Data Sheet
Table Of Contents
- General Description
- Key Features
- Applications
- Device Family
- Contents
- 1. References
- 2. Block Diagram
- 3. Terminal Configuration and Functions
- 4. Specifications
- 5. Detailed Description
- 6. Applications, Implementation, and Layout
- 7. Mechanical Specifications
- 8. Ordering Information
- 9. Revision History
- 10. Regulatory
info@bdecomm.com
BDE Technology Inc.
BDE-WF3235
BDE Dual-Band WiFi MCU Module
Datasheet
Datasheet
55 / 77
• Built-in network application and utilities:
– HTTP/HTTPS
• Web page content stored on serial flash
• RESTful APIs for setting and configuring application content
• Dynamic user callbacks
– Service discovery: Multicast DNS service discovery lets a client advertise its service without a centralized
server. After connecting to the access point, the BDE-WF3235 MCU provides critical information, such
as device name, IP, vendor, and port number.
– DHCP server
– Ping
Table 5-1 describes the NWP features.
Table 5-1. NWP Features
Feature
Description
Wi-Fi standards
802.11a/b/g/n station
802.11a/b/g AP supporting up to four stations
Wi-Fi Direct client and group owner
Wi-Fi channels
2.4 GHz ISM and 5 GHz U-NII Channels
Channel Bandwidth
20 MHz
Wi-Fi security
WEP, WPA/WPA2 PSK, WPA2 enterprise (802.1x), WPA3 personal
(1)
Wi-Fi provisioning
SmartConfig technology, Wi-Fi protected setup (WPS2), AP mode with internal HTTP web server
IP protocols
IPv4/IPv6
IP addressing
Static IP, LLA, DHCPv4, DHCPv6 with DAD
Cross layer
ARP, ICMPv4, IGMP, ICMPv6, MLD, NDP
Transport
UDP, TCP
SSLv3.0/TLSv1.0/TLSv1.1/TLSv1.2
RAW
Network applications
and utilities
Ping
HTTP/HTTPS web server
mDNS
DNS-SD
DHCP server
Host interface
UART/SPI
Security
Device identity
Trusted root-certificate catalog
TI root-of-trust public key
The CC3235S and CC3235S/CC3235SF variants also support:
• Secure key storage
• Online certificate status protocol (OCSP)
• Certificate signing request (CSR)
• Unique per device Key-Pair
• File system security
• Software tamper detection
• Cloning protection
• Secure boot
• Validate the integrity and authenticity of the run-time binary during boot
• Initial secure programming
• Debug security
• JTAG and debug