A demonstration of some of the tools available for performing online diagnostics on PROFINET networks using Netilities from Procentec, the BC-502-PN from Softing and the Ethernet Frame Analyser Wireshark®.
We shall be monitoring a PROFINET system made up of hardware from Siemens, Wago, Moxa, Murr. Procentec & Softing.
To gain an understanding of the way in which
PROFINET devices communicate with one
another over Ethernet.
• To learn how to capture the PROFINET
Frames using Wireshark®.
• To see how Wireshark® can be used to analyse
the captured frames to gain an understanding
of the various protocols.
• This is a topic covered in more detail in the
Certified PROFINET Engineers Course
PROFINET offers more continuity and uniform structures, more nodes and better performance, seamless integration of existing systems, and new innovative applications with continuous enhancements. It allows for increased efficiency through fast commissioning and higher plant availability.
This document provides instructions for using Wireshark to analyze Profinet communication frames. It introduces the Ethernet frame structure, common Profinet protocols like DCP and PNIO, and includes exercises to capture startup sequences, data exchange, and error conditions like a duplicate device name. The exercises guide the user to launch Wireshark, filter frames by protocol, and observe Profinet devices configuring addresses and relations and exchanging I/O data and alarms.
PROFINET is an open Industrial Ethernet standard developed by the PROFIBUS Organisation for automation and process industries. It uses Ethernet communication protocols like TCP/IP for non-real time communications and provides a real-time channel for time-critical process data communications. PROFINET supports distributed intelligence, modular and component-based design approaches and provides high performance deterministic real-time communications capabilities required for motion control and process applications. It also enables integration with existing PROFIBUS installations.
PROFIBUS - the world's most successful fieldbus. Easy, flexible, consistent.
PROFINET - the leading Industrial Ethernet Standard. Open, versatile, safe.
IO-Link - the new standard in the lower field level. Universal, smart, easy.
The document provides an overview of cost analysis, including defining costs, analyzing major cost elements in a proposal, and evaluating profit. It discusses direct vs indirect costs, acceptable cost estimating methods, and templates for breaking down costs. Key steps in cost analysis include understanding requirements, reviewing the contractor's proposal and basis of estimate, and evaluating profit using weighted guidelines or statutory limits. The purpose of cost analysis is to determine if proposed costs represent reasonable economy and efficiency.
Cost analysis is an important part of project management. It involves reviewing project costs, evaluating cost elements, and ensuring costs are reasonable and necessary. Key aspects of cost analysis include verifying cost data, analyzing cost trends, evaluating the necessity of costs, and comparing costs to actual past costs and other estimates. Clinical trials are a major cost and involve expenses for manufacturing, staff, payments to sites and researchers, and materials. Instrumentation costs depend on equipment size and material. Raw material costs are based on material balances and unit prices. Effective project cost management can help reduce stress, prioritize goals, drive efficiency, and increase accountability.
To gain an understanding of the way in which
PROFINET devices communicate with one
another over Ethernet.
• To learn how to capture the PROFINET
Frames using Wireshark®.
• To see how Wireshark® can be used to analyse
the captured frames to gain an understanding
of the various protocols.
• This is a topic covered in more detail in the
Certified PROFINET Engineers Course
PROFINET offers more continuity and uniform structures, more nodes and better performance, seamless integration of existing systems, and new innovative applications with continuous enhancements. It allows for increased efficiency through fast commissioning and higher plant availability.
This document provides instructions for using Wireshark to analyze Profinet communication frames. It introduces the Ethernet frame structure, common Profinet protocols like DCP and PNIO, and includes exercises to capture startup sequences, data exchange, and error conditions like a duplicate device name. The exercises guide the user to launch Wireshark, filter frames by protocol, and observe Profinet devices configuring addresses and relations and exchanging I/O data and alarms.
PROFINET is an open Industrial Ethernet standard developed by the PROFIBUS Organisation for automation and process industries. It uses Ethernet communication protocols like TCP/IP for non-real time communications and provides a real-time channel for time-critical process data communications. PROFINET supports distributed intelligence, modular and component-based design approaches and provides high performance deterministic real-time communications capabilities required for motion control and process applications. It also enables integration with existing PROFIBUS installations.
