Data corruption and Merkle trees

  Рет қаралды 27,301

Tech Dummies Narendra L

Tech Dummies Narendra L

Күн бұрын

Пікірлер: 64
@ajiteshsingh3764
@ajiteshsingh3764 4 жыл бұрын
I'm glad someone is exploring and explaining new concepts with real world examples in this race of youtubers who are just creating repetitive content. Hats off to you.
@iamnessta
@iamnessta 2 жыл бұрын
i searched for like this explanation in several youtube videos and i didn't find such a good explanation like this . thank you
@batman28996
@batman28996 8 ай бұрын
You have the best System Design channel on YT, Thanks man.
@maheshgs8192
@maheshgs8192 4 жыл бұрын
Very interesting!! Thanks for sharing your knowledge:)
@uchennanwanyanwu2777
@uchennanwanyanwu2777 4 жыл бұрын
There's something so interesting about the way you teach that makes me understand these concepts. Please can you make these videos often, maybe weekly. I am depending on them for my interview
@rajarsiroy9277
@rajarsiroy9277 3 ай бұрын
Great Explanation !!!!
@pradeeshbm5558
@pradeeshbm5558 2 жыл бұрын
Beautyful explanation 👏👏👏👏
@ArpitJoshi1
@ArpitJoshi1 2 жыл бұрын
Your videos are very intuitive and super easy to understand.
@architpatel1
@architpatel1 4 жыл бұрын
Great 👍
@dheerajsheetal
@dheerajsheetal Жыл бұрын
Explained in very simple way. Thanks a lot for the video really helpful.
@ivanbogatyrev2388
@ivanbogatyrev2388 4 жыл бұрын
Awesome
@akibhasan737
@akibhasan737 3 жыл бұрын
Wow & Subscribed.
@nalamda3682
@nalamda3682 2 жыл бұрын
Awesome Awesome, first time I am watching a real use of algorithm, that also too neatly explained. Man you are super awesome.
@sauravgupta6166
@sauravgupta6166 3 жыл бұрын
Brilliant Sir!
@dataguy7013
@dataguy7013 4 жыл бұрын
Very nice video Naren. I like how you give a practical example. Keep it up.
@mohajeramir
@mohajeramir 2 жыл бұрын
You explained it really well. Much appreciated!
@maheshkumartangella5516
@maheshkumartangella5516 2 жыл бұрын
Excellent Video man
@reetmon2418
@reetmon2418 2 жыл бұрын
Excellent video - you are the man!
@ypucandeleteit
@ypucandeleteit 3 жыл бұрын
I liked it alot. Thank you for your work and very good explanations
@boombasach
@boombasach 2 жыл бұрын
Throughly enjoyed. Also now make sense why chunking plays such important role in G-Drive design
@mockingbird3809
@mockingbird3809 4 жыл бұрын
Excellent explanation on the entire KZbin. Thank you so much
@subhamchowdhury6607
@subhamchowdhury6607 4 жыл бұрын
Excellent
@SandeepOnYoutube
@SandeepOnYoutube 3 жыл бұрын
I was searching for a video on merkle tree and I got this great one..
@shettyyogesh1982
@shettyyogesh1982 4 жыл бұрын
Good job, keep making more videos !!
@rimitamitra7587
@rimitamitra7587 4 жыл бұрын
This video was very informative. Thank you and keep up the good work 👍
@ilzammulkhaq8648
@ilzammulkhaq8648 6 ай бұрын
interesting topic for my undergraduate thesis
@Jennn
@Jennn 2 жыл бұрын
Omg I finally Get It!!! Thank You Thank You! I am seeing a new use case in the wild not talked about with win 11
@10clicks-freesoftwareengin51
@10clicks-freesoftwareengin51 4 жыл бұрын
Good One!
@syin5028
@syin5028 4 жыл бұрын
Great Video! Thank you!
@vijendrakhemnar
@vijendrakhemnar 4 жыл бұрын
Bravo !!! You explained the concept so well ! Keep it up! Subscribed :)
@florianb2572
@florianb2572 3 жыл бұрын
Awesome man! That's exactly what i needed : Use cases. I just wish i could also have a use case with blokchain but i get it anyway so great video!
@chaitrakeshav
@chaitrakeshav 3 жыл бұрын
Concise and effective! Thank you :)
@BabaJorda
@BabaJorda 4 жыл бұрын
Very good explanation. Thank you. A question.. why the need to build the tree? Couldn't it be done comparing the hashes of the chunks from the server?
@RAHULTHAKUR-ij5xu
@RAHULTHAKUR-ij5xu 3 жыл бұрын
Thanks shadow man, it was very helpful
@LucasOliveira-cs6hz
@LucasOliveira-cs6hz 3 жыл бұрын
Video muito bom obrigado!
@mohammadkhalafIraqi
@mohammadkhalafIraqi 2 жыл бұрын
Awesome man!
@kdakan
@kdakan Жыл бұрын
In the case of torrent systems, the root hash value can also be used to identify a different file under the same name, or a different version of the file, so when you search for a file name, it will list several files with the same name but with different root hashes, and the user can choose to download the version he/she chooses (which is still guesswork..)
@vladimirrotariu8519
@vladimirrotariu8519 Жыл бұрын
Thank you, Narendra! :)
@AbhaySingh-nr3er
@AbhaySingh-nr3er 3 жыл бұрын
this guy is a legend !!
@bodicherlamaheshbabu2411
@bodicherlamaheshbabu2411 3 жыл бұрын
Thanks a lot bro....got a good intuition and understand......
@subee128
@subee128 4 ай бұрын
Thanks
@abhishekkumarjha5503
@abhishekkumarjha5503 2 жыл бұрын
You just earned yourself a subscriber :)
@ibrahimshaikh3642
@ibrahimshaikh3642 2 жыл бұрын
