To gain an understanding of the way in which
PROFINET devices communicate with one
another over Ethernet.
• To learn how to capture the PROFINET
Frames using Wireshark®.
• To see how Wireshark® can be used to analyse
the captured frames to gain an understanding
of the various protocols.
• This is a topic covered in more detail in the
Certified PROFINET Engineers Course
Profinet is one of “Industrial Ethernet” protocols. It is the most popular automation networking solution currently. PROFINET can be fully operational on a single network cable alongside other Industrial Ethernet’s including EtherNet/IP and Modbus/TCP.
ICP DAS USA provides a variety of Profinet gateways for data communication between Profinet and other protocols as well as Profinet I/O modules for your data acquisition and automation needs.
In this Free Webinar You Will Learn About
Introduction to Profinet
Profinet Components
Interfacing with Profinet
Profinet Gateways
I/O Addressing
Profinet with SCADA Software and OPC server
Learn more: www.icpdas-usa.com?r=slideshare
Overview of PROFIBUS and PROFINET family.
Technology and applications.
A look at who needs access to the data in our control
system and how this is achieved.
A description of “Device Profiles”. Why these are
important and how they simplify life for the user.
PROFINET what it is, what it isn't and some myths.
Quick look at the support and training that are
available
To gain an understanding of the way in which
PROFINET devices communicate with one
another over Ethernet.
• To learn how to capture the PROFINET
Frames using Wireshark®.
• To see how Wireshark® can be used to analyse
the captured frames to gain an understanding
of the various protocols.
• This is a topic covered in more detail in the
Certified PROFINET Engineers Course
Profinet is one of “Industrial Ethernet” protocols. It is the most popular automation networking solution currently. PROFINET can be fully operational on a single network cable alongside other Industrial Ethernet’s including EtherNet/IP and Modbus/TCP.
ICP DAS USA provides a variety of Profinet gateways for data communication between Profinet and other protocols as well as Profinet I/O modules for your data acquisition and automation needs.
In this Free Webinar You Will Learn About
Introduction to Profinet
Profinet Components
Interfacing with Profinet
Profinet Gateways
I/O Addressing
Profinet with SCADA Software and OPC server
Learn more: www.icpdas-usa.com?r=slideshare
Overview of PROFIBUS and PROFINET family.
Technology and applications.
A look at who needs access to the data in our control
system and how this is achieved.
A description of “Device Profiles”. Why these are
important and how they simplify life for the user.
PROFINET what it is, what it isn't and some myths.
Quick look at the support and training that are
available
Learn the capabilities and features of EtherNet/IP, including
an overview of networking technology and terminology.
Learn how the Common Industrial Protocol (CIP) fully uses the
Open Systems Interconnection (OSI) reference model and the
value of supporting standard Ethernet and Internet Protocol (IP)
network technology.
Introduction to SOC Verification Fundamentals and System Verilog language coding. Explains concepts on Functional Verification methodologies used in industry like OVM, UVM
EtherCAT - Ethernet for Control Automation Technology - is an Ethernet-based fieldbus system, invented by Beckhoff Automation. The protocol is standardized in IEC 61158 and is suitable for both hard and soft real-time requirements in automation technology. EtherCAT is a highly flexible Ethernet network protocol that is developing at a rapid rate and growing at an even faster clip. A unique principle called “processing on the fly” gives EtherCAT a handful of unique advantages. Because EtherCAT messages are passed before being processed in each node, EtherCAT operates at a high speed and efficiency. The process also creates flexibility in topology and incredible synchronization. Outside of the advantages gained from “processing on the fly,” EtherCAT benefits from superb infrastructure. EtherCAT includes, among other things, a safety protocol and multiple device profiles. EtherCAT also benefits from a strong users group. The combination of benefits means EtherCAT is poised for continued growth.
