SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
 
 
Control Specialists Ltd. PO Box 1048 Warrington Cheshire WA1 9BU United Kingdom. Tel +44(0)1925 824003
 
 
Profinet Frame Analysis 
Workshop 
 
INTRODUCTION 
 
This workshop will introduce you to Profinet Frame Analysis using Wireshark.  The type of traffic 
that will be captured for offline analysis will be dependent upon the point in the network that you 
are capturing from and the method used. WireShark is a free to download, established method of 
frame analysis and is used extensively in the IT world. 
 
ETHERNET FRAME STRUCTURE (GENERAL) 
 
The format of an Ethernet Frame is shown below. The structure and contents of the Data part of 
the frame are dependent upon the protocol being used of which there are many. 
 
 
 
   
Profinet Frame Analysis using Wireshark    Version 1.0 
____________________________________________________________________________ 
________________________________________________________________________________ 
www.controlspecialists.co.uk    2 
 
ETHERNET FRAME STRUCTURE (WIRESHARK ‐ PNIO) 
 
 
COMMON PROTOCOLS 
 
For  each  frame,  Wireshark  will  identify  the  protocol  that  the  frame  conforms  to.  For  Profinet 
networks, the most common are:‐ 
 
 ARP (Address Resolution Protocol) 
 
This is a protocol that is used to associate the hardware (MAC) address of a device with an IP 
address. Initially, a request is made using the format “who has this IP address? Send answer to 
me”.  The  response  from  the  device  with  the  given  IP  address  is  “I  have  the  requested  IP 
address  and  my  MAC  address  is  as  follows”.  By  definition,  ARP’s  are  sent  to  broadcast 
addresses so that every device has the opportunity of responding. 
 
 LLDP (Link Layer Discovery Protocol) 
 
A protocol used by devices to announce their presence on the network and their capabilities. 
This Protocol can be used by a Profinet System to determine who is connected to who and for 
automatic  assignment  of  a  device  name  to  a  device  when  a  replacement  is  added  to  the 
network. 
   
Profinet Frame Analysis using Wireshark    Version 1.0 
____________________________________________________________________________ 
________________________________________________________________________________ 
www.controlspecialists.co.uk    3 
 
 PN‐DCP (Discovery and Configuration Protocol)  
 
This is a Profinet‐specific protocol that has two main functions: 
 
1. Used  by  the  Supervisor  (PC)  to  assign  a  unique  name  (Siemens  Primary  Setup  Tool  / 
Procentec Netilities). 
2. Used by the IO Controller (CPU) to assign a unique IP address (as defined in the hardware 
config) in conjunction with ARP above. 
 
 PNIO‐CM (Profinet IO Context Manager) 
This is a Profinet‐specific protocol that is used to configure the AR (Application Relations) and 
CR  (Communication  Relations)  between  a  controller  and  an  IO  device.  This  process  will 
ultimately determine the amount and type of data that will be transmitted between the pair.  
 
There are several stages of the start‐up procedure using the Context Manager with the flow 
usually being as follows:‐ 
 
 CONNECT request from IO Controller followed by a CONNECT response from IO Device 
 WRITE request from IO Controller followed by a WRITE response from IO Device 
 DCONTROL request from IO Controller followed by a DCONTROL response from IO Device 
 CCONTROL request from IO Controller followed by a CCONTROL response from IO Device 
 
 PN‐PTCP (Precision Transparent Clock Protocol) 
 
This is a layer 2 Profinet‐specific protocol used to ensure time synchronisation on the network. 
 
 PNIO 
 
Profinet Data Exchange Traffic 
 
 PNIO‐AL 
 
Profinet Alarm Events 
 
   
Profinet Frame Analysis using Wireshark    Version 1.0 
____________________________________________________________________________ 
________________________________________________________________________________ 
www.controlspecialists.co.uk    4 
 
NETWORK 1 
 
 
EX01  Start‐Up, Data Exchange, Loss of Module 
 
EX01 ‐ FRAME CAPTURE 
 
 Put the CPU into STOP Mode and remove power from it. 
 Launch WireShark. 
 Select the Interface that Wireshark will capture frames from. 
 Start the Capturing process. 
 Apply power to the CPU. 
 After approx. 15s, put the CPU into RUN mode. 
 After a further 15s, remove an IO module. 
 Insert the module back into its slot shortly after. 
 Stop the capture process after approx. 30s. 
 
   
Profinet Frame Analysis using Wireshark    Version 1.0 
____________________________________________________________________________ 
________________________________________________________________________________ 
www.controlspecialists.co.uk    5 
 
EX01  Start‐Up, Data Exchange, Loss of Module (Continued) 
 
EX01 ‐ FRAME ANALYSIS 
 
 Click  on  the  “Profinet  DCP”  Filter  Expression  Button  and  observe  to  CPU 
setting the IP addresses of the Profinet devices. 
 Click on the “ARP” Filter Expression Button and observe the CPU looking for 
devices with specific IP addresses. 
 Click  on  the  “Profinet  CM”  Filter  Expression  Button  and  look  for  PNIO‐CM 
entries that show the CONNECT – WRITE – APP READY start‐up procedure. 
 Click on the “Profinet Data (Good)” Filter Expression Button and look for PNIO 
entries that show data exchange. 
 Click on the “Profinet Data (Bad)” Filter Expression Button and look for PNIO 
entries that show data exchange. 
 Click on the “Profinet Alarms” Filter Expression Button and look for PNIO‐AL 
entries that show alarm events. 
 
EX02  Duplicate Device Name 
 
EX02 ‐ FRAME CAPTURE 
 
 Put the CPU into STOP Mode. 
 Make a direct Ethernet connection from the laptop to the IM153‐3. 
 Use the Primary Setup Tool to rename the device to “wago‐750‐370” – 
without the quotes. 
 Connect the IM153‐3 onto the original network. 
 Put the CPU into RUN Mode. 
 Note the status of the IM153‐3: 
_______________________________________ 
 Note the status of the WAGO 750‐370 
_______________________________________ 
 Remove power from the CPU for a few seconds and then reapply. 
 Wait a few seconds for the PLC to go into RUN mode. 
 Note the status of the IM153‐3: 
_______________________________________ 
 Note the status of the WAGO 750‐370: 
_______________________________________ 
Profinet Frame Analysis using Wireshark    Version 1.0 
____________________________________________________________________________ 
________________________________________________________________________________ 
www.controlspecialists.co.uk    6 
 Launch WireShark. 
 Select the Interface that Wireshark will capture frames from. 
 Start the Capturing process. 
 Stop the capture process after approx. 30s. 
 
EX02  Duplicate Device Name (Continued) 
EX02 ‐ FRAME ANALYSIS 
 
 
 Click on the “Profinet DCP” Filter Expression Button and observe attempts by 
the CPU to find the Profinet devices. 
 
__________________________________________________________________ 
 

Mais conteúdo relacionado

Mais procurados

Data Encoding
Data EncodingData Encoding
Data Encoding
Luka M G
 
Wireless router
Wireless routerWireless router
Wireless router
roza921
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
Kashif Latif
 

Mais procurados (20)

The Data Link Layer
The Data Link LayerThe Data Link Layer
The Data Link Layer
 
Networking Notes For DIT Part 1
Networking Notes For DIT Part 1Networking Notes For DIT Part 1
Networking Notes For DIT Part 1
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
MQTT Protocol: IOT Technology
MQTT Protocol: IOT TechnologyMQTT Protocol: IOT Technology
MQTT Protocol: IOT Technology
 
IOT - Unit 3.pptx
IOT - Unit 3.pptxIOT - Unit 3.pptx
IOT - Unit 3.pptx
 
Mail server
Mail serverMail server
Mail server
 
IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)
IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)
IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)
 
Data Encoding
Data EncodingData Encoding
Data Encoding
 
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPTEC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
EC 6802 WIRELESS NETWORK_ BABU M_ unit 3 ,4 & 5 PPT
 
Topic:Terminal handling & polling
Topic:Terminal handling & pollingTopic:Terminal handling & polling
Topic:Terminal handling & polling
 
Wireless router
Wireless routerWireless router
Wireless router
 
PLC Programming Languages
PLC Programming LanguagesPLC Programming Languages
PLC Programming Languages
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
3.1 Network Basic
3.1 Network Basic3.1 Network Basic
3.1 Network Basic
 
