Skip to Main Content
Robert Rodes's Blogfolio

Robert Rodes

Software Developer

Turning ideas into software...

Robert Rodes

  • LinkedIn
  • GitHub
  • Email
  • Home
  • Résumé
  • Testimonials
  • Case Studies
  • Work Samples
  • Articles
  • LinkedIn
  • GitHub
  • Email
  • Home
  • Work Samples
  • Résumé
  • Testimonials
  • Case Studies
  • Articles

Articles

How the Internet Works, Chapter 10The Transport Layer: How TCP Guarantees Message Delivery
4 Mar 2023

How the Internet Works, Chapter 10
The Transport Layer: How TCP Guarantees Message Delivery

by Bob Rodes | posted in: How the Internet Works | 0

TCP guarantees message delivery by implementing four requirements: Delivering segments in the order sent Detecting corrupt segments Retransmission of lost or corrupt segments Elimination of duplicate segments A TCP segment uses four of its fields to implement these requirements: Sequence … Continued

How the Internet Works, Chapter 11The Transport Layer: TCP Congestion Avoidance and Flow Control; UDP
4 Mar 2023

How the Internet Works, Chapter 11
The Transport Layer: TCP Congestion Avoidance and Flow Control; UDP

by Bob Rodes | posted in: How the Internet Works | 0

TCP improves performance with congestion avoidance and flow control. Congestion Avoidance Congestion avoidance is a way of increasing performance by reducing or minimizing the number of packets that are lost on the network (and so have to be resent) due … Continued

How the Internet Works, Chapter 12The Transport Layer: Sockets
4 Mar 2023

How the Internet Works, Chapter 12
The Transport Layer: Sockets

by Bob Rodes | posted in: How the Internet Works | 0

A socket is a communication endpoint on a network node. Sockets interact directly with processes. A process is a unit of state and behavior in an application. An application can run as a single process, but may use multiple processes … Continued

How the Internet Works, Chapter 13The Application Layer: Client/Server, URLs and DNS
4 Mar 2023

How the Internet Works, Chapter 13
The Application Layer: Client/Server, URLs and DNS

by Bob Rodes | posted in: How the Internet Works | 0

The Application Layer is a set of protocols that provide communication services to applications. Common protocols are HTTP (for web pages), HTTPS (secured version of HTTP), SMTP, POP3 and IMAP (for email), and DNS (used to look up IP addresses … Continued

How the Internet Works, Chapter 14The Application Layer: HTML and HTTP
4 Mar 2023

How the Internet Works, Chapter 14
The Application Layer: HTML and HTTP

by Bob Rodes | posted in: How the Internet Works | 0

HTTP HTTP stands for Hypertext Transfer Protocol. It is the protocol used to transfer requested web pages from servers to clients, as well as the protocol that allows clients to send data to servers. It defines the structure of messages … Continued

How the Internet Works, Chapter 15The Application Layer: Persisting HTTP State With Sessions and Cookies
4 Mar 2023

How the Internet Works, Chapter 15
The Application Layer: Persisting HTTP State With Sessions and Cookies

by Bob Rodes | posted in: How the Internet Works | 0

Simulating Statefulness in HTTP Traffic HTTP is inherently stateless, meaning that it doesn’t have any built-in mechnanism to keep track of anything in a message. As such, HTTP has no built-in way to relate different messages to one another. This … Continued

How the Internet Works, Chapter 16The Application Layer: Session Hijacking and Ways to Prevent It
4 Mar 2023

How the Internet Works, Chapter 16
The Application Layer: Session Hijacking and Ways to Prevent It

by Bob Rodes | posted in: How the Internet Works | 0

Session Hijacking There are many ways to compromise session security. Here, we’ll take a closer look at session hijacking and some ways to make it more difficult. Session hijacking refers to a malicious user gaining unauthorized access to a user’s … Continued

How the Internet Works, Chapter 17Application Layer Security: Encryption and Authentication
4 Mar 2023

How the Internet Works, Chapter 17
Application Layer Security: Encryption and Authentication

by Bob Rodes | posted in: How the Internet Works | 0

Encryption Encryption techniques are based on the idea of substituting plaintext characters with encrypted characters. An encryption process applies an algorithm to each plaintext character combined with a character from a key. (A key is a series of characters, usually … Continued

How the Internet Works, Chapter 18Application Layer Security: TLS
4 Mar 2023

How the Internet Works, Chapter 18
Application Layer Security: TLS

by Bob Rodes | posted in: How the Internet Works | 0

Transport Layer Security, or TLS, is one of the more popular protocols that implement encryption and authentication. TLS provides for encryption of Application Layer data, as well as authentication of the client and server transferring that data. URLs with the … Continued

How the Internet Works, Chapter 19The Application Layer: How TLS Transmits Encrypted and Authenticated Data
4 Mar 2023

How the Internet Works, Chapter 19
The Application Layer: How TLS Transmits Encrypted and Authenticated Data

by Bob Rodes | posted in: How the Internet Works | 0

The TLS handshake The process of securely exchanging symmetric keys is called a TLS handshake. The TLS handshake requires the Transport Layer to use TCP, and also requires the TCP handshake to have already taken place. TLS Handshake Key exchange … Continued

Posts pagination

« 1 2 3 4 5 6 »
I was an instructor at Launch School where Robert was a student and he stood out to me. Robert always asked interesting questions and you could see that he was passionate about the craft of programming. He relished problem-solving and understanding complex technical concepts in depth. Thoroughly professional and a very good communicator as well. … More Testimonials … Naveed Fida Teaching Assistant, Launch School
Robert combines his excellent technical skills with highly developed interpersonal awareness and communication skills to deliver superior results. … More Testimonials … Michael Greenhouse Founder, President and CEO at Integria Consulting Company
Bob is a software developer who manages to combine a keen eye for detail with a strong grasp of the big picture. … More Testimonials … Gerry Morgan CTO at ExpenseController, LLC
Robert’s attention to detail is extraordinary. He has the ability to see through the weeds and recommend improvements that lead to efficiency gains and overall process improvement. … More Testimonials … Nelson Allen Vice President Application Development at Global Indemnity
Robert brings a lot of experience to every challenge he takes on. That experience combined with his tenacity to get the job done is something that will benefit any organization. … More Testimonials … Mario Soberal Executive Director, Shift3/Health-Bitwise Industries
Robert has a wonderful speaking voice and had no trouble at all maintaining command in his area. Robert is a creative sort and excels in areas that require creativity, be it documentation, process or even application development. … More Testimonials … Allen Kreger IT Director at San Manuel Band of Mission Indians
Bob helped my department with numerous programmimg changes that were needed to implement output and workflow changes moving into production. Bob has exceptional knowledge and skills that contribute to the success of the company he works for. … More Testimonials … Susan Novelli, FLMI, CLU, PMP Senior Project Manager Consultant at Red Ball Staffing

© 2025 Robert Rodes