SlideShare a Scribd company logo
1 of 46
Wireless Communications: On the education
and research
J. Hämäläinen, August 2013
Department of Communications and Networking
Contents
• International Master’s Programme in Communications
Engineering
• Master’s Thesis
• Doctoral education
• Comnet research
International
Master’s
Programme in
Communications
Engineering
The general structure
Our focus areas in
the following
discussion
Master’s Programme in Communications
Engineering: The general structure
Degree: Master of Science in Technology
- Two-year programme (120 ECTS)
- Three majors: Networking Technology, Radio
Communications, Digital Signal Processing
Structure: Six study modules:
1. Basic Module in Communications Engineering (20 cr)
2. Intermediate Module in Communications Engineering (20 cr)
3. Advanced Module in major (20 cr)
4. Methodological Studies (10 cr)
5. Elective Studies (20 cr)
6. Master Thesis (30 cr)
In the following we focus on Radio
communications major =>>>>>>
https://into.aalto.fi/display/enmasterelec/Homepage
Basic module in Radio Communications
(20cr)
Compulsory courses:
In addition at least 5cr is selected from a list of 3 courses
This module gives basic understanding on the communications
systems from radio communications perspective
Intermediate module in Radio
Communications (20cr)
Compulsory courses:
In addition at least 7cr is selected from a list of 8 courses
This module further enhance the understanding on the
communications systems from radio communications perspective
Advanced module in Radio
Communications (20cr)
Compulsory courses:
At least 5cr is selected from a list of 7 courses
Let us dig in bit deeper on some ideas in this module =>>>>>>
Course contents
• Radio Communication Systems I (RCS I)
– Contents: Fundamentals of channel modeling, radio system
evaluation methodology, general interference models, radio
interface protocols and procedures (general level perspective)
• Radio Communication Systems II (RCS II)
– Contents: Principles and standards of recent mobile
communication systems (HSPA, LTE, LTE-Advanced) are
considered in details.
• Radio Resource and Spectrum Management (RRSM)
– Contents: Modeling of interference in wireless networks,
interference mitigation and control, spectrum access methods
and policies, fairness - performance tradeoff.
Idea behind the studies in this module
• RCS I and RRSM:
– Goal of the courses is to strengthen the student’s understanding
on the radio communication systems and control principles.
– Content of the courses is relatively static
• RCS II:
– The course material is updated almost every year according to
progress in technology evolution.
– Focus is in most recent/widely deployed communication
system(s). This year main focus will be in LTE and LTE-
Advanced. Last year focus was on WCDMA/HSPA and LTE
– Course is focusing on radio communication principles from
standards perspective.
Goal: Understanding on theoretical principles, practical systems
and standards. Target is also that students can more easily find
MSc thesis work from industry
RCS II: Implementation 1/3
• Lectures and exercises
– Exercise problems consider both mathematical problems and
literature study where publications are used as a reference
material
• Group assignment
– Done in groups of 4-6 students
– Consists of: presentation, debate, and report
– Each group has assigned instructor (MSc/DSc level teacher)
– Topics related to technologies that are recently/currently
standardized
– Applied material should include both scientific papers and
standardization documents
RCS II: Implementation 2/3
Presentation and debate:
– Each presentation consists of two
parts, and has duration of 30
minutes.
– First, 2-3 members of the group
(supporters of the technology) give a
brief overview of the topic and their
findings (10-15 min).
– This is followed by a debate (15
min), where the rest of the group
takes the role of opponents of the
technology that was presented
– Audience and teachers may make
questions as well.
RCS II: Implementation 3/3
• Report
– group prepares a final report related to the presentation topic.
The report should have a length of approximately 7-10 pages
and form of the report is defined by report guidelines
• Grading
– The course exam gives a maximum of 30 points
• On top of exam points student may get (at maximum) 12 points
from the group assignment and 3 points from the exercises.
– Out of the 12 points, the teachers will give a maximum of 8
points, and the remaining 4 points will be given based on group
peer evaluation
• each group member evaluates the work done by the other group
members. The peer evaluation will be carried out at the end of the
course by e-mail.
Experiences from RCS II
• In general experiences has been very good and students
have liked the course
• Participation to group work should be closely followed.
Otherwise 1-2 students in each group may work less than
others
