The Hk861 Iwn Secret Network Simulates the Fourth Generation Supercomputer!
The fourth generation of supercomputers uses ultra-high-speed networks, while wn secret networks only use ordinary Internet networks. The former is distributed centralized computing, while the latter is distributed decentralized computing.
Shi Lei plans to use the wn secret network as the basis to simulate the establishment of a fourth-generation supercomputer, and then rely on the advantages of the fourth-generation supercomputer to completely resolve the attack of the Angel Council and give the Angel Council a painful counterattack!
Jingya Garden.
Shi Lei put his hands on the keyboard and quickly entered a large amount of English source code.
"Yizure, check in real time!" Shi Lei ordered Yizuer to help him check the error code.
Izull's real-time verification function can only verify grammatical errors or spelling errors, but cannot correct logical errors. Because Izual didn't know the source code of what program Shi Lei was writing. Otherwise, do you still need Shi Lei to write the source code himself? Just let Yizuer generate the source code directly!
Shi Lei would not write the source code for any program that Yizuer knew about the source code.
Two minutes later, there were 780tflops of distributed computing resources left on the wn secret network, and Shi Lei finally finished writing the source code. After executing the program composed of the source code, the wn secret network could briefly become The fourth generation of supercomputers! [
"Yizul, verify all the source code, if there are no logical errors, execute the source code program immediately!" Shi Lei ordered.
"Yes, sr. The source code is being verified and debugged. The line-by-line debugging has been completed, and no logic errors have been found. Start preparing to execute the source code program. After the system automatically simulates and calculates, after the source code is executed, the wnsecret network will be in three minutes and thirty-five seconds. After it crashes, do you want to execute it?" Izuer's main system, before executing the source code written by Shi Lei, performed a simulation calculation of the sandbox system.
The source code written by Shi Lei will indeed make the wn secret network collapse, which is the price of making the wn secret network forcibly simulate the fourth-generation supercomputer. The world has never been without a price. things that can be rewarded. Shi Lei is very aware of the consequences of the collapse of the wn secret network, but if it is used properly and quickly kills Raphael and the Angel Council, the wn secret network may not collapse!
"Activate thefour!" Shi Lei said firmly. thefour is the program that lets wn secret network simulate the fourth generation supercomputer, it is a very sharp double-edged sword. Used well, you can defeat the enemy; not used well. You can only hurt yourself!
"Understood, sr!" Izuer activated thefour, and the wn secret network immediately began to respond to thefour. The underlying code of the wn secret network began to change, starting from the bottom code, the wn secret network began to build the corresponding strategy.
First of all, the first layer strategy of wn secret network construction. Implicitly open the bandwidth limit of the network service provider, liberate the maximum line bandwidth, and expand the network line bandwidth of wn users.
The network bandwidth of each network user is limited by the port settings of the network service provider, not the maximum value that the line can actually carry. For example, the network bandwidth of a user is 2m. Then in theory, the maximum downlink speed of the user is 256kbs. This is the downlink speed. There may be a delay in accepting the task data distributed by the wn secret network.
For example, the task data package distributed by wn secret network is 1mb in size, then according to the theoretical maximum speed, it takes at least 4 seconds for the user to accept the task data package distributed by wn secret network. If you count the network transmission loss, it may take 5-6 seconds. This is one of the reasons for the delay of wn secret network accepting the feedback computing resources of wn secret network users.
After thefour is started, the first thing is to implicitly release the maximum bandwidth of the line. The so-called maximum bandwidth is how much bandwidth the line can achieve, and how much bandwidth can be liberated. If the user's bandwidth is originally only 2m and the line bandwidth is 8m, thefour will liberate the user's bandwidth to a maximum of 8m.
The user's bandwidth is increased from 2m to 8m. If the task data packet distributed by wn secret network is 1mb, theoretically, the line with 8m bandwidth can accept the data packet of 1mb, and it only takes 1 second!
The benefits of increasing user bandwidth are very obvious, that is, it directly improves the feedback speed between users and wn secret network, and makes the overall resource calculation speed of wn secret network faster.
Thefour performs the second step immediately after unlocking the maximum bandwidth of all connected users on the wn secret network. The second step is to optimize the wn secret network user resource area.
The wn secret network user resources are distributed all over the world. These user resources originate from the main server of the wn secret network when the user arrives. It was originally a point-to-point transmission, that is, each user of the wn secret network directly contacts the parent program of the wn secret network. .
Now, the thrfour program has been adjusted, and the partitions are merged according to the user's area. After the merged user resources, the inter-domain backbone network is selected and directly transmitted to the parent server of the wn secret network.
The so-called partition merger is to allow players in a certain region to merge. For example, the wn secret network users in Shuangqing City are assumed to have one million. [
The million users of the wn secret network in Shuangqing City originally fed back computing resources to the origin of supercomputers one-on-one. However, after the four revisions, the one million wn secret network users in Shuangqing City will be merged together, and the information will be transmitted through the city's main road network.
