HK861 IWN Secret Network Simulation 4th Generation Supercomputer!
. The fourth-generation supercomputer uses an ultra-high-speed network, while the IWN secret network uses only an ordinary Internet network. The former is distributed centralized computing, and the latter is distributed decentralized computing.
Shi Lei is ready to use the IWN secret network as the basis to simulate the establishment of the fourth-generation supercomputer, and then rely on the advantages of the fourth-generation supercomputer to completely resolve the attack of the Angel Council, and give the Angel Council a painful counterattack!
Jing Ya Yuan.
Shi Lei put his hands on the keyboard and quickly typed a large amount of English source code.
"Yishuer, real-time verification!" Shi Lei instructed Yi Zuer to help verify the error code.
The real-time checksum function can only verify grammatical errors or misspellings of words, but not logical errors. Because, Yi Shuer didn't know what program Shi Lei was writing the source code. Otherwise, does Shi Lei need to write the source code himself? It would be nice to just let Yizhuer generate the source code!
Shi Lei will not write the source code by himself for any program that knows the source code, and the speed at which the source code is generated by Yishu is definitely faster than that of writing the source code by hand.
Two minutes later, there are 780tflops left in the distributed computing resources of IWN, and Shi Lei has finally completed the writing of the source code.
"Yishuer, verify all the source code, and if there are no logical errors, execute the source code program immediately!" Shi Lei commanded.
βYesοΌSirγ The debugging source code is being verified, the debugging is completed line by line, no logical errors are found, and the source code program is ready to be executed. After the system automatically simulates the calculation, the source code is executed. IWN Secret Net will crash after three minutes and thirty-five seconds, will it be executed? "Before executing the source code written by Shi Lei, the main system of Yizhuer carried out the simulation calculation of the sandbox system.
The source code written by Shi Lei will indeed make IWN's secret network collapse, which is the price of letting IWN's secret network forcibly simulate the fourth-generation supercomputer. There is never a thing in the world that can be rewarded without paying a price. Shi Lei is very aware of the consequences of the collapse of the IWN secret network, but if used properly, he can quickly take out Raphael and the Angel Council. IWN's secret web may not collapse!
"Launch TheFour!" Shi Lei said in a firm tone. TheFour is the program that allows IWN to emulate the fourth generation supercomputer, and it is a very sharp double-edged sword. When applied well, it can defeat the enemy; If you don't use it well, you can only hurt yourself!
"Understood, Sir!" Eater activates TheFour. IWN immediately began to respond to TheFour. The underlying code of IWN Secret Net began to change, starting from the lowest code. IWN Secret Network began to build the corresponding policy.
First of all. The first-layer policy built by IWN cryptnet implicitly opens the bandwidth limit of the network service provider, liberates the maximum line bandwidth, and expands the network line bandwidth of IWN users.
The network bandwidth of each network user is limited by the port settings of the network service provider, not the maximum value that the line can actually carry. For example, the network bandwidth of a user is 2 MB. Theoretically, the maximum downlink speed of the user is 256kb/s. This downlink speed may be delayed in accepting the task data distributed by IWN.
For example. If the task packet distributed by IWN is 1 MB in size, then according to the theoretical maximum speed, it will take at least 4 seconds for the user to accept the task packet distributed by IWN. If you include the network transmission loss, it may take 5-6 seconds. This is one of the reasons for the delay of IWN Secret Network in accepting feedback from IWN users on computing resources.
After TheFour was launched, the first thing was to implicitly liberate the maximum bandwidth of the line. The so-called maximum bandwidth is how much bandwidth the line can reach, so how much bandwidth will be liberated. If the user's bandwidth is only 2Mbit/s, and the line bandwidth is 8Mbit/s, TheFour will free up the user's bandwidth to a maximum of 8Mbit/s.
If the task packet distributed by IWN is 1MB, theoretically the 8M bandwidth line will only need 1 second to accept 1MB packet!
The benefit of improving user bandwidth is very obvious, that is, it directly improves the feedback speed between users and IWN secret network, and makes the overall resource computing speed of IWN secret network faster.
Thefour immediately performs the second step after unlocking the maximum bandwidth for all connected users on the IWN secret network. The second step is to optimize the IWN user resource area.
IWN secret network user resources, distributed in the whole world, these user resources from the user to the IWN secret network of the main server origin, originally point-to-point transmission, that is, for each IWN secret network user, directly with the IWN secret network of the parent program.
Now, the ThrFour program has been adjusted, and the partition merge is carried out according to the user's region, and the merged user resources are selected as the main road network between the domains, and directly transmitted to the parent server of the IWN secret network.
The so-called partition merge is to allow players in a certain region to merge and process. For example, the IWN secret network users in Shuangqing City are said to have one million.
The millions of IWN users in Shuangqing City originally fed back computing resources to the origin of the supercomputer on a one-to-one basis. However, after TheFour's modification, the 1 million IWN users in Shuangqing City will be merged together to pass on information through the city's main road network.
