Dark mode
Укр|Eng|Рус
Ukraine
Catalog   /   Computing   /   Networking   /   Wi-Fi Equipment

Comparison TP-LINK Archer A64 vs TP-LINK Archer C80

Add to comparison
TP-LINK Archer A64
TP-LINK Archer C80
TP-LINK Archer A64TP-LINK Archer C80
Compare prices 80Compare prices 94
User reviews
0
0
28
TOP sellers
Main
Works in router and access point mode.
Works in two modes, router and access point.
Product typerouterrouter
Data input (WAN-port)
Ethernet (RJ45)
Wi-Fi
Ethernet (RJ45)
 
Wireless Wi-Fi connection
Wi-Fi standards
Wi-Fi 3 (802.11g)
Wi-Fi 4 (802.11n)
Wi-Fi 5 (802.11ac)
Wi-Fi 3 (802.11g)
Wi-Fi 4 (802.11n)
Wi-Fi 5 (802.11ac)
Frequency band
2.4GHz
5 GHz
2.4GHz
5 GHz
Operating rangesdual-band (2.4 GHz and 5 GHz)dual-band (2.4 GHz and 5 GHz)
Wireless speed 2.4 GHz400 Mbps600 Mbps
Wireless speed 5 GHz867 Mbps1300 Mbps
Connection and LAN
WAN
1 port
1 Gbps
1 port
1 Gbps
LAN
4 ports
1 Gbps
4 ports
1 Gbps
Antenna and transmitter
Number of antennas44
Antenna typeexternalexternal
MU-MIMO
2.4 GHz antennas2
5 GHz antennas2
Transmitter power23 dBm23 dBm
Signal strength 2.4 GHz20 dBm20 dBm
Signal strength 5 GHz23 dBm23 dBm
Hardware
Clock Speed1.2 GHz1.2 GHz
Functions
Features
NAT
Beamforming
firewall
NAT
Beamforming
firewall
More features
DHCP server
 
DDNS
DMZ
DHCP server
VPN
DDNS
DMZ
Security
Safety standards
WPA
WEP
WPA2
WPA3
802.1x
WPA
WEP
WPA2
 
802.1x
General
Operating temperature0 °C ~ +40 °C0 °C ~ +40 °C
Dimensions120x120x28 mm215x117x32 mm
Color
Added to E-Catalognovember 2021july 2020

Data input (WAN-port)

Methods for connecting to the Internet (or other external network, such as in bridge mode) supported by the device.

The classic, most common version of such a connection nowadays is LAN (Ethernet), but this is not limited to this. A wired connection can also be made via ADSL or SFP fiber, and wirelessly via mobile networks (using a SIM card, SIM card 5G or an external modem for 3G or 4G), as well as via Wi-Fi. Here is a more detailed description of each option:

— Ethernet (RJ45). Classic wired connection via a network cable via an RJ-45 connector. Also known as "LAN", although this designation is not entirely correct. Nowadays, it is one of the most common methods of wired Internet connection, and is also widely used in local networks. This is due to the fact that the speed of Ethernet is actually limited only by the capabilities of network controllers; at the same time, even the simplest modules support up to 100 Mbps, and in advanced equipment this value can reach 10 Gbps.

— ADSL. A technology primarily used for wired Internet connections over existing landline telephone lines. This is its main advantage — you can use ready-made lines without fiddling w...ith laying numerous additional wires; at the same time, ADSL works independently of telephone calls and does not interfere with them. At the same time, the speed of such a connection is noticeably lower than via Ethernet — even in advanced equipment it does not exceed 24 Mbps. In addition, ADSL traffic is distributed asymmetrically: full speed is achieved only when working for reception, data transmission speed is much lower, which creates problems for video communication and some other tasks. So nowadays, ADSL is gradually being replaced by more advanced standards, although the complete disappearance of this technology is still far away.

— Wi-Fi. Connect to an external data source via Wi-Fi. By definition, this format of operation is used by Wi-Fi adapters (see "Device type"), as well as by most MESH equipment. (However, if the MESH system package includes both nodes and the main control device for them, then the WAN input can be specified for the control device, and often this is not Wi-Fi). Also, this type of data input can be provided in other types of equipment — in particular, routers and access points (for example, to work in bridge or repeater mode).