• Grading is slightly challenging - especially the comparison of
group works
• Students have been maybe too easily gaining high grades
but that has been incentive to attract students to the groups
– Course can be optionally carried out individually, then individual
assignment needs to be done but no extra points are granted
Methodological (10cr) and elective
studies (20cr)
Methodological module: Compulsory course
At least 5cr is selected from the list that includes mostly math courses
Elective studies: Compulsory course
In addition, choose any courses to fulfill 20cr module
Master’s thesis
MSc thesis principles
• Work load: 30cr (= 6 months work)
• Supervised by Aalto professor, instructor must admit at
least MSc degree
– The purpose of the thesis is to prove that the student has
acquired the level of maturity that is required for a higher
university degree.
– Thus, students are required to prove that they master their
majors and the methods of research in their respective fields,
and are also capable of carrying out an academic research
project in an independent and mature way.
8/20/2013
17
https://into.aalto.fi/display/enmasterelec/Master%27s+thesis
MSc thesis principles
• Most thesis works done while working fulltime (either
employed or on a scholarship)
• The objective is to complete the thesis work in 6 months,
– It is not uncommon to finalize the project in eight or nine months.
• Thesis options:
– Based on needs of businesses and industries (most usual case)
• Funding and instructor from the company that orders the work
– Based on the needs of the academic community
• Funding (in some cases) and instructor from university
– Students can also suggest a topic based on their own interests
• Not very usual case, thesis done without funding
Typical MSc thesis structure
1. Introduction
– Background discussion and setting the research problems, and
discussing the importance and justification of the study.
2. Theory
– May include required theoretical background, literature study on
the topic, and general level system description (example:
description of 3G or 4G including the parts needed to
understand the thesis problem)
These parts of the thesis can be usually written based on
textbooks, publications and e.g. standardization documents
Typical MSc thesis structure
3. Description (=what has been done and how)
– May include discussion on research methodology, especially in
case of simulations and experimental studies. Also specific
aspects of the research problem and its potential solutions can
be discussed.
4. Presentation of the results and analysis
– Student show the results and analyze them carefully.
5. Conclusions
– Summary of the results and optionally a discussion on the future
research directions
These parts contain core part of the student’s own work.
Follow-up
• Supervisor:
– After defining/accepting the structure supervisor gives for the
student a possibility to explain the progress made, which the
supervisor can then comment. Supervisor may give guidance on
some content issues especially when thesis is done in university
research project.
– In the end of the process supervisor write the statement on the
thesis and proposes the grade – after discussing with instructor.
• Instructor:
– Main advisor on technical, content and writing issues. Instructor
also may support student to achieve high quality presentation,
and help student to find relevant references. Instructor may also
support student with tools and laboratory arrangements.
Thesis example
Osman Yilmaz: Self-Optimization of Coverage
and Capacity in LTE using Adaptive Antenna
Systems (Nokia Siemens Networks), 2010.
Learning the thesis framework:
Network self-optimization in LTE
Writing of the thesis
report. Also two
conference papers
were done. Now
Osman is with Nokia
System
modeling
Performance
evaluation
Thesis example
Ankit Bhamri: Distributed coding and
modulation for 2-hop communication via
relays (Eurecom, France), 2010.
Writing of the
thesis report.
Ankit got PhD
student position
from
Eurecom, Fran
ce.
Understanding LTE and
relaying basics.
LTE physical
layer modeling.
Implementation
on simulator
and HW.
Beneyam Berehanu Haile: Co-channel
Interference in Heterogeneous Networks:
Rician/Rayleigh Scenario (Comnet), 2010.Thesis example
Understanding
the system model
Creating the mathematical toolbox
Deducing the results
Showing the results
Writing of the thesis report. Beneyam
is now a doctoral student in Comnet
Doctoral education
General structure of doctoral studies
• Recommended duration: 4 years
• Doctoral degree requirements
– Theoretical studies (40cr)
– Doctoral thesis that is examined by external evaluators and
defended in public.
– Student should demonstrate independent and critical thinking in
relation to their field of research
• Theoretical studies are divided into two modules:
– Research field (20-35cr)
– Scientific practises and principles (5-20cr).
https://into.aalto.fi/display/endoctoralelec/Homepage
Theoretical studies
on the research field
• Research field (20-35cr):
– Currently in School of Electrical Engineering there are 29 fields
(with named responsible professor(s)).
– In Comnet there are 5 research fields represented:
• Communications Engineering
• Network Economics
• Information Theory
• Networking Technology
• Teletraffic Theory
• Supervisor of the doctoral student usually is also
responsible professor of the research field
Scientific practises and
principles
• Scientific practises and principles (5-20cr):
– The aim is to provide students key characteristics of scientific
research and scientific knowledge. Students learn to apply the
principles of good scientific practice.
– The study module may include studies in research methodology,
research ethics and the history or philosophy of science and
principles of scientific writing.
– Also learning about university practices, such as teaching and
guidance of research work, can be included.
– The module may include some scientific preparatory tasks
related to the research project and presentations in a scientific
conference in the research field of the student.
Doctoral thesis
• Article dissertation, i.e., several scientific articles, published or
accepted for publication, and a summary of these.
– In joint papers the contribution of the doctoral candidate should be
independent one.
– It is not recommend that an article dissertation contains conference
papers alone
– Extended abstracts (1-2 pages) and papers published in national
conferences must not be included in a doctoral dissertation
• Monograph: Coherent scientific contribution on the research field.
– In practice almost all monographs are based on papers published by candidate.
– In case of monograph candidate must specify his or her own contribution to the
dissertation
– If number of papers on which the monograph is based is small, then the
evaluation of a monograph is difficult. Such works require more often corrections
and changes which means that the review process becomes longer
https://into.aalto.fi/display/endoctoralelec/Instructions+for+writing+the+doctoral+dissertation
Quality control
• Doctoral Programme Committee of the School
– Approve the research topic and confirm the study plans of
doctoral students
– Appoint the preliminary examiners for doctoral dissertation
– Decide on the permission to publish dissertation manuscript
– Appoint the opponent(s) for the defense
– Grade dissertation
• This is true quality control
– There are many cases in which committee has given negative
decisions in different phases of the doctoral degree process.
Doctoral thesis: Examples
• Ömer Bulakci: ”Backhaul Link Enhancement and Radio Resource
Management for Relay Deployments”, 2013
– Main publications: 5 Journal papers and 6 conference papers
– Length: 76 pages (the summary part)
• Jarno Nousiainen: “Forwarding Capacity in Large Wireless Multihop
Networks”, 2013
– Main publications: 1 Journal paper and 7 conference papers
– Length: 126 pages (the summary part)
• Muhammad Al-Rawi: “Opportunistic Packet Scheduling Algorithms
for Beyond 3G Wireless Networks”, 2010
– Monograph, 176 pages
– Materials from 1 Journal paper and 6 conference papers included
• More dissertations can be found from
http://otalib.aalto.fi/en/collections/e-publications/dissertations/
Funding and supervision
• Most usual sources for funding
– University research projects: Mosth usual way of funding
– Grants from doctoral programmes: Heavy competition
– Work outside the university: Part time students working in e.g.
industry (Nokia, Ericsson, operators)
– Other grants: Some international students fund their studies from
grants they have gained in their home countries
– https://into.aalto.fi/display/endoctoralelec/Financing+your+studies
• Supervision
– Depends on the supervisor working style and student’s needs.
– Typically weekly/biweekly/monthly follow-up meetings where
progress is followed, joint publications prepared, project, teaching
and other things updated.
Degrees granted
2008 2009 2010 2011 2012
2008 2009 2010 2011 2012
D.Sc. (Tech.) 2 4 7 8 7
Lic.Sc. (Tech.) 3 1 1 2
M.Sc. (Tech.) 81 91 144 68 58
Comnet Research
Grand Challenges
Carbon-neutral networking
• Sustainable communications
• Connecting the remaining 2 billion to mobile and 5 billion
to Internet
Instant wireless Internet
• Wireless access delays below the limit of human perception
Scaling the Internet to a thousand devices per user
• Internet of things, cyber-physical systems
Secure cyber space
• Network security, critical infrastructure protection
8/20/2013
Comnet
35
Source: EU FP7 project EARTH
Source: NSN
Source: Ericsson
“Aalto University found a total of 2 915
automation devices in Finland that were
accessible to just about anybody
through the Internet – and vulnerable to
cyber attacks.”
Communications and Information
Theory
Computational methods in discrete
matematics and information theory
Prof. Östergård
• Mathematical objects (existence and
classification problems)
• Combinatorial algorithms
Advanced Transmission Methods
Professors Hämäläinen and Tirkkonen
• Space-time codes,
• Codeboodk design for MIMO systems
• Optimized CQI feedback
• Nonlinearity (DirtyRF)
8/20/2013
Comnet
36
libexact package
Beamforming codebooks based on
Grassmannian Packings
Advanced Radio Communication
Systems (1/2)
Professors Hämäläinen, Jäntti and Tirkkonen
Cognitive radio and spectrum aware
communications
• Co-primary and secondary sharing
• Overlay (black space) and underlay (D2D)
transmissions
• Interference modeling and control
Wireless broadband systems and system
optimization
• HETNETS and deployable networks
• Small cells, relays
• Self-organization & self-optimization
• RRM
• Energy efficiency
8/20/2013
Comnet
37
Cognitive radio network
testbed
TVWS Assesment tool
http://quasar.netlab.hut.fi/
3GPP compliant simulation tools
Advanced Radio Communication
Systems (2/2)
Wireless Sensor Systems
Professors Jäntti and Ott
• Real-time sensing
• HW & SW Architectures
• Development and testing tools
• Protocols
• IoT, automation, and military applications
• RF tomographic imaging and Device Free Localization (DFL)
8/20/2013
Comnet
38
Software Model
LowLevel
Automated Daemons
Middleware
Application
Level
Comm.Stack
RTOS - APIsPeripheral Drivers
Power Manager
“Time SYNC”er
Device
Abstraction APIs
Sys
Monitoring
Comm. Drivers
Application
Transport
Network
MAC
PHY
pRoot node and middeware
DFL System
http://wsn.aalto.fi/en/
Performance analysis and teletraffic
theory
Queuing theory and teletraffic theory
Prof. Aalto
• Age and size based scheduling
• Dispatching problems
• Flow level performance analysis
• Internet traffic engineering
• P2P, wireless networks, M2M communications,…
Performance measurements
Prof. Manner
• Energy-consumption measurements
• Experimental data center
• Internet traffic measurements
• Mobile access speed measurement service: Netradar
(http://www.netradar.org/en)
8/20/2013
Comnet
39
Comnet data center
Size- and state aware dispatching
Netradar
Internet technologies (1/2)
Professors Kantola, Manner, and Ott
Networking technology
• Carrier grade Ethernet
• Access and core networks
• Software defined networking (OpenFlow)
• Energy efficient communications and networking
Network security and trust
• Internet wide trust / Evolution of cooperation
• Customer edge switching
• Cyber security: Security of critical infrastructure
8/20/2013
Comnet
40
Control place for Carrier-Grade
Ethernet Network
Analysis of Cyber weapons and
attacks
Internet technologies (2/2)
Internet protocols
• End-to-end transport, multipath transport, flow and
congestion control
• Customer Edge Traversal
• Transport layer cognitivity
• Opportunistic Networking
• DTN routing, transport, and application protocols
• P2P
• Content-based networking
• Multimedia protocols
• Energy efficient operation
• IETF standardization
Military communications
• Tacoms - Tactical Communications for Federated Network
Environment
• Generic messaging protocol (MICS)
8/20/2013
Comnet
41
The ONE simulator for Opportunisti Networking
http://www.netlab.tkk.fi/tutkimus/dtn/theone/
Proxies for Energy-Efficient Web Access
Network Economics
Prof. Hämmäinen
Quantitative analysis of mobile user behavior
• Challenging the boundaries of complex data mining, privacy
• Understand the behavior in context, social activity and service
adaption/diffusion
Optimal industry and technical architecture for
flexible radio access
• Enable flexible spectrum use: Technical, regulatory and
economic rules
Techno-economic bottlenecks of Internet
scalability
• Identify and eliminate techno-economical bottlenecks
preventing the scaling of Internet
8/20/2013
Comnet
42
Spectrum regulation phase diagram
Contextual patterns in mobile service usage
Publications
8/20/2013
Comnet
43
0
20
40
60
80
100
120
140
160
180
200
90
141 143
170
186
All publications
2008 2009 2010 2011 2012
0
20
40
60
27
32 33
53
60
Journal articles
2008 2009 2010 2011 2012
Advanced Radio Communications
Research Group
• ~ 6 D.Sc. level researchers
• 20-25 Doctoral students
• Variable number of M.Sc. thesis workers
Jyri
Riku
Olav
Profs:
Some research partners (with whom we have
joint publications and/or research projects)
• Colleagues in Aalto
• University of Oulu
• Tampere University of
Technology
• VTT
• Nokia Siemens Networks
(Germany, Finland, Denmark, C
hina)
• Nokia Research Center
• Renesas Mobile
• Ericsson Research
• Huawei Technologies
• Royal Institute of Technology
KTH (Sweden)
• University of California at Davis
(USA)
• Yonsei University (Korea)
• Beijing University of Posts and
Telecommunications (China)
• Peking University (China)
• Worchester Polytechnic Institute
(USA)
• UPC, Barcelona
• Texas A&M (USA)
• National University of Cordoba
(Argentina)
• Aalborg University
Questions?

