Vexen Arc
OSG Planetary Operations Covert Intervention
10
|
Posted - 2012.07.09 16:55:00 -
[1] - Quote
A very thorough post, well done. I'm generally in favor of most of these ideas - really, anything that adds more to the game than pew pew is, imo, A Good Thing (TM).
Additionally, I will offer my opinion on voice communications for your consideration, as I have some ideas that tie them in with EWAR.
There used to be a game for the Xbox360 called Chromehounds which had a voice comms mechanic I found introduced a great deal of delicious tension to the multiplayer game. Essentially, the map was "dark" by default, meaning players couldn't communicate by voice at all, and "lighting up" an area to enable communications was accomplished by capturing static structures, or by fitting certain equipment. Communications coverage was represented on the map, and it made for quite a bit of hand wringing when a teammate was approaching the edge of that coverage -- it was not uncommon to watch, say, a scout disappear off of the map, only to have them reappear several moments later after having captured a control point (or sometimes not at all!). It also made it much easier to pick the enemy off if you were able to cut off their communications.
While this exact mechanic may not work for Dust, I bring it up specifically because I remember it so vividly, and as something I hope doesn't go overlooked as a possibility to introduce here.
As for how I see it working, and in order to stay on topic: A deployable device may be used to disrupt enemy communications in a certain range. Such a device would totally inhibit voice comms within its effective radius until either it times out or is destroyed. Such an effect might be cancelled by the use of a fitted command module, which allows for uninterruptable communications within its own radius.
More complex elements may be introduced for null-sec gameplay. For instance, EVE players may choose to build structures at their outposts that totally inhibit enemy communication across the entire map unless command suits or deployable communication structures are used by the attackers. This promotes real world reconaissance and cross-platform information exchange (or possibly disinformation!) as well as increased risk and complexity for the attacking team, who now have objectives of their own to defend. |