PPT Backbone And Networks
PPT Backbone And NetworksPPT Backbone And Networks
PPT Backbone And Networks
 
Cellular network,1st generation,2nd generation
Cellular network,1st generation,2nd generationCellular network,1st generation,2nd generation
Cellular network,1st generation,2nd generation
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Basic of MODBUS Communication/Protocol
Basic of MODBUS Communication/ProtocolBasic of MODBUS Communication/Protocol
Basic of MODBUS Communication/Protocol
 
4. Internet of Things - Reference Model and Architecture
4. Internet of Things - Reference Model and Architecture4. Internet of Things - Reference Model and Architecture
4. Internet of Things - Reference Model and Architecture
 
Networking Lab Report
Networking Lab ReportNetworking Lab Report
Networking Lab Report
 

Destaque

Destaque (9)

Introduction to Profibus & Profinet - Mark Freeman
Introduction to Profibus & Profinet - Mark FreemanIntroduction to Profibus & Profinet - Mark Freeman
Introduction to Profibus & Profinet - Mark Freeman
 
Profisafe update - Pete Brown
Profisafe update  - Pete BrownProfisafe update  - Pete Brown
Profisafe update - Pete Brown
 
PROFIsafe and Trends - Pete Brown
PROFIsafe and Trends - Pete BrownPROFIsafe and Trends - Pete Brown
PROFIsafe and Trends - Pete Brown
 
Introduction to PROFINET - Derek Lane
Introduction to PROFINET - Derek LaneIntroduction to PROFINET - Derek Lane
Introduction to PROFINET - Derek Lane
 
Industrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologiesIndustrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologies
 
IEEE Conference - Industrial Ethernet
IEEE Conference - Industrial EthernetIEEE Conference - Industrial Ethernet
IEEE Conference - Industrial Ethernet
 
PROFIsafe and IT security - Peter Brown of Siemens A&D
PROFIsafe and IT security  - Peter Brown of Siemens A&DPROFIsafe and IT security  - Peter Brown of Siemens A&D
PROFIsafe and IT security - Peter Brown of Siemens A&D
 
PROFIBUS frame analysis - Peter Thomas of Control Specialists
PROFIBUS frame analysis - Peter Thomas of Control SpecialistsPROFIBUS frame analysis - Peter Thomas of Control Specialists
PROFIBUS frame analysis - Peter Thomas of Control Specialists
 
Engineering with PROFIsafe - Peter Brown
Engineering with PROFIsafe - Peter BrownEngineering with PROFIsafe - Peter Brown
Engineering with PROFIsafe - Peter Brown
 

Semelhante a W4 profinet frame analysis handout, peter thomas

NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docx
dohertyjoetta
 
Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...
eSAT Journals
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
IJARIIT
 
Networking tutorials introduction to networking
Networking tutorials   introduction to networkingNetworking tutorials   introduction to networking
Networking tutorials introduction to networking
Vinod Jadhav
 
Experiment 7 traffic analysis
Experiment 7 traffic analysisExperiment 7 traffic analysis
Experiment 7 traffic analysis
nikitaa25
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic Analysis
David Sweigert
 
Connected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network ArchitectureConnected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network Architecture
ijtsrd
 
enet-wp002_-en-p
enet-wp002_-en-penet-wp002_-en-p
enet-wp002_-en-p
Shuo Zhang
 

Semelhante a W4 profinet frame analysis handout, peter thomas (20)

The pattern and realization of zigbee wi-fi
The pattern and realization of zigbee  wi-fiThe pattern and realization of zigbee  wi-fi
The pattern and realization of zigbee wi-fi
 
The pattern and realization of zigbee wi-fi wireless pathway
The pattern and realization of zigbee  wi-fi wireless pathwayThe pattern and realization of zigbee  wi-fi wireless pathway
The pattern and realization of zigbee wi-fi wireless pathway
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
NETWORKING SYSTEMS .docx
NETWORKING SYSTEMS                                                .docxNETWORKING SYSTEMS                                                .docx
NETWORKING SYSTEMS .docx
 
En35793797
En35793797En35793797
En35793797
 
Opnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo sOpnet based simulation and investigation of wimax network using different qo s
Opnet based simulation and investigation of wimax network using different qo s
 
Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...
 
Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...Design and implementation of an ancrchitecture of embedded web server for wir...
Design and implementation of an ancrchitecture of embedded web server for wir...
 
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
 
Networking tutorials introduction to networking
Networking tutorials   introduction to networkingNetworking tutorials   introduction to networking
Networking tutorials introduction to networking
 
Simulation model of dc servo motor control
Simulation model of dc servo motor controlSimulation model of dc servo motor control
Simulation model of dc servo motor control
 
Experiment 7 traffic analysis
Experiment 7 traffic analysisExperiment 7 traffic analysis
Experiment 7 traffic analysis
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic Analysis
 
Connected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network ArchitectureConnected Vehicles, Zonal In Vehicle Network Architecture
Connected Vehicles, Zonal In Vehicle Network Architecture
 
enet-wp002_-en-p
enet-wp002_-en-penet-wp002_-en-p
enet-wp002_-en-p
 
Research_Paper (3)
Research_Paper (3)Research_Paper (3)
Research_Paper (3)
 
An3906 serial to eth freescale
An3906   serial to eth freescaleAn3906   serial to eth freescale
An3906 serial to eth freescale
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network Security
 
Ecet 375 Education Redefined - snaptutorial.com
Ecet 375     Education Redefined - snaptutorial.comEcet 375     Education Redefined - snaptutorial.com
Ecet 375 Education Redefined - snaptutorial.com
 

Mais de PROFIBUS and PROFINET InternationaI - PI UK

Mais de PROFIBUS and PROFINET InternationaI - PI UK (20)

11. PI_Ford_Dunton_IOLINK_Safety.pdf
11. PI_Ford_Dunton_IOLINK_Safety.pdf11. PI_Ford_Dunton_IOLINK_Safety.pdf
11. PI_Ford_Dunton_IOLINK_Safety.pdf
 
7. Ford_Dunton_TSN_CRM.pdf
7. Ford_Dunton_TSN_CRM.pdf7. Ford_Dunton_TSN_CRM.pdf
7. Ford_Dunton_TSN_CRM.pdf
 
6. SRCI Profibus International v2.pdf
6. SRCI Profibus International v2.pdf6. SRCI Profibus International v2.pdf
6. SRCI Profibus International v2.pdf
 
13. CEMA - AUTOMOTIVE.pdf
13. CEMA - AUTOMOTIVE.pdf13. CEMA - AUTOMOTIVE.pdf
13. CEMA - AUTOMOTIVE.pdf
 
12. PI_OPC_UK.pdf
12. PI_OPC_UK.pdf12. PI_OPC_UK.pdf
12. PI_OPC_UK.pdf
 
4. APL PI Presentation 2023.pdf
4. APL PI Presentation 2023.pdf4. APL PI Presentation 2023.pdf
4. APL PI Presentation 2023.pdf
 
10. PI_Dunton - OT Security.pdf
10. PI_Dunton - OT Security.pdf10. PI_Dunton - OT Security.pdf
10. PI_Dunton - OT Security.pdf
 
9. PA DIM presentation.pdf
9. PA DIM presentation.pdf9. PA DIM presentation.pdf
9. PA DIM presentation.pdf
 
3. Ford Dunton Mark Freeman.pdf
3. Ford Dunton Mark Freeman.pdf3. Ford Dunton Mark Freeman.pdf
3. Ford Dunton Mark Freeman.pdf
 
2. Ford_Dunton_Introductions_CRM.pdf
2. Ford_Dunton_Introductions_CRM.pdf2. Ford_Dunton_Introductions_CRM.pdf
2. Ford_Dunton_Introductions_CRM.pdf
 
PI UK Seminar (Nov 2021) - Online Certified Training Courses
PI UK Seminar (Nov 2021) - Online Certified Training CoursesPI UK Seminar (Nov 2021) - Online Certified Training Courses
PI UK Seminar (Nov 2021) - Online Certified Training Courses
 
PI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
PI UK Seminar (Nov 2021) - PROFINET Implementation and TestingPI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
PI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
 
PI UK Seminar (Nov 2021) - PROFINET Design Basics
PI UK Seminar (Nov 2021) - PROFINET Design BasicsPI UK Seminar (Nov 2021) - PROFINET Design Basics
PI UK Seminar (Nov 2021) - PROFINET Design Basics
 
PI UK Seminar (Nov 2021) - PROFINET Gateways
PI UK Seminar (Nov 2021) - PROFINET GatewaysPI UK Seminar (Nov 2021) - PROFINET Gateways
PI UK Seminar (Nov 2021) - PROFINET Gateways
 
PI UK Seminar (Nov 2021) - PROFIBUS and PROFINET Device Configuration
PI UK Seminar (Nov 2021) - PROFIBUS and PROFINET Device ConfigurationPI UK Seminar (Nov 2021) - PROFIBUS and PROFINET Device Configuration
PI UK Seminar (Nov 2021) - PROFIBUS and PROFINET Device Configuration
 
PI UK Seminar (Nov 2021) - PROFINET of Things
PI UK Seminar (Nov 2021) - PROFINET of ThingsPI UK Seminar (Nov 2021) - PROFINET of Things
PI UK Seminar (Nov 2021) - PROFINET of Things
 
PI UK Seminar (Nov 2021) - Update on APL
PI UK Seminar (Nov 2021) - Update on APLPI UK Seminar (Nov 2021) - Update on APL
PI UK Seminar (Nov 2021) - Update on APL
 
PROFINET to PROFIBUS gateways - Peter Thomas - 03 june 2020
PROFINET to PROFIBUS gateways - Peter Thomas - 03 june 2020PROFINET to PROFIBUS gateways - Peter Thomas - 03 june 2020
PROFINET to PROFIBUS gateways - Peter Thomas - 03 june 2020
 
PROFIBUS lightning surge protection - Peter Thomas, CSL - 10 june 2020
PROFIBUS lightning surge protection -  Peter Thomas, CSL - 10 june 2020 PROFIBUS lightning surge protection -  Peter Thomas, CSL - 10 june 2020
PROFIBUS lightning surge protection - Peter Thomas, CSL - 10 june 2020
 
PROFINET network diagnostics and support - May 2020 - Peter Thomas
PROFINET network diagnostics and support - May 2020 - Peter ThomasPROFINET network diagnostics and support - May 2020 - Peter Thomas
PROFINET network diagnostics and support - May 2020 - Peter Thomas
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

