Data corruption and Merkle trees

Поділитися
Вставка
  • Опубліковано 10 лют 2025
  • Merkle tree makes it efficient to find the corrupted part of the file and fix it by using hash trees.
    In this video lets learn how to do it
    #microservice #learnmicroservices #totorialssystemdesign #microservicestutorials #merkeltrees #merkeltreeusecases
    #systemdesigntips #systemdesign #computerscience #learnsystemdesign #interviewpreperation #amazoninterview #googleinterview #uberinterview #micrsoftinterview
    Presentor/Author: Narendra Lakshmana Gowda

КОМЕНТАРІ • 66

  • @ajiteshsingh3764
    @ajiteshsingh3764 4 роки тому +38

    I'm glad someone is exploring and explaining new concepts with real world examples in this race of youtubers who are just creating repetitive content. Hats off to you.

  • @G3K-n2j
    @G3K-n2j 12 днів тому

    Best explanation ever. Thanks for the quality videos.

  • @batman28996
    @batman28996 11 місяців тому

    You have the best System Design channel on YT, Thanks man.

  • @iamnessta
    @iamnessta 3 роки тому

    i searched for like this explanation in several youtube videos and i didn't find such a good explanation like this . thank you

  • @maheshgs8192
    @maheshgs8192 4 роки тому +4

    Very interesting!! Thanks for sharing your knowledge:)

  • @dheerajsheetal
    @dheerajsheetal 2 роки тому

    Explained in very simple way.
    Thanks a lot for the video really helpful.

  • @nalamda3682
    @nalamda3682 2 роки тому

    Awesome Awesome, first time I am watching a real use of algorithm, that also too neatly explained. Man you are super awesome.

  • @ArpitJoshi1
    @ArpitJoshi1 2 роки тому

    Your videos are very intuitive and super easy to understand.

  • @uchennanwanyanwu2777
    @uchennanwanyanwu2777 4 роки тому +4

    There's something so interesting about the way you teach that makes me understand these concepts. Please can you make these videos often, maybe weekly. I am depending on them for my interview

  • @reetmon2418
    @reetmon2418 3 роки тому

    Excellent video - you are the man!

  • @ypucandeleteit
    @ypucandeleteit 4 роки тому

    I liked it alot. Thank you for your work and very good explanations

  • @pradeeshbm5558
    @pradeeshbm5558 3 роки тому

    Beautyful explanation 👏👏👏👏

  • @mohajeramir
    @mohajeramir 2 роки тому

    You explained it really well. Much appreciated!

  • @rajarsiroy9277
    @rajarsiroy9277 6 місяців тому

    Great Explanation !!!!

  • @maheshkumartangella5516
    @maheshkumartangella5516 2 роки тому

    Excellent Video man

  • @akibhasan737
    @akibhasan737 4 роки тому

    Wow & Subscribed.

  • @dataguy7013
    @dataguy7013 4 роки тому

    Very nice video Naren. I like how you give a practical example. Keep it up.

  • @sauravgupta6166
    @sauravgupta6166 3 роки тому

    Brilliant Sir!

  • @Jennn
    @Jennn 3 роки тому

    Omg I finally Get It!!! Thank You Thank You! I am seeing a new use case in the wild not talked about with win 11

  • @architpatel1
    @architpatel1 4 роки тому +1

    Great 👍

  • @SandeepOnYoutube
    @SandeepOnYoutube 4 роки тому

    I was searching for a video on merkle tree and I got this great one..

  • @mockingbird3809
    @mockingbird3809 4 роки тому

    Excellent explanation on the entire UA-cam. Thank you so much

  • @shadyabhi
    @shadyabhi Місяць тому

    Great intro, thank you for explaining this. I wonder, if we should also talk about "tested folder and files" that need to be shared across hosts, and if Merkle tree will help here?

  • @rimitamitra7587
    @rimitamitra7587 4 роки тому

    This video was very informative. Thank you and keep up the good work 👍

  • @shettyyogesh1982
    @shettyyogesh1982 4 роки тому

    Good job, keep making more videos !!

  • @boombasach
    @boombasach 3 роки тому

    Throughly enjoyed. Also now make sense why chunking plays such important role in G-Drive design

  • @ivanbogatyrev2388
    @ivanbogatyrev2388 4 роки тому +1

    Awesome

  • @RAHULTHAKUR-ij5xu
    @RAHULTHAKUR-ij5xu 3 роки тому

    Thanks shadow man, it was very helpful

  • @chaitrakeshav
    @chaitrakeshav 3 роки тому

    Concise and effective! Thank you :)

  • @palugada-dev
    @palugada-dev 8 місяців тому

    interesting topic for my undergraduate thesis

  • @bodicherlamaheshbabu2411
    @bodicherlamaheshbabu2411 3 роки тому

    Thanks a lot bro....got a good intuition and understand......

  • @syin5028
    @syin5028 4 роки тому +1

    Great Video! Thank you!

  • @abhishekkumarjha5503
    @abhishekkumarjha5503 2 роки тому

    You just earned yourself a subscriber :)

  • @vijendrakhemnar
    @vijendrakhemnar 4 роки тому

    Bravo !!! You explained the concept so well ! Keep it up! Subscribed :)

  • @subhamchowdhury6607
    @subhamchowdhury6607 4 роки тому

    Excellent

  • @florianb2572
    @florianb2572 3 роки тому +1

    Awesome man! That's exactly what i needed : Use cases. I just wish i could also have a use case with blokchain but i get it anyway so great video!

  • @ibrahimshaikh3642
    @ibrahimshaikh3642 2 роки тому

    Good one. please create same for hyper log log

  • @vladimirrotariu8519
    @vladimirrotariu8519 Рік тому

    Thank you, Narendra! :)

  • @mohammadkhalafIraqi
    @mohammadkhalafIraqi 2 роки тому

    Awesome man!

  • @LucasOliveira-cs6hz
    @LucasOliveira-cs6hz 4 роки тому

    Video muito bom obrigado!

  • @10clicks-freesoftwareengin51
    @10clicks-freesoftwareengin51 4 роки тому

    Good One!

  • @BabaJorda
    @BabaJorda 4 роки тому +3

    Very good explanation. Thank you. A question.. why the need to build the tree? Couldn't it be done comparing the hashes of the chunks from the server?

  • @AbhaySingh-nr3er
    @AbhaySingh-nr3er 4 роки тому

    this guy is a legend !!

  • @subee128
    @subee128 6 місяців тому

    Thanks

  • @kdakan
    @kdakan Рік тому

    In the case of torrent systems, the root hash value can also be used to identify a different file under the same name, or a different version of the file, so when you search for a file name, it will list several files with the same name but with different root hashes, and the user can choose to download the version he/she chooses (which is still guesswork..)

  • @johnyepthomi892
    @johnyepthomi892 2 роки тому

    Shadow man 😂 caught me off guard …

  • @sachinkalkur
    @sachinkalkur 4 роки тому +1

    Can you please also provide the links/research-papers/blogs you used to study these concepts.

  • @jinalpatel9154
    @jinalpatel9154 4 роки тому

    Nice explanation. I have one question like here client side have some software and it is possible to compare tree and all that. How this could be used with Web Application that allow download of large file even if we consider file size is 1 GB then too.

  • @amanpervaiz2843
    @amanpervaiz2843 3 роки тому

    Gold.

  • @anikethjain4520
    @anikethjain4520 2 роки тому

    How does it handle hash collisions ? the hash of a corrupted chunk can be the same as the hash of a valid one

  • @sumonmal009
    @sumonmal009 3 роки тому

    THIS COMMENT IS FOR MY PERSONAL REFERENCE. TO UNDERSTAND PROPERLY WATCH THE FULL VIDEO
    --------------------------------------------------------------------------------------------------------------------------------------------------------------------------
    req 0:31
    solution idea 1:08
    4:41 7:15 11:23

  • @gauravkhurana420
    @gauravkhurana420 4 роки тому

    Bhaiya , not only root hash is present in torrent file , i think complete Merkel tree has to present so as to check corrupted nodes and reduce the bandwidth.Because root node only verifies whether file is corrupted or not.

  • @alexd7466
    @alexd7466 3 роки тому

    You've missed the most obvious example: tar, rar and zip files. It was used already decades ago to check the integrity of tape backups.

  • @ravitejavankam2977
    @ravitejavankam2977 4 роки тому

    Can you make a video on adding columns to a MySQL table having billions of rows efficiently in production

  • @kumarc4853
    @kumarc4853 3 роки тому

    can we verify if the shadow is of Guru NArendra with Merkel Trees?

  • @vickyvivek3286
    @vickyvivek3286 3 роки тому

    #totorialssystemdesign why should we build the tree? Why can't we transfer only the hashes of the leaf nodes and retry those file parts where there is a mismatch? You mentioned that sending the whole tree itself over the network is insignificant and hence sending only the hash of the leaf nodes in a list also must be insignificant.
    This way we don't need to wait till the entire file gets downloaded but retry as soon as there is a mismatch in the hash of that file part.
    Offset of the file parts can be used to uniquely identify them.

  • @HoD999x
    @HoD999x 2 роки тому

    why do we need the tree? why isn't a merkle list (the trees lowest level) enough?

  • @InfiniteCubes
    @InfiniteCubes 4 роки тому

    Can u make Gmail system design video?

  • @anubhavujjawal1661
    @anubhavujjawal1661 4 роки тому

    Why can't we just use a HashMap which stores hashes of different blocks of data using the index of the block instead of using Merkle tree? I think it might be because verification if the file is corrupted and which parts of the file is corrupted can be done faster in Merkel tree than in HashMap.

    • @yurisich
      @yurisich Рік тому

      If your merkle root matches the one you got from your peer, no more work is needed. With each fragment hashed, comparisons take O(n) time.

  • @jayprakashpatidar5641
    @jayprakashpatidar5641 4 роки тому +1

    Sir what if merkel tree gets currupted while transmitting it on network?

    • @venjan21
      @venjan21 4 роки тому

      I think Merkle tree itself is hashed and has will be compared.

  • @zcjsword
    @zcjsword 4 роки тому +3

    Thanks for the good work. Hah, I found a real world example of putting a leetcode programming problem in good use: leetcode.com/problems/same-tree/

  • @kumarc4853
    @kumarc4853 3 роки тому

    Salute to the Merkel Master from a Merkel Dummy. Excellent content!

  • @bharath_v
    @bharath_v 4 роки тому

    Good One!