IPB
X   Site Message
(Message will auto close in 2 seconds)

Welcome Guest ( Log In | Register )

5 Pages V  < 1 2 3 4 > »   
Reply to this topicStart new topic
> Response and IC, I am confused
Serbitar
post May 4 2006, 09:15 PM
Post #26


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



Mainfraimes are not nodes in SR4, because rating 6 nods have restrictions that no mainframe would have. Furthermore, as I mentioned before, a device 100 times bigger than a small comlink can easily have a rating of 50 and be cheaper than a comlink.

But still: Can anybody resolve the "why not load the maximum number of agents at first node hit" problem?
Go to the top of the page
 
+Quote Post
blakkie
post May 4 2006, 09:17 PM
Post #27


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



@mdynna

Usually though a big iron system will set a choke point on system resources used by an individual login or virtual machine. A node isn't exactly that, but the reasons for limiting the resources remain largely applicable.

In some ways comlinks, in regard to the things that Voran mentioned, make a lot more sense under a mainframe type situation than with a handheld commlink. Because the commlink already has this slicing up of resources happening where just having multiple logins by Agents on a commlink appears to pull resources out of nowhere.

@Glayvin34 The rules kind of hint at on page 227, but don't come right out and say, that an Agent that is acting on it's own must be in the node it is performing its action in. Although it gets a little murkier with things like Track, i'd make the assumption there is the action is being performed in the node where the target icon is located. Not on the path leading back to the physical location, which would require the Agent to node hop back along the datatrail.

@Moon-Hawk

Being able to manage enormous numbers of I/O devices is certainly something that is a characteristic of a mainframe type system. Acting as the communication hub for perhaps thousands of user logins at one time.
Go to the top of the page
 
+Quote Post
GrinderTheTroll
post May 4 2006, 09:23 PM
Post #28


Shooting Target
****

Group: Members
Posts: 1,754
Joined: 9-July 04
From: Modesto, CA
Member No.: 6,465



QUOTE (Serbitar)
Mainfraimes are not nodes in SR4, because rating 6 nods have restrictions that no mainframe would have. Furthermore, as I mentioned before, a device 100 times bigger than a small comlink can easily have a rating of 50 and be cheaper than a comlink.

No rules exist in SR4 for anything other than a node. Anything aside from what's in SR4 will have to be House Ruled.

Yeah it sucks having to wait for source books to come into play, but there are lots of good ideas in this thread.
Go to the top of the page
 
+Quote Post
blakkie
post May 4 2006, 09:28 PM
Post #29


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



QUOTE (Serbitar @ May 4 2006, 03:15 PM)
But still: Can anybody resolve the "why not load the maximum number of agents at first node hit" problem?

*sigh* First off, as pointed out about the downside of bogging down the system you are suppose to be protecting:

QUOTE (page 228)
Note that nodes are careful not to run so many IC programs
at once that it aff ects their performance (see Response, p. 212).


Second, loading an Agent is a action, and since you apparently don't have the book i'll look it up.....page 219, it is a Complex action. So one IC Agent loaded per IP.

I and others have mentioned this before in this thread. What is the problem? You just don't -like- the answer, or what?
Go to the top of the page
 
+Quote Post
GrinderTheTroll
post May 4 2006, 09:32 PM
Post #30


Shooting Target
****

Group: Members
Posts: 1,754
Joined: 9-July 04
From: Modesto, CA
Member No.: 6,465



*snip*
QUOTE (Serbitar)
Is there any reason not to load every IC available at the first net hit of the node and track the hell out of everything?


I'm not sure if I understand this part of your question. Do you mean "why not dump all the Agents into a node once the system's on alert?" If so, then it's a matter of preference on how the target would respond. I imagine most systems wouldn't unleash an army of Agents unless there was good reason or unless the node in question is paranoid like that.

You can dump large amounts of Agents at a time with enough IP, but you'd suffer response/rating degradation if you get too many in the same node.

EDIT - I suppose other nodes could release Agents in response to an alert and they could move into the invaded node.
Go to the top of the page
 
+Quote Post
Serbitar
post May 4 2006, 09:50 PM
Post #31


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



QUOTE (blakkie @ May 4 2006, 04:28 PM)
I and others have mentioned this before in this thread. What is the problem? You just don't -like- the answer, or what?

Yes, I want a justification for a security sheet like thing, where IC is triggered only after a certain number of node ihts. With increasing security (more IC, alert, shotdown . . .) as the node hits increase.
Go to the top of the page
 
+Quote Post
blakkie
post May 4 2006, 09:54 PM
Post #32


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



QUOTE (Serbitar @ May 4 2006, 03:50 PM)
QUOTE (blakkie @ May 4 2006, 04:28 PM)
I and others have mentioned this before in this thread. What is the problem? You just don't -like- the answer, or what?

Yes, I want aj ustification for a security sheet like thing, when IC is triggered only after a certain number of node its. With increasing security as the node hits increase.

Congratulations, you just wrote it down! Now go forth and be fruitful!


P.S. As has been mentioned a few times you can wait for Unwired to come out with the port of the relavent info. Or hey, why not just go and port it yourself. Past canon seems to be sort of a justification, yes? Page 228 does mention different flavours of IC based on their program loadout.

EDIT: I'm pretty sure I've seen someone doing a translation of the old Tar Baby and such into program loadouts.

EDIT2: :rotfl: Ya, it was in that thread i linked for you. The first response post.
Go to the top of the page
 
+Quote Post
blakkie
post May 4 2006, 09:59 PM
Post #33


Dragon
********

Group: Members
Posts: 4,718
Joined: 14-September 02
Member No.: 3,263



QUOTE (GrinderTheTroll)
EDIT - I suppose other nodes could release Agents in response to an alert and they could move into the invaded node.

That's a interesting idea. IC are independant Agents that can move around node to node. But that's going to introduce a bit of a delay (request for IC goes out, load occurs, IC moves in). They'll too still bog the crap out of the node they are coming to the aid of when they move in.
Go to the top of the page
 
+Quote Post
damaleon
post May 4 2006, 10:04 PM
Post #34


Moving Target
**

Group: Members
Posts: 108
Joined: 12-March 06
From: TX
Member No.: 8,363



Here is something I read in the Linking and Subscribing section:
QUOTE
The subscription list may be unlimited in size, but the number of nodes, agents, or drones that a persona may actively subscribe to (access) at any one time is limited to the persona’s System x 2.


If you apply that to the node (from someone's commlink to the access gateway to a AAA host) you are limited to at most 12 IC accessing/protecting any one node, less since it is connecting to other nodes.

For someone's commlink, I would count any cyber that is accessing wirelessly, like cybereyes transmitting visuals to another team member or a smartlink to a weapon without a skinlink, against the subscription limit. A drone could be activated, issued instructions and then unsubscribed to act on its own, no longer counting against the limit.

For a rating 5 network gateway, it would likely have its own IC (say 2 for detecting hackers), subscribing to 2-3 nodes and multiple IC actively running on other nodes within the network (up to 5-6 other IC possible, takes at least a CT to show up) that it can call for backup if an alert is triggered. I would have all the programs that the IC can use running on the node it is loaded on, so IC and programs they use would count against response, however you decide to handle major hardware.
Personally I don't see a AAA corp's system slowing down if it is running only 6 programs. I would consider any "node" to be a mesh network of equivalent devices hardwired together with its own gateways, allowing a much higher number of programs, but still limiting active subscriptions to System x 2 (so 12 for any rating 6 system).

But this is all how I would do it, so as someone else already said, just do what seems reasonable.
Go to the top of the page
 
+Quote Post
GrinderTheTroll
post May 4 2006, 10:15 PM
Post #35


Shooting Target
****

Group: Members
Posts: 1,754
Joined: 9-July 04
From: Modesto, CA
Member No.: 6,465



QUOTE (blakkie)
QUOTE (GrinderTheTroll @ May 4 2006, 03:32 PM)
EDIT - I suppose other nodes could release Agents in response to an alert and they could move into the invaded node.

That's a interesting idea. IC are independant Agents that can move around node to node. But that's going to introduce a bit of a delay (request for IC goes out, load occurs, IC moves in). They'll too still bog the crap out of the node they are coming to the aid of when they move in.

Reminds me of Matrix 2 when all the Agent Smith's started coming into the area a little at a time... then Whammo!
Go to the top of the page
 
+Quote Post
mdynna
post May 4 2006, 11:03 PM
Post #36


Moving Target
**

Group: Members
Posts: 371
Joined: 10-January 06
From: Regina
Member No.: 8,145



Ok, just stop and think about this whole "everything is a node with the same rules" concept for a moment. As has been pointed out, the cheapest/most efficient way to make a Rating 6 Commlink is to buy a Meta Link and upgrade everything up to 6. Right? If a suped-up Meta Link can do exactly every other device can do, then why not do it? You know corps are always looking for the most cost effecient way to do things. So, they would use the "upgraded Meta Link" method. Think about it. Renraku's AI Research Host is a modified Meta Link Commlink. Aztechnology's Blood Magic Library is a modified Meta Link Commlink. News headline: "THE ZURICH ORBITAL HOST HAS JUST UPGRADED ITSELF TO A META LINK COMMLINK"

Meta is now the most powerful Megacorp in the world because EVERYTHING IN THE WORLD RUNS ON THEIR COMMLINKS. "Everything is a node?" "Corp hosts use the same rules as everyone's Commlink?" No. My SR4 Matrix is not built on legions of Meta Link commlinks. What's yours?
Go to the top of the page
 
+Quote Post
Kanada Ten
post May 4 2006, 11:09 PM
Post #37


Beetle Eater
********

Group: Dumpshocked
Posts: 4,797
Joined: 3-June 02
From: Oblivion City
Member No.: 2,826



Meh, the corps probably would make it cheaper than the Meta since they don't need the roll out keyboards and other interfaces for most things. Now we know why it only took 5 years to upgrade all the tech, though. Just billions and billions of skeletal commlinks interconnected.
Go to the top of the page
 
+Quote Post
James McMurray
post May 4 2006, 11:16 PM
Post #38


Great Dragon
*********

Group: Members
Posts: 5,430
Joined: 10-January 05
From: Fort Worth, Texas
Member No.: 6,957



In today's world it is cheaper in terms of straight money to buy a junk computer and upgrade it. It doesn't happen in corporations for a few reasons:

1) you incur more costs in terms of the time it takes people to build these computers for you

2) large computer companies offer discounts for large purchases

3) many managers who aren't tech savvy don't think that a hoemade computer can be as good as a brand name one

In SR you also come across situations where many of the bigger corporations either manufacture or have ties to people that manufacture computers. If you own an assembly line, building name brand computers is even cheaper than buying and upgrading.
Go to the top of the page
 
+Quote Post
Glayvin34
post May 4 2006, 11:24 PM
Post #39


Moving Target
**

Group: Members
Posts: 351
Joined: 17-February 06
From: San Francisco
Member No.: 8,275



My question is still about the Load that an Agent has. Say you've got a Response 6 ICberg running 2 Agents and you don't want to decrease the response, does the program list look like this:
1.Agent1
2.Agent2
3.Armor
4.Attack
5.Stealth
or like this? (with a -1 response)
1.Agent1
2.Armor1
3.Attack1
4.Agent2
5.Armor2
6.Attack2

Does an Agent use programs that the node is running or does it use its own load and can't share programs? Because if they use programs on the node, then one program is taking multiple actions each Turn (which I guess could be possible).
Go to the top of the page
 
+Quote Post
damaleon
post May 4 2006, 11:42 PM
Post #40


Moving Target
**

Group: Members
Posts: 108
Joined: 12-March 06
From: TX
Member No.: 8,363



QUOTE (Glayvin34)
My question is still about the Load that an Agent has.  Say you've got a Response 6 ICberg running 2 Agents and you don't want to decrease the response, does the program list look like this:
1.Agent1
2.Agent2
3.Armor
4.Attack
5.Stealth
or like this? (with a -1 response)
1.Agent1
2.Armor1
3.Attack1
4.Agent2
5.Armor2
6.Attack2

Does an Agent use programs that the node is running or does it use its own load and can't share programs?  Because if they use programs on the node, then one program is taking multiple actions each Turn (which I guess could be possible).

I would run it as option 1, each agent has access to all 3 programs. I see it as multiple users reading the same part of a cache to queue an instruction.
Go to the top of the page
 
+Quote Post
GrinderTheTroll
post May 4 2006, 11:46 PM
Post #41


Shooting Target
****

Group: Members
Posts: 1,754
Joined: 9-July 04
From: Modesto, CA
Member No.: 6,465



QUOTE (Glayvin34)
My question is still about the Load that an Agent has.  Say you've got a Response 6 ICberg running 2 Agents and you don't want to decrease the response, does the program list look like this:
1.Agent1
2.Agent2
3.Armor
4.Attack
5.Stealth
or like this? (with a -1 response)
1.Agent1
2.Armor1
3.Attack1
4.Agent2
5.Armor2
6.Attack2

Does an Agent use programs that the node is running or does it use its own load and can't share programs?  Because if they use programs on the node, then one program is taking multiple actions each Turn (which I guess could be possible).


It's not the Agent's rating that degrades the node (although the Agent is capped at the node Rating), it's the number of Agents running in a node that degrade it. The Agent's Reponse equals that of the node it occupies.