Good one. please create same for hyper log log
@sachinkalkur
@sachinkalkur 4 жыл бұрын
Can you please also provide the links/research-papers/blogs you used to study these concepts.
@johnyepthomi892
@johnyepthomi892 2 жыл бұрын
Shadow man 😂 caught me off guard …
@alexd7466
@alexd7466 3 жыл бұрын
You've missed the most obvious example: tar, rar and zip files. It was used already decades ago to check the integrity of tape backups.
@anikethjain4520
@anikethjain4520 2 жыл бұрын
How does it handle hash collisions ? the hash of a corrupted chunk can be the same as the hash of a valid one
@amanpervaiz2843
@amanpervaiz2843 3 жыл бұрын
Gold.
@jinalpatel9154
@jinalpatel9154 4 жыл бұрын
Nice explanation. I have one question like here client side have some software and it is possible to compare tree and all that. How this could be used with Web Application that allow download of large file even if we consider file size is 1 GB then too.
@gauravkhurana420
@gauravkhurana420 4 жыл бұрын
Bhaiya , not only root hash is present in torrent file , i think complete Merkel tree has to present so as to check corrupted nodes and reduce the bandwidth.Because root node only verifies whether file is corrupted or not.
@ravitejavankam2977
@ravitejavankam2977 4 жыл бұрын
Can you make a video on adding columns to a MySQL table having billions of rows efficiently in production
@vickyvivek3286
@vickyvivek3286 3 жыл бұрын
#totorialssystemdesign why should we build the tree? Why can't we transfer only the hashes of the leaf nodes and retry those file parts where there is a mismatch? You mentioned that sending the whole tree itself over the network is insignificant and hence sending only the hash of the leaf nodes in a list also must be insignificant. This way we don't need to wait till the entire file gets downloaded but retry as soon as there is a mismatch in the hash of that file part. Offset of the file parts can be used to uniquely identify them.
@HoD999x
@HoD999x 2 жыл бұрын
why do we need the tree? why isn't a merkle list (the trees lowest level) enough?
@kumarc4853
@kumarc4853 3 жыл бұрын
can we verify if the shadow is of Guru NArendra with Merkel Trees?
@zcjsword
@zcjsword 4 жыл бұрын
Thanks for the good work. Hah, I found a real world example of putting a leetcode programming problem in good use: leetcode.com/problems/same-tree/
@jayprakashpatidar5641
@jayprakashpatidar5641 4 жыл бұрын
Sir what if merkel tree gets currupted while transmitting it on network?
@venjan21
@venjan21 4 жыл бұрын
I think Merkle tree itself is hashed and has will be compared.
@anubhavujjawal1661
@anubhavujjawal1661 4 жыл бұрын
Why can't we just use a HashMap which stores hashes of different blocks of data using the index of the block instead of using Merkle tree? I think it might be because verification if the file is corrupted and which parts of the file is corrupted can be done faster in Merkel tree than in HashMap.
@yurisich
@yurisich Жыл бұрын
If your merkle root matches the one you got from your peer, no more work is needed. With each fragment hashed, comparisons take O(n) time.
@sumonmal009
@sumonmal009 3 жыл бұрын
THIS COMMENT IS FOR MY PERSONAL REFERENCE. TO UNDERSTAND PROPERLY WATCH THE FULL VIDEO -------------------------------------------------------------------------------------------------------------------------------------------------------------------------- req 0:31 solution idea 1:08 4:41 7:15 11:23
@InfiniteCubes
@InfiniteCubes 4 жыл бұрын
Can u make Gmail system design video?
@kumarc4853
@kumarc4853 3 жыл бұрын
Salute to the Merkel Master from a Merkel Dummy. Excellent content!
@bharath_v
@bharath_v 4 жыл бұрын
Good One!
In Memory databases internals for system design interviews
34:59
Tech Dummies Narendra L
Рет қаралды 40 М.
Merkle Tree with real world examples
14:52
Gaurav Sen
Рет қаралды 84 М.
Creative Justice at the Checkout: Bananas and Eggs Showdown #shorts
00:18
Fabiosa Best Lifehacks
Рет қаралды 10 МЛН
快乐总是短暂的!😂 #搞笑夫妻 #爱美食爱生活 #搞笑达人
00:14
朱大帅and依美姐
Рет қаралды 13 МЛН
Microservices Gone Wrong at DoorDash
17:22
NeetCodeIO
Рет қаралды 161 М.
Programmer explains Merkle Tree | Blockchain technology
10:55
Ivan on Tech
Рет қаралды 17 М.
EFFICIENT COUNTING USING BITMAPS FOR SYSTEM DESIGN
12:55
Tech Dummies Narendra L
Рет қаралды 14 М.
Microservices with Databases can be challenging...
20:52
Software Developer Diaries
Рет қаралды 97 М.
Systems Design in an Hour
1:11:00
Jordan has no life
Рет қаралды 27 М.
What is the merkle tree in Bitcoin?
3:53
Keifer Kif
Рет қаралды 49 М.
LEARN BITMAP INDEXES
13:20
Tech Dummies Narendra L
Рет қаралды 74 М.
Do you know Distributed transactions?
31:10
Tech Dummies Narendra L
Рет қаралды 231 М.
Trees QuadTree OctTree
8:44
Dave Carrigg
Рет қаралды 16 М.
The power of Merkle Trees
15:20
Alephium
Рет қаралды 99