SlideShare une entreprise Scribd logo
1  sur  24
Bluetooth SIG Proprietary and Confidential 1Bluetooth SIG Proprietary and Confidential 1
Click to edit Master title style
Click to edit Master subtitle style
Appcessories
Bridging the Digital to the Physical
Bluetooth SIG Proprietary and Confidential 2Bluetooth SIG Proprietary and Confidential 2
What’s In It For Me?
• Understand the opportunity
– Great potential for growth and monetization with
appcessories
– Bluetooth technology‟s role
• What a sample Bluetooth implementation
looks like
– From „profiles‟ and use cases to code
• Where to find more resources
– Hint: developer.bluetooth.org
Bluetooth SIG Proprietary and Confidential 3Bluetooth SIG Proprietary and Confidential 3
Digital and Physical Worlds Collide!
Bluetooth SIG Proprietary and Confidential 4Bluetooth SIG Proprietary and Confidential 4
Appcessories = Application + Accessory
They are complementary devices that enable people
to interact with technology like never before by
creating physical experiences to strengthen the digital
experience
What Is An Appcessory?
MobiPlex - SwingTIP
What makes Bluetooth a good fit
for Appcessories?
 Performance
 THE Standard for device
connectivity
Bluetooth SIG Proprietary and Confidential 5Bluetooth SIG Proprietary and Confidential 5
1,000,000,000 Devices*
Why Should I Care?
1,000,000,000x Applications
* 2012 ANALYSIS OF THE BLUETOOTH MARKET AND INDUSTRY, ABI Research
Bluetooth SIG Proprietary and Confidential 6Bluetooth SIG Proprietary and Confidential 6
Let Me Share a Story…
Bluetooth SIG Proprietary and Confidential 7Bluetooth SIG Proprietary and Confidential 7
Bluetooth – Bridging the Gap
App for the
Phone
Sensor-based
device for the
Lock
For the
Connection
• Well defined specs and protocols
• Standard way to implement
solutions
Bluetooth SIG Proprietary and Confidential 8Bluetooth SIG Proprietary and Confidential 8
Smart Device Profiles – Defining the Use Cases
A Generic Attribute Profile
(GATT) is a description of how a
device functions for a given
scenario/use case
Generic Attribute Profile
Service
Value
Characteristic
Value
Value
Value
Characteristic
Value
Value
First thing we need to do is to define the
use cases…
Bluetooth SIG Proprietary and Confidential 9Bluetooth SIG Proprietary and Confidential 9
Profile for the Lock Mechanism
What is your use case? Let’s focus on the
Password-enabled scenario
Admin User Lock
Turn ‘on’ PWD
PWD ‘on’ AK
Change PWD
Send Admin PWD
Admin PWD
Send Good/Bad
New User PWD
Send User PWD
Change AK
In this flow, we will assume that the Admin PWD given is correct
Encrypted
Encrypted
• We want an admin to be able to turn passwords on/off
• We want an admin to be able to send an ‘admin’ password, which can then be used to set the
‘user’ password
Bluetooth SIG Proprietary and Confidential 10Bluetooth SIG Proprietary and Confidential 10
Service Definition for the Lock Mechanism
High-level sample profile
Lock Mechanism Profile
Lock Service
Yes
Locked
…
Code Service
ON
Status
12345
User Code
54321
Admin Code
• Use case scenarios are
important to define
– Design decisions are important to your
scenario(s)
– Lock Service – is it simply a toggle?
– Code Service – are we covering all of the
right use cases?
• Quick word on Adopted
Profiles…
– Proximity is an example
– Contains a „link loss‟, an „immediate alert
level‟, and a „transmit power‟ service
– Can easily add those services to your
„custom‟ profile‟.
Bluetooth SIG Proprietary and Confidential 11Bluetooth SIG Proprietary and Confidential 11
Attribute Tables for Lock Mechanism
Handle Type Value Permissions
1 «Primary Service» «Code Service» --
2 «Status» {r/w, 3, «Value for Status»} Read/Write
3 «Value for Status» “ON” --
4 «User Code» {r/w, 5, «Value for Code»} Read/Write
5 «Value for Code» “12345” --
6 «Admin Code» {r/w, 7, «Value for Code»} Read/Write
7 «Value for Code» “54321” --
• Smart Device stores Service data in
an Attribute Table
– Implemented on the actual Smart Device to
store data
• Structure defined by GATT
– Every entry in the table is considered an
attribute
– Service, Characteristic, Value, etc
Bluetooth SIG Proprietary and Confidential 12Bluetooth SIG Proprietary and Confidential 12
Smart Ready Platforms and Profiles
When creating apps for modern
smartphone platforms, many
Bluetooth details are abstracted away
by the underlying SDK
• In many cases, still requires
knowledge of the profile.
• Each platform has their own
SDK and are a bit different
– Microsoft, Apple, Blackberry, Google
• Refer to the SDK docs of the
platform you are targeting
Generic Attribute Profile
Service
Value
Characteristic
Value
Value
Value
Characteristic
Value
Value
Bluetooth SIG Proprietary and Confidential 13Bluetooth SIG Proprietary and Confidential 13
• Smart Device Discovery
Typical Bluetooth Application Flow
Smart Device Advertises Itself
Smart Ready Hub Scans for Advertisements
Smart Ready Hub requests a
Connection
Smart Device accepts Connection
request
• Smart Device Connection to Smart Ready Hub
Bluetooth SIG Proprietary and Confidential 14Bluetooth SIG Proprietary and Confidential 14
• Interacting with Services
Typical Bluetooth Application Flow
– Smart Ready Hub can look at
services and the values they contain
in Smart Devices
– Smart Ready Hub can send
commands to the Smart Device
services
– Smart Ready Hub can receive
commands and updates from the
Smart Device
• Requires the services to be configured
