wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

NodeJs

profile
Ronak Gala
Mar 09, 2022
1 Like
0 Discussions
116 Reads

Node.js shines in real-time web applications employing push technology over websockets. What is so revolutionary about that? Well, after over 20 years of stateless-web based on the stateless request-response paradigm, we finally have web applications with real-time, two-way connections, where both the client and server can initiate communication, allowing them to exchange data freely. This is in stark contrast to the typical web response paradigm, where the client always initiates communication. Additionally, it’s all based on the open web stack (HTML, CSS and JS) running over the standard port 80.

The main idea of Node.js: use non-blocking, event-driven I/O to remain lightweight and efficient in the face of data-intensive real-time applications that run across distributed devices.

What it really means is that Node.js is not a silver-bullet new platform that will dominate the web development world. Instead, it’s a platform that fills a particular need. And understanding this is absolutely essential. You definitely don’t want to use Node.js for CPU-intensive operations; in fact, using it for heavy computation will annul nearly all of its advantages. Where Node really shines is in building fast, scalable network applications, as it’s capable of handling a huge number of simultaneous connections with high throughput, which equates to high scalability.

How it works under-the-hood is pretty interesting. Compared to traditional web-serving techniques where each connection (request) spawns a new thread, taking up system RAM and eventually maxing-out at the amount of RAM available, Node.js operates on a single-thread, using non-blocking I/O calls, allowing it to support tens of thousands of concurrent connections held in the event loop.


Comments ()


Sign in

Read Next

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

Cross site scripting Attack

Blog banner

What is Email? Uses of Emails

Blog banner

security requirements for safe e-payment

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Why Data Privacy Is Changing Online Advertising

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

Multicore and multithreading 171

Blog banner

american greatines

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Threat management

Blog banner

Making Money through Instagram

Blog banner

What is Data, Information and Knowledge?

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Buffer Overflow

Blog banner

Modern Operating System - Suren Kotian

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

All you need to know about Cassandra

Blog banner

How College Events Build Real-world Skills You Can’t Learn From Textbooks

Blog banner

Amazon

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

Virtual machine.

Blog banner

Mumbaicha Dabbawalla

Blog banner

Starvation

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Goa Trip With Friends

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

Google

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

Proton mail

Blog banner

The Art of Slow Fashion: Why Patola Defines Sustainable Luxury

Blog banner

semaphores in os

Blog banner

Buffer overflow

Blog banner

File and File System Structure

Blog banner

GUIDE TO GIS

Blog banner

Operating Systems

Blog banner

What if COVID does not exist!

Blog banner

Evolution of the Microprocesor

Blog banner

Dekkers Algorithm

Blog banner

EMAIL INVESTIGATION

Blog banner

Mutual exclusion

Blog banner