Sunday, November 26, 2017

861: IWN [Miwang] simulates Fourth Generation Supercomputer!

LNMTL
HK :: VOLUME #9
#861: IWN [Miwang] simulates Fourth Generation Supercomputer!
   
Comments 0
Report
English
Chinese
……
Fourth Gen­er­a­tion Su­per­com­puter has ap­plied ul­tra-high fast net­work, what [In­ter­weave Net Mi­wang] uses is only Or­di­nary net­work. The for­mer is Dis­trib­uted-type Cen­tral­ized Com­put­ing, the lat­ter is Dis­trib­uted-type Scat­tered Com­put­ing.
Shi Lei pre­pares to be based on [In­ter­weave Net Mi­wang], the sim­u­la­tion es­tab­lishes Fourth Gen­er­a­tion Su­per­com­puter, then re­lies on the Fourth Gen­er­a­tion Su­per­com­puter su­pe­ri­or­ity, melts the at­tack of Angel Par­lia­ment com­pletely, and gives the Angel Par­lia­ment ex­tremely painful counter-at­tack!
Jingya Gar­den.
Shi Lei both hands build on the key­board, is in­putting nu­mer­ous Eng­lish source code fast.
„[Izual], Real-time Ver­i­fi­ca­tion!” Shi Lei was telling [Izual], mak­ing [Izual] help to ver­ify the error code.
[Izual]'s Real-time Ver­i­fi­ca­tion Func­tion, can only con­firm the gram­mat­i­cal error, or is the word spelling error, but can­not cor­rect the log­i­cal error. Be­cause, [Izual] does not know that Shi Lei is com­pil­ing any pro­ce­dure source code. Oth­er­wise, but also needs Shi Lei to com­pile source code? Made [Izual] pro­duce source code not to be good di­rectly!
Any [Izual] knows the pro­ce­dure that source code, Shi Lei will not com­pile source code, [Izual] pro­duces the source code speed, sur­passed Hand­made to com­pile source code ab­solutely.
After two min­utes, [In­ter­weave Net Mi­wang] bal­ance dis­tri­b­u­tional com­put­ing re­sources, pro­ce­dure that but also re­main­ing 780 tflops, Shi Lei fi­nally ac­com­plish the com­pi­la­tion of source code, has also com­posed through com­pi­la­tion source code, after im­ple­ment, [In­ter­weave Net Mi­wang] can short turns into Fourth Gen­er­a­tion Su­per­com­puter!
„[Izual], con­firms all source code, if no log­i­cal error, im­me­di­ately im­ple­ment source code pro­ce­dure!” Shi Lei was telling the [say / way].
„Yes , sir. The cur­rently con­fir­ma­tion de­bugs source code, de­bugs ac­com­plish by line, has not dis­cov­ered the log­i­cal error, starts to pre­pare the im­ple­ment source code pro­ce­dure. After Sys­tem au­to­matic sim­u­la­tion cal­cu­la­tion, after source code im­ple­ment, [In­ter­weave Net Mi­wang] 35 sec­onds will col­lapse after three min­utes. Whether im­ple­ment?” [Izual]'s Main Sys­tem, be­fore source code of im­ple­ment Shi Lei com­pi­la­tion, has car­ried on the sim­u­la­tion cal­cu­la­tion of Sand­box Sys­tem.
Shi Lei com­pi­la­tion source code. In­deed will make [In­ter­weave Net Mi­wang] col­lapse, this is makes [In­ter­weave Net Mi­wang] sim­u­late the Fourth Gen­er­a­tion Su­per­com­puter price force­fully. On World never has not to pay the price. Mat­ter that then can be re­paid. Con­se­quence that Shi Lei very clear [In­ter­weave Net Mi­wang] col­lapses, but, if uses ap­pro­pri­ately, has killed [Raphael] and Angel Par­lia­ment fast, [In­ter­weave Net Mi­wang] is not nec­es­sar­ily able to col­lapse!
„Starts the­four!” Shi Lei res­olute say­ing. the­four is makes [In­ter­weave Net Mi­wang] sim­u­late the Fourth Gen­er­a­tion Su­per­com­puter pro­ce­dure, it is a very sharp dou­ble-edged sword. Using well, can de­feat enemy \; With not good. Only can in­jure it­self!
„Un­der­stood, sir!” [Izual] starts the­four, [In­ter­weave Net Mi­wang] starts to re­spond to the­four im­me­di­ately. [In­ter­weave Net Mi­wang] Ground Level Code starts to change, starts from most Ground Level Code. [In­ter­weave Net Mi­wang] starts to con­struct the strat­egy of cor­re­spon­dence.
First, First Level strat­egy of [In­ter­weave Net Mi­wang] con­struc­tion, re­ces­sive opens band­width re­stric­tion(s) of net­work ser­vice provider, lib­er­ates the route band­width max­i­mum value, Ex­ten­sion iwn user net­work route band­width.
Each net­work user net­work band­width. Lim­ited to the in­ter­face es­tab­lish­ment of net­work ser­vice provider, but is not route can re­ally the carry and bear max­i­mum value. For ex­am­ple some user net­work band­width is 2 m, then the­o­ret­i­cally, this user most greatly down­ward speed is 256 kb /s. This down­ward speed, ac­cepts the [In­ter­weave Net Mi­wang] dis­tri­b­u­tion Task data. May have the delay sit­u­a­tion.
For ex­am­ple, the Task data pack­age of [In­ter­weave Net Mi­wang] dis­tri­b­u­tion is the 1 mb size, then de­fers to the­o­ret­i­cally the max­i­mum speed, user ac­cepts the [In­ter­weave Net Mi­wang] dis­tri­b­u­tion the Task data pack­age, at least also takes 4 sec­onds. If counted the net­work trans­mis­sion loss, may take 5-6 sec­onds. This is [In­ter­weave Net Mi­wang] ac­cepts [In­ter­weave Net Mi­wang] user to feed back one of the com­put­ing re­sources delay rea­sons.
after the­four start, a First mat­ter is re­ces­sive lib­er­a­tion route biggest band­width. So-called biggest band­width, ex­actly as stated route can achieve big band­width, then on lib­er­a­tion big band­width. If user band­width had 2 m, route band­width is 8 m , the­four will then lib­er­ate user band­width to biggest 8 m.
user band­width from 2 m pro­moted to 8 m, if the Task data pack­age of [In­ter­weave Net Mi­wang] dis­tri­b­u­tion is 1 mb, the­o­ret­i­cally 8 m band­width route, ac­cepts the 1 mb data pack­age, only takes 1 sec­ond!
The pro­moted user band­width ad­van­tage is ob­vi­ous, that was di­rect pro­moted con­tact feed­back speed be­tween user and [In­ter­weave Net Mi­wang], mak­ing the [In­ter­weave Net Mi­wang] over­all re­sources op­er­at­ing speed quicker.
the­four after un­ty­ing [In­ter­weave Net Mi­wang] all has con­nected user biggest band­width, im­me­di­ately im­ple­ment Sec­ond step. A Sec­ond step is to op­ti­mize the [In­ter­weave Net Mi­wang] user re­sources re­gion.
The [In­ter­weave Net Mi­wang] user re­sources, dis­trib­ute in en­tire World, these user re­sources ar­rive in [In­ter­weave Net Mi­wang] Main Server [Ori­gin] from user, is the point-to-point trans­mis­sion, is each [In­ter­weave Net Mi­wang] user, di­rect and [In­ter­weave Net Mi­wang] par­ent sub­stance pro­ce­dure con­tact.
Now, the thrfour pro­ce­dure has ad­justed, has car­ried on the dis­trict merge ac­cord­ing to user in the re­gion, merges the later user re­sources, has cho­sen in the ter­ri­to­ries main road net­work, di­rect trans­mis­sion to [In­ter­weave Net Mi­wang] Par­ent Server.