properly on the Smart Device
Bluetooth SIG Proprietary and Confidential 15Bluetooth SIG Proprietary and Confidential 15
Lockitron – Not Just a Story
• Turn your mobile phone into a
key.
• Send permanent or temporary
virtual keys to family, friends and
house guests.
• Your mobile phone can be better
than a key – keep it in your
pocket.
Keyless entry with your phone
– Bluetooth low energy – “…the only wireless technology we can keep on for extended
periods and is integrated directly into mobile phones.”
– “With Bluetooth low energy, we can carry out commands without the user tapping the
app.”
Cameron Robertson, Founder
Bluetooth SIG Proprietary and Confidential 16Bluetooth SIG Proprietary and Confidential 16
Bridging the Digital to the Physical
Internet
Connected
Native APIs
for
applications
®
Bluetooth SIG Proprietary and Confidential 17Bluetooth SIG Proprietary and Confidential 17
Implementation – Getting Started
• Texas Instruments CC2541
– Single-chip single-mode Bluetooth low energy
System-on-a-Chip
– Contains radio, MCU, stack, profiles, applications,
and on-chip peripherals – everything needed for
your product!
• CC2541 Sensor Tag Kit
– Fully working Bluetooth low energy peripheral
based on CC2541
– Contains sensors for temperature, humidity,
accelerometer, magnetometer
– Enables app developers to quickly develop
prototype Bluetooth low energy software
• CC2541 Mini Development Kit
– Includes CC2541 Keyfob, USB Dongle, and
Debugger
– Enables CC2541 embedded software development
Bluetooth SIG Proprietary and Confidential 18Bluetooth SIG Proprietary and Confidential 18
Implementation – TI iOS SensorTag App
• Targeting Smart Phone App Developers
• Limitless App Possibilities
– Health and fitness, medical, educational tools, toys,
remote controls, mobile phone accessories, and
proximity.
• The CC2541 SensorTag kit shortens the
design time for Bluetooth low energy
app development from months to hours
– No embedded software design knowledge required.
– The SensorTag includes all SW needed for App
development
– TI has a SensorTag App on the App Store providing
developers with easy access to the tools they need.
– iOS Example App Source Code available for
download at http://ti.com/sensortag
Bluetooth SIG Proprietary and Confidential 19Bluetooth SIG Proprietary and Confidential 19
Implementation – Developing for iOS
• Development done using Xcode
• Xcode runs on OSX [Mountain] Lion
• Xcode and simulator is free
– BLE requires physical iOS device
• Physical device download requires Apple Developer Account
– Costs 99$ per year at developer.apple.com/programs/ios
Bluetooth SIG Proprietary and Confidential 20Bluetooth SIG Proprietary and Confidential 20
Implementation – iOS Source Code
• The communication is asynchronous
between app and iOS’s CoreBluetooth API
• We issue commands to CBCentralManager
and CBPeripheral
– [BLEUtility writeCharacteristic ...] 
– [peripheral writeValue:data ... ];
• Then act as delegate for CBCentralManager
– centralManagerDidUpdateState
– didDiscoverPeripheral
– didConnectPeripheral
• And for CBPeripheral
– didDiscoverServices
– didUpdateValueForCharacteristic
– didWriteValueForCharacteristic
• Delegates implement callbacks according to
a protocol. A design pattern used in iOS.
Bluetooth SIG Proprietary and Confidential 21Bluetooth SIG Proprietary and Confidential 21
Implementation – Developing for CC2541
• TI provides license-free Bluetooth low energy qualified
protocol stack and profiles
• Application development using C using IAR Embedded
Workbench
• Operating system abstraction layer (OSAL) with
priorized event handler, memory management, task
messaging, and NV drivers
• Sample applications included with SDK
– Standard profile applications such as Proximity, Heart Rate Sensor,
Glucose Sensor, etc...
– Custom profile applications such as SensorTag, Generic Peripheral,
Generic Central
• Additional Features
– Over-the-Air Firmware Updates
– Boot Image Manager- run multiple firmware images on one chip
– Hardware Abstraction Layer (HAL) drivers for on-chip peripherals including
SPI, UART, I2C, ADC, Timers
Bluetooth SIG Proprietary and Confidential 22Bluetooth SIG Proprietary and Confidential 22
Resources on the Portal
• Knowledge Center
– White papers
– Training Videos
• Development Resources
– Quick Start Kit
– Platform availability for Smart and
Smart Ready
– Recorded webinars on
development topics
– Links to SIG tools (PTS, etc.)
• Forums
• GATT specifications
http://developer.bluetooth.org
Bluetooth SIG Proprietary and Confidential 23Bluetooth SIG Proprietary and Confidential 23
Coming Soon – New Developer Resources
• Bluetooth Quick Start Kit v2
– Fundamentals for device makers new to
Bluetooth Low Energy
• GATT, GAP, ATT, adopted profiles, etc.
– Sample application
• “Hello Bluetooth”
– iOS, Android, Windows 8
• Bluetooth Application
Accelerators v1
– Accelerator for application developers
– Educational content
• Setting up your environment
• Tutorial/code walkthrough
– Fully commented sample code
• iOS initially http://developer.bluetooth.org
Bluetooth SIG Proprietary and Confidential 24Bluetooth SIG Proprietary and Confidential 24
Appcessories – Join the Movement
• Appcessory market is mainstream
– Great potential for growth and monetization
• Bluetooth can help you bridge the digital to
the physical
– Bluetooth is the a defacto standard
• Grab a development kit and start today

