pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Power-line Networks

Powerline networking is another technology to take advantage of unused bandwidth on an existing system of home circuitry. It operates similarly to a phoneline network. Internal or external network adapters are installed in each PC, which are plugged into a nearby power outlet. Printers or other peripherals can be shared through a connected PC, a modem of some sort providing the shared Internet connection.

Powerline technologies use a variety of media access methods, from CSMA/CD and token passing to datagram sensing multiple access (DSMA) and centralised token passing (CTP). DSMA acts much like Ethernet to mediate multiple access contentions on the wire, by sensing and randomly backing off if traffic is detected. In some powerline home network implementations, once a network device has gained access, it switches to a dynamic, centrally distributed, token passing scheme so that it has control of the network until it finishes transmission. This dual method reduces the incidence of transmission collisions while preserving limited bandwidth.

Powerline technology also employs a modulation technology called frequency shift keying (FSK) to send digital signals over the powerline. FSK uses two or more separate frequencies in narrow band; one is designated 1 the other 0 for binary transmission.

Powerline networking boasts many of the same benefits as phoneline networking. However, some powerline networks are not as fast as other networking choices. Powerlines tend to be very noisy and consequently slower (compared to phonelines). Bandwidth speed tops out at much less than 1 Mbit/s: rates typically range from 50 Kbit/s to 350 Kbit/s.

Powerline networking works best in homes where the computers are located in different rooms near power outlets, but on the same circuit. There are potential security issues, however, due to the way power is distributed. A single power line from the utility company goes to multiple homes; a power meter at each house measures actual usage. Like an old party telephone line, anyone can potentially listen in on the shared bandwidth. A powerline network relies on encryption, or data scrambling, to prevent others from accessing the data running over the home network.

Because of these limitations, powerline home networking is not expected to be as viable an option as competing home networking technologies. The expectation is that it is more likely be deployed in home automation and home security applications.

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related

Filed Under: Networking

Latest Articles

Intel CoreSolo

Intel Core Solo uses the same two core die as the Core Duo, but features only one active core. There remains a high demand for single-core mobile processors, and it is more economic for Intel to disable one of the cores of the existing dual-core design than to launch a new production line of … [Read More...]

Windows Secure Workstation

Windows Secure Workstation Welcome again to another weekly installment of our infection removal guide. If you've made your way to this page, you've probably been infected with Windows Secure Workstation. Infections of this type, while somewhat less than dangerous, do their their work … [Read More...]

Redirecting Browser: Protalsepeti.com Virus

The Portalsepeti.com virus usually presents users with a search bar that can deliver a quick online search. This is also a popular website, which can be used as a user starting page as your internet browser. Although, Portalsepeti.com is a legit website and not related to computer malware or a … [Read More...]

The Impact of Modern Technology on Relationships

Technology has changed dating in tremendous ways. It has gradually become more immersed in the modern quest for intimacy. In 1995, only 2% of … [Read More...]

Benefits of Instagram as a Powerful Marketing Tool for B2B Brands

The ever-growing popularity of the social networking app Instagram makes it a popular channel for businesses to launch their services, advertising, … [Read More...]

6 Simple Ways to Improve Security of Windows Computers

Millions of Windows PC users experience some form of cybercrime every year. According to one study, there were 2,953 reported cyberattacks between … [Read More...]

2021 PC Hardware Releases to Bolster Your Gaming

If you are a PC gamer, then chances are you are looking to upgrade your kit over the coming year. However, a lot of money can go into building the … [Read More...]

New Transfer Feature in Dropbox Enable Sharing files with Third Parties

Dropbox has been a popular P2P sharing platform for many years. They don't announce new features as often as other applications, since they have a … [Read More...]

Ransomware Operators Find Data Theft Profitable

How valuable is your data? That’s not a question that organizations or individuals have to ask themselves all that often. You might know the market … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Guide to Deciphering Hard Drive Error Messages

Hard disk errors can cause immense damage. But you can take precautions and, if in doubt, correct them - if you notice. We explain what you can do to … [Read More...]

Stellar Phoenix Access Recovery Review

       Stellar Phoenix Access Recovery Review Stellar Phoenix Access Recovery is a great product. There aren't a lot of other products out there … [Read More...]

The PC Technology Guide’s Contributing Authors

A number of authors have contributed to the PCTechGuide. If you have the skill and knowledge and would like to be considered as an author for the PC … [Read More...]

[footer_backtotop]

Copyright © 2021 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors