SlideShare a Scribd company logo
1 of 3
Phillip Norris Wynne 3D Game Workflow
3D Game Work Flow
The task I was given was to make a game with the unity engine, and to design a first person level you would be
able to navigate. The type of level that I had gone with was a large area surrounded by mountains; it keeps
most of the sunlight out until late Moring where It peaks over the mountain tops.
The start of it came to be quite easy; I made a large mesh to create the floor for the map which I could build
off of, I built up the edges to create a mountainous effect, the built up area was a design I thought of when
looking at a desert area with the tall but close mounds of dirt, rock, and sand.
Phillip Norris Wynne 3D Game Workflow
The next image is showing the textures I have put into my game, with not having a lot of time to complete this
level only a few textures were used, this is the grassy texture that I used for the game.
To make the pathways I used a different texture mixed and blended with the one from earlier, it gives the
pathways a more distinctive look, like they have been walked upon more than the grass
This image is of the path way going through the small suburban town; it gives you a way to get around the map
so you’re not wandering around. This is also the main part of the map the small town, you have to navigate
this to get to the large woods.
Phillip Norris Wynne 3D Game Workflow
This image shows the large forest, I found out when you got to the middle it was almost impossible to get out,
as the terrian was very steap and hard to manovour, add to the almost impossible sense that you had no idea
where you were.
The images below are showing details in the surburb. The details are mailny surban villages and a lot of tree.
These objects are also all have collision mask meaning you cannot walk through them.

More Related Content

Viewers also liked

MuleSoft ESB Payload Encrypt Decrypt using anypoint enterprise security
MuleSoft ESB Payload Encrypt Decrypt using anypoint enterprise securityMuleSoft ESB Payload Encrypt Decrypt using anypoint enterprise security
MuleSoft ESB Payload Encrypt Decrypt using anypoint enterprise securityakashdprajapati
 
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddelCHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddelmohamed khalaf alla mohamedain
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of NetworkingMukesh Tekwani
 
Network topologies
Network topologiesNetwork topologies
Network topologiesNorah Saad
 
MuleSoft ESB Sending email using hmailserver
MuleSoft ESB Sending email using hmailserverMuleSoft ESB Sending email using hmailserver
MuleSoft ESB Sending email using hmailserverakashdprajapati
 

Viewers also liked (11)

Ieee standards
Ieee standardsIeee standards
Ieee standards
 
MuleSoft ESB Payload Encrypt Decrypt using anypoint enterprise security
MuleSoft ESB Payload Encrypt Decrypt using anypoint enterprise securityMuleSoft ESB Payload Encrypt Decrypt using anypoint enterprise security
MuleSoft ESB Payload Encrypt Decrypt using anypoint enterprise security
 
Sctp tutorial
Sctp tutorialSctp tutorial
Sctp tutorial
 
Token ring
Token ringToken ring
Token ring
 
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddelCHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
CHAPTER 6 REQUIREMENTS MODELING: SCENARIO based Model , Class based moddel
 
Osi model
Osi modelOsi model
Osi model
 
OSI Model of Networking
OSI Model of NetworkingOSI Model of Networking
OSI Model of Networking
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
MuleSoft ESB Sending email using hmailserver
MuleSoft ESB Sending email using hmailserverMuleSoft ESB Sending email using hmailserver
MuleSoft ESB Sending email using hmailserver
 

More from PhillipWynne12281991

Y1 games ig2 learner assessment submission declaration
Y1 games ig2 learner assessment submission declarationY1 games ig2 learner assessment submission declaration
Y1 games ig2 learner assessment submission declarationPhillipWynne12281991
 
Sound recording glossary preivious
Sound recording glossary preiviousSound recording glossary preivious
Sound recording glossary preiviousPhillipWynne12281991
 
The adventures of ken n kev the heist
The adventures of ken n kev   the heistThe adventures of ken n kev   the heist
The adventures of ken n kev the heistPhillipWynne12281991
 
The adventures of ken n kev the heist final draft
The adventures of ken n kev   the heist final draftThe adventures of ken n kev   the heist final draft
The adventures of ken n kev the heist final draftPhillipWynne12281991
 
Ig1 task 2 analysis work sheet spiderman
Ig1 task 2 analysis work sheet spidermanIg1 task 2 analysis work sheet spiderman
Ig1 task 2 analysis work sheet spidermanPhillipWynne12281991
 
Ig1 task 2 analysis work sheet the walking dead
Ig1 task 2 analysis work sheet the walking deadIg1 task 2 analysis work sheet the walking dead
Ig1 task 2 analysis work sheet the walking deadPhillipWynne12281991
 
