SlideShare a Scribd company logo
Learning Series 2016
Fundamentals: Networking
----------------------------------------
"Not Social Media-How does a
customer's network impact our
solution?"
Objective
Building on the last learning series that covered creating
SalesForce cases with detail information for Support to use.
• Cover common Network terminology
• Provide an overview of how networks can have positive
and negative impacts to our solution.
• Highlight differences between onsites and hosted
servers.
• Tools that can be used for both validation and
troubleshooting with common use cases.
Please hold questions to the end of this presentation
Common Network Terms
• Bandwidth
• Upload/Download Speed
• Latency
• Packet Loss
• Jitter
• Static IP Addresses
• Dynamic IP Addresses
• VLANS
• DHCP
• QoS
• CAT6
• Structured Cabling
• Gigabit Network
• Proxy Servers
• IP filtering
• Port blocking
• Whitelist
• Cross meshed
• IP Conflicts
• Duplex
• Wake on LAN
• Ping
• DICOM Echo
• DNS
• Default Gateway
• Subnet Mask
• Firewalls
• Switches
• Router
• Wifi
• Broadband
• Dual NICs
• DRAC Cards
• Blacklist
• IPv4
• IPv6
• LAN
• WAN
• TCP
• ISP
• Trace route
• Packet capture
• Netstat
• NSLoop
• Reverse Lookup
• Hostname
• Domain
• Ethernet adapter
• MAC Address
• Public IP address
• B2B VPN
• MPLS
• BGP
• Failed connection
• SSL Transfer
• DICOM Transfer
• Persistent connection
• Ports
• Denial of Server(DoS)
• ASP, SaaS, Cloud
• ETC
OSI Stack
Take from:
http://www1.amalnet.k12.il/kiryathaim/profession/pc/Shared%20Documents/Forms/AllItems.aspx
What does it take for a device to be online?
What are the building blocks?
Device Snapshot
• MAC Address-Each network device has been assigned a unique identifier by the manufacture
– Example: 01:23:45:67:89:ab
• IP Address(internal)-Each network device has to be assigned a unique IP Address to function in a
LAN environment.
– Example: IPv4 Address – 192.168.100.122
– Example: IPv6 Address - 2601:c2:8404:86c::efb6
• Subnet Mask-This is used to divide up IP addresses into smaller logical networks.
– Example: 255.255.255.0
• Default Gateway –Without this being set, you have no way to communicate to other
devices on the network.
– Example: In your home network your ISP router functions as a default GW so you can access the Internet.
• DNS – If this was not in place would only be able to access website if you knew
the IP address. This allows one to move equipment without having to notify
end users. There is a hierarchy of DNS server around the entire globe.
– Example-when you enter an URL of www.ramsoft.com it is converted to the IP of
104.25.212.29(public IP for our website hosts)
– RamSoft moved the RNM server from the Hostway Datacenter in Austin TX to the Radius
Datacenter in Nashville TN and we only need to update DNS.
IPv4 vs. IPv6
Q: To the end user these is no noticeable difference so why are we doing this?
A: The number of IP addresses available.
– For IPv4 there are 4,294,967,296 addresses.
– For IPv6 there are 340,282,366,920,938,463, 463,374, 607,431, 768,211,456 IPv6 addresses
More IPs mean more devices can communicate
‘Internet of Things’ Connected Devices to Almost Triple to Over 38 Billion Units by
2020
Total Device Base Driven by Surge in Connected Industrial Applications
Hampshire, 28th July: New data from Juniper Research has revealed that the number
of IoT (Internet of Things) connected devices will number 38.5 billion in 2020, up from
13.4 billion in 2015: a rise of over 285%.
