python网络编程基础之socket粘包现象
Posted 传盛
tags:
篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了python网络编程基础之socket粘包现象相关的知识,希望对你有一定的参考价值。
粘包现象两种
登陆
#服务端
import json import socket server=socket.socket()#创建socket对象 ip_port=(\'127.0.0.1\',8001)#获取本机回环地址和通信端口号 server.bind(ip_port)#绑定ip地址和端口号 #设置用户名和密码 username=\'alex\' password=\'123\' server.listen()#监听服务端口号 conn,addr=server.accept() while 1: \'\'\' from_client_msg接受客户端的用户信息 user_info_dict=json.loads(from_client_msg)接受用户信息转换成字典 \'\'\' from_client_msg=conn.recv(1024).decode(\'utf-8\') user_info_dict=json.loads(from_client_msg) print(user_info_dict) if username==user_info_dict[\'username\'] and password ==user_info_dict[\'password\']: #设定200是登陆成功的状态码 conn.send(b\'200\') break else: # 设定250是登陆失败的状态码 conn.send(b\'250\') conn.close() server.close()
#客户端
import json import socket client=socket.socket() #创建socket套接字对象 ip_port=(\'127.0.0.1\',8001)#获取ip地址和端口号 client.connect(ip_port)#客户端连接IP地址 while 1: #让用户输入用户名和密码 uname=input("请输入用户名:").strip() pwd=input("请输入密码:").strip() #定义一个字典来存储用户登陆信息 user_info={\'username\':uname,\'password\':pwd} \'\'\' 因为send的数据类型必须是bytes类型,所有需要将字典转换为bytes类型, 但是字典无法直接转换成bytes,所以我们使用json序列化,先转换成str \'\'\' user_info_json=json.dumps(user_info) user_info_str=user_info_json.encode(\'utf-8\') # 客户端发送信息 client.send(user_info_str) #接收到服务端的返回信息 from_server_data=client.recv(1024).decode(\'utf-8\') if from_server_data==\'200\': print(\'登陆成功\') break else: print(\'用户名或密码错误\') client.close()
一.连续的小包,会被优化机制给合并,代码如下
服务端:
import socket server=socket.socket() ip_port=(\'127.0.0.1\',8001) server.bind(ip_port) server.listen() conn,addr=server.accept() from_client_msg1=conn.recv(1024).decode(\'utf-8\') from_client_msg2=conn.recv(1024).decode(\'utf-8\') print(\'from_client_msg1>>>\',from_client_msg1)
客户端:
import socket client=socket.socket() ip_port=(\'127.0.0.1\',8001) client.connect(ip_port) client.send(b\'12\') client.send(b\'22\')
解决方案
服务端代码如下
import socket import subprocess server = socket.socket() ip_port = (\'127.0.0.1\',8001) server.bind(ip_port) server.listen() conn,addr = server.accept() while 1: from_client_cmd = conn.recv(1024).decode(\'utf-8\') sub_obj = subprocess.Popen( from_client_cmd, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE, ) #subprocess对象.read 得到的结果是bytes类型的 cmd_res = sub_obj.stdout.read() data_len = len(cmd_res) data_len_str = str(data_len) print(\'结果长度>>>\',data_len) conn.send(data_len_str.encode(\'utf-8\')) client_stutas = conn.recv(1024).decode(\'utf-8\') if client_stutas == \'ok\': conn.send(cmd_res) else: print(\'客户端长度信息没有收到\')
客户端代码如下
import json import socket client = socket.socket() ip_port = (\'127.0.0.1\',8001) client.connect(ip_port) while 1: client_cmd = input(\'请输入系统指令>>>\') client.send(client_cmd.encode(\'utf-8\')) from_server_datalen = client.recv(1024).decode(\'utf-8\') client.send(b\'ok\') from_server_result = client.recv(int(from_server_datalen)) print(from_server_result.decode(\'gbk\'))
二.服务端一次性无法完全就收完客户端发送的数据,第二再次接收的时候,会接收到第一次遗留的内容
服务端
import socket import subprocess server = socket.socket() ip_port = (\'127.0.0.1\',8001) server.bind(ip_port) server.listen() conn,addr = server.accept() while 1: from_client_cmd = conn.recv(1024).decode(\'utf-8\') sub_obj = subprocess.Popen( from_client_cmd, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE, ) #subprocess对象.read 得到的结果是bytes类型的 cmd_res = sub_obj.stdout.read() print(\'结果长度>>>\',len(cmd_res)) conn.send(cmd_res)
客户端
import json import socket client = socket.socket() ip_port = (\'127.0.0.1\',8001) client.connect(ip_port) while 1: client_cmd = input(\'请输入系统指令>>>\') client.send(client_cmd.encode(\'utf-8\')) from_server_result = client.recv(1024) print(from_server_result.decode(\'gbk\'))
运行代码试试
三,针对数据量大的粘包现象解决方案
服务端代码如下
import socket import subprocess server = socket.socket() ip_port = (\'127.0.0.1\',8001) data_full_len = 0 #统计发送数据的长度 server.bind(ip_port) server.listen() conn,addr = server.accept() while 1: from_client_cmd = conn.recv(1024).decode(\'utf-8\') sub_obj = subprocess.Popen( from_client_cmd, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE, ) #subprocess对象.read 得到的结果是bytes类型的 cmd_res = sub_obj.stdout.read() data_len = len(cmd_res) #总数据长度 data_len_str = str(data_len) print(\'结果长度>>>\',data_len) conn.send(data_len_str.encode(\'utf-8\')) client_stutas = conn.recv(1024).decode(\'utf-8\') if client_stutas == \'ok\': #发送真实数据 while data_full_len < data_len: every_send_data = cmd_res[data_full_len:data_full_len + 1024] every_send_datalen = len(every_send_data) conn.send(every_send_data) data_full_len += 1024 else: print(\'客户端长度信息没有收到\')
