While device types represent complete, complex functionalities, clusters are the individual building blocks responsible for implementing single, simple functionalities.
For example, a Dimmable Color Temperature Light device type combines several clusters: On/Off for turning the light on and off, Level Control for dimming, and Color Control for changing the light color.
Matter clusters specification
As with device types, there is a list of clusters described in the Matter specification. It is possible to create new clusters and use them in products with uncertified status, or contribute them to the Matter organization and work to grant them certifiable status.
Note
If the specification doesn’t include a cluster you need, you can create and use a custom one. However, custom functionality cannot be certified, meaning the Connectivity Standard Alliance (CSA) organization does not guarantee its quality to users. To achieve certifiable status, you must contribute the specification, get it approved, and convince at least two other vendors to support it (three total).
The Matter specification consists of several parts:
The Matter Core Specification describes the clusters that are common to all Matter device types and are related to the core protocol functionalities. The Matter Application Cluster Library Specification describes the clusters that can be used in the specific application use cases and application device types.
Clusters content
In the Matter Application Cluster Specification, similarly to device types, you can find different clusters that are grouped depending on their use cases. Every cluster description includes a few sections that you should consider when deciding to support that cluster in your application. Additionally, from a Data Model perspective, the clusters consist of attributes, commands, and events that are used for different kinds of data representation.
Revision History
This section includes a table with a list of revisions used for the particular cluster and a description of changes between the revisions. It is important to make sure that your application supports proper revision, as otherwise, for example, some features that you meant to use may not be available.
Cluster ID
This section contains the cluster identifier, which must be unique across all available clusters, and the cluster name.
Features
This section lists the features that the cluster can support. The section can be empty if the cluster does not support any feature variants. Features are represented as single bits in the FeatureMap attribute (maximum 32 bit long), where 0 means the feature is disabled and 1 means it is enabled.
For example, a Door Lock cluster has multiple features that determine a way of inserting credentials, such as using pin (PIN), RFID (RID), fingerprint (FGP). Assuming that Door Lock would have only these three features and they would be assigned: PIN to bit 0, RID to bit 1 and FGP to bit 2. The configuration that supports fingerprint and RFID would have a feature map value equal to 0x6 (0b110).
1 1 0
FPG RID PIN
Every feature has an assigned bit, code, and conformance, indicating whether it is mandatory (M), optional (O), or depends on some other feature value. The reason for that is that some features may be enabled only if another feature is enabled as well, or on the other hand there are mutually exclusive features that cannot be used at the same time.
Supporting specific features may result in the possibility of supporting additional attributes, commands, and events. The additional elements can be optional (marked with brackets: [FEATURE_CODE]) or mandatory (marked without brackets: FEATURE_CODE) for this feature.
For example, the Door Position Sensor (DPS) feature from a Door Lock cluster allows you to optionally ([DPS]) enable the OpenPeriod attribute, but it also requires a mandatory (DPS) support for the DoorState attribute.
Attributes
Attributes provide information about the current state of the cluster. Some of the attributes can be constant, and their purpose is to allow for reading and informing about device capabilities.
For example, in the Door Lock cluster, there is an attribute for the number of supported users.
Another use case for an attribute is to keep the current state of a value that may change over time. For example, in the Door Lock cluster, the LockState attribute changes its value based on the physical lock state.
The most important elements of every attribute are:
ID – unique identifier in the scope of the cluster
Name – unique name in the scope of the cluster
Type – data type, such as bool, string, integer, or some custom data structure
Constraint – limits for the value, such as min and max allowed values for the numeric types
Access – what the client device can do with the attribute – read it (R) or write it (W), and what level of access is required – view (V) or modify (M). For example, you need the view privilege to do the read action, and the modify privilege to do the write.
Conformance – informs whether the attribute is optional (O), mandatory (M), or depends on selected features
The following table presents a few examples of attributes from a Door Lock cluster:
ID
Name
Type
Constraint
Access
Conformance
0x0000
LockState
LockStateEnum
–
R V
M
0x0012
NumberOfPINUsersSupported
uint16
all
R V
PIN
0x0021
Language
string
max 3
R[W] VM
O
Events
Events are historical records used to provide information about changes over time. In comparison to attributes, they cannot be used to get information about the current state of the device, but to monitor how that state is changing.
For example, the Thread Network Diagnostics cluster has a ConnectionStatus event that is sent every time the device changes its connection state between connected and disconnected. This way, you know if the network is stable, which would be difficult based only on the current connection state.
The most important elements of every attribute are:
ID – unique identifier in the scope of the cluster
Name – unique name in the scope of the cluster
Priority – the priority of the information compared to other events, the available values are DEBUG, INFO, and CRITICAL. As the device has limited buffering capabilities for the events, if the buffer is full, the priority is a factor deciding which events are kept or dropped.
Access – what level of access is required to interact with it, usually it’s View only.
