United Kingdom
Catalog   /   Computing   /   Networking   /   Wi-Fi Equipment

Comparison TP-LINK Archer AX1800 vs TP-LINK EX220

Add to comparison
TP-LINK Archer AX1800
TP-LINK EX220
TP-LINK Archer AX1800TP-LINK EX220
Compare prices 8Compare prices 6
TOP sellers
Main
Support for remote control standards TR-069, TR-098, TR-181, TR-111, TR-104, TR-143.
Product typerouterrouter
Data input (WAN-port)
Ethernet (RJ45)
Ethernet (RJ45)
Wireless Wi-Fi connection
Wi-Fi standards
Wi-Fi 3 (802.11g)
Wi-Fi 4 (802.11n)
Wi-Fi 5 (802.11ac)
Wi-Fi 6 (802.11ax)
Wi-Fi 3 (802.11g)
Wi-Fi 4 (802.11n)
Wi-Fi 5 (802.11ac)
Wi-Fi 6 (802.11ax)
Frequency band
2.4GHz
5 GHz
2.4GHz
5 GHz
Operating rangesdual-band (2.4 GHz and 5 GHz)dual-band (2.4 GHz and 5 GHz)
Wireless speed 2.4 GHz574 Mbps574 Mbps
Wireless speed 5 GHz1201 Mbps1201 Mbps
Connection and LAN
WAN
1 port
1 Gbps
1 port
1 Gbps
LAN
4 ports
1 Gbps
4 ports
1 Gbps
Antenna and transmitter
Number of antennas44
Antenna typeexternalexternal
MU-MIMO
Gain5 dBi
2.4 GHz antennas2
5 GHz antennas2
Transmitter power23 dBm23 dBm
Signal strength 2.4 GHz20 dBm20 dBm
Signal strength 5 GHz23 dBm23 dBm
Hardware
CPU cores2
Functions
Features
NAT
MESH mode /OneMesh/
Beamforming
firewall
NAT
MESH mode /OneMesh/
Beamforming
firewall
More features
DHCP server
VPN
DDNS
DMZ
DHCP server
VPN
DDNS
DMZ
Security
Safety standards
WPA
WEP
WPA2
WPA3
802.1x
WPA
WEP
WPA2
WPA3
 
General
Operating temperature0 °C ~ +40 °C0 °C ~ +40 °C
Dimensions260x135x39 mm260x135x42 mm
Color
Added to E-Catalogseptember 2023october 2022

Gain

Gain provided by each device antenna; if the design provides for antennas with different characteristics (a typical example is both external and internal antennas), then the information, usually, is indicated by the highest value.

Amplification of the signal in this case is provided by narrowing the radiation pattern — just as in flashlights with adjustable beam width, reducing this width increases the illumination range. The simplest omnidirectional antennas narrow the signal mainly in the vertical plane, "flattening" the coverage area so that it looks like a horizontal disk. In turn, directional antennas (mainly in specialized access points, see "Device type") create a narrow beam that covers a very small area, but provides a very solid gain.

Specifically, the gain describes how powerful the signal is in the main direction of the antenna compared to an perfect antenna that spreads the signal evenly in all directions. Together with the power of the transmitter (see below), this determines the total power of the equipment and, accordingly, the efficiency and range of communication. Actually, to determine the total power, it is enough to add the gain in dBi to the transmitter power in dBm; dBi and dBm in this case can be considered as the same units (decibels).

In general, such data is rarely required by the average user, but it can be useful in some specific situations that specialists have to deal with. Detailed calculation methods for suc...h situations can be found in special sources; here we emphasize that it does not always make sense to pursue a high antenna gain. First, as discussed above, this comes at the cost of narrowing the scope, which can be inconvenient; secondly, too strong a signal is also often undesirable, for more details see "Transmitter power".

2.4 GHz antennas

The total number of antennas in the router that are responsible for communication in the 2.4 GHz band. For details about the number of antennas, see "Total antennas", about the range — "Frequency range".

5 GHz antennas

The total number of antennas in the router that are responsible for communication in the 5 GHz band. For details about the number of antennas, see "Total antennas", about the range — "Frequency range".

CPU cores

The number of cores in the processor installed in the device. The core in this case refers to the part of the processor that executes one thread of instructions. Accordingly, the presence of multiple cores (there are 2-core models, 3 and on 4 cores) allows you to work with multiple threads simultaneously, which has a positive effect on performance.

Safety standards

— WPA. An encryption protocol created as a temporary solution to the most critical vulnerabilities of the WEP described below. It uses a more advanced encryption algorithm, as well as the transmission of passwords in encrypted form. However, the reliability of this standard also turned out to be insufficient, so an improved version, WPA2, was developed.

— WEP. Historically, the first encryption protocol used in wireless networks. It uses encryption from 64-bit to 256-bit, the latter option is considered strong in itself, however, the standard's own vulnerabilities allow a specialist to hack such a communication channel without much difficulty. As a result, WEP is completely obsolete, its support is provided mainly for compatibility with the simplest equipment (especially since it is technically easy to provide this support).

— WPA2. The most popular security standard in modern Wi-Fi equipment. At one time, it became an important update to the original WPA: in particular, the AES CCMP algorithm was introduced into WPA2, which is extremely difficult to crack. Over time, however, some vulnerabilities were identified in this protocol, which led to the development of a more advanced WPA3; however, WPA3 is just beginning to be massively implemented, and in most Wi-Fi devices, WPA2 remains the most advanced standard.
It is worth noting two nuances. First, WPA2 is available in two versions — personal and corporate; in this case, we are talking about pers...onal, corporate options are placed in paragraph "802.1x". Secondly, support for this standard is guaranteed to also be compatible with WEP and original WPA.

WPA3. A fundamental improvement to WPA2, introduced in 2018, addressing weaknesses identified in WPA2 in the 14 years since it went live. This standard introduced four key innovations:
  • Improved security for public networks. Unlike its predecessor, WPA3 encrypts the traffic between the gadget and the router / access point, even if the network is public and does not require a password.
  • Protection against the KRACK vulnerability, which allowed hacking the WPA2 communication channel at the time the connection was established. The SAE algorithm is responsible for this protection — more advanced than the previously used PSK. In particular, when establishing a connection via SAE, both devices are considered equal (in PSK, the receiver and transmitter were clearly defined) — this does not allow an attacker to “wedge” between devices using KRACK methods.
  • Easy Connect feature — simplifies connection to Wi-Fi networks for devices that do not have displays (in particular, smart home components). Each of these devices will have a QR code on the body, and to connect to the network, it will be enough to scan this code using a smartphone / tablet already connected to this network. However this function is not directly related to WPA3, WPA2 is sufficient for its operation; however, mass adoption of Easy Connect should be expected at the same time as WPA3.
  • Improved encryption algorithms for sensitive data, suitable even for government agencies and defense enterprises. However, this feature is relevant mainly for the corporate version of WPA3 — and support for this version is indicated as "802.1x" (see below, in this case we are talking mainly about the personal version of this standard).
In many devices, upgrading from WPA2 to WPA3 can be done in software by installing a new firmware version. However, if support for this protocol is important to you, it is best to choose equipment where such support is initially provided. Also note that the presence of WPA3 is almost guaranteed to also be compatible with WPA2.

— 802.1x. In this case, it implies support for corporate security standards — most often the corresponding versions of the WPA2 protocols, in new devices also WPA3. For example, if the specifications indicate "802.1x" in addition to "WPA3", then this means that this model supports both personal and corporate versions of WPA3. As for the differences between similar versions, one of them is the support for a separate authentication server in corporate protocols. In other words, when using this function, data on accounts and access rights are stored separately from Wi-Fi equipment, on a special secure server, and it is this server that in each case checks the data of the connected equipment and decides whether to allow or deny access.
TP-LINK Archer AX1800 often compared
TP-LINK EX220 often compared