SlideShare a Scribd company logo
An Introduction to Bluetooth Mesh
Martin Woolley, Bluetooth SIG @bluetooth_mdw
Amsterdam | April 2-3, 2019
point-to-point 1:1
BR/EDR
broadcast 1:m
Low Energy (LE)
many to many m:m
Mesh
Bluetooth now comes in three delicious flavours
relationship between Bluetooth technologies
Bluetooth BR/EDR
Bluetooth mesh networking
Bluetooth Low EnergyRADIO
NETWORKING
Bluetooth Mesh
Networks
multi-hop, multi-path, multicast
Bluetooth Mesh
Node Network Roles
relay nodes
R
RR
R = Relay function on
Relays retransmit messages so that they
can travel further, in a number of “hops”
Some nodes can act as “relays” however
Messages get sent to other nodes that are
in direct radio range of the publishing node
friend nodes and low power nodes
Low Power Node
(sensor)
Friend
Low power nodes (LPNs) are highly power
constrained
To avoid the need to operate at a high(er)
duty cycle to receive messages from the
mesh, an LPN works with a Friend
Friend nodes store messages addressed to
LPNs they are friends with and forward
them when the LPN occasionally polls
friend nodes and low power nodes
Low Power Node
(sensor)
Friend
To: Sensor
“set temperature thresholds”
Low power nodes (LPNs) are highly power
constrained
To avoid the need to operate at a high(er)
duty cycle to receive messages from the
mesh, an LPN works with a Friend
Friend nodes store messages addressed to
LPNs they are friends with and forward
them when the LPN occasionally polls
friend nodes and low power nodes
STORED
MESSAGE(S)
Low Power Node
(sensor)
Friend
To: Sensor
“set temperature thresholds”
Low power nodes (LPNs) are highly power
constrained
To avoid the need to operate at a high(er)
duty cycle to receive messages from the
mesh, an LPN works with a Friend
Friend nodes store messages addressed to
LPNs they are friends with and forward
them when the LPN occasionally polls
friend nodes and low power nodes
STORED
MESSAGE(S)
“do you have any
messages for me?”
Low Power Node
(sensor)
Friend
To: Sensor
“set temperature thresholds”
Low power nodes (LPNs) are highly power
constrained
To avoid the need to operate at a high(er)
duty cycle to receive messages from the
mesh, an LPN works with a Friend
Friend nodes store messages addressed to
LPNs they are friends with and forward
them when the LPN occasionally polls
friend nodes and low power nodes
STORED
MESSAGE(S)
“do you have any
messages for me?”
Low Power Node
(sensor)
Friend
To: Sensor
“set temperature thresholds”
To: Sensor
“set temperature thresholds”
Low power nodes (LPNs) are highly power
constrained
To avoid the need to operate at a high(er)
duty cycle to receive messages from the
mesh, an LPN works with a Friend
Friend nodes store messages addressed to
LPNs they are friends with and forward
them when the LPN occasionally polls
proxy nodes
P
Bluetooth low energy devices like
smartphones can communicate with a mesh
network via a proxy node
LE GATT
MESH
proxy nodes
Proxy
Bluetooth low energy devices like
smartphones can communicate with a mesh
network via a proxy node
mesh monitoring and control applications
LE GAP and GATT
MESH
Bluetooth Mesh
Communication and
Interaction
messages and state
State: OnOff = Off
State: OnOff = Off State: OnOff = Off
nodes communicate with each other by
sending messages
access messages operate on state values
SET - change of state
GET - retrieve state value
STATUS - notify current state
ACK vs UNACK
nodes have state values which reflect
their condition (e.g. ON or OFF)
messages and state
State: OnOff = Off
State: OnOff = Off State: OnOff = OffState: OnOff = On
State: OnOff = On
State: OnOff = On
nodes communicate with each other by
sending messages
access messages operate on state values
SET - change of state
GET - retrieve state value
STATUS - notify current state
ACK vs UNACK
nodes have state values which reflect
their condition (e.g. ON or OFF)
the publish/subscribe communication model
Kitchen Dining Room Hallway Bedroom Garden
Subscribe
Publish
Bluetooth Mesh
Node Composition
node composition
a node consists of an arrangement of
elements
models
states
each element has its own address
NODE
ELEMENT ELEMENT
MODEL
STATE
STATE
STATE
MODEL
STATE
MODEL
STATE
STATE
MODEL
STATE
note: a model is sometimes owned by multiple elements
models
ServerGeneric OnOff
Server
Generic OnOff
Client
define node functionality
define states, messages, state transitions
and behaviors
client, server and control types
generics such as onoff client and server
lighting, sensors, scenes & time
node composition
single node
3 elements
multiple models and states
0x0100 0x0101 0x0102
node
elements
models
states
generic onoff server
light lightness server
light lightness actual
light lightness last
light lightness range
generic onoff
Bluetooth Mesh
Security
devices and network membership
only members of the same network can
talk to each other
Bluetooth mesh networks are secure
a security process called provisioning
makes a device a member of a network
devices and network membership
Provisioner: converting
a device to a node
Device is now a
node on the network
only members of the same network can
talk to each other
Bluetooth mesh networks are secure
a security process called provisioning
makes a device a member of a network
Bluetooth mesh: Security
• Mandatory, cannot be reduced
• Encryption and authentication
• Separate security for network and each application
• Area isolation
• Message obfuscation
• Protection from replay and trashcan attacks
• Secure device provisioning
network key (netkey)
origin: provisioning
use: derivation of other keys
encryption key
origin: derived from netkey
using the k2 function
use: secures data
at the network
layer
privacy key
origin: derived from
netkey
using the k2 function
use: obfuscation
of network header
information
ref: mesh profile 1.0 section 2.3.9.1
application key
(appkey)
origin: created by
the config. client
and provided to nodes
after provisioning
use: secures
application data
at the upper transport
layer
Bound to one or more
models.
device key (devkey)
origin: established
during provisioning
use: secures communication
between the config. client
and individual node
appkey is bound to a netkey
devkey is bound to all
netkeys known to a node
Bluetooth mesh
Anatomy of a smart lighting system
Switch Models Light Models Sensor Models
Switch Models Light Models Sensor Models
Generic On/Off Server
Switch Models Light Models Sensor Models
Generic On/Off Client Generic On/Off Server
Switch Models Light Models Sensor Models
Light Lightness Server
Light HSL Server
Generic On/Off Client Generic On/Off Server
Switch Models Light Models Sensor Models
Light Lightness Server
Light HSL Server
Generic On/Off Client Generic On/Off Server
Light LC Server
Sensor Server
Switch Models Light Models Sensor Models
Light Lightness Server
Light HSL Server
Generic On/Off Client Generic On/Off Server
Light LC Server
Sensor Server
State Binding
Bluetooth mesh
Scalability
scalability
max 32,767 nodes per network
The fastest low power radio
small, highly optimised packets
hundreds of multicast messages per
second
multicast: 1 message can control many devices
point to point range hundreds of metres
scalability and the fundamentals of RF
radio is a shared medium
collisions are what limits scalability
scalability and the fundamentals of RF
an anonymous technology
(not Bluetooth)
e.g. 250 kb/s
scalability and the fundamentals of RF
Bluetooth mesh
using Bluetooth Low Energy
1000 kb/s
less air time per packet
so more capacity for work
scalability and the fundamentals of RF
Bluetooth mesh
much smaller packets
less airtime
fewer collisions
more “work”
29 octets payload
scalability and the fundamentals of RF
Bluetooth mesh
using Bluetooth Low Energy
3 x radio channels
3 x more capacity
used for enhanced reliability
Bluetooth Mesh
Demonstration
Bluetooth Mesh
What next?
Bluetooth SIG Resources - Reading Material
Bluetooth SIG Resources - hands-on education
Bluetooth Mesh Developer Study
Guide
Mesh Proxy Kit
Unthinkably ConnectedUnthinkably Connected
3 April 2019 40/ Bluetooth SIG Proprietary
Twitter: @bluetooth_mdw
questions?
kevin.ke@oneplus.net.