10. In order to meet customers’ needs for EtherCATdevices, we provide a variety of EtherCAT I/O devices. The ECAT-2000 is equipped with the EtherCAT protocol and installed by daisy chain connection which permits the flexibility in devices installation and reduces infrastructure and operation costs. All the modules can be deployed in the network topologies such as star, line or ring. The isolation input and output design protects the ECAT-2000 against the harmful interference and environment.
Learn more: www.icpdas-usa.com?r=slideshare
PROFINET is a member of a family providing industrial communications over Ethernet.
PROFINET is:
completely standard Ethernet (IEEE802.3).
High speed, operating at 100Mbit/s or faster over copper or fibre-optic cables,
makes use of existing IT standards. But, is “real-time” and deterministic,
PROFINET is very well thought out to incorporate all the requirements of automation and control systems.
PROFINET is totally compatible with PROFIBUS but is NOT PROFIBUS over Ethernet.
PROFINET wiring is quite different to PROFIBUS
PROFIBUS:
Uses multi-drop segments with many devices on one cable. Segments are separated by repeaters.
Two-core screened twisted pair cable.
Termination is in the hands of the user – many problems arise because of this.
PROFINET :
Multi-drop connection is not used; all cables connect just two devices together. Switches are used for branching to devices.
Four-core screened twisted pair cable.
Termination is provided within every Ethernet device; no longer in the hands of the user – should eliminate termination problems.
PROFINET – Commissioning Guideline
This is one of several free-to-download guidelines documents from PNO (PROFIBUS and PROFINET User Organisation).
It provides guidance on how to verify the installation aspects of the network as well as how to commission the live system.
These tests are additional to the application-specific, System Acceptance Testing that would usually be performed.
Failure to follow these guidelines puts you at risk of having your application tests pass without a detailed knowledge of the underlying performance of your network
Overview of Spanning Tree Protocol (STP & RSTP)Peter R. Egli
Ethernet networks require a loop-free topology, otherwise more and more broadcastand unknown unicast frames would swamp the network (creation of frame duplicates resulting in a broadcast storm). Spanning Tree Protocol (IEEE 802.1D) and its faster successor RSTP (IEEE 802.1w) provide loop prevention in bridged networks by establising a loop-free tree of forwarding paths between any two bridges in a network with multiple physical paths. If a link fails, STP and RSTP automatically establishes a new loop-free topology. This presentation describes in detail how STP and RSTP work along with typical examples.
A discussion on regulatory agencies that monitor and implement electronic communication system laws and guidelines focusing on the Philippine setting. It briefly covers enabling laws relevant to the subject.
SCSI Express is the robust and proven SCSI protocol combined with PCIe that creates an industry-standard path to PCIe-based storage. SCSI Express combined with SAS-based solutions provides unprecedented performance and low latency that enterprises demand.
PROFIBUS - the world's most successful fieldbus. Easy, flexible, consistent.
PROFINET - the leading Industrial Ethernet Standard. Open, versatile, safe.
IO-Link - the new standard in the lower field level. Universal, smart, easy.
Learn the capabilities and features of EtherNet/IP, including
an overview of networking technology and terminology.
Learn how the Common Industrial Protocol (CIP) fully uses the
Open Systems Interconnection (OSI) reference model and the
value of supporting standard Ethernet and Internet Protocol (IP)
network technology.
Introduction to SOC Verification Fundamentals and System Verilog language coding. Explains concepts on Functional Verification methodologies used in industry like OVM, UVM
EtherCAT - Ethernet for Control Automation Technology - is an Ethernet-based fieldbus system, invented by Beckhoff Automation. The protocol is standardized in IEC 61158 and is suitable for both hard and soft real-time requirements in automation technology. EtherCAT is a highly flexible Ethernet network protocol that is developing at a rapid rate and growing at an even faster clip. A unique principle called “processing on the fly” gives EtherCAT a handful of unique advantages. Because EtherCAT messages are passed before being processed in each node, EtherCAT operates at a high speed and efficiency. The process also creates flexibility in topology and incredible synchronization. Outside of the advantages gained from “processing on the fly,” EtherCAT benefits from superb infrastructure. EtherCAT includes, among other things, a safety protocol and multiple device profiles. EtherCAT also benefits from a strong users group. The combination of benefits means EtherCAT is poised for continued growth.
10. In order to meet customers’ needs for EtherCATdevices, we provide a variety of EtherCAT I/O devices. The ECAT-2000 is equipped with the EtherCAT protocol and installed by daisy chain connection which permits the flexibility in devices installation and reduces infrastructure and operation costs. All the modules can be deployed in the network topologies such as star, line or ring. The isolation input and output design protects the ECAT-2000 against the harmful interference and environment.
Learn more: www.icpdas-usa.com?r=slideshare
PROFINET is a member of a family providing industrial communications over Ethernet.
PROFINET is:
completely standard Ethernet (IEEE802.3).
High speed, operating at 100Mbit/s or faster over copper or fibre-optic cables,
makes use of existing IT standards. But, is “real-time” and deterministic,
PROFINET is very well thought out to incorporate all the requirements of automation and control systems.
PROFINET is totally compatible with PROFIBUS but is NOT PROFIBUS over Ethernet.
PROFINET wiring is quite different to PROFIBUS
PROFIBUS:
Uses multi-drop segments with many devices on one cable. Segments are separated by repeaters.
Two-core screened twisted pair cable.
Termination is in the hands of the user – many problems arise because of this.
PROFINET :
Multi-drop connection is not used; all cables connect just two devices together. Switches are used for branching to devices.
Four-core screened twisted pair cable.
Termination is provided within every Ethernet device; no longer in the hands of the user – should eliminate termination problems.
PROFINET – Commissioning Guideline
This is one of several free-to-download guidelines documents from PNO (PROFIBUS and PROFINET User Organisation).
It provides guidance on how to verify the installation aspects of the network as well as how to commission the live system.
These tests are additional to the application-specific, System Acceptance Testing that would usually be performed.
Failure to follow these guidelines puts you at risk of having your application tests pass without a detailed knowledge of the underlying performance of your network
Overview of Spanning Tree Protocol (STP & RSTP)Peter R. Egli
Ethernet networks require a loop-free topology, otherwise more and more broadcastand unknown unicast frames would swamp the network (creation of frame duplicates resulting in a broadcast storm). Spanning Tree Protocol (IEEE 802.1D) and its faster successor RSTP (IEEE 802.1w) provide loop prevention in bridged networks by establising a loop-free tree of forwarding paths between any two bridges in a network with multiple physical paths. If a link fails, STP and RSTP automatically establishes a new loop-free topology. This presentation describes in detail how STP and RSTP work along with typical examples.
A discussion on regulatory agencies that monitor and implement electronic communication system laws and guidelines focusing on the Philippine setting. It briefly covers enabling laws relevant to the subject.
SCSI Express is the robust and proven SCSI protocol combined with PCIe that creates an industry-standard path to PCIe-based storage. SCSI Express combined with SAS-based solutions provides unprecedented performance and low latency that enterprises demand.
PROFIBUS - the world's most successful fieldbus. Easy, flexible, consistent.
PROFINET - the leading Industrial Ethernet Standard. Open, versatile, safe.
IO-Link - the new standard in the lower field level. Universal, smart, easy.
System designers and project managers look at the project
procurement, installation and deployment costs when they
price a project.
However, the costs of an automation system spread over the
life cycle of the plant and should include maintenance, faultfinding and health-checking.
Perhaps most important is the cost in terms of loss of
production should faults develop during the lifetime of the
plant. Spending a little more at procurement time can repay
many times over.
Good fault tolerant design need not be more expensive.
Sometimes fault tolerance can be achieved with just a little
thought at no additional cost.
WIMES & Lightning Protection. Overview and application of Water Industry standards and lightning Protection involving PROFIBUS - David Bray, United Utilities
Small Scale PROFIBUS PA. Application story of a customer who has switched from Ex HART to IS PROFIBUS PA utilizing a multi-vendor solution - James Powell, Siemens Process, Canada
PROFIBUS DP essentials
Typical faults which may occur
Important preparations for fault-finding
Tools and expertise needed to tackle problems
Expected PROFIBUS network quality / performance
Examples of typical analyser screen images
Preventive maintenance
What to do when the fault alarm rings!
Commissioning issues
Use test Master in place of operational PLC
Check cable connections & waveforms
Confirm slave address settings
Get slaves into data exchange : run test data
Connect PLC and confirm overall performance
What is PROFIsafe and how does it work? What do we mean by “Safety”?
“The condition of being safe; freedom from danger, risk, or injury.”
In the UK (and Europe) this can cover many areas and industries, for example:
Supply of Machinery (Safety) Regulations
Electromagnetic Compatibility Regulations
Electrical Equipment (Safety) Regulations
Pressure Equipment Regulations
Simple Pressure Vessels (Safety) Regulations
Equipment and Protective Systems Intended for Use in Potentially
Explosive Atmospheres Regulations
Lifts Regulations
Medical Devices Regulations
Gas Appliances (Safety) Regulations
Therefore:
Coexistence of standard and failsafe communication
Presentation materials from a practical workshop on PROFIBUS device configuration and PLUGFEST. An opportunity for suppliers to bring along their PROFIBUS device and incorporate it into a working system
Founded in 1997 by President and CEO Alastair Hartrup, Network Critical is a UK-based company that has grown into a global leader, developing premier network access solutions for the enterprise security and network management marketplace. A channel-friendly company, Network Critical operations continue to grow world-wide, with new offices in Buffalo, New York and Amsterdam, The Netherlands. Network Critical provides proper enterprise access wherever monitoring is critical—maximizing the value of customer monitoring investments, and giving customers the assurance that traffic is always seen and always available.
In computing, a firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on a rule set. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted.
Presented @ ISA Safety & Security Symposium 2012
Aneheim, CA, April 2012
Wireshark is the de facto network packet analysis tool used in the industry today. It is an easily extensible open–source tool that provides a large number of capabilities for users. It’s not just for IT–based protocols either. Many industrial protocols have created packet decoders for Wireshark. This tutorial will provide the user with:
* An introduction to protocol layering
* A basic overview of packet capture and analysis
* A demonstration of how Wireshark can be used for packet capture and analysis
* Examples of some industrial protocol in Wireshark
* An explanation of some more advanced features available in Wireshark
This gives an overall idea about wireshark design and how to capture packets using wireshark, tcpdump and tshark. It also covers basics behind measuring network performance and tools to use such as bmon and iperf.
Network analysis Using Wireshark 4: Capture FiltersYoram Orzach
• By the end of this lesson, the participant will be able to:
▫ Understand basic capture filters
▫ Perform basic capture filtering
Used to define which packets are going to be captured (be
careful!!!)
What are Capture Filters
• Wireshark uses the libpcap filter language for capture filters
[old] Network Performance Monitoring for DevOps and ITSite24x7
Take a look at our updated Network Monitoring presentation in the link given below:
https://www.slideshare.net/Site24x7/network-final
Get comprehensive performance insights by monitoring critical network devices such as routers, switches and firewalls with Site24x7.
About Site24x7:
Site24x7 offers unified cloud monitoring for DevOps and IT operations. Monitor the experience of real users accessing websites and applications from desktop and mobile devices. In-depth monitoring capabilities enable DevOps teams to monitor and troubleshoot applications, servers and network infrastructure including private and public clouds. End user experience monitoring is done from 50+ locations across the world and various wireless carriers. For more information on Site24x7, please visit http://www.site24x7.com/.
Forums: https://forums.site24x7.com/
Facebook: http://www.facebook.com/Site24x7
Twitter: http://twitter.com/site24x7
Google+: https://plus.google.com/+Site24x7
LinkedIn: https://www.linkedin.com/company/site...
View Blogs: http://blogs.site24x7.com/
Iben from Spirent talks at the SDN World Congress about the importance of and...Iben Rodriguez
@Iben Rodriguez from @Spirent talks at the SDN World Congress about the importance of and issues with NFV VNF and SDN Testing in the cloud.
#Layer123 Dusseldorf Germany 20141016
Like its predecessor PROFIBUS, PROFINET is a diagnostic-rich protocol allowing your support team to quickly identify the source of device-related problems. This however is of limited use if the underlying performance of your network is poor. PROFINET networks are often seen as the plug and play solution for industrial networks, giving you the impression that successful completion of your application-specific testing is a guarantee that your network is working efficiently and without errors. This is fundamentally wrong and needs to be considered at the design stage as well as the acceptance stage of a project. This presentation will discuss the issues, how to address them and give typical examples of the equipment required.
Similar to W4 profinet frame analysis, peter thomas (20)
For people responsible for the design, commissioning and support of PROFINET networks, explaining how to integrate existing PROFIBUS DP and PROFIBUS PA devices into that network. The webinar took the form of a presentation with demonstrations to aid understanding.
For people responsible for the commissioning and support of PROFIBUS networks. The webinar took the form of a presentation with demonstrations to aid understanding.
This 40-minute long webinar follows on from the PROFINET Network Design Webinar but is this time intended for people responsible for the commissioning and support of PROFINET networks. The webinar took the form of a presentation with demonstrations to aid understanding.
More from PROFIBUS and PROFINET InternationaI - PI UK (20)
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
1. An Introduction to
PROFINET Frame
Analysis using
Peter Thomas
Control Specialists Ltd
www.controlspecialists.co.uk
An Introduction to Profinet Frame Analysis using Wireshark – V1.0 (07/05/2013)
2. 2
Objectives
• To gain an understanding of the way in
which PROFINET devices communicate
with one another over Ethernet.
• To learn how to capture the PROFINET
Frames using Wireshark®.
• To analyse the captured frames to gain an
understanding and purpose of the various
protocols.
• This is a topic covered in more detail in
the Certified Profinet Engineers Course
An Introduction to Profinet Frame Analysis using Wireshark – V1.0 www.controlspecialists.co.uk
3. 3
What is Wireshark?
• Wireshark® is a network protocol
analyser. It lets you capture and
interactively browse the traffic running on
a computer network.
• It is not dedicated to Proifinet and as such
cannot be compared to ProfiTrace.
• It is free to download and available from
www.wireshark.org
An Introduction to Profinet Frame Analysis using Wireshark – V1.0 www.controlspecialists.co.uk
4. 4
Frame Capturing – Mirrored Ports
Switch A – Port 2
(IM153-3 & WAGO)
Switch B – Port 2
(IM153-3 ONLY)
LAN LAN
An Introduction to Profinet Frame Analysis using Wireshark – V1.0 www.controlspecialists.co.uk
5. 5
Frame Capturing – ProfiTap
USBX
An Introduction to Profinet Frame Analysis using Wireshark – V1.0 www.controlspecialists.co.uk
6. 6
Frame Capturing Ports
An Introduction to Profinet Frame Analysis using Wireshark – V1.0 www.controlspecialists.co.uk
7. 7
Scope of this workshop
• Wireshark® will be used to capture and analyse
Profinet traffic during the following events:-
– Start-Up
– Data Exchange
– Loss of Module
– Loss of Communications
– Duplicate Device Name
An Introduction to Profinet Frame Analysis using Wireshark – V1.0 www.controlspecialists.co.uk
8. 8
Equipment used in this workshop
• Siemens S7 PLC Hardware & Switches.
• Wago IO
• ProfiTap & Netilities from Procentec
• Wireshark® Network Protocol Analyser.
An Introduction to Profinet Frame Analysis using Wireshark – V1.0 www.controlspecialists.co.uk
9. 9
WIRESHARK - HomePage
An Introduction to Profinet Frame Analysis using Wireshark – V1.0 www.controlspecialists.co.uk
10. 10
WIRESHARK – Frame Analysis
An Introduction to Profinet Frame Analysis using Wireshark – V1.0 www.controlspecialists.co.uk
Packet Filter
Expression Filter Buttons
Packet Details Window
Packet Bytes Window
Packet List Window
11. 11
IEEE 802.3 EtherNet Frame
40 – 1500 BYTES
DATA
SOURCE
MAC
6 BYTES
DEST
MAC
ETHER
TYPE
FRAME
CHECK
SEQ
ETHER TYPE EXAMPLES
0800: Internet Protocol (IPV4)
0806: ARP
8892: PROFINET
88CC: LLDP
Format / Contents dependent
upon the value of the
ETHER TYPE
ETHERNET HEADER ETHERNET TRAILER
Note – VLAN Tags, IFG, Preamble and SFD bytes not shown.
ETHERNET FRAME
6 BYTES 2 BYTES 4 BYTES
An Introduction to Profinet Frame Analysis using Wireshark – V1.0 www.controlspecialists.co.uk
12. 12
Profinet Frame
SOURCE ADDRESS DESTINATION ADDRESS ETHERTYPE
PROFINET IO DATA CYCLE COUNTER DATA STATUS
FRAME ID
TXFR STATUS
ETHERTYPE 8892 = PROFINET, FRAME ID 8000 = REAL TIME CLASS 2
-- APPLICATION PROTOCOL DATA UNIT STATUS --
An Introduction to Profinet Frame Analysis using Wireshark – V1.0 www.controlspecialists.co.uk
13. 13
Profinet Frame (CPU to OUTPUTS)
SLOT 1
SLOT 2
SLOT 3
SLOT 4
IOPS SLOT 3/4
DIG OUT DATA
DAP
DAP = DEVICE ACCESS POINT (IO DEVICE STATUS) 00 = BAD, 80 = GOOD
IOPS = IO PROVIDER STATUS (DATA STATUS @ CPU) 00 = BAD, 80 = GOOD
An Introduction to Profinet Frame Analysis using Wireshark – V1.0 www.controlspecialists.co.uk
14. 14
Common Protocols
• PNIO-DCP – Name / IP Address Assignment
• PNIO-CM – Start-up Services.
• PNIO – Cyclic IO Data Exchange
• PN-PTCP – Time Syncronisation
• PNIO-AL – Acyclic Alarms / Events
• ARP – IP Address – MAC Address Lookup
• LLDP – Device Identity & Properties.
An Introduction to Profinet Frame Analysis using Wireshark – V1.0 www.controlspecialists.co.uk
15. 15
Protocol Usage: Start-up to Data Exchange
Assign Device Name *
PNIO-DCP /
ARP Assign IP Address
Establish Connection
PNIO-DCP
or LLDP
PNIO-CM
PNIO Data Exchange
IO Device confirms Name SET
IO Device confirms IP Address SET
Connection Established
* DEVICE NAME ASSIGNMENT
Device Names can be set up Manually,
prior to connecting to the network, or
Automatically on power-up.
Manual name assignment uses PNIO-DCP
and tools such as the Primary Set-Up Tool
from Siemens or Netilities from Procentec.
Automatic name assignment uses the
LLDP protocol and requires the use of a
Profinet Topology Configuration Tool.
Primary Setup Tool
An Introduction to Profinet Frame Analysis using Wireshark – V1.0 www.controlspecialists.co.uk
16. 16
An Introduction to Profinet Frame Analysis using Wireshark – V1.0
Practical Workshop
• Step-by-Step Guide
• Overview
www.controlspecialists.co.uk