Feeds
80%
Belkin Powerline HD

Belkin Powerline HD Gigabit mains Ethernet adaptor

High-speed networking through a three-pin plug?

  • alert
  • submit to reddit

High performance access to file storage

Belkin supplies the Gigabit Powerline HD in pairs, and we used the two of them to bridge an upstairs router-cum-Nas-box and a laptop downstairs. Both laptop and router have Gigabit Ethernet ports. Afterwards, we swapped the Belkin boxes for the pair of Devolo dLAN 200Mb/s adaptors that we use to link the router to a media player we have connected to our TV.

Now, the Devolos both usually sit on distribution boards, one to split the power from a single mains socket so we can drive said media player and a Freeview DVR. The upstairs distribution board has the router and the cable modem dangling off it as well as the powerline adaptor.

Belkin Powerline HD

Make sure you leave room for the Ethernet cable

HomePlug supporters used to say that it's best not to do this, but with the AV standard it generally doesn't matter. Indeed, with the Devolo boxes we get effectively the same speed however we connect the adaptors to the mains.

Each Belkin adaptor has a powerline link LED that glows blue when you have a good mains connection, purple when it's so-so and red when the link is poor. When we swapped Devolo for Belkin, all we got were red lights, and we found performance was down to HomePlug AV level. If anything, the connection was slower than the one we got with the Devolos.

We tried a number of mains sockets downstairs and this time got purple lights, but saw no appreciable increase in data transfer speed. For our testing, we timed copying the same 1.41GB file from the router's integrated Sata hard drive to the laptop. We took the adaptor upstairs and finally got a blue powerline light, but again not real improvement in throughput.

Belkin warns against connecting the Powerline HDs to distribution boards, but, as we say, we've never had cause to take this seriously. Until now. Gigle's Gigabit channel is far less resilient in this respect than slower HomePlug and UPA boxes. We pulled the router-connected adaptor from the board and plugged it into a wall socket instead. Immediately, we saw a clear increase in performance.

High performance access to file storage

Next page: Verdict

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.