服务端:
node1:/root/test#cat t2.py
# coding = utf-8
# -*- coding:utf-8 -*-
import socket
import time
ip_port = ('192.168.137.2',8080)
BUFSIZE = 9000
SEND_BUF_SIZE = 2
RECV_BUF_SIZE = 1
s=socket.socket(socket.AF_INET,socket.SOCK_STREAM)#创建套接字
print("Buffer size [Before]: %d" % s.getsockopt(socket.SOL_SOCKET, socket.SO_SNDBUF))
print("Buffer size [Before]: %d" % s.getsockopt(socket.SOL_SOCKET, socket.SO_RCVBUF))
s.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
s.setsockopt( socket.SOL_SOCKET, socket.SO_SNDBUF, SEND_BUF_SIZE)
s.setsockopt( socket.SOL_SOCKET, socket.SO_RCVBUF, RECV_BUF_SIZE)
print 'alter----------------';
print s.getsockopt(socket.SOL_SOCKET, socket.SO_SNDBUF)
print s.getsockopt(socket.SOL_SOCKET, socket.SO_RCVBUF)
#s.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 0)
s.bind(ip_port)#绑定地址
s.listen(5)#监听链接
print('server listening8080...')
while True: #无限等待连接
conn,addr = s.accept() #接受客户端连接
print(conn)
print(addr)
print('接到来自%s的链接'%addr[0])
while True: #通信循环,无限接受客户端信息
#print conn.getpeername()
try:
msg = conn.recv(BUFSIZE) #接受消息的内容
print 'xxx--------------------xxx'
print msg
print 'xxx--------------------xxx'
except Exception,err:
break
if len(msg)==0:break #如果 不加,已连接的客户端突然断开,recv不再阻塞,发生死循环
print '111-----------------------111'
print msg
print '111-----------------------111'
time.sleep(2)
try:
conn.send('response:'+msg)
except Exception,err:
print err
#conn.send(msg.upper())#服务端发送消息
conn.close()#关闭链接
s.close()#关闭套接字
客户端:
node2:/root/test#cat t13.py
import socket
import struct
import time
s = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
s.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)
s.setsockopt(socket.SOL_SOCKET, socket.SO_LINGER, struct.pack('ii', 1, 0))
s.connect(("192.168.137.2",8080))
s.shutdown(2)
s.send('1234567')
node2:/root/test#python t13.py
Traceback (most recent call last):
File "t13.py", line 9, in <module>
s.send('1234567')
socket.error: [Errno 32] Broken pipe
node2:/root/test#
23:04:31.421619 IP node2.31789 > node1.webcache: Flags [S], seq 2017681503, win 2560, options [mss 256,nop,nop,sackOK,nop,wscale 7], length 0
23:04:31.421680 IP node1.webcache > node2.31789: Flags [S.], seq 3384059151, ack 2017681504, win 1536, options [mss 256,nop,nop,sackOK,nop,wscale 6], length 0
23:04:31.421955 IP node2.31789 > node1.webcache: Flags [.], ack 3384059152, win 20, length 0
23:04:41.433214 IP node2.31789 > node1.webcache: Flags [F.], seq 2017681504, ack 3384059152, win 20, length 0
23:04:41.433312 IP node1.webcache > node2.31789: Flags [F.], seq 3384059152, ack 2017681505, win 24, length 0
23:04:41.433470 IP node2.31789 > node1.webcache: Flags [.], ack 3384059153, win 20, length 0