Bluetooth mesh stack architecture

The Bluetooth® mesh stack in nRF Connect SDK is an extension of the Zephyr Bluetooth® mesh stack. The Zephyr Bluetooth mesh stack implements the Bluetooth mesh profile specification (see Bluetooth Mesh Profile), while nRF Connect SDK provides additional model implementations from the Bluetooth mesh model specification on top of the Access layer API.

Graphical representation of basic mesh stack architecture

Basic architecture of the mesh stack

The mesh stack’s structure corresponds to the structure of the Bluetooth mesh specification and follows the same naming conventions:

  • Bluetooth mesh components in nRF Connect SDK

    • Models - The Bluetooth mesh models present and implement device behavior.

  • Bluetooth mesh components in Zephyr

    • Access - The Bluetooth mesh access layer organizes models and communication.

    • Core - The core Bluetooth mesh layer takes care of encryption and message relaying.

    • Provisioning - The Bluetooth mesh provisioning protocol is used for adding devices to the network.

See the official Bluetooth mesh glossary for definitions of the most important Bluetooth mesh-related terms used in this documentation. You can also read about basic Bluetooth mesh concepts for a concise introduction to the Bluetooth mesh.

Bluetooth mesh network data flow

The following figure demonstrates how the data packets flow between mesh nodes and their layers within the mesh stack structure.

Basic data flow within a mesh network in the |NCS| Bluetooth mesh

Basic data flow within a mesh network in the nRF Connect SDK Bluetooth mesh

As an example, consider a Bluetooth mesh network with three devices/mesh network nodes and the process that takes place on each node when the light switch on the source node is pressed, as discussed in the following sections.

Source node with a light switch

The following process takes place at this stage:

  1. The application calls the light switch model’s publish function.

  2. The model includes an on/off message in a publishing packet with an opcode and sends it to the access layer.

  3. The access layer fetches the necessary publish parameters, like destination address, encryption keys and time to live value (TTL value), and passes the packet to the transport layer, the highest of the core layers.

  4. The transport layer then encrypts the message with the selected application key, and splits the message into segments if necessary. Each segment is passed to the network layer, which attaches a network header with a sequence number and encrypts the packet with the network key before passing it to the Bluetooth LE Controller.

  5. The Bluetooth LE Controller includes the network message in an advertisement packet, and schedules a time slot for the packet to be broadcasted.

Relay node

The following process takes place at this stage:

  1. The broadcast is received by all mesh nodes within range, and is passed from their bearer layers to their network layers.

  2. The network packet is decrypted, and if the receiving node is not its destination, the packet’s TTL value is decreased by one, before being re-encrypted with the same network key and passed back to the Bluetooth LE Controller to be relayed.

Destination node with a light bulb

The following process takes place at this stage:

  1. Once the packet is relayed to the destination light bulb node, its network layer will decrypt the packet and pass it to the transport layer.

  2. Once all transport layer segments are received in this manner, the assembled message is decrypted with an application key, and passed on to the access layer.

  3. The access layer checks the opcode, application key and destination address, and passes the message to all eligible models.

  4. If one of these models is a light bulb model, the model parses the contents of the message, and notifies the application to turn the light bulb on or off.

The light bulb model may respond to acknowledge the transmission, following the same procedure back to the light switch node, which can notify the application that the on/off message was received.


The models define the behavior and communication formats of all data that is transmitted across the mesh. Equivalent to Bluetooth LE’s GATT services, the Bluetooth mesh models are independent, immutable implementations of specific behaviors or services. All mesh communication happens through models, and any application that exposes its behavior through the mesh must channel the communication through one or more models.

The Bluetooth mesh specification defines a set of immutable models for typical usage scenarios, but vendors are also free to implement their own models.

You can read more about the Bluetooth mesh models in nRF Connect SDK in Bluetooth mesh models.


The access layer controls the device’s model composition. It holds references to:

  • Models that are present on the device

  • Messages these models accept

  • Configuration of these models

As the device receives mesh messages, the access layer finds which models the messages are for and forwards them to the model implementations. The access layer is implemented in Zephyr. For more information about the access layer, see Access layer.

Bluetooth mesh core

Consisting of a network and a transport layer, the Bluetooth mesh core module provides the mesh-specific transport for the messages.

The transport layer provides in-network security by encrypting mesh packets with application keys, and splitting them into smaller segments that can go on air. The transport layer re-assembles incoming packet segments and presents the full mesh message to the access layer.

The network layer encrypts each transport layer packet segment with a network key, and populates the source and destination address fields. When receiving a mesh packet, the network layer decrypts the message, inspects the source and destination addresses, and decides whether the packet is intended for this device and whether the network layer should relay it.

The Bluetooth mesh core provides protection against malicious behavior and attacks against the mesh network through two-layer encryption, replay protection, and packet header obfuscation. The Bluetooth mesh core is implemented in Zephyr. Read more about the Bluetooth mesh core API in Core.


Provisioning is the act of adding a device to a mesh network. The Provisioning module takes care of both sides of this process, by implementing a provisioner role (the network owner) and a provisionee role (the device to add).

The mesh stack supports provisioning of a device directly through the PB-ADV/PB-GATT provisioning bearer, which can only happen between a provisioner and a provisionee that are within radio range of each other. The Bluetooth mesh provisioning protocol is implemented in Zephyr. For more information about the provisioning process and the API, see Provisioning.