how-does-kubeedge-build-the-tunnel-which-is-secure-trusted-and-adaptable-to-edge-networks-kubeedgeli-yi-sui-jie-zhang-zha-xi-qiu-wei-hu-daocloud-clement-richard-n-hop.pdf

编号:627389 PDF 24页 2.43MB 下载积分:VIP专享
下载报告请您先登录!

how-does-kubeedge-build-the-tunnel-which-is-secure-trusted-and-adaptable-to-edge-networks-kubeedgeli-yi-sui-jie-zhang-zha-xi-qiu-wei-hu-daocloud-clement-richard-n-hop.pdf

1、How Does KubeEdge Build the Tunnel Which Is Secure,Trusted,and Adaptable to Edge NetworksWei Hu|DaoCloudClement Richard|n-hopAbort UsWei HuSenior Software Engineer at DaoCloudKubeEdge MaintainerClement RichardPlatform Engineer at n-hopRed Hat Certified ArchitectAgendaBackground and motivation01Secur

2、ity Of KubeEdge Connections02Cloud-Edge Control Flow03Network Coding for Cloud Computing04Q&A05Part.1Background and motivationThe Challenges Of Edge Computing NetworkThe heterogeneous nature of the network at the edge(e.g.,Internet,5G,WlFl,and other forms)makes achieving quality of service much more

3、 difficult.Users want an edge computing platform that can support weak and insecure network environments.User StoryUser StoryChallengesChallengesSecurity of communication.Adaptability to weak network environments.High throughput,low latency and reliability.The Requirement Of The IOV ScenarioSystem d

4、ynamic and openSystem dynamic and open,the network environment is unstable and requires edge interconnection.1Security and privacy protectionSecurity and privacy protection,to ensure the security of data communication and safeguard users privacy to prevent leaks.2Network bandwidth and equipment cost

5、sNetwork bandwidth and equipment costs,The corresponding compression algorithm should be adopted to reduce the bandwidth demand.3Management of massive devicesManagement of massive devices,efforts must be made to alleviate the network load on cloud.4Part.2Security Of KubeEdge ConnectionsData Flow Of

6、KubeEdgeCloudHubCloudHubProvides WebSocket or QUIC Server.List/Watch K8s resources for downstream.Write k8s resource status for upstream.Stream&Tunnel ServerStream&Tunnel ServerStream hijacks the stream apis from api-server to kubelet and calls Tunnel Server(WebService)to pass stream datas.EdgeHub&T

友情提示

1、下载报告失败解决办法
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站报告下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

本文(how-does-kubeedge-build-the-tunnel-which-is-secure-trusted-and-adaptable-to-edge-networks-kubeedgeli-yi-sui-jie-zhang-zha-xi-qiu-wei-hu-daocloud-clement-richard-n-hop.pdf)为本站 (山海) 主动上传,三个皮匠报告文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三个皮匠报告文库(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。
客服
商务合作
小程序
服务号
折叠