Length: 2 Days
College Credits: 2
Continuing Education Credits: 13 PDH
Why choose TONEX for your M2M Training?
Machine-to-Machine (M2M) Training course covers all business and technical aspects of Machine-to-Machine (M2M) communications and M2M ecosystem.
This two-day course provides engineers and non-engineers with the insights and perspectives enabling Machine-to-Machine (M2M) solutions. Learn how to describe the M2M Business Case, identify M2M appropriate Business Models, M2M technical analysis, design, deployment, operations and support.
Machine-to-machine (M2M) communication is considered to be a key enabler of smart applications and services across a broad range of vertical markets including automation, utilities, asset management, telemetry, transportation.logistics, telematics, healthcare, retail solutions, pricing, and vending machines.
Machine-to-Machine (M2M) training course illustrates how billion diverse devices are connected to a network, enabling two-way communication to allow network-ready devices to connect and share real-time data via RF signals. Monitored and managed remotely, M2M automates processes in industries from lead to smarter technology and efficient distribution leading to greater control over business operations.
Upon the completion of the course, attendees are able to::
- Define what M2M is and clarify the main components that comprise a M2M solution using cellular networks and IP networks
- Describe concepts behind M2M and networking
- Describe IoT, Smart, RFID, NFC, Zigbee, HAN, NAN, and USN
- Describe concepts behind cellular networks including GSM, CDMA, EV-DO, UMTS/HSPA/HSPA+, LTE, LTE-Advanced
- Define concepts behind SIM (Subscriber Identity Module), mini SIM and embedded SIM cards
- Describe Technical aspects behind Zigbee, Bluetooth, NFC, RFID, WiFi, WiMAX and LTE
- Describe concepts behind Satellite Communications, VSAT, Microwave and Power line communication
- Explain the concepts contained within the M2M and methodologies for implementing the M2M solution in real life networks
- Understand in greater depth the strategic and technical challenges that are facing all of the main actors in the M2M industry
- Explore the integration of the M2M service platform into existing and future networks
- Discuss M2M convergence and regulatory matters
- List M2M device abstraction and semantics, architecture protocols, APIs and frameworks
- Discuss Over-the-Air proviioning and performance considerations
- Discuss M2M security
- Discuss M2M smart environments and low cost LTE for M2M consumer electronics, automotive, transportation and logistics, passenger-car telematics, smart energy and industrial automation and enterprise, cellular, connectivity and computing
consumer - List the M2M platforms available
- Neighborhood Area Network (NAN)
- Home Area Network (HAN)
- Home energy management system (HEMS) in smart grid
By 2020 there will be about 50B M2M cellular connections and a revenue of $373B USD for mobile network operators. Source: Machina Research
Who Should Attend
Anyone involved in planning, designing, building, managing or operating M2M communications networks or systems.
Outline
Machine to Machine (M2M) Communications Overview
- What is M2M?
- Introduction to M2M communications
- Telemetry vs. M2M communications
- Applications of M2M communications
- People & Processes, Devices, Networks and Applications
M2M Business Sectors
- Automotive
- Consumer Electronics
- Emergency Services
- Fleet and Asset Management
- Healthcare
- Manufacturing
- Remote Maintenance and Control
- Smart Grid
- Smart Home
- Opportunities for cellular vendors and service providers
- Market opportunities and trends for embedded modules
M2M Ecosystem and Technologies behind Smart and Intelligent Devices
- Automation, asset Management, telemetry, transportation. telematics, healthcare, retail solutions, pricing, and vending machines
- Telemetry and telemetric
- Report location, engine management information, logistics tracking and remote assistance
- Next Generation kiosks and self-service technology
- Entertainment, financial, government, retail, and transportation
- M2M for MVNOs and connectivity service providers
- Cellular-enabled vehicles, POS Terminals, ATMs, and vending machines
- Advanced M2M metering infrastructure
- Digital signage market
M2M Applications
- M2M verticals
- M2M Hosted services
- M2M application development
- M2M connectivity
- Global M2M service providers
- M2M component and solution providers
- M2M software providers
- M2M Hosted services
- M2M networks
- M2M machine controller
- M2M challenges
- M2M devices
- Wireless communication architectures and solutions
M2M Communications Technologies
- Wireless Sensor Networking (WSN)
- Cellular machine-to-machine (M2M) applications, networks and air interface standards
- Software for M2M applications
- M2M communication
- Implementing security and encryption
- Hardware and RTOS
- System-level flexibility
- Using communications protocols for Internet connectivity
- IP-based cellular networks
M2M Systems and Networks
- RF and wireless sensors
- Wireless networks
- Mobile Broadband Networks
- Computer connected to the Internet
- Robust processing performance
- Networked devices
- Device configurations and management
- Exchange information in real-time without human intervention
M2M and Networking Technologies
- Cellular M2M connectivity services
- Overview of cellular networks including GSM, CDMA, EV-DO, UMTS/HSPA/HSPA+, LTE, LTE-Advanced
- Overview of SIM (Subscriber Identity Module), mini SIM and embedded SIM cards
- Overview of RFID, NFC, Zigbee, Bluetooth, WiFi and WiMAX
- Overview of Satellite Communications, VSAT, Microwave and power line communication
M2M Design and Systems Engineering
- M2M requirements
- Hardware and software
- M2M sensors
- Tagging and tracking
- Embedded Products
- M2M Design
- M2M SDK
- (U)SIM Card Technology
- M2M connectivity and management
- M2M Security
- Open M2M initiatives
- RF concepts behind cell planning and coverage
M2M Security
- Security and trust for M2M communications
- Secure communication in the context of M2M communications
- M2M security framework
- Securing Data input/output and Internet communication
- Secure cryptographic library
- RSA 1024- and 2048-bit private key encryption
- AES-128/192/256
- ARC4, MD5 and SHA-1
- SSL
- HTTPS
- SIPS
- Redesigning Hardware for Security
- Secure IP communication controller chip
- Security threats for M2M
- Machine Communication Identity Module (MCIM)
- Configuration Attacks
- Protocol Attacks on the Device
- Attacks on the Core Network
- User Data and Identity Privacy Attacks