The advantage of this is that the amount of information processed is highly concentrated, and at the same time, the data transmission volume of the main road network is faster without being limited by network congestion. If the data transmission volume of a certain section of the network is too large, or if there is a hacker war, the network is filled with too much junk data, which will cause network congestion.
Network congestion is also a factor in network latency!
TheFour's strategy is to centralize IWN secret network users by region, bypass the network that may have network congestion, and go directly to the inter-domain trunk road network.
In addition to the above two strategies, TheFour will also implement the final strategy, which is to simulate the network acceleration function, so that the normal Internet network has some of the characteristics of a high-speed network. This technique is very difficult. Shi Lei dared to assert that even the number one giant of the Angel Council had not mastered this technique.
The technique of simulating high-speed network is a unique technique of Shi Lei!
After the TheFour program was opened, the IWN Secret Web underwent a rapid metamorphosis, and although the tasks performed by TheFour were very complex, they were executed very quickly.
In less than ten seconds, IWN Secret Network fully executed TheFour's program, changing from a distributed decentralized computing cluster to a pseudo-distributed centralized computing cluster.
Eater is automatically in the upper left corner of the display on Server 1. A countdown '03:35' is displayed, which means that IWN Secret Network simulates the fourth generation supercomputer, and the maximum time is only a little more than three and a half minutes.
"Sir, please pay attention to the remaining time, once the remaining time reaches zero. There is a 99.99 percent chance that the IWN Secret Net will crash. Yi Shuer reminded Shi Lei.
Shi Lei nodded and replied in the affirmative, "Yi Zuer." Assist me. Get ready to fight back! β
Dream Entertainment has been suppressed and invaded by the Angel Council, Shi Lei has long held back a bad breath, and now IWN Secret Network Simulation has become the fourth generation supercomputer, Shi Lei just wants to give Raphael a little good-looking, so that Raphael understands that he is a sissy. A sissy is always a sissy, after all, it's just a weakling!
"Yes, Sir, always at your service!" Eri replied.
Angel Council. Secret voice communication channels.
Raphael, who was invading, suddenly changed his face, "Oops, Mr. M is here!" β
"Lord Raphael, is Mr. M here?" The Daylight Angel actually wanted to ask, 'Is Mr. M here?' How did I not find out? β
"Damn! Mr. M is attacking us! Raphael glanced at the firewall he had written, and although the firewall did not prompt, Raphael still noticed an anomaly.
At this moment, Shi Lei is controlling the IWN secret network, fighting back against the Angel Council with all his might, he has put his main target on Raphael, as for the Daylight Angel and the Moonlight Angel, Shi Lei does not want to deal with them for the time being.
Daylight Angel and Moonlight Angel have a special status in the Angel Council, this pair of hacker couples, did not join the Angel Council at the beginning, the most important thing is that they are in the Angel Council, and did not participate in some messy tasks, at most they only carried out hacking, and did not use hacking techniques to cause any casualties.
The pseudo-fourth-generation supercomputer IWN secret network, controlled by Shi Lei, easily broke through the external defense of the Angel Council, and Shi Lei searched for the sacred location of the supercomputer.
In order to track the supercomputer sacred, Shi Lei was very careful. However, Shi Lei suddenly snorted depressedly, "It's still been discovered!" β
Raphael found Mr. M from the firewall, he trembled with excitement, Mr. M finally came out, Raphael finally had a chance to take revenge! It's a pity that Raphael is destined to be unable to take revenge this time.
Because, when Raphael found Mr. M, Shi Lei also knew that his invasion was exposed, so he simply didn't hide it, and stood up to snipe Raphael.
Although Mr. M suddenly appeared, Raphael was not afraid of Mr. M at all, but in the secret voice communication channel of the Angel Council, he commanded loudly: "Daylight, Moonlight, help me track Mr. M's real IP address." β
Raphael wants to find out the real IP address of Mr. M, so that he can hope to find out the real identity of Mr. M, and once he knows the real identity of Mr. M, he can erase Mr. M from reality.
The biggest hole card of a hacker is the confidentiality of identity, if the identity of the hacker is exposed, the risk factor of the hacker will be greatly reduced. There are too many things to take into account when exposing the identity of the hacker.
Raphael's hatred for Mr. M is not clear in a sentence or two, and if he finds Mr. M's real address, Raphael does not mind giving Mr. M a gift that will never be forgotten.
It's a pity that Raphael doesn't know a thing. When he is looking for Mr. M's real IP address, won't Mr. M look for his real IP address?
Just as he is unhappy with Mr. M, Mr. M actually hates Raphael very much, and he can't wait to send Raphael over to accompany the lonely Uriel!.
(To be continued......)
PS: [Reward thanks] Ding εζι¨1,Reward 1888.Dream ιγedge,Reward 588.Don't look for me if you want to raise,Reward 100.