PROFIBUS - the world's most successful fieldbus. Easy, flexible, consistent.
PROFINET - the leading Industrial Ethernet Standard. Open, versatile, safe.
IO-Link - the new standard in the lower field level. Universal, smart, easy.
The document provides an overview of cost analysis, including defining costs, analyzing major cost elements in a proposal, and evaluating profit. It discusses direct vs indirect costs, acceptable cost estimating methods, and templates for breaking down costs. Key steps in cost analysis include understanding requirements, reviewing the contractor's proposal and basis of estimate, and evaluating profit using weighted guidelines or statutory limits. The purpose of cost analysis is to determine if proposed costs represent reasonable economy and efficiency.
Cost analysis is an important part of project management. It involves reviewing project costs, evaluating cost elements, and ensuring costs are reasonable and necessary. Key aspects of cost analysis include verifying cost data, analyzing cost trends, evaluating the necessity of costs, and comparing costs to actual past costs and other estimates. Clinical trials are a major cost and involve expenses for manufacturing, staff, payments to sites and researchers, and materials. Instrumentation costs depend on equipment size and material. Raw material costs are based on material balances and unit prices. Effective project cost management can help reduce stress, prioritize goals, drive efficiency, and increase accountability.
IO-Link Safety is a new standard that allows for functionally safe components and communication over IO-Link. It will meet the requirements of IEC 61784-3 and can be used in safety applications up to SIL3/PLe. IO-Link Safety uses FS-Masters and FS-Devices to enable safety functions over standard IO-Link infrastructure. It will be standardized internationally as IEC 61139-2. The presentation provided an overview of IO-Link Safety and its standards, as well as its integration with fieldbus systems using functional safety communication profiles.
The document discusses integrating PROFINET with Time Sensitive Networking (TSN). It covers TSN features like time synchronization, scheduled traffic, and frame preemption that enable standard Ethernet to be real-time capable. The integration defines device models for PROFINET end stations and bridges based on TSN standards. This allows PROFINET to utilize TSN's quality of service mechanisms for converged industrial networks.
The document discusses the challenges that manufacturers face with increasing use of industrial robots from different suppliers in their production lines. This includes needing specific expertise for each robot manufacturer, high engineering costs, and lack of data transparency. It introduces the Standard Robot Command Interface (SRCI) as an innovative solution to program robots through the PLC using a common language. This would allow uniform operation of robots from multiple vendors and reduce costs and errors compared to needing separate programming for each type of robot.
Richard Wilson is the Head of Operational Security at GCC. His resume outlines his experience in operational security, mitigation against physical attack vectors, emerging cyber threats to vehicles, and the UK's public sector cyber security community. Key challenges include the increasing lines of code in vehicles, lack of standards to assess cybersecurity products, and implementing recent standards like ISO/SAE 21434 for automotive cybersecurity engineering.
This document discusses OPC UA (Open Platform Communications Unified Architecture) and how it can be used with Profinet in industrial automation networks. OPC UA is an interoperability standard that allows for the secure exchange of data between devices from different vendors. It defines interfaces for browsing device data, reading and writing data values, subscribing to data changes, and calling methods on devices. When used with Profinet, OPC UA can enable vertical communication throughout the industrial automation hierarchy from sensors and controllers to cloud applications.
The document discusses Advanced Physical Layer (APL), a new Ethernet technology that enables Ethernet communication over a two-wire cable for use in hazardous industrial environments. APL will allow Profinet to extend to field devices by overcoming Ethernet's limitations of only operating up to 100 meters and not being intrinsically safe. APL uses a two-wire cable to transmit power and data that can operate over distances up to 1000 meters, meeting functional safety requirements to operate in hazardous areas where Ethernet currently cannot. This will allow Ethernet networking throughout industrial plants, including hazardous zones, enabling greater connectivity for field devices and digital transformation of process automation.
This document discusses operational technology (OT) cyber security. It begins by explaining why OT networks need security due to the merging of IT and OT networks, which has exposed OT assets to compromise. It then describes the differences between IT and OT approaches, with OT prioritizing control, availability, integrity and confidentiality over just data. Several common attack paths for OT networks are outlined, including social engineering, malware from removable devices, and internet-connected components. The document advocates for a multi-layered protection concept including security awareness training, firewalls, physical protection and network monitoring. It stresses that security should be considered from the initial design phase.
This document discusses the PA DIM (Process Automation Device Information Model) presentation. It introduces PA DIM as a standardized information model for accessing device data via OPC-UA. PA DIM is based on NAMUR requirements and reuses interfaces from the OPC UA Device Integration model. It allows mapping device information contained in packages like FDI to OPC-UA clients, providing access to signals, functions and health of devices nearly independently of the physical communication protocol. The presentation also provides an overview of common device driver types like EDD, FDT/DTM and FDI and how OPC-UA supports information modeling and both client-server and publish-subscribe communication mechanisms.
The document discusses PROFIBUS & PROFINET International (PI), an organization that supports the use of PROFIBUS and PROFINET automation technologies worldwide. PI has over 50 competence centers and training centers located across Europe, North America, Asia, and other regions. The document outlines PI's membership categories and training opportunities. It also describes PI's role in driving enabling technologies for digital transformation, including information modeling, security, and communication standards like TSN and 5G. In closing, it thanks the reader for their time.
The document outlines the agenda for a PI UK event on PROFIBUS and PROFINET. It includes presentations on topics such as the current lifecycle of PROFIBUS, the Advanced Physical Layer for PROFIBUS, the Standard Robot Command Interface, PROFINET Time Sensitive Networking, the Process Automation Device Information Model, PROFINET Cyber Security, IO-Link safety, and OPC UA. There will also be opportunities for questions and answers as well as interactions with exhibitors at table tops from companies like Siemens, Turck Banner, Phoenix Contact, HMS, and Parmley Graham. Safety information about fire alarms and toilets is also provided.
The document discusses the process of certifying a PROFINET network and diagnostics. It describes various test types including verification, qualification, and certification tests to assess the network according to standards. Cable verification ensures accurate wiring while qualification testing identifies data transmission performance. Network acceptance tests check the inventory, topology, packet loss rate, and load. Designers are responsible for port numbers, cable labels, device names, and locations. Troubleshooting examines common issues like wiring faults, interference, configuration errors, and device failures.
1) PROFINET uses switched Ethernet topology that follows the production process layout. It uses separate channels for IO data and TCP/IP to avoid needing an extra network.
2) PROFINET supports star, tree, line and ring topologies using various cable types. Topology is based on the system design.
3) Network planning tools are used to simulate network utilization for PROFINET IO data and other traffic like TCP/IP. They validate designs and identify potential overloads.
This document discusses PROFINET gateways and how they facilitate communication between PROFINET networks and other industrial networks like PROFIBUS, AS-I, IO-Link, and IIoT. It explains that gateways appear as an IO device on the PROFINET side and act as a master on the sub-network side. The document provides examples of configuration steps needed for different gateway types, such as adding their GSD/GSDML files to hardware configurations and mapping input/output channels. It also demonstrates a new PROFINET to PROFIBUS DP gateway product that allows a PROFINET controller to control PROFIBUS slaves.
This document discusses device configuration tools and the history of EDDL and FDT standards. It provides an overview of the Field Device Integration (FDI) cooperation, which aims to create a single, unified solution for device configuration that combines the advantages of EDDL and FDT. The document also includes examples of how different device types can be configured using FDI and FDT/DTM technologies.
Derek Lane presented on PROFINET for IoT, IIoT, and Industry 4.0. He discussed how PROFINET and the PROFINET of Things supports the IIoT through data access, uptime, and open standards. PROFINET provides connectivity from the enterprise level to the field level and supports data transfer through various application profiles and proxies. Security is also important for IIoT and PROFINET complies with necessary security measures. PROFINET is moving towards Industry 4.0 through technologies like TSN that enable high determinism and real-time communication over converged networks.
The document discusses Ethernet-APL, a new physical layer specification that enables Ethernet connectivity in process plants. Ethernet-APL uses a two-wire cable setup to allow Ethernet networks to extend into hazardous areas and overcome limitations of traditional Ethernet like speed and distance. It standardizes technologies like 10BASE-T1L and 2-WISE to ensure interoperability. Ethernet-APL helps digital transformation by providing a single high-speed network for all plant components and seamless data access.