http://www.juniperresearch.com/press/press-releases/iot-connected-devices-to-triple-to-38-bn-by-2020
Internal vs. External IP
External IP Address:
• The facilities ISP will provide them an static external IP address(or a range
of IPs) that can used an VPN end points or URL access points.
– Earlier example-when you enter an URL of www.ramsoft.com public IP address is
104.25.212.29
– Example-nrc.ramsoftpacs.com and teleras.ramsoftpacs.com will have unique public IP
addresses.
– Example-VPN???
Internal IP Address
• Managed and assigned by local IT resources.
Network Architecture
• Routers, switches, and firewall
• Common measures
– Latency, Jitter, Speed, Packet Loss
“classroom analogy”
LAN vs. WAN
Q: Gateway Router interact with modalities at a customer site
across the ______.
A: LAN
Q: Referring physicians interact with Rapid Results across the
____.
A: WAN
Q: Technologist using the PowerReader interact with the
PowerServer across the _____.
A. LAN(if server is onsite) or WAN(if server is hosted)
Tools
 ICMP Ping
 Returns values of latency and shows how consistent a connection maybe between two end points.
 Common LAN responses should be a few milliseconds(ms)
 Common WAN responses could be in the 20-90ms range
 Successful response means network is passing traffic. Failed response does not always mean the
network is not correct.
 Many web based applications do not respond to ICMP Ping due to DoS attacks so failure does not
mean networking issue all the time.
 DICOM Ping
 Used when setting up a RamSoft Gateway or PowerServer to Modality connection.
 Connection made to a predetermined port.
 Successful ping usually an indicator the modality is setup properly.
 Will fail if wrong Port or AE Title is used.
 Tracert
 Returns values of latency direct to each each ‘hop’(device) that a packet travels between two end
points.
 When accessing a internet site there could be 10-15 touch points. Versus only a few depending on the LAN architecture.
 Hops with high latency could point to bottlenecks in the network path.
Tools(cont.)
 Netstat
 Used to identify active sessions from the host.
 An active DICOM transfer from modality to gateway will show up with both
end points identified
 NSLookup
 Used to see what IP address is assigned to a particular URL/Hostname by DNS
servers. Reverse lookup allows one to enter an IP and see if a URL is assigned.
 When a website is no accessible via URL, this can be used as a troubleshooting
tool
 Wireshark
 Used to capture and review packets that are crossing the network connection.
 Commonly used when failures are occurring due to network provider or
application level issues.
Why does this matter?
ADT/
ORM
Day of Appt
DCM
ORU
Why does this matter?
Encrypted Transfer
TLS or SSL
Encrypted Transfer
HTTPS
Logical
View
Why does this matter?
Encrypted Transfer
TLS or SSL
Switch
Stack
------
Router
Firewall
Public IP
DNS
This could be easily be
over 20 ‘hops’
This could be easily be
over 20 ‘hops’
Actual
View
**The datacenter will have
its own switch, routers,
firewall, load balancers, etc
Live Demonstration of the following tools:
• Ipconfig with and without /all
• ICMP Ping with and with –a to www.google.com
and rnm.ramsoftpacs.com
• Tracert to www.google.com and
rnm.ramsoftpacs.com
• NSLookup rnm.ramsoftpacs.com
‘Customer Network issue or RamSoft application problem’
We need to be able to evaluate and help customers determine if
the issue is a RamSoft application call or if the customers’
network infrastructure is creating a problem.
ANY QUESTIONS??
ANY QUESTIONS?

