pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Phone-line Networks

Phoneline networking takes advantage of unused transmission capacity to transmit data over existing telephone wires. They transmit information at frequencies well above that of plain old telephone service (POTS) or digital services like ISDN and DSL, so the network does not interfere with the normal use of the phone line for voice, fax or Internet services running over the same telephone circuit. Nor do these other phoneline services affect network data transmission quality.

Phoneline

The technology used to divide up shared bandwidth is frequency division multiplexing (FDM). This well-established technique divides up the total bandwidth into different frequency bands, called channels, using frequency-selective filters. Each of the different types of traffic – power, analogue voice and digital information (including data, audio and video) – use different channels.

The initial Home Phoneline Networking Alliance (HomePNA) specification – released in the autumn of 1998 – adopted the IEEE 802.3 media access method, essentially delivering 1 Mbit/s Ethernet over phone lines. The subsequent HomePNA 2.0 specification – finalised in late 1999 – takes advantage of digital signal processing (DSP) technology embedded in silicon to offer consistently higher performance, better adapt to poor line conditions by continuously boosting signal strength and improve filtering of noise (interference) from nearby appliances. HomePNA 2.0- based products can support transfer speeds of up to 10 Mbit/s, ten times faster than HomePNA 1.0- based products.

In a typical home phoneline network internal or external network adapters are installed in each PC, which are plugged into a nearby phone jack. Printers or other peripherals – including simultaneous access to the Internet via a single 56 Kbit/s analogue, ISDN, cable or DSL modem – can then be shared through a connected PC.

Phoneline networking works best in homes where the computers are located in different rooms near phone jacks on the same circuit – that is, using the same telephone number. The fact that each home has a unique phone circuit from the telephone company’s central office ensures a high level of network security.

Filed Under: Networking

Latest Articles

How to publicise your website

Sometimes, a website can explode from nowhere with absolutely no publicity, but it will catch a mood and suddenly be pulling millions of visitors. The story of Mahir and the I Kiss You phenomenon is possibly the best-known example of this. However, there are billions of pages out there, millions of … [Read More...]

Motherboard Upgrade Reasons

A motherboard is the backbone of a PC system, connecting all its various components and peripherals and influencing your choice of precisely what these might be. It is, of critical importance both in terms of system performance and connectivity. It follows, therefore, that there are … [Read More...]

New Software Breakthroughs Leverage Benefits of Online Lending

Each of us faces the urgent need to get relatively small but at the same time quite a serious amount of money. And then you have to choose whether to abandon the plan or borrow some money. You can receive it from friends or acquaintances, but they may not have the right amount available. … [Read More...]

Revolutionize Your Internet Experience with Orbi 960 – The Ultimate WiFi System

In a world where seamless connectivity is essential, slow and unreliable internet connections are a major problem. Whether you are running a business, … [Read More...]

Do You Need a VPN When Trading Cryptocurrency?

There’s no doubt that the biggest global industries in 2023 are tech-driven, while there remains a significant crossover between many of these … [Read More...]

Goodbye Bitcoin: the 3 alternative cryptocurrencies that have great upside potential, according to experts

Bitcoin has been a very lucrative investment for people that got into it early. One report from The Motley Fool pointed out that $10 of bitcoin … [Read More...]

Self-driving cars face their Achilles’ heel and may be targets of hackers

The market for self-driving cars is booming. Customers spent $22.22 billion on these autonomous vehicles in 2021 and they will likely spend more in … [Read More...]

How to avoid scams with bitcoin and other cryptocurrencies

Cryptocurrencies got a bad reputation when scams multiplied like ants on a piece of cake. Even today many people associate bitcoin and other … [Read More...]

WHAT IS CLOUD COMPUTING AND WHAT ARE ITS MAIN BENEFITS?

Users are Increasingly using cloud computing to store their information, which is replacing local storage. The business digitization process goes … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Don’t Jailbreak Your iPad Until You Read This

People have been jailbreaking iOS devices for quite some time in an attempt to make them more useful for their specific needs. Sometimes, they find … [Read More...]

Kaspersky Anti-Virus 2015 Review

Pros : Easy to use interface. Scores high in independent labs in the area of detection and anti-virus protection. Comes with a rescue disk feature … [Read More...]

Eliminating Search.strtpoint.com Browser Hijacker From Your Computer

One of the most intriguing but very antagonistic malware programs recently created is the search.strtpoint.com. From its name itself, you would smell … [Read More...]

[footer_backtotop]

Copyright © 2023 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors