Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Where does powerline networking end?

Posted on 2014-01-02
3
Medium Priority
?
238 Views
Last Modified: 2014-01-17
Powerline adapters are popular as solutions to wifi range issues in homes... but where does the powerline network access end?

For example, when using them in a single family home with its own electrical panel, is the network accessible beyond the panel... e.g. next door.

I know you can encrypt the signals, but still wondering what the exposure is once you start using these devices in a home.

Thanks for any info or direction anyone can provide.

Tomster2
0
Comment
Question by:Tomster2
3 Comments
 
LVL 22

Assisted Solution

by:Jeremy Weisinger
Jeremy Weisinger earned 1000 total points
ID: 39752621
It gets pretty noisy but it is possible that your neighbor could see some traffic with the right equipment. If you have a surge suppressor or power conditioner between the adapter and your neighbor, they won't be able to pick anything up.

Since it's not likely that you'll have that the best thing to do is use the encryption.
0
 
LVL 44

Accepted Solution

by:
Darr247 earned 1000 total points
ID: 39752629
It generally ends at the transformer that steps down the voltage from transmission to user levels... the length of the wires that make up the windings inside the transformer exceed the distance the powerline signals can travel without a boost) so if you share a transformer with your neighbor[s] (and most homes do, in urban areas; but homes out in the country, and commercial buildings, generally do not share a transformer).  That's why the manufacturers give powerline users a way to enrypt the signals between the devices... then others can't eavesdrop by simply capturing the signal; they would still have to decrypt it.
0
 

Author Closing Comment

by:Tomster2
ID: 39789758
Thanks for your replies.
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses

783 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question