Solved

Where does powerline networking end?

Posted on 2014-01-02
3
229 Views
Last Modified: 2014-01-17
Powerline adapters are popular as solutions to wifi range issues in homes... but where does the powerline network access end?

For example, when using them in a single family home with its own electrical panel, is the network accessible beyond the panel... e.g. next door.

I know you can encrypt the signals, but still wondering what the exposure is once you start using these devices in a home.

Thanks for any info or direction anyone can provide.

Tomster2
0
Comment
Question by:Tomster2
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 18

Assisted Solution

by:Jeremy Weisinger
Jeremy Weisinger earned 250 total points
ID: 39752621
It gets pretty noisy but it is possible that your neighbor could see some traffic with the right equipment. If you have a surge suppressor or power conditioner between the adapter and your neighbor, they won't be able to pick anything up.

Since it's not likely that you'll have that the best thing to do is use the encryption.
0
 
LVL 44

Accepted Solution

by:
Darr247 earned 250 total points
ID: 39752629
It generally ends at the transformer that steps down the voltage from transmission to user levels... the length of the wires that make up the windings inside the transformer exceed the distance the powerline signals can travel without a boost) so if you share a transformer with your neighbor[s] (and most homes do, in urban areas; but homes out in the country, and commercial buildings, generally do not share a transformer).  That's why the manufacturers give powerline users a way to enrypt the signals between the devices... then others can't eavesdrop by simply capturing the signal; they would still have to decrypt it.
0
 

Author Closing Comment

by:Tomster2
ID: 39789758
Thanks for your replies.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question