SMS (Short Message Service), commonly referred to as “text messaging,” is a service for sending short messages of up to 160 characters (224 character limit if using a 5-bit mode) to mobile devices, including cellular phones and smartphones.
SMS is similar to paging. However, SMS messages do not require the mobile phone to be active and within range and will be held for several days until the phone is active and within range.
SMS messages are transmitted via mobile data over cellular networks — starting with 2G — to anyone with roaming service capability.
They can also be sent digitally in many other ways, including the following:
Typical use cases of SMS include the following:
The growth of SMS text messages also led to the development of an Enhanced Messaging Service (EMS) and Multimedia Messaging Service (MMS).
EMS is an adaptation of SMS that allows users to send and receive ringtones and operator logos, as well as combinations of simple media to and from EMS-compliant handsets.
Further, MMS allows multimedia files to be shared over a cellular network, including pictures and videos.
Many of these depend upon short phone numbers called common short codes (CSCs), usually consisting of five digits, used to address SMS and MMS messages from cellular telephones.
Further, users can send messages from a computer via an SMS gateway. SMS gateways allow users to send messages to people within the cell served by that gateway. They also serve as international gateways for users with roaming capability.
In recent years, SMS spam has become an issue, as has SMiShing, a security attack in which the user is tricked into downloading a Trojan horse, virus or other malware onto a cellular phone or another mobile device.
Additionally, the growth of social media platforms used as communication channels has outpaced the use of telecommunication-based SMS services.
This has changed the nature of text messaging services. Instead of relying on SMS technology, users commonly text each other using social media apps such as WhatsApp or Facebook Messenger.
See also: SMS spam, short message service center, A2P messaging, call tree and two-factor authentication.
Networking makes the internet work, but neither can succeed without protocols. Common network protocols and their functions are …
Network change management includes five principles, including risk analysis and peer review. These best practices can help …
Li-Fi is an emerging wireless technology that uses visible light to transmit data instead of radio frequencies. Though still …
VoIP relies on codecs that permit the seamless connection between callers and networks. But there are many codecs and multiple …
A hybrid cloud architecture can provide modern capabilities to legacy contact centers. Explore the benefits and challenges of …
Huddle room hype has waned, but it helped promote the concept of simplifying video in the workplace. Now, organizations could …
The security company warned that the new attack style highlights the importance of securing Wi-Fi networks, implementing MFA and …
In a recent op-ed for The Financial Times, U.S. Deputy National Security Advisor Anne Neuberger wrote that reimbursing ransom …
The defendants, charged for conducting alleged phishing scams across the U.S., are suspected members of a prolific threat group …
All Rights Reserved, Copyright 2003 – 2024, TechTarget
Privacy Policy
Cookie Preferences
Do Not Sell or Share My Personal Information