This document discusses Bluetooth technology. It begins with an introduction to Bluetooth, including its history and different flavors such as Classic, High Speed, and Low Energy. It then covers the Bluetooth market, including statistics on device shipments and member companies. The technical side of Bluetooth is explored, including specifications for Basic Rate, Enhanced Data Rate, and Low Energy. Profiles and use cases are also described. Future directions are discussed, such as Bluetooth Mesh networking and the growth of Bluetooth in the Internet of Things. The document concludes with an agenda for questions.
Bluetooth Low Energy (BLE) or Bluetooth Smart is the low energy version of Bluetooth and integrated into the Bluetooth standard v4.0. The presentation briefs about the BLE and its architecture.
Presented at Robert Bosch Centre for Cyber Physical Systems at Indian Institute of Science, Bengaluru
This presentation provides an brief introduction about Bluetooth Low Energy. This also covers the basic protocol layers of bluetooth low energy. Also discusses about the ble device discovery, service discovery, connection establishment, connection termination, etc.
A talk I gave to Hackware v0.7, v0.8, Hackers & Painters, NUS Hackers, One Maker Group and iOS Dev Scout to introduce the audience to basic Bluetooth Low Energy concepts followed by code explanations.
Part 1 of my presentation at Hackware v0.7 (Arduino and Android only) can be seen here. https://www.youtube.com/watch?v=pNnwXPatzjc
Part 2 (Raspberry Pi, iOS and BLE Sniffer) can be seen here. https://www.youtube.com/watch?v=UDNkrlfW9Sg
The code is available here. https://github.com/yeokm1/intro-to-ble
This presentation provides the information about bluetooth low energy concepts and architecture. This also provides information about various bluetooth low energy profiles and characteristics.
BTLE (Bluetooth Low Energy) and CoreBluetooth Zach Dennis
This presentation is on Bluetooth low energy and how Apple's Core Bluetooth framework works to expose the higher level application layer to iOS and Mac developers.
It includes versions of Bluetooth, how Bluetooth works, Bluetooth profile, Bluetooth core architecture, power classes of Bluetooth, Bluetooth protocol, advantages and applications of Bluetooth.
Bluetooth Low Energy (BLE) or Bluetooth Smart is the low energy version of Bluetooth and integrated into the Bluetooth standard v4.0. The presentation briefs about the BLE and its architecture.
Presented at Robert Bosch Centre for Cyber Physical Systems at Indian Institute of Science, Bengaluru
This presentation provides an brief introduction about Bluetooth Low Energy. This also covers the basic protocol layers of bluetooth low energy. Also discusses about the ble device discovery, service discovery, connection establishment, connection termination, etc.
A talk I gave to Hackware v0.7, v0.8, Hackers & Painters, NUS Hackers, One Maker Group and iOS Dev Scout to introduce the audience to basic Bluetooth Low Energy concepts followed by code explanations.
Part 1 of my presentation at Hackware v0.7 (Arduino and Android only) can be seen here. https://www.youtube.com/watch?v=pNnwXPatzjc
Part 2 (Raspberry Pi, iOS and BLE Sniffer) can be seen here. https://www.youtube.com/watch?v=UDNkrlfW9Sg
The code is available here. https://github.com/yeokm1/intro-to-ble
This presentation provides the information about bluetooth low energy concepts and architecture. This also provides information about various bluetooth low energy profiles and characteristics.
BTLE (Bluetooth Low Energy) and CoreBluetooth Zach Dennis
This presentation is on Bluetooth low energy and how Apple's Core Bluetooth framework works to expose the higher level application layer to iOS and Mac developers.
It includes versions of Bluetooth, how Bluetooth works, Bluetooth profile, Bluetooth core architecture, power classes of Bluetooth, Bluetooth protocol, advantages and applications of Bluetooth.
Low Power Wireless Technologies and Standards for the Internet of ThingsDuncan Purves
Presentation on low power wireless technologies and standards for the Internet of Things (iOT), given at the BCS Communications Management Association AGM on 5th April 2016
Bluetooth is an open standard for short-range
digital radio to interconnect a variety of devices Cell
phones, PDA, notebook computers, modems,
cordless phones, pagers, laptop computers, printers,
cameras by developing a single-chip, low-cost,
radio-based wireless network technology.
Slides are mainly on the major security flaws that existed in the Bluetooth 4.0/4.1 (released 2010) specifically Bluetooth Low Energy(BLE) (a.k.a Bluetooth Smart) specification. BLE was introduced as part of Bluetooth 4.0 targeting low power devices which is quite different from classic Bluetooth. Later part contains major security enhancements that are introduced in BLE 4.2
2.4 GHz Open band
Globally available
Other devices include microwave ovens, cordless phones
Frequency hopping and Time Division Multiplexing
10 – 100 meter range
Up to 8 active devices can be in the same piconet
Low Power Wireless Technologies and Standards for the Internet of ThingsDuncan Purves
Presentation on low power wireless technologies and standards for the Internet of Things (iOT), given at the BCS Communications Management Association AGM on 5th April 2016
Bluetooth is an open standard for short-range
digital radio to interconnect a variety of devices Cell
phones, PDA, notebook computers, modems,
cordless phones, pagers, laptop computers, printers,
cameras by developing a single-chip, low-cost,
radio-based wireless network technology.
Slides are mainly on the major security flaws that existed in the Bluetooth 4.0/4.1 (released 2010) specifically Bluetooth Low Energy(BLE) (a.k.a Bluetooth Smart) specification. BLE was introduced as part of Bluetooth 4.0 targeting low power devices which is quite different from classic Bluetooth. Later part contains major security enhancements that are introduced in BLE 4.2
2.4 GHz Open band
Globally available
Other devices include microwave ovens, cordless phones
Frequency hopping and Time Division Multiplexing
10 – 100 meter range
Up to 8 active devices can be in the same piconet
Bluetooth is a wireless technology for transferring data between two devices that are in close proximity with each other, and it has truly changed the world.
Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength radio transmissions in the ISM band from 2400–2480 MHz) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
4. Q&A
Short range wireless communications technology
Personal Area Networking “PAN”
Applications
Cable replacement
Voice & Data access points
Ad-hoc networking
Key features
Robustness
Low power
Low cost
Bluetooth Intro
5. Bluetooth Intro: History
1998:
BT SIG formed:: Ericsson, Toshiba, Intel,
Nokia, IBM
Name “Bluetooth” officially adopted
1999:
Core spec 1.0 released
First BT unplug fest
BT technology “Best of show technology
award” at COMDEX
2000:
First BT enabled mobile phone
First BT “single chip”
2001:
First BT enabled printer
First hands free car kit
BT SIG is formed as non profit, non stock
corporation
2002:
>500 BT qualifed products
First BT keyboard & mouse combo
2003:
Adoption of core spec 1.2
2004: Adoption of core spec 2.0 + EDR
2005: shipment of 5M BT chipsets per week
2006:
First BT enabled watch, > 1B BT devices
shipped
SIG announces integration of BT and WiMedia
UWB
2007: First BT enabled TV shipped
2008: > 2B BT devices shipped in 10 years
2009: BT Core spec 3.0 HS
2010:
BT4.0 core spec adopted (BLE)
PTS 4.1 launched incl BLE test suites
2011: “BT Smart” & “BT Smart” ready brands
29 new BT 4.0 profiles
2012: new profiles running & cycling data
monitoring
2013:
BT 4.1: IoT
Native BT support in Android
2014
BT 4.2: IP connectivity
Core spec 2.772 pages
6. Bluetooth Intro: Flavors
Flavor Subset name(s) Core spec
version
Max Data rate Voice Spec
Bluetooth
“Classic”
Basic Rate (BR) 1.x 721.2 kbps V 1999
Enhance Data Rate (EDR) 2.x + EDR 2.1 Mbps V 2004
Bluetooth
“High Speed”
High Speed (HS)
Alternate Mac PHY (AMP)
3.x + HS 54 Mbps
(802.11 AMP)
V 2009
Bluetooth
“Low Energy”
Ultra Low Power (ULP)
Bluetooth Low Energy (BLE)
BT Smart
BT Smart Ready
(Wibree)
4.x 1 Mbps X 2010
7. Bluetooth Intro: “Bluetooth”?
The idea for the Bluetooth name came from
Jim Kardach of Intel, who was reading a
historical novel about Vikings and King Harald
Blåtand at the time.
The name is the link to the distant past.
“Bluetooth” is derived from the nickname of
King Harald Blåtand a Dane who (somewhat
violently) brought together people in what
are now Denmark, Norway, and Sweden into
a single kingdom.
King Harald reigned from 958 to 986 and got
his nickname from his penchant for eating
blueberries.
