urban bible
Chapter 244 Test, is it the same as the real one?
Chapter 244 Test, is it the same as the real one?
Although Lin Dong said it was simple before, in fact, software programming is not that simple.
After all, this is to build a huge similar local area network separately, and it is a function to re-connect after the IP that performs the flower search is blocked, so a new set of procedures is required.
In Teng Qingyuan and Liao Zijie's place, Lin Dong has seen the separate network of the public security system. The protocol used is relatively old, and the IP is assigned separately. This is actually a closed network system. This is simple. What Lin Dong has to do is This separate system needs to be connected with the Internet system currently used by netizens.
What Lin Dong most wants to see is another system that is directly and completely independent of the Internet, just like the public security system, so that it will not be controlled by others at all, but the amount of work is huge, and now netizens are used to using the Internet , if he does one alone, it will not be accepted at all.
Therefore, we can only settle for the next best thing, first to keep the flower search from being controlled by others, then we need to back up the server of the flower search, use the new coordination, and then create a conversion system, and add an early warning mechanism, once the flower search IP is blocked If the emergency mechanism is activated, the backup server will immediately take over the function of the main server and play a role.
Of course, in order for users to use it normally when the IP of Zhonghua Search is blocked, users must know the new IP of the backup server of Zhonghua Search in advance, or the address obtained by the conversion system.
In fact, if you are not afraid of trouble, you can apply for more top-level IPs and rotate them after the main IP is blocked, but Lin Dong is not satisfied with this situation. After all, even if you apply for more, it is still under the control of others.But as long as I make this conversion system, unless Lao Mei blocks all Huaxia's IP, I can completely use the conversion system to fight against Lao Mei's possible control over me.
And if it is true that all of China’s IPs are blocked, that’s fine—Lin Dong clearly knows that our country is not without countermeasures. There were riots in the Western Regions in 09. There was a time when the Internet was shut down in the Western Regions for a year. Some networks are still running, and Lin Dong is not the only one who feels a sense of crisis!
After analyzing the situation clearly, Lin Dong began to divide his tasks: first, design and program the conversion system; second, backup the server; And the conversion system starts immediately, and the user clicks on the blocked flower search link and it will be automatically transferred to the backup server.
After distinguishing the tasks, Lin Dong immediately started writing the program.
Since there are ready-made examples in mind, parallel future generations, similar situations are not uncommon. Many countries have opinions on the hegemony of the United States in the Internet, and there are many countermeasures. A giant Internet like Huaxia has also done a lot. Few, in the future, some Internet companies will develop a similar conversion system in order to avoid the blocking and hegemony of the United States. This is a company in Huaxia, but it is not as mature as Lin Dong's at that time, after all, the conditions are different .
Now Lin Dong doesn't have to worry about hardware problems, he only needs to write good software. For him, there are precedents of flower search and Xiaotianyan system, so it is not very difficult.
In just two days, Lin Dong worked out the framework of the entire conversion system, and after four days of careful improvement, Lin Dong came up with a complete system.
After the program was completed, Lin Dong did not take it out immediately, but repeated it in the computer, deliberating line by line. Although the problem like He Dongcheng's before would not occur, he must ensure that the conversion program he made , will not be reversed by others from the Internet, whether it is security or loopholes, it is a place that must be paid attention to.
He didn't want such a good emergency mechanism to be hacked and controlled by others, it would be a big joke!
After going back and forth for a day, Lin Dong felt relieved.This system should be done.
However, this is just something in the computer and needs to be tested to ensure that it functions as expected.
With the current financial resources of Changying Group, it is not difficult to conduct tests. Lin Dong directly opened a large computer room on the company floor, set up a limited network according to his own ideas, and set up a separate server as a backup server, and then Then start testing.
During the whole process, except for Ji Yao, no one else in the company was allowed to participate.Although these people have passed the political review and assessment, no one can guarantee whether the news will be leaked. If it is leaked, with the current speed of Internet transmission and the degree of deterioration, no one can guarantee that after it is released, What will become of it.
