EBL Bluetooth Unit

INNOVATIVE SYSTEMS

The Bluetooth Trainer "EBL" operates in conjunction with a computer, which is connected with the Bluetooth Dongle, that allows communicating and programming the Bluetooth Devices to perform a simple Bluetooth network.

See general description

RELATED NEWS

General Description

The Bluetooth Trainer "EBL" operates in conjunction with a computer, which is connected with the Bluetooth Dongle, that allows communicating and programming the Bluetooth Devices to perform a simple Bluetooth network.

The two Bluetooth Devices (included in the supply) have a LCD display that shows the current state of the devices (linking status, input messages, output messages, etc).

The "EBL" allows to perform a complete Bluetooth link between the computer and the Bluetooth Devices and to get familiar with all the procedure involved in the configuration of a Bluetooth link (configuring the link, scanning new devices, configuring the communication parameters, programming the Bluetooth Devices, encrypting the communication, etc).

Exercises and guided practices

GUIDED PRACTICAL EXERCISES INCLUDED IN THE MANUAL

  1. Familiarization with the trainer.
  2. Study of the different Bluetooth profiles.
  3. Establish a connection between master and slave devices.
  4. Analysis of the received signal strength indicator (RSSI) of a Bluetooth low energy (BLE) connection.
  5. Analysis of the writing and reading of a character in a Bluetooth communication.
  6. Familiarization with Bluetooth low energy packet sniffer.
  7. Use the Bluetooth low energy packet sniffer to analyze the advertising and discovery events.
  8. Use the Bluetooth low energy packet sniffer to analyze the start and termination of a link.
  9. Use the Bluetooth low energy packet sniffer to analyze the reading and writing of a character between devices.
  10. Familiarization with Bluetooth control software.
  11. Establish a connection between the computer and two Bluetooth slaves.
  12. Configure the connection parameters of a Bluetooth communication.
  13. Read and Write characters from an established Bluetooth network.
  14. Protect the Low Energy Bluetooth communication from MITM (Man in the middle) attacks by encrypting the connection with a passcode.

SIMILAR UNITS AVAILABLE

Quality

AFTER-SALES SERVICE