Conformance – informs whether the attribute is optional (O), mandatory (M) or depends on selected features
The following table presents an example of an event from a Thread Network Diagnostics cluster:
ID
Name
Priority
Access
Conformance
0x00
ConnectionStatus
INFO
V
O
Commands
Commands are the triggers sent by the client device to request a specific action from the server device. The actions taken in response to command reception can be very simple or a sequence of complex operations, depending on the command specification.
Considering the structure, the simplest command does not include any additional data, triggers some behavior just by receiving it, and does not require any additional data besides confirmation that it was applied in response. For example, the On command from the On/Off cluster results in changing the OnOff attribute state.
An example of a command that contains additional data is the SetPINCode command from the DoorLock cluster that includes information about the specific user and pin code to be set by the receiving device.
In turn, the GetPINCode command from the DoorLock cluster is a perfect example of a command that uses additional data in both the request and the response. In the request, the client device provides data with the user ID, and in the response, the server device provides the user data and the PIN code.
The most important elements of every attribute are:
ID – unique identifier in the scope of the cluster
Name – unique name in the scope of the cluster
Direction – informs whether a command is sent from the client to the server or in the opposite direction
Response – informs whether the response is a default confirmation or a more complex response command specified by a name
Access – what level of access is required to interact with it, such as Operate (O), Timed (T) or Administer (A)
Conformance – informs whether the attribute is optional (O), mandatory (M) or depends on selected features
The following table presents an example of an event from a Door Lock cluster:
ID
Name
Direction
Response
Access
Conformance
0x00
LockDoor
client->server
Y
O T
M
0x05
SetPINCode
client->server
Y
A T
!USR & PIN
0x06
GetPINCode
client->server
GetPINCodeResponse
A
!USR & PIN
0x06
GetPINCodeResponse
client<-server
N
!USR & PIN
Nordic Developer Academy Privacy Policy
1. Introduction
In this Privacy Policy you will find information on Nordic Semiconductor ASA (“Nordic Semiconductor”) processes your personal data when you use the Nordic Developer Academy.
References to “we” and “us” in this document refers to Nordic Semiconductor.
2. Our processing of personal data when you use the Nordic Developer Academy
2.1 Nordic Developer Academy
Nordic Semiconductor processes personal data in order to provide you with the features and functionality of the Nordic Developer Academy. Creating a user account is optional, but required if you want to track you progress and view your completed courses and obtained certificates. If you choose to create a user account, we will process the following categories of personal data:
Email
Name
Password (encrypted)
Course progression (e.g. which course you have completely or partly completed)
Certificate information, which consists of name of completed course and the validity of the certificate
Course results
During your use of the Nordic Developer Academy, you may also be asked if you want to provide feedback. If you choose to respond to any such surveys, we will also process the personal data in your responses in that survey.
The legal basis for this processing is GDPR article 6 (1) b. The processing is necessary for Nordic Semiconductor to provide the Nordic Developer Academy under the Terms of Service.
2.2 Analytics
If you consent to analytics, Nordic Semiconductor will use Google Analytics to obtain statistics about how the Nordic Developer Academy is used. This includes collecting information on for example what pages are viewed, the duration of the visit, the way in which the pages are maneuvered, what links are clicked, technical information about your equipment. The information is used to learn how Nordic Developer Academy is used and how the user experience can be further developed.
2.2 Newsletter
You can consent to receive newsletters from Nordic from within the Nordic Developer Academy. How your personal data is processed when you sign up for our newsletters is described in the Nordic Semiconductor Privacy Policy.
3. Retention period
We will store your personal data for as long you use the Nordic Developer Academy. If our systems register that you have not used your account for 36 months, your account will be deleted.
4. Additional information
Additional information on how we process personal data can be found in the Nordic Semiconductor Privacy Policy and Cookie Policy.
Nordic Developer Academy Terms of Service
1. Introduction
These terms and conditions (“Terms of Use”) apply to the use of the Nordic Developer Academy, provided by Nordic Semiconductor ASA, org. nr. 966 011 726, a public limited liability company registered in Norway (“Nordic Semiconductor”).
Nordic Developer Academy allows the user to take technical courses related to Nordic Semiconductor products, software and services, and obtain a certificate certifying completion of these courses. By completing the registration process for the Nordic Developer Academy, you are agreeing to be bound by these Terms of Use.
These Terms of Use are applicable as long as you have a user account giving you access to Nordic Developer Academy.
2. Access to and use of Nordic Developer Academy
Upon acceptance of these Terms of Use you are granted a non-exclusive right of access to, and use of Nordic Developer Academy, as it is provided to you at any time. Nordic Semiconductor provides Nordic Developer Academy to you free of charge, subject to the provisions of these Terms of Use and the Nordic Developer Academy Privacy Policy.
To access select features of Nordic Developer Academy, you need to create a user account. You are solely responsible for the security associated with your user account, including always keeping your login details safe.
You will able to receive an electronic certificate from Nordic Developer Academy upon completion of courses. By issuing you such a certificate, Nordic Semiconductor certifies that you have completed the applicable course, but does not provide any further warrants or endorsements for any particular skills or professional qualifications.
