YoVDO

How KubeEdge Builds Secure, Trusted, and Adaptable Tunnels for Edge Networks

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

KubeEdge Courses Network Security Courses Kubernetes Courses Encryption Courses Edge Computing Courses QUIC Protocol Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how KubeEdge builds secure, trusted, and adaptable tunnels for edge networks in this conference talk. Dive into the challenges of edge computing, including reduced latency, improved real-time processing, and increased security threats. Learn about KubeEdge's cloud-edge collaborative architecture for Kubernetes native edge computing and its trusted tunnel system. Discover how the tunnel verifies, encrypts, and authenticates communications while ensuring data accessibility through QoS and QUIC protocol implementation. Gain insights into network coded communication protocols and their potential to offer better throughput, latency, and reliability in unreliable network environments. Understand the complexities of heterogeneous edge networks and the solutions KubeEdge provides to support weak and insecure network environments.

Syllabus

How Does KubeEdge Build the Tunnel Which Is Secure, Trusted, and Adapta...- Wei Hu & Clement Richard


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

Amazon DynamoDB Deep Dive
A Cloud Guru
AWS Security Essentials
A Cloud Guru
AZ-500: Microsoft Azure Security Technologies (LA)
A Cloud Guru
Encryption Fundamentals
A Cloud Guru
Google Cloud Certified Professional Cloud Security Engineer
A Cloud Guru