YoVDO

How KubeEdge Builds Secure, Trusted, and Adaptable Tunnels for Edge Networks

Offered By: Linux Foundation via YouTube

Tags

KubeEdge Courses Network Security Courses Kubernetes Courses Encryption Courses Edge Computing Courses QUIC Protocol Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how KubeEdge builds secure, trusted, and adaptable tunnels for edge networks in this informative conference talk. Delve into the challenges of edge computing, including reduced latency, improved real-time processing, and increased security threats. Learn about KubeEdge's cloud-edge collaborative architecture for Kubernetes native edge computing and its implementation of a trusted tunnel for secure data transmission. Discover how the tunnel verifies, encrypts, and authenticates communications while ensuring data accessibility through QoS and QUIC protocol. Gain insights into network coded communication protocols and their potential to offer better throughput, latency, and reliability in unreliable network environments. This presentation, delivered in both English and Chinese, provides valuable knowledge for professionals interested in edge computing security and performance optimization.

Syllabus

How Does KubeEdge Build the Tunnel Which Is Secure, Trusted, and Adaptab... Wei Hu & Clement Richard


Taught by

Linux Foundation

Tags

Related Courses

Fog Networks and the Internet of Things
Princeton University via Coursera
AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX
Business Considerations for 5G with Edge, IoT, and AI
Linux Foundation via edX
5G Strategy for Business Leaders
Linux Foundation via edX
Intel® Edge AI Fundamentals with OpenVINO™
Intel via Udacity