Browse Definitions :
Definition

X10 protocol

Contributor(s): Matthew Haughn

The X10 protocol is a communication methodology for home automation device control. X10 was developed in 1975 by Pico Electronics. X10 modules and the protocol represented the first general purpose product for home automation.

Primarily a wired and wireless protocol, X10 allows home automation devices to communicate through power lines. As an automation protocol X10 enables control of devices such as:

  • Light switches
  • Thermostats
  • Remote controls
  • Leak sensors
  • Pumps
  • Motion sensors
  • Alarms
  • Home Audio

X10 uses separate transceiver units that receive signals from controllers (panels and remotes) and appliance control units that the controlled device is plugged into. Appliance control modules are then plugged into the electrical receptacle (AKA outlet) or lamp socket in some cases. The home's existing electrical wiring or radio frequencies are used to carry the signals that automate home appliance operation.  An example of a home automation action that X10 might manage: When one turns on the lights in the entryway, the heating and cooling might be taken off power-saving mode.

The protocol enables advanced control through attached computers. Control applications are available for Microsoft Windows, Apple's Macintosh, Linux and FreeBSD operating systems.

X10 is one of the oldest automation protocols; as such it doesn’t have the bandwidth of others. However, it remains a working and more commonly-used protocol. Widespread availability and the fact that many don’t feel a need to upgrade an existing home automation system mean this protocol remains one of the most used in deployed home automation setups. Competing technologies include INSTEON, THREAD, ZigBee, Z-Wave, and Bluetooth LE.

This was last updated in November 2017

Continue Reading About X10 protocol

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • endpoint detection and response (EDR)

    Endpoint detection and response (EDR) is a category of tools and technology used for protecting computer hardware devices–called ...

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits an end user to enter one set of login credentials ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

  • disk mirroring (RAID 1)

    RAID 1 is one of the most common RAID levels and the most reliable. Data is written to two places simultaneously, so if one disk ...

  • RAID controller

    A RAID controller is a hardware device or software program used to manage hard disk drives (HDDs) or solid-state drives (SSDs) in...

Close