hi..


From the data trace packet, i have found the binary data request as below:
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ARPA/9000 NETWORKING^^^^^^^^^^^^^^^^^^^^ +^^^^^^@#% Timestamp : Fri Jul 12 PST 2013 15:30:40.370025 Process ID : [ICS] Subsystem : NS_LS_T +CP User ID ( UID ) : -1 Trace Kind : PDU IN +TRACE Device ID : -1 Path ID : 0 Connection ID : 0 Location : 00123 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +~~~~~~ -------------------------------- TCP Header -------------------------- +-------- sport: 1998 --> dport: 61236 flags: PUSH ACK seq: 0xfd2fed0a urp: 0x0 chksum: 0xe16a data len: 519 ack: 0x2f975faf win: 0x1ed9 optlen: 0 -------------------------------- XOT --------------------------------- +-------- 0: 00 00 02 03 10 01 22 33 20 20 20 20 20 20 20 20 ......"3 + 16: 4a 42 48 42 30 30 32 39 30 30 30 30 30 30 32 30 JBHB00290000002 +0 32: 30 31 30 30 30 30 30 30 30 30 30 30 33 33 31 36 010000000000331 +6 48: 37 36 34 34 31 20 20 20 20 20 20 20 20 20 20 20 76441 + 64: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 + < printing suppressed for one or more repetitions of the previous lin +e > 112: 20 20 20 20 20 20 20 20 20 20 30 32 30 37 32 37 02072 +7 128: 36 33 35 30 37 20 30 32 20 20 20 20 20 20 20 20 63507 02 + 144: 20 20 20 20 20 20 31 33 30 37 31 32 31 34 34 33 130712144 +3 160: 33 32 30 30 30 31 31 30 20 20 20 20 20 20 20 20 32000110 + 176: 4a 42 48 42 30 30 30 34 30 30 30 30 30 30 33 30 JBHB00040000003 +0 192: 30 31 30 30 30 30 30 30 30 30 30 38 39 36 33 32 010000000008963 +2 208: 30 30 20 20 20 20 20 20 20 20 20 20 20 20 20 20 00 + 224: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 + < printing suppressed for one or more repetitions of the previous lin +e > 272: 20 20 20 20 20 20 20 20 20 20 30 32 30 37 32 37 02072 +7 288: 36 33 38 30 30 20 30 32 20 20 20 20 20 20 20 20 63800 02 + 304: 20 20 20 20 20 20 31 33 30 37 31 32 31 34 34 34 130712144 +4 320: 31 31 30 30 30 30 33 33 20 20 20 20 20 20 20 20 11000033 + 336: 4a 42 48 42 30 30 31 34 30 30 30 30 30 30 32 30 JBHB00140000002 +0 352: 30 39 30 30 30 30 30 30 30 30 30 35 32 30 37 34 090000000005207 +4 368: 34 35 20 20 20 20 20 20 20 20 20 20 20 20 20 20 45 + 384: 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 + < printing suppressed for one or more repetitions of the previous lin +e > 432: 20 20 20 20 20 20 20 20 20 20 39 39 00 00 00 00 99... +. 448: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ............... +. < printing suppressed for one or more repetitions of the previous lin +e > 512: 00 00 00 00 00 00 00 -- -- -- -- -- -- -- -- -- ............... +.

My problem is how could i write the perl socket programming to sent the binary data as a request into the remote server ?. Could somebody help me ?

I am very sorry, this is my first experience in socket programming and i very hope somebody can help me..

Thank you,

In reply to How to sent binary data in socket programming ? by bh_perl

Title:
Use:  <p> text here (a paragraph) </p>
and:  <code> code here </code>
to format your post, it's "PerlMonks-approved HTML":



  • Posts are HTML formatted. Put <p> </p> tags around your paragraphs. Put <code> </code> tags around your code and data!
  • Titles consisting of a single word are discouraged, and in most cases are disallowed outright.
  • Read Where should I post X? if you're not absolutely sure you're posting in the right place.
  • Please read these before you post! —
  • Posts may use any of the Perl Monks Approved HTML tags:
    a, abbr, b, big, blockquote, br, caption, center, col, colgroup, dd, del, details, div, dl, dt, em, font, h1, h2, h3, h4, h5, h6, hr, i, ins, li, ol, p, pre, readmore, small, span, spoiler, strike, strong, sub, summary, sup, table, tbody, td, tfoot, th, thead, tr, tt, u, ul, wbr
  • You may need to use entities for some characters, as follows. (Exception: Within code tags, you can put the characters literally.)
            For:     Use:
    & &amp;
    < &lt;
    > &gt;
    [ &#91;
    ] &#93;
  • Link using PerlMonks shortcuts! What shortcuts can I use for linking?
  • See Writeup Formatting Tips and other pages linked from there for more info.