Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
46 results
... Varun sir explains ARP Explained- Address Resolution Protocol. ARP (Address Resolution Protocol) is a network protocol used ...
473,464 views
3 years ago
Here, Varun sir has explained Domain Name System (DNS) in computer Networks The domain name system (DNS) is a naming ...
985,795 views
5 years ago
Pre order my novel! (India Only) - http://bit.ly/KGBookAmazon or https://bit.ly/KGBookCrossword I'm touring with a new Show!
2,033,841 views
5 months ago
Cyclic Redundancy Check (CRC) is an error detection technique widely used in data communication and storage systems.
1,300,093 views
In this video, Varun sir has explained Routers in Computer Networks. Routers are networking devices that connect multiple ...
542,879 views
Varun sir explains UDP (User Datagram Protocol) header here. UDP uses headers when packaging message data to transfer ...
479,232 views
6 years ago
Here, Varun sir explains Need of IPv6 Protocol in this video. Why there is need of IPv6(IPng) Limitation in IPV4 address ...
93,910 views
2 years ago
In this video, Varun sir has explained Error Detection and Correction. Error detection and correction are techniques used in data ...
1,032,139 views
Top Linux Network Commands explained by Varun sir are explained in this video. Given below are top Linux Network Commands ...
80,382 views
In this video, TCP/IP Protocol Suite is discussed. It is also known as the Internet Protocol Suite. TCP/IP stands for Transmission ...
1,439,683 views
Varun sir explains Options & Padding in IPV4 Header in this video. Options & Padding: Record Route Strict Source Routing.
123,971 views
Medium Access Control (MAC) Protocols are explained in this video. Several Medium Access Control (MAC) protocols are used in ...
610,068 views
4 years ago
Subscribe to our new channel:https://www.youtube.com/@varunainashots ▻ Database Management System(Complete Playlist): ...
1,095,295 views
Lecture By: Mr. Varun Singla Pipelining is a technique where multiple instructions are overlapped during execution. Pipeline is ...
1,011,096 views
In this video, Varun sir has explained the difference between Switch, Hub & Bridge. A switch is a network device that connects ...
372,655 views
Two Phase Locking Protocol also known as 2PL protocol is a method of concurrency control in DBMS that ensures serializability ...
713,721 views
Hamming codes are used to detect and correct errors in transmitted or stored data. They are particularly effective at correcting ...
616,422 views
In this video, Varun sir has discussed Bridges In Computer Networks. A bridge is a device that connects two or more network ...
509,781 views
428,815 views
shorts#ytshorts Our social media Links: ▻ Subscribe to us on YouTube: https://www.youtube.com/gatesmashers ▻ Like our page ...
41,526 views