Материал: part02

Внимание! Если размещение файла нарушает Ваши авторские права, то обязательно сообщите нам

Page 306​

DICOM PS3.2 2020a - Conformance​

Options​

Restrictions​

Size Restriction​

Restricted to size supported by the hosting EXAMPLE-PACS-ARCHIVE​

I.4.2.3.3 WADO-RS Retrieve Instance​

Table I.4.2.3-3. WADO-RS Retrieve Instance​

Options​

Restrictions​

Data Types Supported (Accept Type)​

Restricted to application/dicom or application/octet-stream​

Transfer Syntaxes Supported​

Any Transfer Syntax supported by the hosting EXAMPLE-PACS-ARCHIVE​

(Transfer-syntax Accept parameter)​

 

SOP Class Restrictions​

Restricted to SOP classes supported by the hosting​

 

EXAMPLE-PACS-ARCHIVE​

Size Restriction​

Restricted to size supported by the hosting EXAMPLE-PACS-ARCHIVE​

I.4.2.3.4 WADO-RS Retrieve Frames​

Table I.4.2.3-4. WADO-RS Retrieve Frames​

Options​

Restrictions​

Data Types Supported (Accept Type)​

Restricted to application/octet-stream​

Transfer Syntaxes Supported​

AnyTransferSyntaxsupportedbythehostingEXAMPLE-PACS-ARCHIVE​

(Transfer-syntax Accept parameter)​

 

SOP Class Restrictions​

Restricted to Multi-Frame Image Objects as defined in PS3.3.​

Size Restriction​

Restricted to size supported by the hosting EXAMPLE-PACS-ARCHIVE​

I.4.2.3.5 WADO-RS Retrieve Bulk Data​

Table I.4.2.3-5. WADO-RS Retrieve Bulk Data​

Options​

Restrictions​

Data Types Supported (Accept Type)​

Restricted to application/octet-stream​

Transfer Syntaxes Supported​

Any Transfer Syntax supported by the hosting EXAMPLE-PACS-ARCHIVE​

(Transfer-syntax Accept parameter)​

 

SOP Class Restrictions​

Restricted to SOP classes supported by the hosting​

 

EXAMPLE-PACS-ARCHIVE​

Size Restriction​

Restricted to size supported by the hosting EXAMPLE-PACS-ARCHIVE​

I.4.2.3.6 WADO-RS Retrieve Metadata​

Table I.4.2.3-6. WADO-RS Retrieve Metadata​

Options​

Restrictions​

Data Types Supported (Accept Type)​

Restricted to application/dicom+xml​

Accept-Encoding​

Restricted to gzip, deflate, or identity (the use of no transformation whatsoever). See​

 

W3C RFC 2616 Protocol Parameters Section 3.5 for more information​

 

(http://www.w3.org/Protocols/rfc2616/rfc2616-sec3.html).​

SOP Class Restrictions​

Restricted to SOP classes supported by the hosting EXAMPLE-PACS-ARCHIVE​

Size Restriction​

Restricted to size supported by the hosting EXAMPLE-PACS-ARCHIVE​

- Standard -​

DICOM PS3.2 2020a - Conformance​

Page 307​

I.4.2.3.7 Connection Policies​

I.4.2.3.7.1 General​

All standard RS connection policies apply. There are no extensions for RS options.​

I.4.2.3.7.2 Number of Connections​

EXAMPLE-WADO-SERVICE limits the number of simultaneous RS requests. Additional requests will be queued after the HTTP​ connection is accepted. When an earlier request completes, a pending request will proceed.​

Table I.4.2.3-7. Number of Rs Requests Supported​

Maximum number of simultaneous RS requests​

100 (configurable)​

I.4.2.3.7.3 Asynchronous Nature​

 

EXAMPLE-WADO-SERVICE does not support RS asynchronous response.​

I.4.3 Network Interfaces​

I.4.3.1 Physical Network Interface​

EXAMPLE-WADO-SERVICE uses the network interface from the hosting EXAMPLE-PACS-ARCHIVE. See its conformance claim​ for details.​

I.4.3.2 Additional Protocols​

EXAMPLE-WADO-SERVICE uses the network services from the hosting EXAMPLE-PACS-ARCHIVE. See its conformance claim​ for details.​

