SlideShare a Scribd company logo
1 of 5
MMS Multimedia Messaging Service
Abbreviated as MMS, Multimedia Messages Services is a fairly straight forward method of sending graphics, video clips, sound files and short text messages over wireless networks.  The most common use of MMS is for communication between mobile phones.
MMS also supports email so the device can send emails directly to an email address. However, MMS is not the same as emails. MMS is based on the concept of multimedia messaging. MMS does not support attachments like an email does.  Images could be downloaded from WAP (Wireless Application Protocol) sites, selected from a menu within the phone, or could even be photos taken using a camera if the phone has one.
MMS is an extension of the SMS protocol. An MMS message is a single entity, not a collection of attachments. One of the main practical differences between MMS and SMS is that whilst SMS messages are limited to 160 bytes, an MMS message has no size limit and could be many Kilobytes in size. MMS requires a third generation (3G) network to enable large messages to be sent, although smaller messages can be sent even with second generation networks using GPRS (General Packet Radio Service).
Private use Companies may use MMS to send promotions as images and files to customers. They may use it to send emails to clients and customers. Public use We use MMS to send images, videos, emails and attachments to people.

More Related Content

What's hot (8)

Building SMS Applications with Ruby-SMPP
Building SMS Applications with Ruby-SMPPBuilding SMS Applications with Ruby-SMPP
Building SMS Applications with Ruby-SMPP
 
SMS
SMSSMS
SMS
 
SMS-SMPP-Concepts
SMS-SMPP-ConceptsSMS-SMPP-Concepts
SMS-SMPP-Concepts
 
Introduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & GatewaysIntroduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & Gateways
 
Mobile Messaging - Part 5 - Mms Arch And Transactions
Mobile Messaging  - Part 5 - Mms Arch And TransactionsMobile Messaging  - Part 5 - Mms Arch And Transactions
Mobile Messaging - Part 5 - Mms Arch And Transactions
 
Gsm short message service
Gsm short message serviceGsm short message service
Gsm short message service
 
Mts I Ndia
Mts I NdiaMts I Ndia
Mts I Ndia
 
Sms
Sms Sms
Sms
 

Similar to Mms

Sms gateway www.shortcodes.com
Sms gateway www.shortcodes.comSms gateway www.shortcodes.com
Sms gateway www.shortcodes.com
tomsowellfirst
 
Digital communication protocols, methods and devices
Digital communication protocols, methods and devicesDigital communication protocols, methods and devices
Digital communication protocols, methods and devices
sims1uni
 
Mobile communication cdr
Mobile communication cdrMobile communication cdr
Mobile communication cdr
Vivek Paripudi
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
Roopa slideshare
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
Bhavanislide2
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
Roopa slideshare
 
Digital communications methods and types (assignment 1)
Digital communications   methods and types (assignment 1)Digital communications   methods and types (assignment 1)
Digital communications methods and types (assignment 1)
Louise Reed
 
Digital Communication Protocols, Methods and Devices
Digital Communication Protocols, Methods and DevicesDigital Communication Protocols, Methods and Devices
Digital Communication Protocols, Methods and Devices
_kevininmoscow
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
Roopa slideshare
 

Similar to Mms (20)

Sms gateway www.shortcodes.com
Sms gateway www.shortcodes.comSms gateway www.shortcodes.com
Sms gateway www.shortcodes.com
 
Mms
MmsMms
Mms
 
Assessment 1 digycoms
Assessment 1 digycomsAssessment 1 digycoms
Assessment 1 digycoms
 
Digital communication protocols, methods and devices
Digital communication protocols, methods and devicesDigital communication protocols, methods and devices
Digital communication protocols, methods and devices
 
Whats Whatsapp all about? Find out
Whats Whatsapp all about? Find outWhats Whatsapp all about? Find out
Whats Whatsapp all about? Find out
 
Mobile communication cdr
Mobile communication cdrMobile communication cdr
Mobile communication cdr
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
 
Sms (A strange way of communication)
Sms (A strange way of communication)Sms (A strange way of communication)
Sms (A strange way of communication)
 
Digital communications methods and types (assignment 1)
Digital communications   methods and types (assignment 1)Digital communications   methods and types (assignment 1)
Digital communications methods and types (assignment 1)
 
Presentation
PresentationPresentation
Presentation
 
A brief on sms ,mms bluetooth
A brief on sms ,mms bluetoothA brief on sms ,mms bluetooth
A brief on sms ,mms bluetooth
 
Sms2
Sms2Sms2
Sms2
 
Digital Communication Protocols, Methods and Devices
Digital Communication Protocols, Methods and DevicesDigital Communication Protocols, Methods and Devices
Digital Communication Protocols, Methods and Devices
 
Assignment one presentation
Assignment one presentation Assignment one presentation
Assignment one presentation
 
How Cell Phones Work
How Cell Phones WorkHow Cell Phones Work
How Cell Phones Work
 
Hybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMSHybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMS
 
MMS Marketing
MMS MarketingMMS Marketing
MMS Marketing
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Mms

  • 2. Abbreviated as MMS, Multimedia Messages Services is a fairly straight forward method of sending graphics, video clips, sound files and short text messages over wireless networks. The most common use of MMS is for communication between mobile phones.
  • 3. MMS also supports email so the device can send emails directly to an email address. However, MMS is not the same as emails. MMS is based on the concept of multimedia messaging. MMS does not support attachments like an email does. Images could be downloaded from WAP (Wireless Application Protocol) sites, selected from a menu within the phone, or could even be photos taken using a camera if the phone has one.
  • 4. MMS is an extension of the SMS protocol. An MMS message is a single entity, not a collection of attachments. One of the main practical differences between MMS and SMS is that whilst SMS messages are limited to 160 bytes, an MMS message has no size limit and could be many Kilobytes in size. MMS requires a third generation (3G) network to enable large messages to be sent, although smaller messages can be sent even with second generation networks using GPRS (General Packet Radio Service).
  • 5. Private use Companies may use MMS to send promotions as images and files to customers. They may use it to send emails to clients and customers. Public use We use MMS to send images, videos, emails and attachments to people.