Solved

Where does powerline networking end?

Posted on 2014-01-02
3
216 Views
Last Modified: 2014-01-17
Powerline adapters are popular as solutions to wifi range issues in homes... but where does the powerline network access end?

For example, when using them in a single family home with its own electrical panel, is the network accessible beyond the panel... e.g. next door.

I know you can encrypt the signals, but still wondering what the exposure is once you start using these devices in a home.

Thanks for any info or direction anyone can provide.

Tomster2
0
Comment
Question by:Tomster2
3 Comments
 
LVL 18

Assisted Solution

by:Jeremy Weisinger
Jeremy Weisinger earned 250 total points
ID: 39752621
It gets pretty noisy but it is possible that your neighbor could see some traffic with the right equipment. If you have a surge suppressor or power conditioner between the adapter and your neighbor, they won't be able to pick anything up.

Since it's not likely that you'll have that the best thing to do is use the encryption.
0
 
LVL 44

Accepted Solution

by:
Darr247 earned 250 total points
ID: 39752629
It generally ends at the transformer that steps down the voltage from transmission to user levels... the length of the wires that make up the windings inside the transformer exceed the distance the powerline signals can travel without a boost) so if you share a transformer with your neighbor[s] (and most homes do, in urban areas; but homes out in the country, and commercial buildings, generally do not share a transformer).  That's why the manufacturers give powerline users a way to enrypt the signals between the devices... then others can't eavesdrop by simply capturing the signal; they would still have to decrypt it.
0
 

Author Closing Comment

by:Tomster2
ID: 39789758
Thanks for your replies.
0

Featured Post

Get up to 2TB FREE CLOUD per backup license!

An exclusive Black Friday offer just for Expert Exchange audience! Buy any of our top-rated backup solutions & get up to 2TB free cloud per system! Perform local & cloud backup in the same step, and restore instantly—anytime, anywhere. Grab this deal now before it disappears!

Join & Write a Comment

I'm a big fan of Windows' offline folder caching and have used it on my laptops for over a decade.  One thing I don't like about it, however, is how difficult Microsoft has made it for the cache to be moved out of the Windows folder.  Here's how to …
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now