• <ins id="pjuwb"></ins>
    <blockquote id="pjuwb"><pre id="pjuwb"></pre></blockquote>
    <noscript id="pjuwb"></noscript>
          <sup id="pjuwb"><pre id="pjuwb"></pre></sup>
            <dd id="pjuwb"></dd>
            <abbr id="pjuwb"></abbr>

            厚積薄發,滴水穿石

            搬家到主站了:http://www.cnblogs.com/cokecoffe/
            隨筆 - 45, 文章 - 8, 評論 - 12, 引用 - 0
            數據加載中……

            Simple UDP code with C

            The server

            1 #include <arpa/inet.h>
            2 #include <netinet/in.h>
            3 #include <stdio.h>
            4 #include <sys/types.h>
            5 #include <sys/socket.h>
            6 #include <unistd.h>
            7
            8 #define BUFLEN 512
            9 #define NPACK 10
            10 #define PORT 9930
            11
            12 void diep(char *s)
            13 {
            14 perror(s);
            15 exit(1);
            16 }
            17
            18 int main(void)
            19 {
            20    struct sockaddr_in si_me, si_other;
            21     int s, i, slen=sizeof(si_other);
            22     char buf[BUFLEN];
            23
            24     if ((s=socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP))==-1)
            25        diep("socket");
            26
            27    memset((char *) &si_me, 0, sizeof(si_me));
            28     si_me.sin_family = AF_INET;
            29    si_me.sin_port = htons(PORT);
            30     si_me.sin_addr.s_addr = htonl(INADDR_ANY);
            31   
                    if (bind(s, &si_me, sizeof(si_me))==-1)
            32         diep("bind");
            33
            34     for (i=0; i<NPACK; i++) {
            35        if (recvfrom(s, buf, BUFLEN, 0, &si_other, &slen)==-1)
            36              diep("recvfrom()");
            37        printf("Received packet from %s:%d\nData: %s\n\n",
            38        inet_ntoa(si_other.sin_addr), ntohs(si_other.sin_port), buf);
            39     }
            40
            41     close(s);
            42     return 0;
            43 }
            Comments

            Lines 8-10 define the buffer size (quite arbitrary), the number of packets to receive and the UDP port number to listen at. You could use any port number above 1023, although bind() will fail if someone else is using the same port simultaneously.
            The function diep() is used for error handling.
            21: Declare receive buffer.
            22: sockaddr_in is a structure containing an Internet socket address. Basically, it contains:
            an address family (always AF_INET for our purposes)
            a port number
            an IP address
            si_me defines the socket where the server will listen. si_other defines the socket at the other end of the link (that is, the client).
            24: Create a socket. AF_INET says that it will be an Internet socket. SOCK_DGRAM says that it will use datagram delivery instead of virtual circuits. IPPROTO_UDP says that it will use the UDP protocol (the standard transport layer protocol for datagrams in IP networks). Generally you can use zero for the last parameter; the kernel will figure out what protocol to use (in this case, it would choose IPPROTO_UDP anyway).
            27: We need to initialize the si_me structure. The first step is to fill it with binary zeroes, which is done on this line. (I doubt this step is actually necessary in modern Unix implementations, but better safe than sorry.)
            28: We will use Internet addresses.
            29: Here, the port number is defined. htons() ensures that the byte order is correct (Host TO Network order/Short integer).
            30: This line is used to tell what IP address we want to bind to. Most machines have more than one network interface (for example, 127.0.0.1 for the loopback interface and some other address for the network card; there may be more than one network card). In the general case, you want to accept packets from any interface, so you use INADDR_ANY instead of a specific address.
            31: Now we are ready to bind the socket to the address we created above. This line tells the system that the socket s should be bound to the address in si_me.
            35: This call says that we want to receive a packet from s, that the data should be put info buf, and that buf can store at most BUFLEN characters. The zero parameter says that no special flags should be used. Data about the sender should be stored in si_other, which has room for slen byte. Note that recvfrom() will set slen to the number of bytes actually stored. If you want to play safe, set slen to sizeof(si_other) after each call to recvfrom().
            37: The information about the sender we got from recvfrom() is displayed (IP:port), along with the data in the packet. inet_ntoa() takes a struct in_addr and converts it to a string in dot notation, which is rather useful if you want to display the address in a legible form.