The advantage of this is that the information processing volume is highly concentrated, and the data transmission volume of the main road network is faster, without being limited by network congestion. The Internet will also have the same congestion in the real world, like a traffic jam. If the data transmission volume of a certain network is too large, or there is a hacker war, the network is filled with too much garbage data, which will cause network congestion. .
Network congestion is also a factor in network delays!
Thefour's strategy is to concentrate wn secret network users by region, bypassing the network that may have network congestion. Directly go through the inter-domain backbone network.
In addition to the above two strategies, thefour also executes the final strategy. That is to simulate the network acceleration function, so that ordinary Internet has some characteristics of high-speed network. This technology is very difficult, and Shi Lei dares to assert that even the first giant of the Angel Council has not mastered this technology.
The technology of simulating high-speed network belongs to Shi Lei's unique technology!
After the four program was launched, the wn secret network rapidly transformed, although the tasks performed by thefour were very complicated. But the execution is very fast.
In less than ten seconds, wn secret network completely executed thefour program, changing from a distributed decentralized computing cluster to a pseudo-distributed centralized computing cluster.
In the upper left corner of the screen of the No. 1 server, Izuer automatically displayed a countdown '03:35', which represented the simulation of the fourth-generation supercomputer by the wn secret network, and the longest time was only a little more than three and a half minutes.
"sr. Please pay attention to the remaining time. Once the remaining time is zero, the possibility of the wn secret network collapsing is as high as 99.99%." Izuer reminded Shi Lei.
Shi Lei nodded affirmatively, "Yizul, help me, prepare to fight back!"
Dream Entertainment has been suppressed and invaded by the Angel Council. Shi Lei had long held back his anger. Now that wn secret network simulation has become a fourth-generation supercomputer, Shi Lei just wanted to show Raphael a little better, and let Raphael understand that he is a bitch. A sissy is always a sissy, after all, it's just a weakling!
"Yes. sr, at your service anytime!" Izuer responded.
Angel Council, secret voice communication channel.
Raphael, who was invading, suddenly changed his face, "Oops, Mr. M is here!"
"Mr. Raphael, is Mr. M here?" The Sunshine Angel actually wanted to ask, 'Is Mr. M here? Why didn't I find out? ’
"Damn! Mr. M is counterattacking us!" Raphael glanced alertly at the firewall he wrote. Although the firewall did not issue a prompt, Raphael still found something abnormal.
At this moment, Shi Lei is controlling the wn secret network, fighting back against the Angel Council with all his strength. He has put his main target on Raphael. As for the Sunlight Angel and Moonlight Angel, Shi Lei does not want to deal with them for the time being.
Sunlight Angels and Moonlight Angels have a special status in the Angel Council. This hacker couple did not join the Angel Council from the beginning. The most important thing is that they did not participate in some "chaotic" seven in the Angel Council. What a messed up mission, at best, hacking was done, and no hacking techniques were used to cause any casualties.
The pseudo fourth-generation supercomputer wn secret network, controlled by Shi Lei, easily broke through the outer defense of the Angel Council, and Shi Lei searched for the sacred location of the supercomputer.
In order to track the supercomputer sacred, Shi Lei was very careful. However, Shi Lei suddenly snorted dejectedly, "It's still been discovered!"
Raphael found Mr. M from the firewall. He was shaking with excitement. Mr. M finally came out, and Raphael finally had a chance to take revenge! Unfortunately, Raphael is destined to take revenge this time.
Because, when Raphael discovered Mr. M, Shi Lei also knew that his invasion was "exposed", so the "sex" was no longer hidden, and he stood up to snipe Raphael.
Although Mr. M suddenly appeared, Raphael was not afraid of Mr. M at all. Instead, he instructed loudly in the secret voice communication channel of the Angel Council: "Sunlight, Moonlight, help me track Mr. M's real p address."
Raphael wants to find out Mr. M's real p address, so he can hopefully find out Mr. M's real identity. Once Mr. M's real identity is known, he can obliterate Mr. M from reality.
The biggest trump card of a hacker is the secrecy of identity. If the identity of the hacker is exposed, the risk factor of the hacker will be greatly reduced. Hackers who expose their identities need to take into account too many things.
Raphael's hatred for Mr. M is not clear in a sentence or two. If Mr. M's real address is found, Raphael doesn't mind giving Mr. M an unforgettable gift.
It's a pity that Raphael doesn't know one thing. When he was looking for Mr. M's real p-address, wouldn't Mr. M look for his real p-address?
Just like he was upset with Mr. M, Mr. M actually hated Raphael very much, and wanted to send Raphael over to accompany the lonely Uriel!
(To be continued. If you like this work, you are welcome to come to the starting point to vote and monthly pass. Your support is my biggest motivation. Mobile users, please go to m to read.)
ps: [Thank you for the reward] Xingyu 1, reward 1888 Meng Sui Ling, reward 588 Don't look for me if you want to take care of it, reward 100
〖∷Update fast∷∷Plain text∷〗