ORPP logo
Image from Google Jackets

Inside Bluetooth Low Energy.

By: Material type: TextTextPublisher: Norwood : Artech House, 2013Copyright date: ©2013Edition: 1st edDescription: 1 online resource (422 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781608075805
Subject(s): Genre/Form: Additional physical formats: Print version:: Inside Bluetooth Low EnergyDDC classification:
  • 004.62
LOC classification:
  • TK5103.3 -- .G87 2013eb
Online resources:
Contents:
Intro -- Inside Bluetooth Low Energy -- Contents -- Preface -- Objectives of This Book -- Intended Audience -- Prerequisite Knowledge -- Organization of This Book -- Acknowledgments -- Foreword -- Chapter 1 Introduction -- 1.1 Introduction to Wireless Communicati -- 1.2 Data Rates and Coverage -- 1.2.1 Wide Area Network -- 1.2.2 Metropolitan Area Network -- 1.2.3 Local Area Network -- 1.2.4 Personal Area Network -- 1.2.5 Body Area Network -- 1.3 Why Have Standards? -- 1.4 Introduction to Bluetooth and Blueto -- 1.5 Applications -- 1.5.1 Finding and Alerting Devices -- 1.5.2 Proximity and Presence Detection -- 1.5.3 Health Care -- 1.5.4 Sports and Fitness Equipment -- 1.5.5Mobile Payments -- 1.6 Competing Technologies -- 1.6.1 ANT and ANT+ -- 1.6.2 ZigBee -- 1.6.3 Near Field Communication (NFC) -- 1.7 Summary -- References -- Chapter 2 Background of Bluetooth -- 2.1 Introduction -- 2.2 Ad Hoc Networks-Why? -- 2.2.1 Printing Documents, Photos -- 2.2.2 Exchanging Business Cards, Photos, Music, Files -- 2.3 What is Bluetooth? -- 2.4 Bluetooth SIG -- 2.5 History of the Bluetooth Specificatiion -- 2.6 IEEE 802.15 Family of Specifications -- 2.7 Bluetooth Basics -- 2.8 Bluetooth Architecture Overview -- 2.9 Basic Terminology -- 2.9.1 Host, Host Controller, and Host Controller Interface (HCI) -- 2.9.2 Device Address (BD_ADDR) and Device Name -- 2.9.3 Class of Device (CoD) -- 2.9.4 Bluetooth Clock -- 2.9.5 Protocol Data Unit (PDU) -- 2.10 Data Rates -- 2.11 Connection Setup and Topology -- 2.12 IEEE Word Usage -- 2.13 Summary -- References -- Chapter 3 Bluetooth Lower Layers -- 3.1 Introduction -- 3.2 Bluetooth Radio -- 3.2.1 Frequency Band and Hopping -- 3.3 Baseband Controller -- 3.3.1 Topology-Piconet and Scatternet -- 3.3.2 Time Division Duplex -- 3.3.3 Adaptive Frequency Hopping (AFH) -- 3.3.4 Master, Slave Roles and Role Switch.
3.3.5 Channel, Transport and Links -- 3.3.6 Packet Format -- 3.3.7 Packet Types -- 3.3.8 Link Controller States -- 3.4 Link Manager (LM) -- 3.4.1 Connection Control -- 3.4.2 Security -- 3.5 Host Controller Interface (HCI) -- 3.5.1 HCI Packet Types -- 3.5.2 HCI Commands and Events -- 3.5.3 Buffers -- 3.5.4 HCI Flow Control -- 3.5.5 Connection Handle -- 3.5.6 HCI Transport Layer -- 3.6 Security-Secure Simple Pairing (SSP) -- 3.6.1 Passive Eavesdropping Protection -- 3.6.2 Man-in-the-Middle (MITM) Attack Protection -- 3.6.3 Association Models -- 3.7 Practical Scenarios -- 3.7.1 Inquiry -- 3.7.2 Connection Establishment -- 3.8 Summary -- Reference -- Chapter 4 Bluetooth Upper Layers and Profiles -- 4.1 Introduction -- 4.2 Logical Link Control and Adaptation -- 4.2.1 Modes of Operation -- 4.2.2 L2CAP PDUs -- 4.2.3 L2CAP Features -- 4.3.3 L2CAP Signaling -- 4.4 Service Discovery Protocol (SDP) -- 4.4.1 Service Record, Service Attributes -- 4.4.2 Searching and Browsing Services -- 4.4.3 SDP Transactions -- 4.5 RFCOMM -- 4.6 Object Exchange Protocol (OBEX) -- 4.6.1 OBEX Operations -- 4.7 Audio/Video Control Transport Protoc -- 4.8 Audio/Video Distribution Transport Protocol (AVDTP) -- 4.9 Profiles -- 4.10 Generic Access Profile (GAP) -- 4.10.1 Bluetooth Parameters Representation -- 4.10.2 Modes -- 4.10.3 Idle Mode Procedures -- 4.10.4 Establishment Procedures -- 4.10.5 Authentication -- 4.10.6 Security -- 4.11 Serial Port Profile (SPP) -- 4.12 Headset Profile, Hands-Free Profile -- 4.13 Generic Object Exchange Profile (GO -- 4.14 Object Push Profile (OPP) -- 4.15 File Transfer Profile (FTP) -- 4.16 Generic Audio/Video Distribution Pr -- 4.17 Advanced Audio Distribution Profile -- 4.18 Audio/Video Remote Control Profile -- 4.19 Summary -- Bibliography -- Chapter 5 Getting the Hands Wet -- 5.1 Introduction -- 5.2 Ingredients -- 5.3 Basic Bluetooth Operations.
