HK861 IWN secret network simulates the fourth generation supercomputer!
The fourth generation of supercomputers applies ultra-high-speed networks, while the IWN secret network only uses ordinary Internet networks. The former is distributed centralized computing, while the latter is distributed and decentralized computing.
Shi Lei plans to simulate the establishment of a fourth-generation supercomputer based on the IWN secret network, and then rely on the advantages of the fourth-generation supercomputer to completely resolve the Angel Council's attack and give the Angel Council a painful counterattack!
Jing Ya Yuan.
Shi Lei put his hands on the keyboard and quickly entered a large amount of English source code.
"Yizur, check in real time!" Shi Lei ordered Yizuer, asking Yizuer to help verify the error code.
Yizuer's real-time verification function can only verify grammatical errors or word spelling errors, but cannot correct logical errors. Because Yizuer does not know the source code of what program Shi Lei is writing. Otherwise, Shi Lei himself would have to
Do you want to write the source code? Why not just let Yizuer generate the source code?
Shi Lei would not write the source code for any program for which Yizuer knew the source code. The speed at which Yizuer could generate the source code was definitely faster than writing the source code by hand.
Two minutes later, the remaining distributed computing resources of the IWN secret network were 780tblaps. Shi Lei finally completed the writing of the source code. After the program composed of the written source code was executed, the IWN secret network could briefly become
The fourth generation supercomputer!
"Yizur, verify all source codes. If there are no logical errors, execute the source code program immediately!" Shi Lei ordered.
"Yes, Sir. The debugging source code is being verified. Line-by-line debugging has been completed. No logical errors have been found. We are now preparing to execute the source code program. After automatic simulation calculation by the system, after the source code is executed, the IWN secret network will be launched in three minutes and thirty-five seconds.
Then it crashed, do you want to execute it?" Yi Zuer's main system performed a simulation calculation of the sandbox system before executing the source code written by Shi Lei.
The source code written by Shi Lei will indeed cause the IWN secret network to collapse. This is the price for allowing the IWN secret network to forcibly simulate the fourth generation supercomputer. There is never anything in the world that can be rewarded without paying the price. Shi Lei is very aware of the IWN secret network.
The consequences of network collapse·However, if used properly and quickly kill Raphael and the Angel Council, the IWN secret network may not collapse!
"Start ThMFaur!" Shi Lei said firmly. ThMFaur is a program that allows IWN Secret Network to simulate the fourth generation supercomputer. It is a very sharp double-edged sword. If used well, it can defeat the enemy; if used poorly, it can defeat the enemy.
, you can only hurt yourself!
"Understood·Sr!" Yizuer activated ThMFaur, and the IWN secret network immediately began to respond to ThMFau
The underlying code of IWN Secret Network began to change. Starting from the lowest code, IWN Secret Network began to build corresponding strategies.
First of all, the first-layer strategy built by the IWN secret network implicitly opens the bandwidth limit of the network service provider, liberates the maximum line bandwidth, and expands the network line bandwidth of IWN users.
The network bandwidth of each network user is limited by the port settings of the network service provider, rather than the maximum value that the line can actually carry. For example, the network bandwidth of a certain user is ZM, then theoretically speaking, the maximum value of the user
The downlink speed is 256kb. This downlink speed may cause delays when accepting task data distributed by the IWN secret network.
For example, the task data packet distributed by the IWN secret network is Nmb in size. According to the theoretical maximum speed, it will take at least 4 seconds for the user to accept the task data packet distributed by the IWN secret network. If network transmission loss is included, it is possible
It takes 56 seconds. This is one of the reasons for the delay in IWN Secret Network accepting feedback from IWN Secret Network users on computing resources.
After ThMFaur is started, the first thing is to implicitly liberate the maximum bandwidth of the line. The so-called maximum bandwidth is the bandwidth that the line can reach, then how much bandwidth is liberated. If the user's bandwidth is originally only ZM, the line bandwidth is BM
,TheFaur will free up the user's bandwidth to the maximum BM.
The user's bandwidth is increased from ZM to BM. If the task data packet distributed by the IWN secret network is Nmb, theoretically for a line with BM bandwidth, it only takes 1 second to receive Nmb data packets!
The benefit of increasing user bandwidth is very obvious, that is, it directly increases the speed of contact feedback between users and the IWN secret network, making the overall resource computing speed of the IWN secret network faster.
After Thefaur unlocked the maximum bandwidth of all connected users on the IWN secret network, he immediately performed the second step. The second step was to optimize the IWN secret network user resource area.
IWN secret network user resources are distributed all over the world. These user resources originate from the user's arrival at the main server of IWN secret network. It is originally a point-to-point transmission, that is, each IWN secret network user directly contacts the parent program of IWN secret network.
.
Now, the ThrFaur program has been adjusted and partitioned according to the area where the user is located. After merging the user resources, the inter-domain trunk network is selected and directly transmitted to the parent server of the IWN secret network.
The so-called partition merger is to merge players in a certain area. For example, it is assumed that there are one million IWN secret network users in Shuangqing City.
The one million IWN secret network users in Shuangqing City originally fed back computing resources to the supercomputer origin on a one-to-one basis. However, after Thaur's modification, the one million IWN secret network users in Shuangqing City will be merged
Upon arrival, the information is transmitted through the city's main road network.
The advantage of this is that the information processing volume is highly concentrated, and the data transmission volume of the main road network is faster, without being limited by network congestion. The Internet network will also have congestion like the real world, just like a traffic jam.
The data transmission volume of a segment of the network is too large, or there is a hacker war, and the network is filled with too much junk data, which will cause network congestion.
Network congestion is also a factor in network latency!
ThMFaur's strategy is to concentrate IWN secret network users by region, bypassing networks that may have network congestion, and directly use the inter-region trunk network.
In addition to the above two strategies, ThMFaur will also implement the final strategy, which is to simulate the network acceleration function so that ordinary Internet networks have some characteristics of high-speed networks. This technology is very difficult. Shi Lei dares to assert that even the Angel Council’s
The No. 1 giant has not mastered this technology either.
The technology of simulating high-speed network is Shi Lei’s unique technology!
After the ThMFaur program was launched, the IWN secret network underwent rapid transformation. Although the tasks performed by ThMFaur were very complex, the execution speed was very fast.
In less than ten seconds, the IWN secret network completely executed the TheFawr program, transforming from a distributed distributed computing cluster into a pseudo-distributed centralized computing cluster.
The upper left corner of the display screen of Yizuer Automatic Server No. 1 shows a countdown '0335,' which means that the IWN secret network simulates the fourth generation supercomputer, and the longest time can only be a little more than three and a half minutes.
"Sr, please pay attention to the remaining time. Once the remaining time reaches zero, the probability of IWN secret network collapse is as high as 99.99%." Yizuer reminded Shi Lei.
Shi Lei nodded and answered affirmatively, "Yizur, assist me and prepare to counterattack!"
Dream Entertainment has been suppressed and invaded by the Angel Council. Shi Lei has been holding back his anger for a long time. Now that the IWN Secret Network has simulated a fourth-generation supercomputer, Shi Lei just wants to give Raphael a good look and let Raphael understand that he is
A sissy, a sissy is always a sissy, after all, she is just a weakling!
"Yes Sir is at your service at any time!" Yizuer responded.
Council of Angels, secret voice communication channel.
Raphael's face suddenly changed as he was invading, "Oops, Mr. M is here!"
"Lord Raphael, is Mr. M here?" The Sunlight Angel actually wanted to ask, 'Is Mr. M here? Why didn't I notice it?
"Damn it! Mr. M is counterattacking us!" Raphael glanced at the firewall he wrote warily. Although the firewall did not issue a prompt, Raphael still discovered an anomaly.
At this moment, Shi Lei is controlling the IWN secret network and is fighting back against the Angel Council with all his strength. His main target is Raphael. As for the Sunlight Angel and Moonlight Angel, Shi Lei doesn't want to deal with them for the time being.
The Sunlight Angel and the Moonlight Angel have a rather special status in the Angel Council. This hacker couple did not join the Angel Council from the beginning. The most important thing is that they did not participate in some messy tasks in the Angel Council.
At most, it was just hacking, but no hacking techniques were used to cause any casualties.
The pseudo fourth-generation supercomputer IWN Secret Network, controlled by Shi Lei, easily broke through the external defense of the Angel Council. Shi Lei searched for the sacred location of the supercomputer.
In order to track down the supercomputer Sacred, Shi Lei was very careful. However, Shi Lei suddenly snorted depressedly, "We were still discovered!"
Raphael discovered Mr. M from the firewall. He was shaking with excitement. Mr. M finally came out, and Raphael finally had a chance to take revenge! Unfortunately, Raphael was destined to be unable to take revenge this time.
Because, when Raphael discovered Mr. M, Shi Lei also knew that his intrusion was exposed, so he stopped hiding and stood up to snipe Raphael openly.
Although Mr. M suddenly appeared, Raphael was not afraid of Mr. M at all. Instead, he loudly ordered in the secret voice communication channel of the Angel Council: "Sunlight, Moonlight, help me counter-track Mr. M's real IPN address."
Raphael wants to find Mr. M's real IP address, so that he can hopefully find out Mr. M's true identity. Once he knows Mr. M's true identity, he can erase Mr. M from reality.
A hacker's biggest trump card is the confidentiality of his identity. If the hacker's identity is exposed, the hacker's risk factor will be greatly reduced. A hacker whose identity is exposed has too many things to take into consideration.
Raphael's hatred for Mr. M cannot be explained clearly in a few sentences. If Mr. M's real address is found, Raphael would not mind giving Mr. M a gift that will never be forgotten.
Unfortunately, Raphael didn't know one thing. When he was looking for Mr. M's real IP address, wouldn't Mr. M be looking for his real IP address?
Just as he was unhappy with Mr. M, Mr. M actually hated Raphael very much and wished he could send Raphael there to accompany the lonely Uriel!