— 3G modem (USB). Internet connection via 3G mobile network using a separate external modem connected to the USB port. Most often, we are talking about UMTS networks (the development of GSM mobile communications), the most common in Europe and the post-Soviet space; however, it may also be possible to use modems for CDMA networks (EV-DO technology). These nuances, as well as compatibility with specific modem models, need to be clarified separately. However, anyway, 3G may be a good option for situations where a wired Internet connection is difficult or impossible, such as in the private sector. In addition, some Wi-Fi devices with this feature are equipped with autonomous power supplies and can even be used on the go. The data transfer speed of 3G is close to broadband wired connection (from 2 to 70 Mbps with a normal signal, depending on the specific technology); however, it is less than in 4G networks (see below), but 3G coverage is more extensive, and equipment for this standard is cheaper.

— 4G (LTE) modem (USB). Internet connection via 4G mobile network (LTE) using a separate external modem connected to the USB port. The main features are similar to the 3G connection described above, adjusted for the fact that in this case more advanced fourth-generation networks are used. The data transfer rate in such networks reaches about 150 Mbps; they are not as widespread as 3G-connection, but soon we can expect a change in the situation. In addition, it should be noted that in Europe and the post-Soviet space, LTE networks are usually deployed on the basis of 3G UMTS and GSM networks; so in the absence of full-fledged 4G coverage, modems for such networks can work according to the 3G and even GSM standard.

— SIM card. Connecting to the Internet via a mobile network using a mobile operator's SIM card installed directly in the device. The specific type of supported networks depends both on the capabilities of the router and on the conditions of a particular mobile operator; however, all such equipment is compatible with at least 3G networks, and often 4G as well. The features of these networks are described in detail above (you can also read about the advantages of a mobile Internet connection there). This option is convenient because it allows you to do without a separate USB modem — you just need to purchase a SIM card, the cost of which is negligible. In addition, the use of "sim cards" has a positive effect on compactness and ease of carrying. On the other hand, the built-in mobile communication module significantly affects the overall cost — and you will have to pay for it anyway (whereas a model with support for external modems does not have to be bought immediately with a modem, such devices usually allow wired connection). Therefore, you should pay attention to this option if you initially plan to connect to the Internet through mobile networks.

- SIM card (5G). The ability to operate Wi-Fi equipment in high-speed 5G mobile networks with a peak bandwidth of up to 20 Gbps for reception and up to 10 Gbps for data transmission. Implemented via a SIM card with appropriate 5G support. This standard reduces power consumption compared to previous versions, and it also uses a number of complex solutions aimed at improving the reliability and overall quality of communication - in particular, multi-element antenna arrays (Massive MIMO) and beamforming technologies (Beamforming).

— SFP (optics). Connection via fiber optic cable of the SFP standard. Such a connection can be carried out at high speeds (measured in gigabytes per second), and the fiber, unlike the Ethernet cable, is practically insensitive to external interference. On the other hand, the support of this standard is not cheap, and its capabilities are unnecessary for domestic use. Therefore, SFP is found mainly in professional-level Wi-Fi devices.

Wireless speed 2.4 GHz

The maximum speed provided by the device when communicating wirelessly in the 2.4 GHz band.

This range is used in most modern Wi-Fi standards (see above) - as one of the available or even the only one. The theoretical maximum for it is 600 Mbit. In reality, Wi-Fi at a frequency of 2.4 GHz is used by a large number of client devices, from which congestion of data transmission channels emerges. Also, the number of antennas affects the speed performance of the equipment. It is possible to achieve the speed declared in the specification only in an ideal situation. In practice, it can be noticeably smaller (often by several times), especially with an abundance of wireless technology simultaneously connected to the equipment. The maximum speed at 2.4 GHz is specified in the characteristics of specific models to understand the real capabilities of Wi-Fi equipment. As for the numbers, according to the capabilities in the 2.4 GHz band, modern equipment is conditionally divided into models with speeds up to 500 Mbit inclusive and over 500 Mbit.

Wireless speed 5 GHz

The maximum speed supported by the device when communicating wirelessly in the 5 GHz band.

This range is used in Wi-Fi 4, Wi-Fi 6 and Wi-Fi 6E as one of the available bands, in Wi-Fi 5 as the only one (see "Wi-Fi Standards"). The maximum speed is specified in the specifications in order to indicate the real capabilities of specific equipment - they can be noticeably more modest than the general capabilities of the standard. Also, in fact, it all depends on the generation of Wi-Fi. For example, devices with Wi-Fi 5 support can theoretically deliver up to 6928 Mbit (using eight antennas), with Wi-Fi 6 support up to 9607 Mbit (using the same eight spatial streams). The maximum possible communication speed is achieved under certain conditions, and not every model of Wi-Fi equipment fully satisfies them. Specific figures are conditionally divided into several groups: the value up to 500 Mbit is rather modest, many devices support speeds in the range of 500 - 1000 Mbit, indicators of 1 - 2 Gbps can be attributed to the average, and the most advanced models in class provide a data exchange rate of over 2 Gbps.

2.4 GHz antennas

The total number of antennas in the router that are responsible for communication in the 2.4 GHz band. For details about the number of antennas, see "Total antennas", about the range — "Frequency range".

5 GHz antennas

The total number of antennas in the router that are responsible for communication in the 5 GHz band. For details about the number of antennas, see "Total antennas", about the range — "Frequency range".

More features

Additional features (mostly software) supported by the device. These may include DHCP server, FTP server, Web server, file server, media server (DLNA), print server, torrent client, VPN support, DDNS support, and DMZ support, among others. Here is a more detailed description of these functions:

— DHCP server. A function that simplifies the distribution of IP addresses connected to the router (or other network equipment) to subscriber devices. Assigning an IP address is necessary for correct operation in TCP / IP networks (and this is the entire Internet and the vast majority of modern “locals”). In the presence of DHCP, this process can be carried out completely automatically, which greatly simplifies the life of both users and administrators. However, the administrator can also set additional DHCP options — for example, specify a range of available IP addresses (to prevent errors) or limit the time of using one address. If necessary, you can even manually enter a specific address for each device on the network, without automatically adding new devices — DHCP also simplifies this procedure, as it allows you...to carry out all operations on the router without delving into the settings of each subscriber device.

— FTP server. A feature that allows you to use a Wi-Fi device to store files and access them via FTP. This protocol is widely used to transfer individual files both in local networks and over the Internet. Actually, one of the main differences between this function and the file server (see below) is, first of all, the ability to work via the Internet without much difficulty. In addition, FTP is a common standard protocol and is supported by almost any PC, while a file server can use specialized standards. So if you plan to organize file storage with the simplest and most convenient access, you should choose a device with this function. At the same time, we note that “simple” does not mean “uncontrolled”: FTP allows you to set a login and password for accessing files, as well as encrypt transmitted data. The files themselves can be stored both on the built-in storage of a network device, and on a drive connected to it, such as a USB flash drive or external HDD.

— Web server. The ability to use the router as a web server — storage that hosts ("hosts") a website. Note that this can be both an Internet site and an internal resource of the local network, strictly for personal or official use. Placing the site on your own equipment allows you to do without the services of hosting providers and maintain maximum control over the data on the site and its technical base. On the other hand, this feature significantly affects the cost of equipment, and in terms of memory and processing power, Wi-Fi devices are often inferior to dedicated servers, even based on conventional PCs and laptops (although in some models the memory can be expanded with an external drive). So in this case, the web server mode should be considered mainly as an additional option for relatively simple tasks that are not associated with high loads.

— File server. The ability to use a Wi-Fi device as a server for storing files. This function differs from the FTP server described above in the data transfer protocols used; in other words, a "file server" in this case is a network file storage based on any protocols other than FTP. A specific set of such protocols and, accordingly, the functionality of a Wi-Fi device should be specified separately; we only note that most often we are talking about accessing files over a local network (FTP is traditionally used for Internet access), and the files themselves can be stored both in the router’s own memory, and on a flash drive or external hard drive.

— Media server (DLNA). The ability to create a media library using an external USB drive and transfer content from it to other devices on your home network via cable or Wi-Fi. The function is most in demand for broadcasting video, audio files and images to smart TVs and set-top boxes. In general, the technology was conceived in order to be able to combine different devices into a single network and easily share content within this network, regardless of the model and manufacturer of individual devices. Many modern smartphones and tablets, smart home ecosystem devices, etc. have DLNA support.

— Print server. The ability of the device to work as a print server — a computer that controls the printer. This feature allows you to turn a regular printer into a network printer: all network users will be able to send print jobs through a print server, while such a server will also provide a number of additional features. So, sent jobs will be stored on it until they are executed or canceled, regardless of whether the computer from which they were sent is turned on; remote control of the print queue, etc. may be provided. And the use of a router (or other similar device) in this role is convenient because the router is usually turned on and available all the time.

— Torrent client. The presence in the device of its own torrent client or other data exchange protocol (HTTP, FTP, etc.). This feature allows you to work with file-sharing networks, which are built on the principle of "everyone's own server": the downloaded information is not on a separate computer on the network, but on the computers of the same users. At the same time, the same file can be opened for download in several places and the torrent client simultaneously downloads different parts of it from different sources - this significantly increases the speed. Using a torrent client on a device is convenient in two ways. Firstly, it allows you to offload the main computers of users - an important advantage, given that the torrent client can consume a lot of resources, especially with an abundance of simultaneous downloads / distributions. Secondly, network equipment tends to stay on at all times, allowing downloads and uploads to continue even when users' PCs and laptops are turned off. However, it should be taken into account that despite the presence of such functionality in devices, the open placement of content in torrent networks can violate copyrights. Therefore, use torrent clients in compliance with legal regulations.

— VPN (Virtual Private Network) support. Initially, VPN is a function that allows you to combine devices that are physically located in different networks into a single virtual network. The connection is via the Internet, but the data is encrypted to prevent unauthorized access to it. However, routers, access points and MESH equipment (see "Device Type") more often use a slightly different format of work: connecting to the Internet through a separate VPN server, so that all external traffic from the network served by the router goes through this server. Such a connection has a number of advantages. Firstly, additional traffic encryption increases the security of work. Secondly, “outside” in such cases, it is not the real IP address of the user that is visible, but the address of the VPN server, and in the settings you can set the address related to almost any country in the world. This also has a positive effect on security, and also makes it possible to bypass regional restrictions on visiting individual sites and accessing services.
Note that the VPN can also be “raised” on individual devices on the network (for example, through tools in some Internet browsers); however, a VPN router allows all network devices to work in this format, regardless of whether they support VPN or not. This is particularly useful on smart TVs (to access certain video services like Netflix) and on PS and Xbox (to bypass region restrictions on certain games). On the other hand, note that setting up such a connection on a router can be quite difficult, the connection speed can noticeably drop when working through a VPN, and enabling and disabling this feature on a router is usually more difficult than on user devices.

— DDNS. The device supports the DDNS function — assigning a permanent domain name to a device with a changing (dynamic) IP address. For network electronics, the IP address is of key importance, it is he who allows the equipment to send data packets to the right device. However, such addresses are sequences of numbers that are poorly remembered by a person. Therefore, domain names appeared — on the Internet these are web addresses (for example, ek.ua or e-katalog.ru), on the local network — the names of individual devices (for example, "Work laptop" or "Sergey's Computer"). Both on the Internet and in local networks, the connection between a domain name and an IP address is responsible for the so-called DNS servers: for each domain in the database of such a server, its own IP is registered. However, for technical reasons, situations often arise when the router has to use a dynamic (changeable) IP; accordingly, in order for information to be constantly available on the same domain name, it is necessary to update the data on the DNS server with each IP change. It is this update that the DDNS function provides.

— DMZ. Initially, DMZ is a function that allows you to create a segment on the local network with free access from the outside. From the rest of the network, this segment (it is called the DMZ — “demilitarized zone”) is separated by a firewall that allows only specially permitted external traffic to pass through. This provides additional protection against external attacks: in such cases, the DMZ suffers first of all, and access to other network resources is much more difficult for an attacker. One of the most popular ways to use this feature is to provide access to Internet services, the servers of which are physically located in the company's public local area network. However, it is worth noting that in some inexpensive routers, DMZ may mean the DMZ-host mode, which does not provide any additional protection and is used for completely different purposes (mainly to translate all ports to another network device). So the specific format of DMZ operation needs to be specified separately, especially if you are purchasing a low-cost category device.

Safety standards

— WPA. An encryption protocol created as a temporary solution to the most critical vulnerabilities of the WEP described below. It uses a more advanced encryption algorithm, as well as the transmission of passwords in encrypted form. However, the reliability of this standard also turned out to be insufficient, so an improved version, WPA2, was developed.

— WEP. Historically, the first encryption protocol used in wireless networks. It uses encryption from 64-bit to 256-bit, the latter option is considered strong in itself, however, the standard's own vulnerabilities allow a specialist to hack such a communication channel without much difficulty. As a result, WEP is completely obsolete, its support is provided mainly for compatibility with the simplest equipment (especially since it is technically easy to provide this support).

— WPA2. The most popular security standard in modern Wi-Fi equipment. At one time, it became an important update to the original WPA: in particular, the AES CCMP algorithm was introduced into WPA2, which is extremely difficult to crack. Over time, however, some vulnerabilities were identified in this protocol, which led to the development of a more advanced WPA3; however, WPA3 is just beginning to be massively implemented, and in most Wi-Fi devices, WPA2 remains the most advanced standard.
It is worth noting two nuances. First, WPA2 is available in two versions — personal and corporate; in this case, we are talking about pers...onal, corporate options are placed in paragraph "802.1x". Secondly, support for this standard is guaranteed to also be compatible with WEP and original WPA.

WPA3. A fundamental improvement to WPA2, introduced in 2018, addressing weaknesses identified in WPA2 in the 14 years since it went live. This standard introduced four key innovations:
  • Improved security for public networks. Unlike its predecessor, WPA3 encrypts the traffic between the gadget and the router / access point, even if the network is public and does not require a password.
  • Protection against the KRACK vulnerability, which allowed hacking the WPA2 communication channel at the time the connection was established. The SAE algorithm is responsible for this protection — more advanced than the previously used PSK. In particular, when establishing a connection via SAE, both devices are considered equal (in PSK, the receiver and transmitter were clearly defined) — this does not allow an attacker to “wedge” between devices using KRACK methods.
  • Easy Connect feature — simplifies connection to Wi-Fi networks for devices that do not have displays (in particular, smart home components). Each of these devices will have a QR code on the body, and to connect to the network, it will be enough to scan this code using a smartphone / tablet already connected to this network. However this function is not directly related to WPA3, WPA2 is sufficient for its operation; however, mass adoption of Easy Connect should be expected at the same time as WPA3.
  • Improved encryption algorithms for sensitive data, suitable even for government agencies and defense enterprises. However, this feature is relevant mainly for the corporate version of WPA3 — and support for this version is indicated as "802.1x" (see below, in this case we are talking mainly about the personal version of this standard).
In many devices, upgrading from WPA2 to WPA3 can be done in software by installing a new firmware version. However, if support for this protocol is important to you, it is best to choose equipment where such support is initially provided. Also note that the presence of WPA3 is almost guaranteed to also be compatible with WPA2.

— 802.1x. In this case, it implies support for corporate security standards — most often the corresponding versions of the WPA2 protocols, in new devices also WPA3. For example, if the specifications indicate "802.1x" in addition to "WPA3", then this means that this model supports both personal and corporate versions of WPA3. As for the differences between similar versions, one of them is the support for a separate authentication server in corporate protocols. In other words, when using this function, data on accounts and access rights are stored separately from Wi-Fi equipment, on a special secure server, and it is this server that in each case checks the data of the connected equipment and decides whether to allow or deny access.
Price graph
TP-LINK Archer A64 often compared
TP-LINK Archer C80 often compared