search
HomeCommon ProblemWhat does Bluetooth mesh mean?

What does Bluetooth mesh mean?

Feb 22, 2023 am 10:53 AM
Bluetooth mesh

Bluetooth mesh is a Bluetooth standard approved in 2017. It is a networking technology; the new Mesh function provides many-to-many transmission between devices, and especially improves the communication ability to build large-scale network coverage. It is suitable for Building automation, wireless sensor networks, etc. require IoT solutions that allow tens of thousands of devices to transmit in a reliable and secure environment.

What does Bluetooth mesh mean?

#The operating environment of this tutorial: Windows 10 system, Dell G3 computer.

What does Bluetooth mesh mean?

Bluetooth mesh network is a Bluetooth standard approved in 2017. This is a networking technology that is supported by chips supporting BLE low power consumption above Bluetooth 4.0. Bluetooth 5.0 is the latest standard of Bluetooth, which mainly improves the transmission speed by 2 times and the transmission distance by 4 times. It is two concepts with Bluetooth mesh.

Bluetooth mesh features

Bluetooth Mesh was born out of the private protocol advocated by CSR - CSR Mesh. This technology was born in 2014.

The Bluetooth Technology Alliance officially announced on July 19 last year that Bluetooth technology began to fully support Mesh mesh networks. The new Mesh function provides many-to-many transmission between devices, and especially improves the communication capabilities of building large-scale network coverage. It is suitable for building automation, wireless sensor networks and other applications that require tens of thousands of devices to transmit in a reliable and secure environment. IoT solutions.

The network node types of Bluetooth mesh are as follows:

What does Bluetooth mesh mean?

The network characteristics of Bluetooth mesh are as follows :

1) The network does not require a central node

Bluetooth Mesh is very different from other Mesh topologies. There is no need for a central gateway. Node-to-node communication and node access to the network are all through configuration Implementation

2) Node information, network access can be configured

Node completes network access through configuration, without cumbersome network access interaction process and establishment of routing table corresponding to the network access process

3) Adopt Flooding mode for communication

Compared with general Mesh communication based on routing tables, Bluetooth Mesh uses the mechanism of broadcast relay reception and forwarding to complete the delivery of messages;

4) Communication adopts Publish/subscribe model

The node publishes information and sends the message to the corresponding address. The node that subscribes to the address will receive the message; this feature can realize one-to-many control and many-to-one control; For example, one switch can control three light bulbs, and one light bulb can be controlled by three switches. This feature also makes full use of the advantages of Bluetooth Mesh broadcast communication;

5) Dual security mechanism

Bluetooth Mesh adopts application layer security keys and network security keys to protect the network Security; network security keys are applied to the entire network, while application layer keys specifically protect specialized terminal nodes; for example, light control messages can be forwarded by switches, actuators, etc. on the same network, and the forwarding process of switches and actuators, Specific application data cannot be decrypted, and lights cannot be controlled even on the same network (which increases the difficulty of cracking the network)

6) Low power consumption support

For low power consumption such as For battery-powered nodes, other nodes can be designated as Friend nodes of low-power nodes. When the low-power node goes to sleep, the Friend node can receive messages from the low-power node instead, and transfer the data after the low-power node wakes up. For low-power nodes;

7) Agent support

For traditional BLE devices that have implemented the BLE 4.0/4.2 protocol, traditional BLE nodes can join the Mesh network through agent nodes; agent nodes Message passing with traditional BLE nodes through specific GATT Profile.

For more related knowledge, please visit the FAQ column!

The above is the detailed content of What does Bluetooth mesh mean?. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools

mPDF

mPDF

mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

EditPlus Chinese cracked version

EditPlus Chinese cracked version

Small size, syntax highlighting, does not support code prompt function

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!