More actions
JSpace is not nullsec. |
Removed all mention of the old pre-upwell nullsec stations |
||
| Line 16: | Line 16: | ||
* Territorial Claim Unit (TCU) | * Territorial Claim Unit (TCU) | ||
* Infrastructure Hub (I-Hub) | * Infrastructure Hub (I-Hub) | ||
Each of these structures provide benefits to the owner. | Each of these structures provide benefits to the owner. | ||
| Line 34: | Line 34: | ||
Upgrades, which are actual items that must be produced and delivered to the I-Hub for installation, are unlocked by achieving specific System Index Levels. | Upgrades, which are actual items that must be produced and delivered to the I-Hub for installation, are unlocked by achieving specific System Index Levels. | ||
==Claiming Sovereignty == | ==Claiming Sovereignty == | ||
| Line 44: | Line 40: | ||
===Placing structures=== | ===Placing structures=== | ||
If a system does not currently have an I-Hub, TCU | If a system does not currently have an I-Hub, or TCU a player may place one. | ||
Deploying an I-Hub or TCU involves buying or making one, and then launching it in to space (right-click and "launch" or dragging the structure to space). Once this is done the structure is in a neutral state and owned by the SCC. To gain ownership of the structure, a player must activate an entosis link on the structure to capture it. Other alliances are free to attempt to capture the structure while it is in this state. | |||
===Capturing existing structures=== | ===Capturing existing structures=== | ||
| Line 55: | Line 50: | ||
The base timer for each type of structure is: | The base timer for each type of structure is: | ||
* Structure (I-Hub, TCU | * Structure (I-Hub, TCU): 10 minutes | ||
* Command Node: 4 minutes | * Command Node: 4 minutes | ||
ADM is explained [[#Activity Defense Multiplier | below]]. | ADM is explained [[#Activity Defense Multiplier | below]]. | ||
| Line 80: | Line 75: | ||
If the defender wins the command node event, the structure being fought for becomes invulnerable and will remain that way until the next vulnerability window occurs. If the attacker wins, the next steps depend on the type of structure being attacked. For I-Hubs and TCUs, the existing structure explodes. This allows anyone to anchor their own structure in space to replace the old one. | If the defender wins the command node event, the structure being fought for becomes invulnerable and will remain that way until the next vulnerability window occurs. If the attacker wins, the next steps depend on the type of structure being attacked. For I-Hubs and TCUs, the existing structure explodes. This allows anyone to anchor their own structure in space to replace the old one. | ||
====Regeneration==== | ====Regeneration==== | ||
Structures that have been attacked but not reinforced | Structures that have been attacked but not reinforced and command nodes all have defensive regeneration. This means that if the structure is left uncontested, eventually the defending side will win. The maximum regeneration times are as follows: | ||
{| class="wikitable" | {| class="wikitable" | ||
| Line 89: | Line 83: | ||
! Structure !! Regeneration time (min) | ! Structure !! Regeneration time (min) | ||
|- | |- | ||
|- | |- | ||
| I-Hub || 50 | | I-Hub || 50 | ||
| Line 107: | Line 98: | ||
==Activity Defense Multiplier== | ==Activity Defense Multiplier== | ||
The length of time it takes to reinforce a structure | The length of time it takes to reinforce a structure or capture a command node depends on the Activity Defense Multiplier (ADM) for the system. This rewards an alliance for holding and being active in the system, making it easier for them to defend. | ||
The base timer for the structure is multiplied by the ADM to give the total amount of (uncontested) time required for an attacker to reinforce a structure or capture a command node. The time taken for a defender to regen a structure | The base timer for the structure is multiplied by the ADM to give the total amount of (uncontested) time required for an attacker to reinforce a structure or capture a command node. The time taken for a defender to regen a structure or capture a command node is unaffected by the ADM. | ||
The ADM is calculated based on the value of 3 defensive indices: | The ADM is calculated based on the value of 3 defensive indices: | ||
| Line 134: | Line 125: | ||
{| class="wikitable" | {| class="wikitable" | ||
|- | |- | ||
! Military Index Level !! Industrial Index Level !! Strategic Index Level !! Total Activity Multiplier !! Time to reinforce a structure !! Time to capture a command node | ! Military Index Level !! Industrial Index Level !! Strategic Index Level !! Total Activity Multiplier !! Time to reinforce a structure !! Time to capture a command node | ||
|- | |- | ||
| 0 || 0 || 0 || 1x || 10 minutes || 4 minutes | | 0 || 0 || 0 || 1x || 10 minutes || 4 minutes | ||
| Line 185: | Line 176: | ||
Structures are not vulnerable to attack 24 hours a day. Each alliance has a window of time set during which their structures are vulnerable to attack. This is usually their "prime time" where they are best able to fend off any attacks. Newly deployed or captured structures will inherit this setting from the alliance that controls it. However, the alliance can choose to change the window of any structure the default setting to a custom value. If a structure is partially captured at the end of a vulnerability window, it will remain vulnerable until it is either reinforced or successfully defended. | Structures are not vulnerable to attack 24 hours a day. Each alliance has a window of time set during which their structures are vulnerable to attack. This is usually their "prime time" where they are best able to fend off any attacks. Newly deployed or captured structures will inherit this setting from the alliance that controls it. However, the alliance can choose to change the window of any structure the default setting to a custom value. If a structure is partially captured at the end of a vulnerability window, it will remain vulnerable until it is either reinforced or successfully defended. | ||
===Changing the Vulnerability Window=== | ===Changing the Vulnerability Window=== | ||