客户端代码如下
import json import socket client = socket.socket() ip_port = (\'127.0.0.1\',8001) client.connect(ip_port) all_recv_len = 0 all_data_byte = b\'\' while 1: client_cmd = input(\'请输入系统指令>>>\') client.send(client_cmd.encode(\'utf-8\')) from_server_datalen = client.recv(1024).decode(\'utf-8\') all_data_len = int(from_server_datalen) #服务端发送的总数据长度 client.send(b\'ok\') while all_recv_len < all_data_len: from_server_result = client.recv(1024) every_recv_len = len(from_server_result) #每次接受的数据长度 all_recv_len += every_recv_len all_data_byte += from_server_result print(all_data_byte.decode(\'gbk\'))
2是struct模块解决粘包现象
通过struct模块,将要发送的真实数据的长度进行打包,打包成4个字节,和真实数据一起一次性发送个客户端.客户端取出前4个字节,通过struct解包获得后面真实数据的长度,根据这个长度再进行数据的接受
服务端代码如下
import socket import subprocess import struct server = socket.socket() ip_port = (\'127.0.0.1\',8001) data_full_len = 0 #统计发送数据的长度 server.bind(ip_port) server.listen() conn,addr = server.accept() while 1: from_client_cmd = conn.recv(1024).decode(\'utf-8\') sub_obj = subprocess.Popen( from_client_cmd, shell=True, stdout=subprocess.PIPE, stderr=subprocess.PIPE, ) #subprocess对象.read 得到的结果是bytes类型的 cmd_res = sub_obj.stdout.read() data_len = len(cmd_res) #总数据长度 data_len_str = str(data_len) print(\'结果长度>>>\',data_len) #将真实数据长度打包成4个字节的数据 struct_data_len = struct.pack(\'i\',data_len) conn.send(struct_data_len + cmd_res)
客户端代码如下
import json import socket import struct client = socket.socket() ip_port = (\'127.0.0.1\',8001) client.connect(ip_port) all_recv_len = 0 all_data_byte = b\'\' while 1: client_cmd = input(\'请输入系统指令>>>\') client.send(client_cmd.encode(\'utf-8\')) #先接收4个字节,这4个字节是真实数据长度加工成的 recv_data_len = client.recv(4) #将4个字节长度的数据,解包成后面真实数据的长度 real_data_len = struct.unpack(\'i\',recv_data_len)[0] print(real_data_len) server_result = client.recv(real_data_len) print(server_result.decode(\'gbk\'))
四获取缓冲区的方法
import socket from socket import SOL_SOCKET,SO_REUSEADDR,SO_SNDBUF,SO_RCVBUF sk = socket.socket(type=socket.SOCK_DGRAM) # sk.setsockopt(SOL_SOCKET,SO_RCVBUF,80*1024) sk.bind((\'127.0.0.1\',8090)) print(\'>>>>\', (sk.getsockopt(SOL_SOCKET, SO_SNDBUF))/1024) print(\'>>>>\', sk.getsockopt(SOL_SOCKET, SO_RCVBUF))
五.合法性连接验证
服务端代码如下
from socket import * import hmac,os secret_key=b\'Jedan has a big key!\' def conn_auth(conn): \'\'\' 认证客户端链接 :param conn: :return: \'\'\' print(\'开始验证新链接的合法性\') msg=os.urandom(32)#生成一个32字节的随机字符串 conn.sendall(msg) h=hmac.new(secret_key,msg) digest=h.digest() respone=conn.recv(len(digest)) return hmac.compare_digest(respone,digest) def data_handler(conn,bufsize=1024): if not conn_auth(conn): print(\'该链接不合法,关闭\') conn.close() return print(\'链接合法,开始通信\') while True: data=conn.recv(bufsize) if not data:break conn.sendall(data.upper()) def server_handler(ip_port,bufsize,backlog=5): \'\'\' 只处理链接 :param ip_port: :return: \'\'\' tcp_socket_server=socket(AF_INET,SOCK_STREAM) tcp_socket_server.bind(ip_port) tcp_socket_server.listen(backlog) while True: conn,addr=tcp_socket_server.accept() print(\'新连接[%s:%s]\' %(addr[0],addr[1])) data_handler(conn,bufsize) if __name__ == \'__main__\': ip_port=(\'127.0.0.1\',9999) bufsize=1024 server_handler(ip_port,bufsize)
客户端代码如下
from socket import * import hmac,os secret_key=b\'Jedan has a big key!\' def conn_auth(conn): \'\'\' 验证客户端到服务器的链接 :param conn: :return: \'\'\' msg=conn.recv(32) h=hmac.new(secret_key,msg) digest=h.digest() conn.sendall(digest) def client_handler(ip_port,bufsize=1024): tcp_socket_client=socket(AF_INET,SOCK_STREAM) tcp_socket_client.connect(ip_port) conn_auth(tcp_socket_client) while True: data=input(\'>>: \').strip() if not data:continue if data == \'quit\':break tcp_socket_client.sendall(data.encode(\'utf-8\')) respone=tcp_socket_client.recv(bufsize) print(respone.decode(\'utf-8\')) tcp_socket_client.close() if __name__ == \'__main__\': ip_port=(\'127.0.0.1\',9999) bufsize=1024 client_handler(ip_port,bufsize)
以上是关于python网络编程基础之socket粘包现象的主要内容,如果未能解决你的问题,请参考以下文章