Home
Documents
CCL

SECTION 3 - USING THE SCANNER

All cybertanks are equipped with the Cybertank Scanner System (CSS), an essential piece of hardware. Various equipment can be built into the CSS, including a Scanner, a Remote launcher, a Scanner Lock, a Listening Device, in addition to a Jammer.
Scanners vary in angle of effectiveness (or sweep angle) and range. The primary function of a Scanner is to quickly probe an area and return the results to the cybertank’s main computer systems. Scanners are capable of detecting enemy cybertanks, headquarters, and various terrain features, and play an important role in cybertank design. Without a scanner, a cybertank is very limited in its range of sight (the MOS has a range of 3 hectometers with a one degree wide sweep angle -- see Section 2.4).

NOTE: The use of a defense shield halves the range of all scanners. (For more information on Defense Shields. See Section 5.2.)

3.1 SCANNER DAMAGE AND REPAIR

COMMAND STRUCTURE

1 cyc If Scanner [is] Functional Then [Branch To : Do] “Label”
1 cyc If Scanner [is] Not Functional Then [Branch To : Do] “Label”
60 cyc Repair Scanner

SYSTEM VARIABLES AFFECTED

  • ScanDamage

EXAMPLE USAGE

CheckScan
   If Scanner is Functional Then Branch To CS_Exit
   Repair Scanner

CS_Exit
   Resume
The cybertank uses its scanner to find enemy cybertanks and locate objects. When its scanner is destroyed, a cybertank is essentially blind and normally doomed to fail. Repair kits, if purchased, can be used at any time to repair a damaged scanner. Scanners are reliable until they are completely destroyed.

3.2 SCANNING FOR ENEMY CYBERTANKS

COMMAND STRUCTURE

8 cyc Scan for [Enemy] Tank
1 cyc If [Enemy] Tank [was] Found Then [Branch To : Do] “Label”
1 cyc If [Enemy] Tank [was] Not Found Then [Branch To : Do] “Label”

SYSTEM VARIABLES AFFECTED

  • EnemyX
  • EnemyY
  • EnemyDist

EXAMPLE USAGE

FindTank
   Rotate Scanner Right 1
   Scan For Enemy Tank
   If Enemy Tank Was Not Found Then Branch To
      FindTank

FT_FoundIt
   Resume
These commands are used to locate enemy cybertanks. It is necessary to execute the “Scan For Enemy Tank” command first, then use one of the ‘“If. . ." commands to determine the results. The above example has the cybertank continuously scanning in all directions until an enemy cybertank is found.

3.3 SCANNING FOR OBJECTS

COMMAND STRUCTURE

8 cyc Scan for [Closest] Object
1 cyc If [Closest] Object [was] Found Then [Branch To : Do] “Label”
1 cyc If [Closest] Object [was] Not Found Then [Branch To : Do] “Label”

SYSTEM VARIABLES AFFECTED

  • ObjX
  • ObjY
  • ObjType
  • ObjDist

EXAMPLE USAGE

ClearArea
   Tree = 4
   House = 5
   Align Tank with Scanner

CA_Loop
   Scan For Closest Object
   If Closest Object Was Not Found Then Branch To
      CA_Rotate
   If ObjType = Tree then CA_Destroy
   If ObjType = House then CA_Destroy

CA_Rotate
   Rotate Scanner Right 1
   If Scanner Not Aligned with Tank Then Branch TO CA_Loop

CA_Exit
   Resume

CA_Destroy
   If Closest Object is Beyond Weapon Range then CA_Rotate
   Fire Weapon at Closest Object
   Branch To CA_Loop
These commands are used to locate the closest object to your cybertank. You must first execute the “Scan For Closest Object” command, then use one of the “If ...” commands to determine the results.
One of the more common uses of these commands is to clear objects out of the way that might be interfering with your cybertank’s ability to ‘“see” an enemy tank. The above example illustrates this use. See Appendix 3 for a complete list of Object types.

3.4 FINDING THE HEADQUARTERS

COMMAND STRUCTURE

8 cyc Scan for Enemy HQ
1 cyc If Obstruction [is] Enemy HQ then [Branch To : Do] "Label"
1 cyc If Obstruction [is] Ally HQ then [Branch To : Do] “Label”
1 cyc If Enemy HQ [was] Found then [Branch To : Do] "Label"
1 cyc If Enemy HQ [was] Not Found then [Branch To : Do] “Label”

SYSTEM VARIABLES AFFECTED

  • EnemyHQX
  • EnemyHQY
  • EnemyHQDist

EXAMPLE USAGE

CheckBase
   Scan for Enemy HQ
   If Enemy HQ was Found Then ShootIt
   Rotate Scanner 1
   Branch to CheckBase

ShootIt
   Fire Weapon at Enemy HQ
   Resume
All cybertanks are equipped with a special Headquarters Sensing Device (HSD) that allows the scanner to detect the presence of an enemy or allied base station. Once a base is detected and identified as friend or foe, a cybertank can decide whether to attack or defend it. The above commands are primarily used during team combat where the destruction of an enemy base Station results in a victory.

3.5 ROTATING THE SCANNER

COMMAND STRUCTURE

16 cyc Rotate [Scanner] Left “#”
16 cyc Rotate [scanned Right “X”
16 cyc Rotate [Scanner] To “angle”
16 cyc Rotate [Scanner] To “X” “Y”
16 cyc Rotate [Scanner] To Face [Enemy] Tank
16 cyc Align Scanner [with Tank]
1 cyc If Scanner [is] Aligned [with Tank] Then [Branch To : Do] “Label”
1 cyc If Scanner [is] Not Aligned [with Tank] Then [Branch To : Do] “Label”

SYSTEM VARIABLES AFFECTED

  • ScanDir

EXAMPLE USAGE

FindTank
   Rotate Scanner Right 1
   Scan For Enemy Tank
   If Enemy Tank was Found Then Branch To FT_FoundIt
   Branch To FindTank

FT_FoundIt
   Resume
Scanners rotate in eighths of a circle (45° increments). When commanding rotation, the number of eighths to turn is specified. The following command rotates the scanner one eighth (45 degrees) to the right:
Rotate Scanner Right 1
The following command will rotate the scanner three eighths (135 degrees) to the left:
Rotate Scanner Left 3
Scanners can also rotate to specific directions. The directions are illustrated in Diagram 3.5 below.

Diagram 3.5 - The eight possible directions

The following command will rotate the scanner to face northwest, regardless of the direction it is currently pointing:
Rotate Scanner To 7
There are many instances where you need to point your scanner toward a known location, but are not aware of the proper direction. Many CCL commands automatically rotate your scanner in the nearest direction to face a known location.
The following command will rotate your scanner in the nearest direction to face the coordinates X=20 and Y=14:
Rotate Scanner To 20 14
Always list the X coordinate first, followed by a space and then the Y coordinate. go not use a comma to separate the coordinate pair
Use the following command to rotate your scanner to the nearest angle to face an enemy cybertank at its last scanned position:
Rotate Scanner To Face Enemy Tank
The following command rotates your scanner to the direction the cybertank is facing:
Align Scanner with Tank

3.6 LOCKING THE SCANNER ON A TARGET

COMMAND STRUCTURE

5 cyc Lock [Scanner]
5 cyc Unlock [Scanner]
1 cyc If [Scanner is] Locked then [Branch To : Do] “Label”
1 cyc If [Scanner is] Unlocked then [Branch To : Do] “Label”

SYSTEM VARIABLES AFFECTED

  • None

EXAMPLE USAGE

FindTank
   Scan for Enemy Tank
   If Enemy Tank was Found then FT_Found
   Rotate Scanner Right 1
   Branch to FindTank

FT_Found
   Lock Scanner
   If Scanner is Unlocked Then Branch To FindTank
   Resume
The Scanner lock, a special item built into the CSS, can be purchased in the Chassis Design Module (CDM) if you have enough credits in your budget. Whenever a “lock Scanner” instruction is executed, your cybertank’s scanner locks onto the last scanned object, whether it is a tree, house, or another cybertank. Since trees and houses do not move, the most useful application for the scanner is to track the movement of enemy cybertanks.

NOTE: If an obstacle comes between your scanner and the scanned object, the scanner can no longer “see” the object and Will automatically unlock. Also, enemy cybertanks may be equipped with Jammers that can “unlock” your scanner. Once your scanner is unlocked, you must continue scanning and try to detect the cybertank again.

3.7 DETECTING A SCANNER LOCKED ON YOU

COMMAND STRUCTURE

1 cyc If [Tank is] Being Scanned Then [Branch To : Do] “Label”
1 cyc If [Tank is] Not Being Scanned Then [Branch To : Do] “Label”

SYSTEM VARIABLES AFFECTED

  • None

EXAMPLE USAGE

Detect
   If Tank is Not Being Scanned Then Branch To DT_No
   Jam Scanner Signal

DT_No
   Resume
Determining if another cybertank is locked onto your cybertank requires a special listening Device available in the Chassis Design Module. When activated, the Listening Device checks whether or not your cybertank has been locked onto by another cybertank’s scanner. The above example assumes the cybertank is equipped with a Listening Device and a Jammer (see Section 3.8), both of which are fairly expensive items.

3.8 JAMMING THE ENEMY’S SCANNER

COMMAND STRUCTURE

8 cyc Jam [Scanner Signal]

SYSTEM VARIABLES AFFECTED

  • None

EXAMPLE USAGE

Detect
   If Tank is Not Being Scanned Then Branch To DT_No
   Jam Scanner Signal

DT_No
   Resume
The Jam Scanner Signal command is useful only if your cybertank is equipped with a Jammer, a special device available in the Chassis Design Module (CDM). The Jammer will automatically unlock all enemy cybertank scanners which have locked onto your cybertank. This provides an opportunity for escape (hopefully) while enemy cybertanks try to re-scan and detect your new location.

3.9 LAUNCHING REMOTE SCANNERS

COMMAND STRUCTURE

15 cyc Launch [Remote Scanner]
1 cyc If Remote [Scanner is] Available Then [Branch To : Do] “Label”
1 cyc If Remote [Scanner is] Unavailable Then [Branch To : Do] “Label”

SYSTEM VARIABLES AFFECTED

  • EnemyX
  • EnemyY
  • EnemyDist
  • RemotesLeft

EXAMPLE USAGE

TryLaunch
   If Remote Scanner Is Unavailable Then Branch To
      TL_No
   Launch Remote Scanner

TL_No
   Resume
A Remote Scanner is a special device available in the Chassis Design Module (CDM). When you purchase a Remote Scanner launcher it is built into the CSS.
Remote launchers hold four Remote Scanners. When the “launch Remote Scanner” command is executed, the Remote launcher hurls a Remote Scanner into the air. Remote Scanners are links between your cybertank and the OSICOM I satellite.
Once a Remote Scanner is airborne and linked to the satellite, it obtains the location of the enemy cybertank nearest your cybertank. Remote Scanners are single use items since they are destroyed upon impact with the ground. At the start of each battle, your cybertank is loaded with four Remote Scanners if it has been equipped with a Remote launcher

Toadstool's Home | Contact © 2003 Toadstool's Game Shrines. All Rights Reserved.