W4 profinet frame analysis handout, peter thomas

  • 1.     Control Specialists Ltd. PO Box 1048 Warrington Cheshire WA1 9BU United Kingdom. Tel +44(0)1925 824003     Profinet Frame Analysis  Workshop    INTRODUCTION    This workshop will introduce you to Profinet Frame Analysis using Wireshark.  The type of traffic  that will be captured for offline analysis will be dependent upon the point in the network that you  are capturing from and the method used. WireShark is a free to download, established method of  frame analysis and is used extensively in the IT world.    ETHERNET FRAME STRUCTURE (GENERAL)    The format of an Ethernet Frame is shown below. The structure and contents of the Data part of  the frame are dependent upon the protocol being used of which there are many.           
  • 2. Profinet Frame Analysis using Wireshark    Version 1.0  ____________________________________________________________________________  ________________________________________________________________________________  www.controlspecialists.co.uk    2    ETHERNET FRAME STRUCTURE (WIRESHARK ‐ PNIO)      COMMON PROTOCOLS    For  each  frame,  Wireshark  will  identify  the  protocol  that  the  frame  conforms  to.  For  Profinet  networks, the most common are:‐     ARP (Address Resolution Protocol)    This is a protocol that is used to associate the hardware (MAC) address of a device with an IP  address. Initially, a request is made using the format “who has this IP address? Send answer to  me”.  The  response  from  the  device  with  the  given  IP  address  is  “I  have  the  requested  IP  address  and  my  MAC  address  is  as  follows”.  By  definition,  ARP’s  are  sent  to  broadcast  addresses so that every device has the opportunity of responding.     LLDP (Link Layer Discovery Protocol)    A protocol used by devices to announce their presence on the network and their capabilities.  This Protocol can be used by a Profinet System to determine who is connected to who and for  automatic  assignment  of  a  device  name  to  a  device  when  a  replacement  is  added  to  the  network.     
  • 3. Profinet Frame Analysis using Wireshark    Version 1.0  ____________________________________________________________________________  ________________________________________________________________________________  www.controlspecialists.co.uk    3     PN‐DCP (Discovery and Configuration Protocol)     This is a Profinet‐specific protocol that has two main functions:    1. Used  by  the  Supervisor  (PC)  to  assign  a  unique  name  (Siemens  Primary  Setup  Tool  /  Procentec Netilities).  2. Used by the IO Controller (CPU) to assign a unique IP address (as defined in the hardware  config) in conjunction with ARP above.     PNIO‐CM (Profinet IO Context Manager)  This is a Profinet‐specific protocol that is used to configure the AR (Application Relations) and  CR  (Communication  Relations)  between  a  controller  and  an  IO  device.  This  process  will  ultimately determine the amount and type of data that will be transmitted between the pair.     There are several stages of the start‐up procedure using the Context Manager with the flow  usually being as follows:‐     CONNECT request from IO Controller followed by a CONNECT response from IO Device   WRITE request from IO Controller followed by a WRITE response from IO Device   DCONTROL request from IO Controller followed by a DCONTROL response from IO Device   CCONTROL request from IO Controller followed by a CCONTROL response from IO Device     PN‐PTCP (Precision Transparent Clock Protocol)    This is a layer 2 Profinet‐specific protocol used to ensure time synchronisation on the network.     PNIO    Profinet Data Exchange Traffic     PNIO‐AL    Profinet Alarm Events       
  • 4. Profinet Frame Analysis using Wireshark    Version 1.0  ____________________________________________________________________________  ________________________________________________________________________________  www.controlspecialists.co.uk    4    NETWORK 1      EX01  Start‐Up, Data Exchange, Loss of Module    EX01 ‐ FRAME CAPTURE     Put the CPU into STOP Mode and remove power from it.   Launch WireShark.   Select the Interface that Wireshark will capture frames from.   Start the Capturing process.   Apply power to the CPU.   After approx. 15s, put the CPU into RUN mode.   After a further 15s, remove an IO module.   Insert the module back into its slot shortly after.   Stop the capture process after approx. 30s.       
  • 5. Profinet Frame Analysis using Wireshark    Version 1.0  ____________________________________________________________________________  ________________________________________________________________________________  www.controlspecialists.co.uk    5    EX01  Start‐Up, Data Exchange, Loss of Module (Continued)    EX01 ‐ FRAME ANALYSIS     Click  on  the  “Profinet  DCP”  Filter  Expression  Button  and  observe  to  CPU  setting the IP addresses of the Profinet devices.   Click on the “ARP” Filter Expression Button and observe the CPU looking for  devices with specific IP addresses.   Click  on  the  “Profinet  CM”  Filter  Expression  Button  and  look  for  PNIO‐CM  entries that show the CONNECT – WRITE – APP READY start‐up procedure.   Click on the “Profinet Data (Good)” Filter Expression Button and look for PNIO  entries that show data exchange.   Click on the “Profinet Data (Bad)” Filter Expression Button and look for PNIO  entries that show data exchange.   Click on the “Profinet Alarms” Filter Expression Button and look for PNIO‐AL  entries that show alarm events.    EX02  Duplicate Device Name    EX02 ‐ FRAME CAPTURE     Put the CPU into STOP Mode.   Make a direct Ethernet connection from the laptop to the IM153‐3.   Use the Primary Setup Tool to rename the device to “wago‐750‐370” –  without the quotes.   Connect the IM153‐3 onto the original network.   Put the CPU into RUN Mode.   Note the status of the IM153‐3:  _______________________________________   Note the status of the WAGO 750‐370  _______________________________________   Remove power from the CPU for a few seconds and then reapply.   Wait a few seconds for the PLC to go into RUN mode.   Note the status of the IM153‐3:  _______________________________________   Note the status of the WAGO 750‐370:  _______________________________________ 
  • 6. Profinet Frame Analysis using Wireshark    Version 1.0  ____________________________________________________________________________  ________________________________________________________________________________  www.controlspecialists.co.uk    6   Launch WireShark.   Select the Interface that Wireshark will capture frames from.   Start the Capturing process.   Stop the capture process after approx. 30s.    EX02  Duplicate Device Name (Continued)  EX02 ‐ FRAME ANALYSIS       Click on the “Profinet DCP” Filter Expression Button and observe attempts by  the CPU to find the Profinet devices.    __________________________________________________________________