About us

We are a family by laugh with a passion for challenges and engineering.

We stand by Agile and Calm and get a kick out of taking on the status quo.

We dream of making the world just a little bit better by delivering uplifting technology.

We ventured into the Lighting and Smart Building space after experiencing first hand the difficulties and complexities of proprietary and enclosed control systems that up to then were the norm in such industries.

BubblyNet

As of 2018, most of the Bluetooth adopters have developed their own proprietary Mesh on the top of Bluetooth, making it a close trademarked network. BubblyNet uses the Bluetooth Mesh standard developed by Bluetooth SIG making it a truly open system.

Leveraging the Bluetooth 5.0 Mesh standard, BubblyNet leads the industry in true interoperability, developing and promoting an ever-expanding eco-system of third party devices.

The BubblyNet wireless platform is a multilayered architecture that can evolve with the Building Manager needs. It is not a consumers product; it is an industrial grade solution that is scalable, reliable and secure.

Multilayer Architecture.

Industrial-grade solution, scalable, reliable and secure.

Scalability

Each BubblyNet wireless device, when commissioned, is in communication with any other device in the system. This is called a MESH system and it doesn’t require a "central hub” that is the typical bottleneck for scalability. A single network can be scaled to up to 32,767 nodes. The system is based on Bluetooth Mesh 5, 4X longer range, 2X higher speed and 8X Advertising data capabilities compared to previous versions. It allows for hundreds of multicasting messages per second. Each multicasting message controlling many devices. No gateways or routers are necessary.

Reliability

The BubblyNet platform has a reliability that approximates, and in several cases even exceed, the reliability of wired systems. It is a distributed architecture. This means that the “intelligence” of the system is distributed across devices and there is no single point of failure. It is a network that is inherently resilient (self-healing). Bluetooth is the mature and trusted technology that has become in the last 20 years THE standard for wireless communication.

More technically, the mesh networking is a non-routed network, in other words, there is no routing device or specific routed paths or a single point of failure. Instead the Bluetooth Mesh is a managed flooded network, this means that the messages spread through all the nearby devices which relay them again to the nearby devices as so on.

To manage how long a message stays in the network, there is a TTL (Time To Live) value so a message can be repeated just a certain amount of times.

Bluetooth allow for 2 types of messages: Unacknowledged, very fast and to be used when it is not important to know if the receiver received the message and Acknowledged, the most reliable type as the message is re-transmitted if the destination doesn’t confirm receipt of the message.

Every node on the Bluetooth Mesh network has 2 mandatory models: the Configuration Model for the set-up of the node and the Health Model which is used to monitor the status of the node and can be activated to send alarms in the case of malfunctioning, power loss, errors, etc.

Bluetooth Mesh can automatically update Over the Air. This means that the devices and the network will keep improving over time as more and more functionalities are implemented.

The Bluetooth has a huge collection of models that will be implemented on the next few months and the technical descriptions can be found at: Mesh Model Specification 1.0.1.

Section 4 is for sensors, Section 5 is for time and scenes and Section 6 is for lighting. There are hundreds of models that will be available which will give a total control over the devices.

Security

BubblyNet uses standard Bluetooth 5.0. The security protocols are mandatory and cannot be reduced, they include encryption and authentication, they keep security for network and each application separate. The system is protected from known attacks as brute force, replay, man in middle, trashcan, visitor and many more. Nodes are provisioned using 256-bit elliptic curves and OOB authentication. Messages are secured using AES-CCM using 128-bit keys. There is Encryption and authentication at network and application layers. Devices can be blacklisted.

Interoperability

BubblyNet uses standard Bluetooth 5.0. The security protocols are mandatory and cannot be reduced, they include encryption and authentication, they keep security for network and each application separate. BubblyNet takes the word “Interoperability” to its full meaning. While most of the players in this field intend “Interoperability” as compatibility amongst devices using the same proprietary software and hardware, BubblyNet uses the standard defined by Bluetooth SIG, a global community of over 30,000 companies.