Get in Touch

Course Outline

Overview of Machine-to-Machine (M2M) Communications

  • Understanding the concept of M2M
  • Introduction to M2M communication systems
  • Differentiating telemetry from M2M communications
  • Real-world applications of M2M technology
  • Integrating People, Processes, Devices, Networks, and Applications

Business Sectors Utilizing M2M

  • Automotive industry
  • Consumer Electronics
  • Emergency Services
  • Fleet and Asset Management
  • Healthcare
  • Manufacturing
  • Remote Maintenance and Control
  • Smart Grid infrastructure
  • Smart Home solutions
  • Opportunities for cellular vendors and service providers
  • Market trends and opportunities for embedded modules

The M2M Ecosystem and Technologies Behind Intelligent Devices

  • Applications in automation, asset management, telematics, healthcare, retail, vending, and pricing
  • Distinctions between telemetry and telemetric data
  • Reporting location data, engine status, logistics tracking, and providing remote assistance
  • Next-generation kiosks and self-service technologies
  • Sectors including entertainment, finance, government, retail, and transportation
  • M2M solutions for MVNOs and connectivity service providers
  • Cellular-enabled vehicles, POS terminals, ATMs, and vending machines
  • Advanced M2M metering infrastructure
  • The digital signage market

M2M Application Landscape

  • M2M vertical industries
  • M2M hosted services
  • M2M application development
  • M2M connectivity options
  • Global M2M service providers
  • M2M component and solution vendors
  • M2M software providers
  • M2M hosted services (revisited)
  • M2M networks
  • M2M machine controllers
  • Challenges in M2M deployment
  • M2M devices
  • Wireless communication architectures and solutions

Technologies Enabling M2M Communications

  • Wireless Sensor Networking (WSN)
  • Cellular M2M applications, networks, and air interface standards
  • Software solutions for M2M applications
  • M2M communication protocols
  • Implementing security and encryption measures
  • Hardware and Real-Time Operating Systems (RTOS)
  • System-level flexibility
  • Using communication protocols for Internet connectivity
  • IP-based cellular networks

M2M Systems and Network Infrastructure

  • RF and wireless sensors
  • Wireless networks
  • Mobile Broadband Networks
  • Computer connectivity to the Internet
  • Robust processing performance requirements
  • Networked devices
  • Device configurations and management
  • Real-time information exchange without human intervention

M2M and Networking Technologies

  • Cellular M2M connectivity services
  • Overview of cellular networks including GSM, CDMA, EV-DO, UMTS/HSPA/HSPA+, LTE, and LTE-Advanced
  • Overview of SIM (Subscriber Identity Module) cards, including mini SIM and embedded SIM formats
  • Overview of RFID, NFC, Zigbee, Bluetooth, WiFi, and WiMAX
  • Overview of Satellite Communications, VSAT, Microwave, and power line communication

M2M Design and Systems Engineering

  • M2M requirements and specifications
  • Hardware and software components
  • M2M sensors
  • Tagging and tracking mechanisms
  • Embedded Products
  • M2M design principles
  • M2M SDKs
  • (U)SIM Card Technology
  • M2M connectivity and management strategies
  • M2M Security
  • Open M2M initiatives
  • RF concepts underlying cell planning and coverage

M2M Security Framework

  • Establishing security and trust in M2M communications
  • Secure communication within the M2M context
  • M2M security framework architecture
  • Securing Data input/output and Internet communication
  • Secure cryptographic libraries
  • RSA 1024- and 2048-bit private key encryption
  • AES-128/192/256 algorithms
  • ARC4, MD5, and SHA-1 standards
  • SSL protocols
  • HTTPS implementation
  • SIPS protocols
  • Hardware redesign for enhanced security
  • Secure IP communication controller chips
  • Security threats specific to M2M
  • Machine Communication Identity Module (MCIM)
  • Configuration Attacks
  • Protocol Attacks on the Device
  • Attacks on the Core Network
  • User Data and Identity Privacy Attacks
 14 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories