|
|
Goals, or possibly conflicting forces to resolve:
- Accessibility -- pathways to resources
Criteria: 24x7x365 access
functionality
adequate, pertinent, flexible
performance
adequate to support peak usage
monitorability
unmodifiable, unobtrusive
currency
stable (latest stable releases (per quarter and budget))
manageability
moderate (standardized, organized, institutionalized)
maintainability
high (planned, documented, automated, tested)
service
responsive, reliable, timely, informative, effective
scalability
moderate
- Security -- authentication, authorization and crime avoidance
Criteria: constant vigilance with adequate maintenance
- There will never be enough resources to effectively address all concerns.
Consequently, must put forth a best-effort in light of all other work to do
with limited human resources.
- All students, faculty and staff must have a valid UW Net ID as a means of
authentication.
Other official ID (e.g., driver's license, student ID card,
Husky card, etc.) may suffice to prove identity.
- Login accounts use the UW Net ID as the account ID.
They are created from class lists, on demand by students not on current
class lists with proper ID, or
by special request from faculty and staff. In all cases, there must be
an academic reason and a tie-in to a UW-sponsored activity to justify account
creation.
Login accounts are rarely shared (see guest accounts
for the one exception) to ensure accountability.
Login accounts are disabled and may be deleted
for reasons of:
- abuse of lab resources,
- inactivity over more than two quarters,
- academic program change,
- academic program drop or graduation
The user is responsible for backing up all files prior to leaving the program
for any reason.
- Guest login accounts have limited access.
They are used for people who aren't yet in the system (e.g., assessment tests for
potential students) or who may never be (e.g., a special group of people who
are being shown the capabilities of the labs). If possible, the login times
are restricted and the account is set to expire on the last day of use. Further
restrictions may also apply.
- Groups are used to ease security authorization management.
Some groups of users require login accounts. Since login accounts should not
be shared, the name of the group should not conflict with current and future
UW Net IDs. That is, group names should avoid the user namespace.
If group accounts are needed, it is usually for sharing files and using the
name for a common reference. Therefore, login access is not required as long
as the members of the group have read/write access to the group login's file
space.
Groups should probably also be used for databases, although the mechanism used
in a DBMS is often incompatible with the mechanism with the OS.
- Access to production servers or control rooms requires authorization and a key.
Both malicious and inadvertent disruption of service can be mitigated this way.
Servers must be protected from network attacks. Power outages and
other environmental sources of disruption should also be considered,
subject to cost and criticality.
Clear labelling and instructions can help
avoid inadvertent disruption in a control room.
- All keys must be returned on demand or prior to the exit of the student
from the academic program.
- Anything of value that is easily transportable must be locked down.
This is more of a deterrent than a guarantee of keeping it in our possession.
- Anything of low value that you wish to remain in one place should be locked down.
This keeps the resource (e.g., books, staplers) in the desired location, making it
easier for users to locate the resource. There is a tradeoff here between the cost
of securing an item and the inconvenience of a roaming location for it.
- Availability -- keeping the system up and operational
- Production Server Criteria: 99.9% uptime (down 10 minutes per week)
Guaranteeing this is subject to having the correct hardware and stable campus
infrastructure (e.g., electrical power).
Data availability is critical, and the production servers that allow a user
to access his/her data will have the most resources devoted to them.
- Workstation Criteria: 98% during a quarter and 50% during a break
Workstations are typically nearly-identical copies. So when a workstation
becomes unavailable, a user may choose to find another unused one on which
to work.
Workstations get re-imaged during breaks, which accounts for the significant
drop in uptime.
- Printer Criteria: none
Printing is free in the labs, and is considered a privilege and convenience vs.
a requirement. Since all printers in general labs are available for use, if
one fails, there is often another that can be used. As printers get specialized
(e.g., color printers or wide-format printers), there may not be any redundant
lab resource to switch to. Options then may include the Copy Centers.
- Network Criteria: 99.9% uptime, to the extent it is under lab control
The UW Computing & Communications Department manages the network in most buildings
once the network cable plugs into the wall.
- Connectivity -- internet/intranet/extranet/micronets as well as hardware interfacing
- Network Criteria: fixed, roaming, discoverable
- "Fixed" means an existing port on the network (usually, a hub).
- "Roaming" means a wireless connection on the campus network
- "Discoverable" means a wireless connection on a lab network
(usually for small devices)
- Interfacing Criteria: in specially designated areas only
- PDA cradles
- USB ports
- Firewire ports
- Video ports
- Audio ports
- Microphone ports
- Gameports/MIDI ports
- serial/parallel ports
- SCSI ports
- additional network ports
- infrared ports
- modem ports
- CompactFlash/SmartCard/Memory Stick/PC Card box
- removable hard drive tray
- removable media (floppy/Zip/CD/tape?)
- Currency -- degree of being up-to-date
- Functionality -- the end use of lab resources as well as the operational infrastructure
- Manageability -- meta-concerns: policies, standards, procedures
- Maintainability -- degree of ease of fixing, upgrading, adding and deleting resources
- Security -- protect data and operations and recover from attacks
- Customer Service -- quality of service to customers
- Performance -- efficiency of use of resources
- Scalability -- ability to expand or contract amount of resources per demand
Hours
|
Support Information
|
News
|
Policies
|
Emergencies
|