English
English
简体中文
Register
Log In
English
English
简体中文
Register
Log In
Language
English
English
简体中文
Register
Log In

Beacon Mesh, Single Point (Bluetooth LE), and Bluetooth Mesh, what are the differences?

Last Updated on2024-02-18 06:46:21
Bluetooth protocols that can be integrated into the Tuya platform include: Tuya Bluetooth LE protocol (referred to as single point, that is, single node connection control), Bluetooth Mesh protocol, and Beacon Mesh protocol.
Tuya Bluetooth Protocol ClassificationCommunication MethodTypical FeaturesTypical Applications
Tuya Bluetooth LECommunicate with mobile phones or gateways via Bluetooth LE connectionDirect connection, low power consumption, fast transmission rateWristbands, watches, smart toothbrushes, smart body fat scales
Bluetooth MeshBluetooth networking communication following the SIG Bluetooth Mesh standardMesh network, large-scale group controlMesh lighting, commercial lighting, smart home kits
Beacon MeshCommunication between mobile phones or gateways through Bluetooth LE broadcastingSmall data packets, short distance, ultra-low speed, ultra-low cost, support for forwardingLow-cost door magnets, PIR, temperature and humidity sensors, low-cost light strips, low-cost wall stickers, remote controls, scene switches
Compared to the other two protocols, the Beacon Mesh protocol is very streamlined, and its SDK is particularly suitable for direct porting to various Bluetooth LE Beacon chips, achieving SoC-level low-cost applications.
Beacon Mesh SDK Features
  • Extremely simple code: a total of about 1000 lines of C language code, which can run on chips with 2K RAM + 16K ROM.
  • Cross-platform: The design level supports cross-hardware platforms. By implementing less than 10 hardware and Bluetooth broadcasting related functions, porting can be achieved.
  • Complete functionality: The SDK implements rich IoT communication capabilities such as pairing and unbinding, packet assembly and disassembly, group management, self-organizing network, forwarding, encryption and decryption, and security policies.

Click for services and help

Help Center