YoVDO

How KubeEdge Builds Secure, Trusted, and Adaptable Tunnels for Edge Networks

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

KubeEdge Courses Network Security Courses Kubernetes Courses Encryption Courses Edge Computing Courses QUIC Protocol Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how KubeEdge builds secure, trusted, and adaptable tunnels for edge networks in this conference talk. Dive into the challenges of edge computing, including reduced latency, improved real-time processing, and increased security threats. Learn about KubeEdge's cloud-edge collaborative architecture for Kubernetes native edge computing and its trusted tunnel system. Discover how the tunnel verifies, encrypts, and authenticates communications while ensuring data accessibility through QoS and QUIC protocol implementation. Gain insights into network coded communication protocols and their potential to offer better throughput, latency, and reliability in unreliable network environments. Understand the complexities of heterogeneous edge networks and the solutions KubeEdge provides to support weak and insecure network environments.

Syllabus

How Does KubeEdge Build the Tunnel Which Is Secure, Trusted, and Adapta...- Wei Hu & Clement Richard


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

From Ground to Space: Cloud-Native Edge Machine Learning Case Studies with KubeEdge-Sedna
Linux Foundation via YouTube
RecoverMonitor: Edge-enabled Open-source Wearable Devices for Monitoring Healthcare Remote Patient Recovery
Linux Foundation via YouTube
Choosing from the Many Flavors of Edge Computing - KubeEdge, OpenYurt, K3S, and K8S
Linux Foundation via YouTube
Building Edge AI Stack and AI-as-a-Service in Cloud Native Way
Linux Foundation via YouTube
Inference on KubeEdge
Linux Foundation via YouTube