Clayton snuck into the embedded industry from mechanical engineering via developing production test equipment, and picked up a good bit of circuit design and layout along the way. His work currently focuses on the control of DC Charging Systems where he is the lead engineer for Balmar's high output alternator and multi-stage external regulator products. Clayton holds a BSE in mechanical engineering and is in the final year of his Master's of Science in Software Engineering degree with a concentration in embedded systems at the University of Alabama in Huntsville
The talk covers a brief overview of Bluetooth MESH networking and data structures. It then introduces an example application and walks through the dataflow and data models from sensor node to Raspberry Pi datastore (HomeAssistant). A walkthrough of the provisioning process is also covered.
What is the main practical implication of Bluetooth Mesh using a lightweight flooding protocol over BLE advertising for application data payloads and network behavior?
AIt increases the usable application payload size because advertising packets are large, letting you send big sensor readings in one packet.
BIt limits the usable application payload to a small number of bytes (about 11) and causes transmissions to be retransmitted (flooded) across nodes, with duplicate suppression via a recent-packet cache.
CIt provides deterministic point-to-point routing so each packet follows a single optimal path with minimal retransmits.
DIt prevents nodes from suppressing duplicates, so every node forwards every packet indefinitely to ensure delivery.
EIt means every node must decrypt a packet before forwarding, which prevents flooding until decryption succeeds.
During provisioning, what distinct roles did Clayton assign to the network key and the application key?
AThe network key decrypts application-layer payloads, while the application key only authenticates the node.
BThe network key allows the node to send and receive packets on the network but does not let it decrypt application-layer payloads; the application key lets it decrypt application-layer payloads that match.
CThe application key gives network-level access and routing permissions, while the network key is only used for device identification.
DBoth keys are interchangeable and perform the same function once provisioning is complete.
EThe network key is only used for low-power nodes, while the application key is only for relay nodes.
Why did Clayton say relay nodes are generally unsuitable for battery-powered sensor devices?
ARelay nodes have very limited flash memory, which makes them unsuitable for storing sensor firmware on batteries.
BRelay nodes continuously transmit across the three advertising channels and draw about 7 milliamps almost continuously, making them not power-efficient for battery use.
CRelay nodes require constant manual re-provisioning that drains battery life quickly.
DRelay nodes must continuously scan Wi‑Fi networks in addition to Bluetooth, which kills battery life.
ERelay nodes cannot host sensor models, so they must run additional processes that use more power on battery.