More Related Content

What's hot

sDDS: An Adaptable DDS Solution for Wireless Sensor Networks
sDDS: An Adaptable DDS Solution for Wireless Sensor NetworkssDDS: An Adaptable DDS Solution for Wireless Sensor Networks
sDDS: An Adaptable DDS Solution for Wireless Sensor Networks
Real-Time Innovations (RTI)
 
Coolie @ call
Coolie @ callCoolie @ call
Coolie @ call
ICFAI Business School
 
DYNAMIC HOST CONFIGURATION PROTOCOL
DYNAMIC HOST CONFIGURATION PROTOCOLDYNAMIC HOST CONFIGURATION PROTOCOL
DYNAMIC HOST CONFIGURATION PROTOCOL
VENKATESHAN A S
 
Wintel ppt for dhcp
Wintel ppt for dhcpWintel ppt for dhcp
Wintel ppt for dhcp
duraimurugan89
 
DHCP Protocol
DHCP ProtocolDHCP Protocol
DHCP Protocol
Mohammed Hisham
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
Anwal Mirza
 
computer network designing- final year project
computer network designing- final year projectcomputer network designing- final year project
computer network designing- final year project
Aboubacar Mchangama
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?
Karri Huhtanen
 
DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)
Faisal Jatt
 
message communication protocols in IoT
message communication protocols in IoTmessage communication protocols in IoT
message communication protocols in IoT
FabMinds
 
DHCP in windows server 2012
DHCP in windows server 2012DHCP in windows server 2012
DHCP in windows server 2012
Abaady Sahal
 
Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed Systems
Dilum Bandara
 
Data Center Network Trends - Lin Nease
Data Center Network Trends - Lin NeaseData Center Network Trends - Lin Nease
Data Center Network Trends - Lin Nease
HPDutchWorld
 
The constrained application protocol (coap) part 3
The constrained application protocol (coap)  part 3The constrained application protocol (coap)  part 3
The constrained application protocol (coap) part 3
Hamdamboy
 
Lesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionLesson 5: Configuring Name Resolution
Lesson 5: Configuring Name Resolution
Mahmmoud Mahdi
 
eProsima RPC over DDS - OMG June 2013 Berlin Meeting
eProsima RPC over DDS - OMG June 2013 Berlin MeetingeProsima RPC over DDS - OMG June 2013 Berlin Meeting
eProsima RPC over DDS - OMG June 2013 Berlin Meeting
Jaime Martin Losa
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
Hema Dhariwal
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol A
Mahmmoud Mahdi
 
Cs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT VCs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT V
pkaviya
 
Administration of DHCP Addressing
Administration of DHCP AddressingAdministration of DHCP Addressing
Administration of DHCP Addressing
paperpublications3
 

What's hot (20)

sDDS: An Adaptable DDS Solution for Wireless Sensor Networks
sDDS: An Adaptable DDS Solution for Wireless Sensor NetworkssDDS: An Adaptable DDS Solution for Wireless Sensor Networks
sDDS: An Adaptable DDS Solution for Wireless Sensor Networks
 
Coolie @ call
Coolie @ callCoolie @ call
Coolie @ call
 
DYNAMIC HOST CONFIGURATION PROTOCOL
DYNAMIC HOST CONFIGURATION PROTOCOLDYNAMIC HOST CONFIGURATION PROTOCOL
DYNAMIC HOST CONFIGURATION PROTOCOL
 
Wintel ppt for dhcp
Wintel ppt for dhcpWintel ppt for dhcp
Wintel ppt for dhcp
 
DHCP Protocol
DHCP ProtocolDHCP Protocol
DHCP Protocol
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
computer network designing- final year project
computer network designing- final year projectcomputer network designing- final year project
computer network designing- final year project
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?
 
DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)
 
message communication protocols in IoT
message communication protocols in IoTmessage communication protocols in IoT
message communication protocols in IoT
 
DHCP in windows server 2012
DHCP in windows server 2012DHCP in windows server 2012
DHCP in windows server 2012
 
Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed Systems
 
Data Center Network Trends - Lin Nease
Data Center Network Trends - Lin NeaseData Center Network Trends - Lin Nease
Data Center Network Trends - Lin Nease
 
The constrained application protocol (coap) part 3
The constrained application protocol (coap)  part 3The constrained application protocol (coap)  part 3
The constrained application protocol (coap) part 3
 
Lesson 5: Configuring Name Resolution
Lesson 5: Configuring Name ResolutionLesson 5: Configuring Name Resolution
Lesson 5: Configuring Name Resolution
 
eProsima RPC over DDS - OMG June 2013 Berlin Meeting
eProsima RPC over DDS - OMG June 2013 Berlin MeetingeProsima RPC over DDS - OMG June 2013 Berlin Meeting
eProsima RPC over DDS - OMG June 2013 Berlin Meeting
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
Lesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol ALesson 6: Dynamic Host Configuration Protocol A
Lesson 6: Dynamic Host Configuration Protocol A
 
Cs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT VCs8591 Computer Networks - UNIT V
Cs8591 Computer Networks - UNIT V
 
Administration of DHCP Addressing
Administration of DHCP AddressingAdministration of DHCP Addressing
Administration of DHCP Addressing
 

Similar to Learning series fundamentals of Networking and Medical Imaging

CCNA 1
CCNA 1CCNA 1
CCNA 1
Asish Verma
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5
friv4schoolgames
 
Software Defined Networking: Primer
Software Defined Networking: Primer Software Defined Networking: Primer
Software Defined Networking: Primer
Bangladesh Network Operators Group
 
MPLS ppt
MPLS pptMPLS ppt
MPLS ppt
Jagtar Dhaliwal
 
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
OpenStack Korea Community
 
There and back again
There and back againThere and back again
There and back again
Jon Spriggs
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
Vamsi Krishna Kalavala
 
Guide to home networking
Guide to home networkingGuide to home networking
Guide to home networking
Dilan Gilluly
 
The Evolving Internet Fndtn
The Evolving Internet FndtnThe Evolving Internet Fndtn
The Evolving Internet Fndtn
guestbf78f8b
 
Slides of Chapter 3 network design and management book
Slides of Chapter 3 network design and management bookSlides of Chapter 3 network design and management book
Slides of Chapter 3 network design and management book
Muhammad Shafiq
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
Mohammed Adam
 
Riverbed Within Local Gov
Riverbed Within Local GovRiverbed Within Local Gov
Riverbed Within Local Gov
michaelking
 
Mobile Experience Management and Network Services Health Check with Aruba Air...
Mobile Experience Management and Network Services Health Check with Aruba Air...Mobile Experience Management and Network Services Health Check with Aruba Air...
Mobile Experience Management and Network Services Health Check with Aruba Air...
Aruba, a Hewlett Packard Enterprise company
 
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
Irsandi Hasan
 
Case mis ch06
Case mis ch06Case mis ch06
Case mis ch06
Sanghyeok Park
 
SD-WAN
SD-WANSD-WAN
Link i pv4
Link i pv4Link i pv4
Link i pv4
NARESH A
 
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxChapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
bartholomeocoombs
 
DevOops - Lessons Learned from an OpenStack Network Architect
DevOops - Lessons Learned from an OpenStack Network ArchitectDevOops - Lessons Learned from an OpenStack Network Architect
DevOops - Lessons Learned from an OpenStack Network Architect
James Denton
 
Chapter14ccna
Chapter14ccnaChapter14ccna
Chapter14ccna
Lakshan Perera
 

Similar to Learning series fundamentals of Networking and Medical Imaging (20)

CCNA 1
CCNA 1CCNA 1
CCNA 1
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5
 
Software Defined Networking: Primer
Software Defined Networking: Primer Software Defined Networking: Primer
Software Defined Networking: Primer
 
MPLS ppt
MPLS pptMPLS ppt
MPLS ppt
 
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
 
There and back again
There and back againThere and back again
There and back again
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
Guide to home networking
Guide to home networkingGuide to home networking
Guide to home networking
 
The Evolving Internet Fndtn
The Evolving Internet FndtnThe Evolving Internet Fndtn
The Evolving Internet Fndtn
 
Slides of Chapter 3 network design and management book
Slides of Chapter 3 network design and management bookSlides of Chapter 3 network design and management book
Slides of Chapter 3 network design and management book
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
 
Riverbed Within Local Gov
Riverbed Within Local GovRiverbed Within Local Gov
Riverbed Within Local Gov
 
Mobile Experience Management and Network Services Health Check with Aruba Air...
Mobile Experience Management and Network Services Health Check with Aruba Air...Mobile Experience Management and Network Services Health Check with Aruba Air...
Mobile Experience Management and Network Services Health Check with Aruba Air...
 
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 11
 
Case mis ch06
Case mis ch06Case mis ch06
Case mis ch06
 
SD-WAN
SD-WANSD-WAN
SD-WAN
 
Link i pv4
Link i pv4Link i pv4
Link i pv4
 
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docxChapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
Chapter 11 Selecting Technologies and Devices for Enterprise Netwo.docx
 
DevOops - Lessons Learned from an OpenStack Network Architect
DevOops - Lessons Learned from an OpenStack Network ArchitectDevOops - Lessons Learned from an OpenStack Network Architect
DevOops - Lessons Learned from an OpenStack Network Architect
 
Chapter14ccna
Chapter14ccnaChapter14ccna
Chapter14ccna
 

Recently uploaded

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Learning series fundamentals of Networking and Medical Imaging

  • 1. Learning Series 2016 Fundamentals: Networking ---------------------------------------- "Not Social Media-How does a customer's network impact our solution?"
  • 2. Objective Building on the last learning series that covered creating SalesForce cases with detail information for Support to use. • Cover common Network terminology • Provide an overview of how networks can have positive and negative impacts to our solution. • Highlight differences between onsites and hosted servers. • Tools that can be used for both validation and troubleshooting with common use cases. Please hold questions to the end of this presentation
  • 3. Common Network Terms • Bandwidth • Upload/Download Speed • Latency • Packet Loss • Jitter • Static IP Addresses • Dynamic IP Addresses • VLANS • DHCP • QoS • CAT6 • Structured Cabling • Gigabit Network • Proxy Servers • IP filtering • Port blocking • Whitelist • Cross meshed • IP Conflicts • Duplex • Wake on LAN • Ping • DICOM Echo • DNS • Default Gateway • Subnet Mask • Firewalls • Switches • Router • Wifi • Broadband • Dual NICs • DRAC Cards • Blacklist • IPv4 • IPv6 • LAN • WAN • TCP • ISP • Trace route • Packet capture • Netstat • NSLoop • Reverse Lookup • Hostname • Domain • Ethernet adapter • MAC Address • Public IP address • B2B VPN • MPLS • BGP • Failed connection • SSL Transfer • DICOM Transfer • Persistent connection • Ports • Denial of Server(DoS) • ASP, SaaS, Cloud • ETC
  • 5. What does it take for a device to be online? What are the building blocks?
  • 6. Device Snapshot • MAC Address-Each network device has been assigned a unique identifier by the manufacture – Example: 01:23:45:67:89:ab • IP Address(internal)-Each network device has to be assigned a unique IP Address to function in a LAN environment. – Example: IPv4 Address – 192.168.100.122 – Example: IPv6 Address - 2601:c2:8404:86c::efb6 • Subnet Mask-This is used to divide up IP addresses into smaller logical networks. – Example: 255.255.255.0 • Default Gateway –Without this being set, you have no way to communicate to other devices on the network. – Example: In your home network your ISP router functions as a default GW so you can access the Internet. • DNS – If this was not in place would only be able to access website if you knew the IP address. This allows one to move equipment without having to notify end users. There is a hierarchy of DNS server around the entire globe. – Example-when you enter an URL of www.ramsoft.com it is converted to the IP of 104.25.212.29(public IP for our website hosts) – RamSoft moved the RNM server from the Hostway Datacenter in Austin TX to the Radius Datacenter in Nashville TN and we only need to update DNS.
  • 7. IPv4 vs. IPv6 Q: To the end user these is no noticeable difference so why are we doing this? A: The number of IP addresses available. – For IPv4 there are 4,294,967,296 addresses. – For IPv6 there are 340,282,366,920,938,463, 463,374, 607,431, 768,211,456 IPv6 addresses More IPs mean more devices can communicate ‘Internet of Things’ Connected Devices to Almost Triple to Over 38 Billion Units by 2020 Total Device Base Driven by Surge in Connected Industrial Applications Hampshire, 28th July: New data from Juniper Research has revealed that the number of IoT (Internet of Things) connected devices will number 38.5 billion in 2020, up from 13.4 billion in 2015: a rise of over 285%. http://www.juniperresearch.com/press/press-releases/iot-connected-devices-to-triple-to-38-bn-by-2020
  • 8. Internal vs. External IP External IP Address: • The facilities ISP will provide them an static external IP address(or a range of IPs) that can used an VPN end points or URL access points. – Earlier example-when you enter an URL of www.ramsoft.com public IP address is 104.25.212.29 – Example-nrc.ramsoftpacs.com and teleras.ramsoftpacs.com will have unique public IP addresses. – Example-VPN??? Internal IP Address • Managed and assigned by local IT resources.
  • 9. Network Architecture • Routers, switches, and firewall • Common measures – Latency, Jitter, Speed, Packet Loss “classroom analogy”
  • 10. LAN vs. WAN Q: Gateway Router interact with modalities at a customer site across the ______. A: LAN Q: Referring physicians interact with Rapid Results across the ____. A: WAN Q: Technologist using the PowerReader interact with the PowerServer across the _____. A. LAN(if server is onsite) or WAN(if server is hosted)
  • 11. Tools  ICMP Ping  Returns values of latency and shows how consistent a connection maybe between two end points.  Common LAN responses should be a few milliseconds(ms)  Common WAN responses could be in the 20-90ms range  Successful response means network is passing traffic. Failed response does not always mean the network is not correct.  Many web based applications do not respond to ICMP Ping due to DoS attacks so failure does not mean networking issue all the time.  DICOM Ping  Used when setting up a RamSoft Gateway or PowerServer to Modality connection.  Connection made to a predetermined port.  Successful ping usually an indicator the modality is setup properly.  Will fail if wrong Port or AE Title is used.  Tracert  Returns values of latency direct to each each ‘hop’(device) that a packet travels between two end points.  When accessing a internet site there could be 10-15 touch points. Versus only a few depending on the LAN architecture.  Hops with high latency could point to bottlenecks in the network path.
  • 12. Tools(cont.)  Netstat  Used to identify active sessions from the host.  An active DICOM transfer from modality to gateway will show up with both end points identified  NSLookup  Used to see what IP address is assigned to a particular URL/Hostname by DNS servers. Reverse lookup allows one to enter an IP and see if a URL is assigned.  When a website is no accessible via URL, this can be used as a troubleshooting tool  Wireshark  Used to capture and review packets that are crossing the network connection.  Commonly used when failures are occurring due to network provider or application level issues.
  • 13. Why does this matter? ADT/ ORM Day of Appt DCM ORU
  • 14. Why does this matter? Encrypted Transfer TLS or SSL Encrypted Transfer HTTPS Logical View
  • 15. Why does this matter? Encrypted Transfer TLS or SSL Switch Stack ------ Router Firewall Public IP DNS This could be easily be over 20 ‘hops’ This could be easily be over 20 ‘hops’ Actual View **The datacenter will have its own switch, routers, firewall, load balancers, etc
  • 16. Live Demonstration of the following tools: • Ipconfig with and without /all • ICMP Ping with and with –a to www.google.com and rnm.ramsoftpacs.com • Tracert to www.google.com and rnm.ramsoftpacs.com • NSLookup rnm.ramsoftpacs.com
  • 17. ‘Customer Network issue or RamSoft application problem’ We need to be able to evaluate and help customers determine if the issue is a RamSoft application call or if the customers’ network infrastructure is creating a problem. ANY QUESTIONS??