Your browser does not seem to support JavaScript. As a result, your viewing experience will be diminished, and you have been placed in read-only mode.
Please download a browser that supports JavaScript, or enable it if it's disabled (i.e. NoScript).
A simple TX/RX Filter could be sufficient in many cases. If you want to "de-interlace" the traffic by accumulating TX/RX data and postponing adding it to the log until a certain character (CR/LF) arrives -- a simple custom layer plugin could work. Finally, you can save captured data streams into an .njlog file and post-process it with any scripting language of your choice.
.njlog
Could you please share an .njlog or at least a screenshot of communications? That would help to choose the best approach.
A new blog post is out: https://ioninja.com/blog/walking-your-log/
Have questions or comments? Leave them here!
Here is a blog post on the subject: https://ioninja.com/blog/walking-your-log/
It doesn't dive into the internals of parsing Modbus RTU frames themselves, but you'll be able to enumerate and extract all Modbus RTU master and slave frames from your .njlog file -- and take it from there.
We've just launched a new blog:
https://ioninja.com/blog/welcome-to-io-ninja-blog/
Feel free to use this forum thread for comments & discussion.
Hi Paul,
Thank you for your feedback, I really appreciate it!
We released Serial Tap Pro two months ago, and a new revision for Ethernet Tap (Ethernet Tap Pro?) is our next goal! At the very least, it should include Gigabit Ehternet support, automatic port speed selection, optional packet injection (which could be disabled at hardware level via jumpers -- just like in Serial Tap Pro), guarantee of non-disrupting the original link in case of power loss, high-precision (at least 1 microsecond) hardware timestamps, optional enclosure -- and more (hopefully, Automotive Etherent, too). We are still in the research & design stage, so there's no strict release date set -- sorry about that. As soon as we have a more definitive timeline, we will definitely post an update on this!
Hello Jason,
I've replied to this request over email, but let's cover it here, too -- in case anyone else bumps into a similar problem.
Support for Serial Tap Pro was added recently, in IO Ninja 5.8.0 -- therefore, please make sure that you are on a version higher than this. Generally speaking, you always want to be running the latest and greatest version of IO Ninja.
Also, on Windows, for Serial Tap Pro and other hardware sniffers to function correctly, the official hardware driver is required. This driver is actually nothing more than a manifest telling Windows to use the system winusb.sys for devices with our VID/PIDs (vendor and product IDs). Nevertheless, this step is essential -- without it, IO Ninja won't be able to communicate with the taps (and taps will have an exclamation mark in Windows Device Manager).
winusb.sys
If you install IO Ninja via the "FULL" MSI installer, those drivers should be installed automatically. Otherwise (e.g., you prefer a portable .7z archive), please download drivers separately at Download -> IO Ninja Hardware Drivers; install them either (a) using dpinst64/dpinst32 or (b) through the standard Update Driver process in Device Manager.
.7z
dpinst64
dpinst32
After driver installation completes successfully, the taps in Device Manager should show no exclamation mark and use winusb.sys as a kernel-mode driver.
Greetings! The fact that IO Ninja doesn't enumerate this port on Windows means that its driver doesn't belong to the "Ports" device class:
Could you please share the .inf file for this driver? Or better yet, can you provide a download link for this virtual serial port driver so that we can play with it locally?
.inf
When on evaluation, you can use absolutely everything -- including Pipe Terminal and scripting.
However, the your script is not a valid Jancy script.
A simple echo script looks something like this:
void main() { char buffer[256]; for (;;) { size_t size = receive(buffer, sizeof(buffer)); transmitAll(buffer, size); } }
Of course, you can modify the reply packet before transmission as you like, e.g.:
void main() { char buffer[256]; for (int i;; i++) { size_t size = receive(buffer, sizeof(buffer)); string_t reply = $"received block %1: '%2'"(i, string_t(buffer, size)); transmitAll(reply); } }
You can also try our stock scripts ("Load stock script" in the drop-down next to the "Open" button on the Script pane) -- they can be used as a starting point for something more meaningful.
Also, check in-app scripting tutorials here:
https://ioninja.com/doc/developer-manual/tutorials.html
Hi Jeremy,
Apologies for the delayed response.
You are 100% correct -- the hostname resolver should respect the IPv4 address when present. IPv6 should not be required when IPv4 is available.
Actually, the logic here is a bit more complex -- all socket-based plugins can optionally bind to local IPv4 or IPv6 adapters. So, when this binding is in place, the hostname resolver should choose the corresponding address family and ignore everything else.
We'll add this for the upcoming release in June. I'll share a link to the internal build after we have it done if you wish to try it before the official release.
With IO Ninja, you can monitor Modbus TCP, analyze communications, and export data for further processing.
However, there's no out-of-the-box integration with data acquisition services.
If it's the monitor-and-analyze part you are interested in, then the roadmap is as follows.
The first stage is to acquire the TCP conversation between Modbus Master and Modbus Slave. In IO Ninja, this can be done via two alternative approaches.
(a) You can capture Ethernet packets using Ethernet Tap or Pcap Sniffer (capturing via Pcap could require some trickery if the Modbus Master is not running on the same workstation as IO Ninja), then reconstruct TCP conversation by attaching TCP Flow Analyzer.
(b) But a more straightforward approach would be to use IO Ninja as a man-in-the-middle and let it forward TCP traffic between the Master and Slave using TCP Proxy. Whenever this man-in-the-middle approach is applicable (i.e., you are in control of the Master and can redirect it to IO Ninja), that should be your choice -- it's much more straightforward and reliable.
After you set everything up for reconstruction of the raw TCP conversation between Master and Slave, you attach the Modbus Analyzer to decode the raw bytes into human-readable Modbus frames.
IO Ninja log is very powerful and should be more than enough to inspect and analyze the Modbus conversation.
If you need to post-process it further, one option would be to create a Log Layer to do the job (remember, IO Ninja is scriptable!). However, for people who have never touched IO Ninja scripting before, a much more straightforward path would be to save the log as .njlog and use any scripting language of their choice to walk over it.
The .njlog file format is very simple and all the relevant data structures & constants are open-source and defined in scripts/api/log_RecordCode.jnc and scripts/api/log_RecordFile.jnc (included in IO Ninja packages).
scripts/api/log_RecordCode.jnc
scripts/api/log_RecordFile.jnc
Hope this helps; feel free to follow up with any questions!