Linux TCP Server 禁用 Nagle 算法防止粘包示例
要禁用 Nagle 算法以防止粘包,您可以在 Linux 上使用以下代码作为 TCP 服务器的示例程序:\n\nc\n#include <stdio.h>\n#include <stdlib.h>\n#include <string.h>\n#include <unistd.h>\n#include <sys/types.h>\n#include <sys/socket.h>\n#include <netinet/in.h>\n\n#define PORT 8080\n#define BUFFER_SIZE 1024\n\nint main() {\n int server_fd, new_socket, valread;\n struct sockaddr_in address;\n int opt = 1;\n int addrlen = sizeof(address);\n char buffer[BUFFER_SIZE] = {0};\n\n // 创建 socket 文件描述符\n if ((server_fd = socket(AF_INET, SOCK_STREAM, 0)) == 0) {\n perror("socket failed");\n exit(EXIT_FAILURE);\n }\n\n // 设置 socket 选项,禁用 Nagle 算法\n if (setsockopt(server_fd, IPPROTO_TCP, TCP_NODELAY, (void *)&opt, sizeof(opt)) < 0) {\n perror("setsockopt failed");\n exit(EXIT_FAILURE);\n }\n\n address.sin_family = AF_INET;\n address.sin_addr.s_addr = INADDR_ANY;\n address.sin_port = htons(PORT);\n\n // 将 socket 绑定到指定地址和端口\n if (bind(server_fd, (struct sockaddr *)&address, sizeof(address)) < 0) {\n perror("bind failed");\n exit(EXIT_FAILURE);\n }\n\n // 监听传入的连接\n if (listen(server_fd, 3) < 0) {\n perror("listen failed");\n exit(EXIT_FAILURE);\n }\n\n // 接受传入的连接\n if ((new_socket = accept(server_fd, (struct sockaddr *)&address, (socklen_t *)&addrlen)) < 0) {\n perror("accept failed");\n exit(EXIT_FAILURE);\n }\n\n // 读取客户端发送的数据\n valread = read(new_socket, buffer, BUFFER_SIZE);\n printf("Received message: %s\n", buffer);\n\n // 发送回复给客户端\n char *reply = "Server received your message";\n send(new_socket, reply, strlen(reply), 0);\n printf("Reply sent\n");\n\n return 0;\n}\n\n\n在上面的示例中,我们使用 setsockopt 函数来设置 TCP_NODELAY 选项,将其值设置为 1,以禁用 Nagle 算法。这样可以确保每个 send 操作都会立即发送数据,而不会等待缓冲区填满。这样可以避免粘包问题的发生。\n\n请注意,上述示例仅适用于 TCP 服务器端,它仅接受一个客户端连接并处理其数据。如果您需要处理多个客户端连接,请使用多线程或多进程来处理每个连接。
原文地址: https://www.cveoy.top/t/topic/pxYN 著作权归作者所有。请勿转载和采集!