Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Overview of Machine-to-Machine (M2M) Communications
- Understanding M2M
- Introduction to M2M communications
- Differentiating telemetry from M2M communications
- Real-world applications of M2M
- Interplay between people, processes, devices, networks, and applications
Business Sectors for M2M
- Automotive industry
- Consumer electronics
- Emergency response services
- Fleet and asset management
- Healthcare sector
- Manufacturing
- Remote maintenance and control
- Smart Grid technology
- Smart Home ecosystems
- Opportunities for cellular vendors and service providers
- Market trends and prospects for embedded modules
M2M Ecosystem and Technologies Powering Smart and Intelligent Devices
- Automation, asset management, telemetry, transportation, telematics, healthcare, retail solutions, pricing mechanisms, and vending machines
- Telemetry and telemetric concepts
- Tracking location, engine management data, logistics, and providing remote assistance
- Next-generation kiosks and self-service technologies
- Sectors including entertainment, finance, government, retail, and transportation
- M2M opportunities for MVNOs and connectivity providers
- Cellular-enabled vehicles, POS terminals, ATMs, and vending machines
- Advanced M2M metering infrastructure
- Digital signage market dynamics
M2M Applications
- M2M vertical markets
- M2M hosted services
- M2M application development
- M2M connectivity options
- Global M2M service providers
- M2M component and solution vendors
- M2M software vendors
- M2M hosted services
- M2M networks
- M2M machine controllers
- Challenges facing M2M implementation
- M2M devices
- Wireless communication architectures and solutions
M2M Communications Technologies
- Wireless Sensor Networking (WSN)
- Cellular M2M applications, networks, and air interface standards
- Software solutions for M2M applications
- M2M communication protocols
- Implementing security and encryption
- Hardware and Real-Time Operating Systems (RTOS)
- System-level flexibility
- Utilizing communications protocols for Internet connectivity
- IP-based cellular networks
M2M Systems and Networks
- RF and wireless sensors
- Wireless networks
- Mobile Broadband Networks
- Internet-connected computers
- Robust processing performance
- Networked devices
- Device configurations and management
- Real-time information exchange without human intervention
M2M and Networking Technologies
- Cellular M2M connectivity services
- Overview of cellular networks including GSM, CDMA, EV-DO, UMTS/HSPA/HSPA+, LTE, and LTE-Advanced
- Overview of SIM (Subscriber Identity Module), mini SIM, and embedded SIM cards
- Overview of RFID, NFC, Zigbee, Bluetooth, WiFi, and WiMAX
- Overview of Satellite Communications, VSAT, Microwave, and power line communication
M2M Design and Systems Engineering
- M2M requirements
- Hardware and software considerations
- M2M sensors
- Tagging and tracking systems
- Embedded products
- M2M design principles
- M2M SDK
- (U)SIM Card Technology
- M2M connectivity and management
- M2M Security
- Open M2M initiatives
- RF concepts regarding cell planning and coverage
M2M Security
- Security and trust in M2M communications
- Secure communication within the context of M2M
- M2M security framework
- Securing data input/output and Internet communication
- Secure cryptographic libraries
- RSA 1024- and 2048-bit private key encryption
- AES-128/192/256
- ARC4, MD5, and SHA-1
- SSL
- HTTPS
- SIPS
- Redesigning hardware for enhanced security
- Secure IP communication controller chips
- Security threats specific to M2M
- Machine Communication Identity Module (MCIM)
- Configuration attacks
- Protocol attacks targeting devices
- Attacks on the core network
- Attacks on user data and identity privacy
14 Hours
Testimonials (3)
The ability of the trainer to align the course with the requirements of the organization other than just providing the course for the sake of delivering it.
Masilonyane - Revenue Services Lesotho
Course - Big Data Business Intelligence for Govt. Agencies
The oral skills and human side of the trainer (Augustin).
Jeremy Chicon - TE Connectivity
Course - NB-IoT for Developers
I enjoyed the relaxed mood. Also there was a very good balance between theoretical presentation and practical side.