This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

basic central tutorial please

Dear all

I am looking for a tutorial like this https://devzone.nordicsemi.com/guides/short-range-guides/b/bluetooth-low-energy/posts/ble-central-tutorial

It sounds quite helpful, but it is a bit old and tools are outdated and functions look different, some links are not available anymore, could someone point me to a newer one please? I am new and use VS Code and latest nrf connect, and aim to develop a generic central application to make connection and exchange data. 

Thank you .

Ping

Parents
  • Thanks, Kenneth

    Read the first link and have a few questions to ask:

    1. About the security feature, it seems that the central set a higher security level immediately after connection, is this optional or mandatory? 

    2. Is it determined by peripheral or by central only?

    3. About service discovery - gatt_discovery, if central doesn't know anything (service ID) before doing discovery, how this can be done? I am aiming to do a generic central and presume it knows nothing and all information can be found by doing some sort of service discovery, am I right?

    Thank you!

    Ping

  • 1. Optional.

    2. It is common that a central take the initiative to establish an encrypted link (by bonding/pairing), but it can be initiated by a security request also from the peripheral. It's also possible that neither want to bond or encrypt the link.

    3. It is common that the database discovery done by either peers are generic, there are software modules that can do this for you. I believe the central examples show how this can be done, though it can also be done by a peripheral.

    Kenneth

Reply
  • 1. Optional.

    2. It is common that a central take the initiative to establish an encrypted link (by bonding/pairing), but it can be initiated by a security request also from the peripheral. It's also possible that neither want to bond or encrypt the link.

    3. It is common that the database discovery done by either peers are generic, there are software modules that can do this for you. I believe the central examples show how this can be done, though it can also be done by a peripheral.

    Kenneth

Children
No Data
Related