5.3.1 Enabling and Disabling Bluetooth -- 5.3.2 Discovering Devices -- 5.3.3 Browsing Services -- 5.4 Real World Application-Café Bluebite -- 5.4.1 Requirements Specification -- 5.4.2 High Level Design -- 5.4.3 Code -- 5.4.4 Complete Code -- 5.5 Disclaimer -- 5.6 Summary -- Bibliography -- Chapter 6 Bluetooth ow Energy-Fundamentals -- 6.1 Introduction -- 6.2 Single Mode versus Dual Mode Devices -- 6.3 Bluetooth Smart Marks -- 6.3.1 Bluetooth Smart (Sensor-Type Devic -- 6.3.2 Bluetooth Smart Ready (Hubs) -- 6.4 LE Fundamentals -- 6.4.1 Frequency Bands -- 6.4.2 Mostly Off Technology -- 6.4.3 Faster Connections -- 6.4.4 Reduced Functionality -- 6.4.5 Shorter Packets -- 6.4.6 Reduced Dynamic Memory Footprint -- 6.4.7 Optimized Power Consumption of Per -- 6.4.8 No Need for Continuous Polling -- 6.4.9 Backward Compatibility with BR/EDR -- 6.5 LE Architecture -- 6.6 Comparison between BR/EDR and LE -- 6.7 Summary -- Bibliography -- Chapter 7 Physical Layer -- 7.1 Introduction -- 7.2 Frequency Bands -- 7.3 Transmitter Only, Receiver Only, or -- 7.4 Output Power -- 7.5 Range -- 7.6 Modulation Characteristics -- 7.7 LE Timeline -- 7.8 Summary -- Bibliography -- Chapter 8 Link Layer -- 8.1 Introduction -- 8.2 Overview of Link Layer States -- 8.2.1 Standby State -- 8.2.2 Advertising State (Advertiser) -- 8.2.3 Scanning State (Scanner) -- 8.2.4 Initiating State (Initiator) -- 8.2.5 Connection State (Master or Slave) -- 8.3 Device Address -- 8.3.1 Public Device Address -- 8.3.2 Random Address -- 8.4 Physical Channel -- 8.5 Channel Map -- 8.6 Adaptive Frequency Hopping -- 8.7 Events -- 8.7.1 Advertising Events -- 8.7.2 Connection Events -- 8.8 Topology -- 8.9 Packet Format -- 8.9.1 Preamble -- 8.9.2 Access Address -- 8.9.3 CRC -- 8.9.4 PDU -- 8.10 Bit Stream Processing -- 8.11 Link Layer States -- 8.11.1 Nonconnected States -- 8.11.2 Connection State.