"Installed?" Ji Yao not only has no objection to Lin Dong's cautiousness, but is very satisfied, but she knows that this is not a long-term solution, but as long as these systems and software programs are tested successfully, then the company will be reliable later It is not impossible for the high-level to inform the matter.
Seeing that Lin Dong had withdrawn from the USB flash drive, she asked, "Is it ready to run now?"
"Okay." Although the network designed by Lin Dong is not there, it is enough to simulate the network environment designed by himself. "You start the flower search first. After a while, I will cut off the IP in the limited network of the flower search on the server, and then check the access situation from your side."
"Okay." Ji Yao started to operate the computer and began to search for flowers.
Because it is a local area network, the flower search is just a separate program at this time, and there is no link to it. She just keeps refreshing the program.
"Okay, I'm disconnected!" Lin Dong said at the LAN server; "You keep refreshing."
Ji Yao responded for a while, keeping the refresh unchanged, and then felt that the refresh time suddenly changed from about 0.5 seconds to 1 second, during which the mouse pointer turned into an hourglass, waiting, but not waiting After a while, the page is displayed again.
"Success!" Although it was just a test, there was no difference between the simulated environment and the real Internet environment. Seeing that the webpage could be refreshed, Ji Yao immediately cried out happily: "It's done!"
Seeing Ji Yao's happy expression, Lin Dong smiled. Although it was just a test, the test was successful in such an environment, which shows that the program he wrote can stand the test, at least in a small area!
The rest depends on the separate optical cable and server system.
As long as these things are done well, at that time, my worries will be much less!
(End of this chapter)
Although Lin Dong said it was simple before, in fact, software programming is not that simple.
After all, this is to build a huge similar local area network separately, and it is a function to re-connect after the IP that performs the flower search is blocked, so a new set of procedures is required.
In Teng Qingyuan and Liao Zijie's place, Lin Dong has seen the separate network of the public security system. The protocol used is relatively old, and the IP is assigned separately. This is actually a closed network system. This is simple. What Lin Dong has to do is This separate system needs to be connected with the Internet system currently used by netizens.
What Lin Dong most wants to see is another system that is directly and completely independent of the Internet, just like the public security system, so that it will not be controlled by others at all, but the amount of work is huge, and now netizens are used to using the Internet , if he does one alone, it will not be accepted at all.
Therefore, we can only settle for the next best thing, first to keep the flower search from being controlled by others, then we need to back up the server of the flower search, use the new coordination, and then create a conversion system, and add an early warning mechanism, once the flower search IP is blocked If the emergency mechanism is activated, the backup server will immediately take over the function of the main server and play a role.
Of course, in order for users to use it normally when the IP of Zhonghua Search is blocked, users must know the new IP of the backup server of Zhonghua Search in advance, or the address obtained by the conversion system.
In fact, if you are not afraid of trouble, you can apply for more top-level IPs and rotate them after the main IP is blocked, but Lin Dong is not satisfied with this situation. After all, even if you apply for more, it is still under the control of others.But as long as I make this conversion system, unless Lao Mei blocks all Huaxia's IP, I can completely use the conversion system to fight against Lao Mei's possible control over me.
And if it is true that all of China’s IPs are blocked, that’s fine—Lin Dong clearly knows that our country is not without countermeasures. There were riots in the Western Regions in 09. There was a time when the Internet was shut down in the Western Regions for a year. Some networks are still running, and Lin Dong is not the only one who feels a sense of crisis!
After analyzing the situation clearly, Lin Dong began to divide his tasks: first, design and program the conversion system; second, backup the server; And the conversion system starts immediately, and the user clicks on the blocked flower search link and it will be automatically transferred to the backup server.
After distinguishing the tasks, Lin Dong immediately started writing the program.
Since there are ready-made examples in mind, parallel future generations, similar situations are not uncommon. Many countries have opinions on the hegemony of the United States in the Internet, and there are many countermeasures. A giant Internet like Huaxia has also done a lot. Few, in the future, some Internet companies will develop a similar conversion system in order to avoid the blocking and hegemony of the United States. This is a company in Huaxia, but it is not as mature as Lin Dong's at that time, after all, the conditions are different .