More Related Content

What's hot

Bluetooth
BluetoothBluetooth
Bluetooth
Bhushan Bagde
 
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
NEEVEE Technologies
 
Bluetooth
BluetoothBluetooth
Bluetooth
Hina Saxena
 
Bluetooth low energy(ble) wireless technology
Bluetooth low energy(ble) wireless technologyBluetooth low energy(ble) wireless technology
Bluetooth low energy(ble) wireless technologyLin Steven
 
Bluetooth
BluetoothBluetooth
Bluetooth
mpriyanka259
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
Ramasubbu .P
 
Bluetooth Power point presentation
Bluetooth Power point presentationBluetooth Power point presentation
Bluetooth Power point presentation
jogiparthyramya
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Siva Pradeep Bolisetti
 
Iot ble and_beacons_2015_nov28
Iot ble and_beacons_2015_nov28Iot ble and_beacons_2015_nov28
Iot ble and_beacons_2015_nov28
Ravikiran HV
 
Bluetooth technology by polite group
Bluetooth technology by polite groupBluetooth technology by polite group
Bluetooth technology by polite group
politegcuf
 
Bluetooth
BluetoothBluetooth
Bluetooth
Kashyap Shah
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
AJAL A J
 
Bluetooth ppt
Bluetooth pptBluetooth ppt
Bluetooth ppt
Kirti Kausik Kumar
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic VersionAyesha Saeed
 
Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)
Biplob Orton
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
Hina Saxena
 

What's hot (20)

BLUETOOTH _TECHNOLOGY
BLUETOOTH _TECHNOLOGYBLUETOOTH _TECHNOLOGY
BLUETOOTH _TECHNOLOGY
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth low energy(ble) wireless technology
Bluetooth low energy(ble) wireless technologyBluetooth low energy(ble) wireless technology
Bluetooth low energy(ble) wireless technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
Bluetooth Power point presentation
Bluetooth Power point presentationBluetooth Power point presentation
Bluetooth Power point presentation
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
 
Iot ble and_beacons_2015_nov28
Iot ble and_beacons_2015_nov28Iot ble and_beacons_2015_nov28
Iot ble and_beacons_2015_nov28
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
 
Bluetooth technology by polite group
Bluetooth technology by polite groupBluetooth technology by polite group
Bluetooth technology by polite group
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
 
Bluetooth ppt
Bluetooth pptBluetooth ppt
Bluetooth ppt
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)Wireless Personal area networks (Wpan)
Wireless Personal area networks (Wpan)
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 

Similar to Martin Woolley - An introduction to Bluetooth mesh - Codemotion Amsterdam 2019

Module 2_part 2.pptx
Module 2_part 2.pptxModule 2_part 2.pptx
Module 2_part 2.pptx
NIKHILAS12
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
Sweta Kumari Barnwal
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
Karthik Ak
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
DeepaDasarathan
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabha
Suprabha Sahoo
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routingr123027
 
Osi model with neworking overview
Osi model with neworking overviewOsi model with neworking overview
Osi model with neworking overview
Sripati Mahapatra
 
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Aswini Badatya
 
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Saumendra Pradhan
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth TechnologiesSaurav Kumar
 
lecture note 2023 up10 stud2.ppt for ans
lecture note 2023 up10 stud2.ppt for anslecture note 2023 up10 stud2.ppt for ans
lecture note 2023 up10 stud2.ppt for ans
peterhaile1
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer NetworksGhaffar Khan
 
Networking devices
Networking devicesNetworking devices
Networking devices
university of Gujrat, pakistan
 
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALABluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Saikiran Panjala
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lanMohd Arif
 
1st Talk
1st Talk1st Talk
1st Talk
Aniruddha Das
 
Comm. & net. concepts
Comm. & net. conceptsComm. & net. concepts
Comm. & net. concepts
Ashwin Kumar
 
