Description: This file contains Generic Attribute Profile (GATT) definitions and prototypes.
The Generic
Attribute Profile (GATT) defines a service framework using the Attribute
Protocol (ATT). This framework defines procedures and formats of services along
with their characteristics. These procedures include discovering, reading,
writing, notifying and indicating characteristics, as well as configuring the
broadcast of characteristics on a peer device.
The GATT
Profile defines the following two roles for devices:
·
Client - This is the device that initiates
commands and requests towards the server and can receive responses, indications
and notifications sent by the server.
·
Server - This is the device that accepts
incoming commands and requests from the client and sends responses, indications
and notifications to a client.
These roles are not fixed to the device. The roles are determined when a device initiates a procedure, and released when the procedure ends. Hence, a device can act in both roles simultaneously.
The GATT
Profile specifies the structure in which data provided by a profile is
exchanged. This structure defines basic elements, such as services and
characteristics, used in a profile. These elements are all contained by
Attributes, which are containers that carry the profile data.
The top
level of the hierarchy is a profile. A profile is composed of one or more
services needed to fulfill a use case. A service is composed of characteristics
or references to other services. Each characteristic contains a value and may
contain optional information about the value. The service and characteristic
and the components of the characteristic (i.e. value and descriptors) contain
the profile data and are all stored in Attributes on the server.
The GATT
Profile defines a total of 11 features. Each feature is mapped to procedures
and sub-procedures. These procedures and sub-procedures describe how the ATT is
used to accomplish the corresponding feature:
·
Server Configuration - This procedure is used by the
client to configure the ATT. This procedure has only one sub-procedure used to
set the MTU sizes: Exchange MTU.
·
Primary Service Discovery - This procedure is used by a client
to discover primary services on a server. There are two sub-procedures that can
be used for primary service discovery: Discover
All Primary Services and Discover
Primary Services by Service UUID.
·
Relationship Discovery - This procedure is used by a client
to discover service relationships to other services. There is one sub-procedure
that can be used for relationship discovery: Find Included Services.
·
Characteristic Discovery - This procedure is used by a client
to discover service characteristics on a server. There are two sub-procedures
that can be used for characteristic discovery: Discover All Characteristics of a Service and Discover Characteristics by UUID.
·
Characteristic Descriptor Discovery - This procedure is used by a client
to discover characteristic descriptors of a characteristic. There is one
sub-procedure that can be used for characteristic descriptor discovery: Discover All Characteristic Descriptors.
·
Reading a Characteristic Value - This procedure is used to read a
Characteristic Value from a server. There are four sub-procedures that can be
used to read a Characteristic Value: Read
Characteristic Value, Read Using
Characteristic UUID, Read Long
Characteristic Values, and Read
Multiple Characteristic Values.
·
Writing a Characteristic Value - This procedure is used to write a
Characteristic Value to a server. There are five sub-procedures that can be
used to write a Characteristic Value: Write
Without Response, Signed Write Without Response, Write
Characteristic Value, Write Long
Characteristic Values and Reliable
Writes.
·
Notification of a Characteristic
Value - This
procedure is used to notify a client of the value of a Characteristic Value
from a server. There is one sub-procedure that can be used to notify a value: Notification.
·
Indication of a Characteristic Value - This procedure is used to indicate
the Characteristic Value from a server to a client. There is one sub-procedure
that can be used to indicate a value: Indication.
·
Reading a Characteristic Descriptor - This procedure is used to read characteristic
descriptors on a server. There are two sub-procedures that can be used to read
characteristic descriptors: Read
Characteristic Descriptors and Read
Long Characteristic Descriptors.
·
Writing a Characteristic Descriptor - This procedure is used to write
characteristic descriptors on a server. There are sub-procedures that can be
used to write characteristic descriptors: Write
Characteristic Descriptors and Write
Long Characteristic Descriptors.
Copyright 2009-2013 Texas Instruments Incorporated. All rights reserved.
IMPORTANT: Your use of this Software is limited to those specific rights granted under the terms of a software license agreement between the user who downloaded the software, his/her employer (which must be your employer) and Texas Instruments Incorporated (the "License"). You may not use this Software unless you agree to abide by the terms of the License. The License limits your use, and you acknowledge, that the Software may not be modified, copied or distributed unless embedded on a Texas Instruments microcontroller or used solely and exclusively in conjunction with a Texas Instruments radio frequency transceiver, which is integrated into your product. Other than for the foregoing purpose, you may not use, reproduce, copy, prepare derivative works of, modify, distribute, perform, display or sell this Software and/or its documentation for any purpose.
YOU FURTHER ACKNOWLEDGE AND AGREE THAT THE SOFTWARE AND DOCUMENTATION ARE PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY, TITLE, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL TEXAS INSTRUMENTS OR ITS LICENSORS BE LIABLE OR OBLIGATED UNDER CONTRACT, NEGLIGENCE, STRICT LIABILITY, CONTRIBUTION, BREACH OF WARRANTY, OR OTHER LEGAL EQUITABLE THEORY ANY DIRECT OR INDIRECT DAMAGES OR EXPENSES INCLUDING BUT NOT LIMITED TO ANY INCIDENTAL, SPECIAL, INDIRECT, PUNITIVE OR CONSEQUENTIAL DAMAGES, LOST PROFITS OR LOST DATA, COST OF PROCUREMENT OF SUBSTITUTE GOODS, TECHNOLOGY, SERVICES, OR ANY CLAIMS BY THIRD PARTIES (INCLUDING BUT NOT LIMITED TO ANY DEFENSE THEREOF), OR OTHER SIMILAR COSTS.
Should you have any questions regarding your right to use this Software, contact Texas Instruments Incorporated at www.TI.com.