Contenu connexe

Tendances

Building a Raspberry Pi Robot Arm with .NET 5, Blazor and SignalR - HackSoc -...
Building a Raspberry Pi Robot Arm with .NET 5, Blazor and SignalR - HackSoc -...Building a Raspberry Pi Robot Arm with .NET 5, Blazor and SignalR - HackSoc -...
Building a Raspberry Pi Robot Arm with .NET 5, Blazor and SignalR - HackSoc -...Peter Gallagher
 
Architectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud PlatformsArchitectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud PlatformsRoshan Kulkarni
 
Io t technologies
Io t technologies Io t technologies
Io t technologies Umesh Bhat
 
Azure Percept Home Automation - .NET Liverpool - 28-10-21
Azure Percept Home Automation  - .NET Liverpool - 28-10-21Azure Percept Home Automation  - .NET Liverpool - 28-10-21
Azure Percept Home Automation - .NET Liverpool - 28-10-21Peter Gallagher
 
CIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCloudIDSummit
 
A Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of ThingsA Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of ThingsRick G. Garibay
 
Machine Learning and Analytics in the Cloud on IoT Data
Machine Learning and Analytics in the Cloud on IoT DataMachine Learning and Analytics in the Cloud on IoT Data
Machine Learning and Analytics in the Cloud on IoT DataIntel® Software
 
The use case for Cassandra at Ping Identity
The use case for Cassandra at Ping IdentityThe use case for Cassandra at Ping Identity
The use case for Cassandra at Ping IdentityPing Identity
 
Internet of Everything Development Using AllJoyn
Internet of Everything Development Using AllJoynInternet of Everything Development Using AllJoyn
Internet of Everything Development Using AllJoynAllSeen Alliance
 
Ibm_IoT_Architecture_and_Capabilities
Ibm_IoT_Architecture_and_CapabilitiesIbm_IoT_Architecture_and_Capabilities
Ibm_IoT_Architecture_and_CapabilitiesIBM_Info_Management
 
One Stop iBeacon Solution and Implementation
One Stop iBeacon Solution and ImplementationOne Stop iBeacon Solution and Implementation
One Stop iBeacon Solution and ImplementationAvianto Tiyo
 
IoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreadsIoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreadsIndicThreads
 
IoT Node-Red Presentation
IoT  Node-Red PresentationIoT  Node-Red Presentation
IoT Node-Red PresentationThe IOT Academy
 
Integrated social solutions, the power and pitfalls of mashups
Integrated social solutions, the power and pitfalls of mashupsIntegrated social solutions, the power and pitfalls of mashups
Integrated social solutions, the power and pitfalls of mashupsNordic APIs
 
Designing For Interoperability in Mobile
Designing For Interoperability in MobileDesigning For Interoperability in Mobile
Designing For Interoperability in MobileAllSeen Alliance
 
Cubeacon Smart Retail Industry with iBeacon Technology
Cubeacon Smart Retail Industry with iBeacon TechnologyCubeacon Smart Retail Industry with iBeacon Technology
Cubeacon Smart Retail Industry with iBeacon TechnologyAvianto Tiyo
 
Softeq Development Corp.
Softeq Development Corp.Softeq Development Corp.
Softeq Development Corp.Eugene Volkov
 
Iot secure connected devices indicthreads
Iot secure connected devices indicthreadsIot secure connected devices indicthreads
Iot secure connected devices indicthreadsIndicThreads
 
Creating an Internet of Everything
Creating an Internet of Everything Creating an Internet of Everything
Creating an Internet of Everything AllSeen Alliance
 

Tendances (20)

Building a Raspberry Pi Robot Arm with .NET 5, Blazor and SignalR - HackSoc -...
Building a Raspberry Pi Robot Arm with .NET 5, Blazor and SignalR - HackSoc -...Building a Raspberry Pi Robot Arm with .NET 5, Blazor and SignalR - HackSoc -...
Building a Raspberry Pi Robot Arm with .NET 5, Blazor and SignalR - HackSoc -...
 
Architectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud PlatformsArchitectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud Platforms
 
Io t technologies
Io t technologies Io t technologies
Io t technologies
 
Azure Percept Home Automation - .NET Liverpool - 28-10-21
Azure Percept Home Automation  - .NET Liverpool - 28-10-21Azure Percept Home Automation  - .NET Liverpool - 28-10-21
Azure Percept Home Automation - .NET Liverpool - 28-10-21
 
CIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open StandardsCIS14: Securing the Internet of Things with Open Standards
CIS14: Securing the Internet of Things with Open Standards
 
Intel® Developer Zone
Intel® Developer ZoneIntel® Developer Zone
Intel® Developer Zone
 
A Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of ThingsA Pragmatic Reference Architecture for The Internet of Things
A Pragmatic Reference Architecture for The Internet of Things
 
Machine Learning and Analytics in the Cloud on IoT Data
Machine Learning and Analytics in the Cloud on IoT DataMachine Learning and Analytics in the Cloud on IoT Data
Machine Learning and Analytics in the Cloud on IoT Data
 
The use case for Cassandra at Ping Identity
The use case for Cassandra at Ping IdentityThe use case for Cassandra at Ping Identity
The use case for Cassandra at Ping Identity
 
Internet of Everything Development Using AllJoyn
Internet of Everything Development Using AllJoynInternet of Everything Development Using AllJoyn
Internet of Everything Development Using AllJoyn
 
Ibm_IoT_Architecture_and_Capabilities
Ibm_IoT_Architecture_and_CapabilitiesIbm_IoT_Architecture_and_Capabilities
Ibm_IoT_Architecture_and_Capabilities
 
One Stop iBeacon Solution and Implementation
One Stop iBeacon Solution and ImplementationOne Stop iBeacon Solution and Implementation
One Stop iBeacon Solution and Implementation
 
IoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreadsIoT testing and quality assurance indicthreads
IoT testing and quality assurance indicthreads
 
IoT Node-Red Presentation
IoT  Node-Red PresentationIoT  Node-Red Presentation
IoT Node-Red Presentation
 
Integrated social solutions, the power and pitfalls of mashups
Integrated social solutions, the power and pitfalls of mashupsIntegrated social solutions, the power and pitfalls of mashups
Integrated social solutions, the power and pitfalls of mashups
 
Designing For Interoperability in Mobile
Designing For Interoperability in MobileDesigning For Interoperability in Mobile
Designing For Interoperability in Mobile
 
Cubeacon Smart Retail Industry with iBeacon Technology
Cubeacon Smart Retail Industry with iBeacon TechnologyCubeacon Smart Retail Industry with iBeacon Technology
Cubeacon Smart Retail Industry with iBeacon Technology
 
Softeq Development Corp.
Softeq Development Corp.Softeq Development Corp.
Softeq Development Corp.
 
Iot secure connected devices indicthreads
Iot secure connected devices indicthreadsIot secure connected devices indicthreads
Iot secure connected devices indicthreads
 
Creating an Internet of Everything
Creating an Internet of Everything Creating an Internet of Everything
Creating an Internet of Everything
 

En vedette

Fashion Europe Net Franchise Hungary Thomas Wilhelm
Fashion Europe Net Franchise Hungary Thomas WilhelmFashion Europe Net Franchise Hungary Thomas Wilhelm
Fashion Europe Net Franchise Hungary Thomas WilhelmThomas Wilhelm
 
Fashion Europe Net Fen Russian Thomas Wilhelm
Fashion Europe Net Fen Russian Thomas WilhelmFashion Europe Net Fen Russian Thomas Wilhelm
Fashion Europe Net Fen Russian Thomas WilhelmThomas Wilhelm
 
Proposta comunitat educativa (pla tic) edició
Proposta comunitat educativa (pla tic) edicióProposta comunitat educativa (pla tic) edició
Proposta comunitat educativa (pla tic) ediciópereruiz
 
Fashion Europe Net Fen Russian Thomas Wilhelm
Fashion Europe Net Fen Russian Thomas WilhelmFashion Europe Net Fen Russian Thomas Wilhelm
Fashion Europe Net Fen Russian Thomas WilhelmThomas Wilhelm
 
Presentation Bab 8 (Sejarah, Untuk 6 7 2009)
Presentation Bab 8 (Sejarah, Untuk 6 7 2009)Presentation Bab 8 (Sejarah, Untuk 6 7 2009)
Presentation Bab 8 (Sejarah, Untuk 6 7 2009)ngmannrm
 

En vedette (8)

Reporters And Photogs
Reporters And PhotogsReporters And Photogs
Reporters And Photogs
 
Social Media U
Social Media USocial Media U
Social Media U
 
Fashion Europe Net Franchise Hungary Thomas Wilhelm
Fashion Europe Net Franchise Hungary Thomas WilhelmFashion Europe Net Franchise Hungary Thomas Wilhelm
Fashion Europe Net Franchise Hungary Thomas Wilhelm
 
Fashion Europe Net Fen Russian Thomas Wilhelm
Fashion Europe Net Fen Russian Thomas WilhelmFashion Europe Net Fen Russian Thomas Wilhelm
Fashion Europe Net Fen Russian Thomas Wilhelm
 
Proposta comunitat educativa (pla tic) edició
Proposta comunitat educativa (pla tic) edicióProposta comunitat educativa (pla tic) edició
Proposta comunitat educativa (pla tic) edició
 
The Future Journalist
The Future JournalistThe Future Journalist
The Future Journalist
 
Fashion Europe Net Fen Russian Thomas Wilhelm
Fashion Europe Net Fen Russian Thomas WilhelmFashion Europe Net Fen Russian Thomas Wilhelm
Fashion Europe Net Fen Russian Thomas Wilhelm
 
Presentation Bab 8 (Sejarah, Untuk 6 7 2009)
Presentation Bab 8 (Sejarah, Untuk 6 7 2009)Presentation Bab 8 (Sejarah, Untuk 6 7 2009)
Presentation Bab 8 (Sejarah, Untuk 6 7 2009)
 

Similaire à Bw13 session2 app_dev_presenter_final

How to use Bluetooth® Smart to control your embedded device with a mobile device
How to use Bluetooth® Smart to control your embedded device with a mobile deviceHow to use Bluetooth® Smart to control your embedded device with a mobile device
How to use Bluetooth® Smart to control your embedded device with a mobile deviceAnaren, Inc.
 
CIS13: Identity at Scale
CIS13: Identity at ScaleCIS13: Identity at Scale
CIS13: Identity at ScaleCloudIDSummit
 
Connecting devices to the internet of things
Connecting devices to the internet of thingsConnecting devices to the internet of things
Connecting devices to the internet of thingsBernard Kufluk
 
AWS Summit Auckland- Developing Applications for IoT
AWS Summit Auckland-  Developing Applications for IoTAWS Summit Auckland-  Developing Applications for IoT
AWS Summit Auckland- Developing Applications for IoTAmazon Web Services
 
IoT cloud system implemented based on Azure services
IoT cloud system implemented based on Azure servicesIoT cloud system implemented based on Azure services
IoT cloud system implemented based on Azure servicesSzymon Włodarczyk
 
IBM Bluemix Presentation.pptx
IBM Bluemix Presentation.pptxIBM Bluemix Presentation.pptx
IBM Bluemix Presentation.pptxvishal choudhary
 
Without App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingWithout App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingOpen Interconnect Consortium
 
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoTIoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoTIoT Academy
 
Session 1908 connecting devices to the IBM IoT Cloud
Session 1908   connecting devices to the  IBM IoT CloudSession 1908   connecting devices to the  IBM IoT Cloud
Session 1908 connecting devices to the IBM IoT CloudPeterNiblett
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT GatewayEurotech
 
IThome DevOps Summit - IoT、docker與DevOps
IThome DevOps Summit - IoT、docker與DevOpsIThome DevOps Summit - IoT、docker與DevOps
IThome DevOps Summit - IoT、docker與DevOpsSimon Su
 
Exploring the Azure IoT Ecosystem
Exploring the Azure IoT EcosystemExploring the Azure IoT Ecosystem
Exploring the Azure IoT EcosystemBizTalk360
 
IoT: Connecting Devices and Manufacturing Equipment to the Cloud
IoT: Connecting Devices and Manufacturing Equipment to the CloudIoT: Connecting Devices and Manufacturing Equipment to the Cloud
IoT: Connecting Devices and Manufacturing Equipment to the CloudMichelle Devereux White
 
Join the Revolution: The Interconnected World with IBM Bluemix and IoT Founda...
Join the Revolution: The Interconnected World with IBM Bluemix and IoT Founda...Join the Revolution: The Interconnected World with IBM Bluemix and IoT Founda...
Join the Revolution: The Interconnected World with IBM Bluemix and IoT Founda...Joy Patra
 
Intel SoC as a Platform to Connect Sensor Data to AWS
Intel SoC as a Platform to Connect Sensor Data to AWSIntel SoC as a Platform to Connect Sensor Data to AWS
Intel SoC as a Platform to Connect Sensor Data to AWSAmazon Web Services
 
Introduction to ibm internet of things foundation
Introduction to ibm internet of things foundationIntroduction to ibm internet of things foundation
Introduction to ibm internet of things foundationBernard Kufluk
 
#IoTforReal Seminar slidedeck (Codit Belgium - Ghelamco Arena Gent)
#IoTforReal Seminar slidedeck (Codit Belgium - Ghelamco Arena Gent)#IoTforReal Seminar slidedeck (Codit Belgium - Ghelamco Arena Gent)
#IoTforReal Seminar slidedeck (Codit Belgium - Ghelamco Arena Gent)Codit
 
OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...
OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...
OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...Pôle Systematic Paris-Region
 
Delivering Network Innovation with SDN - Tom Nadeau
Delivering Network Innovation with SDN - Tom Nadeau Delivering Network Innovation with SDN - Tom Nadeau
Delivering Network Innovation with SDN - Tom Nadeau scoopnewsgroup
 

Similaire à Bw13 session2 app_dev_presenter_final (20)

How to use Bluetooth® Smart to control your embedded device with a mobile device
How to use Bluetooth® Smart to control your embedded device with a mobile deviceHow to use Bluetooth® Smart to control your embedded device with a mobile device
How to use Bluetooth® Smart to control your embedded device with a mobile device
 
CIS13: Identity at Scale
CIS13: Identity at ScaleCIS13: Identity at Scale
CIS13: Identity at Scale
 
Connecting devices to the internet of things
Connecting devices to the internet of thingsConnecting devices to the internet of things
Connecting devices to the internet of things
 
AWS Summit Auckland- Developing Applications for IoT
AWS Summit Auckland-  Developing Applications for IoTAWS Summit Auckland-  Developing Applications for IoT
AWS Summit Auckland- Developing Applications for IoT
 
IoT cloud system implemented based on Azure services
IoT cloud system implemented based on Azure servicesIoT cloud system implemented based on Azure services
IoT cloud system implemented based on Azure services
 
IBM Bluemix Presentation.pptx
IBM Bluemix Presentation.pptxIBM Bluemix Presentation.pptx
IBM Bluemix Presentation.pptx
 
Without App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of AnythingWithout App Standards, There's No Internet of Anything
Without App Standards, There's No Internet of Anything
 
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoTIoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
IoT Update Oktober 2019 | Jan Depping @Microsoft | The next step in IoT
 
Session 1908 connecting devices to the IBM IoT Cloud
Session 1908   connecting devices to the  IBM IoT CloudSession 1908   connecting devices to the  IBM IoT Cloud
Session 1908 connecting devices to the IBM IoT Cloud
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
 
IThome DevOps Summit - IoT、docker與DevOps
IThome DevOps Summit - IoT、docker與DevOpsIThome DevOps Summit - IoT、docker與DevOps
IThome DevOps Summit - IoT、docker與DevOps
 
Exploring the Azure IoT Ecosystem
Exploring the Azure IoT EcosystemExploring the Azure IoT Ecosystem
Exploring the Azure IoT Ecosystem
 
El nodo
El nodoEl nodo
El nodo
 
IoT: Connecting Devices and Manufacturing Equipment to the Cloud
IoT: Connecting Devices and Manufacturing Equipment to the CloudIoT: Connecting Devices and Manufacturing Equipment to the Cloud
IoT: Connecting Devices and Manufacturing Equipment to the Cloud
 
Join the Revolution: The Interconnected World with IBM Bluemix and IoT Founda...
Join the Revolution: The Interconnected World with IBM Bluemix and IoT Founda...Join the Revolution: The Interconnected World with IBM Bluemix and IoT Founda...
Join the Revolution: The Interconnected World with IBM Bluemix and IoT Founda...
 
Intel SoC as a Platform to Connect Sensor Data to AWS
Intel SoC as a Platform to Connect Sensor Data to AWSIntel SoC as a Platform to Connect Sensor Data to AWS
Intel SoC as a Platform to Connect Sensor Data to AWS
 
Introduction to ibm internet of things foundation
Introduction to ibm internet of things foundationIntroduction to ibm internet of things foundation
Introduction to ibm internet of things foundation
 
#IoTforReal Seminar slidedeck (Codit Belgium - Ghelamco Arena Gent)
#IoTforReal Seminar slidedeck (Codit Belgium - Ghelamco Arena Gent)#IoTforReal Seminar slidedeck (Codit Belgium - Ghelamco Arena Gent)
#IoTforReal Seminar slidedeck (Codit Belgium - Ghelamco Arena Gent)
 
OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...
OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...
OSIS19_IoT :Transparent remote connectivity to short-range IoT devices, by Na...
 
Delivering Network Innovation with SDN - Tom Nadeau
Delivering Network Innovation with SDN - Tom Nadeau Delivering Network Innovation with SDN - Tom Nadeau
Delivering Network Innovation with SDN - Tom Nadeau
 

Dernier

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Bw13 session2 app_dev_presenter_final

