Antenna type
—
External. Outdoor antennas tend to be larger than indoor antennas, and they usually have swivel mounts that allow the rod to be placed in the optimal position, regardless of the position of the device itself. All this has a positive effect on signal strength. In addition, there are removable external antennas — if desired, they can be replaced with more powerful ones. The main disadvantage of this option can be called bulkiness.
— Internal. Antennas located inside the case are considered less advanced than external ones. In most cases, they are smaller, and the performance depends on the position of the device (although many manufacturers use technologies to compensate for this effect). At the same time, equipment with
internal antennas has a neat appearance without unnecessary protruding parts.
— External / internal. The presence in the device at once of both types of antennas described above (in this case, there may be more than one of those and others). The presence of several antennas improves the quality of communication, but if they are all external, the device may turn out to be too bulky. Therefore, in some models of routers, a compromise is used: part of the antennas is hidden in the case, which has a positive effect on compactness and appearance.
Transmitter power
Rated power of the Wi-Fi transmitter used in the device. If multiple bands are supported (see “Ranges of operation”) the power for different frequencies may be different, for such cases the maximum value is indicated here.
The total transmitting power provided by the device directly depends on this parameter. This power can be calculated by adding the transmitter power and the antenna gain (see above): for example, a 20 dBm transmitter coupled with a 5 dBi antenna results in a total power of 25 dBm (in the main antenna coverage area). For simple domestic use (for example, buying a router in a small apartment), such details are not required, but in the professional field it often becomes necessary to use wireless devices of a strictly defined power. Detailed recommendations on this matter for different situations can be found in special sources, but here we note that the total value of 26 dBm or more allows the device to be classified as equipment
with a powerful transmitter. At the same time, such capabilities are not always required in fact: excessive power can create a lot of interference both for surrounding devices and for the transmitter itself (especially in urban and other similar conditions), as well as degrade the quality of the connection with low-power electronics. And for effective communication over a long distance, both the equipment itself and external devices must have the appropriate power (which is far from alway
...s achievable). So, when choosing, you should not chase the maximum number of decibels, but take into account the recommendations for a particular case; in addition, a Wi-Fi amplifier or MESH system often turns out to be a good alternative to a powerful transmitter.Safety standards
— WPA. An encryption protocol created as a temporary solution to the most critical vulnerabilities of the WEP described below. It uses a more advanced encryption algorithm, as well as the transmission of passwords in encrypted form. However, the reliability of this standard also turned out to be insufficient, so an improved version, WPA2, was developed.
— WEP. Historically, the first encryption protocol used in wireless networks. It uses encryption from 64-bit to 256-bit, the latter option is considered strong in itself, however, the standard's own vulnerabilities allow a specialist to hack such a communication channel without much difficulty. As a result, WEP is completely obsolete, its support is provided mainly for compatibility with the simplest equipment (especially since it is technically easy to provide this support).
— WPA2. The most popular security standard in modern Wi-Fi equipment. At one time, it became an important update to the original WPA: in particular, the AES CCMP algorithm was introduced into WPA2, which is extremely difficult to crack. Over time, however, some vulnerabilities were identified in this protocol, which led to the development of a more advanced WPA3; however, WPA3 is just beginning to be massively implemented, and in most Wi-Fi devices, WPA2 remains the most advanced standard.
It is worth noting two nuances. First, WPA2 is available in two versions — personal and corporate; in this case, we are talking about pers
...onal, corporate options are placed in paragraph "802.1x". Secondly, support for this standard is guaranteed to also be compatible with WEP and original WPA.
— WPA3. A fundamental improvement to WPA2, introduced in 2018, addressing weaknesses identified in WPA2 in the 14 years since it went live. This standard introduced four key innovations:
- Improved security for public networks. Unlike its predecessor, WPA3 encrypts the traffic between the gadget and the router / access point, even if the network is public and does not require a password.
- Protection against the KRACK vulnerability, which allowed hacking the WPA2 communication channel at the time the connection was established. The SAE algorithm is responsible for this protection — more advanced than the previously used PSK. In particular, when establishing a connection via SAE, both devices are considered equal (in PSK, the receiver and transmitter were clearly defined) — this does not allow an attacker to “wedge” between devices using KRACK methods.
- Easy Connect feature — simplifies connection to Wi-Fi networks for devices that do not have displays (in particular, smart home components). Each of these devices will have a QR code on the body, and to connect to the network, it will be enough to scan this code using a smartphone / tablet already connected to this network. However this function is not directly related to WPA3, WPA2 is sufficient for its operation; however, mass adoption of Easy Connect should be expected at the same time as WPA3.
- Improved encryption algorithms for sensitive data, suitable even for government agencies and defense enterprises. However, this feature is relevant mainly for the corporate version of WPA3 — and support for this version is indicated as "802.1x" (see below, in this case we are talking mainly about the personal version of this standard).
In many devices, upgrading from WPA2 to WPA3 can be done in software by installing a new firmware version. However, if support for this protocol is important to you, it is best to choose equipment where such support is initially provided. Also note that the presence of WPA3 is almost guaranteed to also be compatible with WPA2.
— 802.1x. In this case, it implies support for corporate security standards — most often the corresponding versions of the WPA2 protocols, in new devices also WPA3. For example, if the specifications indicate "802.1x" in addition to "WPA3", then this means that this model supports both personal and corporate versions of WPA3. As for the differences between similar versions, one of them is the support for a separate authentication server in corporate protocols. In other words, when using this function, data on accounts and access rights are stored separately from Wi-Fi equipment, on a special secure server, and it is this server that in each case checks the data of the connected equipment and decides whether to allow or deny access.