YoVDO

How KubeEdge Builds Secure, Trusted, and Adaptable Tunnels for Edge Networks

Offered By: Linux Foundation via YouTube

Tags

KubeEdge Courses Network Security Courses Kubernetes Courses Encryption Courses Edge Computing Courses QUIC Protocol Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore how KubeEdge builds secure, trusted, and adaptable tunnels for edge networks in this informative conference talk. Delve into the challenges of edge computing, including reduced latency, improved real-time processing, and increased security threats. Learn about KubeEdge's cloud-edge collaborative architecture for Kubernetes native edge computing and its implementation of a trusted tunnel for secure data transmission. Discover how the tunnel verifies, encrypts, and authenticates communications while ensuring data accessibility through QoS and QUIC protocol. Gain insights into network coded communication protocols and their potential to offer better throughput, latency, and reliability in unreliable network environments. This presentation, delivered in both English and Chinese, provides valuable knowledge for professionals interested in edge computing security and performance optimization.

Syllabus

How Does KubeEdge Build the Tunnel Which Is Secure, Trusted, and Adaptab... Wei Hu & Clement Richard


Taught by

Linux Foundation

Tags

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity