YoVDO

How KubeEdge Builds Secure, Trusted, and Adaptable Tunnels for Edge Networks

Offered By: Linux Foundation via YouTube

Tags

KubeEdge Courses Network Security Courses Kubernetes Courses Encryption Courses Edge Computing Courses QUIC Protocol Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how KubeEdge builds secure, trusted, and adaptable tunnels for edge networks in this informative conference talk. Delve into the challenges of edge computing, including reduced latency, improved real-time processing, and increased security threats. Learn about KubeEdge's cloud-edge collaborative architecture for Kubernetes native edge computing and its implementation of a trusted tunnel for secure data transmission. Discover how the tunnel verifies, encrypts, and authenticates communications while ensuring data accessibility through QoS and QUIC protocol. Gain insights into network coded communication protocols and their potential to offer better throughput, latency, and reliability in unreliable network environments. This presentation, delivered in both English and Chinese, provides valuable knowledge for professionals interested in edge computing security and performance optimization.

Syllabus

How Does KubeEdge Build the Tunnel Which Is Secure, Trusted, and Adaptab... Wei Hu & Clement Richard


Taught by

Linux Foundation

Tags

Related Courses

Internet History, Technology, and Security
University of Michigan via Coursera
Sicherheit im Internet
openHPI
أساسيات التشفير
Rwaq (رواق)
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera