Skip to content

Latest commit

 

History

History
54 lines (35 loc) · 3.44 KB

TCP.md

File metadata and controls

54 lines (35 loc) · 3.44 KB

TCP Examples

The following TCP examples are available:

  • Echo: A TCP "Hello World" example that sends a string "Hello World!" to the target server and expects an echo response. This example constitutes of an Echo Client and an Echo Server

  • Secure Echo: Same as the echo example but uses TLS secured connections. This example constitutes of a Secure Echo Client and a Secure Echo Server

  • Simple Interception: A example that demonstrates how to write basic interceptors for TCP server and client. This example constitutes of an Intercepting Client and an Intercepting Server

  • Transformation Interception: A example that demonstrates how to write interceptors that modify the types of content for HTTP server and client. This example constitutes of an Intercepting Client and an Intercepting Server

  • Streaming: A TCP streaming example where the server sends an infinite stream of data and the client taps to this infinite stream to get as many messages as desired. This example constitutes of a Streaming Client and a Streaming Server

  • Proxy: A TCP proxy example where a proxy server proxies all connections to a specific target server. This example constitutes of a Proxy Client and a Proxy Server

  • Load balancing: A TCP load balancing example where the client load-balances between a set of hosts and also demonstrates how to write failure detection logic to detect unhealthy hosts. This example constitutes of a Load Balancing Client and a Load Balancer

  • Simple interceptor: A simple interceptor for TCP server to demonstrate sending an initial hello message before the actual connection handling starts. This example constitutes of an Intercepting Server and an Intercepting Client

  • Interceptors with transformation: An interceptor for TCP server to demonstrate transformation of input and output on a connection. This example constitutes of an Intercepting Server and an Intercepting Client