COMPUTERS

Last Update:  05/07/2005

 

USER INTERFACE
Interaction between the crew and the computer system is governed by the Main Computer Network Interface System (MCNIS).  The computer system of any vessel is comparable to the brain of a life form.  Vocal and touch panel computer operation functions are incorporated into the system.  Several security protocols are activated when the MCNIS receives an attempted voice command to ensure that the user is authorized for voice-command access.  Voice commands can be entered from any terminal or control panel.  Normally only the vessel's Commanding Officer and Executive Officer are granted voice-command access privileges.  They are allowed to grant voice-command access to up to three other senior officers or VIPs.  All other crewmembers have login/password access in normal conditions.  In Alert Status Two/One conditions, fingerprint scans can be allowed to grant access, such as an emergency crewmember replacement for an incapacitated person.  All terminals and control panels are either connected directly to a subprocessor or are connected to the data distribution grid.  Each active terminal/station is queried by the MCNIS software every 30 delliseconds to maintain fast response times.  Displays are generated by datastreams transmitted at a 42 nanosecond databurst.  The same datastream is displayed for static images; moving images are updated at the same 30 dellisecond rate as needed.  Portable terminals and tricorders interface with the NCMIS system via short-range frequency modulation transmitter links (FMTL) through transceivers scattered throughout the vessel.

MAIN COMPUTERS
This vessel contains two primary computer cores.  The first spans decks 9-13 amidships, while the second spans decks 7-11 in the aft section.  Both units contain subspace field generators to provide faster-than-light (FTL) processing capability.  These generators create a nonpropulsive subspace field distortion of 2847.5 dellikelriks.  Core elements are arranged into optical transtator batches of 1280 segments.  These batches are grouped into collections of 256 units; each controlled by banks of 16 isolinear chips.  Each core is made from three primary and two secondary levels, each level having five modules.  Failure of one core is not an immediate concern because the other core can assume its duties without interruption due to the maintenance of chrono-synchronization.  If one core should be lost many of the secondary systems will be turned over to secondary processors so that the remaining core can be reserved for main functions and emergency situations.  There is a 7% reduction in data transmission signal quality across the edge of the subspace field at the micron junction links (MJL), but the accelerated processing ability of the FTL cores and redundant error-checking algorithms more than compensates for this.

Memory storage for each main core consists of 2048 dedicated modules of 144 isolinear chips.  Under MCNIS software control, these modules provide average dynamic access to memory at 1900 kelliquads/second.  Total storage capacity for each module is 275,000 kelliquads, depending on software configuration.

SUBPROCESSORS
There are 300 subprocessors scattered throughout the vessel to aid in data handling and processing though they do not possess FTL processing capability.  If both cores should fail the network of subprocessors can take over computer functions along with the core dedicated to the holodeck system (see HOLODECK COMPUTER section below.)  Applications of a less-critical nature will be terminated in favor of those of more importance (damage control, navigation, weapons, etc.)  The majority of these subprocessor elements are concentrated in the following areas:

Main Bridge.

Auxiliary Bridge.

Forward Weapon Module Bridge.

Engineering.

Subspace Jamming Control Center.

Cloaking System Control Center.

Commanding Officer's quarters.

HOLODECK COMPUTER
The holodeck system operates from a computer core dedicated to the holodeck facilities approximately one-third the size of the units that operate the Vor'Cha itself.  This alleviates the main cores from the workload the holodeck system generates.  Due to many reported cases of problems being experienced with holodecks in both Empire and Federation service of damage being sustained from external causes, the holodeck computer core normally operates in a stand-alone mode.  In this mode, the computer data circuits are physically disconnected from the rest of the ship to prevent infection from computer viruses or other outside "influences".  Three cables represent the interface the holodeck computer core has with the ship's data distribution network.  In battle situations the connection is generally restored in case the holodeck computer core is needed to supplement the main cores.  The holodeck system is normally powered by the ship's power distribution network, though the holodeck compartments are equipped with three small power generators and one is provided for the holodeck computer core itself.

BIO-NEURAL GEL PACKS
Data handling and processing ability of the primary and secondary computer cores have increased significantly over standard vessels due to technology exchange programs between the Klingon Empire and the United Federation of Planets prior to the collapse of the original Khitomer Accords in 2371.  The Empire received technical specifications and other data about their new development of bio-neural gel packs that they are incorporating into their newest vessels.  These packs are installed into the data conduits all over the ship.  Their function is to provide rudimentary data processing capability on their own, which will help reduce the work burden of the main computers.  They also incorporate data stream error-checking ability.  This allows them to try to "fix" potentially faulty data streams before the main computers receive the data.  Personnel from the engineering department perform daily examinations of the packs in use to check them for any viral infections that could interfere with their operation.  Packs that are unable to be sterilized by the ship's medical staff will be removed and replaced.  Careful examination of the system will be performed to ensure the new pack will not be infected as well.

PORTABLE COMPUTER DEVICES
For generations Klingon vessels and stations have made use of portable computing devices of one form or another, as have other known races.  These have performed numerous functions, from simple record storage for transport to calculations and data analysis & manipulation.

Modern Klingon devices, adopting the name of Personal Access Display Device (PADD) used by most other known races, is constructed of pressure-forged tritanium.  The dimensions of the standard device are 9.5 x 3.49 x .5 gellicams and weighs 27.6 vams.  The display area is a vertically elongated six-sided form measuring 4.1 x 2.9 gellicams.  There are differing designs resulting from specific-purpose requirements or construction by private-sector industrial facilities.  Advances in miniaturization in recent years have allowed for the incorporation of billions of individual display elements within the display surface, improving visual display resolution.  While Klingon devices are generally limited in control functions and data storage capacity than those designed by other races, they compensate with their speed and durability in combat & other field usage away from ships and stations.

Data storage within the device is comprised of two isolinear chips possessing a capacity of 2.16 standard kelliquads.  These devices have recently had introduced into them subspace transmitter/receiver units to facilitate remote communication with larger computer systems (such as Imperial stations and spacecraft).  Such transmissions generally employ some form of data encryption algorithms.  These devices are capable of serving as a transporter lock node for transporter operation.  These devices are powered by a single thermocouple induction loop of cesium diferrofluorite that will permit almost 48 hours of continuous operation.

TERMINALS AND PORTABLE COMPUTER DEVICES
This vessel is equipped with any number of computer terminals & consoles as well as mobile computing devices.  A number of desktop terminals have been installed throughout the vessel utilizing a standard Klingon interface.

As with PADDs, most Klingon terminals have been constructed from pressure-forged tritanium.  Standard models are 15.2 x 12.8 x 12.5 gellicams in dimension.  The screen construction is also very similar to PADDs with more touch-based operating capability.  While more of a square-shape than PADDs, the screen utilizes dynamic resolution adjustment within the display matrix.  Power is supplied by a thermocouple induction loop of cesium diferrofluorite able to operate without recharge for 85 standard hours.  All computerized desktops were fitted with microwave power emitters that can provide power to desktop terminals and similar devices when not being used as mobile devices.  23 standard isolinear chips installed inside the terminal having a total storage capacity of 970 kelliquads provide data storage.  Connection to the vessel's data distribution grid is maintained through subspace transmitter/receiver units incorporated into the inner workings of the terminal.

Terminals can be configured with a customized interface to improve the user's efficiency.  A terminal can be configured with many different layout preferences to allow multiple users to utilize any terminal.  A user will activate a terminal by voice command or touch (if not already active) and display a standard interface.  The terminal will then access its own memory records for an identity match.  If one is found, the display will be modified to the user's pre-programmed display parameters.

COMPUTER SECURITY
There are multiple security measures in place for the computer system's security preservation.  The first level is voice and fingerprint analysis when an attempt is made to use the system.  The security subroutines of the computer will compare the user's identity claim with those on file and attempt verification.  If verification is successful, the user will be granted access based on their security level entered into the computer records.  Requests involving higher levels of security may require additional identity verification measures, including retina scan and identity verification from security personnel.  Records are kept of all computer usage and reviewed by station security personnel regularly.

Access to computer equipment is generally restricted to necessary personnel and repair technicians.  Monitoring of equipment is performed regularly to prevent sabotage and security violations.  Records are forwarded to High Command for review and analysis with recommendations and orders for changes to security protocols returned when deemed appropriate.