Get in Touch

Course Outline

Overview of Machine-to-Machine (M2M) Communications

  • Understanding the fundamentals of M2M
  • Introduction to M2M communication ecosystems
  • Distinguishing between Telemetry and M2M communications
  • Key applications of M2M technology
  • Integration of People, Processes, Devices, Networks, and Applications

Business Sectors Leveraging M2M

  • Automotive industry
  • Consumer Electronics
  • Emergency Services
  • Fleet and Asset Management
  • Healthcare sector
  • Manufacturing
  • Remote Maintenance and Control
  • Smart Grid
  • Smart Home
  • Opportunities for cellular vendors and service providers
  • Market opportunities and trends for embedded modules

The M2M Ecosystem and Technologies Driving Smart Devices

  • Applications in automation, asset management, telemetry, transportation telematics, healthcare, retail, pricing, and vending machines
  • Core concepts of Telemetry and telemetric data
  • Functions including location reporting, engine management data, logistics tracking, and remote assistance
  • Next-generation kiosks and self-service technologies
  • Impact on entertainment, finance, government, retail, and transportation sectors
  • M2M solutions for MVNOs and connectivity service providers
  • Examples such as cellular-enabled vehicles, POS terminals, ATMs, and vending machines
  • Advanced infrastructure for M2M metering
  • The digital signage market

Comprehensive M2M Applications

  • M2M vertical market segments
  • M2M hosted service models
  • M2M application development lifecycle
  • M2M connectivity solutions
  • Global landscape of M2M service providers
  • Providers of M2M components and comprehensive solutions
  • Software providers specializing in M2M
  • M2M hosted services
  • M2M network architectures
  • M2M machine controllers
  • Challenges facing M2M deployment
  • M2M device varieties
  • Wireless communication architectures and solutions

M2M Communications Technologies

  • Wireless Sensor Networking (WSN)
  • Cellular M2M applications, networks, and air interface standards
  • Software frameworks for M2M applications
  • Principles of M2M communication
  • Implementing security and encryption protocols
  • Hardware components and Real-Time Operating Systems (RTOS)
  • System-level flexibility
  • Utilizing communications protocols for Internet connectivity
  • IP-based cellular networks

M2M Systems and Network Infrastructure

  • RF and wireless sensors
  • Wireless network topologies
  • Mobile Broadband Networks
  • Internet-connected computer systems
  • High-performance processing capabilities
  • Networked device integration
  • Device configuration and management
  • Real-time information exchange without human intervention

M2M and Networking Technologies

  • Cellular M2M connectivity services
  • Overview of cellular networks including GSM, CDMA, EV-DO, UMTS/HSPA/HSPA+, LTE, LTE-Advanced
  • Overview of SIM (Subscriber Identity Module), mini SIM, and embedded SIM cards
  • Overview of RFID, NFC, Zigbee, Bluetooth, WiFi, and WiMAX
  • Overview of Satellite Communications, VSAT, Microwave, and power line communication

M2M Design and Systems Engineering

  • M2M system requirements
  • Hardware and software specifications
  • M2M sensor technologies
  • Tagging and tracking mechanisms
  • Embedded products
  • M2M design principles
  • M2M Software Development Kits (SDK)
  • (U)SIM Card Technology
  • M2M connectivity and management
  • M2M security measures
  • Open M2M initiatives
  • RF concepts behind cell planning and coverage

M2M Security Frameworks

  • Security and trust mechanisms for M2M communications
  • Secure communication protocols within M2M contexts
  • M2M security framework architecture
  • Securing Data input/output and Internet communication
  • Secure cryptographic libraries
  • RSA 1024- and 2048-bit private key encryption
  • AES-128/192/256 standards
  • ARC4, MD5, and SHA-1 algorithms
  • SSL (Secure Sockets Layer)
  • HTTPS (Hyper Text Transfer Protocol Secure)
  • SIPS (Secure Internet Protocol Session)
  • Redesigning Hardware for enhanced security
  • Secure IP communication controller chips
  • Security threats specific to M2M
  • Machine Communication Identity Module (MCIM)
  • Configuration Attacks
  • Protocol Attacks targeting Devices
  • Attacks on the Core Network
  • User Data and Identity Privacy Attacks
 14 Hours

Testimonials (3)

Upcoming Courses

Related Categories