?
Solved

Transmission of audio signal using ER400TRS transceiver(data control executed by PIC16F876)

Posted on 2006-04-14
3
Medium Priority
?
694 Views
Last Modified: 2013-12-14
hello

my task is to program a PIC16F876 using C programming (ccs) to execute a bi-directional communication link using Easy Radio Transceiver (ER400TRS).

A simple microphone pre-amp connects to analoge input of the the PIC, ADC is carried out by PIC, result is transmitted to transceiver using (port RC 6)........THIS IS TRANSMIT SUB-ROUTINE

RECEIVE SUB-ROUTINE
The transceiver detects RF data, downloads it in its internal buffer, alarts the PIC by lowering 'Busy line', PIC decodes the data and puts it on one of the Port B's which connects to a low pass filter for an analogous waveform before going to audio amplifier (output)

please help because my trails have so far produce no successful result.
G .A (Thanx)

0
Comment
Question by:JAGodfrey
1 Comment
 
LVL 6

Accepted Solution

by:
nehaya earned 1000 total points
ID: 16513711
I will try to explain the Bluetooth part!

Bluetooth is a standard that use : pre-defined/standard profiles (www.Bluetooth.org/spec ) - Custom defined (you can define the protocol of this profile)
But, the both ends (sender and reciever) must implement the same profile so they can talk to each other!
For transmiting sounds, the best profile (i think) is: A2DP: Advanced Audio Distribution profile.  (HandsFree/Headset can help you too)
So, what do you need exactly, is either implment the profile yourself (see details in spec page) , or you can choose a Stack (implementation of Bluetooth) where the required profile is implemented (not all stack implement all profiles).

Reading the specifiction will tell you really what do you want. and then, try to find a stack (implementation of Bluetooth) to give you either already implemtented profiles or at least the lower part of Bluetooth software, so you can implement your required profile on it.
Regards,
Nehaya
0

Featured Post

What Security Threats Are We Predicting for 2018?

Cryptocurrency, IoT botnets, MFA, and more! Hackers are already planning their next big attacks for 2018. Learn what you might face, and how to defend against it with our 2018 security predictions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
The Summer 2017 Scholarship Winners have been announced!
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Suggested Courses

807 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question