Ig1 task 2 analysis work sheet portal
Ig1 task 2 analysis work sheet portalIg1 task 2 analysis work sheet portal
Ig1 task 2 analysis work sheet portalPhillipWynne12281991
 
Ig1 task 2 analysis work sheet deadpool
Ig1 task 2 analysis work sheet deadpoolIg1 task 2 analysis work sheet deadpool
Ig1 task 2 analysis work sheet deadpoolPhillipWynne12281991
 
The adventures of ken n kev the heist first
The adventures of ken n kev   the heist firstThe adventures of ken n kev   the heist first
The adventures of ken n kev the heist firstPhillipWynne12281991
 

More from PhillipWynne12281991 (20)

Games y1 ap3 2015
Games y1 ap3 2015Games y1 ap3 2015
Games y1 ap3 2015
 
7274 submission form
7274 submission form7274 submission form
7274 submission form
 
Je ha3 ha4 submission form
Je  ha3 ha4 submission formJe  ha3 ha4 submission form
Je ha3 ha4 submission form
 
L3 gd unit13_retake_310515
L3 gd unit13_retake_310515L3 gd unit13_retake_310515
L3 gd unit13_retake_310515
 
d2Doc2
d2Doc2d2Doc2
d2Doc2
 
Y1 games ig2 learner assessment submission declaration
Y1 games ig2 learner assessment submission declarationY1 games ig2 learner assessment submission declaration
Y1 games ig2 learner assessment submission declaration
 
Sound recording glossary preivious
Sound recording glossary preiviousSound recording glossary preivious
Sound recording glossary preivious
 
Sound recording glossary
Sound recording glossarySound recording glossary
Sound recording glossary
 
doc2
 doc2 doc2
doc2
 
L3 gd unit13_retake_310515
L3 gd unit13_retake_310515L3 gd unit13_retake_310515
L3 gd unit13_retake_310515
 
The adventures of ken n kev the heist
The adventures of ken n kev   the heistThe adventures of ken n kev   the heist
The adventures of ken n kev the heist
 
The adventures of ken n kev the heist final draft
The adventures of ken n kev   the heist final draftThe adventures of ken n kev   the heist final draft
The adventures of ken n kev the heist final draft
 
Que cards
Que cardsQue cards
Que cards
 
Script
ScriptScript
Script
 
Ig1 task 2 analysis work sheet spiderman
Ig1 task 2 analysis work sheet spidermanIg1 task 2 analysis work sheet spiderman
Ig1 task 2 analysis work sheet spiderman
 
Ig1 task 2 analysis work sheet the walking dead
Ig1 task 2 analysis work sheet the walking deadIg1 task 2 analysis work sheet the walking dead
Ig1 task 2 analysis work sheet the walking dead
 
Ig1 task 2 analysis work sheet portal
Ig1 task 2 analysis work sheet portalIg1 task 2 analysis work sheet portal
Ig1 task 2 analysis work sheet portal
 
Ig1 task 2 analysis work sheet deadpool
Ig1 task 2 analysis work sheet deadpoolIg1 task 2 analysis work sheet deadpool
Ig1 task 2 analysis work sheet deadpool
 
Task 3 research findngs
Task 3 research findngsTask 3 research findngs
Task 3 research findngs
 
The adventures of ken n kev the heist first
The adventures of ken n kev   the heist firstThe adventures of ken n kev   the heist first
The adventures of ken n kev the heist first
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

3 d game work flow

  • 1. Phillip Norris Wynne 3D Game Workflow 3D Game Work Flow The task I was given was to make a game with the unity engine, and to design a first person level you would be able to navigate. The type of level that I had gone with was a large area surrounded by mountains; it keeps most of the sunlight out until late Moring where It peaks over the mountain tops. The start of it came to be quite easy; I made a large mesh to create the floor for the map which I could build off of, I built up the edges to create a mountainous effect, the built up area was a design I thought of when looking at a desert area with the tall but close mounds of dirt, rock, and sand.
  • 2. Phillip Norris Wynne 3D Game Workflow The next image is showing the textures I have put into my game, with not having a lot of time to complete this level only a few textures were used, this is the grassy texture that I used for the game. To make the pathways I used a different texture mixed and blended with the one from earlier, it gives the pathways a more distinctive look, like they have been walked upon more than the grass This image is of the path way going through the small suburban town; it gives you a way to get around the map so you’re not wandering around. This is also the main part of the map the small town, you have to navigate this to get to the large woods.
  • 3. Phillip Norris Wynne 3D Game Workflow This image shows the large forest, I found out when you got to the middle it was almost impossible to get out, as the terrian was very steap and hard to manovour, add to the almost impossible sense that you had no idea where you were. The images below are showing details in the surburb. The details are mailny surban villages and a lot of tree. These objects are also all have collision mask meaning you cannot walk through them.