Table of Contents

SYNC Node

SYNC Logo

The SYNC is built upon nodes. There are three types of nodes and each performs several roles.

Common Facets

Heuristic encryption, capable of accessing and using any communications channel available. Also capable of determining the appropriate channel to use for optimum efficiency. Regardless of operation all Nodes interact with the other local nodes. They also maintain logs of all transactions that have passed through.

Primary Node

A primary node is responsible for controlling and routing all network traffic through it. Typically a single Primary node is sufficient for a location with a population of 100 million users. The node monitors all activity within it, and stores in in logs. Capacity can be increased by using one or more Secondary nodes in Load Balancing mode.

Secondary

Secondary nodes are always present with a primary node. They serve as a fallback resource, and extra bandwidth when needed.

Security

A Security node is designed to monitor all traffic going through any Primary or Secondary nodes present. They are only present in high volume where multiple Primary and Secondary node pairs are deployed. Unless instructed they scan all the data logs and look for patterns of activity that could indicate attempts to compromise the network. Additionally the node can initiate a targeted scan for specific activity. It can only be initiated by the Yamatai National Police, Yamatai Security Agency with due cause. Any activity that meets the specified criteria is forwarded to the respective agency.

Node Locations

This lists just some of the locations where nodes are present.

OOC Notes

Authored by Nashoba Submission Approved by Wes on May 7, 2012. Forum Thread.