8.12 Link Layer Control Procedures -- 8.12.1 Connection Update Procedure -- 8.12.2 Channel Map Update Procedure -- 8.12.3 Encryption Procedure -- 8.12.4 Feature Exchange Procedure -- 8.12.5 Version Exchange Procedure -- 8.12.6 Termination Procedure -- 8.12.7 Device Filtering and White List -- 8.13 Practical Examples -- 8.14 Summary -- Bibliography -- Chapter 9 Host Controller Interface and Commands -- 9.1 Introduction -- 9.1.1 HCI Packet Types -- 9.1.2 HCI Command Packets -- 9.1.3 HCI Event Packet -- 9.1.4 HCI ACL Data Packet -- 9.2 HCI Commands and Events -- 9.2.1 Device Setup -- 9.2.2 Controller Flow Control -- 9.2.3 Host Flow Control -- 9.2.4 Controller Information -- 9.2.5 Remote Information -- 9.2.6 Controller Configuration -- 9.2.7 Device Discovery -- 9.2.8 Connection Setup -- 9.2.9 Connection State -- 9.2.10 Physical Links -- 9.2.11 Link Information -- 9.2.12 Authentication and Encryption -- 9.2.13 Testing -- 9.2.14 Usage of White Lists -- 9.3 Practical Sequence Diagrams -- 9.3.1 Passive Scanning -- 9.3.2 Typical Sequence for Active Scanni -- 9.3.3 Connection Establishment -- 9.3.4 Setting up White list -- 9.4 Summary -- Bibliography -- Chapter 10 Logical Link Control and Adaptation Protocol (L2CAP) -- 10.1 Introduction -- 10.2 PDU and SDU -- 10.3 Basic Assumptions -- 10.4 Maximum Transmission Unit (MTU) -- 10.5 L2CAP Features -- 10.5.1 Fixed Channel Identifiers -- 10.5.2 Fragmentation and Defragmentation -- 10.5.3 Channel Multiplexing -- 10.6 Data Packets -- 10.7 L2CAP Parameters -- 10.8 L2CAP Signaling -- 10.8.1 Command Reject -- 10.8.2 Connection Parameter Update Reque -- 10.8.3 Connection Parameter Update Respo -- 10.9 Practical Examples -- 10.10 Summary -- Bibliography -- Chapter 11 Security Manager (SM) -- 11.1 Introduction -- 11.2 Security in Host Instead of Control -- 11.3 Asymmetrical Architecture -- 11.4 Security Breaches.
11.4.1 Passive Eavesdropping -- 11.4.2 Man-in-the-Middle (MITM) (Active -- 11.4.3 Tracking -- 11.5 Pairing Methods -- 11.5.1 Just Works -- 11.5.2 Passkey Entry -- 11.5.3 Out of Band -- 11.6 Security Properties -- 11.6.1 Authenticated MITM Protection -- 11.6.2 Unauthenticated no MITM Protectio -- 11.6.3 No Security -- 11.7 Cryptographic Functions -- 11.7.1 Security Function e -- 11.7.2 Random Address Function ah -- 11.7.3 Confirm Value Generation Function -- 11.7.4 Key Generation Function s1 -- 11.8 Pairing -- 11.8.1 Phase 1: Pairing Feature Exchange -- 11.8.2 Phase 2: Short Term Key (STK) Gen -- 11.8.3 Phase 3: Transport Specific Key D -- 11.9 Security Manager Protocol -- 11.9.1 Commands Used During Phase 1 (Pai -- 11.9.2 Commands Used During Phase 2 (STK -- 11.9.3 Commands Used During Phase 3 (Tra -- 11.10 Practical Examples -- 11.11 Summary -- Bibliography -- Chapter 12 Attribute Protocol (ATT) -- 12.1 Introduction -- 12.2 Attribute -- 12.2.1 Attribute Type -- 12.2.2 Attribute Handle -- 12.2.3 Attribute Permissions -- 12.2.4 Attribute Value -- 12.2.5 Control Point Attributes -- 12.2.6 Grouping of Attribute Handles -- 12.2.7 Atomic Operations -- 12.3 Attribute Protocol -- 12.3.1 PDU Format -- 12.3.2 Sequential Transactions -- 12.4 Methods -- 12.4.1 Request and Response Type Methods -- 12.4.2 Command Type Methods -- 12.4.3 Notification Type Methods -- 12.4.4 Indication and Confirmation Type -- 12.5 Practical Examples -- 12.5.1 Exchange MTU -- 12.5.2 Reading Primary Services of a Dev -- 12.6 Summary -- Bibliography -- Chapter 13 Generic Attribute Profile (GATT) -- 13.1 Introduction -- 13.1.1 Profile Dependencies -- 13.1.2 GATT-Based Profile Architecture -- 13.2 Roles -- 13.3 Attributes -- 13.3.1 Attribute Caching -- 13.3.2 Attribute Grouping -- 13.3.3 Notification and Indication -- 13.4 Service Definition -- 13.4.1 Service Declaration.
13.4.2 Include Definition.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Intro -- Inside Bluetooth Low Energy -- Contents -- Preface -- Objectives of This Book -- Intended Audience -- Prerequisite Knowledge -- Organization of This Book -- Acknowledgments -- Foreword -- Chapter 1 Introduction -- 1.1 Introduction to Wireless Communicati -- 1.2 Data Rates and Coverage -- 1.2.1 Wide Area Network -- 1.2.2 Metropolitan Area Network -- 1.2.3 Local Area Network -- 1.2.4 Personal Area Network -- 1.2.5 Body Area Network -- 1.3 Why Have Standards? -- 1.4 Introduction to Bluetooth and Blueto -- 1.5 Applications -- 1.5.1 Finding and Alerting Devices -- 1.5.2 Proximity and Presence Detection -- 1.5.3 Health Care -- 1.5.4 Sports and Fitness Equipment -- 1.5.5Mobile Payments -- 1.6 Competing Technologies -- 1.6.1 ANT and ANT+ -- 1.6.2 ZigBee -- 1.6.3 Near Field Communication (NFC) -- 1.7 Summary -- References -- Chapter 2 Background of Bluetooth -- 2.1 Introduction -- 2.2 Ad Hoc Networks-Why? -- 2.2.1 Printing Documents, Photos -- 2.2.2 Exchanging Business Cards, Photos, Music, Files -- 2.3 What is Bluetooth? -- 2.4 Bluetooth SIG -- 2.5 History of the Bluetooth Specificatiion -- 2.6 IEEE 802.15 Family of Specifications -- 2.7 Bluetooth Basics -- 2.8 Bluetooth Architecture Overview -- 2.9 Basic Terminology -- 2.9.1 Host, Host Controller, and Host Controller Interface (HCI) -- 2.9.2 Device Address (BD_ADDR) and Device Name -- 2.9.3 Class of Device (CoD) -- 2.9.4 Bluetooth Clock -- 2.9.5 Protocol Data Unit (PDU) -- 2.10 Data Rates -- 2.11 Connection Setup and Topology -- 2.12 IEEE Word Usage -- 2.13 Summary -- References -- Chapter 3 Bluetooth Lower Layers -- 3.1 Introduction -- 3.2 Bluetooth Radio -- 3.2.1 Frequency Band and Hopping -- 3.3 Baseband Controller -- 3.3.1 Topology-Piconet and Scatternet -- 3.3.2 Time Division Duplex -- 3.3.3 Adaptive Frequency Hopping (AFH) -- 3.3.4 Master, Slave Roles and Role Switch.

3.3.5 Channel, Transport and Links -- 3.3.6 Packet Format -- 3.3.7 Packet Types -- 3.3.8 Link Controller States -- 3.4 Link Manager (LM) -- 3.4.1 Connection Control -- 3.4.2 Security -- 3.5 Host Controller Interface (HCI) -- 3.5.1 HCI Packet Types -- 3.5.2 HCI Commands and Events -- 3.5.3 Buffers -- 3.5.4 HCI Flow Control -- 3.5.5 Connection Handle -- 3.5.6 HCI Transport Layer -- 3.6 Security-Secure Simple Pairing (SSP) -- 3.6.1 Passive Eavesdropping Protection -- 3.6.2 Man-in-the-Middle (MITM) Attack Protection -- 3.6.3 Association Models -- 3.7 Practical Scenarios -- 3.7.1 Inquiry -- 3.7.2 Connection Establishment -- 3.8 Summary -- Reference -- Chapter 4 Bluetooth Upper Layers and Profiles -- 4.1 Introduction -- 4.2 Logical Link Control and Adaptation -- 4.2.1 Modes of Operation -- 4.2.2 L2CAP PDUs -- 4.2.3 L2CAP Features -- 4.3.3 L2CAP Signaling -- 4.4 Service Discovery Protocol (SDP) -- 4.4.1 Service Record, Service Attributes -- 4.4.2 Searching and Browsing Services -- 4.4.3 SDP Transactions -- 4.5 RFCOMM -- 4.6 Object Exchange Protocol (OBEX) -- 4.6.1 OBEX Operations -- 4.7 Audio/Video Control Transport Protoc -- 4.8 Audio/Video Distribution Transport Protocol (AVDTP) -- 4.9 Profiles -- 4.10 Generic Access Profile (GAP) -- 4.10.1 Bluetooth Parameters Representation -- 4.10.2 Modes -- 4.10.3 Idle Mode Procedures -- 4.10.4 Establishment Procedures -- 4.10.5 Authentication -- 4.10.6 Security -- 4.11 Serial Port Profile (SPP) -- 4.12 Headset Profile, Hands-Free Profile -- 4.13 Generic Object Exchange Profile (GO -- 4.14 Object Push Profile (OPP) -- 4.15 File Transfer Profile (FTP) -- 4.16 Generic Audio/Video Distribution Pr -- 4.17 Advanced Audio Distribution Profile -- 4.18 Audio/Video Remote Control Profile -- 4.19 Summary -- Bibliography -- Chapter 5 Getting the Hands Wet -- 5.1 Introduction -- 5.2 Ingredients -- 5.3 Basic Bluetooth Operations.

5.3.1 Enabling and Disabling Bluetooth -- 5.3.2 Discovering Devices -- 5.3.3 Browsing Services -- 5.4 Real World Application-Café Bluebite -- 5.4.1 Requirements Specification -- 5.4.2 High Level Design -- 5.4.3 Code -- 5.4.4 Complete Code -- 5.5 Disclaimer -- 5.6 Summary -- Bibliography -- Chapter 6 Bluetooth ow Energy-Fundamentals -- 6.1 Introduction -- 6.2 Single Mode versus Dual Mode Devices -- 6.3 Bluetooth Smart Marks -- 6.3.1 Bluetooth Smart (Sensor-Type Devic -- 6.3.2 Bluetooth Smart Ready (Hubs) -- 6.4 LE Fundamentals -- 6.4.1 Frequency Bands -- 6.4.2 Mostly Off Technology -- 6.4.3 Faster Connections -- 6.4.4 Reduced Functionality -- 6.4.5 Shorter Packets -- 6.4.6 Reduced Dynamic Memory Footprint -- 6.4.7 Optimized Power Consumption of Per -- 6.4.8 No Need for Continuous Polling -- 6.4.9 Backward Compatibility with BR/EDR -- 6.5 LE Architecture -- 6.6 Comparison between BR/EDR and LE -- 6.7 Summary -- Bibliography -- Chapter 7 Physical Layer -- 7.1 Introduction -- 7.2 Frequency Bands -- 7.3 Transmitter Only, Receiver Only, or -- 7.4 Output Power -- 7.5 Range -- 7.6 Modulation Characteristics -- 7.7 LE Timeline -- 7.8 Summary -- Bibliography -- Chapter 8 Link Layer -- 8.1 Introduction -- 8.2 Overview of Link Layer States -- 8.2.1 Standby State -- 8.2.2 Advertising State (Advertiser) -- 8.2.3 Scanning State (Scanner) -- 8.2.4 Initiating State (Initiator) -- 8.2.5 Connection State (Master or Slave) -- 8.3 Device Address -- 8.3.1 Public Device Address -- 8.3.2 Random Address -- 8.4 Physical Channel -- 8.5 Channel Map -- 8.6 Adaptive Frequency Hopping -- 8.7 Events -- 8.7.1 Advertising Events -- 8.7.2 Connection Events -- 8.8 Topology -- 8.9 Packet Format -- 8.9.1 Preamble -- 8.9.2 Access Address -- 8.9.3 CRC -- 8.9.4 PDU -- 8.10 Bit Stream Processing -- 8.11 Link Layer States -- 8.11.1 Nonconnected States -- 8.11.2 Connection State.

