Solved

Where does powerline networking end?

Posted on 2014-01-02
3
227 Views
Last Modified: 2014-01-17
Powerline adapters are popular as solutions to wifi range issues in homes... but where does the powerline network access end?

For example, when using them in a single family home with its own electrical panel, is the network accessible beyond the panel... e.g. next door.

I know you can encrypt the signals, but still wondering what the exposure is once you start using these devices in a home.

Thanks for any info or direction anyone can provide.

Tomster2
0
Comment
Question by:Tomster2
3 Comments
 
LVL 18

Assisted Solution

by:Jeremy Weisinger
Jeremy Weisinger earned 250 total points
ID: 39752621
It gets pretty noisy but it is possible that your neighbor could see some traffic with the right equipment. If you have a surge suppressor or power conditioner between the adapter and your neighbor, they won't be able to pick anything up.

Since it's not likely that you'll have that the best thing to do is use the encryption.
0
 
LVL 44

Accepted Solution

by:
Darr247 earned 250 total points
ID: 39752629
It generally ends at the transformer that steps down the voltage from transmission to user levels... the length of the wires that make up the windings inside the transformer exceed the distance the powerline signals can travel without a boost) so if you share a transformer with your neighbor[s] (and most homes do, in urban areas; but homes out in the country, and commercial buildings, generally do not share a transformer).  That's why the manufacturers give powerline users a way to enrypt the signals between the devices... then others can't eavesdrop by simply capturing the signal; they would still have to decrypt it.
0
 

Author Closing Comment

by:Tomster2
ID: 39789758
Thanks for your replies.
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question