Now Lin Dong doesn't have to worry about hardware problems, he only needs to write good software. For him, there are precedents of flower search and Xiaotianyan system, so it is not very difficult.
In just two days, Lin Dong worked out the framework of the entire conversion system, and after four days of careful improvement, Lin Dong came up with a complete system.
After the program was completed, Lin Dong did not take it out immediately, but repeated it in the computer, deliberating line by line. Although the problem like He Dongcheng's before would not occur, he must ensure that the conversion program he made , will not be reversed by others from the Internet, whether it is security or loopholes, it is a place that must be paid attention to.
He didn't want such a good emergency mechanism to be hacked and controlled by others, it would be a big joke!
After going back and forth for a day, Lin Dong felt relieved.This system should be done.
However, this is just something in the computer and needs to be tested to ensure that it functions as expected.
With the current financial resources of Changying Group, it is not difficult to conduct tests. Lin Dong directly opened a large computer room on the company floor, set up a limited network according to his own ideas, and set up a separate server as a backup server, and then Then start testing.
During the whole process, except for Ji Yao, no one else in the company was allowed to participate.Although these people have passed the political review and assessment, no one can guarantee whether the news will be leaked. If it is leaked, with the current speed of Internet transmission and the degree of deterioration, no one can guarantee that after it is released, What will become of it.
"Installed?" Ji Yao not only has no objection to Lin Dong's cautiousness, but is very satisfied, but she knows that this is not a long-term solution, but as long as these systems and software programs are tested successfully, then the company will be reliable later It is not impossible for the high-level to inform the matter.
Seeing that Lin Dong had withdrawn from the USB flash drive, she asked, "Is it ready to run now?"
"Okay." Although the network designed by Lin Dong is not there, it is enough to simulate the network environment designed by himself. "You start the flower search first. After a while, I will cut off the IP in the limited network of the flower search on the server, and then check the access situation from your side."
"Okay." Ji Yao started to operate the computer and began to search for flowers.
Because it is a local area network, the flower search is just a separate program at this time, and there is no link to it. She just keeps refreshing the program.
"Okay, I'm disconnected!" Lin Dong said at the LAN server; "You keep refreshing."
Ji Yao responded for a while, keeping the refresh unchanged, and then felt that the refresh time suddenly changed from about 0.5 seconds to 1 second, during which the mouse pointer turned into an hourglass, waiting, but not waiting After a while, the page is displayed again.
"Success!" Although it was just a test, there was no difference between the simulated environment and the real Internet environment. Seeing that the webpage could be refreshed, Ji Yao immediately cried out happily: "It's done!"
Seeing Ji Yao's happy expression, Lin Dong smiled. Although it was just a test, the test was successful in such an environment, which shows that the program he wrote can stand the test, at least in a small area!
The rest depends on the separate optical cable and server system.
As long as these things are done well, at that time, my worries will be much less!
(End of this chapter)
You'll Also Like
-
Left to right, I meet the devil. I am the best in the lord world.
Chapter 259 6 hours ago -
The game started with a 10,000-fold increase. The empress asked me to upgrade slowly.
Chapter 137 6 hours ago -
At the beginning, marry the goddess of the Su family and be rewarded with a double pupil body!
Chapter 292 6 hours ago -
NBA: Fusion of two talents to dominate the entire league
Chapter 338 6 hours ago -
Everyone: You are a farmer, why is the tree world coming?
Chapter 143 6 hours ago -
Ten draws of Farmer? What the hell is Star-Destroying Pea Shooter?
Chapter 261 6 hours ago -
Villain: Starts by enslaving the heroine
Chapter 487 6 hours ago -
Invincible Family starts with 3000 Emperors
Chapter 308 6 hours ago -
Star Railway: Theresa's Joyful Journey
Chapter 173 6 hours ago -
Kill me you said, I created the sequence, what do you regret
Chapter 178 6 hours ago