Skip to main content

How It Works: Star Wars: The Clone Wars



“Bold yellow letters appear over a starfield; “Star Wars: The Clone Wars.” 
  • The English Audio description in front of every episode.




This is a lot more theoretical than I’m used to. I had to watch several episodes to get enough material I was happy with. 

(Oh, woe is me, I had to watch a great television program!)

Let’s get started.




"Looks like you used a macro protocol to wipe them all simultaneously. Impressive."
  • S1,E18, “The Mystery of The Thousand Moons”

While this is something made up for the show, I did end up searching macro protocol and coming across this page before the Wookiepedia page.

“Protocol macros enable data to be sent to and received from external devices by simply executing the PMCR(260) instruction in the CPU Unit. “

That’s done via a serial port…but this is for industrial automation - Though many droids in the SWverse are seen as less refined and more industrial, let’s pretend that the serial port is through the long part of the face of a B1 Battle Droid.



Since  CPUs performance basic control, arithmetic, logical, and input/output (I/O),  it might be plausible in this world of space-magic. 





“I’m going to try and override the controls”
  • S2, E8, “Brain Invaders”

You hear that a lot in science fiction, don’t you?

Here, mind-controlled clones (clones created to serve the Republic and Jedi) have been mind-controlled and have taken over the bridge of a ship, blocking access to the cockpit.

Barriss (A Padawan; Jedi student) tries to use presumably the permissions she has on an account to remove the shields stopping her and Ahsoka (Another Jedi student) from progressing to the bridge.

The interface? About 7 large, square buttons and a screen. Maybe there’s biometric security authentication at some point.

By the way; This is one of my favorite episodes of the show.


“We’re unable to reach him.”
“It could be a solar storm. Or they’re rebooting their communications systems.”
  • The Clone Wars, 2008

Before it was a show, it was a movie. This was my first time watching it, and Palpatine has asked Mace Windu to contact Anakin and Obi-Wan, but the nearest space cruiser to the planet Christophsis can’t contact the pair, and so they send a small craft with a messenger.

Quite a lot of things can interfere with communications, even if they’re wireless; Microwave waves, frequency bleed, malicious interference by a third party, materials in buildings, and especially the gaping void of space.

I mean, I can only imagine that last bit.

Turns out the Jedi also couldn’t send messages from the planet. So my guess is malicious interference so far.

Does nobody in a galaxy far, far away know about bottom-up troubleshooting? Ping or Traceroute?

The messenger - Ahsoka’s first appearance! - Says that they could try relaying a message through the signal on the craft.

Let’s assume everyone above tried that already and that it would take a closer distance far from prying eyes to convey the messages, probably far overhead, near the atmosphere.

And it would appear that does it; The craft is near the cruiser in space, relaying a message from the three on the ground via hologram.

Malevolent forces were prepared to interfere with communication from a large ship, not a small one. Score one!

Check out some more information about GPS interference;



“It’s no use, their comlinks are on a different scramble set.”
  • S1, E5; “Rookies”

My first instinct was to say “Frequencies are different”.

That still might be a possibility, and I realized; Comlinks are sometimes used at extreme distances.

See the “Brain Invaders” entry above; Once Ahsoka actually had to get to a hologram projector to contact Anakin, who was on another ship. 

Sometimes she could use her comlink when one was on a planet and another on a ship. 

Other times, an actual hologram could appear, but that may simply be functionality not used often.

So this may simply be a case of playing fast and loose with space technology.

Or; Frequencies are different. 



“……The vault will go into immediate shutdown. No one will get in or out. This will give you very little time before the emergency generator cycles and takes over.”
“You’ll use this [a very small device, presumably to copy or hold files] to find and download the exact files from the main frame.” This is one of the most secure banks in the galaxy, but it was designed to keep people out."

  • Season 6, The Lost Missions - An Old Friend

First, this is a very secure bank. Make sure no outsider USB ports or drives can attach to your planets-wide banking infrastructure. In a world where you can fly spaceships, assume someone getting around your security system to steal files is exactly what they want to do and plan accordingly.

Bonus: I watch these with the audio captions on Netflix, and sometimes the commentator gets really excited. I had a good laugh at “They head STRAIGHT FOR A CLIFF…THEY FLY OVER THE EDGE….and land on the shuttle.”



Comments

Popular posts from this blog

Making KPI Dashboards with PowerBI

 While this is the free tier, I cannot share or collaborate with others, nor can I publish content to other people's workspaces, but they will not stop me from screenshooting and recording these self-taught adventures,so! I'm doing this because I idly searched "Mattel careers" and "Information Technology", and seeing a bulletpoint saying the following: Analytical and reporting skills such as creating dashboards and establishing KPIs such as experience with PowerBI, Cognos, Tableau, and Google Data Lake/AWS is preferred And thought "Well, I've used Tableau, and I've heard about PowerBI,  even if its in-demandness is questionable , so how similar is it? And can I write about it?"  First, PowerBI (PIB) does have a downloadable, local version, but apparently Windows-only. I could download the .exe but I couldn't run it / drag it to applications on my MacBook.  Not a problem, we'll use the online SaaS version, and a dataset found here, ...

Connecting IoT Devices to a Registration Server (Packet Tracer, Cisco)

 If you're seeing this post, I'm helping you, and you probably have LI presence: React and share this post to help me in return.   In Packet Tracer, a demo software made by Cisco Systems. It certainly has changed a lot since 2016. It's almost an Olympic feat to even get started with it now, but it does look snazzy. This is for the new CCNA, that integrates, among other things, IoT and Automation, which I've worked on here before. Instructions here . I don't know if this is an aspect of "Let's make sure people are paying attention and not simply following blindly", or an oversight - The instructions indicate a Meraki Server, when a regular one is the working option here. I have to enable the IoT service on this server. Also, we assign the server an IPv4 address from a DHCP pool instead of giving it a static one. For something that handles our IoT business, perhaps that's safer; Getting a new IPv4 address every week or so is a minimal step against an...

AWS Infrastructure Composer

 A very brief look. The text says; Drag and drop any CloudFormation resource on a visual canvas Connect and configure enhanced components to automatically build IaC for an application architecture Seamlessly transition between authoring workflows visually with Step Functions Workflow Studio and defining resources with Infrastructure Composer Integrate your browser with your project through “local sync” or use Composer in the AWS Toolkit for Visual Studio Code In 2019 there was a similar tool to build infrastructure that would be converted to code. Nice to know they bought it back. When you enter the Composer, it's a blank space with a background reminiscent to the screen for Cloud Formation. Infrastructure Objects are to the left in a drawer;  I've selected a bucket that I can rename. I went to connect a bucket to a Dynamo DB Table, and it's not available yet. It also lost a bucket somewhere in the ether of the GUI. Ah well. I couldn't find the EC2 instance in the...