Nordic Semiconductor will continuously develop Nordic Developer Academy with new features and functionality, but reserves the right to remove or alter any existing functions without notice.
3. Acceptable use
You undertake that you will use Nordic Developer Academy in accordance with applicable law and regulations, and in accordance with these Terms of Use. You must not modify, adapt, or hack Nordic Developer Academy or modify another website so as to falsely imply that it is associated with Nordic Developer Academy, Nordic Semiconductor, or any other Nordic Semiconductor product, software or service.
You agree not to reproduce, duplicate, copy, sell, resell or in any other way exploit any portion of Nordic Developer Academy, use of Nordic Developer Academy, or access to Nordic Developer Academy without the express written permission by Nordic Semiconductor. You must not upload, post, host, or transmit unsolicited email, SMS, or \”spam\” messages.
You are responsible for ensuring that the information you post and the content you share does not;
contain false, misleading or otherwise erroneous information
infringe someone else’s copyrights or other intellectual property rights
contain sensitive personal data or
contain information that might be received as offensive or insulting.
Such information may be removed without prior notice.
Nordic Semiconductor reserves the right to at any time determine whether a use of Nordic Developer Academy is in violation of its requirements for acceptable use.
Violation of the at any time applicable requirements for acceptable use may result in termination of your account. We will take reasonable steps to notify you and state the reason for termination in such cases.
4. Routines for planned maintenance
Certain types of maintenance may imply a stop or reduction in availability of Nordic Developer Academy. Nordic Semiconductor does not warrant any level of service availability but will provide its best effort to limit the impact of any planned maintenance on the availability of Nordic Developer Academy.
5. Intellectual property rights
Nordic Semiconductor retains all rights to all elements of Nordic Developer Academy. This includes, but is not limited to, the concept, design, trademarks, know-how, trade secrets, copyrights and all other intellectual property rights.
Nordic Semiconductor receives all rights to all content uploaded or created in Nordic Developer Academy. You do not receive any license or usage rights to Nordic Developer Academy beyond what is explicitly stated in this Agreement.
6. Liability and damages
Nothing within these Terms of Use is intended to limit your statutory data privacy rights as a data subject, as described in the Nordic Developer Academy Privacy Policy. You acknowledge that errors might occur from time to time and waive any right to claim for compensation as a result of errors in Nordic Developer Academy. When an error occurs, you shall notify Nordic Semiconductor of the error and provide a description of the error situation.
You agree to indemnify Nordic Semiconductor for any loss, including indirect loss, arising out of or in connection with your use of Nordic Developer Academy or violations of these Terms of Use. Nordic Semiconductor shall not be held liable for, and does not warrant that (i) Nordic Developer Academy will meet your specific requirements, (ii) Nordic Developer Academy will be uninterrupted, timely, secure, or error-free, (iii) the results that may be obtained from the use of Nordic Developer Academy will be accurate or reliable, (iv) the quality of any products, services, information, or other material purchased or obtained by you through Nordic Developer Academy will meet your expectations, or that (v) any errors in Nordic Developer Academy will be corrected.
You accept that this is a service provided to you without any payment and hence you accept that Nordic Semiconductor will not be held responsible, or liable, for any breaches of these Terms of Use or any loss connected to your use of Nordic Developer Academy. Unless otherwise follows from mandatory law, Nordic Semiconductor will not accept any such responsibility or liability.
7. Change of terms
Nordic Semiconductor may update and change the Terms of Use from time to time. Nordic Semiconductor will seek to notify you about significant changes before such changes come into force and give you a possibility to evaluate the effects of proposed changes. Continued use of Nordic Developer Academy after any such changes shall constitute your acceptance of such changes. You can review the current version of the Terms of Use at any time at https://academy.nordicsemi.com/terms-of-service/
8. Transfer of rights
Nordic Semiconductor is entitled to transfer its rights and obligation pursuant to these Terms of Use to a third party as part of a merger or acquisition process, or as a result of other organizational changes.
9. Third Party Services
To the extent Nordic Developer Academy facilitates access to services provided by a third party, you agree to comply with the terms governing such third party services. Nordic Semiconductor shall not be held liable for any errors, omissions, inaccuracies, etc. related to such third party services.
10. Dispute resolution
The Terms of Use and any other legally binding agreement between yourself and Nordic Semiconductor shall be subject to Norwegian law and Norwegian courts’ exclusive jurisdiction.
Switch language?
Progress is tracked separately for each language. Switching will continue from your progress in that language or start fresh if you haven't begun.
Your current progress is saved, and you can switch back anytime.
•Matter over Thread support for nRF54LM20A and nRF54LM20B SoCs. •Matter over Wi-Fi® support for nRF54LM20A combined with the nRF7002-EB II shield. •Released the Matter Cluster Editor app v1.0.1 and Matter Quick Start app v1.1.0.
MCUboot & Partition Manager
•Single-Slot DFU and RAM Load mode are both promoted to fully supported •Partition Manager is officially deprecated in favor of Zephyr's devicetree-based partitioning.