Solved

WHAT'S THE BEST: IDTCPCLIENT, IDTCPSERVER === OR === TCPCLIENT, TCPSERVER

Posted on 2006-07-11
3
1,142 Views
Last Modified: 2010-04-05
I WOULD LIKE TO KNOW:

WHAT'S THE DIFERENCE? IDTCPCLIENT, IDTCPSERVER ====== TCPCLIENT, TCPSERVER
0
Comment
Question by:rafaelrgl
  • 2
3 Comments
 
LVL 17

Expert Comment

by:TheRealLoki
ID: 17086502
what component package are TCPClient, TCPserver from?

Indy is blocking, ie. you say
s := IdTCPClient1.IOHandler.ReadString;
showmessage(s);

the showmessage line will not occur until indy has received the string
if, for example you were using a non-blocking componet set such as Fracois Piette's ICS
you would use the OnDataAvailable event, and use a buffer, and showthemessage once you had received an end of string delimiter (e.g. #1 or #13#10)
(you can change it to "linemode" to make this as easy as indy)

The most popular TCP components are (in no particular order)
Indy's TidTCPClient, TidTCPServer
ICS TWSocket, TWSocketServer
Delphi's native TSocket and TServerSocket

0
 
LVL 1

Author Comment

by:rafaelrgl
ID: 17096228
TCPClient and TCPServer is from Borland Internet Components ( dclnet70.bpl )
0
 
LVL 17

Accepted Solution

by:
TheRealLoki earned 400 total points
ID: 17096488
oh right, delphi 7. yeah, they're almost the same as the TSocket and TSocketServer from previous versions of delphi.
They can be blocking or non-blocking whereas Indy is blocking
Indy is a 3rd party component set.
Probably more demos for Indy than borland's TTCPClient and TTCPServer, but Indy has some flakey versions.
The Indy9 that ships with delphi is not really supported anymore.
The Indy 10.0.5.2 version had some big changes, and some horrid bugs.
The latest snapshot Indy 10 is reasonably stable for me, but does not have many demos for it.
In saying that, I have made several demos for various versions of Indy, including the latest, and it's pretty easy to learn and work with
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Introduction Raise your hands if you were as upset with FireMonkey as I was when I discovered that there was no TListview.  I use TListView in almost all of my applications I've written, and I was not going to compromise by resorting to TStringGrid…
In my programming career I have only very rarely run into situations where operator overloading would be of any use in my work.  Normally those situations involved math with either overly large numbers (hundreds of thousands of digits or accuracy re…
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…
Migrating to Microsoft Office 365 is becoming increasingly popular for organizations both large and small. If you have made the leap to Microsoft’s cloud platform, you know that you will need to create a corporate email signature for your Office 365…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now