pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Power-line Networks

Powerline networking is another technology to take advantage of unused bandwidth on an existing system of home circuitry. It operates similarly to a phoneline network. Internal or external network adapters are installed in each PC, which are plugged into a nearby power outlet. Printers or other peripherals can be shared through a connected PC, a modem of some sort providing the shared Internet connection.

Powerline technologies use a variety of media access methods, from CSMA/CD and token passing to datagram sensing multiple access (DSMA) and centralised token passing (CTP). DSMA acts much like Ethernet to mediate multiple access contentions on the wire, by sensing and randomly backing off if traffic is detected. In some powerline home network implementations, once a network device has gained access, it switches to a dynamic, centrally distributed, token passing scheme so that it has control of the network until it finishes transmission. This dual method reduces the incidence of transmission collisions while preserving limited bandwidth.

Powerline technology also employs a modulation technology called frequency shift keying (FSK) to send digital signals over the powerline. FSK uses two or more separate frequencies in narrow band; one is designated 1 the other 0 for binary transmission.

Powerline networking boasts many of the same benefits as phoneline networking. However, some powerline networks are not as fast as other networking choices. Powerlines tend to be very noisy and consequently slower (compared to phonelines). Bandwidth speed tops out at much less than 1 Mbit/s: rates typically range from 50 Kbit/s to 350 Kbit/s.

Powerline networking works best in homes where the computers are located in different rooms near power outlets, but on the same circuit. There are potential security issues, however, due to the way power is distributed. A single power line from the utility company goes to multiple homes; a power meter at each house measures actual usage. Like an old party telephone line, anyone can potentially listen in on the shared bandwidth. A powerline network relies on encryption, or data scrambling, to prevent others from accessing the data running over the home network.

Because of these limitations, powerline home networking is not expected to be as viable an option as competing home networking technologies. The expectation is that it is more likely be deployed in home automation and home security applications.

Filed Under: Networking

Latest Articles

driver reviver box

Driver Reviver Review

Driver Reviver is a very easy to use Drivers update program. It is capable of updating outdated drivers on your computer as well as missing drivers. PROS: Super easy to user. Minimal knowledge is needed to work the program. Many great default setting like system restore, backup of old drivers … [Read More...]

Technical guide to the Intel Penryn Core 2 Processor

The Penryn CPU is another in Intel's line of Core 2 processors and the first fabricated using its 45nm die technology. The processors replace the 'Merom' range of processors, the and dual- and quad-core versions catering for the differing requirements of consumer machines. The Penryn is … [Read More...]

9 More Great Microsoft Word Hacks to Boost Productivity

We mentioned a few great Microsoft Word hacks in our last post. We wanted to follow up and share some more that can help improve productivity. Continue where you were Microsoft Word remembers where you left off when viewing and editing a document, and you can easily return to that place by … [Read More...]

Why Cross-Chain Trading Is the Future of Crypto Investing?

The rapid growth and evolution of the cryptocurrency market have opened up exciting opportunities for investors. Within this dynamic landscape, … [Read More...]

Revolutionize Your Internet Experience with Orbi 960 – The Ultimate WiFi System

In a world where seamless connectivity is essential, slow and unreliable internet connections are a major problem. Whether you are running a business, … [Read More...]

Do You Need a VPN When Trading Cryptocurrency?

There’s no doubt that the biggest global industries in 2023 are tech-driven, while there remains a significant crossover between many of these … [Read More...]

Goodbye Bitcoin: the 3 alternative cryptocurrencies that have great upside potential, according to experts

Bitcoin has been a very lucrative investment for people that got into it early. One report from The Motley Fool pointed out that $10 of bitcoin … [Read More...]

Self-driving cars face their Achilles’ heel and may be targets of hackers

The market for self-driving cars is booming. Customers spent $22.22 billion on these autonomous vehicles in 2021 and they will likely spend more in … [Read More...]

How to avoid scams with bitcoin and other cryptocurrencies

Cryptocurrencies got a bad reputation when scams multiplied like ants on a piece of cake. Even today many people associate bitcoin and other … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Inkjet Color Perception

Visible light falls between 380nm (violet) and 780nm (red) on the electromagnetic spectrum, sandwiched between ultraviolet … [Read More...]

DVD DivX Codec

DIVX is essentially a limited-use, pay-per-view DVD technology. Marketed as a more affordable DVD format - with the … [Read More...]

Goodbye Bitcoin: the 3 alternative cryptocurrencies that have great upside potential, according to experts

Bitcoin has been a very lucrative investment for people that got into it early. One report from The Motley Fool pointed out that $10 of bitcoin … [Read More...]

[footer_backtotop]

Copyright © 2023 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors