Browse Definitions :
Definition

X10 protocol

The X10 protocol is a communication methodology for home automation device control. X10 was developed in 1975 by Pico Electronics. X10 modules and the protocol represented the first general purpose product for home automation.

Primarily a wired and wireless protocol, X10 allows home automation devices to communicate through power lines. As an automation protocol X10 enables control of devices such as:

  • Light switches
  • Thermostats
  • Remote controls
  • Leak sensors
  • Pumps
  • Motion sensors
  • Alarms
  • Home Audio

X10 uses separate transceiver units that receive signals from controllers (panels and remotes) and appliance control units that the controlled device is plugged into. Appliance control modules are then plugged into the electrical receptacle (AKA outlet) or lamp socket in some cases. The home's existing electrical wiring or radio frequencies are used to carry the signals that automate home appliance operation.  An example of a home automation action that X10 might manage: When one turns on the lights in the entryway, the heating and cooling might be taken off power-saving mode.

The protocol enables advanced control through attached computers. Control applications are available for Microsoft Windows, Apple's Macintosh, Linux and FreeBSD operating systems.

X10 is one of the oldest automation protocols; as such it doesn’t have the bandwidth of others. However, it remains a working and more commonly-used protocol. Widespread availability and the fact that many don’t feel a need to upgrade an existing home automation system mean this protocol remains one of the most used in deployed home automation setups. Competing technologies include INSTEON, THREAD, ZigBee, Z-Wave, and Bluetooth LE.

This was last updated in November 2017

Continue Reading About X10 protocol

SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

Close