Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
23 results
... Varun sir explains ARP Explained- Address Resolution Protocol. ARP (Address Resolution Protocol) is a network protocol used ...
470,203 views
3 years ago
Here, Varun sir has explained Domain Name System (DNS) in computer Networks The domain name system (DNS) is a naming ...
981,070 views
5 years ago
Cyclic Redundancy Check (CRC) is an error detection technique widely used in data communication and storage systems.
1,294,045 views
In this video, Varun sir has explained Routers in Computer Networks. Routers are networking devices that connect multiple ...
540,616 views
Varun sir explains UDP (User Datagram Protocol) header here. UDP uses headers when packaging message data to transfer ...
475,903 views
6 years ago
Here, Varun sir explains Need of IPv6 Protocol in this video. Why there is need of IPv6(IPng) Limitation in IPV4 address ...
92,995 views
2 years ago
In this video, TCP/IP Protocol Suite is discussed. It is also known as the Internet Protocol Suite. TCP/IP stands for Transmission ...
1,432,716 views
Varun sir explains Options & Padding in IPV4 Header in this video. Options & Padding: Record Route Strict Source Routing.
123,149 views
In this video, Varun sir has explained Error Detection and Correction. Error detection and correction are techniques used in data ...
1,027,110 views
Top Linux Network Commands explained by Varun sir are explained in this video. Given below are top Linux Network Commands ...
80,059 views
Medium Access Control (MAC) Protocols are explained in this video. Several Medium Access Control (MAC) protocols are used in ...
606,870 views
4 years ago
In this video, Varun sir has explained the difference between Switch, Hub & Bridge. A switch is a network device that connects ...
370,108 views
In this video, Varun sir has discussed Bridges In Computer Networks. A bridge is a device that connects two or more network ...
507,757 views
Two Phase Locking Protocol also known as 2PL protocol is a method of concurrency control in DBMS that ensures serializability ...
709,767 views
Hamming codes are used to detect and correct errors in transmitted or stored data. They are particularly effective at correcting ...
611,180 views
Subscribe to our new channel:https://www.youtube.com/@varunainashots ▻ Database Management System(Complete Playlist): ...
1,090,453 views
Here, are the advantages of UDP protocol over TCP by Varun sir. UDP Applications: 1) Query Response Protocol (One request ...
218,712 views
Subscribe to our new channel:https://www.youtube.com/@varunainashots ▻Software Engineering (Complete Playlist): ...
384,248 views
1 year ago
Here, Varun sir explains the difference between Pure Aloha and Slotted Aloha. In Pure Aloha, Devices can transmit data at any ...
482,523 views
Count to Infinity Problem in Distance Vector Routing is explained by Varun sir. Problem with distance vector routing is whenever a ...
312,539 views