HacKer

Chapter 861: IWN Secret Network simulates the fourth generation supercomputer!

The fourth generation of supercomputers used ultra-high-speed networks, and the IWN secret network used only ordinary Internet. The former is distributed centralized computing, while the latter is distributed decentralized computing.

Shi Lei is preparing to build a fourth-generation supercomputer based on the IWN secret network. Then, with the advantages of the fourth-generation supercomputer, the attack of the Angel Council will be completely resolved, and the Angel Council will be countered!

Jingyayuan.

Shi Lei put his hands on the keyboard and quickly entered a lot of English source code.

"Jie Shier, real-time verification!" Shi Lei commanded the clothes, let the clothes help verify the error code.

The real-time verification function of the singer can only verify grammatical errors, or spelling errors in words, but not correcting logic errors. Because, I don’t know the source code of what program Shi Lei is writing. Otherwise, do you need Shi Lei to write the source code yourself? It’s not good to let the source code directly generate the clothes!

All the programs that know the source code, Shi Lei will not write the source code by himself. The speed of generating the source code is definitely more than the manual writing of the source code.

Two minutes later, IWN secret network storage of distributed computing resources, leaving 780tblaps, Shi Lei has finally completed the preparation of the source code, through the process of writing the source code, after execution, IWN secret network can be temporarily changed into The fourth generation supercomputer!

"Well, verify all source code, if there is no logic error, immediately execute the source code program!" Shi Lei commanded.

"Yes, Sir. Verifying the debug source code, debugging is done line by line, no logic errors are found, and the source code program is ready to be executed. After the system automatically simulates the calculus, after the source code is executed, the IWN secret network will be in three minutes and thirty-five seconds. After the crash, is it executed?" The main system of Yizheer, before performing the source code written by Shi Lei, carried out the simulation calculation of the sandbox system.

The source code written by Shi Lei does cause the IWN secret network to crash. This is the price that makes IWN secret network forcibly simulate the fourth-generation supercomputer. There has never been a return to the world without paying the price. Shi Lei is very aware of the consequences of the collapse of the IWN secret network. However, if used properly, quickly kill Rafael and the Angel Council, IWN secret network may not collapse!

"Start ThMFaur!" Shi Lei said firmly. ThMFaur is the program that lets IWN secret network simulate the fourth generation of supercomputers. It is a very sharp double-edged sword. If you use it well, you can defeat the enemy; if you use it badly, you can only hurt yourself!

"Understood · Sr!" The clothes launched ThMFaur, IWN secret network immediately began to respond to ThMFau

The underlying code of the IWN secret network began to change, starting with the lowest level of code. IWN secret network began to build the corresponding strategy.

First, the first layer of the IWN secret network strategy implicitly opens the bandwidth limit of the network service provider, liberates the maximum bandwidth of the line, and expands the network line bandwidth of the IWN user.

The network bandwidth of each network user is limited by the network service provider's port settings, not the maximum value that the line can actually carry. For example, if a user's network bandwidth is ZM, then in theory, the user's maximum downlink speed is 256 kb. This one-down speed · Accepts the task data distributed by the IWN secret network, and there may be a delay.

For example, the task data packet distributed by the IWN secret network is Nmb size. Then, according to the theoretical maximum speed, the user accepts the task data packet distributed by the IWN secret network, and it takes at least 4 seconds. If you count the network transmission loss, it may take 56 seconds. This is one of the reasons for the delay in the IWN secret network to accept the IWN secret network user feedback computing resources.

After ThMFaur started, the first thing was the maximum bandwidth of the hidden liberation line. The so-called maximum bandwidth is how much bandwidth the line can reach, and then how much bandwidth is liberated. If the user's bandwidth is originally only ZM and the line bandwidth is BM, TheFaur will free the user's bandwidth to the largest BM.

The user's bandwidth is increased from ZM to BM. If the task data packet distributed by IWN secret network is Nmb· theoretically BM bandwidth line, it takes only 1 second to accept Nmb data packets!

The benefits of increasing user bandwidth are obvious, which is to directly improve the speed of contact between users and IWN secret network, so that the overall resource computing speed of IWN secret network is faster.

Thefaur performs the second step immediately after unlocking the maximum bandwidth of all connected users on the IWN secret network. The second step is to optimize the IWN secret network user resource area.

IWN secret network user resources, distributed around the world, these user resources originated from the user's arrival to the main server of the IWN secret network, originally a peer-to-peer transmission, that is, for each IWN secret network user, directly contact the parent program of IWN secret network. .

Now, the ThrFaur program has been adjusted, partitioned according to the user's area, combined user resources, selected inter-domain trunk network, and directly transmitted to the parent server of the IWN secret network.

The so-called zoning merger is to let the players in a certain area merge. For example, the IWN secret network user in Shuangqing City assumes that there are one million.

The million IWN secret network users in Shuangqing City originally had one-to-one feedback on computing resources to the origin of supercomputers. However, after Thaur's revision, one million IWN secret network users in Shuangqing City will be merged and transmitted through the city's main road network.

The advantage of this is that the amount of information processing is highly concentrated, and the data transmission of the main road network is faster, and is not limited by network congestion. The Internet will also have the same congestion in the real world. It is like a traffic jam. If the data transmission of a certain network is too large, or if a hacker war occurs, the network is filled with too much garbage data, which will cause network congestion. .

Network congestion is also a factor in network latency!

ThMFaur's strategy is to centralize the IWN secret network users by region, bypass the network that may have network congestion, and directly take the inter-domain trunk road network.

In addition to the above two strategies, ThMFaur will also implement the final strategy, which is to simulate the network acceleration function, so that the ordinary Internet has some features of the high-speed network. This technology is very difficult, Shi Lei dare to assert that even the first giant of the Angel Council did not master this technology.

Analog high-speed network technology · belongs to Shi Lei's unique technology!

After the ThMFaur program was launched, the IWN secret network quickly changed. Although the tasks performed by ThMFaur are very complicated, the execution speed is very fast.

In less than ten seconds, IWN secret network completely implemented TheFawr program, from a distributed distributed computing cluster to a pseudo distributed centralized computing cluster.

In the upper left corner of the No. 1 server display, the clothes show a countdown ‘0335, which represents the IWN secret network simulation of the fourth-generation supercomputer. The longest time can only be a little more than three and a half.

"Sr, please pay attention to the remaining time. Once the remaining time is zero, the probability of the IWN secret network crashing is as high as 99.99 percent." Yi Zhuer reminded Shi Lei.

Shi Lei nodded affirmatively, "I am assisting me, ready to fight back!"

Dream entertainment has been suppressed by the Angels Council. Shi Lei has already sighed a bit of anger. Now IWN secret network simulation has become the fourth generation supercomputer. Shi Lei only wants to give Raphael a good look, so Rafael understands that he is A mother gun, the mother gun is always a mother gun, after all, it is only a weak person!

“Yes·Sir is always at your service!” replied.

Angel Council, secret voice communication channel.

The Raphael face that was invading suddenly changed. "Oops, Mr. M is here!"

"Is Mr. M. Raphael coming?" The Sun Angel actually wanted to ask, 'Is Mr. M coming? Why didn't I find out? ,

"Damn! Mr. M is counterattacking us!" Rafael watched the firewall he had written, and although Raphael did not issue a warning, Raphael found an exception.

At this moment, Shi Lei is controlling the IWN secret network, and is fully fighting against the Angel Council. He put the main target on Raphael. As for the Sun Angel and the Moonlight Angel, Shi Lei does not want to deal with them for the time being.

Sun Angel and Moonlight Angel have a special status in the Angel Council. This pair of hacker couples did not join the Angel Council in the first place. The most important thing is that they did not participate in some messy tasks in the Angel Council. At most, only hacking has been carried out, and no casualties have been caused by using hacking techniques.

The pseudo fourth-generation supercomputer IWN secret network, controlled by Shi Lei, easily broke through the external defense of the Angel Council, and Shi Lei searched for the sacred position of the supercomputer.

In order to track the sacredness of the supercomputer, Shi Lei is very careful. However, Shi Lei suddenly snorted and said, "It was discovered!"

Rafael found Mr. M from the firewall. He was shaking with excitement. Mr. M finally came out. Rafael finally had a chance to take revenge! Unfortunately, Rafael is destined to avenge this time.

Because, when Rafael discovered Mr. M, Shi Lei also knew his own invasion and exposure, but he was not hiding. Zhengda Guangming stood up and attacked Raphael.

Although Mr. M suddenly appeared, Rafael was not afraid of Mr. M at all, but in the secret voice communication channel of the Angel Council, he loudly told: "Sunlight, moonlight, help me to follow Mr. M's real IPN address."

Rafael wants to find Mr. M's real IP address, so that he has the hope to find Mr. M's true identity. Once he knows Mr. M's true identity, he can erase M from the reality.

The biggest card of a hacker is the confidentiality of identity. If the identity of the hacker is exposed, the risk factor of the hacker will be greatly reduced. Hackers who expose their identities need to take care of too many things.

Rafael’s hatred of Mr. M is not a clear sentence. If Mr. M’s real address is found, Raphael does not mind giving Mr. M an unforgettable gift.

Unfortunately, Raphael does not know one thing. When he was looking for Mr. M's real IP address, wouldn't Mr. M not look for his real IP address?

Like his unhappy Mr. M, Mr. M actually hates Rafael very much, and he wants to send Raphael to the past and accompany the lonely Uriel!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like