Bluetooth mesh is a Bluetooth standard approved in 2017. It is a networking technology; the new Mesh function provides many-to-many transmission between devices, and especially improves the communication ability to build large-scale network coverage. It is suitable for Building automation, wireless sensor networks, etc. require IoT solutions that allow tens of thousands of devices to transmit in a reliable and secure environment.
#The operating environment of this tutorial: Windows 10 system, Dell G3 computer.
What does Bluetooth mesh mean?
Bluetooth mesh network is a Bluetooth standard approved in 2017. This is a networking technology that is supported by chips supporting BLE low power consumption above Bluetooth 4.0. Bluetooth 5.0 is the latest standard of Bluetooth, which mainly improves the transmission speed by 2 times and the transmission distance by 4 times. It is two concepts with Bluetooth mesh.
Bluetooth mesh features
Bluetooth Mesh was born out of the private protocol advocated by CSR - CSR Mesh. This technology was born in 2014.
The Bluetooth Technology Alliance officially announced on July 19 last year that Bluetooth technology began to fully support Mesh mesh networks. The new Mesh function provides many-to-many transmission between devices, and especially improves the communication capabilities of building large-scale network coverage. It is suitable for building automation, wireless sensor networks and other applications that require tens of thousands of devices to transmit in a reliable and secure environment. IoT solutions.
The network node types of Bluetooth mesh are as follows:
The network characteristics of Bluetooth mesh are as follows :
1) The network does not require a central node
Bluetooth Mesh is very different from other Mesh topologies. There is no need for a central gateway. Node-to-node communication and node access to the network are all through configuration Implementation
2) Node information, network access can be configured
Node completes network access through configuration, without cumbersome network access interaction process and establishment of routing table corresponding to the network access process
3) Adopt Flooding mode for communication
Compared with general Mesh communication based on routing tables, Bluetooth Mesh uses the mechanism of broadcast relay reception and forwarding to complete the delivery of messages;
4) Communication adopts Publish/subscribe model
The node publishes information and sends the message to the corresponding address. The node that subscribes to the address will receive the message; this feature can realize one-to-many control and many-to-one control; For example, one switch can control three light bulbs, and one light bulb can be controlled by three switches. This feature also makes full use of the advantages of Bluetooth Mesh broadcast communication;
5) Dual security mechanism
Bluetooth Mesh adopts application layer security keys and network security keys to protect the network Security; network security keys are applied to the entire network, while application layer keys specifically protect specialized terminal nodes; for example, light control messages can be forwarded by switches, actuators, etc. on the same network, and the forwarding process of switches and actuators, Specific application data cannot be decrypted, and lights cannot be controlled even on the same network (which increases the difficulty of cracking the network)
6) Low power consumption support
For low power consumption such as For battery-powered nodes, other nodes can be designated as Friend nodes of low-power nodes. When the low-power node goes to sleep, the Friend node can receive messages from the low-power node instead, and transfer the data after the low-power node wakes up. For low-power nodes;
7) Agent support
For traditional BLE devices that have implemented the BLE 4.0/4.2 protocol, traditional BLE nodes can join the Mesh network through agent nodes; agent nodes Message passing with traditional BLE nodes through specific GATT Profile.
For more related knowledge, please visit the FAQ column!
The above is the detailed content of What does Bluetooth mesh mean?. For more information, please follow other related articles on the PHP Chinese website!

The domestic AI dark horse DeepSeek has risen strongly, shocking the global AI industry! This Chinese artificial intelligence company, which has only been established for a year and a half, has won wide praise from global users for its free and open source mockups, DeepSeek-V3 and DeepSeek-R1. DeepSeek-R1 is now fully launched, with performance comparable to the official version of OpenAIo1! You can experience its powerful functions on the web page, APP and API interface. Download method: Supports iOS and Android systems, users can download it through the app store; the web version has also been officially opened! DeepSeek web version official entrance: ht

At the beginning of 2025, domestic AI "deepseek" made a stunning debut! This free and open source AI model has a performance comparable to the official version of OpenAI's o1, and has been fully launched on the web side, APP and API, supporting multi-terminal use of iOS, Android and web versions. In-depth search of deepseek official website and usage guide: official website address: https://www.deepseek.com/Using steps for web version: Click the link above to enter deepseek official website. Click the "Start Conversation" button on the homepage. For the first use, you need to log in with your mobile phone verification code. After logging in, you can enter the dialogue interface. deepseek is powerful, can write code, read file, and create code

DeepSeek: How to deal with the popular AI that is congested with servers? As a hot AI in 2025, DeepSeek is free and open source and has a performance comparable to the official version of OpenAIo1, which shows its popularity. However, high concurrency also brings the problem of server busyness. This article will analyze the reasons and provide coping strategies. DeepSeek web version entrance: https://www.deepseek.com/DeepSeek server busy reason: High concurrent access: DeepSeek's free and powerful features attract a large number of users to use at the same time, resulting in excessive server load. Cyber Attack: It is reported that DeepSeek has an impact on the US financial industry.

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SublimeText3 English version
Recommended: Win version, supports code prompts!

ZendStudio 13.5.1 Mac
Powerful PHP integrated development environment
