Return-Path: Delivered-To: apmail-tomcat-users-archive@www.apache.org Received: (qmail 57160 invoked from network); 9 Sep 2008 22:36:36 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 9 Sep 2008 22:36:36 -0000 Received: (qmail 56371 invoked by uid 500); 9 Sep 2008 22:36:21 -0000 Delivered-To: apmail-tomcat-users-archive@tomcat.apache.org Received: (qmail 56343 invoked by uid 500); 9 Sep 2008 22:36:21 -0000 Mailing-List: contact users-help@tomcat.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "Tomcat Users List" Delivered-To: mailing list users@tomcat.apache.org Received: (qmail 56332 invoked by uid 99); 9 Sep 2008 22:36:21 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 09 Sep 2008 15:36:21 -0700 X-ASF-Spam-Status: No, hits=3.1 required=10.0 tests=FRT_PENIS1,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (athena.apache.org: domain of jordan@viviotech.net designates 208.77.208.8 as permitted sender) Received: from [208.77.208.8] (HELO birch.viviotech.net) (208.77.208.8) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 09 Sep 2008 22:35:21 +0000 Received: (qmail 1541 invoked from network); 9 Sep 2008 22:35:50 -0000 X-Spam-Checker-Version: SpamAssassin 3.2.4 (2008-01-01) on birch.viviotech.net X-Spam-Level: Received: from unknown (HELO ?192.168.0.217?) (jordan@viviotech.net@208.77.208.186) by birch.viviotech.net with SMTP; 9 Sep 2008 22:35:49 -0000 Message-ID: <48C6FAB4.50605@viviotech.net> Date: Tue, 09 Sep 2008 15:37:40 -0700 From: Jordan Michaels User-Agent: Thunderbird 2.0.0.16 (X11/20080724) MIME-Version: 1.0 To: Tomcat Users List Subject: Re: Piggybacking HTTP with binary protocol References: <211737.99495.qm@web53011.mail.re2.yahoo.com> In-Reply-To: <211737.99495.qm@web53011.mail.re2.yahoo.com> X-Enigmail-Version: 0.95.7 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit X-Virus-Status: CLEAN X-Virus-Checked: Checked by ClamAV on apache.org X-Old-Spam-Status: No, score=-3.2 required=5.0 tests=AWL,BAYES_00,FRT_PENIS1, RDNS_NONE autolearn=no version=3.2.4 Different OS's can do this in different ways. Just Google it. For Linux, here's a quick How-To: http://www.oclc.org/us/en/support/documentation/ezproxy/technote/2l.htm HTH Warm regards, Jordan Michaels Vivio Technologies http://www.viviotech.net/ Open BlueDragon Steering Committee Adobe Solution Provider Darryl Pentz wrote: > Hi Hassan, pardon my stupidity, but how exactly do you do what you're suggesting? > > - DP > > > ----- Original Message ---- > From: Hassan Schroeder > To: Tomcat Users List ; Darryl Pentz > Sent: Tuesday, September 9, 2008 9:25:07 PM > Subject: Re: Piggybacking HTTP with binary protocol > > On Tue, Sep 9, 2008 at 1:10 PM, Darryl Pentz wrote: > >> Thanks for that suggestion - I'll definitely look into it. In the meantime what we've done is to solve our problem in the hardware, by using 2 network cards (i.e. 2 IP addresses) > > Uh, you don't need multiple NICs to handle multiple IP addresses -- > just configure your system to respond to them :-) > > FWIW, > --------------------------------------------------------------------- To start a new topic, e-mail: users@tomcat.apache.org To unsubscribe, e-mail: users-unsubscribe@tomcat.apache.org For additional commands, e-mail: users-help@tomcat.apache.org