For people responsible for the design, commissioning and support of PROFINET networks, explaining how to integrate existing PROFIBUS DP and PROFIBUS PA devices into that network. The webinar took the form of a presentation with demonstrations to aid understanding.
For people responsible for the commissioning and support of PROFIBUS networks. The webinar took the form of a presentation with demonstrations to aid understanding.
This webinar presentation provides information on diagnosing PROFINET networks. It discusses various diagnostic tools that can be used, including those within IO controllers, switches, and third-party hardware and software. Specific tools covered are active and passive diagnostic devices, Ethernet frame analyzers, port mirroring, and Ethernet taps. The presentation emphasizes the importance of proper network design and qualification to ensure issues can be identified and supported. Control Specialists offers various PROFINET training courses.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
More Related Content
More from PROFIBUS and PROFINET InternationaI - PI UK
IO-Link Safety is a new standard that allows for functionally safe components and communication over IO-Link. It will meet the requirements of IEC 61784-3 and can be used in safety applications up to SIL3/PLe. IO-Link Safety uses FS-Masters and FS-Devices to enable safety functions over standard IO-Link infrastructure. It will be standardized internationally as IEC 61139-2. The presentation provided an overview of IO-Link Safety and its standards, as well as its integration with fieldbus systems using functional safety communication profiles.
The document discusses integrating PROFINET with Time Sensitive Networking (TSN). It covers TSN features like time synchronization, scheduled traffic, and frame preemption that enable standard Ethernet to be real-time capable. The integration defines device models for PROFINET end stations and bridges based on TSN standards. This allows PROFINET to utilize TSN's quality of service mechanisms for converged industrial networks.
The document discusses the challenges that manufacturers face with increasing use of industrial robots from different suppliers in their production lines. This includes needing specific expertise for each robot manufacturer, high engineering costs, and lack of data transparency. It introduces the Standard Robot Command Interface (SRCI) as an innovative solution to program robots through the PLC using a common language. This would allow uniform operation of robots from multiple vendors and reduce costs and errors compared to needing separate programming for each type of robot.
Richard Wilson is the Head of Operational Security at GCC. His resume outlines his experience in operational security, mitigation against physical attack vectors, emerging cyber threats to vehicles, and the UK's public sector cyber security community. Key challenges include the increasing lines of code in vehicles, lack of standards to assess cybersecurity products, and implementing recent standards like ISO/SAE 21434 for automotive cybersecurity engineering.
This document discusses OPC UA (Open Platform Communications Unified Architecture) and how it can be used with Profinet in industrial automation networks. OPC UA is an interoperability standard that allows for the secure exchange of data between devices from different vendors. It defines interfaces for browsing device data, reading and writing data values, subscribing to data changes, and calling methods on devices. When used with Profinet, OPC UA can enable vertical communication throughout the industrial automation hierarchy from sensors and controllers to cloud applications.
The document discusses Advanced Physical Layer (APL), a new Ethernet technology that enables Ethernet communication over a two-wire cable for use in hazardous industrial environments. APL will allow Profinet to extend to field devices by overcoming Ethernet's limitations of only operating up to 100 meters and not being intrinsically safe. APL uses a two-wire cable to transmit power and data that can operate over distances up to 1000 meters, meeting functional safety requirements to operate in hazardous areas where Ethernet currently cannot. This will allow Ethernet networking throughout industrial plants, including hazardous zones, enabling greater connectivity for field devices and digital transformation of process automation.
This document discusses operational technology (OT) cyber security. It begins by explaining why OT networks need security due to the merging of IT and OT networks, which has exposed OT assets to compromise. It then describes the differences between IT and OT approaches, with OT prioritizing control, availability, integrity and confidentiality over just data. Several common attack paths for OT networks are outlined, including social engineering, malware from removable devices, and internet-connected components. The document advocates for a multi-layered protection concept including security awareness training, firewalls, physical protection and network monitoring. It stresses that security should be considered from the initial design phase.
This document discusses the PA DIM (Process Automation Device Information Model) presentation. It introduces PA DIM as a standardized information model for accessing device data via OPC-UA. PA DIM is based on NAMUR requirements and reuses interfaces from the OPC UA Device Integration model. It allows mapping device information contained in packages like FDI to OPC-UA clients, providing access to signals, functions and health of devices nearly independently of the physical communication protocol. The presentation also provides an overview of common device driver types like EDD, FDT/DTM and FDI and how OPC-UA supports information modeling and both client-server and publish-subscribe communication mechanisms.
The document discusses PROFIBUS & PROFINET International (PI), an organization that supports the use of PROFIBUS and PROFINET automation technologies worldwide. PI has over 50 competence centers and training centers located across Europe, North America, Asia, and other regions. The document outlines PI's membership categories and training opportunities. It also describes PI's role in driving enabling technologies for digital transformation, including information modeling, security, and communication standards like TSN and 5G. In closing, it thanks the reader for their time.
The document outlines the agenda for a PI UK event on PROFIBUS and PROFINET. It includes presentations on topics such as the current lifecycle of PROFIBUS, the Advanced Physical Layer for PROFIBUS, the Standard Robot Command Interface, PROFINET Time Sensitive Networking, the Process Automation Device Information Model, PROFINET Cyber Security, IO-Link safety, and OPC UA. There will also be opportunities for questions and answers as well as interactions with exhibitors at table tops from companies like Siemens, Turck Banner, Phoenix Contact, HMS, and Parmley Graham. Safety information about fire alarms and toilets is also provided.
The document discusses the process of certifying a PROFINET network and diagnostics. It describes various test types including verification, qualification, and certification tests to assess the network according to standards. Cable verification ensures accurate wiring while qualification testing identifies data transmission performance. Network acceptance tests check the inventory, topology, packet loss rate, and load. Designers are responsible for port numbers, cable labels, device names, and locations. Troubleshooting examines common issues like wiring faults, interference, configuration errors, and device failures.
1) PROFINET uses switched Ethernet topology that follows the production process layout. It uses separate channels for IO data and TCP/IP to avoid needing an extra network.
2) PROFINET supports star, tree, line and ring topologies using various cable types. Topology is based on the system design.
3) Network planning tools are used to simulate network utilization for PROFINET IO data and other traffic like TCP/IP. They validate designs and identify potential overloads.
This document discusses PROFINET gateways and how they facilitate communication between PROFINET networks and other industrial networks like PROFIBUS, AS-I, IO-Link, and IIoT. It explains that gateways appear as an IO device on the PROFINET side and act as a master on the sub-network side. The document provides examples of configuration steps needed for different gateway types, such as adding their GSD/GSDML files to hardware configurations and mapping input/output channels. It also demonstrates a new PROFINET to PROFIBUS DP gateway product that allows a PROFINET controller to control PROFIBUS slaves.
This document discusses device configuration tools and the history of EDDL and FDT standards. It provides an overview of the Field Device Integration (FDI) cooperation, which aims to create a single, unified solution for device configuration that combines the advantages of EDDL and FDT. The document also includes examples of how different device types can be configured using FDI and FDT/DTM technologies.
Derek Lane presented on PROFINET for IoT, IIoT, and Industry 4.0. He discussed how PROFINET and the PROFINET of Things supports the IIoT through data access, uptime, and open standards. PROFINET provides connectivity from the enterprise level to the field level and supports data transfer through various application profiles and proxies. Security is also important for IIoT and PROFINET complies with necessary security measures. PROFINET is moving towards Industry 4.0 through technologies like TSN that enable high determinism and real-time communication over converged networks.
The document discusses Ethernet-APL, a new physical layer specification that enables Ethernet connectivity in process plants. Ethernet-APL uses a two-wire cable setup to allow Ethernet networks to extend into hazardous areas and overcome limitations of traditional Ethernet like speed and distance. It standardizes technologies like 10BASE-T1L and 2-WISE to ensure interoperability. Ethernet-APL helps digital transformation by providing a single high-speed network for all plant components and seamless data access.
For people responsible for the design, commissioning and support of PROFINET networks, explaining how to integrate existing PROFIBUS DP and PROFIBUS PA devices into that network. The webinar took the form of a presentation with demonstrations to aid understanding.
For people responsible for the commissioning and support of PROFIBUS networks. The webinar took the form of a presentation with demonstrations to aid understanding.
This webinar presentation provides information on diagnosing PROFINET networks. It discusses various diagnostic tools that can be used, including those within IO controllers, switches, and third-party hardware and software. Specific tools covered are active and passive diagnostic devices, Ethernet frame analyzers, port mirroring, and Ethernet taps. The presentation emphasizes the importance of proper network design and qualification to ensure issues can be identified and supported. Control Specialists offers various PROFINET training courses.
More from PROFIBUS and PROFINET InternationaI - PI UK (20)
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Large Language Model (LLM) and it’s Geospatial Applications
PROFINET frame analysis and diagnostic tools - Peter Thomas
1. PROFINET Frame
Analysis &
Diagnostic Tools
Peter Thomas
Control Specialists Ltd
www.controlspecialists.co.uk
Copyright Control Specialists - PROFINET Frame Analysis and Diagnostic Tools - Apr 2014
2. 2
Objectives
• A demonstration of some of the tools available
for performing online diagnostics on
PROFINET networks using Netilities from
Procentec, the BC-502-PN from Softing, the
Ethernet Frame Analyser Wireshark® and
PRONETA from Siemens.
• We shall be monitoring a PROFINET system
made up of hardware from Siemens, Wago,
Moxa, Murr. Procentec & Softing.
www.controlspecialists.co.ukCopyright Control Specialists - PROFINET Frame Analysis and Diagnostic Tools - Apr 2014
5. Device to Device Communication (PROFINET)
5
IO Controller IO Device
STANDARD
PRESENTATION
LAYER
SESSION LAYER
TRANSPORT
LAYER
(UDP)
NETWORK
LAYER
(IP ADDRESS)
DATALINK LAYER
(MAC ADDRESS)
PHYSICAL LAYER
REAL TIME STANDARD
PRESENTATION
LAYER
SESSION LAYER
TRANSPORT
LAYER
(UDP)
NETWORK
LAYER
(IP ADDRESS)
DATALINK LAYER
(MAC ADDRESS)
PHYSICAL LAYER
REAL TIME
www.controlspecialists.co.ukCopyright Control Specialists - PROFINET Frame Analysis and Diagnostic Tools - Apr 2014
6. Ethernet Switches
• PROFINET networks make extensive
use of switches.
• Simply plugging in a monitoring tool into
a spare port on the switch will not work
because switches only send messages to
the port to which the intended receiving
device is connected.
• To overcome this we set up one port as
a mirrored port (usually a feature of
managed switches).
• Make sure the mirrored port is bi-
directional.
www.controlspecialists.co.ukCopyright Control Specialists - PROFINET Frame Analysis and Diagnostic Tools - Apr 2014
7. 7
SETTING UP A MIRRORED PORT
www.controlspecialists.co.ukCopyright Control Specialists - PROFINET Frame Analysis and Diagnostic Tools - Apr 2014
8. Monitoring Ports
• Choosing which port to monitor is very important.
• If the switch you are monitoring has only one
outgoing connection to the IO Devices (Switch A)
then set the mirror port to monitor the outgoing
port.
IO Controller Switch A Switch B
Set Mirror port to Monitor this
port
www.controlspecialists.co.ukCopyright Control Specialists - PROFINET Frame Analysis and Diagnostic Tools - Apr 2014
9. Monitoring Ports
• If the switch you are monitoring has several IO
Devices, each connected to a port of its own, (Switch
B) then set the mirror port to monitor the port that
connects the switch to the IO Controller.
• If the diagnostic tool you are using needs to send out
DCP_IDENT requests then you will need a second
connection to a spare (non-mirrored) port on your
switch.