I.4.3.3 IPv4 and IPv6 Support​

This product supports both IPv4 and IPv6 connections.​

I.4.4 Configuration​

I.4.4.1 HTTP URI Interface​

The EXAMPLE-WADO-SERVICE can be configured to respond on two ports, one for unprotected HTTP traffic and one for TLS pro-​ tected traffic. The TLS port will refuse any connection from a system that is not recognized as authenticated by a known authority.​

I.4.4.2 WS Interface​

DICOM has retired the WADO-WS Service. See PS3.2-2017b. This product still supports this service as described here.​

The EXAMPLE-WADO-SERVICE can be configured to respond on either one or two service endpoints. Each endpoint offers both of​ the services.​

The WSDL file to be used by clients is made available at the location http://<servername>/EXAMPLE-WADO-SERVICE?WSDL.​

I.4.4.3 RS Interface​

The EXAMPLE-WADO-SERVICE can be configured to respond on two ports, one for unprotected HTTP traffic and one for TLS pro-​ tected traffic. The TLS port will refuse any connection from a system that is not recognized as authenticated by a known authority.​

I.5 Media Interchange​

Not applicable​

- Standard -​

Page 308​

DICOM PS3.2 2020a - Conformance​

I.6 Support of Character Sets​

All EXAMPLE-WADO-SERVICEs support Unicode UTF-8 for all Web Services transactions. The EXAMPLE-WADO-SERVICE does​ not convert character sets when returning SOP Instances using DICOM encoding. The original DICOM encoded character sets are​ preserved. When a PDF encoding is returned, character set conversion is performed and the PDF is returned with a UTF-8 encoding.​ JPEG renderings, will also utilize UTF-8 encoding for internal labels.​

See conformance claim for EXAMPLE-PACS-ARCHIVE for character sets used within the DICOM instances.​

I.7 Security​

EXAMPLE-WADO-SERVICE supports transport level security measures for all Web Services.​

The EXAMPLE-WADO-SERVICE supports the following transport level security measures:​

•​HTTP BASIC Authorization over SSL​

•​Digest Authorization​

•​SSL Client Certificates​

Thetransportlevelsecuritymeasuresarethesupportforbi-directionalauthenticationusingTLSconnections.TheEXAMPLE-WADO-​ SERVICE can provide it's certificate information, and can be configured with either a direct comparison (self-signed) certificate or a​ chain of trust certificate.​

The EXAMPLE-WADO-SERVICE will refuse a connection over TLS from a source that does not have a recognized authentication.​ For example, a certificate authenticated by "Big Bank Corp." will not be accepted unless the EXAMPLE-WADO-SERVICE has been​ configured to accept authentications from "Big Bank Corp." The list of acceptable certificates for EXAMPLE-WADO-SERVICE is not​ shared with certificates used by other system applications and must be maintained independently.​

The EXAMPLE-WADO-SERVICE can optionally be configured to support the following session authentication mechanisms:​

•​Kerberos Local Domain Sessions​

•​Shibboleth Cross Domain Sessions (using SAML2.0)​

I.8 Annexes​

I.8.1 IOD Contents​

See Conformance claim for the EXAMPLE-PACS-ARCHIVE.​

I.8.3 Coded Terminology and Templates​

See conformance claim for EXAMPLE-PACS-ARCHIVE​

I.8.4 Grayscale Image Consistency​

The EXAMPLE-WADO-SERVICE assumes that the JPEG images will be displayed with monitors calibrated to the sRGB profile when​ rendering images.​

I.8.5 Standard Extended / Specialized / Private SOP Classes​

See conformance claim for EXAMPLE-PACS-ARCHIVE​

I.8.6 Private Transfer Syntaxes​

If you request a DICOM object, it will not be returned in a private transfer syntax.​

- Standard -​

DICOM PS3.2 2020a - Conformance​

Page 309​

J Conformance Statement Sample STOW​

Service (Informative)​

Disclaimer:​

This document is an example DICOM Conformance Statement for a fictional application service called EXAMPLE-STOW-SERVICE​ produced by a fictional vendor called EXAMPLE-PACS-PRODUCTS.​

As stated in the annex title, this document is truly informative, and not normative. A conformance statement of an actual product might​ implement additional services and options as appropriate for its specific purpose. In addition, an actual product might implement the​ servicesdescribedinadifferentmannerand,forexample,withdifferentcharacteristicsand/orsequencingofactivities.Inotherwords,​ this conformance statement example does not intend to standardize a particular manner that a product might implement DICOM​ functionality.​

J.0 Cover Page​

Company Name: EXAMPLE-PACS-PRODUCTS-VENDOR​

Product Name: EXAMPLE-STOW-SERVICE​

Version: 1.0-rev. A.1​

Internal document number: 1024-1960-xx-yy-zz rev 1​

Date: YYYYMMDD​

J.1 Conformance Statement Overview​

This fictional product EXAMPLE-STOW-SERVICE implements the STOW-RS services for storing DICOM SOP Instances into an​ EXAMPLE-PACS-ARCHIVE.TheEXAMPLE-STOW-SERVICEisonlyavailableasapluginoptionfortheEXAMPLE-PACS-ARCHIVE.​ All of the networking, database, and other services are provided by the EXAMPLE-PACS-ARCHIVE. This conformance claim refers​ to the conformance claim for the EXAMPLE-PACS-ARCHIVE for all such services.​

Table J.1-1 provides an overview of the network services supported by EXAMPLE-STOW-SERVICE.​

Table J.1-1. Network Services​

Network Service​

User of Service (Client)​

Provider of Service (Server)​

STorage Over the Web (STOW)​

 

 

STOW-RS - Store Instances​

No​

Yes​

J.2 Table of Contents​

A table of contents shall be provided to assist readers in easily finding the needed information.​

J.3 Introduction​

J.3.1 Revision History​

Table J.3.1-1. Revision History​

Document Version​

Date of Issue​

Author​

Description​

1.1​

November 16 th, 2012​

LCS​

Version for Final Text​

1.2​

February 8 th, 2013​

LCS​

Revised Introduction​

- Standard -​

Page 310​

DICOM PS3.2 2020a - Conformance​

 

Document Version​

Date of Issue​

Author​

Description​

1.3​

May 16 th, 2013​

SAR​

Incorporated CP-71​

J.3.2 Audience, Remarks, Terms and Definitions, Basics of DICOM Communication, Abbrevi-​ ations, References​

See example text in Section A.3.​

J.3.3 Additional Remarks for This Example​

ThisdocumentisasampleDICOMConformanceStatementcreatedforDICOMPS3.2.Itistobeusedsolelyasanexampletoillustrate​ howtocreateaDICOMConformanceStatementforaDICOMServiceClassProvider(SCP).Thesubjectofthedocument,EXAMPLE-​ STOW-SERVICE, is a fictional product.​

J.4 Networking​

J.4.1 Implementation Model​

J.4.1.1 Application Data Flow​

Example STOW Service​

 

 

 

DICOM STOW-RS

STOW-RS

 

STOW-RS

 

 

STOW-RS

SCP

 

Service

 

 

SCU

Figure J.4.1-1. Application Data Flow Diagram​

The STOW-RS Service Application receives STOW requests from a remote AE. These requests are HTTP POST requests. It is as-​ sociated with the local real-world activity "Store Instances". It converts these requests into internal functions to store the given SOP​ Instances. It returns a summary HTTP status line, including a status code and an associated textual phase, followed by an XML​ message indicating success, warning, or failure for each instance to the requesting remote AE.​

J.4.1.2 Functional Definition of AEs​

J.4.1.2.1 Functional Definition of STOW Service Application​

The reception of a STOW-RS POST request will activate the STOW-RS Service. The storage request is based upon the accept​ headers in the STOW-RS POST request. The response includes an HTTP status line, including a status-code and its associated​ textualphrase,followedbyanXMLmessageindicatingsuccess,warning,orfailureforeachinstancestoredbytheSTOW-RSservice.​

J.4.2 AE Specifications​

This AE complies with Section 10.5 “Store Transaction” in PS3.18, specification for STOW-RS storage.​

- Standard -​