Price: $4,999.00

Length: 4 Days
Print Friendly, PDF & Email

Machine-to-Machine Training Bootcamp

Machine to Machine (M2M) refers to a wireless or wired network setup that allows devices of the same type and ability to communicate freely.

This type of system can be used in a variety of ways and has advanced over the last few decades with the creation of global internet and IP network systems, facilitating enhanced and efficient communications over long distances and between large numbers of devices.

Making one machine communicate with another takes considerable technology, but the main elements involved are sensors, a wireless network and a computer connected to the internet.

M2M exists because for years, the machines used to make our life easier have been getting smarter as their internal computer processors and software tell them what to do based on the parameters we provide.

At the heart of M2M is a language known as telemetry, where remote machines and sensors collect and send data to a central point for analysis, either by humans or computers. While telemetry isn’t new, applying new advances in modem-networking technology is taking the idea a step further.

Through wireless sensors, computers and the internet, M2M communications expands telemetry’s role beyond its common use in science and engineering and places it in an everyday setting. People already are using M2M, but there are many more potential applications as wireless sensors, networks and computers improve, and the concept is mated with other technology.

In fact, the applications of M2M communications abound and are mushrooming along with the massive interconnectivity of the Internet of Things system.

For example, smart homes have incorporated M2M technology in many ways. It’s an embedded system that allows home appliances and other technologies to have real-time control of operations as well as the ability to communicate remotely.

M2M is now commonly used in remote monitoring as well. For instance machine to machine communication has become extremely important in warehouse management systems (WMS) and supply chain management as an enabler of monitoring as well as asset tracking.

In product restocking, a vending machine can message the distributor’s network, or machine, when a particular item is running low to send a refill.

Utility companies were among the first to devise scenarios where M2M communication is useful. Through the use of smart meters, utilities can bill customers as well as analyze worksite factors such as temperature, pressure and equipment status. Utility companies also enable machine to machine communication to harvest gas and oil energy.

Machine-to-Machine Training Bootcamp Training by Tonex

Machine-to-machine (M2M) communications have emerged as a cutting edge technology for next-generation communication. Machine-to-Machine communications is the exchange of data between machines, a remote machine and a back-end IT infrastructure. The transfer of data can be done two-way, both uplink and downlink.

Machine-to-machine (M2M) communication is considered to be a key enabler of applications and services across a broad range of vertical markets including:

  • Automotive
  • Consumer Electronics
  • Consumer Goods
  • Energy & Utilities
  • Financial Services
  • Healthcare Services
  • Manufacturing
  • Public Services
  • Security and Monitoring
  • Transport & Logistics

In this course Learn the concepts behind applications of M2M communication in the smart grid, enabling technologies and open issues of M2M communications, network design issue of M2M communications for home energy management system (HEMS) in the smart grid, network architecture for HEMS to collect status and power consumption demand from home appliances, optimal HEMS traffic concentration, and optimal cluster formation. 

Part 1: Overview of M2M

  • Overview of M2M Applications, Services and Architecture
  • M2M Definitions
  • Overview of Embedded systems used in M2
  • Overview of M2M IT Backend Systems
  • M2M vs. IoT
  • Machine-to-Machine Communications for Home
  • Energy Management System in Smart Grid
  • Smart Grid Solutions
  • Distributed Energy Resources
  • Generation
  • Renewable
  • Distribution
  • Utilities
  • Data Concentrator
  • Aggregators: WAN, NAN, HAN
  • Energy Gateway
  • Neighborhood area network (NAN)
  • Home area network (HAN)
  • Machine-to-Machine Communications for Home
  • Energy Management System in Smart Grid
  • Home energy management system (HEMS) in smart grid
  • Lab 1: Develop a M2M business case

Part 2: M2M and Networking/Mobility Curriculum

  • Machine-to-Machine communications
  • RF and wireless fundamentals
  • Overview of wireless communications systems: RFID, Near Field Communications (NFC), ZigBee, Bluetooth, WiFi, WiMAX, Satellite Communications, VSAT and Cellular
  • Details of Cellular Networks: GSM, C2K EV-DO, UMTS/HSPA/HSPA+, LTE, LTE-Advanced
  • Core IP networking and M2M

Part 3: M2M service layer, APIs and protocols overview

  • Overview of M2M protocols
  • Component based M2M reference model
  • M2M service layer
  • M2M Platforms
  • Reference points of the M2M service layer
  • APIs and protocols for M2M
  • ITU-T’s M2M API overview
  • Design approach for M2M service layer APIs
  • Other APIs and protocols for M2M service layer
  • M2M protocol structure and stacks

Part 4: M2M Architecture and Vertical Case Studies

  • M2M protocols
  • What is Smart M2M?
  • Interoperability Test Specification for ETSI M2M
  • ETSI’s mIa, dIa and mId interfaces
  • Interworking between the M2M Architecture and M2M Area Network technologies
  • M2M Functional architecture
  • Interoperability Test Specification for CoAP Binding of ETSI M2M Primitives
  • Machine to Machine communications (M2M); Use cases of Automotive Applications in M2M capable networks
  • BBF TR-069 compatible Management Objects for ETSI M2M
  • OMA DM compatible Management Objects for ETSI M2M
  • Applicability of M2M architecture to Smart Grid Networks; Impact of Smart Grids on M2M platform
  • Machine to Machine (M2M); Threat analysis and counter measures to M2M service layer
  • Smart Metering Use Cases
  • ETSI Use Cases of M2M applications for eHealth
  • ETSI Use Cases of M2M applications for Connected Consumer

Part 5: M2M Project Management, Operation

  • M2M project requirements
  • M2M solution design and development
  • M2M implementation
  • M2M operations and management
  • M2M SLA
  • Network fault reporting and escalation

Part 6: M2M Security

  • M2M security
  • Security and trust for M2M communications
  • M2m security framework
  • M2M security measures
  • Passive, reactive and active security measures for wireless M2M solutions.
  • M2M access and core security
  • M2M security protocols and architecture
  • Engineering of end-to-end security architecture
  • Embedded MIMs (Machine Identification Modules)
  • Attacks on our connected machines
  • Security threats for M2M
  • Example of security vulnerabilities
  • Physical attacks
  • Compromise of Credentials comprising brute force
  • Attacks on tokens and (weak) authentication algorithms
  • Physical intrusion
  • Side-channel attacks
  • Malicious cloning of authentication tokens
  • Attacks on Machine Communication Identity Module (MCIM)
  • Configuration Attacks such as fraudulent software update/configuration changes
  • Protocol attacks on the device
  • man-in-the-middle attacks upon first network access
  • Denial-of-service (DoS) attacks
  • Attacks on the access and core networks
  • traffic tunneling between impersonated devices
  • mis-configuration of the firewall in the modem/router/gateways
  • DoS attacks against the core network
  • Attacks on the radio access network, using a rogue device.
  • User Data and Identity Privacy Attacks i
  • Eavesdropping on wireless access networks
  • Eavesdropping on BLE, ZigBee
  • Eavesdropping on GSM. GPRS, UTRAN or EUTRAN
  • Introduction of Trusted Environment
  • Requirements, Functionality and Interfaces


Machine-to-Machine Training Bootcamp

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.