Connection type. All routers are capable of distributing Wi-Fi from a wired Internet connection, but not all can operate from a wireless network. The data transfer speed through a single port in a wired connection can be up to 100 Mbit/s or up to 1 Gbit/s. 3G/4G support allows you to create a backup network if wired Internet is lost. Wireless networking can be provided by a SIM card slot or USB modem.
The number of cores in the processor and the clock frequency affect the stability of the internal system of the router.

Wi-Fi standard. The data transfer speed of the network depends on the generation of the Wi-Fi standard. The latest is Wi-Fi 6. To work fully in this range, you will need a Wi-Fi adapter or a mobile device that supports this standard. Router with this standard allows you to play online games, broadcast, watch video in 4K-format. For simple tasks, such as communicating in chats and social networks, watching videos, downloading software and music, Wi-Fi 4 is sufficient. Most modern models support Wi-Fi 5 (802.11ac).

The number of antennas. The more antennas, the better the signal propagates in space and the higher the stability of reception. However, devices with six or more antennas take up a lot of space and look bulky. In some models, the antennas can be disconnected. The most compact devices are those with internal antennas located in the housing.
Systems and technologies that improve the quality of network coverage and increase its radius. For example, Mesh, a multi-device system that provides a strong signal around the room without “blind spots”, is used in routers for areas of 120 square meters and more. Beamforming technology finds connected devices and boosts the signal in their direction.

Additional features. Most routers are equipped with useful options. For example, “Parental Control” restricts visits to certain sites from a child’s device and monitors the time spent on the Internet. The “Guest Network” feature allows you to distribute Wi-Fi without access to the main network. Any router must have protection against external threats to protect users’ confidential data.