++11やemscriptenと付き合って1年間の振り返り
C++11やemscriptenと付き合って1年間の振り返りC++11やemscriptenと付き合って1年間の振り返り
C++11やemscriptenと付き合って1年間の振り返りpaosidufgythrj
 
Password cracking
Password crackingPassword cracking
Password crackingIlan Mindel
 
online blogging system
online blogging systemonline blogging system
online blogging system001vaibhav
 
COMPUTER GRAPHICS PROJECT REPORT
COMPUTER GRAPHICS PROJECT REPORTCOMPUTER GRAPHICS PROJECT REPORT
COMPUTER GRAPHICS PROJECT REPORTvineet raj
 
JavaでWebサービスを作り続けるための戦略と戦術 JJUG-CCC-2018-Spring-g1
JavaでWebサービスを作り続けるための戦略と戦術 JJUG-CCC-2018-Spring-g1JavaでWebサービスを作り続けるための戦略と戦術 JJUG-CCC-2018-Spring-g1
JavaでWebサービスを作り続けるための戦略と戦術 JJUG-CCC-2018-Spring-g1Y Watanabe
 
Pet Pen Testing Tools: Zenmap & Nmap
Pet Pen Testing Tools: Zenmap & NmapPet Pen Testing Tools: Zenmap & Nmap
Pet Pen Testing Tools: Zenmap & NmapMatt Vieyra
 
ARM Trusted FirmwareのBL31を単体で使う!
ARM Trusted FirmwareのBL31を単体で使う!ARM Trusted FirmwareのBL31を単体で使う!
ARM Trusted FirmwareのBL31を単体で使う!Mr. Vengineer
 
Wireshark network analysing software
Wireshark network analysing softwareWireshark network analysing software
Wireshark network analysing softwaredharmesh nakum
 
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...CODE BLUE
 
Windows Server 2016上でLinuxコンテナが動いた!
Windows Server 2016上でLinuxコンテナが動いた!Windows Server 2016上でLinuxコンテナが動いた!
Windows Server 2016上でLinuxコンテナが動いた!Takashi Kanai
 
Xml web services
Xml web servicesXml web services
Xml web servicesRaghu nath
 

Tendances (20)

OpenSCAP Overview(security scanning for docker image and container)
OpenSCAP Overview(security scanning for docker image and container)OpenSCAP Overview(security scanning for docker image and container)
OpenSCAP Overview(security scanning for docker image and container)
 
C++11やemscriptenと付き合って1年間の振り返り
C++11やemscriptenと付き合って1年間の振り返りC++11やemscriptenと付き合って1年間の振り返り
C++11やemscriptenと付き合って1年間の振り返り
 
Password cracking
Password crackingPassword cracking
Password cracking
 
Nmapの真実(続)
Nmapの真実(続)Nmapの真実(続)
Nmapの真実(続)
 
online blogging system
online blogging systemonline blogging system
online blogging system
 
5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool
 
COMPUTER GRAPHICS PROJECT REPORT
COMPUTER GRAPHICS PROJECT REPORTCOMPUTER GRAPHICS PROJECT REPORT
COMPUTER GRAPHICS PROJECT REPORT
 
JavaでWebサービスを作り続けるための戦略と戦術 JJUG-CCC-2018-Spring-g1
JavaでWebサービスを作り続けるための戦略と戦術 JJUG-CCC-2018-Spring-g1JavaでWebサービスを作り続けるための戦略と戦術 JJUG-CCC-2018-Spring-g1
JavaでWebサービスを作り続けるための戦略と戦術 JJUG-CCC-2018-Spring-g1
 
Pet Pen Testing Tools: Zenmap & Nmap
Pet Pen Testing Tools: Zenmap & NmapPet Pen Testing Tools: Zenmap & Nmap
Pet Pen Testing Tools: Zenmap & Nmap
 
Wireshark
Wireshark Wireshark
Wireshark
 
ARM Trusted FirmwareのBL31を単体で使う!
ARM Trusted FirmwareのBL31を単体で使う!ARM Trusted FirmwareのBL31を単体で使う!
ARM Trusted FirmwareのBL31を単体で使う!
 
Network and server performance monitoring training
Network and server performance monitoring trainingNetwork and server performance monitoring training
Network and server performance monitoring training
 
Wireshark network analysing software
Wireshark network analysing softwareWireshark network analysing software
Wireshark network analysing software
 
Web search Technologies
Web search TechnologiesWeb search Technologies
Web search Technologies
 
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
Windows Server 2016上でLinuxコンテナが動いた!
Windows Server 2016上でLinuxコンテナが動いた!Windows Server 2016上でLinuxコンテナが動いた!
Windows Server 2016上でLinuxコンテナが動いた!
 
Wireshark
WiresharkWireshark
Wireshark
 
Xml web services
Xml web servicesXml web services
Xml web services
 

En vedette (10)

Introduction to Profibus & Profinet - Mark Freeman
Introduction to Profibus & Profinet - Mark FreemanIntroduction to Profibus & Profinet - Mark Freeman
Introduction to Profibus & Profinet - Mark Freeman
 
Profisafe update - Pete Brown
Profisafe update  - Pete BrownProfisafe update  - Pete Brown
Profisafe update - Pete Brown
 
PROFIsafe and Trends - Pete Brown
PROFIsafe and Trends - Pete BrownPROFIsafe and Trends - Pete Brown
PROFIsafe and Trends - Pete Brown
 
Introduction to PROFINET - Derek Lane
Introduction to PROFINET - Derek LaneIntroduction to PROFINET - Derek Lane
Introduction to PROFINET - Derek Lane
 
Industrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologiesIndustrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologies
 
IEEE Conference - Industrial Ethernet
IEEE Conference - Industrial EthernetIEEE Conference - Industrial Ethernet
IEEE Conference - Industrial Ethernet
 
PROFIsafe and IT security - Peter Brown of Siemens A&D
PROFIsafe and IT security  - Peter Brown of Siemens A&DPROFIsafe and IT security  - Peter Brown of Siemens A&D
PROFIsafe and IT security - Peter Brown of Siemens A&D
 
PROFIBUS frame analysis - Peter Thomas of Control Specialists
PROFIBUS frame analysis - Peter Thomas of Control SpecialistsPROFIBUS frame analysis - Peter Thomas of Control Specialists
PROFIBUS frame analysis - Peter Thomas of Control Specialists
 
Engineering with PROFIsafe - Peter Brown
Engineering with PROFIsafe - Peter BrownEngineering with PROFIsafe - Peter Brown
Engineering with PROFIsafe - Peter Brown
 
W4 profinet frame analysis, peter thomas
W4 profinet frame analysis, peter thomasW4 profinet frame analysis, peter thomas
W4 profinet frame analysis, peter thomas
 

Similaire à W4 profinet frame analysis handout, peter thomas

The pattern and realization of zigbee wi-fi
The pattern and realization of zigbee  wi-fiThe pattern and realization of zigbee  wi-fi
The pattern and realization of zigbee wi-fieSAT Publishing House
 
The pattern and realization of zigbee wi-fi wireless pathway
The pattern and realization of zigbee  wi-fi wireless pathwayThe pattern and realization of zigbee  wi-fi wireless pathway
The pattern and realization of zigbee wi-fi wireless pathwayeSAT Journals
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reportsShakib Ansaar
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docxdohertyjoetta
 
Opnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo sOpnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo seSAT Publishing House
 
Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...eSAT Publishing House
 
Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...eSAT Journals
 
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...IRJET Journal
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesIJARIIT
 
Networking tutorials introduction to networking
Networking tutorials   introduction to networkingNetworking tutorials   introduction to networking
Networking tutorials introduction to networkingVinod Jadhav
 
Simulation model of dc servo motor control
Simulation model of dc servo motor controlSimulation model of dc servo motor control
Simulation model of dc servo motor controlEvans Marshall
 
Experiment 7 traffic analysis
Experiment 7 traffic analysisExperiment 7 traffic analysis
Experiment 7 traffic analysisnikitaa25
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic AnalysisDavid Sweigert
 
Connected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network ArchitectureConnected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network Architectureijtsrd
 
enet-wp002_-en-p
enet-wp002_-en-penet-wp002_-en-p
enet-wp002_-en-pShuo Zhang
 
An3906 serial to eth freescale
An3906   serial to eth freescaleAn3906   serial to eth freescale
An3906 serial to eth freescaleFernando
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network SecurityIRJET Journal
 
Ecet 375 Education Redefined - snaptutorial.com
Ecet 375     Education Redefined - snaptutorial.comEcet 375     Education Redefined - snaptutorial.com
Ecet 375 Education Redefined - snaptutorial.comDavisMurphyC86
 

Similaire à W4 profinet frame analysis handout, peter thomas (20)

The pattern and realization of zigbee wi-fi
The pattern and realization of zigbee  wi-fiThe pattern and realization of zigbee  wi-fi
The pattern and realization of zigbee wi-fi
 
The pattern and realization of zigbee wi-fi wireless pathway
The pattern and realization of zigbee  wi-fi wireless pathwayThe pattern and realization of zigbee  wi-fi wireless pathway
The pattern and realization of zigbee wi-fi wireless pathway
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docx
 
En35793797
En35793797En35793797
En35793797
 
Opnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo sOpnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo s
 
Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...
 
Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...
 
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
 
Networking tutorials introduction to networking
Networking tutorials   introduction to networkingNetworking tutorials   introduction to networking
Networking tutorials introduction to networking
 
Simulation model of dc servo motor control
Simulation model of dc servo motor controlSimulation model of dc servo motor control
Simulation model of dc servo motor control
 
Experiment 7 traffic analysis
Experiment 7 traffic analysisExperiment 7 traffic analysis
Experiment 7 traffic analysis
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic Analysis
 
Connected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network ArchitectureConnected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network Architecture
 
enet-wp002_-en-p
enet-wp002_-en-penet-wp002_-en-p
enet-wp002_-en-p
 
Research_Paper (3)
Research_Paper (3)Research_Paper (3)
Research_Paper (3)
 
An3906 serial to eth freescale
An3906   serial to eth freescaleAn3906   serial to eth freescale
An3906 serial to eth freescale
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network Security
 
Ecet 375 Education Redefined - snaptutorial.com
Ecet 375     Education Redefined - snaptutorial.comEcet 375     Education Redefined - snaptutorial.com
Ecet 375 Education Redefined - snaptutorial.com
 

Plus de PROFIBUS and PROFINET InternationaI - PI UK

Plus de PROFIBUS and PROFINET InternationaI - PI UK (20)

11. PI_Ford_Dunton_IOLINK_Safety.pdf
11. PI_Ford_Dunton_IOLINK_Safety.pdf11. PI_Ford_Dunton_IOLINK_Safety.pdf
11. PI_Ford_Dunton_IOLINK_Safety.pdf
 
7. Ford_Dunton_TSN_CRM.pdf
7. Ford_Dunton_TSN_CRM.pdf7. Ford_Dunton_TSN_CRM.pdf
7. Ford_Dunton_TSN_CRM.pdf
 
6. SRCI Profibus International v2.pdf
6. SRCI Profibus International v2.pdf6. SRCI Profibus International v2.pdf
6. SRCI Profibus International v2.pdf
 
13. CEMA - AUTOMOTIVE.pdf
13. CEMA - AUTOMOTIVE.pdf13. CEMA - AUTOMOTIVE.pdf
13. CEMA - AUTOMOTIVE.pdf
 
12. PI_OPC_UK.pdf
12. PI_OPC_UK.pdf12. PI_OPC_UK.pdf
12. PI_OPC_UK.pdf
 
4. APL PI Presentation 2023.pdf
4. APL PI Presentation 2023.pdf4. APL PI Presentation 2023.pdf
4. APL PI Presentation 2023.pdf
 
10. PI_Dunton - OT Security.pdf
10. PI_Dunton - OT Security.pdf10. PI_Dunton - OT Security.pdf
10. PI_Dunton - OT Security.pdf
 
9. PA DIM presentation.pdf
9. PA DIM presentation.pdf9. PA DIM presentation.pdf
9. PA DIM presentation.pdf
 
3. Ford Dunton Mark Freeman.pdf
3. Ford Dunton Mark Freeman.pdf3. Ford Dunton Mark Freeman.pdf
3. Ford Dunton Mark Freeman.pdf
 
2. Ford_Dunton_Introductions_CRM.pdf
2. Ford_Dunton_Introductions_CRM.pdf2. Ford_Dunton_Introductions_CRM.pdf
2. Ford_Dunton_Introductions_CRM.pdf
 
PI UK Seminar (Nov 2021) - Online Certified Training Courses
PI UK Seminar (Nov 2021) - Online Certified Training CoursesPI UK Seminar (Nov 2021) - Online Certified Training Courses
PI UK Seminar (Nov 2021) - Online Certified Training Courses
 
PI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
PI UK Seminar (Nov 2021) - PROFINET Implementation and TestingPI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
PI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
 
PI UK Seminar (Nov 2021) - PROFINET Design Basics
PI UK Seminar (Nov 2021) - PROFINET Design BasicsPI UK Seminar (Nov 2021) - PROFINET Design Basics
PI UK Seminar (Nov 2021) - PROFINET Design Basics
 
PI UK Seminar (Nov 2021) - PROFINET Gateways
PI UK Seminar (Nov 2021) - PROFINET GatewaysPI UK Seminar (Nov 2021) - PROFINET Gateways
PI UK Seminar (Nov 2021) - PROFINET Gateways
 
PI UK Seminar (Nov 2021) - PROFIBUS and PROFINET Device Configuration
PI UK Seminar (Nov 2021) - PROFIBUS and PROFINET Device ConfigurationPI UK Seminar (Nov 2021) - PROFIBUS and PROFINET Device Configuration
PI UK Seminar (Nov 2021) - PROFIBUS and PROFINET Device Configuration
 
PI UK Seminar (Nov 2021) - PROFINET of Things
PI UK Seminar (Nov 2021) - PROFINET of ThingsPI UK Seminar (Nov 2021) - PROFINET of Things
PI UK Seminar (Nov 2021) - PROFINET of Things
 
PI UK Seminar (Nov 2021) - Update on APL
PI UK Seminar (Nov 2021) - Update on APLPI UK Seminar (Nov 2021) - Update on APL
PI UK Seminar (Nov 2021) - Update on APL
 
PROFINET to PROFIBUS gateways - Peter Thomas - 03 june 2020
PROFINET to PROFIBUS gateways - Peter Thomas - 03 june 2020PROFINET to PROFIBUS gateways - Peter Thomas - 03 june 2020
PROFINET to PROFIBUS gateways - Peter Thomas - 03 june 2020
 
PROFIBUS lightning surge protection - Peter Thomas, CSL - 10 june 2020
PROFIBUS lightning surge protection -  Peter Thomas, CSL - 10 june 2020 PROFIBUS lightning surge protection -  Peter Thomas, CSL - 10 june 2020
PROFIBUS lightning surge protection - Peter Thomas, CSL - 10 june 2020
 
PROFINET network diagnostics and support - May 2020 - Peter Thomas
PROFINET network diagnostics and support - May 2020 - Peter ThomasPROFINET network diagnostics and support - May 2020 - Peter Thomas
PROFINET network diagnostics and support - May 2020 - Peter Thomas
 

Dernier

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Dernier (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

