Price: $4,999.00
Length: 4 Days
Print Friendly, PDF & Email

Machine-to-Machine Training Bootcamp Description

What is Machine-to-Machine or M2M?

Machine-to-Machine connects machines, devices and appliances wirelessly. M2M makes machines intelligent and open up a range of possibilities for enterprises and consumers.

Machine-to-Machine communications is the exchange of data between machines, a remote machine and a back-end IT infrastructure. The transfer of data can be done two-way both uplink and downlink.

M2M communications are made possible by a device such as a sensor attached to a machine to capture communicating via network delivering data to applications. The intelligent sensors are embedded in a remote asset and capture events such as movement, altitude, temperature, location, consumption, heart rate, stress levels, light and speed.

M2M communications can be used to gain immediate feedback on how a particular remote asset is being used, which features are most popular and what problems such as errors or breakdowns typically arise. This information is useful for shortening the lead-time to an improved or updated version or offering proactive services, thereby providing a competitive edge. When applied to people, M2M communications can help to protect lone workers or vulnerable children, be used to find a missing person and to help improve lives by ensuring the correct medicines are being taken.

Machine-to-machine (M2M) communication is considered to be a key enabler of applications and services across a broad range of vertical markets including:

  • Automotive
  • Consumer Electronics
  • Consumer Goods
  • Energy & Utilities
  • Financial Services
  • Healthcare Services
  • Manufacturing
  • Public Services
  • Security and Monitoring
  • Transport & Logistics

Machine-to-Machine (M2M) connects ‘things’ to the internet, transforming them into intelligent devices that exchange real time information and open up a range of possibilities for how businesses are run.

Machine-to-machine (M2M) communications have emerged as a cutting edge technology for next-generation communication. Learn the concepts behind application of M2M communication in smart grid,  enabling technologies and open issues of of M2M communications, network design issue of M2M communications for home energy management system (HEMS) in smart grid, network architecture for HEMS to collect status and power consumption demand from home appliances, optimal HEMS traffic concentration, optimal cluster formation. 

Part 1: Overview of M2M

  • Overview of M2M Applications, Services and Architecture
  • M2M Definitions
  • Overview of Embedded systems used in M2
  • Overview of M2M IT Backend Systems
  • M2M vs. IoT
  • Machine-to-Machine Communications for Home
  • Energy Management System in Smart Grid
  • Smart Grid Solutions
  • Distributed Energy Resources
  • Generation
  • Renewable
  • Distribution
  • Utilities
  • Data Concentrator
  • Aggregators: WAN, NAN, HAN
  • Energy Gateway
  • Neighborhood area network (NAN)
  • Home area network (HAN)
  • Machine-to-Machine Communications for Home
  • Energy Management System in Smart Grid
  • Home energy management system (HEMS) in smart grid
  • Lab 1: Develop a M2M business case

Part 2: M2M and Networking/Mobility Curriculum

  • Machine-to-Machine communications
  • RF and wireless fundamentals
  • Overview of wireless communications systems: RFID, Near Field Communications (NFC), ZigBee, Bluetooth, WiFi, WiMAX, Satellite Communications, VSAT and Cellular
  • Details of Cellular Networks: GSM, C2K EV-DO, UMTS/HSPA/HSPA+, LTE, LTE-Advanced
  • Core IP networking and M2M

Part 3: M2M service layer, APIs and protocols overview

  • Overview of M2M protocols
  • Component based M2M reference model
  • M2M service layer
  • M2M Platforms
  • Reference points of the M2M service layer
  • APIs and protocols for M2M
  • ITU-T’s M2M API overview
  • Design approach for M2M service layer APIs
  • Other APIs and protocols for M2M service layer
  • M2M protocol structure and stacks

Part 4: M2M Architecture and Vertical Case Studies

  • M2M protocols
  • What is SmartM2M?
  • Interoperability Test Specification for ETSI M2M
  • ETSI’s mIa, dIa and mId interfaces
  • Interworking between the M2M Architecture and M2M Area Network technologies
  • M2M Functional architecture
  • Interoperability Test Specification for CoAP Binding of ETSI M2M Primitives
  • Machine to Machine communications (M2M); Use cases of Automotive Applications in M2M capable networks
  • BBF TR-069 compatible Management Objects for ETSI M2M
  • OMA DM compatible Management Objects for ETSI M2M
  • Applicability of M2M architecture to Smart Grid Networks; Impact of Smart Grids on M2M platform
  • Machine to Machine (M2M); Threat analysis and counter measures to M2M service layer
  • Smart Metering Use Cases
  • ETSI Use Cases of M2M applications for eHealth
  • ETSI Use Cases of M2M applications for Connected Consumer

Part 5: M2M Project Management, Operation

  • M2M project requirements
  • M2M solution design and development
  • M2M implementation
  • M2M operations and management
  • M2M SLA
  • M2M OSS/BSS
  • Network fault reporting and escalation

Part 6: M2M Security

  • M2M security
  • Security and trust for M2M communications
  • M2m security framework
  • M2M security measures
  • Passive, reactive and active security measures for wireless M2M solutions.
  • M2M access and core security
  • M2M security protocols and architecture
  • Engineering of end-to-end security architecture
  • Embedded MIMs (Machine Identification Modules)
  • Attacks on our connected machines
  • Security threats for M2M
  • Example of security vulnerabilities
  • Physical attacks
  • Compromise of Credentials comprising brute force
  • Attacks on tokens and (weak) authentication algorithms
  • Physical intrusion
  • Side-channel attacks
  • Malicious cloning of authentication tokens
  • Attacks on Machine Communication Identity Module (MCIM)
  • Configuration Attacks such as fraudulent software update/configuration changes
  • Protocol attacks on the device
  • man-in-the-middle attacks upon first network access
  • Denial-of-service (DoS) attacks
  • Attacks on the access and core networks
  • traffic tunneling between impersonated devices
  • mis-configuration of the firewall in the modem/router/gateways
  • DoS attacks against the core network
  • Attacks on the radio access network, using a rogue device.
  • User Data and Identity Privacy Attacks i
  • Eavesdropping on wireless access networks
  • Eavesdropping on BLE, ZigBee
  • Eavesdropping on GSM. GPRS, UTRAN or EUTRAN
  • Introduction of Trusted Environment
  • Requirements, Functionality and Interfaces

 

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.