FreeRTOS-Kernel/FreeRTOS-Plus/Demo/coreMQTT_Windows_Simulator
Oscar Michael Abrina 05dc34b27b
Clean up server setup instructions for MQTT and HTTP demos (#429)
- Removes a broken link to configure Windows Firewall
- Removes references to Mosquitto in the httpbin server setup instructions
2020-12-01 20:28:50 -08:00
..
Common Support multiple transports in the same compilation unit (#434) 2020-12-01 17:24:18 -08:00
MQTT_Basic_TLS Clean up server setup instructions for MQTT and HTTP demos (#429) 2020-12-01 20:28:50 -08:00
MQTT_Keep_Alive Clean up server setup instructions for MQTT and HTTP demos (#429) 2020-12-01 20:28:50 -08:00
MQTT_Multitask Clean up server setup instructions for MQTT and HTTP demos (#429) 2020-12-01 20:28:50 -08:00
MQTT_Mutual_Auth Clean up server setup instructions for MQTT and HTTP demos (#429) 2020-12-01 20:28:50 -08:00
MQTT_Plain_Text Clean up server setup instructions for MQTT and HTTP demos (#429) 2020-12-01 20:28:50 -08:00
MQTT_Serializer Clean up server setup instructions for MQTT and HTTP demos (#429) 2020-12-01 20:28:50 -08:00
readme.txt Multiple tidy up and corrections preparing for release (#390) 2020-11-09 14:50:33 -08:00
readme_coreMQTT.url Update urls in code to those on the server (#396) 2020-11-10 10:53:14 -08:00

The subdirectories of this directory contain multiple examples that demonstrate
coreMQTT using in both single and multi-threaded scenarios, as well as with
both plain text and authenticated and encrypted network interfaces.

The multi threaded example creates an MQTT agent (or daemon task).  It is thread
safe because only the agent task is allowed to access the coreMQTT API - hence
the API is only accessed from one FreeRTOS task.  Other tasks and interrupts
needing to interact with the MQTT agent do so through a thread safe queue.
We are generalising this technique for future coreMQTT releases, which will have
a re-usable agent component.

! Plain text examples are for ease of evaluation only - product devices should
! always use authenticated and encrypted communication.  Never send private or
! sensitive data on an unencrypted connection.