9. Personal Area
Bluetooth
Local Area
Wi-Fi 802.11
Wide Area
Mobile 3G-4G LTE
Short range communications such
as mobile / PC accessories
CABLE REPLACEMENT
The center of the connected
home / enterprise
For applications that demand
ubiquitous coverage and high reliability
Bluetooth Market
Positioning
10. 10.000+ new BT enabled products listed in 2014
24% up from 2013
3B devices shipped in 2014
90% penetration in all mobile phones
Huge growth
Smart home
Consumer electronics
Bluetooth Market
Basic Figures
Source: Bluetooth SIG 2014 annual report
16. Intro
Bluetooth Market
Tech Side
Basic Rate (BR) & Extended Data Rate (EDR)
Bluetooth Low Energy
Future
Q&A
Bluetooth: Agenda
17. Universal Wireless Standard
Small & Cheap Low Power Wireless (<0.1W active power)
2.4GHz ISM band
Spread Spectrum Frequency Hopping
Avoid interference in ISM
1600 hops/s (625µs time slots)
Pseudo random sequence based on master BD address
TDD for send / receive
Modulation
BR: GFSK-Gaussian Frequency Shift Keying
EDR: PSK-Phase Shift Keying
BLE: GSFK
1 – 100mW
Range: up to 100m
Voice & Data
Secure
BD address: 48 bit IEEE registered
Bluetooth: Tech Side
18. BT SIG documents
Core Specification
How the tech works
Bluetooth protocols
Profiles
How the tech is used
How different parts of the spec shall be used to fulfill a
desired function
Bluetooth: Tech Side
19. Bluetooth Core Specification
BR/EDR Piconet
Piconet:
• Set of devices connected in ad hoc fashion
• 1 Master, 1..7 Slaves
• Master determining hopping pattern
• Slaves have to synchronize
• Each piconet has a unique hopping sequence
• Participation in piconet = synchronization to hopping
sequence
• >200 can be parkedM=Master
S=Slave
P=Parked (deepest sleep)
SB=Standby
Source: Free University Berlin
20. Bluetooth Core Specification
BR/EDR Forming a Piconet
• Master gives slaves its clock and BD addr.
• Hopping pattern:
• Determined by master BD (48bit)
• Hopping phase determined by clock
• Addressing
• AMA 3 bit
• PMA 8 bit
M=Master
S=Slave
P=Parked (deepest sleep)
SB=Standby
Source: Free University Berlin
22. Bluetooth Core Specification
BR/EDR Scatternet
• Linking of multiple co-located piconets through
sharing of common master or slave devices
• Communication between piconets
• Devices jumping back and forth between
piconets
M=Master
S=Slave
P=Parked (deepest sleep)
SB=Standby
Source: Free University Berlin
31. Profiles represent default solutions for a certain usage model
Vertical slice through the protocol stack
Basis for interoperability
Examples
Serial Port Profile
Headset Profile
Dial-up Networking Profile
Synchronization Profile
…
Bluetooth Core Specification
BR/EDR Profiles
Source: Bluetooth Specification version 4.2
32. Bluetooth Core Specification
BR/EDR Profiles Example: Headset
Source: Bluetooth Developer Portal & Bluetooth Headset Profile Specification V12
33. Bluetooth Core Specification
BR/EDR Profiles Example: Headset
Source: Bluetooth Developer Portal & Bluetooth Headset Profile Specification V12
Example headset scenario:
Incoming audio connection
In-band ring tone
35. Intro
Bluetooth Market
Tech Side
Basic Rate (BR) & Extended Data Rate (EDR)
Bluetooth Low Energy (BLE)
Future
Q&A
Bluetooth: Agenda
36. BLE targets even more:
Ultra-low peak, average and idle mode power
consumption (1/2 to 1/100 of BR)
Lower memory requirements
Ability to run for year(s) on coin cell batteries
Lower cost
Enhanced Range
Drawbacks
No voice
Lower data rates
Bluetooth Core Specification
Bluetooth Low Energy - Intro
Source: BLE Developers Handbook – Robin Heydon
37. BLE – how to reach the cost advantage
Low cost
... needs high volume
... needs very successful products
... largest volume consumer electronics is cell phone / smart phone
... reason of success of BT classic
…BLE will build on attach rate of BT classic
> 1B devices in a couple of years
Roll out already ongoing
Opens new markets
Phone accessories
Other devices such as Home Automation, TV, PC, BT classic upgrades
Bluetooth Core Specification
Bluetooth Low Energy - Intro
Source: BLE Developers Handbook – Robin Heydon
39. Bluetooth Core Specification
Bluetooth Low Energy - Intro
Source: BLE Developers Handbook – Robin Heydon
Low Energy: how low is “low”?
“Few years on button-cell battery”
~ 230 mAh at 3 V
Power a human being for 20s
40. BLE Asymmetric Design
Central “Bluetooth Smart Ready” – Peripheral
“Bluetooth Smart”
Advertiser – Scanner
Slave – Master
Server – Client (Attribute protocol)
Advertisers / Slaves / Servers
Low memory / processing power / ultra low power
consumption / Low cost
Bluetooth Core Specification
Bluetooth Low Energy - Intro
Source: BLE Developers Handbook – Robin Heydon
41. BLE – PHY Internals
GFSK
Clock period = 1𝛍s
40 Channels
-20dBm < Tx power < 10dBm
Rx sensitivity: -70dBm or better
Distance: 2.5m … 40m ... 250m
Bluetooth Core Specification
Bluetooth Low Energy - PHY
Source: BLE Developers Handbook – Robin Heydon
42. BLE – Link Layer
Standby: Inactive
Advertising: Transmit
Advertising packets
Broadcast packets
Scanning:
Receive advertising packets
Initiating:
Initiate a connection
Connected:
Sub-states: Master or Slave
Bluetooth Core Specification
Bluetooth Low Energy - LC
Source: BLE Developers Handbook – Robin Heydon
44. BLE – Adaptive Frequency Hopping
37 channels
Next Frequency:
hop = 5…16
Bluetooth Core Specification
Bluetooth Low Energy - AFH
Source: BLE Developers Handbook – Robin Heydon
Hop = 13
45. BLE – AFH
Adaptive
Frequency
Hopping
Bluetooth Core Specification
Bluetooth Low Energy - AFH
Source: BLE Developers Handbook – Robin Heydon
AFH enabled AFH disabled
46. BLE – Connection Setup
Connection request packet includes (among others):
Access Address to be used in the connection
CRC initialization value
Transmit window size
Transmit window offset
Connection interval
Slave latency
Supervision timeout
Adaptive frequency-hopping channel map
Frequency-hop algorithm increment
Sleep clock accuracy
Bluetooth Core Specification
Bluetooth Low Energy
Source: BLE Developers Handbook – Robin Heydon
47. Connectionless model
No cable replacement anymore
Transient connections
Quickly create connection
Do something & Disconnect
E.g. State notification every 5 minutes
Only requires radio activity < 1s per day
Radio OFF 99.999% of the time
Single connect / data / disconnect in about 3ms
Bluetooth Core Specification
Bluetooth Low Energy
Source: BLE Developers Handbook – Robin Heydon
48. Bluetooth Core Specification
Bluetooth Low Energy: Architecture
Source: BLE Developers Handbook – Robin Heydon
Characteristics (UUID) & Services
Discovery, connection, bonding, privacy
Types of profiles and how they are used
Rules for accessing data (att=labeled bits of
data)
Mux, Flow control
HCI
Advertising, Scanning, conn mgt, CRC
GFSK / 1 bit = 1 us
59. Bluetooth Future:
Bluetooth “Smart Ready”
Source: Bluetooth SIG: Bluetooth Smart Ready devices
….
39 devices
• Apple iPad, iPhone, MacBook, Mac mini
• Google OnHub
• …
61. Bluetooth “Mesh” networking
Extend range
Control up to 64k BLE devices 100m .. Several km
Device grouping
Proposed by CSR (now Qualcomm)
Expected release: 2016
Bluetooth Future:
Bluetooth “Mesh”
Source: Bluetooth SIG: Bluetooth Smart devices
63. BT core specification: TODO
SIG Annual report 2014: https://www.bluetooth.org/en-us/Documents/Annual_Report_2014.pdf
SIG history: http://www.bluetooth.com/Pages/History-of-Bluetooth.aspx
ABI research: https://www.abiresearch.com/press/more-than-30-billion-devices-will-wirelessly-conne/
ABI research: https://www.abiresearch.com/market-research/service/internet-of-everything/
Bluetooth Security: https://courses.cs.washington.edu/courses/cse466/01au/Projects/BluetoothSecurity.ppt
Bluetooth Low Energy: The Developer’s Handbook – Robin Heydon
http://www.amazon.com/Bluetooth-Low-Energy-Developers-Handbook/dp/013288836X
Android BLE development API
http://developer.android.com/guide/topics/connectivity/bluetooth-le.html
iOS BLE development API
https://developer.apple.com/library/ios/documentation/NetworkingInternetWeb/Conceptual/CoreBluetooth_concepts
References
Editor's Notes
Q&A
Who owns 1 or more BT devices?
What do you use it for?
Yes, 3B devices in 2014 alone
Membership:
Adopter = free (free license tech & trademarks, license PTS)
Associate = drive and influence spec through participation in working groups intelligence reports + discount on listing fees
Universal: France & Japan adapted their rules
Secure: topic on its own
From the lowest layers, security is embedded
Up to 128 bit encryption keys
Inadequate for serious security (money transfers), need additional security in higher layers
Good enough for non security critical interactions
PAN distance reduces risks
COST: Low Cost (original target <5$)
Park;
No AM address anymore
only listens to beacons (up to 41s) & L2CAP broadcast
Must be un-parked
Max 4096 parked devices
Some interop issues
AMA = Active member address
PMA = parked member address
Here: ACL BR only
Others: SCO, eSCO, ID, NULL, POLL, FHS, some mixed data/voice
Next frequency calculated based on (BD addr master, current clock, AFH parameters, sequence selection)
3 ways to enter AFH
Self assessment
Host controlled
Peer controlled
Note:
HID (now aldo in ULP)
A2DP
HFP
HSP
Very short packages (8 – 27 bytes)
1 Mbps
Advanced sniff sub-rating to achieve ultra low duty cycles
AFH (common with BR)
Host control: more responsibility to the host
Latency: 6ms (conn setup, data transfer)
Range: increased modulation index => range > 100m
Robustness: CRC 24 bit on all packets
Security: AES-128 bit encryption using CCM (encryption & authentication)
Topology: 32 bit member address > 4 billion devices
BLE is SLOW!
Reasons:
Low cost (extreme high volumes for devices that are not wireless today)
ISM band (bad propagation characteristics – water… / body absorption …) but FREE and available
No IP licensing cost (FRAND = Fair Reasonable and non discriminatory terms)
Ultra low power
BLE is SLOW!
Reasons:
Low cost (extreme high volumes for devices that are not wireless today)
ISM band (bad propagation characteristics – water… / body absorption …) but FREE and available
No IP licensing cost (FRAND = Fair Reasonable and non discriminatory terms)
Ultra low power
Central “Mothership”: Smartphone, notebook, tablet
Peripheral: Heart monitor, thermometer
LC layer
LC layer
Channels 0..8 are marked BAD
HOP = 13
Note the AFH algo increment
Controller = Physical device
PHY
GFSK (freq shift keying)
1bit = 1 micro-second
Link Layer
Advertising, scanning
Create & maintain connections
CRC
HOST = SW Stack
L2CAP
Multiplexing layer
Flow control
SAR (not used for BLE)
Attribute Protocol
Set of rules for accessing data on a peer device
Attribute = labeled bits of data (ID, type, value) + permissions
Attributes can be READ/WRITTEN
Both client & server can initiate communication with acked or unacked message
Security Manager
Security manager protocol
Pairing (trust another device) & key distribution (for use when they later reconnect)
Generic Attribute Profile
Defines the types of profiles and how they are used
Generic Access Profile:
Defines how devices discover, connect & present useful information to the users
How to create a permanent relationship called “bonding”
Concept of “privacy” (random addresses in time)
Application layer
Defines characteristics, service, profile (each built on top of Generic Attributes Profile)
Characteristic = a bit of data that has a known format labeled with a UUID (computer readable format)
Service = human readable specification of a set of characteristics and their behavior
Apps = Applications using the stack
Single chip:
Lowest cost
But SW in ROM… so need huge volumes
2 Chip:
Cell phones
PCs
3 Chip:
Development setups
Note:
HID (now aldo in ULP)
A2DP
HFP
HSP
SMART READY = Backwards compatible with Classic Bluetooth:
“Dual mode” radio: BLE + BR/EDR
SMART: BLE ONLY
“Drones around the mother ship” – peripherals
Data collectors
Sensors
Can remain paired with Smart Ready devices even when not used for hours or days
Can remain in sleep indefinitely
Can wake from sleep in an instant to share data
E.g. heart rate monitor can be worn for hours yet send only data when heart rate reaches certain threshold