The author's blog address: http://blog.sina.com.cn/samzhen1977By Sam (zhufeng)Sam_code@hotmail.com
Write BluetoothProgramYou often need to determine whether to send the Bluetooth package and how the content is. This is the same as packet capture when writing a network program. But with the Network Program (UseEthereal) the difference is that Bluetooth is transmitted wirelessly, so BluetoothProtocol analy
The author's blog address: http://blog.sina.com.cn/samzhen1977
By Sam (zhufeng) sam_code@hotmail.com
Service DiscoveryProtocol (SDP) provides a capability for applications to discover which service is available and the features of this service.
Service Discovery Protocol (SDP or BluetoothSDP) in the Bluetooth protocol stack, applications in the
Bluetooth 4.0/ble protocol Stack Learning notes (i)
Required Software tools:
1. BLE protocol stack (ble-cc254x-1.4.0)
2. IAR development software (IAR Embedded Workbench8.20.2)
Note: The 1.4.0 protocol stack uses the 8.20.2 version of IAR, the 1.3.2 protocol stack, etc.,
Briefly
SMP is the security Manager Protocol. Its content is mainly pairing and key distribution, and then using key to the link or data encryption. Reference Articles
Before you understand the SMP protocol, you need some prior knowledge of BLE security management to refer to:Introduction to the SMP security management of BluetoothPairing method of Bluetooth se
type: ( Cbcharacteristicwritetype) Type is a method of writing data to a peripheral device, and it responds to the following method-(void) Peripheral: (cbperipheral *) Peripheral didwritevalueforcharacteristic: (cbcharacteristic *) characteristic Error: (Nserror *) error{ NSLog (@ "---didwritevalueforcharacteristic-----"); if ([characteristic. UUID isequal:[cbuuid Uuidwithstring:kwrritecharacteristicuuid]) { NSLog (@ "----value update----");} }In this way, the central device
Keywords: Bluetooth bluetooth® protocol SDP Anatomy SDP overview SDP notes
Author: Zhongjun
In the spirit of mutual learning purposes, to share this series of articles, welcome reprint, please specify the author, respect for copyright, thank you
Please correct me if the article is not in the wrong place, learn together
You can also access my csdn:http
Recently in the porting QQ IoT protocol, you need to read the device MAC address.Read the CC2541 device MAC address method, there is a direct read Mac register, you can also call the protocol stack API. This takes the form of a call API.1 /*use the protocol stack API to read MAC addresses*/2 StaticUint8 macaddr[b_addr_len]={0};//MAC address3uint8_t macstr[
): define the number of bytes in option Data configuration response (code 0x05): Response configuration requst
SCID is the recipient of this res device's cidflags (2 octets) does not explain the structure of the remaining command and the above is similar, not described one by one, refer to the Spec1425-1438. 7. some configuration options (1) Maximum Transmission Unit (MTU): All L2CAP implementations need to support up to 48 bytes (on ACL-U) and 23 bytes (on LE-U ).
MTU: The maximum SDU size (nu
OMA Protocol WizardA concise tutorial to help you understand the OMA Protocol (i) (b)
Unlike the TR069 protocol, because OMA is designed to support data synchronization between different devices across networks, OMA's data transfer is not only built on the Internet session layer using HTTP transmission, OMA also suppo
eventually trigger the application layer once the corresponding message comes in:As for why, don't say it firstThe rest of the routine process is basically like this!2.2. Serial Port RoutinesThe callback function is used when the serial port is initialized, similar to C #, so the data receive is processed in the callback function ~Above 95 lines, the serial port initialization function parameter is the serial port to receive the callback function----> specific as follows:The above is the serial
Tutorial on http protocol and http protocolSummary
Hyper Text documents contain hyperlinks that point to other resources. Hypertext document is the foundation of World Wide Web (www.
The HTTP protocol solves the problem of file transmission. HTTP is an application layer protocol, mainly based on TCP
Tutorial on using GTIDs replication protocol and interrupt protocol in MySQL
MySQL5.6 has many new features, and many of them are interested in the global transaction sequence number function (GTIDs ). The reason why everyone is very interested in this feature is also very understandable, that is, it is always very troublesome to re-connect the slave server and a
Tutorial on using GTIDs replication protocol and interrupt protocol in MySQL, mysqlgtids
MySQL5.6 has many new features, and many of them are interested in the global transaction sequence number function (GTIDs ). The reason why everyone is very interested in this feature is also very understandable, that is, it is always very troublesome to re-connect the slave
can also directly read books.35.3 FTP basic Knowledge point(The knowledge points here are collated from the reference address above)Tutorial here also on the basic knowledge of FTP to do an introduction, so that we have a general understanding of the first.35.3.1 FTP Brief descriptionFTP (file Transfer Protocol) is used for two-way transmission of control files over the Internet. At the same time, it is al
Serialization | Iot framework ServerSuperIO tutorial-9. protocol filter, which solves multiple packets, sticks to packets, and redundant data. What does redundancy mean?
1. C # Introduction to cross-platform Iot communication framework ServerSuperIO (SSIO)
Serialization | Iot framework ServerSuperIO tutorial 1.4 communication modes and mechanisms.
Serialization |
1. Fiddler Introduction
Fiddler is an HTTP protocol debugging agent tool written using C #. It supports numerous HTTP debugging tasks, can record and check all the HTTP communication between your computer and Internet, can set breakpoints, see all the "in and Out" Fiddler data (COOKIE,HTML,JS,CSS, etc.).
This article is fiddler introductory tutorial, mainly introduces fiddler download installation, HTTP in
(this is a hyperlink)
For beginners, learning the above four references is enough. If you have a network of books, such as "TCP/IP detailed", you can also directly read books.23.3 ARP Basics points(The knowledge points here are collated from the reference address above)Tutorial here also on the basic knowledge of ARP to do an introduction, so that we have a general understanding of the first.23.3.1 ARP Brief descriptionThe basic function of ARP
Some basic attributes that need to be instantiated can be defined in the protocol. here, let's take a look at the protocol (protocol) tutorial in Swift. For more information, see
I. INTRODUCTION
The protocol defines some attributes and methods. Their functions are similar t
take precedence over the local cache.One workaround is to turn on the server push only for the first access user. The following is an example of the official Nginx, based on the Cookie to determine whether the first access.
Server{Listen443 SSL HTTP2 Default_server; Ssl_certificate SSL/certificate. PEM; Ssl_certificate_key SSL/key. PEM; Root/var/www/html; Http2_push_preload on; Location = /demo. html {add_header Set-cookie "Session=1"; Add_header Link $ Resources; }}map $http _cookie $resou
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.