Lines Matching refs:network
16 - A device that is not a member of a mesh network is known as an unprovisioned device.
20 …network. Nodes (such as lighting devices, temperature control devices, manufacturing equipments, a…
26 …network. Generally, mobile apps need a Proxy node to access Mesh network. Without Proxy nodes, mob…
34 - A node that is capable of adding a device to a mesh network.
49 …- Each node in a ESP-BLE-MESH network has an independent set of state values that indicate certain…
71 …- The ability to operate within a mesh network at significantly reduced receiver duty cycles only …
78 …direct radio transmission between two nodes, thereby covering the entire network. When a node is e…
81 … to allow nodes without an advertising bearer to access the ESP-BLE-MESH network. The proxy featur…
98 …vices which don't implement such service cannot be provisioned into mesh network through PB-GATT b…
100 …- Provisioning is a process of adding an unprovisioned device to a mesh network, managed by a Prov…
101 …ing turns the "unprovisioned device" into a "node", making it a member of the ESP-BLE-MESH network.
133 …ddress to each element of node within the life cycle of the nodes in the network. A unicast addres…
139 …- Group address is another kind of multicast address in the ESP-BLE-MESH network, which is usually…
156 …tion of them during the delivery of application layer. Some nodes in the network have a specific p…
158 …network key (NetKey) and can be used by other nodes in the same network. Messages encrypted with m…
159 …mitted between Low Power node and friend nodes and the latter being used by other network messages.
172 …- Segmentation and reassembly (SAR) is a method of communication network, which is divided into sm…
189 - This model is used to represent a mesh network configuration of a device.
195 - This model is used to represent a mesh network diagnostics of a device.
202 .. _ble-mesh-terminology-network-management:
212 …- This procedure is used when the security of one or more network keys and/or one or more of the a…
213 …network key and application key of ESP-BLE-MESH network. Key Refresh Procedure is used when the se…
216 …network's IV Index. This value is related to the random number required for message encryption. To…