typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK861 IWN secret network simulates the fourth generation supercomputer!

.

The fourth generation of supercomputers uses ultra-high-speed networks, and the iwn secret network only uses ordinary Internet networks. The former is distributed centralized computing, while the latter is distributed decentralized computing.

Shi Lei is preparing to simulate the establishment of the fourth-generation supercomputer based on the iwn secret network, and then rely on the advantages of the fourth-generation supercomputer to completely resolve the attack of the Angel Council and give the Angel Council a painful counterattack!

Jingyayuan.

Shi Lei put his hands on the keyboard and quickly entered a large amount of English source code.

"Yi Zuer, check in real time!" Shi Lei ordered Yi Zuer and asked Yi Zuer to help verify the error code.

Yi Zuer's real-time verification function can only verify grammatical errors or word spelling errors, but cannot correct logical errors. Because Yi Zuer doesn't know what program Shi Lei is writing the source code. Otherwise, would Shi Lei still need to write the source code by himself? Wouldn't it be better to let Yi Zuer generate the source code directly!

Shi Lei will not write source code by himself any program that Yi Zuer knows the source code. The speed at which Yi Zuer generates source code is definitely greater than that of manually writing source code.

Two minutes later, the iwn secret network had 780 tflops left in the distributed computing resources, and Shi Lei finally completed the writing of the source code. After executing the program composed of the source code, iwn secret network can briefly become a fourth-generation supercomputer!

"Yuzhuer, verify all source codes. If there is no logical error, execute the source code program immediately!" Shi Lei ordered.

"yes, sir. is verifying the debugging source code. The debugging is completed line by line. No logical errors are found. I started to prepare to execute the source code program. After the system automatically simulates the calculation, the source code is executed. The iwn secret network will crash after three minutes and thirty-five seconds. Is it executed?" Yi Zuer's main system performed the simulation calculation of the sandbox system before executing the source code written by Shi Lei.

The source code written by Shi Lei does crash the iwn secret network, which is the price of making the iwn secret network forcefully simulate the fourth generation supercomputer. There is never anything in the world that can get rewards without paying the price. Shi Lei is very clear about the consequences of the crash of iwn secret network, but if used properly, he will quickly kill Raphael and the Angels Council. The iwn secret network may not collapse!

"Start thefour!" Shi Lei said firmly. thefour is to let iwn secret network simulate the program of the fourth generation supercomputer. It is a very sharp double-edged sword. If it is well applied, it can defeat the enemy; if it is not used well, it can only hurt yourself!

"I understand, sir!" Yi Zuer started thefour.iwn secret network immediately began to respond to thefour.iwn secret network's underlying code began to change, starting from the lowest code.iwn secret network began to build corresponding strategies.

First, the first layer of strategy built by iwn secret network implicitly opens the bandwidth limit of network service providers, frees up the maximum line bandwidth, and expands the network line bandwidth of iwn users.

The network bandwidth of each network user is limited by the port settings of the network service provider, rather than the maximum value that the line can actually carry. For example, the network bandwidth of a certain user is 2m. Then, theoretically, the maximum downlink speed of the user is 256kbs. This downlink speed may cause delays when accepting task data distributed by iwn secret network.

For example, if the task packet distributed by iwn secret network is 1mb, then at the theoretical maximum speed, it will take at least 4 seconds for a user to accept the task packet distributed by iwn secret network. If the network transmission loss is included, it may take 5-6 seconds. This is one of the reasons why iwn secret network accepts computing resources feedback from iwn secret network users.

After thefour is started, the first thing is to implicitly release the maximum bandwidth of the line. The so-called maximum bandwidth is the bandwidth that the line can reach, and then the bandwidth is liberated. If the user's bandwidth is originally only 2m and the line bandwidth is 8m, thefour will release the user's bandwidth to the maximum 8m.

The user's bandwidth is increased from 2m to 8m. If the task packet distributed by iwn secret network is 1mb, theoretically, it only takes 1 second for a line with an 8m bandwidth to accept a 1mb packet!

The benefits of increasing user bandwidth are very obvious, that is, it directly improves the contact feedback speed between users and iwn secret network, making the overall resource computing speed of iwn secret network faster.

After thefour has unpacked the maximum bandwidth of all connected users of the iwn secret network, thefour immediately executes the second step. The second step is to optimize the iwn secret network user resource area.

iwn secret network user resources are distributed all over the world. These user resources originated from the main server of the iwn secret network that arrived at the iwn secret network. They were originally point-to-point transmission, that is, for each iwn secret network user, they directly contact the parent program of the iwn secret network.

Now, the thrfour program has been adjusted, partition merged according to the user's area, and after the merged user resources, the inter-domain main channel network is selected, and it is directly transmitted to the parent server of the iwn secret network.

The so-called partition merger is to let players from a certain area merge. For example, the iwn secret network users in Shuangqing City assume that they have one million people.

These million iwn secret network users in Shuangqing City originally fed back computing resources to the origin of supercomputers one-to-one. However, after thefour modification, one million iwn secret network users in Shuangqing City will be merged together and pass information through the city's main road network.

