I'm glad someone is exploring and explaining new concepts with real world examples in this race of youtubers who are just creating repetitive content. Hats off to you.
@iamnessta2 жыл бұрын
i searched for like this explanation in several youtube videos and i didn't find such a good explanation like this . thank you
@batman289968 ай бұрын
You have the best System Design channel on YT, Thanks man.
@maheshgs81924 жыл бұрын
Very interesting!! Thanks for sharing your knowledge:)
@uchennanwanyanwu27774 жыл бұрын
There's something so interesting about the way you teach that makes me understand these concepts. Please can you make these videos often, maybe weekly. I am depending on them for my interview
@rajarsiroy92773 ай бұрын
Great Explanation !!!!
@pradeeshbm55582 жыл бұрын
Beautyful explanation 👏👏👏👏
@ArpitJoshi12 жыл бұрын
Your videos are very intuitive and super easy to understand.
@architpatel14 жыл бұрын
Great 👍
@dheerajsheetal Жыл бұрын
Explained in very simple way. Thanks a lot for the video really helpful.
@ivanbogatyrev23884 жыл бұрын
Awesome
@akibhasan7373 жыл бұрын
Wow & Subscribed.
@nalamda36822 жыл бұрын
Awesome Awesome, first time I am watching a real use of algorithm, that also too neatly explained. Man you are super awesome.
@sauravgupta61663 жыл бұрын
Brilliant Sir!
@dataguy70134 жыл бұрын
Very nice video Naren. I like how you give a practical example. Keep it up.
@mohajeramir2 жыл бұрын
You explained it really well. Much appreciated!
@maheshkumartangella55162 жыл бұрын
Excellent Video man
@reetmon24182 жыл бұрын
Excellent video - you are the man!
@ypucandeleteit3 жыл бұрын
I liked it alot. Thank you for your work and very good explanations
@boombasach2 жыл бұрын
Throughly enjoyed. Also now make sense why chunking plays such important role in G-Drive design
@mockingbird38094 жыл бұрын
Excellent explanation on the entire KZbin. Thank you so much
@subhamchowdhury66074 жыл бұрын
Excellent
@SandeepOnYoutube3 жыл бұрын
I was searching for a video on merkle tree and I got this great one..
@shettyyogesh19824 жыл бұрын
Good job, keep making more videos !!
@rimitamitra75874 жыл бұрын
This video was very informative. Thank you and keep up the good work 👍
@ilzammulkhaq86486 ай бұрын
interesting topic for my undergraduate thesis
@Jennn2 жыл бұрын
Omg I finally Get It!!! Thank You Thank You! I am seeing a new use case in the wild not talked about with win 11
@10clicks-freesoftwareengin514 жыл бұрын
Good One!
@syin50284 жыл бұрын
Great Video! Thank you!
@vijendrakhemnar4 жыл бұрын
Bravo !!! You explained the concept so well ! Keep it up! Subscribed :)
@florianb25723 жыл бұрын
Awesome man! That's exactly what i needed : Use cases. I just wish i could also have a use case with blokchain but i get it anyway so great video!
@chaitrakeshav3 жыл бұрын
Concise and effective! Thank you :)
@BabaJorda4 жыл бұрын
Very good explanation. Thank you. A question.. why the need to build the tree? Couldn't it be done comparing the hashes of the chunks from the server?
@RAHULTHAKUR-ij5xu3 жыл бұрын
Thanks shadow man, it was very helpful
@LucasOliveira-cs6hz3 жыл бұрын
Video muito bom obrigado!
@mohammadkhalafIraqi2 жыл бұрын
Awesome man!
@kdakan Жыл бұрын
In the case of torrent systems, the root hash value can also be used to identify a different file under the same name, or a different version of the file, so when you search for a file name, it will list several files with the same name but with different root hashes, and the user can choose to download the version he/she chooses (which is still guesswork..)
@vladimirrotariu8519 Жыл бұрын
Thank you, Narendra! :)
@AbhaySingh-nr3er3 жыл бұрын
this guy is a legend !!
@bodicherlamaheshbabu24113 жыл бұрын
Thanks a lot bro....got a good intuition and understand......
@subee1284 ай бұрын
Thanks
@abhishekkumarjha55032 жыл бұрын
You just earned yourself a subscriber :)
@ibrahimshaikh36422 жыл бұрын
Good one. please create same for hyper log log
@sachinkalkur4 жыл бұрын
Can you please also provide the links/research-papers/blogs you used to study these concepts.
@johnyepthomi8922 жыл бұрын
Shadow man 😂 caught me off guard …
@alexd74663 жыл бұрын
You've missed the most obvious example: tar, rar and zip files. It was used already decades ago to check the integrity of tape backups.
@anikethjain45202 жыл бұрын
How does it handle hash collisions ? the hash of a corrupted chunk can be the same as the hash of a valid one
@amanpervaiz28433 жыл бұрын
Gold.
@jinalpatel91544 жыл бұрын
Nice explanation. I have one question like here client side have some software and it is possible to compare tree and all that. How this could be used with Web Application that allow download of large file even if we consider file size is 1 GB then too.
@gauravkhurana4204 жыл бұрын
Bhaiya , not only root hash is present in torrent file , i think complete Merkel tree has to present so as to check corrupted nodes and reduce the bandwidth.Because root node only verifies whether file is corrupted or not.
@ravitejavankam29774 жыл бұрын
Can you make a video on adding columns to a MySQL table having billions of rows efficiently in production
@vickyvivek32863 жыл бұрын
#totorialssystemdesign why should we build the tree? Why can't we transfer only the hashes of the leaf nodes and retry those file parts where there is a mismatch? You mentioned that sending the whole tree itself over the network is insignificant and hence sending only the hash of the leaf nodes in a list also must be insignificant. This way we don't need to wait till the entire file gets downloaded but retry as soon as there is a mismatch in the hash of that file part. Offset of the file parts can be used to uniquely identify them.
@HoD999x2 жыл бұрын
why do we need the tree? why isn't a merkle list (the trees lowest level) enough?
@kumarc48533 жыл бұрын
can we verify if the shadow is of Guru NArendra with Merkel Trees?
@zcjsword4 жыл бұрын
Thanks for the good work. Hah, I found a real world example of putting a leetcode programming problem in good use: leetcode.com/problems/same-tree/
@jayprakashpatidar56414 жыл бұрын
Sir what if merkel tree gets currupted while transmitting it on network?
@venjan214 жыл бұрын
I think Merkle tree itself is hashed and has will be compared.
@anubhavujjawal16614 жыл бұрын
Why can't we just use a HashMap which stores hashes of different blocks of data using the index of the block instead of using Merkle tree? I think it might be because verification if the file is corrupted and which parts of the file is corrupted can be done faster in Merkel tree than in HashMap.
@yurisich Жыл бұрын
If your merkle root matches the one you got from your peer, no more work is needed. With each fragment hashed, comparisons take O(n) time.
@sumonmal0093 жыл бұрын
THIS COMMENT IS FOR MY PERSONAL REFERENCE. TO UNDERSTAND PROPERLY WATCH THE FULL VIDEO -------------------------------------------------------------------------------------------------------------------------------------------------------------------------- req 0:31 solution idea 1:08 4:41 7:15 11:23
@InfiniteCubes4 жыл бұрын
Can u make Gmail system design video?
@kumarc48533 жыл бұрын
Salute to the Merkel Master from a Merkel Dummy. Excellent content!