Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Title
Copyright Page
Dedication Page
Contents
Preface
Acknowledgments
About the Author
Part I: Overview
Chapter 1. What Is Bluetooth Low Energy?
1.1. Device Types
1.2. Design Goals
1.3. Terminology
Chapter 2. Basic Concepts
2.1. Button-Cell Batteries
2.2. Time Is Energy
2.3. Memory Is Expensive
2.4. Asymmetric Design
2.5. Design For Success
2.6. Everything Has State
2.7. Client-Server Architecture
2.8. Modular Architecture
2.9. One Billion Is a Small Number
2.10. Connectionless Model
2.11. Paradigms
Chapter 3. Architecture
3.1. Controller
3.2. The Host
3.3. The Application Layer
3.4. Stack Splits
Chapter 4. New Usage Models
4.1. Presence Detection
4.2. Broadcasting Data
4.3. Connectionless Model
4.4. Gateways
Part II: Controller
Chapter 5. The Physical Layer
5.1. Background
5.2. Analog Modulation
5.3. Digital Modulation
5.4. Frequency Band
5.5. Modulation
5.6. Radio Channels
5.7. Transmit Power
5.8. Tolerance
5.9. Receiver Sensitivity
5.10. Range
Chapter 6. Direct Test Mode
6.1. Background
6.2. Transceiver Testing
6.3. Hardware Interface
6.4. Direct Testing by Using HCI
Chapter 7. The Link Layer
7.1. The Link Layer State Machine
7.2. Packets
7.3. Packet Structure
7.4. Channels
7.5. Finding Devices
7.6. Broadcasting
7.7. Creating Connections
7.8. Sending Data
7.9. Encryption
7.10. Managing Connections
7.11. Robustness
7.12. Optimizations for Low Power
Chapter 8. The Host/Controller Interface
8.1. Introduction
8.2. Physical Interfaces
8.3. Logical Interface
8.4. Controller Setup
8.5. Broadcasting and Observing
8.6. Initiating Connections
8.7. Connection Management
Part III: Host
Chapter 9. Logical Link Control and Adaptation Protocol
9.1. Background
9.2. L2CAP Channels
9.3. The L2CAP Packet Structure
9.4. The LE Signaling Channel
Chapter 10. Attributes
10.1. Background
10.2. Attributes
10.3. Grouping
10.4. Services
10.5. Characteristics
10.6. The Attribute Protocol
10.7. The Generic Attribute Profile
Chapter 11. Security
11.1. Security Concepts
11.2. Pairing and Bonding
11.3. Signing of Data
Chapter 12. The Generic Access Profile
12.1. Background
12.2. GAP Roles
12.3. Modes and Procedures
12.4. Security Modes
12.5. Advertising Data
12.6. GAP Service
Part IV: Application
Chapter 13. Central
13.1. Background
13.2. Discovering Devices
13.3. Connecting to Devices
13.4. What Does This Device Do?
13.5. Generic Clients
13.6. Interacting with Services
13.7. Bonding
13.8. Changed Services
13.9. Implementing Profiles
Chapter 14. Peripherals
14.1. Background
14.2. Broadcast Only
14.3. Being Discoverable
14.4. Being Connectable
14.5. Exposing Services
14.6. Characteristics
14.7. Security Matters
14.8. Optimizing for Low Power
14.9. Optimizing Attributes
Chapter 15. Testing and Qualification
15.1. Starting a Project
15.2. Selecting Features
15.3. Consistency Check
15.4. Generating a Test Plan
15.5. Creating a Compliance Folder
15.6. Qualification Testing
15.7. Qualify Your Design
15.8. Declaring Compliance
15.9. Listing
15.10. Combining Components
Index
Footnotes
Chapter 1
Chapter 3
Chapter 4
Chapter 5
Chapter 7
Chapter 10
Chapter 11
Chapter 13
Chapter 15
← Prev
Back
Next →
← Prev
Back
Next →