Class note.2.....nazmun nahar 1834902176
Class note.2.....nazmun nahar 1834902176Class note.2.....nazmun nahar 1834902176
Class note.2.....nazmun nahar 1834902176
Nazmun Nahar
 

Similar to Martin Woolley - An introduction to Bluetooth mesh - Codemotion Amsterdam 2019 (20)

Module 2_part 2.pptx
Module 2_part 2.pptxModule 2_part 2.pptx
Module 2_part 2.pptx
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabha
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routing
 
Osi model with neworking overview
Osi model with neworking overviewOsi model with neworking overview
Osi model with neworking overview
 
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892
 
Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892Osimodelwithneworkingoverview 150618094119-lva1-app6892
Osimodelwithneworkingoverview 150618094119-lva1-app6892
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
 
lecture note 2023 up10 stud2.ppt for ans
lecture note 2023 up10 stud2.ppt for anslecture note 2023 up10 stud2.ppt for ans
lecture note 2023 up10 stud2.ppt for ans
 
Introduction to Computer Networks
 Introduction to Computer Networks Introduction to Computer Networks
Introduction to Computer Networks
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALABluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lan
 
Wlan
WlanWlan
Wlan
 
1st Talk
1st Talk1st Talk
1st Talk
 
Rj wlan
Rj wlanRj wlan
Rj wlan
 
Comm. & net. concepts
Comm. & net. conceptsComm. & net. concepts
Comm. & net. concepts
 
Class note.2.....nazmun nahar 1834902176
Class note.2.....nazmun nahar 1834902176Class note.2.....nazmun nahar 1834902176
Class note.2.....nazmun nahar 1834902176
 

More from Codemotion

Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Codemotion
 
Pompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending storyPompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending story
Codemotion
 
Pastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storiaPastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storia
Codemotion
 
Pennisi - Essere Richard Altwasser
Pennisi - Essere Richard AltwasserPennisi - Essere Richard Altwasser
Pennisi - Essere Richard Altwasser
Codemotion
 
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Codemotion
 
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Codemotion
 
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Codemotion
 
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 - Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Codemotion
 
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Codemotion
 
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Codemotion
 
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Codemotion
 
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Codemotion
 
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Codemotion
 
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Codemotion
 
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Codemotion
 
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
Codemotion
 
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Codemotion
 
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Codemotion
 
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Codemotion
 
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Codemotion
 

More from Codemotion (20)

Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
Fuzz-testing: A hacker's approach to making your code more secure | Pascal Ze...
 
Pompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending storyPompili - From hero to_zero: The FatalNoise neverending story
Pompili - From hero to_zero: The FatalNoise neverending story
 
Pastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storiaPastore - Commodore 65 - La storia
Pastore - Commodore 65 - La storia
 
Pennisi - Essere Richard Altwasser
Pennisi - Essere Richard AltwasserPennisi - Essere Richard Altwasser
Pennisi - Essere Richard Altwasser
 
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
Michel Schudel - Let's build a blockchain... in 40 minutes! - Codemotion Amst...
 
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
Richard Süselbeck - Building your own ride share app - Codemotion Amsterdam 2019
 
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
 
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 - Francesco Baldassarri  - Deliver Data at Scale - Codemotion Amsterdam 2019 -
Francesco Baldassarri - Deliver Data at Scale - Codemotion Amsterdam 2019 -
 
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
Martin Förtsch, Thomas Endres - Stereoscopic Style Transfer AI - Codemotion A...
 
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
Melanie Rieback, Klaus Kursawe - Blockchain Security: Melting the "Silver Bul...
 
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
Angelo van der Sijpt - How well do you know your network stack? - Codemotion ...
 
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
Lars Wolff - Performance Testing for DevOps in the Cloud - Codemotion Amsterd...
 
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
Sascha Wolter - Conversational AI Demystified - Codemotion Amsterdam 2019
 
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
Michele Tonutti - Scaling is caring - Codemotion Amsterdam 2019
 
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
Pat Hermens - From 100 to 1,000+ deployments a day - Codemotion Amsterdam 2019
 
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
James Birnie - Using Many Worlds of Compute Power with Quantum - Codemotion A...
 