            The client

            1 #define SRV_IP "999.999.999.999"
            2 /* diep(), #includes and #defines like in the server */
            3
            4 int main(void)
            5 {
            6     struct sockaddr_in si_other;
            7     int s, i, slen=sizeof(si_other);
            8     char buf[BUFLEN];
            9
            10     if ((s=socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP))==-1)
            11        diep("socket");
            12
            13     memset((char *) &si_other, 0, sizeof(si_other));
            14     si_other.sin_family = AF_INET;
            15     si_other.sin_port = htons(PORT);

            16     if (inet_aton(SRV_IP, &si_other.sin_addr)==0) {
            17           fprintf(stderr, "inet_aton() failed\n");
            18          exit(1);
            19    }
            20
            21     for (i=0; i<NPACK; i++) {
            22        printf("Sending packet %d\n", i);
            23        sprintf(buf, "This is packet %d\n", i);
            24        if (sendto(s, buf, BUFLEN, 0, &si_other, slen)==-1)
            25               diep("sendto()");
            26 }
            27
            28       close(s);
            29       return 0;
            30 }
            Note: The client is quite similar to the server. Only the differences will be discussed.

            1: You need to know the IP address of the machine where the server runs. If you run the client and the server on the same machine, try 127.0.0.1. "999.999.999.999" is not a legal IP address; you need to substitute your own server's address.
            12: You may call bind() after the call to socket(), if you wish to specify which port and interface that should be used for the client socket. However, this is almost never necessary. The system will decide what port and interface to use.
            13-19: Here, we set up a sockaddr_in corresponding to the socket address where the server is listening. inet_aton() is used to convert a string in dotted-decimal ASCII notation to a binary address.
            24: Send BUFLEN bytes from buf to s, with no flags (0). The receiver is specified in si_other, which contains slen byte.
            General tips

            Remember to always check return values from system calls! By doing so, you will save time in the long run, I promise. Many people do not test return values in small quick-and-dirty test programs. However, in such cases it is especially important to check return values, because if you don't really know what you are doing you are much more likely to make a mistake. The checks help you understand what went wrong and why.
            There is a tool called netcat (the actual command is nc) which is very useful for testing and debugging socket code. Check the man page if you are curious (of course, it might not be installed on your system).
            If you want to cut and paste the code above, use cut -c9- to get rid of the line numbers. (The exact syntax of cut may be different on your system, and you may have to remove more or less than 9 characters.)
            The command netstat can be useful to check which sockets are active. Try netstat -a.
            For an overview over some of the structures used in socket programming, check out the code examples from lecture 13 on my course in Unix system programming. You will also find some material on TCP programming there. Disregard the initial material on select() and friends. There are some comments in Swedish, but most of the page is written in C.

            posted on 2011-11-25 22:38 Wangkeke 閱讀(573) 評論(0)  編輯 收藏 引用 所屬分類: Net

            久久亚洲AV无码精品色午夜 | 潮喷大喷水系列无码久久精品| 热RE99久久精品国产66热| 亚洲国产婷婷香蕉久久久久久| 久久久久国产精品嫩草影院 | 久久99热只有频精品8| 国产精品激情综合久久| 午夜肉伦伦影院久久精品免费看国产一区二区三区 | 久久被窝电影亚洲爽爽爽| 久久97精品久久久久久久不卡| 99麻豆久久久国产精品免费| 久久夜色撩人精品国产小说| 久久亚洲欧美国产精品| 狠狠综合久久综合中文88| 中文字幕久久久久人妻| 久久久久亚洲?V成人无码| 99久久免费国产精品热| 久久中文字幕精品| 国内精品欧美久久精品| 久久亚洲春色中文字幕久久久| 久久亚洲国产成人影院网站 | 久久亚洲中文字幕精品有坂深雪 | 久久精品国产2020| 国产成人99久久亚洲综合精品| 浪潮AV色综合久久天堂| 一本色综合久久| 久久人妻少妇嫩草AV蜜桃| 久久久九九有精品国产| 97久久精品人妻人人搡人人玩| 色综合久久中文字幕无码| 伊人色综合九久久天天蜜桃| 精品久久久久久无码免费| 国产精品VIDEOSSEX久久发布| 狠狠色丁香婷婷久久综合不卡| 久久久久国产精品熟女影院| 久久夜色精品国产噜噜麻豆| 综合网日日天干夜夜久久| 亚洲精品午夜国产VA久久成人| 伊人久久精品无码av一区| 狠狠色丁香久久婷婷综合| 亚洲国产精品无码久久一线 |