SlideShare uma empresa Scribd logo
1 de 21
SMS & MMS
Technologies
Key Concepts
The Digital Wireless Telephony
comprise of two main working
technologies:
 GSM which stands for Global System
for Mobile Communication.
 CDMA which stands for Code Division
Multiple Access.
GSM Technology
More than 690 mobile networks provide GSM
services in more than 213 countries which
means in total 82.4% people globally uses
GSM mobile connections.
China being on the top followed by Russia,
India & USA.
GSM is a “ time division” system, thus
sometimes called as TDMA.
CDMA Technology
 Both GSM and CDMA are multiple access
technologies.
 CDMA employs spread-spectrum technology
and a special coding scheme (where each
transmitter is assigned a code).
 Spread spectrum is a form of wireless
communications in which the frequency of the
transmitted signal is deliberately varied. This
results in a much greater bandwidth than the
signal would have if its frequency were not
varied.
Difference between the two
 In CDMAs, there is one physical channel and a
special code for every device in the coverage
network. Using this code, the signal of the
device is multiplexed, and the same physical
channel is used to send the signal.
 In GSMs, every cell has a corresponding
network tower, which serves the mobile
phones in that cellular area which in turn
makes GSMs more accessible as they work on
multiple frequency bands
(850/900/1800/1900MHz).
 Network services in CDMAs are Handset-Specific
whereas in GSMs are SIM-Specific. User has option
to select handset of his choice.
 Frequency-time comparison:
SMS, what is it ?
 Short Message Service (SMS) is a text messaging
service component of phone, Web, or mobile
communication systems. It uses standardized
communication protocols to allow fixed-line or
mobile phone devices to exchange short text
messages.
 Short message service is a mechanism of delivery
of short messages over the mobile networks. It is
a store and forward way of transmitting
messages to and from mobiles.
How Does It Works ?
 The message (text only) from the sending mobile is stored in a
central short message center (SMC) which then forwards it to the
destination mobile. This means that in the case that the recipient is
not available, the short message is stored and can be sent later.
 Each short message can be no longer than 160 characters. These
characters can be text (alphanumeric) or binary Non-Text Short
messages. An interesting feature of SMS is return receipts. This
means that the sender, if wishes, can get a small message notifying
if the short message was delivered to the intended recipient.
 Since SMS used signaling channel as opposed to dedicated
channels, these messages can be sent/received simultaneously with
the voice/data/fax service over a GSM network.
 SMS supports national and international roaming. This means that
you can send short messages to any other GSM mobile user around
the world. With the PCS networks based on all the three
technologies, GSM, CDMA and TDMA supporting SMS, SMS is more or
less a universal mobile data service.
 SME - Short Message Entity
 SMC – Short Message Center
 GMSC – Gateway MSC
 MSC – Message Switching Center
 HLR – Home Location Register
 VLR – Visitor Location Register
 BSS – Base Station System
 The SME (Short Message Entity) which can be located in the fixed
network or a mobile station, receives and sends short messages.
 The SMC (Short Message Center) is the entity which does the job of
store and forward of messages to and from the mobile station.
 The GWMS (SMS gateway MSC) is a gateway MSC that can also
receive short messages. The gateway MSC is a mobile network’s
point of contact with other networks. On receiving the short
message from the short message center, GMSC uses the SS7
network to interrogate the current position of the mobile station
form the HLR, the home location register.
 HLR is the main database in a mobile network. It holds information
of the subscription profile of the mobile and also about the routing
information for the subscriber, i.e. the area (covered by a MSC)
where the mobile is currently situated. The GMSC is thus able to
pass on the message to the correct MSC.
 MSC (Mobile Switching Center) is the entity in a GSM network
which does the job of switching connections between mobile
stations or between mobile stations and the fixed network.
 A VLR (Visitor Location Register) corresponds to each MSC and
contains temporary information about the mobile, information
like mobile identification and the cell (or a group of cells) where
the mobile is currently situated.
 Using information form the VLR the MSC is able to switch the
information (short message) to the corresponding BSS (Base
Station System), which transmits the short message to the
mobile.
 The BSS consists of transceivers, which send and receive
information over the air interface, to and from the mobile
station.
 This information is passed over the signaling
channels so the mobile can receive messages
even if a voice or data call is going on.
Advantages & Disadvantages
 PROs :
1. You can send then any time – Day or Night.
2. Person you are sending it to do not have to have
their mobile phones switched on.
3. It can save time. Rather than interrupting them
with calls you can simply message them.
4. SMS are good for Informal messaging.
5. SMS is personal. It goes straight to the
recipient’s mobile phone. The message is
literally delivered directly into their hand.
 CONs :
1. Messages are plain vanilla in nature. You can only
send simple text messages. There is no scope for
any graphics or audio.
2. The messages are limited by size. An SMS message
can’t exceed 160 characters (70 Characters if
Arabic, Chinese languages are used).
3. Could not be used for Formal Messaging.
4. SMS need Basic Typing Skills.
5. Delivery Failure - Unfortunately with bulk SMS
marketing, service interruption occasionally
occurs. Thus results in delivery failure. SMS is
simply not as reliable as email yet, regardless of
the provider.
Okay ! Now on to MMS
 MMS Stands for Multimedia Messaging Service.
 It is a communications technology developed by
3GPP (Third Generation Partnership Project)
that allows users to exchange multimedia
communications between capable mobile phones
and other devices.
 To send or receive an MMS message, the phone
makes a GPRS connection (to a GPRS APN). It
then usually connects to the MMSC for
sending/receiving messages through a WAP
proxy/gateway.
 An extension to the Short Message Service, MMS defines a
way to send and receive, almost instantaneously, wireless
messages that include images, audio, and video clips in
addition to text.
 When the technology has been fully developed, it will
support the transmission of streaming video. A common
current application of MMS messaging is picture messaging
(the use of camera phones to take photos for immediate
delivery to a mobile recipient). Other possibilities include
animations and graphic presentations of stock quotes,
sports news, and weather reports.
 There are two important standards that define MMS
technology, one published by the 3GPP (3GPP TS 23.140),
and the other a series of MMS specifications published by
the Open Mobile Alliance (OMA). These two standard
bodies cooperate to define the MMS protocols.
Protocols Defined
 When MMS is discussed, We will often hear details of different MMS
related protocols, such as MM1, MM3, MM4, MM7.
 MM1 is the protocol that is used between a mobile device and the
MMSC Messaging Server. It defines how mobile phones send and
receive messages through the MMSC.
 MM3 is the protocol that is used between an MMSC and other
messaging systems. It is not so much a protocol, as much as a
definition of requirements for how an MMSC must be able to
interoperate with other messaging systems. In the real world, this
is primarily done via the SMTP e-mail protocol.
 MM4 is the protocol that is used to interconnect MMSCs. It is an
SMTP-based protocol with additional headers defined.
 MM7 is the protocol that is used to allow Value Added Service
Provider (VASP) applications to send and receive MMS messages via
an MMSC.
MMS is developed in two separate phases.
 Based on General Packet Radio Services (GPRS),
the currently available MMS is similar to a brief
PowerPoint presentation.
 The second phase of MMS will require a 3G network
to enable streaming video.
How does it works ?
 The sending phone initiates a data connection that provides TCP/IP
network connectivity, usually over GPRS.
 The sending phone performs an HTTP POST to an MMSC of the MMS
message encoding in the MMS Encapsulation Format, as defined by
the Open Mobile Alliance. The encoded MMS message includes all of the
content of the MMS message, as well as header information, including a
list of intended recipients for the message.
 The MMSC receives the MMS message submission and validates the
message sender.
 The MMSC stores the content of the MMS message and makes it available
as a dynamically generated URL link.
 The MMSC generates an MMS notification message, which is sent via
WAP Push over SMS to the message recipient(s). This MMS notification
message contains a URL pointer to the dynamically generated MMS
content.
 The recipient receives the MMS notification message. It then initiates a
data connection that provides TCP/IP network connectivity (usually over
GPRS).
 The recipient phone performs an HTTP get to retrieve the MMS message
content URL from the MMSC.
Advantages & Disadvantages
 PROs :
1. whereas MMS supports images, videos and audio in your
message. MMS messages can include photos and videos
recorded on your phone or media added to your phone
from your computer. On some phones you can use
emoticons via MMS. This higher level of personalization
allows you to deliver voice messages and add more context
to your message than using text alone.
2. SMS messaging limits your messages to 160 characters --
including spaces and punctuation. MMS messaging not only
allows you to embed more styles and format your text, but
also allows significantly longer messages between phones.
There is not a set character limit for MMS, though your
phone may apply one.
 CONs :
1. MMS created by one brand phone may not be compatible
with another brand of phone’s capabilities.
2. Some phones may be configured poorly leading to the
failure of MMS delivery.
3. Because of the large amount of transferring of MMS to
different networks, sending to a large group of customers
can be slow.
HAPPY LEARNING !
Arun Shukla
arun.shukla2694@gmail.com
Thank you All

Mais conteúdo relacionado

Mais procurados

LTE Architecture
LTE ArchitectureLTE Architecture
LTE ArchitectureManje Gowda
 
Evolution of the generations of mobile Communication system.
Evolution of the generations of mobile Communication system.Evolution of the generations of mobile Communication system.
Evolution of the generations of mobile Communication system.Musfiqur Rahman
 
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...Vikas Shokeen
 
New carrier technique for 5G mobile communication
New carrier technique for 5G mobile communicationNew carrier technique for 5G mobile communication
New carrier technique for 5G mobile communicationmohamed naeem
 
Generation of mobile communication systems
Generation of mobile communication systemsGeneration of mobile communication systems
Generation of mobile communication systemsjincy-a
 
Mobility Management in Wireless Communication
Mobility Management in Wireless CommunicationMobility Management in Wireless Communication
Mobility Management in Wireless CommunicationDon Norwood
 
1G, 2G, 3G, 4G, 5G. Best topic for telecom presentation
1G, 2G, 3G, 4G, 5G. Best topic for telecom presentation1G, 2G, 3G, 4G, 5G. Best topic for telecom presentation
1G, 2G, 3G, 4G, 5G. Best topic for telecom presentationoDesk
 
Generations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5gGenerations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5gNoor Mohammad's Faltoos
 
LTE - Long Term Evolution
LTE - Long Term EvolutionLTE - Long Term Evolution
LTE - Long Term EvolutionArief Gunawan
 
4 g LTE, LTE Advance
4 g LTE, LTE Advance 4 g LTE, LTE Advance
4 g LTE, LTE Advance Sajid Marwat
 

Mais procurados (20)

1g to 5g technologies
1g to 5g technologies1g to 5g technologies
1g to 5g technologies
 
LTE Architecture
LTE ArchitectureLTE Architecture
LTE Architecture
 
Evolution of the generations of mobile Communication system.
Evolution of the generations of mobile Communication system.Evolution of the generations of mobile Communication system.
Evolution of the generations of mobile Communication system.
 
SMS
SMSSMS
SMS
 
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
 
BSNL TRAINING PPT
BSNL TRAINING PPTBSNL TRAINING PPT
BSNL TRAINING PPT
 
BSNL
BSNLBSNL
BSNL
 
New carrier technique for 5G mobile communication
New carrier technique for 5G mobile communicationNew carrier technique for 5G mobile communication
New carrier technique for 5G mobile communication
 
GSM Presentation
GSM PresentationGSM Presentation
GSM Presentation
 
Generation of mobile communication systems
Generation of mobile communication systemsGeneration of mobile communication systems
Generation of mobile communication systems
 
Mobility Management in Wireless Communication
Mobility Management in Wireless CommunicationMobility Management in Wireless Communication
Mobility Management in Wireless Communication
 
1G, 2G, 3G, 4G, 5G. Best topic for telecom presentation
1G, 2G, 3G, 4G, 5G. Best topic for telecom presentation1G, 2G, 3G, 4G, 5G. Best topic for telecom presentation
1G, 2G, 3G, 4G, 5G. Best topic for telecom presentation
 
Generations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5gGenerations of network 1 g, 2g, 3g, 4g, 5g
Generations of network 1 g, 2g, 3g, 4g, 5g
 
The GSM Technology
The GSM TechnologyThe GSM Technology
The GSM Technology
 
LTE - Long Term Evolution
LTE - Long Term EvolutionLTE - Long Term Evolution
LTE - Long Term Evolution
 
2g 3g
2g 3g2g 3g
2g 3g
 
4 g LTE, LTE Advance
4 g LTE, LTE Advance 4 g LTE, LTE Advance
4 g LTE, LTE Advance
 
2G Topology
2G Topology2G Topology
2G Topology
 
3G Technology
3G Technology 3G Technology
3G Technology
 
5g tutorial
5g tutorial5g tutorial
5g tutorial
 

Destaque

MMS Introduction
MMS IntroductionMMS Introduction
MMS Introductionmamahow
 
Mobile Messaging - Part 5 - Mms Arch And Transactions
Mobile Messaging  - Part 5 - Mms Arch And TransactionsMobile Messaging  - Part 5 - Mms Arch And Transactions
Mobile Messaging - Part 5 - Mms Arch And TransactionsGwenaël Le Bodic
 
Introduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & GatewaysIntroduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & Gatewaystawi123
 
Gsm and Gprs Ppt
Gsm and Gprs PptGsm and Gprs Ppt
Gsm and Gprs PptDev Goel
 
3 g tutorial
3 g tutorial3 g tutorial
3 g tutorialmabongi
 
Rape in India - A study by Juxt in public interest
Rape in India - A study by Juxt in public interestRape in India - A study by Juxt in public interest
Rape in India - A study by Juxt in public interestJuxtConsult
 
research on rape in india
research on rape in indiaresearch on rape in india
research on rape in indialoveuhs
 
HP Wearables and IoT - Our Story - Christine Hawkins
HP Wearables and IoT - Our Story - Christine HawkinsHP Wearables and IoT - Our Story - Christine Hawkins
HP Wearables and IoT - Our Story - Christine HawkinsWithTheBest
 
Gsm architecture and call flow
Gsm architecture and call flowGsm architecture and call flow
Gsm architecture and call flowMohd Nazir Shakeel
 
WAP- Wireless Application Protocol
WAP- Wireless Application ProtocolWAP- Wireless Application Protocol
WAP- Wireless Application ProtocolSenthil Kanth
 
Wi fi call flows
Wi fi call flowsWi fi call flows
Wi fi call flowsframedrelay
 

Destaque (20)

MMS Introduction
MMS IntroductionMMS Introduction
MMS Introduction
 
Mobile Messaging - Part 5 - Mms Arch And Transactions
Mobile Messaging  - Part 5 - Mms Arch And TransactionsMobile Messaging  - Part 5 - Mms Arch And Transactions
Mobile Messaging - Part 5 - Mms Arch And Transactions
 
MMS presentation
MMS presentationMMS presentation
MMS presentation
 
Mms
MmsMms
Mms
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Introduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & GatewaysIntroduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & Gateways
 
Short message service
Short message serviceShort message service
Short message service
 
Wap ppt
Wap pptWap ppt
Wap ppt
 
Tic1
Tic1Tic1
Tic1
 
Gsm and Gprs Ppt
Gsm and Gprs PptGsm and Gprs Ppt
Gsm and Gprs Ppt
 
3 g tutorial
3 g tutorial3 g tutorial
3 g tutorial
 
security issue
security issuesecurity issue
security issue
 
Rape in India - A study by Juxt in public interest
Rape in India - A study by Juxt in public interestRape in India - A study by Juxt in public interest
Rape in India - A study by Juxt in public interest
 
research on rape in india
research on rape in indiaresearch on rape in india
research on rape in india
 
ATS Company Reports: Sonata
ATS Company Reports: SonataATS Company Reports: Sonata
ATS Company Reports: Sonata
 
HP Wearables and IoT - Our Story - Christine Hawkins
HP Wearables and IoT - Our Story - Christine HawkinsHP Wearables and IoT - Our Story - Christine Hawkins
HP Wearables and IoT - Our Story - Christine Hawkins
 
Gsm architecture and call flow
Gsm architecture and call flowGsm architecture and call flow
Gsm architecture and call flow
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
WAP- Wireless Application Protocol
WAP- Wireless Application ProtocolWAP- Wireless Application Protocol
WAP- Wireless Application Protocol
 
Wi fi call flows
Wi fi call flowsWi fi call flows
Wi fi call flows
 

Semelhante a SMS & MMS Technologies

SMS-SMPP-Concepts
SMS-SMPP-ConceptsSMS-SMPP-Concepts
SMS-SMPP-ConceptsDuy Do Phan
 
Gsm short message service
Gsm short message serviceGsm short message service
Gsm short message servicePartha Bhunia
 
presentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignmentpresentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignmentFabiha Ain
 
Global system for mobile
Global system for mobileGlobal system for mobile
Global system for mobilePartha Bhunia
 
ALLAH WASAYA short_message_service
ALLAH WASAYA short_message_serviceALLAH WASAYA short_message_service
ALLAH WASAYA short_message_servicemuhsin sheeraz
 
G second generation network
G second generation networkG second generation network
G second generation networkSharmaine Carlos
 
Wireless Communications Presentati.ppt
Wireless Communications Presentati.pptWireless Communications Presentati.ppt
Wireless Communications Presentati.pptIhtisham Saeed
 
Hybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMSHybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMSCSCJournals
 
Bhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone PaperBhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone PaperMousselmal Tarik
 
Gsm overview
Gsm overviewGsm overview
Gsm overviewsachi100
 
Sms gateway www.shortcodes.com
Sms gateway www.shortcodes.comSms gateway www.shortcodes.com
Sms gateway www.shortcodes.comtomsowellfirst
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdfRoopa slideshare
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdfBhavanislide2
 

Semelhante a SMS & MMS Technologies (20)

SMS-SMPP-Concepts
SMS-SMPP-ConceptsSMS-SMPP-Concepts
SMS-SMPP-Concepts
 
Sms
Sms Sms
Sms
 
Gsm short message service
Gsm short message serviceGsm short message service
Gsm short message service
 
Ch6
Ch6Ch6
Ch6
 
Jl3516261638
Jl3516261638Jl3516261638
Jl3516261638
 
presentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignmentpresentation on gsm architecture and fixed assignment
presentation on gsm architecture and fixed assignment
 
Sms2
Sms2Sms2
Sms2
 
Global system for mobile
Global system for mobileGlobal system for mobile
Global system for mobile
 
ALLAH WASAYA short_message_service
ALLAH WASAYA short_message_serviceALLAH WASAYA short_message_service
ALLAH WASAYA short_message_service
 
G second generation network
G second generation networkG second generation network
G second generation network
 
Wireless Communications Presentati.ppt
Wireless Communications Presentati.pptWireless Communications Presentati.ppt
Wireless Communications Presentati.ppt
 
Hybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMSHybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMS
 
Bhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone PaperBhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone Paper
 
LITERATURE SURVEY: PEER TO PEER TRANSMISSION OF PASSWORD THROUGH SECURE SMS
LITERATURE SURVEY: PEER TO PEER TRANSMISSION OF PASSWORD THROUGH SECURE SMSLITERATURE SURVEY: PEER TO PEER TRANSMISSION OF PASSWORD THROUGH SECURE SMS
LITERATURE SURVEY: PEER TO PEER TRANSMISSION OF PASSWORD THROUGH SECURE SMS
 
Gsm overview
Gsm overviewGsm overview
Gsm overview
 
Sms gateway www.shortcodes.com
Sms gateway www.shortcodes.comSms gateway www.shortcodes.com
Sms gateway www.shortcodes.com
 
Unit 2
Unit 2Unit 2
Unit 2
 
Gsm1
Gsm1Gsm1
Gsm1
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
 
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
9.EAACK---A-Secure-Intrusion-Detection-System-for-MANETs-pdf.pdf
 

Último

Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 

Último (20)

Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 

SMS & MMS Technologies

  • 2. Key Concepts The Digital Wireless Telephony comprise of two main working technologies:  GSM which stands for Global System for Mobile Communication.  CDMA which stands for Code Division Multiple Access.
  • 3. GSM Technology More than 690 mobile networks provide GSM services in more than 213 countries which means in total 82.4% people globally uses GSM mobile connections. China being on the top followed by Russia, India & USA. GSM is a “ time division” system, thus sometimes called as TDMA.
  • 4. CDMA Technology  Both GSM and CDMA are multiple access technologies.  CDMA employs spread-spectrum technology and a special coding scheme (where each transmitter is assigned a code).  Spread spectrum is a form of wireless communications in which the frequency of the transmitted signal is deliberately varied. This results in a much greater bandwidth than the signal would have if its frequency were not varied.
  • 5. Difference between the two  In CDMAs, there is one physical channel and a special code for every device in the coverage network. Using this code, the signal of the device is multiplexed, and the same physical channel is used to send the signal.  In GSMs, every cell has a corresponding network tower, which serves the mobile phones in that cellular area which in turn makes GSMs more accessible as they work on multiple frequency bands (850/900/1800/1900MHz).
  • 6.  Network services in CDMAs are Handset-Specific whereas in GSMs are SIM-Specific. User has option to select handset of his choice.  Frequency-time comparison:
  • 7. SMS, what is it ?  Short Message Service (SMS) is a text messaging service component of phone, Web, or mobile communication systems. It uses standardized communication protocols to allow fixed-line or mobile phone devices to exchange short text messages.  Short message service is a mechanism of delivery of short messages over the mobile networks. It is a store and forward way of transmitting messages to and from mobiles.
  • 8. How Does It Works ?  The message (text only) from the sending mobile is stored in a central short message center (SMC) which then forwards it to the destination mobile. This means that in the case that the recipient is not available, the short message is stored and can be sent later.  Each short message can be no longer than 160 characters. These characters can be text (alphanumeric) or binary Non-Text Short messages. An interesting feature of SMS is return receipts. This means that the sender, if wishes, can get a small message notifying if the short message was delivered to the intended recipient.  Since SMS used signaling channel as opposed to dedicated channels, these messages can be sent/received simultaneously with the voice/data/fax service over a GSM network.  SMS supports national and international roaming. This means that you can send short messages to any other GSM mobile user around the world. With the PCS networks based on all the three technologies, GSM, CDMA and TDMA supporting SMS, SMS is more or less a universal mobile data service.
  • 9.  SME - Short Message Entity  SMC – Short Message Center  GMSC – Gateway MSC  MSC – Message Switching Center  HLR – Home Location Register  VLR – Visitor Location Register  BSS – Base Station System
  • 10.  The SME (Short Message Entity) which can be located in the fixed network or a mobile station, receives and sends short messages.  The SMC (Short Message Center) is the entity which does the job of store and forward of messages to and from the mobile station.  The GWMS (SMS gateway MSC) is a gateway MSC that can also receive short messages. The gateway MSC is a mobile network’s point of contact with other networks. On receiving the short message from the short message center, GMSC uses the SS7 network to interrogate the current position of the mobile station form the HLR, the home location register.  HLR is the main database in a mobile network. It holds information of the subscription profile of the mobile and also about the routing information for the subscriber, i.e. the area (covered by a MSC) where the mobile is currently situated. The GMSC is thus able to pass on the message to the correct MSC.  MSC (Mobile Switching Center) is the entity in a GSM network which does the job of switching connections between mobile stations or between mobile stations and the fixed network.
  • 11.  A VLR (Visitor Location Register) corresponds to each MSC and contains temporary information about the mobile, information like mobile identification and the cell (or a group of cells) where the mobile is currently situated.  Using information form the VLR the MSC is able to switch the information (short message) to the corresponding BSS (Base Station System), which transmits the short message to the mobile.  The BSS consists of transceivers, which send and receive information over the air interface, to and from the mobile station.  This information is passed over the signaling channels so the mobile can receive messages even if a voice or data call is going on.
  • 12. Advantages & Disadvantages  PROs : 1. You can send then any time – Day or Night. 2. Person you are sending it to do not have to have their mobile phones switched on. 3. It can save time. Rather than interrupting them with calls you can simply message them. 4. SMS are good for Informal messaging. 5. SMS is personal. It goes straight to the recipient’s mobile phone. The message is literally delivered directly into their hand.
  • 13.  CONs : 1. Messages are plain vanilla in nature. You can only send simple text messages. There is no scope for any graphics or audio. 2. The messages are limited by size. An SMS message can’t exceed 160 characters (70 Characters if Arabic, Chinese languages are used). 3. Could not be used for Formal Messaging. 4. SMS need Basic Typing Skills. 5. Delivery Failure - Unfortunately with bulk SMS marketing, service interruption occasionally occurs. Thus results in delivery failure. SMS is simply not as reliable as email yet, regardless of the provider.
  • 14. Okay ! Now on to MMS  MMS Stands for Multimedia Messaging Service.  It is a communications technology developed by 3GPP (Third Generation Partnership Project) that allows users to exchange multimedia communications between capable mobile phones and other devices.  To send or receive an MMS message, the phone makes a GPRS connection (to a GPRS APN). It then usually connects to the MMSC for sending/receiving messages through a WAP proxy/gateway.
  • 15.  An extension to the Short Message Service, MMS defines a way to send and receive, almost instantaneously, wireless messages that include images, audio, and video clips in addition to text.  When the technology has been fully developed, it will support the transmission of streaming video. A common current application of MMS messaging is picture messaging (the use of camera phones to take photos for immediate delivery to a mobile recipient). Other possibilities include animations and graphic presentations of stock quotes, sports news, and weather reports.  There are two important standards that define MMS technology, one published by the 3GPP (3GPP TS 23.140), and the other a series of MMS specifications published by the Open Mobile Alliance (OMA). These two standard bodies cooperate to define the MMS protocols.
  • 16. Protocols Defined  When MMS is discussed, We will often hear details of different MMS related protocols, such as MM1, MM3, MM4, MM7.  MM1 is the protocol that is used between a mobile device and the MMSC Messaging Server. It defines how mobile phones send and receive messages through the MMSC.  MM3 is the protocol that is used between an MMSC and other messaging systems. It is not so much a protocol, as much as a definition of requirements for how an MMSC must be able to interoperate with other messaging systems. In the real world, this is primarily done via the SMTP e-mail protocol.  MM4 is the protocol that is used to interconnect MMSCs. It is an SMTP-based protocol with additional headers defined.  MM7 is the protocol that is used to allow Value Added Service Provider (VASP) applications to send and receive MMS messages via an MMSC.
  • 17. MMS is developed in two separate phases.  Based on General Packet Radio Services (GPRS), the currently available MMS is similar to a brief PowerPoint presentation.  The second phase of MMS will require a 3G network to enable streaming video.
  • 18. How does it works ?  The sending phone initiates a data connection that provides TCP/IP network connectivity, usually over GPRS.  The sending phone performs an HTTP POST to an MMSC of the MMS message encoding in the MMS Encapsulation Format, as defined by the Open Mobile Alliance. The encoded MMS message includes all of the content of the MMS message, as well as header information, including a list of intended recipients for the message.  The MMSC receives the MMS message submission and validates the message sender.  The MMSC stores the content of the MMS message and makes it available as a dynamically generated URL link.  The MMSC generates an MMS notification message, which is sent via WAP Push over SMS to the message recipient(s). This MMS notification message contains a URL pointer to the dynamically generated MMS content.  The recipient receives the MMS notification message. It then initiates a data connection that provides TCP/IP network connectivity (usually over GPRS).  The recipient phone performs an HTTP get to retrieve the MMS message content URL from the MMSC.
  • 19. Advantages & Disadvantages  PROs : 1. whereas MMS supports images, videos and audio in your message. MMS messages can include photos and videos recorded on your phone or media added to your phone from your computer. On some phones you can use emoticons via MMS. This higher level of personalization allows you to deliver voice messages and add more context to your message than using text alone. 2. SMS messaging limits your messages to 160 characters -- including spaces and punctuation. MMS messaging not only allows you to embed more styles and format your text, but also allows significantly longer messages between phones. There is not a set character limit for MMS, though your phone may apply one.
  • 20.  CONs : 1. MMS created by one brand phone may not be compatible with another brand of phone’s capabilities. 2. Some phones may be configured poorly leading to the failure of MMS delivery. 3. Because of the large amount of transferring of MMS to different networks, sending to a large group of customers can be slow.
  • 21. HAPPY LEARNING ! Arun Shukla arun.shukla2694@gmail.com Thank you All