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
Don Goodman-Wilson - Chinese food, motor scooters, and open source developmen...
 
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
Pieter Omvlee - The story behind Sketch - Codemotion Amsterdam 2019
 
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
Dave Farley - Taking Back “Software Engineering” - Codemotion Amsterdam 2019
 
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
Joshua Hoffman - Should the CTO be Coding? - Codemotion Amsterdam 2019
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Martin Woolley - An introduction to Bluetooth mesh - Codemotion Amsterdam 2019

  • 1. An Introduction to Bluetooth Mesh Martin Woolley, Bluetooth SIG @bluetooth_mdw Amsterdam | April 2-3, 2019
  • 2. point-to-point 1:1 BR/EDR broadcast 1:m Low Energy (LE) many to many m:m Mesh Bluetooth now comes in three delicious flavours
  • 3. relationship between Bluetooth technologies Bluetooth BR/EDR Bluetooth mesh networking Bluetooth Low EnergyRADIO NETWORKING
  • 7. relay nodes R RR R = Relay function on Relays retransmit messages so that they can travel further, in a number of “hops” Some nodes can act as “relays” however Messages get sent to other nodes that are in direct radio range of the publishing node
  • 8. friend nodes and low power nodes Low Power Node (sensor) Friend Low power nodes (LPNs) are highly power constrained To avoid the need to operate at a high(er) duty cycle to receive messages from the mesh, an LPN works with a Friend Friend nodes store messages addressed to LPNs they are friends with and forward them when the LPN occasionally polls
  • 9. friend nodes and low power nodes Low Power Node (sensor) Friend To: Sensor “set temperature thresholds” Low power nodes (LPNs) are highly power constrained To avoid the need to operate at a high(er) duty cycle to receive messages from the mesh, an LPN works with a Friend Friend nodes store messages addressed to LPNs they are friends with and forward them when the LPN occasionally polls
  • 10. friend nodes and low power nodes STORED MESSAGE(S) Low Power Node (sensor) Friend To: Sensor “set temperature thresholds” Low power nodes (LPNs) are highly power constrained To avoid the need to operate at a high(er) duty cycle to receive messages from the mesh, an LPN works with a Friend Friend nodes store messages addressed to LPNs they are friends with and forward them when the LPN occasionally polls
  • 11. friend nodes and low power nodes STORED MESSAGE(S) “do you have any messages for me?” Low Power Node (sensor) Friend To: Sensor “set temperature thresholds” Low power nodes (LPNs) are highly power constrained To avoid the need to operate at a high(er) duty cycle to receive messages from the mesh, an LPN works with a Friend Friend nodes store messages addressed to LPNs they are friends with and forward them when the LPN occasionally polls
  • 12. friend nodes and low power nodes STORED MESSAGE(S) “do you have any messages for me?” Low Power Node (sensor) Friend To: Sensor “set temperature thresholds” To: Sensor “set temperature thresholds” Low power nodes (LPNs) are highly power constrained To avoid the need to operate at a high(er) duty cycle to receive messages from the mesh, an LPN works with a Friend Friend nodes store messages addressed to LPNs they are friends with and forward them when the LPN occasionally polls
  • 13. proxy nodes P Bluetooth low energy devices like smartphones can communicate with a mesh network via a proxy node LE GATT MESH
  • 14. proxy nodes Proxy Bluetooth low energy devices like smartphones can communicate with a mesh network via a proxy node mesh monitoring and control applications LE GAP and GATT MESH
  • 16. messages and state State: OnOff = Off State: OnOff = Off State: OnOff = Off nodes communicate with each other by sending messages access messages operate on state values SET - change of state GET - retrieve state value STATUS - notify current state ACK vs UNACK nodes have state values which reflect their condition (e.g. ON or OFF)
  • 17. messages and state State: OnOff = Off State: OnOff = Off State: OnOff = OffState: OnOff = On State: OnOff = On State: OnOff = On nodes communicate with each other by sending messages access messages operate on state values SET - change of state GET - retrieve state value STATUS - notify current state ACK vs UNACK nodes have state values which reflect their condition (e.g. ON or OFF)