  • 1. Bluetooth SIG Proprietary and Confidential 1Bluetooth SIG Proprietary and Confidential 1 Click to edit Master title style Click to edit Master subtitle style Appcessories Bridging the Digital to the Physical
  • 2. Bluetooth SIG Proprietary and Confidential 2Bluetooth SIG Proprietary and Confidential 2 What’s In It For Me? • Understand the opportunity – Great potential for growth and monetization with appcessories – Bluetooth technology‟s role • What a sample Bluetooth implementation looks like – From „profiles‟ and use cases to code • Where to find more resources – Hint: developer.bluetooth.org
  • 3. Bluetooth SIG Proprietary and Confidential 3Bluetooth SIG Proprietary and Confidential 3 Digital and Physical Worlds Collide!
  • 4. Bluetooth SIG Proprietary and Confidential 4Bluetooth SIG Proprietary and Confidential 4 Appcessories = Application + Accessory They are complementary devices that enable people to interact with technology like never before by creating physical experiences to strengthen the digital experience What Is An Appcessory? MobiPlex - SwingTIP What makes Bluetooth a good fit for Appcessories?  Performance  THE Standard for device connectivity
  • 5. Bluetooth SIG Proprietary and Confidential 5Bluetooth SIG Proprietary and Confidential 5 1,000,000,000 Devices* Why Should I Care? 1,000,000,000x Applications * 2012 ANALYSIS OF THE BLUETOOTH MARKET AND INDUSTRY, ABI Research
  • 6. Bluetooth SIG Proprietary and Confidential 6Bluetooth SIG Proprietary and Confidential 6 Let Me Share a Story…
  • 7. Bluetooth SIG Proprietary and Confidential 7Bluetooth SIG Proprietary and Confidential 7 Bluetooth – Bridging the Gap App for the Phone Sensor-based device for the Lock For the Connection • Well defined specs and protocols • Standard way to implement solutions
  • 8. Bluetooth SIG Proprietary and Confidential 8Bluetooth SIG Proprietary and Confidential 8 Smart Device Profiles – Defining the Use Cases A Generic Attribute Profile (GATT) is a description of how a device functions for a given scenario/use case Generic Attribute Profile Service Value Characteristic Value Value Value Characteristic Value Value First thing we need to do is to define the use cases…
  • 9. Bluetooth SIG Proprietary and Confidential 9Bluetooth SIG Proprietary and Confidential 9 Profile for the Lock Mechanism What is your use case? Let’s focus on the Password-enabled scenario Admin User Lock Turn ‘on’ PWD PWD ‘on’ AK Change PWD Send Admin PWD Admin PWD Send Good/Bad New User PWD Send User PWD Change AK In this flow, we will assume that the Admin PWD given is correct Encrypted Encrypted • We want an admin to be able to turn passwords on/off • We want an admin to be able to send an ‘admin’ password, which can then be used to set the ‘user’ password
  • 10. Bluetooth SIG Proprietary and Confidential 10Bluetooth SIG Proprietary and Confidential 10 Service Definition for the Lock Mechanism High-level sample profile Lock Mechanism Profile Lock Service Yes Locked … Code Service ON Status 12345 User Code 54321 Admin Code • Use case scenarios are important to define – Design decisions are important to your scenario(s) – Lock Service – is it simply a toggle? – Code Service – are we covering all of the right use cases? • Quick word on Adopted Profiles… – Proximity is an example – Contains a „link loss‟, an „immediate alert level‟, and a „transmit power‟ service – Can easily add those services to your „custom‟ profile‟.
  • 11. Bluetooth SIG Proprietary and Confidential 11Bluetooth SIG Proprietary and Confidential 11 Attribute Tables for Lock Mechanism Handle Type Value Permissions 1 «Primary Service» «Code Service» -- 2 «Status» {r/w, 3, «Value for Status»} Read/Write 3 «Value for Status» “ON” -- 4 «User Code» {r/w, 5, «Value for Code»} Read/Write 5 «Value for Code» “12345” -- 6 «Admin Code» {r/w, 7, «Value for Code»} Read/Write 7 «Value for Code» “54321” -- • Smart Device stores Service data in an Attribute Table – Implemented on the actual Smart Device to store data • Structure defined by GATT – Every entry in the table is considered an attribute – Service, Characteristic, Value, etc
  • 12. Bluetooth SIG Proprietary and Confidential 12Bluetooth SIG Proprietary and Confidential 12 Smart Ready Platforms and Profiles When creating apps for modern smartphone platforms, many Bluetooth details are abstracted away by the underlying SDK • In many cases, still requires knowledge of the profile. • Each platform has their own SDK and are a bit different – Microsoft, Apple, Blackberry, Google • Refer to the SDK docs of the platform you are targeting Generic Attribute Profile Service Value Characteristic Value Value Value Characteristic Value Value
  • 13. Bluetooth SIG Proprietary and Confidential 13Bluetooth SIG Proprietary and Confidential 13 • Smart Device Discovery Typical Bluetooth Application Flow Smart Device Advertises Itself Smart Ready Hub Scans for Advertisements Smart Ready Hub requests a Connection Smart Device accepts Connection request • Smart Device Connection to Smart Ready Hub
  • 14. Bluetooth SIG Proprietary and Confidential 14Bluetooth SIG Proprietary and Confidential 14 • Interacting with Services Typical Bluetooth Application Flow – Smart Ready Hub can look at services and the values they contain in Smart Devices – Smart Ready Hub can send commands to the Smart Device services – Smart Ready Hub can receive commands and updates from the Smart Device • Requires the services to be configured properly on the Smart Device
