0% found this document useful (0 votes)
38 views

Module 6s - Networking Rev2

Uploaded by

Ara Sunu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views

Module 6s - Networking Rev2

Uploaded by

Ara Sunu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 44

Networking

Module 6
What is a network?
• A network is simply a group of two
or more computers linked together
to share files, information or
access to devices or programs.
What Types of Networks Exist?
• Local Area Networks • Peer to Peer Networks
– In a LAN, computers – Each computer has
are connected equivalent
together within a capabilities and
"local" area (for responsibilities.
example, an office – Very simple
or home).
• Server Based
• Wide Area Networks Networks
– In a WAN, – in which some
computers are computers are
farther apart and dedicated to
are connected serving the others.
Hardware
• Media
• Network Cards
• Switch
• Router
• Hub
Media
• The cables linking workstations
together.
• There are many different types of
transmission media:
– the most popular being twisted-pair wire
(normal electrical wire)
– coaxial cable (the type of cable used for
cable television)
– and fiber optic cable (cables made out of
glass).
Twisted Pair
• Cables connect network devices together
• Wall outlet or patch panel connect cable segments
• CAT5 UTP cable typical within LANs
– RJ45 connector on each end
– Four twisted wire pairs, only two pairs used (transmit,
receive)
• Patch CAT5 UTP
– Wire color order same at each end
– Use to connect dissimilar devices
• Crossover CAT5 UTP
– Wire color order differs at each end
– Use to connect similar devices
Twisted Pair
• CAT5 Patch Cable
– Use to connect to a hospital network directly given
an available port.
– Use with some high speed network cards that can
automatically switch the receive and transmit.
– Use with a switch or a router.
• Crossover CAT5 UTP
– Use to connect directly from one computer to
another regardless of network card.
– Ideal to always have crossover in kit to connect to
AWS or brick directly.
Fiber Optic
• A technology that consists of a bundle of glass
threads (fibers), each of which is capable of
transmitting messages modulated onto light waves
– Advantages over traditional metal communications lines:
• Much greater bandwidth than metal cables.
• Less susceptible than metal cables to interference.
• Thinner and lighter than metal wires.
• Data can be transmitted digitally rather than
analogically.
– Disadvantage
• Expensive to install. In addition, they are more fragile
than wire and are difficult to split.
Fiber Optic
• The connection between the brick and
the Selenia AWS is a fiber connection.
• The fiber connection runs on a non-
routable PPP network from the DRIC
(Direct Ray Interface Card on the Sun
computer to the brick.
RS-422
• Copper wire connection that runs from
the Selenia array to the brick in
conjunction with the hot link.
• The RS-422 link handles
communications for basic operation and
housekeeping of the array.
Network Interface Card (NIC)
• Internal PC
interface to
network
• Requires PCI or ISA
slot (NIC type
dependent)
• Unique 6 byte
address (MAC, NIC,
physical, hardware,
burned-in)
Switch
• In networks, a device that filters and
forwards packets between LAN segments.
Switches operate at the data link layer
(layer 2) and sometimes the network layer
(layer 3) of the OSI Reference Model and
therefore support any packet protocol.
– LANs that use switches to join segments
are called switched LANs or, in the case
of Ethernet networks, switched Ethernet
LANs.
Router
• Routers are specialized computers that send
your messages, and those of every other
Internet user, speeding to their destinations
along thousands of pathways. When
information needs to travel between networks,
routers determine how to get it there. A router
has two separate but related jobs:
– It ensures that information doesn't go where it's not
needed. This is crucial for keeping large volumes of
data from clogging the connections of "innocent
bystanders."
– It makes sure that information makes it to the
intended destination(s).
– http://computer.howstuffworks.com/router.htm
Hub
• A common connection point for
devices in a network.
– Hubs are commonly used to connect
segments of a LAN.
– A hub contains multiple ports. When a
packet arrives at one port, it is copied
to the other ports so that all segments
of the LAN can see all packets.
– Not typically good to use a hub as it
will draw the attention of local IS
Protocol
• An agreed-upon format for
transmitting data between two
devices. The protocol determines the
following:
– the type of error checking to be used
– data compression method, if any
– how the sending device will indicate that
it has finished sending a message
– how the receiving device will indicate that
it has received a message
TCP/IP
• Transmission Control Protocol/Internet Protocol
• Evolved into networking software communications
standard
• Supports wide range of applications and services
– HTTP (Hypertext Transfer Protocol) for web pages
– FTP (File Transfer Protocol)
– SMTP (Simple Mail Transfer Protocol) for e-mail
– SNMP (Simple Network Management Protocol)
• Used by Hologic networking products
TCP/ IP
• IP
– is responsible for moving packets of data
from node to node.
– IP forwards each packet based on a four
byte destination address (the IP number)
• TCP
– is responsible for verifying the correct
delivery of data from client to server. Data
can be lost in the intermediate network. TCP
adds support to detect errors or lost data
and to trigger retransmission until the data
is correctly and completely received.
TCP/IP
• IP by itself is something like the postal
system. It allows you to address a
package and drop it in the system, but
there's no direct link between you and
the recipient.
• TCP enables two hosts to establish a
connection and exchange streams of
data. TCP guarantees delivery of data
and also guarantees that packets will be
delivered in the same order in which
they were sent.
Packets
• A piece of a message • Packets have three
transmitted over a Components
packet-switching
– Header
network.
• MAC Address
– One of the key features
• Source IP
of a packet is that it
contains the destination • Destination IP
address in addition to – Data
the data. In IP
networks, packets are
– Trailer
often called datagrams. • CRC
• ensures that data is
• Packets can be seen
sent and received
used during a “ping”. correctly.
Ipconfig /all
Windows IP Configuration

Host Name . . . . . . . . . . . . : bedcomputer


Primary Dns Suffix . . . . . . . : hologic.corp
Node Type . . . . . . . . . . . . : Mixed
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : hologic.corp
hologic.corp
hologic.corp

Ethernet adapter Local Area Connection:

Connection-specific DNS Suffix . : hologic.corp


Description . . . . . . . . . . . : Broadcom NetXtreme 57xx Gigabit Controller
Physical Address. . . . . . . . . : 00-1C-23-2C-4D-60
Dhcp Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
IP Address. . . . . . . . . . . . : 10.35.6.108
Subnet Mask . . . . . . . . . . . : 255.255.254.0
Default Gateway . . . . . . . . . : 10.35.6.1
DHCP Server . . . . . . . . . . . : 172.27.1.111
DNS Servers . . . . . . . . . . . : 172.27.1.111
172.27.1.109
Lease Obtained. . . . . . . . . . : Friday, December 04, 2009 9:53:18 AM
Lease Expires . . . . . . . . . . : Monday, December 07, 2009 9:53:18 AM
Networking Acronyms
• DNS
– Domain Name Server
• DHCP
– Dynamic Host Configuration Protocol
• WINS
– Windows Internet Naming Service
• ARP
– Address Resolution Protocol
TCP/ IP Properties
IP Address
• Unique address that defines each network
device
• Representation
– The format of an IP address is a 32-bit numeric address
written as four numbers separated by periods. Each
number can be zero to 255.
– 4 octet decimal number
• 206.119.56.185
– 32-bit binary number
• 11001110. 01110111.00111000. 10111001
• Divided into two parts
– Network address or “netid”
– Host address assigned by local administrator or
“hostid”
IP Address Classes
Max Networks Max Hosts
(netid) (hostid)
A 1-126
126 16,777,214 = 224

B 128-191 0-255 16,382 65,534

2,097,152 254
C 192-223 0-255 0-255

•Class A - supports 16 million hosts on each of 126 networks


•Class B - supports 65,000 hosts on each of 16,000 networks
•Class C - supports 254 hosts on each of 2 million networks
eserved addresses:
127.0.0.1 (reserved for loopback testing - ping self)
Subnetting
• Subnetting is a technique used to allow a
single IP network address to span
multiple physical networks.
• IP hosts should support subnetting.
• Subnetting is done by using some of the
bits of the host-id part of the IP address
as a physical network identifier.
• The subnet mask is used to determine
the bits of the network identifier.
• All hosts on the same network should
have the same subnet mask.
Subnet Mask
• IP address consists of two subaddresses, one
identifying the network (netid) and the other
identifying the host (hostid) to the network, with an
imaginary boundary separating the two.
• The location of the boundary between the netid and
hostid is determined through the use of a subnet
mask.
– A subnet mask is another 32-bit binary number, which acts
like a filter when it is applied to the 32-bit IP address.
– By comparing a subnet mask with an IP address, systems
can determine which portion of the IP address relates to the
network, and which portion relates to the host.
• Anywhere the subnet mask has a bit set to "1", the underlying
bit in the IP address is part of the network address.
• Anywhere the subnet mask is set to "0", the related bit in the
IP address is part of the host address.
Default router
• The IP address of the default router
on your local subnet.
– The address is used to configure an
entry for the router in the routing table.
– This entry allows it to send IP packets
via the router out of the local subnet.
– Basically the default router or gateway
allows communication from your
network to another.
Port
• In TCP/IP and UDP • Common Ports
networks, an – 21 - File Transfer
endpoint to a Protocol (FTP)
logical – 22 - Secure Shell
connection. (SSH)
– The port number – 23 - Telnet
identifies what – 25 - SMTP (email)
type of port it is. – 80 - HTTP
– For example, port (browser)
80 is used for – 104 - DICOM
HTTP traffic. – 8080 - Browser
(service tools)
OSI Model of Networking
• In the OSI Model of networking there
are seven layers.
– Each layer represents a certain aspect of
what is necessary to make network
communications work.
– The lower layers are involved with the
infrastructure of the network model such as
hardware and media.
– The higher layers are involved with the
applications used in network
communications.
OSI Model of Networking
•7 The application layer
•6
•5
•4
__________________________________________
•3
•2 The hardware and protocol layers
•1
Console/Laptop Communications
• Crossover Cable & TCP/IP Setup
• HTTP for Service Tools/Admin Access
• FTP for File Transfers (Internet
Explorer or Command Prompt
Methods)
• TELNET for Terminal Window (Blade)
• SSH for Terminal Window (Ultra 45)
Remote Communications
• Change the TCP/IP settings
– No DHCP
– Use IP Address that is one off of the consoles - unless
otherwise specified
• Modes
– HTTP
• http://IPaddress:8080 or http://selenia:8080
– FTP
• ftp://username:password@IPaddress
• Core FTP
– Telnet
• putty.exe
– Secure Shell (ssh)
• putty.exe
Telnet
• A terminal emulation program for TCP/IP
networks.
– Runs on your computer and connects your
PC to another computer on the network.
– You can then enter commands and they will
be executed as if you were entering them
directly on the server console.
• Use Telnet execute commands remotely
on a brick or Sun Blade 100 or 1500
AWS.
SSH
• SSH stands for Secure Shell and is a
terminal emulation program that includes
encrypted communication for increased
security of the session.
– Operates functionally the same as telnet.
– Requires an encryption key automatically
generated by the host computer.
• Use SSH to execute commands remotely on
a Sun Ultra 45 AWS.
FTP (File Transfer Protocol)
• A standard protocol for transferring
files between computers over a
network
• Can be accomplished via
– ftp command
• DOS or terminal window
– WS_FTP
• Windows
– CoreFTP
Web Interfaces
• The following devices have browser
enabled interfaces
– Selenia
• http://IPADDRESS:8080
– Brick
• http://brick
– UPS
• http://IPADDRESS:3052
– R2
• http://IPADDRESS
DICOM
• DICOM is the application layer of
network used in transmitting digital
images throughout a hospital network.
• DICOM stands for Digital Imaging and
Communications in Medicine
• Allows the transmission of digital
images between acquisition devices and
PACS, printers, review stations and
other DICOM devices
DICOM
• DICOM uses TCP/IP as the basis for
communication.
• Files can be exchanged between 2
computers are that are capable of
receiving information in the DICOM format.
• DICOM requires 3 pieces of information to
configure a device.
– IP Address – The IP address of the computer
– Port – The port the TCP/IP transmission will be received
on
– AE Title – An assigned name for the computer (not
necessarily the hostname)
DICOM Ports
• The standard DICOM store port is port
104.
– If sending and image to PACS or a review
workstation it is likely the port will be 104.
– The default port for a SecurView is 104.
• Port 7100 is the default port used for
sending images to the R2 Cenova.
• Port 8100 is the default port a Cenova
will use to send its results.
AE Titles
• An AE Title is a name for a computer on
the DICOM network.
• A DICOM computer may have several
AE Titles depending on whether it is
sending or receiving and what type of
send job is involved (print, store, etc)
SCU vs SCP
• When a DICOM computer is attempting
to send an image to a destination it is
referred to as the Service Class User or
SCU.
• When a DICOM computer is receiving an
image from a device it is known as a
Service Class Provider or SCP.
– The SCU is using the services provided by
the SCP.
– The SCP provides a service such as printing,
displaying or long term storage of an image.
AE Titles and Service Classes
• When a device is considered SCU it has
a Calling AE Title.
– This is the AE Title it will send images with.
• When a device is considered SCP it has
a called AE Title.
– This is the AE Title it will use to receive
images with.
• It is possible for a device to be both SCU
and SCP
– R2 Cenova is a prime example of a device
that will be both.
AE Titles and Service Classes
• Some devices, such as the SecurView, do not
need to know the SCU to receive images.
– Devices like this are known as promiscuous and will receive
images from any device that is configured to send to them.
– A promiscuous device may still not be able to process
everything it receives.
• Some devices, such as most PACS and the R2
Cenova will need to know who is sending the
images in order to properly receive them.
– These devices will reject images sent from an
unknown sender or be unable to process them
correctly though they should be able to.
DICOM Modalities
• In DICOM a modality is an imaging
device.
• Each type of device takes images that
will have a two letter modality code.
– The modality code (also called just a
modality) identifies what type of images are
being sent to the receiving devices.
– The modality for mammography is MG
– Other modalities that are commonly used in
mammography are SC – Secondary Capture,
SR – Structured Report and PR –
Presentation State

You might also like