ZHCSOK7B March 2020 – May 2021 CC3130
PRODUCTION DATA
Table 6-1 lists the features supported across different CC3x3x devices.
FEATURE | DEVICE | |||||
---|---|---|---|---|---|---|
CC3130 | CC3135 | CC3230S | CC3230SF | CC3235S | CC3235SF | |
Classification | Network Processor | Network Processor | Wireless microcontroller | Wireless microcontroller | Wireless microcontroller | Wireless microcontroller |
Standard | 802.11b/g/n | 802.11a/b/g/n | 802.11b/g/n | 802.11b/g/n | 802.11a/b/g/n | 802.11a/b/g/n |
TCP/IP stack | IPv4, IPv6 | IPv4, IPv6 | IPv4, IPv6 | IPv4, IPv6 | IPv4, IPv6 | IPv4, IPv6 |
Sockets | 16 | 16 | 16 | 16 | 16 | 16 |
Package | 9-mm × 9-mm VQFN | 9-mm × 9-mm VQFN | 9-mm × 9-mm VQFN | 9-mm × 9-mm VQFN | 9-mm × 9-mm VQFN | 9-mm × 9-mm VQFN |
ON-CHIP APPLICATION MEMORY | ||||||
Flash | — | — | — | 1MB | — | 1MB |
RAM | — | — | 256KB | 256KB | 256KB | 256KB |
RF FEATURES | ||||||
Frequency | 2.4 GHz | 2.4 GHz, 5 GHz | 2.4 GHz | 2.4 GHz | 2.4 GHz, 5 GHz | 2.4 GHz, 5 GHz |
Coexistence with BLE Radio (CC13x2/CC26x2) | Yes | Yes | Yes | Yes | Yes | Yes |
SECURITY FEATURES | ||||||
Secure boot | — | — | Yes | Yes | Yes | Yes |
FIPS 140-2 Level 1 Certification(1) | No | Yes | No | No | Yes | Yes |
Enhanced application level security |
File system security Secure key storage Software tamper detection Cloning protection Initial secure programming |
File system security Secure key storage Software tamper detection Initial secure programming |
File system security Secure key storage Software tamper detection Cloning protection Initial secure programming |
File system security Secure key storage Software tamper detection Cloning protection Initial secure programming |
File system security Secure key storage Software tamper detection Cloning protection Initial secure programming |
File system security Secure key storage Software tamper detection Cloning protection Initial secure programming |
Wi-Fi level of security | WEP, WPS, WPA / WPA2 PSK, WPA2 (802.1x), WPA3 personal and enterprise | |||||
Additional networking security | Unique device identity Trusted root-certificate catalog TI Root-of-trust public key Online certificate status protocol (OCSP) Certificate signing request (CSR) Unique per-device key pair |
|||||
Hardware acceleration | Hardware crypto engines |