The advantage of this is that the information processing volume is highly concentrated, and the data transmission volume of the main road network is faster without being restricted by network congestion. The Internet will also have the same congestion in the real world, just like traffic jams. If the data transmission volume of a certain network is too large, or a hacker war occurs, and the network is filled with too much spam data, it will cause network congestion.

Network congestion is also a factor that causes network delay!

Thefour's strategy is to concentrate iwn secret network users by region, bypass networks that may have network congestion, and directly go to the main network between domains.

In addition to the above two strategies, thefour will also implement the final strategy, which is to simulate the network acceleration function and allow ordinary Internet networks to have some characteristics of high-speed networks. This technology is very difficult. Shi Lei dares to assert that even the number one giant in the Angels Council has not mastered this technology.

The technology of simulating high-speed networks is Shi Lei’s unique technology!

After the thefour program is enabled, the iwn secret network quickly undergoes transformation. Although the tasks executed by thefour are very complicated, the execution speed is very fast.

In just less than ten seconds, iwn secret network completely executed thefour program, changing from a distributed decentralized computing cluster to a pseudo-distributed centralized computing cluster.

Yi Zuer automatically displays a countdown ‘03:35’ in the upper left corner of the display screen of the No. 1 server, which means that the iwn secret network simulates the fourth generation supercomputer, and the maximum time is only a little over three and a half minutes.

"Sir, please pay attention to the remaining time, once the remaining time returns to zero. The possibility of the iwn secret network crashing is as high as 99:99." Yi Zuer reminded Shi Lei.

Shi Lei nodded and answered affirmatively, "Yuzhu. Ask me and prepare to fight back!"

Dream Entertainment has been suppressed and invaded by the Angels Council. Shi Lei has already been holding back his anger. Now the iwn secret network has become the fourth-generation supercomputer. Shi Lei just wants to give Raphael a little good look, so that Raphael understands that he is a sissy. Sissy is always a sissy, but after all, just a weak person!

"yes, sir, are here to serve you at any time!" Yi Zuer responded.

Angel Council. Secret Voice Communication Channel.

Raphael, who was invading, suddenly changed his face, "Oh no, Mr. M is here!"

"Mr. Raphael, is Mr. M here?" The Sunshine Angel actually wanted to ask, 'Is Mr. M here? Why didn't I find it?'

"Damn it! Mr. M is counterattacking us!" Raphael looked at the firewall he wrote alertly. Although the firewall did not issue a prompt, Raphael still found an exception.

At this moment, Shi Lei was controlling the iwn secret network and attacking the Angels Council with all his might. He focused his main target on Raphael. As for the Sunshine Angel and the Moonlight Angel, Shi Lei did not want to deal with them for the time being.

Sunshine Angel and Moonshine Angel have a special status in the Angel Parliament. This pair of hackers did not join the Angel Parliament from the beginning. The most important thing is that they did not participate in some messy tasks in the Angel Parliament. At most, they only carried out hacking and did not use hacking technology to cause any casualties.

The pseudo-fourth generation supercomputer iwn secret network is controlled by Shi Lei and easily breaks through the external defense of the Angels Council. Shi Lei searches for the sacred position of the supercomputer.

In order to track the supercomputer sacred, Shi Lei was very careful. However, Shi Lei suddenly snorted depressedly, "I was still discovered!"

Raphael found Mr. M from the firewall. He was trembling all over. Mr. M finally came out. Raphael finally had a chance to take revenge! Unfortunately, Raphael was destined to be unable to take revenge this time.

Because, when Raphael discovered Mr. M, Shi Lei also knew that his invasion was exposed, so he simply stopped hiding and stood up openly to snipe Raphael.

Although Mr. M suddenly appeared, Raphael was not afraid of Mr. M at all. Instead, he shouted in the secret voice communication channel of the Angels Council: "Sunlight, Moonlight, help me to track Mr. M's real IP address."

Raphael wanted to find Mr. M's real IP address, so that he could find Mr. M's real identity. Once he knew Mr. M's real identity, he could erase Mr. M from reality.

The biggest trump card of a hacker is the confidentiality of identity. If the hacker's identity is exposed, the risk factor of the hacker will be greatly reduced. Hackers who expose their identity need to take into account too many things.

Raphael's hatred for Mr. M is not something that can be explained clearly in one sentence. If Mr. M is found, Raphael would not mind giving Mr. M an unforgettable gift.

Unfortunately, Raphael didn't know something. When he was looking for Mr. M's real IP address, wouldn't Mr. M look for his real IP address?

Just as he was unhappy with Mr. M, Mr. M actually hated Raphael very much and wanted to send Raphael over to accompany the lonely Uriel!

.(To be continued...)

ps: [Reward Thanks] Ding Xingyu 1, reward 1888. Meng Suileng, reward 588. If you want to keep it, don’t come to me, reward 100.


This chapter has been completed!
Previous Bookshelf directory Bookmark Next