Modbus Part 2

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

1 hour 22 minutes
Video Transcription
I see a Scott of Fundamentals and this portion we're going to take a look at Mott bus part to get more in depth with mod bus.
The learning objectives for this module will be learning about the technical details of icy Escada involving mod bus, the actual protocol structure of mob boss And how Mont Bus works with I p version for
so the protocol structure. Uh, in this particular case, it, uh, operates in the TCP I P. Area where uses cyclical redundancy. Check the version of 16 with an air in detecting code that particular cyclical redundancy check CRC
Also use this apology No meal algorithm,
my bus PTU Also in an i p version six and it stands for protocol data unit and it uses rt you frame parts where it also has within the frame parts function codes and data which can be any number of bytes.
Vermont bus are to you for serial frame.
It is very similar, except it also has a sleeve. I d for dressing
inside a t c p i a t c p i p Version four packet is where actually Mont Bus can travel through
inside the header itself is where Ahmad bus is actually transported.
So inside the packet structure, when we're dealing with mod bus because it can use ah lot of different vendors, by the way, all of the vendors and support mod bus they're supposed to be registered, and you can find that list publicly available. It also involved a vendor i D.
Inside the TCP field. You'll have a transaction, identify air protocol, identifier the length
and also the Unit I D, which is fourth e slave or other device on
the bus network for the identification of that particular device.
The application header for M B. A. P, which also uses TCP, has basically the same amount of information and uses the same type of information except will also include the Protocol i. D.
There are multiple different types of data which mod bus uses. One of them is, ah, holding register and that's read or write. All seven input register various inputs that you could do and also coils, which are also outputs that you're achieving.
Now, if you look at the mod Bus protocol specifications, one of my favorites is a force coil
ah function. So it uses these types of things to produce output.
There's also it's called the function and conformity level. So function code. It isn't just, say, a decimal or words. It's actually in Hexi decimal format. Two decimal. There's also conformity level, which also uses the same thing
on a regular identification for stream access, an individual access.
Up Next
ICS/SCADA Fundamentals

The ICS SCADA Fundamentals course is taught by world-renowned cybersecurity expert Chris Kubecka and will introduce students to basic critical infrastructure concepts.

Instructed By