search
HomeCommon ProblemWhat does Bluetooth mesh mean?
What does Bluetooth mesh mean?Feb 22, 2023 am 10:53 AM
Bluetooth mesh

Bluetooth mesh is a Bluetooth standard approved in 2017. It is a networking technology; the new Mesh function provides many-to-many transmission between devices, and especially improves the communication ability to build large-scale network coverage. It is suitable for Building automation, wireless sensor networks, etc. require IoT solutions that allow tens of thousands of devices to transmit in a reliable and secure environment.

What does Bluetooth mesh mean?

#The operating environment of this tutorial: Windows 10 system, Dell G3 computer.

What does Bluetooth mesh mean?

Bluetooth mesh network is a Bluetooth standard approved in 2017. This is a networking technology that is supported by chips supporting BLE low power consumption above Bluetooth 4.0. Bluetooth 5.0 is the latest standard of Bluetooth, which mainly improves the transmission speed by 2 times and the transmission distance by 4 times. It is two concepts with Bluetooth mesh.

Bluetooth mesh features

Bluetooth Mesh was born out of the private protocol advocated by CSR - CSR Mesh. This technology was born in 2014.

The Bluetooth Technology Alliance officially announced on July 19 last year that Bluetooth technology began to fully support Mesh mesh networks. The new Mesh function provides many-to-many transmission between devices, and especially improves the communication capabilities of building large-scale network coverage. It is suitable for building automation, wireless sensor networks and other applications that require tens of thousands of devices to transmit in a reliable and secure environment. IoT solutions.

The network node types of Bluetooth mesh are as follows:

What does Bluetooth mesh mean?

The network characteristics of Bluetooth mesh are as follows :

1) The network does not require a central node

Bluetooth Mesh is very different from other Mesh topologies. There is no need for a central gateway. Node-to-node communication and node access to the network are all through configuration Implementation

2) Node information, network access can be configured

Node completes network access through configuration, without cumbersome network access interaction process and establishment of routing table corresponding to the network access process

3) Adopt Flooding mode for communication

Compared with general Mesh communication based on routing tables, Bluetooth Mesh uses the mechanism of broadcast relay reception and forwarding to complete the delivery of messages;

4) Communication adopts Publish/subscribe model

The node publishes information and sends the message to the corresponding address. The node that subscribes to the address will receive the message; this feature can realize one-to-many control and many-to-one control; For example, one switch can control three light bulbs, and one light bulb can be controlled by three switches. This feature also makes full use of the advantages of Bluetooth Mesh broadcast communication;

5) Dual security mechanism

Bluetooth Mesh adopts application layer security keys and network security keys to protect the network Security; network security keys are applied to the entire network, while application layer keys specifically protect specialized terminal nodes; for example, light control messages can be forwarded by switches, actuators, etc. on the same network, and the forwarding process of switches and actuators, Specific application data cannot be decrypted, and lights cannot be controlled even on the same network (which increases the difficulty of cracking the network)

6) Low power consumption support

For low power consumption such as For battery-powered nodes, other nodes can be designated as Friend nodes of low-power nodes. When the low-power node goes to sleep, the Friend node can receive messages from the low-power node instead, and transfer the data after the low-power node wakes up. For low-power nodes;

7) Agent support

For traditional BLE devices that have implemented the BLE 4.0/4.2 protocol, traditional BLE nodes can join the Mesh network through agent nodes; agent nodes Message passing with traditional BLE nodes through specific GATT Profile.

For more related knowledge, please visit the FAQ column!

The above is the detailed content of What does Bluetooth mesh mean?. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
deepseek web version official entrancedeepseek web version official entranceMar 12, 2025 pm 01:42 PM

The domestic AI dark horse DeepSeek has risen strongly, shocking the global AI industry! This Chinese artificial intelligence company, which has only been established for a year and a half, has won wide praise from global users for its free and open source mockups, DeepSeek-V3 and DeepSeek-R1. DeepSeek-R1 is now fully launched, with performance comparable to the official version of OpenAIo1! You can experience its powerful functions on the web page, APP and API interface. Download method: Supports iOS and Android systems, users can download it through the app store; the web version has also been officially opened! DeepSeek web version official entrance: ht

In-depth search deepseek official website entranceIn-depth search deepseek official website entranceMar 12, 2025 pm 01:33 PM

At the beginning of 2025, domestic AI "deepseek" made a stunning debut! This free and open source AI model has a performance comparable to the official version of OpenAI's o1, and has been fully launched on the web side, APP and API, supporting multi-terminal use of iOS, Android and web versions. In-depth search of deepseek official website and usage guide: official website address: https://www.deepseek.com/Using steps for web version: Click the link above to enter deepseek official website. Click the "Start Conversation" button on the homepage. For the first use, you need to log in with your mobile phone verification code. After logging in, you can enter the dialogue interface. deepseek is powerful, can write code, read file, and create code

How to solve the problem of busy servers for deepseekHow to solve the problem of busy servers for deepseekMar 12, 2025 pm 01:39 PM

DeepSeek: How to deal with the popular AI that is congested with servers? As a hot AI in 2025, DeepSeek is free and open source and has a performance comparable to the official version of OpenAIo1, which shows its popularity. However, high concurrency also brings the problem of server busyness. This article will analyze the reasons and provide coping strategies. DeepSeek web version entrance: https://www.deepseek.com/DeepSeek server busy reason: High concurrent access: DeepSeek's free and powerful features attract a large number of users to use at the same time, resulting in excessive server load. Cyber ​​Attack: It is reported that DeepSeek has an impact on the US financial industry.

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Tools

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.

PhpStorm Mac version

PhpStorm Mac version

The latest (2018.2.1) professional PHP integrated development tool

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment