python网络编程基础之socket粘包现象

粘包现象两种

    登陆

#服务端
import
json import socket server=socket.socket()#创建socket对象 ip_port=('127.0.0.1',8001)#获取本机回环地址和通信端口号 server.bind(ip_port)#绑定ip地址和端口号 #设置用户名和密码 username='alex' password='123' server.listen()#监听服务端口号 conn,addr=server.accept() while 1: ''' from_client_msg接受客户端的用户信息 user_info_dict=json.loads(from_client_msg)接受用户信息转换成字典 ''' from_client_msg=conn.recv(1024).decode('utf-8') user_info_dict=json.loads(from_client_msg) print(user_info_dict) if username==user_info_dict['username'] and password ==user_info_dict['password']: #设定200是登陆成功的状态码 conn.send(b'200') break else: # 设定250是登陆失败的状态码 conn.send(b'250') conn.close() server.close()
#客户端
import
json import socket client=socket.socket() #创建socket套接字对象 ip_port=('127.0.0.1',8001)#获取ip地址和端口号 client.connect(ip_port)#客户端连接IP地址 while 1: #让用户输入用户名和密码 uname=input("请输入用户名:").strip() pwd=input("请输入密码:").strip() #定义一个字典来存储用户登陆信息 user_info={'username':uname,'password':pwd} ''' 因为send的数据类型必须是bytes类型,所有需要将字典转换为bytes类型, 但是字典无法直接转换成bytes,所以我们使用json序列化,先转换成str ''' user_info_json=json.dumps(user_info) user_info_str=user_info_json.encode('utf-8') # 客户端发送信息 client.send(user_info_str) #接收到服务端的返回信息 from_server_data=client.recv(1024).decode('utf-8') if from_server_data=='200': print('登陆成功') break else: print('用户名或密码错误') client.close()

一.连续的小包,会被优化机制给合并,代码如下

服务端:

import socket
server=socket.socket()
ip_port=('127.0.0.1',8001)
server.bind(ip_port)
server.listen()
conn,addr=server.accept()
from_client_msg1=conn.recv(1024).decode('utf-8')
from_client_msg2=conn.recv(1024).decode('utf-8')
print('from_client_msg1>>>',from_client_msg1)

客户端:

import socket
client=socket.socket()
ip_port=('127.0.0.1',8001)
client.connect(ip_port)
client.send(b'12')
client.send(b'22')

  

解决方案

服务端代码如下

import socket
import subprocess
server = socket.socket()
ip_port = ('127.0.0.1',8001)
server.bind(ip_port)
server.listen()
conn,addr = server.accept()
while 1:
    from_client_cmd = conn.recv(1024).decode('utf-8')

    sub_obj = subprocess.Popen(
        from_client_cmd,
        shell=True,
        stdout=subprocess.PIPE,
        stderr=subprocess.PIPE,
    )
    #subprocess对象.read 得到的结果是bytes类型的
    cmd_res = sub_obj.stdout.read()
    data_len = len(cmd_res)
    data_len_str = str(data_len)
    print('结果长度>>>',data_len)

    conn.send(data_len_str.encode('utf-8'))
    client_stutas = conn.recv(1024).decode('utf-8')
    if client_stutas == 'ok':

        conn.send(cmd_res)
    else:
        print('客户端长度信息没有收到')

  客户端代码如下

import json
import socket

client = socket.socket()
ip_port = ('127.0.0.1',8001)
client.connect(ip_port)


while 1:
    client_cmd = input('请输入系统指令>>>')
    client.send(client_cmd.encode('utf-8'))
    from_server_datalen = client.recv(1024).decode('utf-8')

    client.send(b'ok')

    from_server_result = client.recv(int(from_server_datalen))

    print(from_server_result.decode('gbk'))

二.服务端一次性无法完全就收完客户端发送的数据,第二再次接收的时候,会接收到第一次遗留的内容

服务端

import socket
import subprocess
server = socket.socket()
ip_port = ('127.0.0.1',8001)
server.bind(ip_port)
server.listen()
conn,addr = server.accept()
while 1:
    from_client_cmd = conn.recv(1024).decode('utf-8')

    sub_obj = subprocess.Popen(
        from_client_cmd,
        shell=True,
        stdout=subprocess.PIPE,
        stderr=subprocess.PIPE,
    )
    #subprocess对象.read 得到的结果是bytes类型的
    cmd_res = sub_obj.stdout.read()
    print('结果长度>>>',len(cmd_res))
    conn.send(cmd_res)

  客户端

import json
import socket

client = socket.socket()
ip_port = ('127.0.0.1',8001)
client.connect(ip_port)



while 1:
    client_cmd = input('请输入系统指令>>>')
    client.send(client_cmd.encode('utf-8'))

    from_server_result = client.recv(1024)

    print(from_server_result.decode('gbk'))

  运行代码试试

三,针对数据量大的粘包现象解决方案

服务端代码如下

import socket
import subprocess
server = socket.socket()
ip_port = ('127.0.0.1',8001)
data_full_len = 0 #统计发送数据的长度
server.bind(ip_port)
server.listen()
conn,addr = server.accept()
while 1:
    from_client_cmd = conn.recv(1024).decode('utf-8')

    sub_obj = subprocess.Popen(
        from_client_cmd,
        shell=True,
        stdout=subprocess.PIPE,
        stderr=subprocess.PIPE,
    )
    #subprocess对象.read 得到的结果是bytes类型的
    cmd_res = sub_obj.stdout.read()
    data_len = len(cmd_res)  #总数据长度
    data_len_str = str(data_len)
    print('结果长度>>>',data_len)

    conn.send(data_len_str.encode('utf-8'))
    client_stutas = conn.recv(1024).decode('utf-8')

    if client_stutas == 'ok':
        #发送真实数据
        while data_full_len < data_len:
            every_send_data = cmd_res[data_full_len:data_full_len + 1024]
            every_send_datalen = len(every_send_data)
            conn.send(every_send_data)
            data_full_len += 1024

    else:
        print('客户端长度信息没有收到')

  客户端代码如下

import json
import socket

client = socket.socket()
ip_port = ('127.0.0.1',8001)
client.connect(ip_port)
all_recv_len = 0
all_data_byte = b''

while 1:
    client_cmd = input('请输入系统指令>>>')
    client.send(client_cmd.encode('utf-8'))
    from_server_datalen = client.recv(1024).decode('utf-8')
    all_data_len = int(from_server_datalen)  #服务端发送的总数据长度

    client.send(b'ok')

    while all_recv_len < all_data_len:

        from_server_result = client.recv(1024)
        every_recv_len = len(from_server_result) #每次接受的数据长度
        all_recv_len += every_recv_len
        all_data_byte += from_server_result


    print(all_data_byte.decode('gbk'))

  2是struct模块解决粘包现象

通过struct模块,将要发送的真实数据的长度进行打包,打包成4个字节,和真实数据一起一次性发送个客户端.客户端取出前4个字节,通过struct解包获得后面真实数据的长度,根据这个长度再进行数据的接受

服务端代码如下

import socket
import subprocess
import struct
server = socket.socket()
ip_port = ('127.0.0.1',8001)
data_full_len = 0 #统计发送数据的长度
server.bind(ip_port)
server.listen()
conn,addr = server.accept()
while 1:
    from_client_cmd = conn.recv(1024).decode('utf-8')

    sub_obj = subprocess.Popen(
        from_client_cmd,
        shell=True,
        stdout=subprocess.PIPE,
        stderr=subprocess.PIPE,
    )
    #subprocess对象.read 得到的结果是bytes类型的
    cmd_res = sub_obj.stdout.read()
    data_len = len(cmd_res)  #总数据长度
    data_len_str = str(data_len)
    print('结果长度>>>',data_len)

    #将真实数据长度打包成4个字节的数据
    struct_data_len = struct.pack('i',data_len)

    conn.send(struct_data_len + cmd_res)

  客户端代码如下

import json
import socket
import struct
client = socket.socket()
ip_port = ('127.0.0.1',8001)
client.connect(ip_port)
all_recv_len = 0
all_data_byte = b''

while 1:
    client_cmd = input('请输入系统指令>>>')
    client.send(client_cmd.encode('utf-8'))
    #先接收4个字节,这4个字节是真实数据长度加工成的
    recv_data_len = client.recv(4)
    #将4个字节长度的数据,解包成后面真实数据的长度
    real_data_len = struct.unpack('i',recv_data_len)[0]

    print(real_data_len)

    server_result = client.recv(real_data_len)

    print(server_result.decode('gbk'))

    

四获取缓冲区的方法

import socket
from socket import SOL_SOCKET,SO_REUSEADDR,SO_SNDBUF,SO_RCVBUF
sk = socket.socket(type=socket.SOCK_DGRAM)
# sk.setsockopt(SOL_SOCKET,SO_RCVBUF,80*1024)
sk.bind(('127.0.0.1',8090))
print('>>>>', (sk.getsockopt(SOL_SOCKET, SO_SNDBUF))/1024)
print('>>>>', sk.getsockopt(SOL_SOCKET, SO_RCVBUF))

  

五.合法性连接验证

服务端代码如下

from socket import *
import hmac,os

secret_key=b'Jedan has a big key!'
def conn_auth(conn):
    '''
    认证客户端链接
    :param conn:
    :return:
    '''
    print('开始验证新链接的合法性')
    msg=os.urandom(32)#生成一个32字节的随机字符串
    conn.sendall(msg)
    h=hmac.new(secret_key,msg)
    digest=h.digest()
    respone=conn.recv(len(digest))
    return hmac.compare_digest(respone,digest)

def data_handler(conn,bufsize=1024):
    if not conn_auth(conn):
        print('该链接不合法,关闭')
        conn.close()
        return
    print('链接合法,开始通信')
    while True:
        data=conn.recv(bufsize)
        if not data:break
        conn.sendall(data.upper())

def server_handler(ip_port,bufsize,backlog=5):
    '''
    只处理链接
    :param ip_port:
    :return:
    '''
    tcp_socket_server=socket(AF_INET,SOCK_STREAM)
    tcp_socket_server.bind(ip_port)
    tcp_socket_server.listen(backlog)
    while True:
        conn,addr=tcp_socket_server.accept()
        print('新连接[%s:%s]' %(addr[0],addr[1]))
        data_handler(conn,bufsize)

if __name__ == '__main__':
    ip_port=('127.0.0.1',9999)
    bufsize=1024
    server_handler(ip_port,bufsize)

  客户端代码如下

from socket import *
import hmac,os

secret_key=b'Jedan has a big key!'
def conn_auth(conn):
    '''
    验证客户端到服务器的链接
    :param conn:
    :return:
    '''
    msg=conn.recv(32)
    h=hmac.new(secret_key,msg)
    digest=h.digest()
    conn.sendall(digest)

def client_handler(ip_port,bufsize=1024):
    tcp_socket_client=socket(AF_INET,SOCK_STREAM)
    tcp_socket_client.connect(ip_port)

    conn_auth(tcp_socket_client)

    while True:
        data=input('>>: ').strip()
        if not data:continue
        if data == 'quit':break

        tcp_socket_client.sendall(data.encode('utf-8'))
        respone=tcp_socket_client.recv(bufsize)
        print(respone.decode('utf-8'))
    tcp_socket_client.close()

if __name__ == '__main__':
    ip_port=('127.0.0.1',9999)
    bufsize=1024
    client_handler(ip_port,bufsize)

  

猜你喜欢

转载自www.cnblogs.com/liucsxiaoxiaobai/p/10009151.html