SlideShare a Scribd company logo
Bluetooth SIG Proprietary and Confidential 1Bluetooth SIG Proprietary and Confidential 1
Click to edit Master title style
Click to edit Master subtitle style
Appcessories
Bridging the Digital to the Physical
Bluetooth SIG Proprietary and Confidential 2Bluetooth SIG Proprietary and Confidential 2
What’s In It For Me?
• Understand the opportunity
– Great potential for growth and monetization with
appcessories
– Bluetooth technology‟s role
• What a sample Bluetooth implementation
looks like
– From „profiles‟ and use cases to code
• Where to find more resources
– Hint: developer.bluetooth.org
Bluetooth SIG Proprietary and Confidential 3Bluetooth SIG Proprietary and Confidential 3
Digital and Physical Worlds Collide!
Bluetooth SIG Proprietary and Confidential 4Bluetooth SIG Proprietary and Confidential 4
Appcessories = Application + Accessory
They are complementary devices that enable people
to interact with technology like never before by
creating physical experiences to strengthen the digital
experience
What Is An Appcessory?
MobiPlex - SwingTIP
What makes Bluetooth a good fit
for Appcessories?
 Performance
 THE Standard for device
connectivity
Bluetooth SIG Proprietary and Confidential 5Bluetooth SIG Proprietary and Confidential 5
1,000,000,000 Devices*
Why Should I Care?
1,000,000,000x Applications
* 2012 ANALYSIS OF THE BLUETOOTH MARKET AND INDUSTRY, ABI Research
Bluetooth SIG Proprietary and Confidential 6Bluetooth SIG Proprietary and Confidential 6
Let Me Share a Story…
Bluetooth SIG Proprietary and Confidential 7Bluetooth SIG Proprietary and Confidential 7
Bluetooth – Bridging the Gap
App for the
Phone
Sensor-based
device for the
Lock
For the
Connection
• Well defined specs and protocols
• Standard way to implement
solutions
Bluetooth SIG Proprietary and Confidential 8Bluetooth SIG Proprietary and Confidential 8
Smart Device Profiles – Defining the Use Cases
A Generic Attribute Profile
(GATT) is a description of how a
device functions for a given
scenario/use case
Generic Attribute Profile
Service
Value
Characteristic
Value
Value
Value
Characteristic
Value
Value
First thing we need to do is to define the
use cases…
Bluetooth SIG Proprietary and Confidential 9Bluetooth SIG Proprietary and Confidential 9
Profile for the Lock Mechanism
What is your use case? Let’s focus on the
Password-enabled scenario
Admin User Lock
Turn ‘on’ PWD
PWD ‘on’ AK
Change PWD
Send Admin PWD
Admin PWD
Send Good/Bad
New User PWD
Send User PWD
Change AK
In this flow, we will assume that the Admin PWD given is correct
Encrypted
Encrypted
• We want an admin to be able to turn passwords on/off
• We want an admin to be able to send an ‘admin’ password, which can then be used to set the
‘user’ password
Bluetooth SIG Proprietary and Confidential 10Bluetooth SIG Proprietary and Confidential 10
Service Definition for the Lock Mechanism
High-level sample profile
Lock Mechanism Profile
Lock Service
Yes
Locked
…
Code Service
ON
Status
12345
User Code
54321
Admin Code
• Use case scenarios are
important to define
– Design decisions are important to your
scenario(s)
– Lock Service – is it simply a toggle?
– Code Service – are we covering all of the
right use cases?
• Quick word on Adopted
Profiles…
– Proximity is an example
– Contains a „link loss‟, an „immediate alert
level‟, and a „transmit power‟ service
– Can easily add those services to your
„custom‟ profile‟.
Bluetooth SIG Proprietary and Confidential 11Bluetooth SIG Proprietary and Confidential 11
Attribute Tables for Lock Mechanism
Handle Type Value Permissions
1 «Primary Service» «Code Service» --
2 «Status» {r/w, 3, «Value for Status»} Read/Write
3 «Value for Status» “ON” --
4 «User Code» {r/w, 5, «Value for Code»} Read/Write
5 «Value for Code» “12345” --
6 «Admin Code» {r/w, 7, «Value for Code»} Read/Write
7 «Value for Code» “54321” --
• Smart Device stores Service data in
an Attribute Table
– Implemented on the actual Smart Device to
store data
• Structure defined by GATT
– Every entry in the table is considered an
attribute
– Service, Characteristic, Value, etc
Bluetooth SIG Proprietary and Confidential 12Bluetooth SIG Proprietary and Confidential 12
Smart Ready Platforms and Profiles
When creating apps for modern
smartphone platforms, many
Bluetooth details are abstracted away
by the underlying SDK
• In many cases, still requires
knowledge of the profile.
• Each platform has their own
SDK and are a bit different
– Microsoft, Apple, Blackberry, Google
• Refer to the SDK docs of the
platform you are targeting
Generic Attribute Profile
Service
Value
Characteristic
Value
Value
Value
Characteristic
Value
Value
Bluetooth SIG Proprietary and Confidential 13Bluetooth SIG Proprietary and Confidential 13
• Smart Device Discovery
Typical Bluetooth Application Flow
Smart Device Advertises Itself
Smart Ready Hub Scans for Advertisements
Smart Ready Hub requests a
Connection
Smart Device accepts Connection
request
• Smart Device Connection to Smart Ready Hub
Bluetooth SIG Proprietary and Confidential 14Bluetooth SIG Proprietary and Confidential 14
• Interacting with Services
Typical Bluetooth Application Flow
– Smart Ready Hub can look at
services and the values they contain
in Smart Devices
– Smart Ready Hub can send
commands to the Smart Device
services
– Smart Ready Hub can receive
commands and updates from the
Smart Device
• Requires the services to be configured
properly on the Smart Device
Bluetooth SIG Proprietary and Confidential 15Bluetooth SIG Proprietary and Confidential 15
Lockitron – Not Just a Story
• Turn your mobile phone into a
key.
• Send permanent or temporary
virtual keys to family, friends and
house guests.
• Your mobile phone can be better
than a key – keep it in your
pocket.
Keyless entry with your phone
– Bluetooth low energy – “…the only wireless technology we can keep on for extended
periods and is integrated directly into mobile phones.”
– “With Bluetooth low energy, we can carry out commands without the user tapping the
app.”
Cameron Robertson, Founder
Bluetooth SIG Proprietary and Confidential 16Bluetooth SIG Proprietary and Confidential 16
Bridging the Digital to the Physical
Internet
Connected
Native APIs
for
applications
®
Bluetooth SIG Proprietary and Confidential 17Bluetooth SIG Proprietary and Confidential 17
Implementation – Getting Started
• Texas Instruments CC2541
– Single-chip single-mode Bluetooth low energy
System-on-a-Chip
– Contains radio, MCU, stack, profiles, applications,
and on-chip peripherals – everything needed for
your product!
• CC2541 Sensor Tag Kit
– Fully working Bluetooth low energy peripheral
based on CC2541
– Contains sensors for temperature, humidity,
accelerometer, magnetometer
– Enables app developers to quickly develop
prototype Bluetooth low energy software
• CC2541 Mini Development Kit
– Includes CC2541 Keyfob, USB Dongle, and
Debugger
– Enables CC2541 embedded software development
Bluetooth SIG Proprietary and Confidential 18Bluetooth SIG Proprietary and Confidential 18
Implementation – TI iOS SensorTag App
• Targeting Smart Phone App Developers
• Limitless App Possibilities
– Health and fitness, medical, educational tools, toys,
remote controls, mobile phone accessories, and
proximity.
• The CC2541 SensorTag kit shortens the
design time for Bluetooth low energy
app development from months to hours
– No embedded software design knowledge required.
– The SensorTag includes all SW needed for App
development
– TI has a SensorTag App on the App Store providing
developers with easy access to the tools they need.
– iOS Example App Source Code available for
download at http://ti.com/sensortag
Bluetooth SIG Proprietary and Confidential 19Bluetooth SIG Proprietary and Confidential 19
Implementation – Developing for iOS
• Development done using Xcode
• Xcode runs on OSX [Mountain] Lion
• Xcode and simulator is free
– BLE requires physical iOS device
• Physical device download requires Apple Developer Account
– Costs 99$ per year at developer.apple.com/programs/ios
Bluetooth SIG Proprietary and Confidential 20Bluetooth SIG Proprietary and Confidential 20
Implementation – iOS Source Code
• The communication is asynchronous
between app and iOS’s CoreBluetooth API
• We issue commands to CBCentralManager
and CBPeripheral
– [BLEUtility writeCharacteristic ...] 
– [peripheral writeValue:data ... ];
• Then act as delegate for CBCentralManager
– centralManagerDidUpdateState
– didDiscoverPeripheral
– didConnectPeripheral
• And for CBPeripheral
– didDiscoverServices
– didUpdateValueForCharacteristic
– didWriteValueForCharacteristic
• Delegates implement callbacks according to
a protocol. A design pattern used in iOS.
Bluetooth SIG Proprietary and Confidential 21Bluetooth SIG Proprietary and Confidential 21
Implementation – Developing for CC2541
• TI provides license-free Bluetooth low energy qualified
protocol stack and profiles
• Application development using C using IAR Embedded
Workbench
• Operating system abstraction layer (OSAL) with
priorized event handler, memory management, task
messaging, and NV drivers
• Sample applications included with SDK
– Standard profile applications such as Proximity, Heart Rate Sensor,
Glucose Sensor, etc...
– Custom profile applications such as SensorTag, Generic Peripheral,
Generic Central
• Additional Features
– Over-the-Air Firmware Updates
– Boot Image Manager- run multiple firmware images on one chip
– Hardware Abstraction Layer (HAL) drivers for on-chip peripherals including
SPI, UART, I2C, ADC, Timers
Bluetooth SIG Proprietary and Confidential 22Bluetooth SIG Proprietary and Confidential 22
Resources on the Portal
• Knowledge Center
– White papers
– Training Videos
• Development Resources
– Quick Start Kit
– Platform availability for Smart and
Smart Ready
– Recorded webinars on
development topics
– Links to SIG tools (PTS, etc.)
• Forums
• GATT specifications
http://developer.bluetooth.org
Bluetooth SIG Proprietary and Confidential 23Bluetooth SIG Proprietary and Confidential 23
Coming Soon – New Developer Resources
• Bluetooth Quick Start Kit v2
– Fundamentals for device makers new to
Bluetooth Low Energy
• GATT, GAP, ATT, adopted profiles, etc.
– Sample application
• “Hello Bluetooth”
– iOS, Android, Windows 8
• Bluetooth Application
Accelerators v1
– Accelerator for application developers
– Educational content
• Setting up your environment
• Tutorial/code walkthrough
– Fully commented sample code
• iOS initially http://developer.bluetooth.org
Bluetooth SIG Proprietary and Confidential 24Bluetooth SIG Proprietary and Confidential 24
Appcessories – Join the Movement
• Appcessory market is mainstream
– Great potential for growth and monetization
• Bluetooth can help you bridge the digital to
the physical
– Bluetooth is the a defacto standard
• Grab a development kit and start today

More Related Content

What's hot

Building a Raspberry Pi Robot Arm with .NET 5, Blazor and SignalR - HackSoc -...
Building a Raspberry Pi Robot Arm with .NET 5, Blazor and SignalR - HackSoc -...Building a Raspberry Pi Robot Arm with .NET 5, Blazor and SignalR - HackSoc -...
Building a Raspberry Pi Robot Arm with .NET 5, Blazor and SignalR - HackSoc -...
Peter Gallagher
 
Architectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud PlatformsArchitectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud Platforms
Roshan Kulkarni
 
Io t technologies
Io t technologies Io t technologies
Io t technologies
Umesh Bhat
 
Azure Percept Home Automation - .NET Liverpool - 28-10-21
Azure Percept Home Automation  - .NET Liverpool - 28-10-21Azure Percept Home Automation  - .NET Liverpool - 28-10-21
Azure Percept Home Automation - .NET Liverpool - 28-10-21
Peter Gallagher
 
CIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open Standards
CloudIDSummit
 
Intel® Developer Zone
Intel® Developer ZoneIntel® Developer Zone
Intel® Developer Zone
Intel Developer Zone Community
 
A Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of ThingsA Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of Things
Rick G. Garibay
 
Machine Learning and Analytics in the Cloud on IoT Data
Machine Learning and Analytics in the Cloud on IoT DataMachine Learning and Analytics in the Cloud on IoT Data
Machine Learning and Analytics in the Cloud on IoT Data
Intel® Software
 
The use case for Cassandra at Ping Identity
The use case for Cassandra at Ping IdentityThe use case for Cassandra at Ping Identity
The use case for Cassandra at Ping Identity
Ping Identity
 
Internet of Everything Development Using AllJoyn
Internet of Everything Development Using AllJoynInternet of Everything Development Using AllJoyn
Internet of Everything Development Using AllJoyn
AllSeen Alliance
 
Ibm_IoT_Architecture_and_Capabilities
Ibm_IoT_Architecture_and_CapabilitiesIbm_IoT_Architecture_and_Capabilities
Ibm_IoT_Architecture_and_Capabilities
IBM_Info_Management
 
One Stop iBeacon Solution and Implementation
One Stop iBeacon Solution and ImplementationOne Stop iBeacon Solution and Implementation
One Stop iBeacon Solution and Implementation
Avianto Tiyo
 
IoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreadsIoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreads
IndicThreads
 
IoT Node-Red Presentation
IoT  Node-Red PresentationIoT  Node-Red Presentation
IoT Node-Red Presentation
The IOT Academy
 
Integrated social solutions, the power and pitfalls of mashups
Integrated social solutions, the power and pitfalls of mashupsIntegrated social solutions, the power and pitfalls of mashups
Integrated social solutions, the power and pitfalls of mashups
Nordic APIs
 
Designing For Interoperability in Mobile
Designing For Interoperability in MobileDesigning For Interoperability in Mobile
Designing For Interoperability in Mobile
AllSeen Alliance
 
Cubeacon Smart Retail Industry with iBeacon Technology
Cubeacon Smart Retail Industry with iBeacon TechnologyCubeacon Smart Retail Industry with iBeacon Technology
Cubeacon Smart Retail Industry with iBeacon Technology
Avianto Tiyo
 
Softeq Development Corp.
Softeq Development Corp.Softeq Development Corp.
Softeq Development Corp.
Eugene Volkov
 
Iot secure connected devices indicthreads
Iot secure connected devices indicthreadsIot secure connected devices indicthreads
Iot secure connected devices indicthreads
IndicThreads
 
Creating an Internet of Everything
Creating an Internet of Everything Creating an Internet of Everything
Creating an Internet of Everything
AllSeen Alliance
 

What's hot (20)

Building a Raspberry Pi Robot Arm with .NET 5, Blazor and SignalR - HackSoc -...
Building a Raspberry Pi Robot Arm with .NET 5, Blazor and SignalR - HackSoc -...Building a Raspberry Pi Robot Arm with .NET 5, Blazor and SignalR - HackSoc -...
Building a Raspberry Pi Robot Arm with .NET 5, Blazor and SignalR - HackSoc -...
 
Architectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud PlatformsArchitectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud Platforms
 
Io t technologies
Io t technologies Io t technologies
Io t technologies
 
Azure Percept Home Automation - .NET Liverpool - 28-10-21
Azure Percept Home Automation  - .NET Liverpool - 28-10-21Azure Percept Home Automation  - .NET Liverpool - 28-10-21
Azure Percept Home Automation - .NET Liverpool - 28-10-21
 
CIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open Standards
 
Intel® Developer Zone
Intel® Developer ZoneIntel® Developer Zone
Intel® Developer Zone
 
A Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of ThingsA Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of Things
 
Machine Learning and Analytics in the Cloud on IoT Data
Machine Learning and Analytics in the Cloud on IoT DataMachine Learning and Analytics in the Cloud on IoT Data
Machine Learning and Analytics in the Cloud on IoT Data
 
The use case for Cassandra at Ping Identity
The use case for Cassandra at Ping IdentityThe use case for Cassandra at Ping Identity
The use case for Cassandra at Ping Identity
 
Internet of Everything Development Using AllJoyn
Internet of Everything Development Using AllJoynInternet of Everything Development Using AllJoyn
Internet of Everything Development Using AllJoyn
 
Ibm_IoT_Architecture_and_Capabilities
Ibm_IoT_Architecture_and_CapabilitiesIbm_IoT_Architecture_and_Capabilities
Ibm_IoT_Architecture_and_Capabilities
 
One Stop iBeacon Solution and Implementation
One Stop iBeacon Solution and ImplementationOne Stop iBeacon Solution and Implementation
One Stop iBeacon Solution and Implementation
 
IoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreadsIoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreads
 
IoT Node-Red Presentation
IoT  Node-Red PresentationIoT  Node-Red Presentation
IoT Node-Red Presentation
 
Integrated social solutions, the power and pitfalls of mashups
Integrated social solutions, the power and pitfalls of mashupsIntegrated social solutions, the power and pitfalls of mashups
Integrated social solutions, the power and pitfalls of mashups
 
Designing For Interoperability in Mobile
Designing For Interoperability in MobileDesigning For Interoperability in Mobile
Designing For Interoperability in Mobile
 
Cubeacon Smart Retail Industry with iBeacon Technology
Cubeacon Smart Retail Industry with iBeacon TechnologyCubeacon Smart Retail Industry with iBeacon Technology
Cubeacon Smart Retail Industry with iBeacon Technology
 
Softeq Development Corp.
Softeq Development Corp.Softeq Development Corp.
Softeq Development Corp.
 
Iot secure connected devices indicthreads
Iot secure connected devices indicthreadsIot secure connected devices indicthreads
Iot secure connected devices indicthreads
 
Creating an Internet of Everything
Creating an Internet of Everything Creating an Internet of Everything
Creating an Internet of Everything
 

Viewers also liked

Reporters And Photogs
Reporters And PhotogsReporters And Photogs
Reporters And Photogs
Columbia University
 
Social Media U
Social Media USocial Media U
Social Media U
Columbia University
 
Fashion Europe Net Franchise Hungary Thomas Wilhelm
Fashion Europe Net Franchise Hungary Thomas WilhelmFashion Europe Net Franchise Hungary Thomas Wilhelm
Fashion Europe Net Franchise Hungary Thomas Wilhelm
Thomas Wilhelm
 
Fashion Europe Net Fen Russian Thomas Wilhelm
Fashion Europe Net Fen Russian Thomas WilhelmFashion Europe Net Fen Russian Thomas Wilhelm
Fashion Europe Net Fen Russian Thomas WilhelmThomas Wilhelm
 
Proposta comunitat educativa (pla tic) edició
Proposta comunitat educativa (pla tic) edicióProposta comunitat educativa (pla tic) edició
Proposta comunitat educativa (pla tic) ediciópereruiz
 
The Future Journalist
The Future JournalistThe Future Journalist
The Future Journalist
Columbia University
 
Fashion Europe Net Fen Russian Thomas Wilhelm
Fashion Europe Net Fen Russian Thomas WilhelmFashion Europe Net Fen Russian Thomas Wilhelm
Fashion Europe Net Fen Russian Thomas WilhelmThomas Wilhelm
 
Presentation Bab 8 (Sejarah, Untuk 6 7 2009)
Presentation Bab 8 (Sejarah, Untuk 6 7 2009)Presentation Bab 8 (Sejarah, Untuk 6 7 2009)
Presentation Bab 8 (Sejarah, Untuk 6 7 2009)ngmannrm
 

Viewers also liked (8)

Reporters And Photogs
Reporters And PhotogsReporters And Photogs
Reporters And Photogs
 
