[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

BlueTooth Device Discovery - Using C#

Posted on 2004-04-02
9
Medium Priority
?
5,725 Views
Last Modified: 2013-12-14
I'm attempting to perform device discovery using C#. I've found many valuable references on how to do this on the web and in books. The problem is, all of them are written  assuming the programmer is using C++. While Java, VB and CSharp and not an issue for me, translating the code from the pointer heavy world of C++ to CSharp is taking more time than it's worth.

Does anyone know of any good examples of Bluetooth programming using c#. Anything specific to device discovery would be most appreciated.

Thanks!
Tom
0
Comment
Question by:tdenniso
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
9 Comments
 

Author Comment

by:tdenniso
ID: 10740323
Hi Desp

I've been looking at the article on DevX and it's been helpful for the actual comm port communications, however, it does not go into the device discovery steps. It assumes you know the device you want to connect with and connect to it via the Bluetooth control panel.

On the other, I think that's written in C++ as well, and it seems to be only a sinippet at that.

Thanks!
Tom
0
 

Expert Comment

by:daverussell
ID: 10744867
Tom:
I just started down the same path, could you do a quick post of what you've found so far?  Which books and examples are the best?
Thanks
0
Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

 
LVL 19

Expert Comment

by:Fahad Mukhtar
ID: 10747115
sorry, could not help that much..
0
 

Author Comment

by:tdenniso
ID: 10756271
All:

I was able to finally find something that was pretty helpful. I am still working through some of the details, but this code is in C#:

http://www.opennetcf.org/sourcebrowse/browse.aspx?f=d:/sites/OpenNETCF/InetPub/wwwroot/Source/OpenNETCF.Net

Tom
0
 

Author Comment

by:tdenniso
ID: 10765165
The above code is pretty much what I need. However, there are some CONSTANT definitins that are missing. For example, for the WSAQUERYSET struct, I need to know what the contant value is for NS_BTH. I have found definitions for other NS_X constants, but not the one for Bluetooth. Anyone have any idea where this could be located?
0
 

Expert Comment

by:amitgaur51
ID: 10806725
tom,
were you able to obtain the values for the  constants and get the code from opennetcf.org working?
Also what books and other links have you used for WinCE development using C#
Thanks
Amit
0
 
LVL 1

Accepted Solution

by:
GhostMod earned 0 total points
ID: 11165796
PAQed, with points refunded (500)

GhostMod
Community Support Moderator
0

Featured Post

Survive A High-Traffic Event with Percona

Your application or website rely on your database to deliver information about products and services to your customers. You can’t afford to have your database lose performance, lose availability or become unresponsive – even for just a few minutes.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

MAC Filtering: MAC filtering is like handing a list of names to a doorman. If someone comes to the door and mentions a name, this name is checked by the doorman on his list and granted or denied access by this. This means that if someone menti…
This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

649 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question