BLE-NRF51822 tutorial 9-dynamic password (pairing code)
NordicBLE technology exchange group 498676838This tutorial also describes how to modify the dynamic password (actually a pair code) based on the uart example in the sdk. The Uart example is in the following directory:
XXX \ Keil_v5 \ ARM \ Pack \ nordicsemicondu\ nRF_Examples \ 9.0.0 \ ble_peripheral \ ble_app_uart
Some theoretical knowledge about pairing is introduced in the static password tut
Bluetooth Low-Power BLE: Controls GPIO to light LEDs and blegpio
This section describes the simplest and most basic things. The ios operation of the CC2540 uses the PORT as the GPIO. If you don't talk much about it, let's look at it.
1. Hardware Circuit
The most simple hardware circuit is to use a GPIO to control the LED light. Since GPIO is used as the output, the GPIO mode is not required.
It is quite simple to control the GPIO on the left to switc
1. The problem now encountered, the phone into hibernation after the wake, the app software and CC2541 communication is not normal, but CC2541 still detect when the connection state. How to solve this problem? Will the activity be recreated after the phone wakes up?2.Wakelock lock Mechanism:Applications can vote on whether the system is standby by applying the Wakelock lock mechanism, and when any application has applied for a wakelock lock, it is not released during standby and the system will
TI ble protocol stack comes with data encryption and decryption function, there are two functions, respectively, are encrypted and decrypted, each function is three parameters, are 16 bytes, if the actual data less than 16 bytes, after the completion of their own, after the encryption via Bluetooth, the other device received this data, inverse, get 16 bytes of data, Take the number of bytes you need (if characteristic value is only 1 bytes, take 1 byt
Requirements: BLE connection and communication (do now-device on-search device-connect device)Resources: Some demos and official documents from the Web:1-ble is a Android4.3 version of the api-to provide some conceptual things or it is necessary to understandAt present, the Android real machine can only accept and control products-that is, the client side of the-server end is only a product-and Apple seems
A few days ago, something happened. When I went to work in the morning, I took the key of my daughter-in-law and we couldn't lock the door without the key. So when my daughter-in-law was about to leave, she couldn't lock the door, so she had to call me. At that time, I had already arrived at Huo camp. Well, I had to go back and give my daughter-in-law the key. Then I was late for work both of them, I am also very depressed. This is a hot day!
I have been learning
BrieflyThe aerial package format of the link layer should be the basic unit of all packages based on the other layers on the ble Link layer, so it is necessary to have an understanding of the rest of the package, and to analyze the basics of the Bluetooth protocol through the aerial package.Aerial package formatFirst Look at:This is the Bluetooth BLE air packet in the overall format.Preambleheader, used to
This article describes how to implement Ble Bluetooth, a small program. The source code download is provided, which has good reference value. Next let's take a look at the small Editor. This article mainly introduces the implementation of Ble Bluetooth, a small program. The source code download is provided, which has good reference value. Let's take a look at it with the small editor.
Not for a while. I ha
BLE bluetooth communication bluetooth_4.3The demo is primarily compatible with Bluetooth communication between Android4.3 devices that support ble. key features include:1, Bluetooth open, close;2, the surrounding Bluetooth to open the device search, build connected3, after the successful establishment of the connection, through Bluetooth to send messages to each other. Note: This app must be installed on bo
again. But I think it might be a supplement to the public address.This is the private address of the resolvable, the Prand part is a randomly generated 24bit value, the hash portion is generated using the following method:hash = ah(IRK, prand)Ah is an SMP part of the random address generation function, Irk is the key (Identity resolving key), the first randomly generated prand part, and then use this algorithm to generate the hash, and then the hash and Prand part into the corresponding bit reg
Android Bluetooth Low-Power (BLE) is a great tool to get the steps of Xiaomi bracelet, androidble
Now the Internet of Things is booming, and Xiaomi's wristband and other products, next we will study the progress Logging Function of Xiaomi's wristband.
Tool
Package com. zsl. bluetoothdemo. ble; import android. bluetooth. export thadapter; import android. bluetooth. export thdevice; import android. b
This tutorial explains how to use the phone to dynamically modify the device name, the device name after reaching the device to connect to the phone, and then disconnect and then scan to see the new device name.
The tutorial is based on Uartdemo under sdk9.0, in the following directory Xxx\keil_v5\arm\pack\nordicsemiconductor\nrf_examples\9.0.0\ble_peripheral\ble_app_ Uart
The Nordic protocol stack implementation will have a Generic access service and Generic attribute service by default (some
The demo is primarily compatible with Bluetooth communication between Android4.3 devices that support ble.Key features include:1, Bluetooth open, close;2, the surrounding Bluetooth to open the device search, build connected3, after the successful establishment of the connection, through Bluetooth to send messages to each other.Note: This app must be installed on both sides to observe the Send/Receive message.:Http://www.dwz.cn/Csa8U and nbsp NBSP ;
When looking at the source code, it generally starts from the entrance of the entire code, and the source code of the Ti ble protocol stack is no exception. Its main () function is the entry of the entire program, which is automatically called when the system powers on.
It mainly does the following:
(1) underlying hardware Initialization Configuration
(2) create a task and initialize the task Configuration
(3) Detect and execute valid task events
Th
When looking at the source code, it generally starts from the entrance of the entire code, and the source code of the ti ble protocol stack is no exception. Its main () function is the entry of the entire program, which is automatically called when the system powers on.
It mainly does the following:
(1) underlying hardware Initialization Configuration
(2) create a task and initialize the task Configuration
(3) Detect and execute valid task events
Th
BLE-NRF51822 tutorial 8-dynamic Broadcast
This topic describes how to implement dynamic broadcast.
The tutorial is based on the Uart example in the 9.0 sdk.
To implement dynamic broadcast, choose broadcast> stop broadcast> modify parameters> restart broadcast.
Therefore, we use a timer to Periodically disable broadcast and then modify broadcast data before enabling broadcast.
In Sdk 9.0, I implemented several broadcast modes, which was a little tro
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.