IO Controller Switch A Switch B
Set Mirror port to
Monitor this port
Set up a second
connection to a
spare port
www.controlspecialists.co.ukCopyright Control Specialists - PROFINET Frame Analysis and Diagnostic Tools - Apr 2014
10. Diagnostic Monitoring using a Managed Switch
WAGO 750-340
RACK03DEV1
192.168.0.31
00-0E-8C-9B-94-BD
SIEMENS ET200S
RACK03DEV2
192.168.0.32
00-1B-1B-25-B7-1D
MURR IMPACT20
RACK03DEV3
192.168.0.33
00-0F-9E-08-7F-DE
MOXA ETS-505
5-PORT
SWITCH
00-90-E8-0C-B6-29
SIEMENS
X208 8-PORT
SWITCH
192.168.0.1 (WEB)
00-0E-8C-9B-94-BD
SIEMENS
CP315-2 DPPN CPU
MASTERRACKCPU
192.168.0.2
00-0E-8C-FE-75-E2
See previous slides regarding
which port to mirror and
whether or not you need two
cables.
11. 11
PROFINET & TAPS
www.controlspecialists.co.ukCopyright Control Specialists - PROFINET Frame Analysis and Diagnostic Tools - Apr 2014
IN OUT
USB
• If you do not have a switch that supports
port mirroring, an alternative is to use a
TAP.
• Taps have two RJ45 ports and are
connected in series with the device(s) that
you want to monitor.
• The PC connects to the Tap via a USB
interface.
• By definition, the installing of a tap
requires you to disrupt the network when
installing it.
• Note – This is NOT a bi-directional device
- i.e. it is only a listener.
12. Diagnostic Monitoring using a PROFINET Tap
WAGO 750-340
RACK03DEV1
192.168.0.31
00-0E-8C-9B-94-BD
SIEMENS ET200S
RACK03DEV2
192.168.0.32
00-1B-1B-25-B7-1D
MURR IMPACT20
RACK03DEV3
192.168.0.33
00-0F-9E-08-7F-DE
MOXA ETS-505
5-PORT
SWITCH
00-90-E8-0C-B6-29
SIEMENS
X208 8-PORT
SWITCH
192.168.0.1 (WEB)
00-0E-8C-9B-94-BD
SIEMENS
CP315-2 DPPN CPU
MASTERRACKCPU
192.168.0.2
00-0E-8C-FE-75-E2
USB
The blue/dashed cable is connected to
a spare port to allow DCP_IDENT
requests to reach the IO Devices.
Copyright Control Specialists - PROFINET Frame Analysis and Diagnostic Tools - Apr 2014
13. WAGO 750-340
RACK03DEV1
192.168.0.31
00-0E-8C-9B-94-BD
SIEMENS ET200S
RACK03DEV2
192.168.0.32
00-1B-1B-25-B7-1D
MURR IMPACT20
RACK03DEV3
192.168.0.33
00-0F-9E-08-7F-DE
MOXA ETS-505
5-PORT
SWITCH
00-90-E8-0C-B6-29
SIEMENS
X208 8-PORT
SWITCH
192.168.0.1 (WEB)
00-0E-8C-9B-94-BD
SIEMENS
CP315-2 DPPN CPU
MASTERRACKCPU
192.168.0.2
00-0E-8C-FE-75-E2
Connection to web
server
MONITORING
DEVICE
24v Supply
Permanent Monitoring
Copyright Control Specialists - PROFINET Frame Analysis and Diagnostic Tools - Apr 2014
15. 15
Netilities
www.controlspecialists.co.ukCopyright Control Specialists - PROFINET Frame Analysis and Diagnostic Tools - Apr 2014
Netilities is a pc-based engineering tool for monitoring the
status of a PROFINET network. It has features similar to the
PROFIBUS analyser ProfiTrace such as Live List, Bargraph,
Statistics and Report Generation.
18. 18
BC502-PN
www.controlspecialists.co.ukCopyright Control Specialists - PROFINET Frame Analysis and Diagnostic Tools - Apr 2014
The BC502-PN is a hardware-based PROFINET monitor
designed for permanent connection to the PROFINET network.
The diagnostics are then presented in real time via an in-built
web server. It has the advantage of not requiring a mirrored
port to connect to the network.
21. 21
Wireshark®
• Wireshark® is a network protocol analyser.
It lets you capture and interactively browse
the traffic running on a computer network.
• It is not dedicated to PROFINET and as
such cannot be compared to ProfiTrace.
• It is free to download and available from
www.wireshark.org
www.controlspecialists.co.ukCopyright Control Specialists - PROFINET Frame Analysis and Diagnostic Tools - Apr 2014
23. 23
Wireshark®
• Wireshark® can be used to capture and
analyse PROFINET traffic during the
following events:-
– Start-Up
– Data Exchange
– Loss of Module
– Loss of Communications
– Duplicate Device Name
www.controlspecialists.co.ukCopyright Control Specialists - PROFINET Frame Analysis and Diagnostic Tools - Apr 2014
24. 24
Siemens – Hardware Configuration
www.controlspecialists.co.ukCopyright Control Specialists - PROFINET Frame Analysis and Diagnostic Tools - Apr 2014
25. 25
IEEE 802.3 EtherNet Frame
40 – 1500 BYTES
DATA
SOURCE
MAC
6 BYTES
DEST
MAC
ETHER
TYPE
FRAME
CHECK
SEQ
ETHER TYPE EXAMPLES
0800: Internet Protocol (IPV4)
0806: ARP
8892: PROFINET
88CC: LLDP
Format / Contents dependent
upon the value of the
ETHER TYPE
ETHERNET HEADER ETHERNET TRAILER
Note – VLAN Tags (Bandwidth Control / Prioritisation),
IFG (Inter Frame Gap), Preamble and
SFD (Start Frame Delimiter) bytes not shown.
ETHERNET FRAME
6 BYTES 2 BYTES 4 BYTES
www.controlspecialists.co.ukCopyright Control Specialists - PROFINET Frame Analysis and Diagnostic Tools - Apr 2014
26. 26
PROFINET Frame
SOURCE ADDRESS DESTINATION ADDRESS ETHERTYPE
PROFINET IO DATA CYCLE COUNTER DATA STATUS
FRAME ID
TXFR STATUS
ETHERTYPE 8892 = PROFINET, FRAME ID 8000 = REAL TIME CLASS 2
-- APPLICATION PROTOCOL DATA UNIT STATUS --
www.controlspecialists.co.ukCopyright Control Specialists - PROFINET Frame Analysis and Diagnostic Tools - Apr 2014
27. 27
PROFINET Frame (CPU to OUTPUTS)
SLOT 1
SLOT 2
SLOT 3
SLOT 4
IOPS SLOT 3/4
DIG OUT DATA
DAP
DAP = DEVICE ACCESS POINT (IO DEVICE STATUS) 00 = BAD, 80 = GOOD
IOPS = IO PROVIDER STATUS (DATA STATUS @ CPU) 00 = BAD, 80 = GOOD
www.controlspecialists.co.ukCopyright Control Specialists - PROFINET Frame Analysis and Diagnostic Tools - Apr 2014
28. 28
Common Protocols seen on PROFINET
• PNIO-DCP – Device Name / IP Address Assignment
• PNIO-CM – Start-up Services between an IO
Controller and each IO Device.
• PNIO – Cyclic IO Data Exchange
• PN-PTCP – Time Syncronisation
• PNIO-AL – Acyclic Alarms / Events
• ARP – IP Address – MAC Address Lookup
• LLDP – Device Identity & Properties.
www.controlspecialists.co.ukCopyright Control Specialists - PROFINET Frame Analysis and Diagnostic Tools - Apr 2014
31. 31
Protocol Usage: Start-up to Data Exchange
Assign Device Name *
PNIO-DCP
/ ARP Assign IP Address
Establish Connection
PNIO-DCP
or LLDP
PNIO-CM
PNIO Cyclic Data Exchange
IO Device confirms Name SET
IO Device confirms IP Address SET
Connection Established
* DEVICE NAME ASSIGNMENT
Device Names can be set up Manually,
During configuration (or device replacement)
or Automatically on power-up.
Manual name assignment - Tools such as
Proneta from Siemens or Netilities from
Procentec provide this facility. Manual name
assignment uses PNIO-DCP (Discovery &
Control Protocol).
Automatic name assignment uses the
LLDP (Link Layer Discover Protocol) and
PNIO-DCP and requires the use of a
PROFINET Topology Configuration Tool.
www.controlspecialists.co.ukCopyright Control Specialists - PROFINET Frame Analysis and Diagnostic Tools - Apr 2014
Determine MAC Address