NIH standards that specify products, technologies, or protocols in use or planned, as well as those earmarked to be retired or contained.
Technology Architecture
Brick:79 related definitions
Brick
-
Access Router/Switch Brick:
-
Access routers and switches connect subnets to the distribution layer. In some cases, the access router/switch functionality is combined with the....
-
Application Server Brick:
-
An application server is a modern form of platform middleware. It is system software that resides between the operating system on one side, and the....
-
Availability - Application Management Brick:
-
Availability - Application Management is the monitoring, collecting and correlating performance, event and availability statistics to predict and,....
-
Availability - Database Management Brick:
-
Availability - Database Management is collecting and correlating performance, event and availability statistics to predict and, thus, avoid potential....
-
Availability - Server Management Brick:
-
Availability - Server Management is collecting and correlating performance, event and availability statistics to predict and, thus, avoid potential....
-
Availability - Storage Management Brick:
-
Availability - Storage Management is collecting and correlating performance, event and availability statistics to predict and, thus, avoid potential....
-
Availability Management - Network Brick:
-
Network management includes the administrative services performed in managing NIHnet and the Institute and Center (IC) networks, including network....
-
Campus Area Network (CAN) Brick:
-
A Campus Area Network (CAN) is a computer network that interconnects Local Area Networks (LAN) throughout a limited geographical area, such as a....
-
Communication Middleware Brick:
-
Communication middleware helps programs talk to other programs. It is software that supports a protocol for transmitting messages or data between two....
-
Communications Protocol Brick:
-
Communications protocols define the rules for sending blocks of data from one node in the network to another node and are normally defined in layers.....
-
Configuration Management Software Brick:
-
Configuration Management is the documentation and management of the technical elements and relationships in the IT infrastructure, application and....
-
Controller Area Network (CAN)/ Multi Area Network (MAN)/ Wide Area Network (WAN) Transport Brick:
-
NIH has migrated from an asynchronous transfer mode (ATM) backbone to a Gigabit Ethernet fiber backbone in the Controller Area Network (CAN)....
-
Core Router Brick:
-
Core routers are part of the backbone, which also contains all the high-speed transport media. This layer does not provide any packet manipulation.
-
Data Management Middleware Brick:
-
Data management middleware functionality helps programs, including application programs and database management systems (DBMS), read from and write....
-
Data Warehouse (DW) Database Server Brick:
-
Data Warehouse (DW) database functional requirements are different than Online Transaction Processing (OLTP) Database Management Sytems (DBMS) in....
-
Desktop Web Conferencing Brick:
-
Desktop Web Conferencing is defined as applications that enable Internet-based synchronous, real-time meetings with participants in multiple,....
-
Digital Identity/Public Key Infrastructure (PKI) Brick:
-
Digital Signature systems are defined as applications that provide identification and storage of digital signatures along with validation against a....
-
Distribution Router/Switch Brick:
-
Distribution routers and switches connect the access layer to the backbone network. The distribution layer directs and filters traffic between access....
-
Document Imaging Brick:
-
Document imaging devices can be standalone or embedded into the organization’s existing, fax, copy or duplication systems. Imaging systems take....
-
Document Management Tools Brick:
-
Document management includes software systems that allow enterprises to generate, produce, store, manage, retrieve, and distribute electronic files....
-
Email Client Software Brick:
-
Messaging client software includes applications that run on workstations and enable peer-to-peer, asynchronous communications.
-
Email Servers Software Brick:
-
Messaging servers are enterprise applications that run on a central computer and enable synchronous and asynchronous, peer-to-peer communications.
-
Enterprise and Mid-Range Server Operating System Brick:
-
Enterprise servers consist of the platform hardware and the operating system that together support the operating environment to support application....
-
Enterprise and Mid-Range Server Platform Processor Brick:
-
Enterprise servers consist of the platform hardware and the operating system that together support the operating environment to support application....
-
Enterprise Directories Brick:
-
Enterprise directories list and/or describe users and services on the NIH network and are typically used in conjunction with the enterprise messaging....
-
Enterprise Reporting Tools Brick:
-
An enterprise reporting tool is one that allows NIH to gain a better understanding of its operations by putting critical information in the hands of....
-
Event Management - MOM Brick:
-
Enterprise event management (MoM) systems support the acceptance of events from elements in the IT infrastructure; consolidate, filter and correlate....
-
File Transfer Middleware Brick:
-
File Transfer Middleware is a class of communication middleware specifically focusing on the transfer of files from application to application. The....
-
Gateways Brick:
-
There are two types of gateways:
1. Database gateways enable access to heterogeneous Database Management Systems (DBMS), usually through a common....
-
Geographic Information System Desktop Brick:
-
GIS Desktop applications allow a user to create, display, analyze, query and publish geographic data via desktop. Normal use-case scenario of this....
-
Geographic Information System Internet Mapping Server (IMS) Brick:
-
GIS Internet Mapping Server allows a user to serve geographic data and in-house reference layer(s) via the internet.
Normal use-case scenario....
-
Geographic Information System Virtual Globe Brick:
-
GIS Virtual Globe applications allow the user to navigate around a 3D representation of the earth, and supports creation and display of features on....
-
Geographic Information System Web Service Brick:
-
GIS Web Service allows a user to display geographic data over third-party reference layer(s) accessed via the internet.
Normal use-case....
-
Identification and Authentication Brick:
-
This standard establishes NIH Login as the required method of implementing authentication in web-based applications at the NIH. Authenticated....
-
Integration Adapters Brick:
-
Adapters are some combination of design tools and runtime software that act as glue to link applications, which are considered "sources" or....
-
Integration Broker Suites (IBS) Brick:
-
An integration broker is a third-party intermediary that facilitates interactions among application systems. By definition, the broker itself....
-
Internet/Extranet Desktop Client Web Browsers Brick :
-
Web browsers are programs that “read” hypertext and display it as formatted text and images. Browsers allow users to view the contents of a site and....
-
Internet/Extranet Mobile Client Web Browsers Brick:
-
Web browsers are programs that “read” hypertext and display it as formatted text and images. Browsers allow users to view the contents of a....
-
Intranet/Employee Desktop Client Web Browsers Brick:
-
Web browsers are programs that “read” hypertext and display it as formatted text and images. Browsers allow users to view the contents of a site and....
-
Intranet/Employee Mobile Client Web Browsers Brick:
-
Web browsers are programs that “read” hypertext and display it as formatted text and images. Browsers allow users to view the contents of a....
-
Intrusion Detection Brick:
-
Vulnerability Analysis. Internet-based attack tools are becoming increasingly sophisticated and increasingly easy to use. NIH's network could contain....
-
IT Service Desk Tools Brick:
-
IT Service Management involves identifying, quickly resolving and preventing problems through root cause analysis and tracking. IT Service Management....
-
Local Area Network (LAN) Cabling Brick:
-
Structured cabling standards have been developed and published by NIH. Figure 2 and Figure 3 in the Patterns section of this report illustrate a....
-
Messaging Protocols Brick:
-
Messaging protocols are the formal specifications that define data exchange procedures.
-
Metropolitan Area Network (MAN):
-
A Campus Area Network (CAN) is a computer network that interconnects Local Area Networks (LAN) throughout a limited geographical area, such as a....
-
Network Access Control Brick:
-
Network Access Control will be used to enforce authentication, compliance, and remediation policy for every device that connects to the NIH....
-
Network Load Balancing Server Brick:
-
This brick shows NIH’s direction for network load balancers that allow server workload to be distributed across multiple servers for greater....
-
NIH Federated Identity - Authentication / Authorization Brick:
-
The goal of NIH’s Federated Identity service is to give a person the ability to use the same user name, password, or other personal identification to....
-
NIH Federated Identity - Identity Provider Brick:
-
The goal of NIH’s Federated Identity service is to give a person the ability to use the same user name, password, or other personal identification to....
-
NIH Federated Identity - Protocols Brick:
-
The goal of NIH’s Federated Identity service is to give a person the ability to use the same user name, password, or other personal identification to....
-
Online Transaction Processing (OLTP) Database Server Brick:
-
The Online Transaction Processing (OLTP) database market is defined by products that are suitable for a broad range of enterprise-level real time....
-
Performance Management Tools Brick:
-
Performance Management is the trending of end-to-end response time and performance parameters from network, system and application components to....
-
Remote Network Access Technology Brick:
-
Remote access provides the ability to connect to the network from a distant location. This requires a computer, a modem and remote access software to....
-
Resource Scheduling Brick:
-
Resource Scheduling is a utility or feature that facilitates commitment of any resource(s) (person, room, office, subjects, equipment, etc.) for....
-
RETIRED - Access Control Brick:
-
This topic has been determined as too broad for one document or standard to properly address and reconcile. As such, we feel we can archive this....
-
RETIRED - Confidentiality Brick:
-
This topic has been determined as too broad for one document or standard to properly address and reconcile. As such, we feel we can archive this....
-
RETIRED - Controller Area Network (CAN)/Multi Area Network (MAN)/Wide Area Network (WAN) Optical Networking Brick:
-
The Controller Area Network (CAN)/Multi Area Network (MAN)/Wide Area Network (WAN) Optical Networking Brick addresses optical networking when....
-
RETIRED - Email Client Operating Systems (OSs) Brick:
-
This standard is obsoleted by the Email Client Software Brick.
Email client operating systems (OSs) allocate system resources at individual....
-
RETIRED - Email Server Operating Systems (OSs) Brick:
-
This standard is obsoleted by the Email Servers Software Brick.
Email server operating systems (OSs) allocate system resources for the....
-
RETIRED - Event Monitoring and Analysis Brick:
-
This topic has been determined as too broad for one document or standard to properly address and reconcile. As such, we feel we can archive this....
-
RETIRED - Instant Messaging Client Brick:
-
The Instant Messaging (IM) Client is the user’s desktop-resident software that enables users to send short, text-based messages or files to other....
-
RETIRED - Integrity Brick:
-
This topic has been determined as too broad for one document or standard to properly address and reconcile. As such, we feel we can archive this....
-
RETIRED - Video Teleconferencing (VTC) Technology Brick:
-
Video teleconferencing technology allows two or more people at different locations to see and hear each other simultaneously, often times even....
-
Search Engines Brick:
-
A search engine includes a robot or crawler that goes to every page or representative pages on a Website, or the whole Web, and creates an index. It....
-
Secure Email Brick:
-
Secure email is a method of establishing trust and securing email communications and attachments exchanged between NIH and external users.
The....
-
Shared Virtual Workspace Brick:
-
Shared virtual workspaces are team-oriented collaboration tools that provide services for sharing files and supporting asynchronous and real-time....
-
Staff Digital Certificate Brick:
-
A Staff Digital Certificate is a digital certificate that is issued to an individual staff member of NIH. A staff member is defined as anyone who....
-
Unified Communications - Conferencing Communications:
-
The purpose of this brick is to define the technologies that provide conferencing capabilities to the NIH. This capability allows....
-
Unified Communications - EndPoints Brick:
-
The purpose of this brick is to define the technologies that serve as endpoints for multiple UC capabilities described in the previous bricks.....
-
Unified Communications - Voice Communications:
-
The purpose of this brick is to define the technologies that provide telephony or other voice communications (voice messaging) to the NIH. ....
-
Unified Communications Instant Messaging and Presence Brick:
-
The purpose of this brick is to define the technologies that provide instant messaging and presence capabilities to the NIH. This capability....
-
Vulnerability Tools Brick:
-
Vulnerability Analysis. Internet-based attack tools are becoming increasingly sophisticated and increasingly easy to use. NIH's network could contain....
-
Web Content Management Systems Brick:
-
Web Content Management Systems (WCMS) consist of applications used to create, manage, store and deploy content on the Web, including text,....
-
Web Server Brick:
-
Web servers are software that serve as engines which run websites. Through a Web listener, they accept HTTP (non-encrypted) and HTTPS (encrypted)....
-
Web Services Brick:
-
Web services are not really a technology; they represent software components and a common set of standards supported by multiple, different....
-
Wide Area Network (WAN) Brick:
-
A wide area network (WAN) is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional,....
-
Wireless Local Area Network (WLAN) Brick:
-
The role of a wireless local area network (WLAN) is to extend network coverage to allow for in-building or campus communication for mobile....
-
Workflow/Business Process Management (BPM) Tools Brick:
-
Business Process Management (BPM) is a general term describing a set of services and tools that provide for explicit BPM (for example, process....
-
Workgroup/Server Switch Brick:
-
The workgroup and server switches provide connectivity to and between workstations and servers, respectively, within a network segment.
Go to top