W4 profinet frame analysis handout, peter thomas

  • 1.     Control Specialists Ltd. PO Box 1048 Warrington Cheshire WA1 9BU United Kingdom. Tel +44(0)1925 824003     Profinet Frame Analysis  Workshop    INTRODUCTION    This workshop will introduce you to Profinet Frame Analysis using Wireshark.  The type of traffic  that will be captured for offline analysis will be dependent upon the point in the network that you  are capturing from and the method used. WireShark is a free to download, established method of  frame analysis and is used extensively in the IT world.    ETHERNET FRAME STRUCTURE (GENERAL)    The format of an Ethernet Frame is shown below. The structure and contents of the Data part of  the frame are dependent upon the protocol being used of which there are many.           
  • 2. Profinet Frame Analysis using Wireshark    Version 1.0  ____________________________________________________________________________  ________________________________________________________________________________  www.controlspecialists.co.uk    2    ETHERNET FRAME STRUCTURE (WIRESHARK ‐ PNIO)      COMMON PROTOCOLS    For  each  frame,  Wireshark  will  identify  the  protocol  that  the  frame  conforms  to.  For  Profinet  networks, the most common are:‐     ARP (Address Resolution Protocol)    This is a protocol that is used to associate the hardware (MAC) address of a device with an IP  address. Initially, a request is made using the format “who has this IP address? Send answer to  me”.  The  response  from  the  device  with  the  given  IP  address  is  “I  have  the  requested  IP  address  and  my  MAC  address  is  as  follows”.  By  definition,  ARP’s  are  sent  to  broadcast  addresses so that every device has the opportunity of responding.     LLDP (Link Layer Discovery Protocol)    A protocol used by devices to announce their presence on the network and their capabilities.  This Protocol can be used by a Profinet System to determine who is connected to who and for  automatic  assignment  of  a  device  name  to  a  device  when  a  replacement  is  added  to  the  network.     
  • 3. Profinet Frame Analysis using Wireshark    Version 1.0  ____________________________________________________________________________  ________________________________________________________________________________  www.controlspecialists.co.uk    3     PN‐DCP (Discovery and Configuration Protocol)     This is a Profinet‐specific protocol that has two main functions:    1. Used  by  the  Supervisor  (PC)  to  assign  a  unique  name  (Siemens  Primary  Setup  Tool  /  Procentec Netilities).  2. Used by the IO Controller (CPU) to assign a unique IP address (as defined in the hardware  config) in conjunction with ARP above.     PNIO‐CM (Profinet IO Context Manager)  This is a Profinet‐specific protocol that is used to configure the AR (Application Relations) and  CR  (Communication  Relations)  between  a  controller  and  an  IO  device.  This  process  will  ultimately determine the amount and type of data that will be transmitted between the pair.     There are several stages of the start‐up procedure using the Context Manager with the flow  usually being as follows:‐     CONNECT request from IO Controller followed by a CONNECT response from IO Device   WRITE request from IO Controller followed by a WRITE response from IO Device   DCONTROL request from IO Controller followed by a DCONTROL response from IO Device   CCONTROL request from IO Controller followed by a CCONTROL response from IO Device     PN‐PTCP (Precision Transparent Clock Protocol)    This is a layer 2 Profinet‐specific protocol used to ensure time synchronisation on the network.     PNIO    Profinet Data Exchange Traffic     PNIO‐AL    Profinet Alarm Events       
  • 4. Profinet Frame Analysis using Wireshark    Version 1.0  ____________________________________________________________________________  ________________________________________________________________________________  www.controlspecialists.co.uk    4    NETWORK 1      EX01  Start‐Up, Data Exchange, Loss of Module    EX01 ‐ FRAME CAPTURE     Put the CPU into STOP Mode and remove power from it.   Launch WireShark.   Select the Interface that Wireshark will capture frames from.   Start the Capturing process.   Apply power to the CPU.   After approx. 15s, put the CPU into RUN mode.   After a further 15s, remove an IO module.   Insert the module back into its slot shortly after.   Stop the capture process after approx. 30s.       
  • 5. Profinet Frame Analysis using Wireshark    Version 1.0  ____________________________________________________________________________  ________________________________________________________________________________  www.controlspecialists.co.uk    5    EX01  Start‐Up, Data Exchange, Loss of Module (Continued)    EX01 ‐ FRAME ANALYSIS     Click  on  the  “Profinet  DCP”  Filter  Expression  Button  and  observe  to  CPU  setting the IP addresses of the Profinet devices.   Click on the “ARP” Filter Expression Button and observe the CPU looking for  devices with specific IP addresses.   Click  on  the  “Profinet  CM”  Filter  Expression  Button  and  look  for  PNIO‐CM  entries that show the CONNECT – WRITE – APP READY start‐up procedure.   Click on the “Profinet Data (Good)” Filter Expression Button and look for PNIO  entries that show data exchange.   Click on the “Profinet Data (Bad)” Filter Expression Button and look for PNIO  entries that show data exchange.   Click on the “Profinet Alarms” Filter Expression Button and look for PNIO‐AL  entries that show alarm events.    EX02  Duplicate Device Name    EX02 ‐ FRAME CAPTURE     Put the CPU into STOP Mode.   Make a direct Ethernet connection from the laptop to the IM153‐3.   Use the Primary Setup Tool to rename the device to “wago‐750‐370” –  without the quotes.   Connect the IM153‐3 onto the original network.   Put the CPU into RUN Mode.   Note the status of the IM153‐3:  _______________________________________   Note the status of the WAGO 750‐370  _______________________________________   Remove power from the CPU for a few seconds and then reapply.   Wait a few seconds for the PLC to go into RUN mode.   Note the status of the IM153‐3:  _______________________________________   Note the status of the WAGO 750‐370:  _______________________________________ 
  • 6. Profinet Frame Analysis using Wireshark    Version 1.0  ____________________________________________________________________________  ________________________________________________________________________________  www.controlspecialists.co.uk    6   Launch WireShark.   Select the Interface that Wireshark will capture frames from.   Start the Capturing process.   Stop the capture process after approx. 30s.    EX02  Duplicate Device Name (Continued)  EX02 ‐ FRAME ANALYSIS       Click on the “Profinet DCP” Filter Expression Button and observe attempts by  the CPU to find the Profinet devices.    __________________________________________________________________