Home
Documents
Orient Guide

SECTION 2 - OSI/CACD SYSTEM 2 ENVIRONMENT

SECTION BRIEF - This section briefly describes the modules comprising the OSI/CACD System 2 environment and provides a hands-on demonstration of the systems. Please consult the Engineer’s Handbook for a more detailed description of these modules.

2.1 GENERAL DESCRIPTION

2.1.1 SYSTEM MODULES

The OSI/CACD System 2 represents the latest in Computer Aided Cybertank Design. This system consists of the External Control Module, the Chassis Design Module, the Artificial Intelligence (Al) Module, the Cybertank Test Module, the Battlefield Design Module, the Combat Simulation Module, the Simulation Design Module and the Data Duplication Module.

2.1.2 SYSTEM DEMONSTRATION

The demonstration in this orientation guide uses a predesigned cybertank to illustrate the development of the cybertank’s chassis, the artificial intelligence associated with it, and the actual combat simulation where you will witness the cybertank’s performance.

2.2 HUMAN INTERFACE

2.2.1 INTERFACE DEVICES

The OSI/CACD System 2 incorporates the latest in human interface technology. The system is designed for optimum efficiency when using a mouse or joystick. The system also supports a keyboard interface.

2.2.2 KEYBOARD INTERFACE

The OSI/CACD interface allows Complete Control using a keyboard. Refer to the OSI/CACD System 2 Reference Card for the keyboard commands that pertain to your terminal type.

2.2.3 THE POINTER

The pointer is a hand-shaped object moved about the screen with a mouse or joystick. It is used to select specific items (see Diagram 2.2.6).

2.2.4 CLICKING

Selections often made by moving the pointer to the Selections are often made by moving the pointer to the desired object or option and pressing and releasing the desired object or option and pressing and releasing the mouse or joystick button. This is referred to as clicking.

2.2.5 DRAGGING

Dragging is used to select objects or text. Place the pointer in a position marking the start or end point of the selection. Press and hold the button, and drag the pointer until you have highlighted the desired selections. Release the button.

2.2.6 PULL-DOWN MENUS

At the top of the screen is the menu bar (see Diagram 2.2.6). A menu is pulled down by placing the pointer over the menu title and depressing the button. This reveals a list of menu items. Menu items are selected by dragging the pointer down the list (the button must be held down). As the pointer passes over each menu item, the item is highlighted. When the desired item is highlighted, it is selected by releasing the button (see Diagram 2.2.6).

Diagram 2.2.6 - Pull-down menu with dimmed items

2.2.7 DIMMED ITEMS

Occasionally, some menu items appear less distinct than others. Less distinct items are referred to as dimmed. Dimmed items cannot be selected (see Diagram 2.2.6).

2.2.8 SUMMARY

The OSI/CACD interface is designed for ease of use. The interface is extremely intuitive and requires minimal training time. If you think something can be clicked on or pulled down, try it. You will often find that it can be.

2.3 THE DEMONSTRATION

2.3.1 EXTERNAL CONTROL MODULE

The External Control Module (ECM) should be displayed on your terminal (see Diagram 2.3.1). The ECM serves two purposes:
  1. It is your link to all other OSI/CACD modules, and
  2. It is your source for all OSI company announcements and world news broadcasts.

Diagram 2.3.1 - External Control Module (ECM)

2.3.2 EMAIL

Important company announcements and world wide news broadcasts are distributed via electronic mail (EMAIL). The Various news wires connected to the OSI/CACD System 2 network are:
  • (ANA) American News Agency
  • (MER) Middle East Report
  • (EPI) Eurasian Press International
  • (LJS) London Journalistic Society
  • (NAPS) North American Press Service
  • (SDE) Soviet Data Exchange
  • (GJN) Global Journalism Network
It is mandatory that all OSI personnel monitor their electronic mail messages.

2.3.3 DESIGN CONTROL MODULE

In this demonstration, we will bypass the creation of a cybertank and use the predesigned cybertank design, VIPER; however, we will step through all of the modules used in designing cybertanks.
>>> Select DESIGN CYBERTANK from the DESIGN menu to link to the Design Control Module (DCM).
From the DCM, you can create new cybertank designs, load existing cybertank designs, delete cybertank designs from your ID Disc, or create/edit AI Capsules (see Diagram 2.3.3).

Diagram 2.3.3 - Design Control Module (DCM)

2.3.4 LOAD VIPER

Chassis design is the first step in’ the development of a cybertank. In this demonstration we will use the previously created cybertank design, VIPER.
Special Note: Most terminals at OSI are equipped with multiple access slots or High Capacity Storage Devices (HCSD). Special Instructions will appear on your screen if your terminal is equipped with only one access slot.
>>> To load VIPER, select LOAD from the CYBERTANK menu. When the FILE RETRIEVAL PANEL (FRP) appears (see Diagram 2.3.4), the SELECTION BAR will be on VIPER. Click the OPEN button to load VIPER from your ID Disc (for keyboard control of the FRP, refer to the OSI/CACD System 2 Reference Card).

Diagram 2.3.4 - File Retrieval Panel (FRP)

2.3.5 ARTIFICIAL INTELLIGENCE MODULE

When you load an existing cybertank design from your ID Disc, you are automatically linked to the AI Module (see Diagram 2.3.5). This module is used to create your cybertank’s brain, where you impart the analytical logic required to terminate the enemy. Language designers at OSI have developed a special Cybertank Command Language (CCL) to facilitate the creation of AI.
>>> Displayed in the EDIT window are the opening lines of VIPER's artificial intelligence. Click on the Scroll-Bar at the right of the EDIT window (see Diagram 2.3.5) to scroll through VIPER's AI.
As you can see from scanning VIPER's AI, CCL comprehension is maximized by modeling it after the English language.
The Al Module contains a full-featured text editor. Commands can be entered directly from the keyboard or with the CCL Construction Panel (CP) (see Diagram 2.3.5). The CP is used to automatically and quickly construct a command line by clicking on the command buttons. Once entered, text can be edited using the cut, copy, paste, insert, or delete options.

Diagram 2.3.5 - AI Module

AI design can be facilitated using predesigned Al Library Capsules. Library Capsules are self-contained segments of artificial intelligence that perform isolated functions. OSI provides a number of library Capsules that greatly simplify the task of designing your cybertank’s AI. For example, instead of designing the AI that instructs your cybertank to move around an indestructible building, you can simply use one of the movement Library Capsules that instructs a cybertank to avoid obstacles.
Experiment with modifying or entering text with the CP and/or keyboard, but be careful not to save the changes to VIPER back to your ID Disc.

2.3.6 CHASSIS DESIGN MODULE

When creating a new cybertank, the DCM automatically links to the Chassis Design Module (CDM). In this demonstration, the cybertank design, VIPER, was loaded and the DCM automatically linked to the AI Module. The Al Module can link to the CDM in order to view or modify a cybertank’s chassis.
>>> Select CHASSIS from the CYBERTANK menu to link to the Chassis Design Module.
A cybertank’s chassis consists of its tank class, fuel Cells, drive system, weapon type, scanner, and assorted special items. The quality and quantity of components that can be added to your cybertank’s chassis are dependent upon your budget. Engineers with STANDARD Clearance have a budget of 1000 credits. Your current budget is displayed in the CREDITS Display Area (see Diagram 2.3.6).

Diagram 2.3.6 - Chassis Design Module (CDM) with VIPER loaded

VIPER’s general specifications are displayed in the Main Display Area (see Diagram 2.3.6). To modify a cybertank’s chassis, click the desired Component button on the right side of the screen. A list of options for that component will then be displayed.
>>> Click the Weapon Type button.
A complete list of available cybertank weapons, and the cost of each, is displayed. The currently selected weapon is designated by a highlighted circle. Items which are too expensive to select will be dimmed and unselectable. Clicking on the “None” selection deselects the currently selected weapon and its cost is returned to your budget.
Feel free to experiment with modifying VIPER's components, but be careful not to save the changes back to your ID Disc.

2.3.7 CYBERTANK AUTHORIZATION

A cybertank design must be authorized before it can be approved for combat simulations. For expedient authorization, your project directors designed the Cybertank Authorization Module (CAM). Cybertanks must have all the fundamental chassis components and be free of illegal command structure in their AI to receive authorization. Without proper authorization, cybertanks are denied access to the Combat Simulation Module. You will be informed of any cybertank design flaws during the authorization procedure.
>>> Authorization can be performed from either the CDM or the Al Module. Before authorizing VIPER, reload it to override any changes you may have made to it (for loading instructions, refer to Section 2.3.4 LOAD VIPER). If the OSI/CACD System 2 asks if you want to save the changes to VIPER, select NO. Once VIPER is reloaded, select AUTHORIZE from the CYBERTANK menu.

