NIH Enterprise Architecture Home

Artifact Type: Brick

NIH standards that specify products, technologies, or protocols in use or planned, as well as those earmarked to be retired or contained.

Technology Architecture

Brick: 65 related definitions

Brick

Access Control Brick:
Logical access control within NIH is provided at the network, operating system, and application level. Network Access Control. Network access controls...
Access Router/Switch Brick:
Access routers and switches connect subnets to the distribution layer. In some cases, the access router/switch functionality is combined with the distribution...
Application Server Brick:
An application server is a modern form of platform middleware. It is system software that resides between the operating system on one side, and the external...
Availability - Application Management Brick:
Availability - Application Management is the monitoring, collecting and correlating performance, event and availability statistics to predict and, thus,...
Availability - Database Management Brick:
Availability - Database Management is collecting and correlating performance, event and availability statistics to predict and, thus, avoid potential downtime...
Availability - Server Management Brick:
Availability - Server Management is collecting and correlating performance, event and availability statistics to predict and, thus, avoid potential downtime...
Availability - Storage Management Brick:
Availability - Storage Management is collecting and correlating performance, event and availability statistics to predict and, thus, avoid potential downtime...
Availability Management - Network Brick:
Network management includes the administrative services performed in managing NIHnet and the Institute and Center (IC) networks, including network devices,...
Communication Middleware Brick:
Communication middleware helps programs talk to other programs. It is software that supports a protocol for transmitting messages or data between two points...
Communications Protocol Brick:
Communications protocols define the rules for sending blocks of data from one node in the network to another node and are normally defined in layers. A...
Confidentiality Brick:
The primary method of protecting confidentiality of information is via encryption. In addition to sensitive business data, there is also data about the...
Configuration Management Software Brick:
Configuration Management is the documentation and management of the technical elements and relationships in the IT infrastructure, application and business...
Controller Area Network (CAN)/Multi Area Network (MAN)/Wide Area Network (WAN) Optical Networking Brick:
The Controller Area Network (CAN)/Multi Area Network (MAN)/Wide Area Network (WAN) Optical Networking Brick addresses optical networking when implemented...
Controller Area Network (CAN)/Multi Area Network (MAN)/Wide Area Network (WAN) Transport Brick:
NIH has migrated from an asynchronous transfer mode (ATM) backbone to a Gigabit Ethernet fiber backbone in the Controller Area Network (CAN) environment...
Core Router Brick:
Core routers are part of the backbone, which also contains all the high-speed transport media. This layer does not provide any packet manipulation.
Data Management Middleware Brick:
Data management middleware functionality helps programs, including application programs and database management systems (DBMS), read from and write to...
Data Warehouse (DW) Database Server Brick:
Data Warehouse (DW) database functional requirements are different than Online Transaction Processing (OLTP) Database Management Sytems (DBMS) in that...
Desktop Web Conferencing Brick:
Desktop Web Conferencing is defined as applications that enable Internet-based synchronous, real-time meetings with participants in multiple, geographically...
Digital Identity/Public Key Infrastructure (PKI) Brick:
Digital Signature systems are defined as applications that provide identification and storage of digital signatures along with validation against a centrally...
Distribution Router/Switch Brick:
Distribution routers and switches connect the access layer to the backbone network. The distribution layer directs and filters traffic between access layer...
Document Imaging Brick:
Document imaging devices can be standalone or embedded into the organization’s existing, fax, copy or duplication systems. Imaging systems take existing...
Document Management Tools Brick:
Document management includes software systems that allow enterprises to generate, produce, store, manage, retrieve, and distribute electronic files (e.g....
Email Client Operating Systems (OSs) Brick:
Email client operating systems (OSs) allocate system resources at individual workstations in support of NIH's enterprise email applications.
Email Server Operating Systems (OSs) Brick:
Email server operating systems (OSs) allocate system resources for the computers (servers) that run NIH's enterprise electronic mail applications.
Enterprise and Mid-Range Server Operating System Brick:
Enterprise servers consist of the platform hardware and the operating system that together support the operating environment to support application and...
Enterprise and Mid-Range Server Platform Processor Brick:
Enterprise servers consist of the platform hardware and the operating system that together support the operating environment to support application and...
Enterprise Directories Brick:
Enterprise directories list and/or describe users and services on the NIH network and are typically used in conjunction with the enterprise messaging ...
Enterprise Reporting Tools Brick:
An enterprise reporting tool is one that allows NIH to gain a better understanding of its operations by putting critical information in the hands of all...
Event Management - MOM Brick:
Enterprise event management (MoM) systems support the acceptance of events from elements in the IT infrastructure; consolidate, filter and correlate those...
Event Monitoring and Analysis Brick:
Vulnerability Analysis. Internet-based attack tools are becoming increasingly sophisticated and increasingly easy to use. NIH's network could contain vulnerabilities...
File Transfer Middleware Brick:
File Transfer Middleware is a class of communication middleware specifically focusing on the transfer of files from application to application. The transfer...
Gateways Brick:
There are two types of gateways: 1. Database gateways enable access to heterogeneous Database Management Systems (DBMS), usually through a common Structured...
Identification and Authentication Brick:
This standard establishes NIH Login as the required method of implementing authentication in web-based applications at the NIH. Authenticated identities...
Instant Messaging Client Brick:
The Instant Messaging (IM) Client is the user’s desktop-resident software that enables users to send short, text-based messages or files to other users....
Instant Messaging Server Brick:
The Instant Messaging (IM) Server is the application software that enables users to send short, text-based messages or files to other users. The server...
Integration Adapters Brick:
Adapters are some combination of design tools and runtime software that act as glue to link applications, which are considered "sources" or "targets" (or...
Integration Broker Suites (IBS) Brick:
An integration broker is a third-party intermediary that facilitates interactions among application systems. By definition, the broker itself provides...
Integrity Brick:
Anti-Virus. An effective anti-virus architecture uses a multi-tier (that is, desktop, server, and gateway) approach and is not necessarily reliant on a...
Intrusion Detection Brick:
Vulnerability Analysis. Internet-based attack tools are becoming increasingly sophisticated and increasingly easy to use. NIH's network could contain vulnerabilities...
Local Area Network (LAN) Cabling Brick:
Structured cabling standards have been developed and published by NIH. Figure 2 and Figure 3 in the Patterns section of this report illustrate a high-level...
Messaging Client Software Brick:
Messaging client software includes applications that run on workstations and enable peer-to-peer, asynchronous communications.
Messaging Protocols Brick:
Messaging protocols are the formal specifications that define data exchange procedures.
Messaging Servers Brick:
Messaging servers are enterprise applications that run on a central computer and enable synchronous and asynchronous, peer-to-peer communications.
Network Load Balancing Server Brick:
This brick shows NIH’s direction for network load balancers that allow server workload to be distributed across multiple servers for greater end-to-end...
NIH Federated Identity - Authentication / Authorization Brick:
The goal of NIH’s Federated Identity service is to give a person the ability to use the same user name, password, or other personal identification to access...
NIH Federated Identity - Identity Provider Brick:
The goal of NIH’s Federated Identity service is to give a person the ability to use the same user name, password, or other personal identification to access...
NIH Federated Identity - Protocols Brick:
The goal of NIH’s Federated Identity service is to give a person the ability to use the same user name, password, or other personal identification to access...
Online Transaction Processing (OLTP) Database Server Brick:
The Online Transaction Processing (OLTP) database market is defined by products that are suitable for a broad range of enterprise-level real time applications,...
Performance Management Tools Brick:
Performance Management is the trending of end-to-end response time and performance parameters from network, system and application components to predict...
Problem Management Tools Brick:
Problem Management is identifying, quickly resolving and preventing problems through root cause analysis and tracking. Problem management involves identifying...
Remote Access Technology Brick:
Remote access provides the ability to connect to the network from a distant location. This requires a computer, a modem and remote access software to allow...
Resource Scheduling Brick:
Resource Scheduling is a utility or feature that facilitates commitment of any resource(s) (person, room, office, subjects, equipment, etc.) for either...
Search Engines Brick:
A search engine includes a robot or crawler that goes to every page or representative pages on a Website, or the whole Web, and creates an index. It also...
Secure Email Brick:
Secure email is a method of establishing trust and securing email communications and attachments exchanged between NIH and external users. The technology...
Shared Virtual Workspace Brick:
Shared virtual workspaces are team-oriented collaboration tools that provide services for sharing files and supporting asynchronous and real-time collaboration...
Staff Digital Certificate Brick:
A Staff Digital Certificate is a digital certificate that is issued to an individual staff member of NIH. A staff member is defined as anyone who possesses...
Video Teleconferencing (VTC) Technology Brick:
Video teleconferencing technology allows two or more people at different locations to see and hear each other simultaneously, often times even sharing...
Vulnerability Tools Brick:
Vulnerability Analysis. Internet-based attack tools are becoming increasingly sophisticated and increasingly easy to use. NIH's network could contain vulnerabilities...
Web Browsers Brick:
Web browsers are programs that “read” hypertext and display it as formatted text and images. Browsers allow users to view the contents of a site and navigate...
Web Content Management System Brick:
Web Content Management Systems (WCMS) consist of applications used to create, manage, store and deploy content on the Web, including text, graphics, video...
Web Server Brick:
Web servers are software that serve as engines which run websites. Through a Web listener, they accept HTTP (non-encrypted) and HTTPS (encrypted) connections...
Web Services Brick:
Web services are not really a technology; they represent software components and a common set of standards supported by multiple, different technologies...
Wireless LAN Brick:
The role of a wireless LAN is to extend network coverage to allow for in-building or campus communication for mobile users; wireless LAN (WLAN) equipment...
Workflow/Business Process Management (BPM) Tools Brick:
Business Process Management (BPM) is a general term describing a set of services and tools that provide for explicit BPM (for example, process analysis,...
Workgroup/Server Switch Brick:
The workgroup and server switches provide connectivity to and between workstations and servers, respectively, within a network segment.

Go to top Go to top