本文实例讲述了Python基本socket通信控制操作。分享给大家供大家参考,具体如下:
python — 基本socket通信控制(控制在celie.txt文件中主机IP地址可以发送信息,并返回对应的客户端IP、时间戳、发送的信息)
客户端代码
root@72129clent:~/python/snmp# ls snmpclenit.py tab.py root@72129clent:~/python/snmp# cat snmpclenit.py #!/usr/bin/python # --*-- coding:utf-8 --*-- import socket host,port = '192.168.72.130',18000 s = socket.socket(socket.AF_INET,socket.SOCK_STREAM)#调用IPv4协议 s.connect((host,port))#连接主机与端口 s.send("up")#客户端给服务器端发送数据“up” s.close() root@72129clent:~/python/snmp#
服务器短信代码:
root@kali:~/python/snmp# ls celie.txt snmpserver.py tab.py tab.pyc root@kali:~/python/snmp# cat celie.txt 192.168.72.129 xuweibo root@kali:~/python/snmp# root@kali:~/python/snmp# cat snmpserver.py #!/usr/bin/python # --*-- coding:utf-8 --*-- import datetime#导入时间戳 import SocketServer #读取目录下的celie.txt文件 host_status = {}#新建字典,使用IP地址作为KEY值。作用是来判断每个客户端IP多久与服务器通信一次的 f = open('celie.txt')#调用策略文档,在里面的ip地址就可以通过,并发送信息 while True: line = f.readline().split() if len(line) == 0:break print line[0]#打印第一个IP地址信息 host_status[line[0]] = []#给字典第一个设置为空,这样后面只要直接追加值就ok了 f.close() class myMonitorHandler(SocketServer.BaseRequestHandler): '''This is the Monitor server''' def handle(self): recv_data = self.request.recv(1024)#接收客户端数据 if self.client_address[0] in host_status.keys():#如果存在字典中的ip地址信息,就返回对应客户端发送的Ip、时间戳、信息 #self.client_address为数组('192.168.72.129', 49109)的值。只要当中的IP地址,因此取self.client_address[0] #把host_status字典中的self.client_address[0]值即IP地址值赋值有两个值,因此新建个列表,存取两个值时间戳与接收的信息 #如:{'192.168.72.129': [(datetime.datetime(2017, 8, 20, 21, 29, 59, 415054), 'up')]} #host_status[self.client_address[0]] = [(datetime.datetime.now(),recv_data)] #直接把元组append进字典 host_status[self.client_address[0]].append((datetime.datetime.now(),recv_data)) print 'From %s : %s %s' %(self.client_address,datetime.datetime.now(),recv_data)#打印客户端地址、操作的时间戳值与接收的数据 #print host_status else:#不存在字典中,则如下提示信息 print "sorry, ip %s is not in the monitor list" % self.client_address[0] #打印出192.168.72.129 [(datetime.datetime(2017, 8, 20, 22, 1, 6, 705498), 'up')] for t,m in host_status.items(): print t,m if __name__ == "__main__":#当自己运行时调用什么什么;当被其他程序调用时调用什么什么,如果被其他程序调用了,下面代码不执行 host,port = '',18000 server = SocketServer.ThreadingTCPServer((host,port),myMonitorHandler)#调用TCP的多线程 server.serve_forever() root@kali:~/python/snmp#
脚本运行情况
服务器端运行:
root@kali:~/python/snmp# lsof -i:18000 COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME python 14190 root 3u IPv4 45472 0t0 TCP *:18000 (LISTEN) root@kali:~/python/snmp# kill -9 14190 root@kali:~/python/snmp# python snmpserver.py 192.168.72.129
在celie.txt中192.168.72.129的客户端运行:
root@72129clent:~/python/snmp# python snmpclenit.py root@72129clent:~/python/snmp# python snmpclenit.py root@72129clent:~/python/snmp# python snmpclenit.py root@72129clent:~/python/snmp# python snmpclenit.py root@72129clent:~/python/snmp# python snmpclenit.py root@72129clent:~/python/snmp#
不在celie.txt中192.168.72.1的客户端运行:
192.168.72.1的snmpclinet.py脚本语句:
#!/usr/bin/python # --*-- coding:utf-8 --*-- import socket host,port = '192.168.72.130',18000 s = socket.socket(socket.AF_INET,socket.SOCK_STREAM)#调用IPv4协议 s.connect((host,port))#连接主机与端口 s.send("up")#客户端给服务器端发送数据“up” s.close()
192.168.72.1的客户端运行:
C:\Python27>python.exe snmpclinet.py C:\Python27>python.exe snmpclinet.py C:\Python27>python.exe snmpclinet.py C:\Python27>python.exe snmpclinet.py C:\Python27>python.exe snmpclinet.py C:\Python27>
再次查看服务器端运行情况:
root@kali:~/python/snmp# lsof -i:18000 COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME python 14190 root 3u IPv4 45472 0t0 TCP *:18000 (LISTEN) root@kali:~/python/snmp# kill -9 14190 root@kali:~/python/snmp# python snmpserver.py 192.168.72.129 From ('192.168.72.129', 49208) : 2017-08-20 23:31:41.125892 up 192.168.72.129 [(datetime.datetime(2017, 8, 20, 23, 31, 41, 125872), 'up')] From ('192.168.72.129', 49209) : 2017-08-20 23:31:57.141410 up 192.168.72.129 [(datetime.datetime(2017, 8, 20, 23, 31, 41, 125872), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 57, 141389), 'up')] From ('192.168.72.129', 49210) : 2017-08-20 23:31:57.747056 up 192.168.72.129 [(datetime.datetime(2017, 8, 20, 23, 31, 41, 125872), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 57, 141389), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 57, 747038), 'up')] From ('192.168.72.129', 49211) : 2017-08-20 23:31:58.394295 up 192.168.72.129 [(datetime.datetime(2017, 8, 20, 23, 31, 41, 125872), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 57, 141389), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 57, 747038), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 58, 394273), 'up')] From ('192.168.72.129', 49212) : 2017-08-20 23:31:58.887359 up 192.168.72.129 [(datetime.datetime(2017, 8, 20, 23, 31, 41, 125872), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 57, 141389), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 57, 747038), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 58, 394273), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 58, 887340), 'up')] sorry, ip 192.168.72.1 is not in the monitor list 192.168.72.129 [(datetime.datetime(2017, 8, 20, 23, 31, 41, 125872), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 57, 141389), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 57, 747038), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 58, 394273), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 58, 887340), 'up')] sorry, ip 192.168.72.1 is not in the monitor list 192.168.72.129 [(datetime.datetime(2017, 8, 20, 23, 31, 41, 125872), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 57, 141389), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 57, 747038), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 58, 394273), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 58, 887340), 'up')] sorry, ip 192.168.72.1 is not in the monitor list 192.168.72.129 [(datetime.datetime(2017, 8, 20, 23, 31, 41, 125872), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 57, 141389), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 57, 747038), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 58, 394273), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 58, 887340), 'up')] sorry, ip 192.168.72.1 is not in the monitor list 192.168.72.129 [(datetime.datetime(2017, 8, 20, 23, 31, 41, 125872), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 57, 141389), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 57, 747038), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 58, 394273), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 58, 887340), 'up')] sorry, ip 192.168.72.1 is not in the monitor list 192.168.72.129 [(datetime.datetime(2017, 8, 20, 23, 31, 41, 125872), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 57, 141389), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 57, 747038), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 58, 394273), 'up'), (datetime.datetime(2017, 8, 20, 23, 31, 58, 887340), 'up')]
更多关于Python相关内容可查看本站专题:《Python Socket编程技巧总结》、《Python数据结构与算法教程》、《Python函数使用技巧总结》、《Python字符串操作技巧汇总》、《Python入门与进阶经典教程》及《Python文件与目录操作技巧汇总》
希望本文所述对大家Python程序设计有所帮助。
Python,socket通信
免责声明:本站文章均来自网站采集或用户投稿,网站不提供任何软件下载或自行开发的软件! 如有用户或公司发现本站内容信息存在侵权行为,请邮件告知! 858582#qq.com
《魔兽世界》大逃杀!60人新游玩模式《强袭风暴》3月21日上线
暴雪近日发布了《魔兽世界》10.2.6 更新内容,新游玩模式《强袭风暴》即将于3月21 日在亚服上线,届时玩家将前往阿拉希高地展开一场 60 人大逃杀对战。
艾泽拉斯的冒险者已经征服了艾泽拉斯的大地及遥远的彼岸。他们在对抗世界上最致命的敌人时展现出过人的手腕,并且成功阻止终结宇宙等级的威胁。当他们在为即将于《魔兽世界》资料片《地心之战》中来袭的萨拉塔斯势力做战斗准备时,他们还需要在熟悉的阿拉希高地面对一个全新的敌人──那就是彼此。在《巨龙崛起》10.2.6 更新的《强袭风暴》中,玩家将会进入一个全新的海盗主题大逃杀式限时活动,其中包含极高的风险和史诗级的奖励。
《强袭风暴》不是普通的战场,作为一个独立于主游戏之外的活动,玩家可以用大逃杀的风格来体验《魔兽世界》,不分职业、不分装备(除了你在赛局中捡到的),光是技巧和战略的强弱之分就能决定出谁才是能坚持到最后的赢家。本次活动将会开放单人和双人模式,玩家在加入海盗主题的预赛大厅区域前,可以从强袭风暴角色画面新增好友。游玩游戏将可以累计名望轨迹,《巨龙崛起》和《魔兽世界:巫妖王之怒 经典版》的玩家都可以获得奖励。