Browse Definitions :
Definition

INSTEON protocol

INSTEON is a communication language for home automation device control. INSTEON and its protocol were released in 2005 by Smartlabs.

INSTEON allows home automation devices to communicate through power lines, radio frequencies or a combination of both. INSTEON enables communication between devices such as:

  • Light switches
  • Thermostats
  • Home audio
  • Remote controls
  • Leak sensors
  • Pumps
  • Motion sensors
  • Alarms

Through the INSTEON protocol, a dual-mesh network is formed where every device transmits, receives and repeats messages. When a message is received, it is checked for errors and corrects any that are found. INSTEON also uses hubs to program complex actions and respond to voice input using Amazon Echo. The protocol has native clients to support mobile devices for iOS, watchOS, Android and Windows phones.

Apps for INSTEON enable local and remote control. The apps also enable remote home monitoring. An example of a home automation action INSTEON might perform would be when one turns on the TV, the home theater system components would also turn on.

Like many other home automation protocols, INSTEON is associated with the Internet of Things (IoT). Competing technologies include X10, THREAD, ZigBee, Z-Wave and Bluetooth LE.

This was last updated in November 2017

Continue Reading About INSTEON protocol

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • dropout

    Dropout refers to data, or noise, that's intentionally dropped from a neural network to improve processing and time to results.

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

Close