So-called dis­trict merge, lets Gamer of some area, car­ries on merge pro­cess­ing. For ex­am­ple, Shuangqing City [In­ter­weave Net Mi­wang] user, sup­posed that has the 1 Mil­lion name.
This 1 Mil­lion Shuangqing City [In­ter­weave Net Mi­wang] user, is one-to-one feeds back Su­per­com­puter [Ori­gin] com­put­ing re­sources. But after the­four mod­ify, Shuangqing City 1 Mil­lion [In­ter­weave Net Mi­wang] user, will merge to­gether, through urban main road net­work, trans­mits in­for­ma­tion.
The ad­van­tage that does this lies in in­for­ma­tion process load High De­gree is cen­tral­ized, si­mul­ta­ne­ously the main road net­work data trans­mis­sion ca­pac­ity is quicker, but will not be re­stricted in net­work to be crowded. net­work will have real world same crowd, is sim­i­lar to traf­fics jams the same sit­u­a­tion, if some net­work data trans­mis­sion ca­pac­ity is too big, or had the Hacker war, in the net­work has been flood­ing trash data too much, will then cause net­work to be crowd.
net­work crowd also cre­ates a net­work delay fac­tor!
the­four strat­egy ex­actly as stated con­cen­trates [In­ter­weave Net Mi­wang] user ac­cord­ing to the re­gion, goes round pos­si­bly has net­work crowd net­work, walks in the ter­ri­to­ries di­rectly main road net­work.
Be­sides the above two strate­gies, the­four also meets the im­ple­ment final strat­egy, that sim­u­lates the net­work ac­cel­er­a­tion func­tion, mak­ing Or­di­nary net­work have high-speed net­work some char­ac­ter­is­tics. This tech­nol­ogy is very dif­fi­cult, Shi Lei dares to as­sert. Even if Angel Par­lia­ment First Giant, has not mas­tered this tech­nol­ogy.
Sim­u­la­tion high-speed net­work this tech­nol­ogy, is the tech­nol­ogy that Shi Lei is in sole pos­ses­sion of!
after the the­four pro­ce­dure opens. [In­ter­weave Net Mi­wang] is hav­ing the trans­for­ma­tion rapidly, al­though the­four im­ple­ment Task is very com­plex. But the im­ple­ment speed is very fast.
Short less than ten sec­onds, [In­ter­weave Net Mi­wang] then com­pletely im­ple­ment the the­four pro­ce­dure, from Dis­trib­uted-type Scat­tered Com­put­ing Clus­ter, turned into false Dis­trib­uted-type Cen­tral­ized Com­put­ing Clus­ter.
[Izual] in the top left-hand cor­ner of Num­ber One Server dis­play mon­i­tor, had demon­strated au­to­mat­i­cally a count­down ‚03 : 35’, rep­re­sents [In­ter­weave Net Mi­wang] to sim­u­late Fourth Gen­er­a­tion Su­per­com­puter, can only three di­vide in half for a long time many.
„Sir. Please note the sur­plus times, once the sur­plus times enull, the pos­si­bil­ity that [In­ter­weave Net Mi­wang] col­lapses reaches as high as 99.99%.” [Izual] was re­mind­ing Shi Lei.
Shi Lei nod af­fir­ma­tive reply, „[Izual]. As­sists me, pre­pares to counter-at­tack!”
Dream En­ter­tain­ment has been sup­pressed in­va­sion by Angel Par­lia­ment, Shi Lei had been al­ready sup­press­ing mouth foul odor, now the [In­ter­weave Net Mi­wang] sim­u­la­tion be­came Fourth Gen­er­a­tion Su­per­com­puter, Shi Lei only wants to give [Raphael] at­trac­tively. Let [Raphael] un­der­stand that he is ef­fem­i­nate, ef­fem­i­nate through­out is ef­fem­i­nate, even­tu­ally is only a weak one!
„Yes , sir. Mo­men­tar­ily at your ser­vice!” The [Izual] re­sponse said.