A Rating 3 node can have 6 Agents running and any Agent will function at a MAX Rating of 3 even if >3. If the Agent moved into a Rating 5 node, then that node could handle 10 Agents before degrading and the Agent would function at a MAX Rating of 5 even if >5.

IIRC the limit to how much you can load into an Agent, is its Rating x2 in Program Ratings. So Agent 6 could have Trace-3, Attack-3.

Can anyone verify this?
Go to the top of the page
 
+Quote Post
Shrike30
post May 4 2006, 11:55 PM
Post #42


Runner
******

Group: Members
Posts: 2,556
Joined: 26-February 02
From: Seattle
Member No.: 98



Did you mean Trace-6, Attack-6?
Go to the top of the page
 
+Quote Post
Glayvin34
post May 5 2006, 12:02 AM
Post #43


Moving Target
**

Group: Members
Posts: 351
Joined: 17-February 06
From: San Francisco
Member No.: 8,275



QUOTE (GrinderTheTroll)
It's not the Agent's rating that degrades the node (although the Agent is capped at the node Rating), it's the number of Agents running in a node that degrade it.  The Agent's Reponse equals that of the node it occupies.

A Rating 3 node can have 6 Agents running and any Agent will function at a MAX Rating of 3 even if >3.  If the Agent moved into a Rating 5 node, then that node could handle 10 Agents before degrading and the Agent would function at a MAX Rating of 5 even if >5.

IIRC the limit to how much you can load into an Agent, is its Rating x2 in Program Ratings.  So Agent 6 could have Trace-3, Attack-3.

Can anyone verify this?

First, from page 212:
"Response may be affected if you run too many programs. For every x number of programs you have actively running, where x = System rating, your Response is reduced by 1. So if you’re running 10 programs with a System 5, your Response will be reduced by 2."
So at each multiple of your system you take a -1 to response.

It's that second part that I'm wondering about. Does an Agent's Load count against the total number of programs running? It says on page 228 that
"Agents can be loaded up with copies of your programs so that the agent may employ them on its own. If an agent is acting independently, any programs it’s carrying must be active, and so may affect its Response."

Now it seems to be that the Agent runs the program on whatever node it's on, affecting response. So if you've got the aforementioned attack IC, you'll need it to run about 3 programs to be effective in cybercombat, plus the fact it's an Agent, so that means one attack IC with Attack, Stealth and Armor takes up 4 programs. Does that not sound right to anyone?
Go to the top of the page
 
+Quote Post
Glayvin34
post May 5 2006, 01:23 AM
Post #44


Moving Target
**

Group: Members
Posts: 351
Joined: 17-February 06
From: San Francisco
Member No.: 8,275



On 232 there's that "Simultaneous Combat in Multiple Nodes" section, it seems to indicate that you can get attacked through any node you're subscribed to. So if you're in a node with 10 ICbergs subscribed to it, like any high-security "Mainframe" (I use the word lightly) is likely to have, then each of the ICbergs attacks you.
So I guess being subscribed to a node and being in the node is the same thing for personas? Agents can enter a node so if they're tracked the track just goes to whatever node they are running on (I think).
Go to the top of the page
 
+Quote Post
damaleon
post May 5 2006, 01:33 AM
Post #45


Moving Target
**

Group: Members
Posts: 108
Joined: 12-March 06
From: TX
Member No.: 8,363



Here is how I see it.

System/Response 6 node running the following programs:
1. Agent Attacker (Pilot 4)
2. Agent Detector (Pilot 6)
3. Agent Hunter (Pilot 5)
4. Attack-6
5. Analyze-6
6. Blackout-6 (node loses 1 response, now at 5)
7. Stealth-6
8. Armor-6
9. Track-6
10. Exploit-6
11. Decrypt-6

Node is now effectively System/Response 5 and Programs only get max of 5 dice. Another program or agent would reduce response again, down to 4.

Now the Agents are loaded as such:
Attacker - Defend node
-- Attack, Blackout, Armor, Stealth (-1 response for 4 programs with a 4 pilot)
Equivalent to a 4 system(pilot), 4 firewall, 4 response persona (node response at 5, -1 for programs), programs limited to 4 by Pilot rating

Detector - Detect intrusion and locate source of intruder
-- Analyze, Stealth, Track, Exploit, Decrypt (no response loss due to programs, but pilot is limited to 5 effectiveness by node response of 5)
Equiv. to a 5 sys, 5 firewall, 5 response (limited by 5 response node), programs at 5

Hunter - Defend node or attack intruder's node
-- All programs listed above (8 programs, -1 response loss for 5-9 programs loaded)
Equiv. to a 4 sys, 4 firewall, 4 response persona, programs at 4

Obviously this would not be an ideal loadout, but I was trying to cover as many situations as possible. What do you guys think?
Go to the top of the page
 
+Quote Post
Big D
post May 5 2006, 01:45 AM
Post #46


Moving Target
**

Group: Members
Posts: 524
Joined: 12-April 06
Member No.: 8,455



Backing away from the exact mechanics for a second...

If I'm hacking a server, and see some alert flags pop up, but want to stave off the inevitable for a few rounds while my team gets out, can I do something as simple as uploading a few agents and then ordering them to go out and create havoc in other nodes on the system, then uploading a few more?

It sounds like once I get into a system, I can basically DOS it with agents. The IC and deckers will be so busy tracing down my agents, that they won't be able to get control of the system. I probably won't either, but this is a "run away" tactic, not a take and hold ground tactic.

Also, was there any mention of party ice in the BBB? I don't remember seeing it. I think it would need some kind of special treatment under the "stacking" rules discussed here.
Go to the top of the page
 
+Quote Post
Glayvin34
post May 5 2006, 01:47 AM
Post #47


Moving Target
**

Group: Members
Posts: 351
Joined: 17-February 06
From: San Francisco
Member No.: 8,275



Yeah, Damaleon's model seems to be right. But about the Hunter Agent, do Agents lose response for the programs they have loaded? They're not running the programs themselves, the node is. All that's in the book is the programs "must be active, and so may affect its Response" line on page 228, I think that's referring to the Response of the node the Agent is running on, not the Agent itself.
Go to the top of the page
 
+Quote Post
Glayvin34
post May 5 2006, 01:56 AM
Post #48


Moving Target
**

Group: Members
Posts: 351
Joined: 17-February 06
From: San Francisco
Member No.: 8,275



QUOTE (Big D)
Backing away from the exact mechanics for a second...

If I'm hacking a server, and see some alert flags pop up, but want to stave off the inevitable for a few rounds while my team gets out, can I do something as simple as uploading a few agents and then ordering them to go out and create havoc in other nodes on the system, then uploading a few more?

It sounds like once I get into a system, I can basically DOS it with agents. The IC and deckers will be so busy tracing down my agents, that they won't be able to get control of the system. I probably won't either, but this is a "run away" tactic, not a take and hold ground tactic.

Also, was there any mention of party ice in the BBB? I don't remember seeing it. I think it would need some kind of special treatment under the "stacking" rules discussed here.

Ooo, good one. You could have a Comm full of Agents that all run out and slow down whatever node is running the IC that is coming after you. If they were all loaded up with programs, they could go and run them all on the ICberg protecting the system you're infiltrating, and the Mainframe's Response would bottom out. That's kinda cheap, though.
Go to the top of the page
 
+Quote Post
damaleon
post May 5 2006, 02:02 AM
Post #49


Moving Target
**

Group: Members
Posts: 108
Joined: 12-March 06
From: TX
Member No.: 8,363



QUOTE
Payload
Agents can be loaded up with copies of your programs so that the agent may employ them on its own. If an agent is acting independently, any programs it’s carrying must be active, and so may aff ect its Response (see p. 212). Any program run by an agent
is limited by the Pilot rating.


I read the independent agent and payload rules like the agent is a mini system, running on the node and granted access to programs also running on the node. I see the agent being able to handle only so many threads before it loses efficency. Basicly it is only smart enough to handle access to so many programs before its logic routines take longer to decide what to do, like in turn based strategy games when the computer has more and more units to control and more places to attack you from.
Go to the top of the page
 
+Quote Post
damaleon
post May 5 2006, 02:10 AM
Post #50


Moving Target
**

Group: Members
Posts: 108
Joined: 12-March 06
From: TX
Member No.: 8,363



Yeah, I would agree with Big D, as long as you can hack the proper access needed to load an Agent on their system, it should be possible. I would restrict running Agents to security or admin access, so it takes longer to hack in, but if you manage to do that, you should be able to use their system's resources against them.

I wouldn't allow you to do it immediately though, except for what programs/IC/agents are already available to the node your on. If for some reason there is no agent available to that node, it isn't rated high enough for you, I would make you spend several actions transfering some of your's to the node before you could activate them. Not a problem when the system isn't on alert, but it can take precious IPs away if you're being attacked, which is a suitable penalty if you don't think ahead.
Go to the top of the page
 
+Quote Post

5 Pages V  < 1 2 3 4 > » 
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 12th April 2022 - 02:44 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.