Getting Started with Bluetooth Low Energy: Tools and Techniques for Low-Power Networking

Getting Started with Bluetooth Low Energy: Tools and Techniques for Low-Power Networking

Carles Cufí, Akiba

Language: English

Pages: 180

ISBN: 1491949511

Format: PDF / Kindle (mobi) / ePub

With Bluetooth Low Energy (Ble), smart devices are about to become even smarter. This practical guide demonstrates how this exciting wireless technology helps developers build mobile apps that share data with external hardware, and how hardware engineers can gain easy and reliable access to mobile operating systems.

This book provides a solid, high-level overview of how devices use Ble to communicate with each other. You’ll learn useful low-cost tools for developing and testing Ble-enabled mobile apps and embedded firmware and get examples using various development platforms—including iOs and Android for app developers and embedded platforms for product designers and hardware engineers.

  • Understand how data is organized and transferred by Ble devices
  • Explore Ble’s concepts, key limitations, and network topology
  • Dig into the protocol stack to grasp how and why Ble operates
  • Learn how Ble devices discover each other and establish secure connections
  • Set up the tools and infrastructure for Ble application development
  • Get examples for connecting Ble to iPhones, iPads, Android devices, and sensors
  • Develop code for a simple device that transmits heart rate data to a mobile device

Emergent Trends in Robotics and Intelligent Systems: Where Is the Role of Intelligent Technologies in the Next Generation of Robots? (Advances in Intelligent Systems and Computing, Volume 316)

Data Communications and Computer Networks: A Business User's Approach (7th Edition)

Selenium WebDriver Practical Guide

Project 2016 For Dummies

Introducing Autodesk Maya 2013

The Hacker Playbook 2: Practical Guide To Penetration Testing

















of an encryption procedure. Authorization procedure Authorization in BLE and GAP refers to giving the application and, ultimately, the user the opportunity to accept or reject a particular transaction. This might take the shape of an internal application check if the device does not have a user interface, or if it does, it can ask the user for permission directly. Encryption procedure This procedure uses the Link Layer’s built-in encryption capabilities to start the encryption of all traffic

Bluetooth Base UUID (commonly called vendor-specific UUIDs). In these cases, you’ll need to use the full 128-bit UUID value at all times. Attributes Attributes are the smallest data entity defined by GATT (and ATT). They are addressable pieces of information that can contain relevant user data (or metadata) about the structure and grouping of the different attributes contained within the server. Both GATT and ATT can work only with attributes, so for clients and servers to interact, all

the notification for the particular characteristic you are interested in. Once that’s done, you also have to enable notifications on the peer device by writing to the device’s client characteristic configuration descriptor (CCCD), as described in “Client Characteristic Configuration Descriptor”. Luckily, this is abstracted out and both operations can be handled by a single method call. The following code enables notifications for the accelerometer when the test button is pushed: private void

chararacteristics // associated with each for (CBService *service in { NSLog(@"Discovered service: %@", service.UUID); // discover characteristics associated with each service [peripheral discoverCharacteristics:nil forService:service]; } } Use caution if you pass nil as a parameter to [peripheral discoverServices:nil] and [peripheral discoverCharacteristics:nil forService:service], because the iOS device will then try to discover all the services and all the characteristics

GAP, RolesRSSI (received signal strength indicator), Connecting to a Remote Device S Scan Response, Broadcasting and Observingscannability, Advertising and Scanningscanningactive, Advertising and Scanningbasic types of, Advertising and Scanningin Link Layer, Advertising and Scanningpassive, Advertising and Scanningscanner role, Link Layerusage in GAP, Modes and Proceduressecondary service, Servicessecurityaddress types, Address Typesauthentication, Authenticationfilter policies, ConnectionsGAP

Download sample