SlideShare a Scribd company logo
1 of 5
MMS Multimedia Messaging Service
Abbreviated as MMS, Multimedia Messages Services is a fairly straight forward method of sending graphics, video clips, sound files and short text messages over wireless networks.  The most common use of MMS is for communication between mobile phones.
MMS also supports email so the device can send emails directly to an email address. However, MMS is not the same as emails. MMS is based on the concept of multimedia messaging. MMS does not support attachments like an email does.  Images could be downloaded from WAP (Wireless Application Protocol) sites, selected from a menu within the phone, or could even be photos taken using a camera if the phone has one.
MMS is an extension of the SMS protocol. An MMS message is a single entity, not a collection of attachments. One of the main practical differences between MMS and SMS is that whilst SMS messages are limited to 160 bytes, an MMS message has no size limit and could be many Kilobytes in size. MMS requires a third generation (3G) network to enable large messages to be sent, although smaller messages can be sent even with second generation networks using GPRS (General Packet Radio Service).
Private use Companies may use MMS to send promotions as images and files to customers. They may use it to send emails to clients and customers. Public use We use MMS to send images, videos, emails and attachments to people.

More Related Content

What's hot

Building SMS Applications with Ruby-SMPP
Building SMS Applications with Ruby-SMPPBuilding SMS Applications with Ruby-SMPP
Building SMS Applications with Ruby-SMPPAbhishek Parolkar
 
SMS-SMPP-Concepts
SMS-SMPP-ConceptsSMS-SMPP-Concepts
SMS-SMPP-ConceptsDuy Do Phan
 
Introduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & GatewaysIntroduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & Gatewaystawi123
 
Mobile Messaging - Part 5 - Mms Arch And Transactions
Mobile Messaging  - Part 5 - Mms Arch And TransactionsMobile Messaging  - Part 5 - Mms Arch And Transactions
Mobile Messaging - Part 5 - Mms Arch And TransactionsGwenaël Le Bodic
 
Gsm short message service
Gsm short message serviceGsm short message service
Gsm short message servicePartha Bhunia
 

What's hot (8)

Building SMS Applications with Ruby-SMPP
Building SMS Applications with Ruby-SMPPBuilding SMS Applications with Ruby-SMPP
Building SMS Applications with Ruby-SMPP
 
SMS
SMSSMS
SMS
 
SMS-SMPP-Concepts
SMS-SMPP-ConceptsSMS-SMPP-Concepts
SMS-SMPP-Concepts
 
Introduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & GatewaysIntroduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & Gateways
 
Mobile Messaging - Part 5 - Mms Arch And Transactions
Mobile Messaging  - Part 5 - Mms Arch And TransactionsMobile Messaging  - Part 5 - Mms Arch And Transactions
Mobile Messaging - Part 5 - Mms Arch And Transactions
 
Gsm short message service
Gsm short message serviceGsm short message service
Gsm short message service
 
Mts I Ndia
Mts I NdiaMts I Ndia
Mts I Ndia
 
Sms
Sms Sms
Sms
 

Similar to MMS: Send Graphics, Video & More via Mobile

Sms gateway www.shortcodes.com
Sms gateway www.shortcodes.comSms gateway www.shortcodes.com
Sms gateway www.shortcodes.comtomsowellfirst
 
Assessment 1 digycoms
Assessment 1 digycomsAssessment 1 digycoms
Assessment 1 digycomsJonah Ford
 
Digital communication protocols, methods and devices
Digital communication protocols, methods and devicesDigital communication protocols, methods and devices
Digital communication protocols, methods and devicessims1uni
 
Whats Whatsapp all about? Find out
Whats Whatsapp all about? Find outWhats Whatsapp all about? Find out
Whats Whatsapp all about? Find outPrayukth K V
 
Mobile communication cdr
Mobile communication cdrMobile communication cdr
Mobile communication cdrVivek Paripudi
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdfRoopa slideshare
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdfBhavanislide2
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdfRoopa slideshare
 
Sms (A strange way of communication)
Sms (A strange way of communication)Sms (A strange way of communication)
Sms (A strange way of communication)Saira Randhawa
 
Digital communications methods and types (assignment 1)
Digital communications   methods and types (assignment 1)Digital communications   methods and types (assignment 1)
Digital communications methods and types (assignment 1)Louise Reed
 
A brief on sms ,mms bluetooth
A brief on sms ,mms bluetoothA brief on sms ,mms bluetooth
A brief on sms ,mms bluetoothKrishna M N
 
Digital Communication Protocols, Methods and Devices
Digital Communication Protocols, Methods and DevicesDigital Communication Protocols, Methods and Devices
Digital Communication Protocols, Methods and Devices_kevininmoscow
 
Assignment one presentation
Assignment one presentation Assignment one presentation
Assignment one presentation Louise Reed
 
How Cell Phones Work
How Cell Phones WorkHow Cell Phones Work
How Cell Phones Workalexfchs2007
 
Hybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMSHybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMSCSCJournals
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdfRoopa slideshare
 

Similar to MMS: Send Graphics, Video & More via Mobile (20)

Sms gateway www.shortcodes.com
Sms gateway www.shortcodes.comSms gateway www.shortcodes.com
Sms gateway www.shortcodes.com
 
Mms
MmsMms
Mms
 
Assessment 1 digycoms
Assessment 1 digycomsAssessment 1 digycoms
Assessment 1 digycoms
 
Digital communication protocols, methods and devices
Digital communication protocols, methods and devicesDigital communication protocols, methods and devices
Digital communication protocols, methods and devices
 
Whats Whatsapp all about? Find out
Whats Whatsapp all about? Find outWhats Whatsapp all about? Find out
Whats Whatsapp all about? Find out
 
Mobile communication cdr
Mobile communication cdrMobile communication cdr
Mobile communication cdr
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
 
Sms (A strange way of communication)
Sms (A strange way of communication)Sms (A strange way of communication)
Sms (A strange way of communication)
 
Digital communications methods and types (assignment 1)
Digital communications   methods and types (assignment 1)Digital communications   methods and types (assignment 1)
Digital communications methods and types (assignment 1)
 
Presentation
PresentationPresentation
Presentation
 
A brief on sms ,mms bluetooth
A brief on sms ,mms bluetoothA brief on sms ,mms bluetooth
A brief on sms ,mms bluetooth
 
Sms2
Sms2Sms2
Sms2
 
Digital Communication Protocols, Methods and Devices
Digital Communication Protocols, Methods and DevicesDigital Communication Protocols, Methods and Devices
Digital Communication Protocols, Methods and Devices
 
Assignment one presentation
Assignment one presentation Assignment one presentation
Assignment one presentation
 
How Cell Phones Work
How Cell Phones WorkHow Cell Phones Work
How Cell Phones Work
 
Hybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMSHybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMS
 
MMS Marketing
MMS MarketingMMS Marketing
MMS Marketing
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
 

Recently uploaded

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

MMS: Send Graphics, Video & More via Mobile

  • 2. Abbreviated as MMS, Multimedia Messages Services is a fairly straight forward method of sending graphics, video clips, sound files and short text messages over wireless networks. The most common use of MMS is for communication between mobile phones.
  • 3. MMS also supports email so the device can send emails directly to an email address. However, MMS is not the same as emails. MMS is based on the concept of multimedia messaging. MMS does not support attachments like an email does. Images could be downloaded from WAP (Wireless Application Protocol) sites, selected from a menu within the phone, or could even be photos taken using a camera if the phone has one.
  • 4. MMS is an extension of the SMS protocol. An MMS message is a single entity, not a collection of attachments. One of the main practical differences between MMS and SMS is that whilst SMS messages are limited to 160 bytes, an MMS message has no size limit and could be many Kilobytes in size. MMS requires a third generation (3G) network to enable large messages to be sent, although smaller messages can be sent even with second generation networks using GPRS (General Packet Radio Service).
  • 5. Private use Companies may use MMS to send promotions as images and files to customers. They may use it to send emails to clients and customers. Public use We use MMS to send images, videos, emails and attachments to people.