  • 15. Bluetooth SIG Proprietary and Confidential 15Bluetooth SIG Proprietary and Confidential 15 Lockitron – Not Just a Story • Turn your mobile phone into a key. • Send permanent or temporary virtual keys to family, friends and house guests. • Your mobile phone can be better than a key – keep it in your pocket. Keyless entry with your phone – Bluetooth low energy – “…the only wireless technology we can keep on for extended periods and is integrated directly into mobile phones.” – “With Bluetooth low energy, we can carry out commands without the user tapping the app.” Cameron Robertson, Founder
  • 16. Bluetooth SIG Proprietary and Confidential 16Bluetooth SIG Proprietary and Confidential 16 Bridging the Digital to the Physical Internet Connected Native APIs for applications ®
  • 17. Bluetooth SIG Proprietary and Confidential 17Bluetooth SIG Proprietary and Confidential 17 Implementation – Getting Started • Texas Instruments CC2541 – Single-chip single-mode Bluetooth low energy System-on-a-Chip – Contains radio, MCU, stack, profiles, applications, and on-chip peripherals – everything needed for your product! • CC2541 Sensor Tag Kit – Fully working Bluetooth low energy peripheral based on CC2541 – Contains sensors for temperature, humidity, accelerometer, magnetometer – Enables app developers to quickly develop prototype Bluetooth low energy software • CC2541 Mini Development Kit – Includes CC2541 Keyfob, USB Dongle, and Debugger – Enables CC2541 embedded software development
  • 18. Bluetooth SIG Proprietary and Confidential 18Bluetooth SIG Proprietary and Confidential 18 Implementation – TI iOS SensorTag App • Targeting Smart Phone App Developers • Limitless App Possibilities – Health and fitness, medical, educational tools, toys, remote controls, mobile phone accessories, and proximity. • The CC2541 SensorTag kit shortens the design time for Bluetooth low energy app development from months to hours – No embedded software design knowledge required. – The SensorTag includes all SW needed for App development – TI has a SensorTag App on the App Store providing developers with easy access to the tools they need. – iOS Example App Source Code available for download at http://ti.com/sensortag
  • 19. Bluetooth SIG Proprietary and Confidential 19Bluetooth SIG Proprietary and Confidential 19 Implementation – Developing for iOS • Development done using Xcode • Xcode runs on OSX [Mountain] Lion • Xcode and simulator is free – BLE requires physical iOS device • Physical device download requires Apple Developer Account – Costs 99$ per year at developer.apple.com/programs/ios
  • 20. Bluetooth SIG Proprietary and Confidential 20Bluetooth SIG Proprietary and Confidential 20 Implementation – iOS Source Code • The communication is asynchronous between app and iOS’s CoreBluetooth API • We issue commands to CBCentralManager and CBPeripheral – [BLEUtility writeCharacteristic ...]  – [peripheral writeValue:data ... ]; • Then act as delegate for CBCentralManager – centralManagerDidUpdateState – didDiscoverPeripheral – didConnectPeripheral • And for CBPeripheral – didDiscoverServices – didUpdateValueForCharacteristic – didWriteValueForCharacteristic • Delegates implement callbacks according to a protocol. A design pattern used in iOS.
  • 21. Bluetooth SIG Proprietary and Confidential 21Bluetooth SIG Proprietary and Confidential 21 Implementation – Developing for CC2541 • TI provides license-free Bluetooth low energy qualified protocol stack and profiles • Application development using C using IAR Embedded Workbench • Operating system abstraction layer (OSAL) with priorized event handler, memory management, task messaging, and NV drivers • Sample applications included with SDK – Standard profile applications such as Proximity, Heart Rate Sensor, Glucose Sensor, etc... – Custom profile applications such as SensorTag, Generic Peripheral, Generic Central • Additional Features – Over-the-Air Firmware Updates – Boot Image Manager- run multiple firmware images on one chip – Hardware Abstraction Layer (HAL) drivers for on-chip peripherals including SPI, UART, I2C, ADC, Timers
  • 22. Bluetooth SIG Proprietary and Confidential 22Bluetooth SIG Proprietary and Confidential 22 Resources on the Portal • Knowledge Center – White papers – Training Videos • Development Resources – Quick Start Kit – Platform availability for Smart and Smart Ready – Recorded webinars on development topics – Links to SIG tools (PTS, etc.) • Forums • GATT specifications http://developer.bluetooth.org
  • 23. Bluetooth SIG Proprietary and Confidential 23Bluetooth SIG Proprietary and Confidential 23 Coming Soon – New Developer Resources • Bluetooth Quick Start Kit v2 – Fundamentals for device makers new to Bluetooth Low Energy • GATT, GAP, ATT, adopted profiles, etc. – Sample application • “Hello Bluetooth” – iOS, Android, Windows 8 • Bluetooth Application Accelerators v1 – Accelerator for application developers – Educational content • Setting up your environment • Tutorial/code walkthrough – Fully commented sample code • iOS initially http://developer.bluetooth.org
  • 24. Bluetooth SIG Proprietary and Confidential 24Bluetooth SIG Proprietary and Confidential 24 Appcessories – Join the Movement • Appcessory market is mainstream – Great potential for growth and monetization • Bluetooth can help you bridge the digital to the physical – Bluetooth is the a defacto standard • Grab a development kit and start today