Service Priorities
These are thoughts on what we prioritize or value for the Wi-Fi service specifically. This is not the core values set in the IT Strategic Plan, but is (in part) an extension of them, as it applies to specifically the Wi-Fi service. This is closely related to the AUAs, but is more general / broadly scoped in nature.
Key insights
- Our users set the expectations for the service.
- Our priorities are defined by the expectations.
- The priorities drive the features and properties of the system.
- All of this is constrained and guided by our core values.
What this looks like for Wi-Fi
Expectations
- Ubiquitous and seamless coverage
- Reliable access
- High bandwidth
- Reasonable latency
Priorities
- Robust
- Systems stay up
- Systems continue to provide service when they are up
- Systems are fault tolerant
- Debugable
- Flexible
- Well understood and solved problems should be solved out of the box
- The system should easily accommodate new ideas or deployments not considered by the vendor.
- Secure
- Coherent architecture
Properties
User end
- Frictionless access
- Latest standards
- Dual stacked now
- Single stack IPv6 limitations are external
Administrator end
- Fault tolerant
- Hardware should be able to fail without impacting users
- Replacing hardware should be low risk and (relatively) low effort
- API driven
- Complete
- Idempotent
- Single stacked IPv6
- IPv6 Addresses are not strings
- Fixing one part of the system should not depend another part of the system
- Centralized (or perhaps intent based) config (within what is allowed due to above)
- Integrated monitoring
- Observable
- Is the system itself healthy?
- What is the user facing status?
- Do I have the tools to see what is going on under the covers?
- Do I have tools to identify an unknown unknown problem?
- Configuration that is difficult (preferably impossible) to get out of sync.
- (Flexible)
- Sane defaults
- Extensive options
- Building-block config
- Clear and consistent mental model to the config
- Split control plane and data plane
- OOB access
- Key/cert based access
- Idempotent API/Config
- Auditable config
- Usable config system
- Easily spun up
- Lab purposes
- Ransomware recovery
- Life cycle
- Replacing hardware
- Hardware available
- Can the vendor do business?
- Is the vendor able to ship hardware?
- Can the vendor tell us how much we owe in support (in a reasonable time frame)?
- Can we predict how much we owe and what items we need?
Other notes / questions
- Ask for a packet walkthrough
See also
- IT Strategic Plan
- Strategic Recommendations for Cloud Computing
- Bryan Cantrill talks about priorities of Programming Languages (he calls them values, and what we call values he calls principles).