STAR ARMY

Sci-fi roleplaying and worldbuilding community

User Tools

Site Tools


Action disabled: revisions
corp:emrys:sync_nodes

SYNC Node

SYNC Logo

The SYNC is built upon nodes. There are three types of nodes and each performs several roles.

Common Facets

Heuristic encryption, capable of accessing and using any communications channel available. Also capable of determining the appropriate channel to use for optimum efficiency. Regardless of operation all Nodes interact with the other local nodes. They also maintain logs of all transactions that have passed through.

Primary Node

A primary node is responsible for controlling and routing all network traffic through it. Typically a single Primary node is sufficient for a location with a population of 100 million users. The node monitors all activity within it, and stores in in logs. Capacity can be increased by using one or more Secondary nodes in Load Balancing mode.

  • Normal operation - monitors work load, adjusting routing based on prior load cycles. Engages secondary nodes as needed.
  • Maintenance - when the node detects a serious fault that impacts system integrity and performance it transfers control to its paired Secondary node.
  • Security - manually initiated the node performs its normal duties, but looks for specific activities provided when the mode is activated. This can be looking for specific ID's or communications to specific addresses, locations, etc. It can only be initiated by the Yamatai National Police, Yamatai Security Agency with due cause. Any activity that meets the specified criteria is forwarded to the respective agency.

Secondary

Secondary nodes are always present with a primary node. They serve as a fallback resource, and extra bandwidth when needed.

  • Maintenance - node goes into Maintenance mode when the Primary unit goes off-line for servicing, or failure. Maintenance mode trigged by a fault sends a message to SYNC Systems, and then assumes control of the location traffic. Until the primary node is restored or replaced, the node acts as a primary
  • Load Balancing - during periods of high volume the secondary node handles traffic delegated to it by the primary.
  • Security - when the primary node is operating normally the node reviews the primary nodes data logs looking for unusual activity. Examples being failed attempts to login, attempts to access restricted areas, etc. If the node detects any significant suspicious activity, it contacts SYNC Systems.

Security

A Security node is designed to monitor all traffic going through any Primary or Secondary nodes present. They are only present in high volume where multiple Primary and Secondary node pairs are deployed. Unless instructed they scan all the data logs and look for patterns of activity that could indicate attempts to compromise the network. Additionally the node can initiate a targeted scan for specific activity. It can only be initiated by the Yamatai National Police, Yamatai Security Agency with due cause. Any activity that meets the specified criteria is forwarded to the respective agency.

Node Locations

OOC Notes

Authored by Nashoba Submission Approved by Wes on May 7, 2012. Forum Thread.


Quality:
corp/emrys/sync_nodes.txt ยท Last modified: 2024/02/25 23:04 by 161.65.202.208