Modular Computers: Difference between revisions

From BeeStation Wiki
Jump to navigation Jump to search
imported>Superpizza
(tracking apps gh#4639)
 
(One intermediate revision by one other user not shown)
Line 1: Line 1:
"Modular Computer" refers to those electrical devices designed with ease of assembly and upgrading through the use of special "modular" components. These components are housed in frames of which there are three types, each offering different advantages.
"Modular Computer" refers to those electrical devices designed with ease of assembly and upgrading through the use of special "modular" components. These components are housed in frames of which there are three types, each offering different advantages.
*The console is a static structure, and can house the most powerful components, as well as a wired connection to the network.
*The console is a static structure, and can house the most powerful components, as well as a wired connection to the network.
*The laptop is a compromise between portability and power, capable of all but the most intensive operations in exchange for its mobility.
*The laptop is a compromise between portability and power, capable of all but the most intensive operations in exchange for its mobility.
*The tablet is a pocket-sized supercomputer, capable of replacing most outdated computers still littering the station even with its moderate power.
*The tablet is a pocket-sized supercomputer, capable of replacing most outdated computers still littering the station even with its moderate power.
Just like a normal computer, every frame requires a power supply, processing unit, drive and of course, programs to run. All hardware comes with an OS installed, which grants basic functionalities and UI. Programs can be downloaded from the NET as long as you have a network card installed. If for some reason you do not, or the quantum relay is off, you can install directly from disks.  
Just like a normal computer, every frame requires a power supply, processing unit, drive and of course, programs to run. All hardware comes with an OS installed, which grants basic functionalities and UI. Programs can be downloaded from the NET as long as you have a network card installed. If for some reason you do not, or the quantum relay is off, you can install directly from disks.  


Line 13: Line 11:
All programs occupy a certain amount of space on the drive (shown below in brackets). A standard hard disk is currently enough to fit all of them.
All programs occupy a certain amount of space on the drive (shown below in brackets). A standard hard disk is currently enough to fit all of them.


You can get laptops and tablets from the Modular PC vendor, located near Science.
{|class="wikitable floatright" style="text-align: center;"
{|class="wikitable floatright" style="text-align: center;"
|+'''COMPONENTS'''
|+'''COMPONENTS'''
Line 209: Line 208:
'''File browser (8)'''<br> Manages files, create text files.<br><br>
'''File browser (8)'''<br> Manages files, create text files.<br><br>
'''Configuration (4)'''<br> Manages processes, programs or components of your frame.<br><br>
'''Configuration (4)'''<br> Manages processes, programs or components of your frame.<br><br>
===THE NET===
===THE NET===
These programs are all downloaded through the Software Download Tool, requiring a network connection and, in some cases, certain ID accesses. <br><br>
These programs are all downloaded through the Software Download Tool, requiring a network connection and, in some cases, certain ID accesses. <br><br>
'''Chat Client (8)'''<br> An IRC client. While you might think it more private than PDA messages, the RD (or anyone with his access) is the sysADMIN for this, meaning they can see who logs when and probably enter password-protected channels forcefully.<br><br>
'''Chat Client (8)'''<br> An IRC client. While you might think it more private than PDA messages, the RD (or anyone with his access) is the sysADMIN for this, meaning they can see who logs when and probably enter password-protected channels forcefully.<br><br>
'''P2P Transfer Client (7)'''<br> A peer-to-peer file transfer system. <br><br>
'''P2P Transfer Client (7)'''<br> A peer-to-peer file transfer system. <br><br>
'''NTNet Diagnostics and Monitoring (12)'''<br> Monitors the NET itself and can shut down various NET functions separately such as IRC, downloader, P2P file transfer, station-bound functionalities, or the whole thing itself. ''Requires Network Access, by default granted to the Research Director and the Captain.'' <br><br>
'''NTNet Diagnostics and Monitoring (12)'''<br> Monitors the NET itself and can shut down various NET functions separately such as IRC, downloader, P2P file transfer, station-bound functionalities, or the whole thing itself. ''Requires Network Access, by default granted to the Research Director and the Captain.'' <br><br>
'''Alarm Monitor (5)'''<br> Monitors where air alarms on the station go off. Same as air alarm console.<br><br>
'''Alarm Monitor (5)'''<br> Monitors where air alarms on the station go off. Same as air alarm console.<br><br>
'''Supermatter Monitoring (5)'''<br> Connects to the supermatter monitoring system to keep a constant watch on the status of supermatter based engines. ''Requires Engineering Access, by default granted to the all of the Engineering department, the Head of Security, and the Captain.'' <br><br>
'''Supermatter Monitoring (5)'''<br> Connects to the supermatter monitoring system to keep a constant watch on the status of supermatter based engines. ''Requires Engineering Access, by default granted to the all of the Engineering department, the Head of Security, and the Captain.'' <br><br>
'''ID Card Modification (8)'''<br> Reads and modify access on IDs, open and close job position. Same as ID machine in HoP's office. ''Requires Bridge Access, by default granted to the Heads of Staff and the Captain.'' '''Requires an identification card authentication module.''' <br><br>
'''ID Card Modification (8)'''<br> Reads and modify access on IDs, open and close job position. Same as ID machine in HoP's office. ''Requires Bridge Access, by default granted to the Heads of Staff and the Captain.'' '''Requires an identification card authentication module.''' <br><br>
'''Power Monitor (9)'''<br> Monitors the powergrid. Same as power monitoring console. ''Requires Engineering Access, by default granted to the all of the Engineering department, the Head of Security, and the Captain.'' '''Must be run on a console.'''<br><br>
'''Power Monitor (9)'''<br> Monitors the powergrid. Same as power monitoring console. ''Requires Engineering Access, by default granted to the all of the Engineering department, the Head of Security, and the Captain.'' '''Must be run on a console.'''<br><br>
'''AI Integrity Restorer (12)'''<br> Restores an AI that was critically damaged. Same as AI restorer console in the RD's office. ''Requires Bridge Access, by default granted to the Heads of Staff and the Captain.'' '''Must be run on a console, requires an intelliCard interface slot.'''<br><br>
'''AI Integrity Restorer (12)'''<br> Restores an AI that was critically damaged. Same as AI restorer console in the RD's office. ''Requires Bridge Access, by default granted to the Heads of Staff and the Captain.'' '''Must be run on a console, requires an intelliCard interface slot.'''<br><br>'''Lifeline (5)'''


A radar that allows you track suit sensors. Similar to a crew pinpointer but with a grid view as well.
===SYNDICATE===
===SYNDICATE===
These programs are downloaded through Syndinet, access by using an emag on a modular computer. Shame no one relies on the NET.<br><br>
These programs are downloaded through Syndinet, access by using an emag on a modular computer. Shame no one relies on the NET.<br><br>
'''DoS Traffic Generator (20)'''<br> Launches a DoS attack on a NET's quantum relay. Relies as much on connection quality as processing power. <br><br>
'''DoS Traffic Generator (20)'''<br> Launches a DoS attack on a NET's quantum relay. Relies as much on connection quality as processing power. <br><br>
'''Revelation (13)'''<br> This program fries a computer's inner drives and PSU with a moderate shower of sparks. To arm it, simply run it after download and press the big red button. Its biggest strength is being able to change its name to anything and allow for acts of delayed sabotage.
'''Revelation (13)'''<br> This program fries a computer's inner drives and PSU with a moderate shower of sparks. To arm it, simply run it after download and press the big red button. Its biggest strength is being able to change its name to anything and allow for acts of delayed sabotage.
 
 
'''Fission 360 (5)'''
 
Radar that allows tracking of nuclear related objects, such as the station self destruct terminal, beer nukes, and the NAD. A pinpointer with more features including a grid view. Nuclear operatives come with a tablet with this preinstalled.

Latest revision as of 13:30, 18 July 2021

"Modular Computer" refers to those electrical devices designed with ease of assembly and upgrading through the use of special "modular" components. These components are housed in frames of which there are three types, each offering different advantages.

  • The console is a static structure, and can house the most powerful components, as well as a wired connection to the network.
  • The laptop is a compromise between portability and power, capable of all but the most intensive operations in exchange for its mobility.
  • The tablet is a pocket-sized supercomputer, capable of replacing most outdated computers still littering the station even with its moderate power.

Just like a normal computer, every frame requires a power supply, processing unit, drive and of course, programs to run. All hardware comes with an OS installed, which grants basic functionalities and UI. Programs can be downloaded from the NET as long as you have a network card installed. If for some reason you do not, or the quantum relay is off, you can install directly from disks.

If your desired power source is a battery module , you will need to install a power cell controller. Computers can hold both area/wire power connections and a power cell as a backup.

Simple network cards will have some signal and work only on station and lavaland, while better cards will have good signal on station/lavaland and then some even in space! There even exist straight up ethernet connections for the console, though it's not clear exactly where the plug comes from on an asteroid.

All programs occupy a certain amount of space on the drive (shown below in brackets). A standard hard disk is currently enough to fit all of them.

You can get laptops and tablets from the Modular PC vendor, located near Science.

COMPONENTS
Components
and their stats
compatibility power drain
in Watts
Processing Units
(max simultanous programs)
Microprocessor 2 programs 25
Photonic microprocessor 3 programs 75
Processor board 3 programs 50
Photonic processor board 5 programs 250
Drives
(capacity in GQ)
Micro solid state drive 32 2
Solid state drive 64 10
Hard disk drive 128 25
Advanced hard disk drive 256 50
Super hard disk drive 512 100
cluster hard disk drive 2048 500
Power Supplies
(charge held in kJoules)
Nano battery 300
Micro battery 500
Standard battery 750
Advanced battery 1500
Super battery 2000
Area power connector The APC's 100
Wired power connector The wire's 100
Network Access
signal on main z-levels/space
Network card / 50
Advanced network card / 100
Wired network card 100
Miscellaneous
ID slot 10
Intellicard slot 100
Miniprinter 15 50
printer 30 100


The Programs

DEFAULT

These are the programs that all modular computers come pre-installed with, they can't be uninstalled.

Software Download Tool (4)
Downloads more programs from the NET. Some programs are locked behind certain ID accesses.

File browser (8)
Manages files, create text files.

Configuration (4)
Manages processes, programs or components of your frame.

THE NET

These programs are all downloaded through the Software Download Tool, requiring a network connection and, in some cases, certain ID accesses.

Chat Client (8)
An IRC client. While you might think it more private than PDA messages, the RD (or anyone with his access) is the sysADMIN for this, meaning they can see who logs when and probably enter password-protected channels forcefully.

P2P Transfer Client (7)
A peer-to-peer file transfer system.

NTNet Diagnostics and Monitoring (12)
Monitors the NET itself and can shut down various NET functions separately such as IRC, downloader, P2P file transfer, station-bound functionalities, or the whole thing itself. Requires Network Access, by default granted to the Research Director and the Captain.

Alarm Monitor (5)
Monitors where air alarms on the station go off. Same as air alarm console.

Supermatter Monitoring (5)
Connects to the supermatter monitoring system to keep a constant watch on the status of supermatter based engines. Requires Engineering Access, by default granted to the all of the Engineering department, the Head of Security, and the Captain.

ID Card Modification (8)
Reads and modify access on IDs, open and close job position. Same as ID machine in HoP's office. Requires Bridge Access, by default granted to the Heads of Staff and the Captain. Requires an identification card authentication module.

Power Monitor (9)
Monitors the powergrid. Same as power monitoring console. Requires Engineering Access, by default granted to the all of the Engineering department, the Head of Security, and the Captain. Must be run on a console.

AI Integrity Restorer (12)
Restores an AI that was critically damaged. Same as AI restorer console in the RD's office. Requires Bridge Access, by default granted to the Heads of Staff and the Captain. Must be run on a console, requires an intelliCard interface slot.

Lifeline (5)

A radar that allows you track suit sensors. Similar to a crew pinpointer but with a grid view as well.

SYNDICATE

These programs are downloaded through Syndinet, access by using an emag on a modular computer. Shame no one relies on the NET.

DoS Traffic Generator (20)
Launches a DoS attack on a NET's quantum relay. Relies as much on connection quality as processing power.

Revelation (13)
This program fries a computer's inner drives and PSU with a moderate shower of sparks. To arm it, simply run it after download and press the big red button. Its biggest strength is being able to change its name to anything and allow for acts of delayed sabotage.


Fission 360 (5)

Radar that allows tracking of nuclear related objects, such as the station self destruct terminal, beer nukes, and the NAD. A pinpointer with more features including a grid view. Nuclear operatives come with a tablet with this preinstalled.