8.12 Link Layer Control Procedures -- 8.12.1 Connection Update Procedure -- 8.12.2 Channel Map Update Procedure -- 8.12.3 Encryption Procedure -- 8.12.4 Feature Exchange Procedure -- 8.12.5 Version Exchange Procedure -- 8.12.6 Termination Procedure -- 8.12.7 Device Filtering and White List -- 8.13 Practical Examples -- 8.14 Summary -- Bibliography -- Chapter 9 Host Controller Interface and Commands -- 9.1 Introduction -- 9.1.1 HCI Packet Types -- 9.1.2 HCI Command Packets -- 9.1.3 HCI Event Packet -- 9.1.4 HCI ACL Data Packet -- 9.2 HCI Commands and Events -- 9.2.1 Device Setup -- 9.2.2 Controller Flow Control -- 9.2.3 Host Flow Control -- 9.2.4 Controller Information -- 9.2.5 Remote Information -- 9.2.6 Controller Configuration -- 9.2.7 Device Discovery -- 9.2.8 Connection Setup -- 9.2.9 Connection State -- 9.2.10 Physical Links -- 9.2.11 Link Information -- 9.2.12 Authentication and Encryption -- 9.2.13 Testing -- 9.2.14 Usage of White Lists -- 9.3 Practical Sequence Diagrams -- 9.3.1 Passive Scanning -- 9.3.2 Typical Sequence for Active Scanni -- 9.3.3 Connection Establishment -- 9.3.4 Setting up White list -- 9.4 Summary -- Bibliography -- Chapter 10 Logical Link Control and Adaptation Protocol (L2CAP) -- 10.1 Introduction -- 10.2 PDU and SDU -- 10.3 Basic Assumptions -- 10.4 Maximum Transmission Unit (MTU) -- 10.5 L2CAP Features -- 10.5.1 Fixed Channel Identifiers -- 10.5.2 Fragmentation and Defragmentation -- 10.5.3 Channel Multiplexing -- 10.6 Data Packets -- 10.7 L2CAP Parameters -- 10.8 L2CAP Signaling -- 10.8.1 Command Reject -- 10.8.2 Connection Parameter Update Reque -- 10.8.3 Connection Parameter Update Respo -- 10.9 Practical Examples -- 10.10 Summary -- Bibliography -- Chapter 11 Security Manager (SM) -- 11.1 Introduction -- 11.2 Security in Host Instead of Control -- 11.3 Asymmetrical Architecture -- 11.4 Security Breaches.

11.4.1 Passive Eavesdropping -- 11.4.2 Man-in-the-Middle (MITM) (Active -- 11.4.3 Tracking -- 11.5 Pairing Methods -- 11.5.1 Just Works -- 11.5.2 Passkey Entry -- 11.5.3 Out of Band -- 11.6 Security Properties -- 11.6.1 Authenticated MITM Protection -- 11.6.2 Unauthenticated no MITM Protectio -- 11.6.3 No Security -- 11.7 Cryptographic Functions -- 11.7.1 Security Function e -- 11.7.2 Random Address Function ah -- 11.7.3 Confirm Value Generation Function -- 11.7.4 Key Generation Function s1 -- 11.8 Pairing -- 11.8.1 Phase 1: Pairing Feature Exchange -- 11.8.2 Phase 2: Short Term Key (STK) Gen -- 11.8.3 Phase 3: Transport Specific Key D -- 11.9 Security Manager Protocol -- 11.9.1 Commands Used During Phase 1 (Pai -- 11.9.2 Commands Used During Phase 2 (STK -- 11.9.3 Commands Used During Phase 3 (Tra -- 11.10 Practical Examples -- 11.11 Summary -- Bibliography -- Chapter 12 Attribute Protocol (ATT) -- 12.1 Introduction -- 12.2 Attribute -- 12.2.1 Attribute Type -- 12.2.2 Attribute Handle -- 12.2.3 Attribute Permissions -- 12.2.4 Attribute Value -- 12.2.5 Control Point Attributes -- 12.2.6 Grouping of Attribute Handles -- 12.2.7 Atomic Operations -- 12.3 Attribute Protocol -- 12.3.1 PDU Format -- 12.3.2 Sequential Transactions -- 12.4 Methods -- 12.4.1 Request and Response Type Methods -- 12.4.2 Command Type Methods -- 12.4.3 Notification Type Methods -- 12.4.4 Indication and Confirmation Type -- 12.5 Practical Examples -- 12.5.1 Exchange MTU -- 12.5.2 Reading Primary Services of a Dev -- 12.6 Summary -- Bibliography -- Chapter 13 Generic Attribute Profile (GATT) -- 13.1 Introduction -- 13.1.1 Profile Dependencies -- 13.1.2 GATT-Based Profile Architecture -- 13.2 Roles -- 13.3 Attributes -- 13.3.1 Attribute Caching -- 13.3.2 Attribute Grouping -- 13.3.3 Notification and Indication -- 13.4 Service Definition -- 13.4.1 Service Declaration.

13.4.2 Include Definition.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.