Social Media U
Social Media USocial Media U
Social Media U
 
Fashion Europe Net Franchise Hungary Thomas Wilhelm
Fashion Europe Net Franchise Hungary Thomas WilhelmFashion Europe Net Franchise Hungary Thomas Wilhelm
Fashion Europe Net Franchise Hungary Thomas Wilhelm
 
Fashion Europe Net Fen Russian Thomas Wilhelm
Fashion Europe Net Fen Russian Thomas WilhelmFashion Europe Net Fen Russian Thomas Wilhelm
Fashion Europe Net Fen Russian Thomas Wilhelm
 
Proposta comunitat educativa (pla tic) edició
Proposta comunitat educativa (pla tic) edicióProposta comunitat educativa (pla tic) edició
Proposta comunitat educativa (pla tic) edició
 
The Future Journalist
The Future JournalistThe Future Journalist
The Future Journalist
 
Fashion Europe Net Fen Russian Thomas Wilhelm
Fashion Europe Net Fen Russian Thomas WilhelmFashion Europe Net Fen Russian Thomas Wilhelm
Fashion Europe Net Fen Russian Thomas Wilhelm
 
Presentation Bab 8 (Sejarah, Untuk 6 7 2009)
Presentation Bab 8 (Sejarah, Untuk 6 7 2009)Presentation Bab 8 (Sejarah, Untuk 6 7 2009)
Presentation Bab 8 (Sejarah, Untuk 6 7 2009)
 

Similar to Bw13 session2 app_dev_presenter_final

How to use Bluetooth® Smart to control your embedded device with a mobile device
How to use Bluetooth® Smart to control your embedded device with a mobile deviceHow to use Bluetooth® Smart to control your embedded device with a mobile device
How to use Bluetooth® Smart to control your embedded device with a mobile device
Anaren, Inc.
 
CIS13: Identity at Scale
CIS13: Identity at ScaleCIS13: Identity at Scale
CIS13: Identity at Scale
CloudIDSummit
 
Connecting devices to the internet of things
Connecting devices to the internet of thingsConnecting devices to the internet of things
Connecting devices to the internet of things
Bernard Kufluk
 
AWS Summit Auckland- Developing Applications for IoT
AWS Summit Auckland-  Developing Applications for IoTAWS Summit Auckland-  Developing Applications for IoT
AWS Summit Auckland- Developing Applications for IoT
Amazon Web Services
 
IoT cloud system implemented based on Azure services
IoT cloud system implemented based on Azure servicesIoT cloud system implemented based on Azure services
IoT cloud system implemented based on Azure services
Szymon Włodarczyk
 
IBM Bluemix Presentation.pptx
IBM Bluemix Presentation.pptxIBM Bluemix Presentation.pptx
IBM Bluemix Presentation.pptx
vishal choudhary
 
Without App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingWithout App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of Anything
Open Interconnect Consortium
 
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoTIoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
IoT Academy
 
Session 1908 connecting devices to the IBM IoT Cloud
Session 1908   connecting devices to the  IBM IoT CloudSession 1908   connecting devices to the  IBM IoT Cloud
Session 1908 connecting devices to the IBM IoT Cloud
PeterNiblett
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
Eurotech
 
IThome DevOps Summit - IoT、docker與DevOps
IThome DevOps Summit - IoT、docker與DevOpsIThome DevOps Summit - IoT、docker與DevOps
IThome DevOps Summit - IoT、docker與DevOps
Simon Su
 
Exploring the Azure IoT Ecosystem
Exploring the Azure IoT EcosystemExploring the Azure IoT Ecosystem
Exploring the Azure IoT Ecosystem
BizTalk360
 
El nodo
El nodoEl nodo
IoT: Connecting Devices and Manufacturing Equipment to the Cloud
IoT: Connecting Devices and Manufacturing Equipment to the CloudIoT: Connecting Devices and Manufacturing Equipment to the Cloud
IoT: Connecting Devices and Manufacturing Equipment to the Cloud
Michelle Devereux White
 
Join the Revolution: The Interconnected World with IBM Bluemix and IoT Founda...
Join the Revolution: The Interconnected World with IBM Bluemix and IoT Founda...Join the Revolution: The Interconnected World with IBM Bluemix and IoT Founda...
Join the Revolution: The Interconnected World with IBM Bluemix and IoT Founda...
Joy Patra
 
Intel SoC as a Platform to Connect Sensor Data to AWS
Intel SoC as a Platform to Connect Sensor Data to AWSIntel SoC as a Platform to Connect Sensor Data to AWS
Intel SoC as a Platform to Connect Sensor Data to AWS
Amazon Web Services
 
Introduction to ibm internet of things foundation
Introduction to ibm internet of things foundationIntroduction to ibm internet of things foundation
Introduction to ibm internet of things foundation
Bernard Kufluk
 
#IoTforReal Seminar slidedeck (Codit Belgium - Ghelamco Arena Gent)
#IoTforReal Seminar slidedeck (Codit Belgium - Ghelamco Arena Gent)#IoTforReal Seminar slidedeck (Codit Belgium - Ghelamco Arena Gent)
#IoTforReal Seminar slidedeck (Codit Belgium - Ghelamco Arena Gent)
Codit
 
OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...
OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...
OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...
Pôle Systematic Paris-Region
 
Delivering Network Innovation with SDN - Tom Nadeau
Delivering Network Innovation with SDN - Tom Nadeau Delivering Network Innovation with SDN - Tom Nadeau
Delivering Network Innovation with SDN - Tom Nadeau
scoopnewsgroup
 

Similar to Bw13 session2 app_dev_presenter_final (20)

How to use Bluetooth® Smart to control your embedded device with a mobile device
How to use Bluetooth® Smart to control your embedded device with a mobile deviceHow to use Bluetooth® Smart to control your embedded device with a mobile device
How to use Bluetooth® Smart to control your embedded device with a mobile device
 
CIS13: Identity at Scale
CIS13: Identity at ScaleCIS13: Identity at Scale
CIS13: Identity at Scale
 
Connecting devices to the internet of things
Connecting devices to the internet of thingsConnecting devices to the internet of things
Connecting devices to the internet of things
 
AWS Summit Auckland- Developing Applications for IoT
AWS Summit Auckland-  Developing Applications for IoTAWS Summit Auckland-  Developing Applications for IoT
AWS Summit Auckland- Developing Applications for IoT
 
IoT cloud system implemented based on Azure services
IoT cloud system implemented based on Azure servicesIoT cloud system implemented based on Azure services
IoT cloud system implemented based on Azure services
 
IBM Bluemix Presentation.pptx
IBM Bluemix Presentation.pptxIBM Bluemix Presentation.pptx
IBM Bluemix Presentation.pptx
 
Without App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingWithout App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of Anything
 
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoTIoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
 
Session 1908 connecting devices to the IBM IoT Cloud
Session 1908   connecting devices to the  IBM IoT CloudSession 1908   connecting devices to the  IBM IoT Cloud
Session 1908 connecting devices to the IBM IoT Cloud
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
 
IThome DevOps Summit - IoT、docker與DevOps
IThome DevOps Summit - IoT、docker與DevOpsIThome DevOps Summit - IoT、docker與DevOps
IThome DevOps Summit - IoT、docker與DevOps
 
Exploring the Azure IoT Ecosystem
Exploring the Azure IoT EcosystemExploring the Azure IoT Ecosystem
Exploring the Azure IoT Ecosystem
 
El nodo
El nodoEl nodo
El nodo
 
IoT: Connecting Devices and Manufacturing Equipment to the Cloud
IoT: Connecting Devices and Manufacturing Equipment to the CloudIoT: Connecting Devices and Manufacturing Equipment to the Cloud
IoT: Connecting Devices and Manufacturing Equipment to the Cloud
 
Join the Revolution: The Interconnected World with IBM Bluemix and IoT Founda...
Join the Revolution: The Interconnected World with IBM Bluemix and IoT Founda...Join the Revolution: The Interconnected World with IBM Bluemix and IoT Founda...
Join the Revolution: The Interconnected World with IBM Bluemix and IoT Founda...
 
Intel SoC as a Platform to Connect Sensor Data to AWS
Intel SoC as a Platform to Connect Sensor Data to AWSIntel SoC as a Platform to Connect Sensor Data to AWS
Intel SoC as a Platform to Connect Sensor Data to AWS
 
Introduction to ibm internet of things foundation
Introduction to ibm internet of things foundationIntroduction to ibm internet of things foundation
Introduction to ibm internet of things foundation
 
#IoTforReal Seminar slidedeck (Codit Belgium - Ghelamco Arena Gent)
#IoTforReal Seminar slidedeck (Codit Belgium - Ghelamco Arena Gent)#IoTforReal Seminar slidedeck (Codit Belgium - Ghelamco Arena Gent)
#IoTforReal Seminar slidedeck (Codit Belgium - Ghelamco Arena Gent)
 
OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...
OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...
OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...
 
Delivering Network Innovation with SDN - Tom Nadeau
Delivering Network Innovation with SDN - Tom Nadeau Delivering Network Innovation with SDN - Tom Nadeau
Delivering Network Innovation with SDN - Tom Nadeau
 

Recently uploaded

LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 

Recently uploaded (20)

LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 

Bw13 session2 app_dev_presenter_final

  • 1. Bluetooth SIG Proprietary and Confidential 1Bluetooth SIG Proprietary and Confidential 1 Click to edit Master title style Click to edit Master subtitle style Appcessories Bridging the Digital to the Physical
  • 2. Bluetooth SIG Proprietary and Confidential 2Bluetooth SIG Proprietary and Confidential 2 What’s In It For Me? • Understand the opportunity – Great potential for growth and monetization with appcessories – Bluetooth technology‟s role • What a sample Bluetooth implementation looks like – From „profiles‟ and use cases to code • Where to find more resources – Hint: developer.bluetooth.org
  • 3. Bluetooth SIG Proprietary and Confidential 3Bluetooth SIG Proprietary and Confidential 3 Digital and Physical Worlds Collide!
  • 4. Bluetooth SIG Proprietary and Confidential 4Bluetooth SIG Proprietary and Confidential 4 Appcessories = Application + Accessory They are complementary devices that enable people to interact with technology like never before by creating physical experiences to strengthen the digital experience What Is An Appcessory? MobiPlex - SwingTIP What makes Bluetooth a good fit for Appcessories?  Performance  THE Standard for device connectivity
  • 5. Bluetooth SIG Proprietary and Confidential 5Bluetooth SIG Proprietary and Confidential 5 1,000,000,000 Devices* Why Should I Care? 1,000,000,000x Applications * 2012 ANALYSIS OF THE BLUETOOTH MARKET AND INDUSTRY, ABI Research
  • 6. Bluetooth SIG Proprietary and Confidential 6Bluetooth SIG Proprietary and Confidential 6 Let Me Share a Story…
  • 7. Bluetooth SIG Proprietary and Confidential 7Bluetooth SIG Proprietary and Confidential 7 Bluetooth – Bridging the Gap App for the Phone Sensor-based device for the Lock For the Connection • Well defined specs and protocols • Standard way to implement solutions
  • 8. Bluetooth SIG Proprietary and Confidential 8Bluetooth SIG Proprietary and Confidential 8 Smart Device Profiles – Defining the Use Cases A Generic Attribute Profile (GATT) is a description of how a device functions for a given scenario/use case Generic Attribute Profile Service Value Characteristic Value Value Value Characteristic Value Value First thing we need to do is to define the use cases…
  • 9. Bluetooth SIG Proprietary and Confidential 9Bluetooth SIG Proprietary and Confidential 9 Profile for the Lock Mechanism What is your use case? Let’s focus on the Password-enabled scenario Admin User Lock Turn ‘on’ PWD PWD ‘on’ AK Change PWD Send Admin PWD Admin PWD Send Good/Bad New User PWD Send User PWD Change AK In this flow, we will assume that the Admin PWD given is correct Encrypted Encrypted • We want an admin to be able to turn passwords on/off • We want an admin to be able to send an ‘admin’ password, which can then be used to set the ‘user’ password
  • 10. Bluetooth SIG Proprietary and Confidential 10Bluetooth SIG Proprietary and Confidential 10 Service Definition for the Lock Mechanism High-level sample profile Lock Mechanism Profile Lock Service Yes Locked … Code Service ON Status 12345 User Code 54321 Admin Code • Use case scenarios are important to define – Design decisions are important to your scenario(s) – Lock Service – is it simply a toggle? – Code Service – are we covering all of the right use cases? • Quick word on Adopted Profiles… – Proximity is an example – Contains a „link loss‟, an „immediate alert level‟, and a „transmit power‟ service – Can easily add those services to your „custom‟ profile‟.
  • 11. Bluetooth SIG Proprietary and Confidential 11Bluetooth SIG Proprietary and Confidential 11 Attribute Tables for Lock Mechanism Handle Type Value Permissions 1 «Primary Service» «Code Service» -- 2 «Status» {r/w, 3, «Value for Status»} Read/Write 3 «Value for Status» “ON” -- 4 «User Code» {r/w, 5, «Value for Code»} Read/Write 5 «Value for Code» “12345” -- 6 «Admin Code» {r/w, 7, «Value for Code»} Read/Write 7 «Value for Code» “54321” -- • Smart Device stores Service data in an Attribute Table – Implemented on the actual Smart Device to store data • Structure defined by GATT – Every entry in the table is considered an attribute – Service, Characteristic, Value, etc
  • 12. Bluetooth SIG Proprietary and Confidential 12Bluetooth SIG Proprietary and Confidential 12 Smart Ready Platforms and Profiles When creating apps for modern smartphone platforms, many Bluetooth details are abstracted away by the underlying SDK • In many cases, still requires knowledge of the profile. • Each platform has their own SDK and are a bit different – Microsoft, Apple, Blackberry, Google • Refer to the SDK docs of the platform you are targeting Generic Attribute Profile Service Value Characteristic Value Value Value Characteristic Value Value
  • 13. Bluetooth SIG Proprietary and Confidential 13Bluetooth SIG Proprietary and Confidential 13 • Smart Device Discovery Typical Bluetooth Application Flow Smart Device Advertises Itself Smart Ready Hub Scans for Advertisements Smart Ready Hub requests a Connection Smart Device accepts Connection request • Smart Device Connection to Smart Ready Hub
  • 14. Bluetooth SIG Proprietary and Confidential 14Bluetooth SIG Proprietary and Confidential 14 • Interacting with Services Typical Bluetooth Application Flow – Smart Ready Hub can look at services and the values they contain in Smart Devices – Smart Ready Hub can send commands to the Smart Device services – Smart Ready Hub can receive commands and updates from the Smart Device • Requires the services to be configured properly on the Smart Device
  • 15. Bluetooth SIG Proprietary and Confidential 15Bluetooth SIG Proprietary and Confidential 15 Lockitron – Not Just a Story • Turn your mobile phone into a key. • Send permanent or temporary virtual keys to family, friends and house guests. • Your mobile phone can be better than a key – keep it in your pocket. Keyless entry with your phone – Bluetooth low energy – “…the only wireless technology we can keep on for extended periods and is integrated directly into mobile phones.” – “With Bluetooth low energy, we can carry out commands without the user tapping the app.” Cameron Robertson, Founder
  • 16. Bluetooth SIG Proprietary and Confidential 16Bluetooth SIG Proprietary and Confidential 16 Bridging the Digital to the Physical Internet Connected Native APIs for applications ®
  • 17. Bluetooth SIG Proprietary and Confidential 17Bluetooth SIG Proprietary and Confidential 17 Implementation – Getting Started • Texas Instruments CC2541 – Single-chip single-mode Bluetooth low energy System-on-a-Chip – Contains radio, MCU, stack, profiles, applications, and on-chip peripherals – everything needed for your product! • CC2541 Sensor Tag Kit – Fully working Bluetooth low energy peripheral based on CC2541 – Contains sensors for temperature, humidity, accelerometer, magnetometer – Enables app developers to quickly develop prototype Bluetooth low energy software • CC2541 Mini Development Kit – Includes CC2541 Keyfob, USB Dongle, and Debugger – Enables CC2541 embedded software development
  • 18. Bluetooth SIG Proprietary and Confidential 18Bluetooth SIG Proprietary and Confidential 18 Implementation – TI iOS SensorTag App • Targeting Smart Phone App Developers • Limitless App Possibilities – Health and fitness, medical, educational tools, toys, remote controls, mobile phone accessories, and proximity. • The CC2541 SensorTag kit shortens the design time for Bluetooth low energy app development from months to hours – No embedded software design knowledge required. – The SensorTag includes all SW needed for App development – TI has a SensorTag App on the App Store providing developers with easy access to the tools they need. – iOS Example App Source Code available for download at http://ti.com/sensortag
  • 19. Bluetooth SIG Proprietary and Confidential 19Bluetooth SIG Proprietary and Confidential 19 Implementation – Developing for iOS • Development done using Xcode • Xcode runs on OSX [Mountain] Lion • Xcode and simulator is free – BLE requires physical iOS device • Physical device download requires Apple Developer Account – Costs 99$ per year at developer.apple.com/programs/ios
  • 20. Bluetooth SIG Proprietary and Confidential 20Bluetooth SIG Proprietary and Confidential 20 Implementation – iOS Source Code • The communication is asynchronous between app and iOS’s CoreBluetooth API • We issue commands to CBCentralManager and CBPeripheral – [BLEUtility writeCharacteristic ...]  – [peripheral writeValue:data ... ]; • Then act as delegate for CBCentralManager – centralManagerDidUpdateState – didDiscoverPeripheral – didConnectPeripheral • And for CBPeripheral – didDiscoverServices – didUpdateValueForCharacteristic – didWriteValueForCharacteristic • Delegates implement callbacks according to a protocol. A design pattern used in iOS.
  • 21. Bluetooth SIG Proprietary and Confidential 21Bluetooth SIG Proprietary and Confidential 21 Implementation – Developing for CC2541 • TI provides license-free Bluetooth low energy qualified protocol stack and profiles • Application development using C using IAR Embedded Workbench • Operating system abstraction layer (OSAL) with priorized event handler, memory management, task messaging, and NV drivers • Sample applications included with SDK – Standard profile applications such as Proximity, Heart Rate Sensor, Glucose Sensor, etc... – Custom profile applications such as SensorTag, Generic Peripheral, Generic Central • Additional Features – Over-the-Air Firmware Updates – Boot Image Manager- run multiple firmware images on one chip – Hardware Abstraction Layer (HAL) drivers for on-chip peripherals including SPI, UART, I2C, ADC, Timers
  • 22. Bluetooth SIG Proprietary and Confidential 22Bluetooth SIG Proprietary and Confidential 22 Resources on the Portal • Knowledge Center – White papers – Training Videos • Development Resources – Quick Start Kit – Platform availability for Smart and Smart Ready – Recorded webinars on development topics – Links to SIG tools (PTS, etc.) • Forums • GATT specifications http://developer.bluetooth.org
  • 23. Bluetooth SIG Proprietary and Confidential 23Bluetooth SIG Proprietary and Confidential 23 Coming Soon – New Developer Resources • Bluetooth Quick Start Kit v2 – Fundamentals for device makers new to Bluetooth Low Energy • GATT, GAP, ATT, adopted profiles, etc. – Sample application • “Hello Bluetooth” – iOS, Android, Windows 8 • Bluetooth Application Accelerators v1 – Accelerator for application developers – Educational content • Setting up your environment • Tutorial/code walkthrough – Fully commented sample code • iOS initially http://developer.bluetooth.org
  • 24. Bluetooth SIG Proprietary and Confidential 24Bluetooth SIG Proprietary and Confidential 24 Appcessories – Join the Movement • Appcessory market is mainstream – Great potential for growth and monetization • Bluetooth can help you bridge the digital to the physical – Bluetooth is the a defacto standard • Grab a development kit and start today