要发现其他设备IP:端口在同一个wifi网络使用zeromq [英] To discover other device IP:Port in same wifi network Using zeromq

查看:208
本文介绍了要发现其他设备IP:端口在同一个wifi网络使用zeromq的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我想发现使用ZeroMQ在同一个Wifi网络的所有Android设备的IP地址和端口?

I want to discover all android devices IP and Port in same Wifi network using ZeroMQ?

我的应用程序连接基本上同一wifi网络所有的设备(没有互联网需要)和消息给对方。一旦IP和端口我知道我成功地发送消息,但如何知道所有设备的互联网协议(IP)使用ZeroMQ?

My app basically connect all device in same wifi network (no internet Needed) and message to each other. Once ip and port i know i am send message successfully but how to Know all device internet Protocol (ip) Using ZeroMQ?

任何人的帮助是AP preciable..thanks提前..

Anyone help is appreciable..thanks in advance..

推荐答案

A部分)

每一个IEEE 802.X CSMA / CD网络冲突域(无线AP / SSID就是这样的)必须被管理,以便工作。因此,在 地址解析协议[ARP] 将帮助你在任务中找到所有ISO-OSI - 第3层IP地址。 WiFi接入点[AP]主持人,这是所有现场设备登记,并握手,是开始的选择。

Every IEEE 802.x CSMA/CD network "collision domain" ( wifi AP/SSID is such one ) has to be managed so as to work well. Thus the Address Resolution Protocol [ARP] will help you in the task to find all ISO-OSI-Layer-3 IP Addresses. Wifi Access Point [AP] host, to which all live devices register and handshake with, is the choice to start with.

HG520i> ip arp status
received 54205 badtype 0 bogus addr 0 reqst in 12105 replies 196 reqst out 14301
cache hit 63152696 (24%), cache miss 19455672 (23%)
IP-addr         Type           Time  Addr              stat iface
192.168.0.230   10 Mb Ethernet 290   00:15:af:e6:b1:79 41   enif0
192.168.0.62    10 Mb Ethernet 300   00:0c:29:98:d4:3b 41   enif0
192.168.0.55    10 Mb Ethernet 300   00:27:0e:07:c5:9e 41   enif0
192.168.0.255   10 Mb Ethernet 0     ff:ff:ff:ff:ff:ff 43   NULL
num of arp entries= 4

部分B)

在扫描所有已知IP主机上的所有端口是一个愚蠢的暴力破解的方法来第二个问题。

Scanning all the ports on all the known IP hosts is a dumb brute force approach to the second issue.

扫描只是合理的人的一个子集将节省您的时间和放大器;在同行认可的努力。

Scanning just a subset of "reasonable" ones would save you both the time & efforts on peer-recognitions.

使用一些更智能,主动的知名度自发布策略将会为您节省更多。

Using some smarter, active "visibility self-advertisement policy" will save you even more.

确定在多方的系统架构,单个被动扫描,中央/分布式代理辅助扫描或主动自发布策略是否会被用来建立和放大器;在相邻的主机注册维持现场记录。

Decide on multi-party system architecture, whether an individual passive scan, a central/distributed proxy-assisted scan or an active self-advertisement policy will be used to build & maintain live records in a neighbouring hosts register.

ZeroMQ 每本身给你带来很多力量为智能的解决方案,而哑力的解决方案将不得不等待,直到完全成熟ZeroMQ服务将准备就绪。低电平L2 / L3-检查将不得不把他们的水果之前ZeroMQ可以先 .bi​​nd() / .connect()

ZeroMQ per-se brings you a lot of power for the smart solutions, while the dumb-force solutions would have to wait till fully fledged ZeroMQ services will be ready. Low level L2/L3-inspections will have to bring their fruit before ZeroMQ can first .bind()/.connect()

不用说,那不协调的CSMA / CD网络并不保证所有的L2-可见主机将具有兼容L3-IP的地址经过(将属于/有相同的L3-IP网络地址)。

Needless to say, that uncoordinated CSMA/CD networks do not guarantee that all the L2-visible hosts will have "compatible" L3-ip-adddress ( will belong to / have the same L3-ip-network address ).

因此​​,你永远不知道所有的IP地址没有真实地低级别的嗅探器。

Thus you never know about all IP addresses without a trully low-level sniffer.

这篇关于要发现其他设备IP:端口在同一个wifi网络使用zeromq的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