  • 18. the publish/subscribe communication model Kitchen Dining Room Hallway Bedroom Garden Subscribe Publish
  • 20. node composition a node consists of an arrangement of elements models states each element has its own address NODE ELEMENT ELEMENT MODEL STATE STATE STATE MODEL STATE MODEL STATE STATE MODEL STATE note: a model is sometimes owned by multiple elements
  • 21. models ServerGeneric OnOff Server Generic OnOff Client define node functionality define states, messages, state transitions and behaviors client, server and control types generics such as onoff client and server lighting, sensors, scenes & time
  • 22. node composition single node 3 elements multiple models and states 0x0100 0x0101 0x0102 node elements models states generic onoff server light lightness server light lightness actual light lightness last light lightness range generic onoff
  • 24. devices and network membership only members of the same network can talk to each other Bluetooth mesh networks are secure a security process called provisioning makes a device a member of a network
  • 25. devices and network membership Provisioner: converting a device to a node Device is now a node on the network only members of the same network can talk to each other Bluetooth mesh networks are secure a security process called provisioning makes a device a member of a network
  • 26. Bluetooth mesh: Security • Mandatory, cannot be reduced • Encryption and authentication • Separate security for network and each application • Area isolation • Message obfuscation • Protection from replay and trashcan attacks • Secure device provisioning
  • 27. network key (netkey) origin: provisioning use: derivation of other keys encryption key origin: derived from netkey using the k2 function use: secures data at the network layer privacy key origin: derived from netkey using the k2 function use: obfuscation of network header information ref: mesh profile 1.0 section 2.3.9.1 application key (appkey) origin: created by the config. client and provided to nodes after provisioning use: secures application data at the upper transport layer Bound to one or more models. device key (devkey) origin: established during provisioning use: secures communication between the config. client and individual node appkey is bound to a netkey devkey is bound to all netkeys known to a node
  • 28. Bluetooth mesh Anatomy of a smart lighting system
  • 29.
  • 30. Switch Models Light Models Sensor Models
  • 31. Switch Models Light Models Sensor Models Generic On/Off Server
  • 32. Switch Models Light Models Sensor Models Generic On/Off Client Generic On/Off Server
  • 33. Switch Models Light Models Sensor Models Light Lightness Server Light HSL Server Generic On/Off Client Generic On/Off Server
  • 34. Switch Models Light Models Sensor Models Light Lightness Server Light HSL Server Generic On/Off Client Generic On/Off Server Light LC Server Sensor Server
  • 35. Switch Models Light Models Sensor Models Light Lightness Server Light HSL Server Generic On/Off Client Generic On/Off Server Light LC Server Sensor Server State Binding
  • 37. scalability max 32,767 nodes per network The fastest low power radio small, highly optimised packets hundreds of multicast messages per second multicast: 1 message can control many devices point to point range hundreds of metres
  • 38. scalability and the fundamentals of RF radio is a shared medium collisions are what limits scalability
  • 39. scalability and the fundamentals of RF an anonymous technology (not Bluetooth) e.g. 250 kb/s
  • 40. scalability and the fundamentals of RF Bluetooth mesh using Bluetooth Low Energy 1000 kb/s less air time per packet so more capacity for work
  • 41. scalability and the fundamentals of RF Bluetooth mesh much smaller packets less airtime fewer collisions more “work” 29 octets payload
  • 42. scalability and the fundamentals of RF Bluetooth mesh using Bluetooth Low Energy 3 x radio channels 3 x more capacity used for enhanced reliability
  • 45. Bluetooth SIG Resources - Reading Material
  • 46. Bluetooth SIG Resources - hands-on education Bluetooth Mesh Developer Study Guide Mesh Proxy Kit
  • 47. Unthinkably ConnectedUnthinkably Connected 3 April 2019 40/ Bluetooth SIG Proprietary Twitter: @bluetooth_mdw questions? kevin.ke@oneplus.net.