Skip to main content

A Python implementation of the DICOM networking protocol

Project description

https://codecov.io/gh/pydicom/pynetdicom/branch/master/graph/badge.svg https://travis-ci.org/pydicom/pynetdicom.svg?branch=master https://circleci.com/gh/pydicom/pynetdicom/tree/master.svg?style=shield https://badge.fury.io/py/pynetdicom.svg https://img.shields.io/pypi/pyversions/pynetdicom.svg https://zenodo.org/badge/DOI/10.5281/zenodo.2648395.svg

pynetdicom

A Python implementation of the DICOM networking protocol, originally based on (legacy) pynetdicom.

Description

DICOM is the international standard for medical images and related information. It defines the formats and communication protocols for media exchange in radiology, cardiology, radiotherapy and other medical domains.

pynetdicom is a pure Python (2.7/3.4+) package that implements the DICOM networking protocol. Working with pydicom, it allows the easy creation of DICOM Service Class Users (SCUs) and Service Class Providers (SCPs).

The main user class is AE, which is used to represent a DICOM Application Entity. Once the AE has been created you would typically either:

  • Start the application as an SCP by specifying the presentation contexts that you will support, then calling AE.start_server((host, port)) and waiting for incoming association requests

  • Use the application as an SCU by specifying the presentation contexts you want the peer SCP to support, then requesting an association via the AE.associate(host, port) method, which returns an Association thread.

Once the application is associated with a peer AE, DICOM data can be sent between them by utilising the DIMSE-C and -N services (see the DICOM Standard Part 7, Sections 7.5, 9, and 10).

Supported Service Classes

pynetdicom supports the following DICOM service classes:

Supported DIMSE SCU Services

When the AE is acting as an SCU and an association has been established with a peer SCP, the following DIMSE-C and -N services are available (provided the peer supports the Service Class and a corresponding Presentation Context has been accepted):

DIMSE service

Association method

C-ECHO

send_c_echo()

C-FIND

send_c_find(dataset)

C-GET

send_c_get(dataset)

C-MOVE

send_c_move(dataset, move_aet)

C-STORE

send_c_store(dataset)

N-ACTION

send_n_action(dataset, action_type, class_uid, instance_uid)

N-CREATE

send_n_create(dataset, class_uid, instance_uid)

N-DELETE

send_n_delete(class_uid, instance_uid)

N-EVENT-REPORT

send_n_event_report(dataset, event_type, class_uid, instance_uid)

N-GET

send_n_get(identifier_list, class_uid, instance_uid)

N-SET

send_n_set(dataset, class_uid, instance_uid)

Where dataset is a pydicom Dataset object, identifier_list is a list of pydicom Tag objects, event_type and action_type are ints and class_uid and instance_uid are UID strings. See the Association documentation for more information.

Supported DIMSE SCP Services

When the AE is acting as an SCP the following DIMSE-C and -N services are available to the peer once an association has been established:

DIMSE service

Intervention Event

C-ECHO

evt.EVT_C_ECHO

C-FIND

evt.EVT_C_FIND

C-GET

evt.EVT_C_GET

C-MOVE

evt.EVT_C_MOVE

C-STORE

evt.EVT_C_STORE

N-CREATE

evt.EVT_N_CREATE

N-EVENT-REPORT

evt.EVT_N_EVENT_REPORT

N-GET

evt.EVT_N_GET

N-SET

evt.EVT_N_SET

With the exception of the C-ECHO service, a user-defined handler must be bound to the corresponding intervention event in order to complete a DIMSE service request. Events can be imported with from pynetdicom import evt and a handler can be bound to an event prior to starting an association through the evt_handlers keyword parameters in AE.start_server() and AE.associate().

When an event occurs the handler function is called and passed a single parameter, event, which is an evt.Event object whose specific attributes are dependent on the type of event that occurred. Handlers bound to intervention events must return or yield certain values. See the handler documentation for information on what attributes and properties are available in Event for each event type and the expected returns/yields for the corresponding handlers.

Documentation

The pynetdicom user guide, code examples and API reference documentation is available for the current release as well as the development version.

Installation

Dependencies

pydicom

Installing current release

$ pip install pynetdicom

Installing development version

$ pip install git+git://github.com/pydicom/pynetdicom.git

Examples

Send a DICOM C-ECHO to a peer Verification SCP (at TCP/IP address addr, listen port number port):

from pynetdicom import AE

ae = AE(ae_title=b'MY_ECHO_SCU')
# Verification SOP Class has a UID of 1.2.840.10008.1.1
#   we can use the UID string directly when requesting the presentation
#   contexts we want to use in the association
ae.add_requested_context('1.2.840.10008.1.1')

# Associate with a peer DICOM AE
assoc = ae.associate(addr, port)

if assoc.is_established:
    # Send a DIMSE C-ECHO request to the peer
    # `status` is a pydicom Dataset object with (at a minimum) a
    #   (0000,0900) Status element
    # If the peer hasn't accepted the requested context then this
    #   will raise a RuntimeError exception
    status = assoc.send_c_echo()

    # Output the response from the peer
    if status:
        print('C-ECHO Response: 0x{0:04x}'.format(status.Status))

    # Release the association
    assoc.release()

Create a blocking DICOM C-ECHO listen SCP on port 11112 (you may optionally bind a handler to the evt.EVT_C_ECHO event if you want to return something other than a Success status):

from pynetdicom import AE, VerificationPresentationContexts

ae = AE(ae_title=b'MY_ECHO_SCP')
# Or we can use the inbuilt VerificationPresentationContexts list,
#   there's one for each of the supported Service Classes
# In this case, we are supporting any requests to use Verification SOP
#   Class in the association
ae.supported_contexts = VerificationPresentationContexts

# Start the SCP on (host, port) in blocking mode
ae.start_server(('', 11112), block=True)

Alternatively, you can start the SCP in non-blocking mode, which returns the running server instance. This can be useful when you want to run a Storage SCP and make C-MOVE requests within the same AE. In the next example we’ll create a non-blocking Verification SCP and bind a handler for the C-ECHO service request event evt.EVT_C_ECHO that logs the requestor’s address and port number and the timestamp for the event.

import logging

from pynetdicom import AE, evt, VerificationPresentationContexts, debug_logger

# Setup logging to use the StreamHandler at the debug level
debug_logger()
LOGGER = logging.getLogger('pynetdicom')

ae = AE(ae_title=b'MY_ECHO_SCP')
ae.supported_contexts = VerificationPresentationContexts

# Implement the EVT_C_ECHO handler
def handle_echo(event):
    """Handle a C-ECHO service request.

    Parameters
    ----------
    event : evt.Event
        The C-ECHO service request event.

    Returns
    -------
    int or pydicom.dataset.Dataset
        The status returned to the peer AE in the C-ECHO response.
        Must be a valid C-ECHO status value as either an ``int`` or a
        ``Dataset`` object containing an (0000,0900) *Status* element.
    """
    # Every *Event* includes `assoc` and `timestamp` attributes
    #   which are the *Association* instance the event occurred in
    #   and the *datetime.datetime* the event occurred at
    requestor = event.assoc.requestor
    timestamp = event.timestamp.strftime("%Y-%m-%d %H:%M:%S")
    msg = (
        "Received C-ECHO service request from ({}, {}) at {}"
        .format(requestor.address, requestor.port, timestamp)
    )
    LOGGER.info(msg)

    # Return a *Success* status
    return 0x0000

handlers = [(evt.EVT_C_ECHO, handle_echo)]

# Start the SCP in non-blocking mode
scp = ae.start_server(('', 11112), block=False, evt_handlers=handlers)

# Send a C-ECHO request to our own Verification SCP
ae.add_requested_context('1.2.840.10008.1.1')
assoc = ae.associate('localhost', 11112)
if assoc.is_established:
    status = assoc.send_c_echo()
    assoc.release()

# Shutdown the SCP
scp.shutdown()

Send the DICOM CT Image Storage dataset in file-in.dcm to a peer Storage SCP (at TCP/IP address addr, listen port number port):

from pydicom import dcmread
from pydicom.uid import ImplicitVRLittleEndian

from pynetdicom import AE, VerificationPresentationContexts
from pynetdicom.sop_class import CTImageStorage, MRImageStorage

ae = AE(ae_title=b'MY_STORAGE_SCU')
# We can also do the same thing with the requested contexts
ae.requested_contexts = VerificationPresentationContexts
# Or we can use inbuilt objects like CTImageStorage.
# The requested presentation context's transfer syntaxes can also
#   be specified using a str/UID or list of str/UIDs
ae.add_requested_context(CTImageStorage,
                         transfer_syntax=ImplicitVRLittleEndian)
# Adding a presentation context with multiple transfer syntaxes
ae.add_requested_context(MRImageStorage,
                         transfer_syntax=[ImplicitVRLittleEndian,
                                          '1.2.840.10008.1.2.1'])

assoc = ae.associate(addr, port)
if assoc.is_established:
    dataset = dcmread('file-in.dcm')
    # `status` is the response from the peer to the store request
    # but may be an empty pydicom Dataset if the peer timed out or
    # sent an invalid dataset.
    status = assoc.send_c_store(dataset)

    assoc.release()

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

pynetdicom-1.3.1.tar.gz (1.5 MB view details)

Uploaded Source

Built Distribution

pynetdicom-1.3.1-py2.py3-none-any.whl (1.5 MB view details)

Uploaded Python 2 Python 3

File details

Details for the file pynetdicom-1.3.1.tar.gz.

File metadata

  • Download URL: pynetdicom-1.3.1.tar.gz
  • Upload date:
  • Size: 1.5 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.12.1 pkginfo/1.4.2 requests/2.21.0 setuptools/40.6.3 requests-toolbelt/0.8.0 tqdm/4.28.1 CPython/3.5.4

File hashes

Hashes for pynetdicom-1.3.1.tar.gz
Algorithm Hash digest
SHA256 3f40a54c668e7f88b70f5a331c00dc74221b87916563e02f1d62178555b592d4
MD5 7d1db06f582186a41756858c19937518
BLAKE2b-256 e86c7585b31f6c626350364df143291473d3bfd51ad65ceecde7564024997dd7

See more details on using hashes here.

File details

Details for the file pynetdicom-1.3.1-py2.py3-none-any.whl.

File metadata

  • Download URL: pynetdicom-1.3.1-py2.py3-none-any.whl
  • Upload date:
  • Size: 1.5 MB
  • Tags: Python 2, Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.12.1 pkginfo/1.4.2 requests/2.21.0 setuptools/40.6.3 requests-toolbelt/0.8.0 tqdm/4.28.1 CPython/3.5.4

File hashes

Hashes for pynetdicom-1.3.1-py2.py3-none-any.whl
Algorithm Hash digest
SHA256 65749cec5a877c8bac5958e70e66cd4c4fa96f40b743c485f82afe87b98c8123
MD5 d8e2bd26c067322ecda144a89491c432
BLAKE2b-256 9c9788c97af3278b6ebc4f932c33d2560478e1af70fe3b7271e6a4a6ccca638c

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page