Angel Par­lia­ment, se­cret Voice Com­mu­ni­ca­tion Chan­nel.
[Raphael] of cur­rently in­va­sion, the com­plex­ion sud­denly changes, „awful, [Mr. M] came!”
„Sir [Raphael], did [Mr. M] come?” [Sun­light Angel] wants to ask ac­tu­ally that ‚[Mr. M] did come? How hadn't I dis­cov­ered?’
„Damn! [Mr. M] cur­rently counter-at­tacks us!” [Raphael] vig­i­lance looked at to com­pile Fire­wall that al­though Fire­wall has not sent out the prompt, but [Raphael] has dis­cov­ered ex­cep­tion­ally.
At this mo­ment, Shi Lei is con­trol­ling [In­ter­weave Net Mi­wang], is counter-at­tack­ing Angel Par­lia­ment fully, he has placed on main tar­get [Raphael], as for [Sun­light Angel] and [Moon­light Angel], Shi Lei does not want to cope with them tem­porar­ily.
sta­tus of [Sun­light Angel] and [Moon­light Angel] in Angel Par­lia­ment are quite spe­cial, this pair of Hacker lover files, have not joined Angel Par­lia­ment from the be­gin­ning, what is most es­sen­tial, they in Angel Par­lia­ment, have not par­tic­i­pated in some every­thing in dis­or­der Task, most has car­ried on the Hacker in­va­sion, but has not used the Hacker tech­nol­ogy to cause any per­son­nel ca­su­al­ties.
Pseudo Fourth Gen­er­a­tion Su­per­com­puter [In­ter­weave Net Mi­wang], was being con­trolled by Shi Lei, broke through Angel Par­lia­ment ex­te­rior de­fense eas­ily, Shi Lei was search­ing for the Su­per­com­puter [Holy] po­si­tion.
In order to trace Su­per­com­puter [Holy] care­fully, Shi Lei. How­ever, Shi Lei sud­denly de­pressed snort, „had been dis­cov­ered!”
[Raphael] from Fire­wall, has dis­cov­ered [Mr. M], his whole body trem­bles ex­cit­edly, [Mr. M] came out fi­nally, [Raphael] had the op­por­tu­nity to re­venge fi­nally! What a pity, [Raphael] these time is doomed un­able to re­venge.
Be­cause, when [Raphael] dis­cov­ers [Mr. M], Shi Lei also knew own in­va­sion ex­po­si­tion, is not hid­ing sim­ply, Chia Tai Light sta­tion snipe [Raphael].
Al­though [Mr. M] sud­denly ap­pears, the [Raphael] ac­tu­ally least bit does not fear [Mr. M], in­stead in Angel Par­lia­ment se­cret Voice Com­mu­ni­ca­tion Chan­nel, was telling loudly: „[Sun­light], [Moon­light], as­sist­ing me in­stead to trace [Mr. M] real ip ad­dress.”
[Raphael] wants to look up [Mr. M] real ip ad­dress, this then has [Hope] to look up [Mr. M] real iden­tity, once knew [Mr. M] real iden­tity, that can write off [Mr. M] from Re­al­ity.
A Hacker biggest card in a hand, se­cu­rity of ex­actly as stated iden­tity, if iden­tity ex­po­sure of Hacker, this Hacker re­duc­tion of Dan­ger co­ef­fi­cient then sig­nif­i­cant. Ex­poses iden­tity Hacker, mat­ter too much too much that needs to care about.
The ha­tred of [Raphael] to [Mr. M], that is not one two can talk clearly, if had found [Mr. M] real ad­dress, [Raphael] did not mind that comes a gift of never for­get­ting to [Mr. M].
Was only a pity that [Raphael] does not know a mat­ter. He when seeks for [Mr. M] real ip ad­dress, won't [Mr. M] seek for his real ip ad­dress?
Sim­i­lar to he is not feel­ing well [Mr. M] to be the same, [Mr. M] also re­pug­nant [Raphael], wishes one could to de­liver ac­tu­ally [Raphael], ac­com­pa­nies lonely [Uriel]!

Comments

No comments:

Post a Comment

Berkomentarlah dengan baik