Diagram 2.3.7 - Cybertank Authorization Module (CAM)

The CAM will be displayed on your terminal (see Diagram 2.3.7). After a brief pause, VIPER will be approved.
After authorization is complete, a cybertank design can be further edited by clicking the DESIGN button at the bottom of the screen. Otherwise, as is more often the case, you can link directly back to the External Control Module by clicking the ECM button.
>>> Click the ECM button.

2.3.8 COMBAT SIMULATION MODULE

The efficiency of your cybertank design becomes apparent in the Combat Simulation Module (CSM). Melee (free-for-alls) or Team combats can be simulated. Team simulations offer alternate objectives:
  1. Absolute Termination - destroy all cybertanks on the opposing team, or
  2. Headquarters Termination - destroy the opposing team’s headquarters.
>>> A predesigned Combat simulation has been provided for your orientation. Select START SIMULATION from the SIMULATE menu. When the FRP appears, the SELECTION BAR will be on the ORIENTRT simulation. Click the OPEN button to load ORIENTRT from your ID Disc (refer to the OSI/CACD System 2 Reference Card for keyboard control of the FRP).
Combat begins automatically once the preselected battlefield and cybertanks are loaded from your ID Disc. This simulation is a melee combat between VIPER and three clones of itself. The battlefield is called SMALL.
>>> Press the PAUSE key to suspend the simulation (refer to the OSI/CACD System 2 Reference Card for the appropriate key for your terminal type).
While the simulation is suspended, familiarize yourself with the Instrument Panel displayed on the right side of your terminal (see Diagram 2.3.8).

Diagram 2.3.8 - Combat Simulation Module (CSM)

The instrument panel displays your cybertank’s fuel level, current damage, status of special components, scanned cybertanks, and simulation results.
The Battlefield Display Area on the left side of your terminal presents an overhead view of a portion of the battlefield. The selected cybertank is centered in the combat viewport with its name displayed below. Other cybertanks can be selected with the simulation either active or suspended. Destroyed cybertanks appear as craters or piles of junk when selected.
>>> Press the Cybertank Selection Keys on your terminal to select another cybertank for viewing (refer to the OSI/CACD System 2 Reference Card for the appropriate keys for your terminal type).

>>> Press the PAUSE key again to continue the simulation (refer to the OSI/CACD System 2 Reference Card for the appropriate key for your terminal type).

>>> It is often necessary to see the entire battlefield at once. In order to do this, select SATELLITE VIEW from the SIMULATION menu.
A simulated transmission from the orbiting OSICOM I satellite is displayed in the combat window. Active cybertanks are indicated by the flashing blips.
Clicking the mouse button will return you to the normal combat view. This simulation can be viewed in full speed from the satellite view (i.e., the simulation does not have to be paused to view the satellite transmission.)
Relax and observe the combat. Simulation times vary depending upon random positions of the cybertanks. This demonstration simulation should take from 30 to 60 seconds. You are notified when the simulation ends and the results are automatically recorded on your ID Disc. If you wish to observe another combat, select RESTART from the SIMULATION menu.
>>> When the simulation is completed and you are finished viewing the CSM, return to the ECM by selecting EXIT SIMULATION from the SIMULATION menu.

2.4 ORIENTATION SUMMARY

2.4.1 CONCLUSION

This concludes your introduction to the OSI/CACD System 2 environment. You should now be familiar with the External Control Module, the Design Control Module, the Chassis Module, the Artificial Intelligence (AI) Module, and the Combat Simulation Module.
For complete information concerning the OSI/CACD System 2 environment, refer to the Cybertank Engineer’s Handbook. The handbook is divided into six sections. The first section is a Training Guide that covers the complete design of a cybertank. Experienced engineers may wish to skip the Training Guide and proceed directly to the reference sections. The second and third sections present detailed descriptions of the modules comprising the OSI/CACD System 2 environment and the complete structure of the Cybertank Command language. Section four explains and details how to use predefined Al library Capsules, which greatly simplify the creation of a cybertank’s AI. Section five explores all of the possible combat variations and discusses such features as the communications link and manually controlled cybertanks. Section six is a trouble shooting guide.
Once again, we stress that OMEGA is a top priority military contract that pushes the limits of cybernetics technology. Please do not hesitate to express any questions or comments to your project directors. We are confident of your ability to contribute to this project and look forward to your long and productive career with the Organization of Strategic Intelligence.

Back to TABLE OF CONTENTS

Toadstool's Home | Contact © 2003 Toadstool's Game Shrines. All Rights Reserved.