Chetan Dattachetan77.hashnode.dev·Sep 27, 2023Proxy Design PatternIn this pattern, a middle object, generally referred to as a proxy object, will be present between every transaction involving two objects Examples: Access Restriction (Internet): If you are connected to the Wi-Fi network in your company, you will ...Low Level DesignSoftware EngineeringAdd a thoughtful commentNo comments yetBe the first to start the conversation.