SBN

CIP

Introduction

Common Industrial Protocol (CIP) was created by Open DeviceNet Vendors Association Company (ODVA) specifically for automating industrial processes for sharing the data among various components in ICS (Industrial Control Systems) network. ODVA supports different sections and extensions of CIP: CIP safety, CIP Energy, CIP Sync and CIP Motion. 

The design and implementation of CIP is neither as simple as Modbus nor as complex and heavy as PROFINET. CIP comprises a set of messages and services for security, control, synchronization, configuration and sharing of information.

CIP has been adapted widely in ICS networks because it provides integration and inter-communication with different types of networks. They are:

  1. Ethernet/IP/IP: CIP adaptation to TCP (Transmission Control Protocol) technologies
  2. ControlNet: CIP adaptation to CTDMA (Concurrent Time Domain, Multiple Access) technologies
  3. DeviceNet: CIP adaptation to CAN (Controller Area Network) technologies
  4. CompoNet: CIP adaptation to TDMA (Time Division Multiple Access) technologies

CIP messages

CIP follows a pattern called the producer-consumer pattern. As the name suggests, producers produce and put messages into circulation for various consumer nodes in the network. Consumer receive messages and decide whether the particular message is intended for them or not. This is done on the basis of the identifier field present in the message.

Producers produce two types of messages, depending on the type of architecture being implemented and followed:

  1.  Implicit message: An implicit message has identifier, data and CRC fields in it. The consumer node decides whether the received message is intended on the basis of the Identifier field present in the message
  2.  Explicit message: A typical explicit message has four fields: origin, destination, data and CRC. The consumer node decides whether the received message is intended for it by reading the destination field value and accordingly takes the necessary action

CIP device types

On the basis of (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Nitesh Malviya. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/gR7mL9AMMBM/