More Related Content

Viewers also liked

Mobile and wireless computing and pedagogy, April 2007
Mobile and wireless computing and pedagogy, April 2007Mobile and wireless computing and pedagogy, April 2007
Mobile and wireless computing and pedagogy, April 2007Bryan Alexander
 
Wireless networks 07
Wireless networks 07Wireless networks 07
Wireless networks 07Roohul Amin
 
Characterization of a dielectric barrier discharge (DBD) for waste gas treatment
Characterization of a dielectric barrier discharge (DBD) for waste gas treatmentCharacterization of a dielectric barrier discharge (DBD) for waste gas treatment
Characterization of a dielectric barrier discharge (DBD) for waste gas treatmentDevansh Sharma
 
Wireless lan solutions_for_education
Wireless lan solutions_for_educationWireless lan solutions_for_education
Wireless lan solutions_for_educationAdvantec Distribution
 
Cellular mobile communication
Cellular mobile communicationCellular mobile communication
Cellular mobile communicationAJAL A J
 
Parallel sorting algorithm
Parallel sorting algorithmParallel sorting algorithm
Parallel sorting algorithmRicha Kumari
 
Latest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsLatest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsArun Kumar
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminarshilpi nagpal
 

Viewers also liked (9)

Secure Wireless for Higher education
Secure Wireless for Higher educationSecure Wireless for Higher education
Secure Wireless for Higher education
 
Mobile and wireless computing and pedagogy, April 2007
Mobile and wireless computing and pedagogy, April 2007Mobile and wireless computing and pedagogy, April 2007
Mobile and wireless computing and pedagogy, April 2007
 
Wireless networks 07
Wireless networks 07Wireless networks 07
Wireless networks 07
 
Characterization of a dielectric barrier discharge (DBD) for waste gas treatment
Characterization of a dielectric barrier discharge (DBD) for waste gas treatmentCharacterization of a dielectric barrier discharge (DBD) for waste gas treatment
Characterization of a dielectric barrier discharge (DBD) for waste gas treatment
 
Wireless lan solutions_for_education
Wireless lan solutions_for_educationWireless lan solutions_for_education
Wireless lan solutions_for_education
 
Cellular mobile communication
Cellular mobile communicationCellular mobile communication
Cellular mobile communication
 
Parallel sorting algorithm
Parallel sorting algorithmParallel sorting algorithm
Parallel sorting algorithm
 
Latest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsLatest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc Students
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 

Similar to Wireless Communications courses and research at COMNET

Project Guidelines-LMU TOPUP.pptx
Project Guidelines-LMU TOPUP.pptxProject Guidelines-LMU TOPUP.pptx
Project Guidelines-LMU TOPUP.pptxPasanSubasinghe2
 
B.Sc_.CSIT-8th-sem-syllabus.pdf
B.Sc_.CSIT-8th-sem-syllabus.pdfB.Sc_.CSIT-8th-sem-syllabus.pdf
B.Sc_.CSIT-8th-sem-syllabus.pdfSudarshanSharma43
 
Course Presentation: Electronic & Computer Engineering
Course Presentation: Electronic & Computer EngineeringCourse Presentation: Electronic & Computer Engineering
Course Presentation: Electronic & Computer EngineeringBrunel University
 
SE-IT MINI PROJECT SYLLABUS
SE-IT MINI PROJECT SYLLABUSSE-IT MINI PROJECT SYLLABUS
SE-IT MINI PROJECT SYLLABUSnikshaikh786
 
Discrete-Mathematics syllabus sample.docx
Discrete-Mathematics syllabus sample.docxDiscrete-Mathematics syllabus sample.docx
Discrete-Mathematics syllabus sample.docxLaizaMaeRodriguezAgn
 
PHYSICS: Learning outcomes and Competences
PHYSICS: Learning outcomes and CompetencesPHYSICS: Learning outcomes and Competences
PHYSICS: Learning outcomes and CompetencesSEENET-MTP
 
Melbourne t1 2016-assignment_2_mn504
Melbourne   t1 2016-assignment_2_mn504Melbourne   t1 2016-assignment_2_mn504
Melbourne t1 2016-assignment_2_mn504Sandeep Ratnam
 
Introduction to the Telecom Forum Course
Introduction to the Telecom Forum CourseIntroduction to the Telecom Forum Course
Introduction to the Telecom Forum CourseProjectENhANCE
 
SEM 4 : BUILDING SERVICES MODULE OUTLINE
SEM 4 : BUILDING SERVICES MODULE OUTLINESEM 4 : BUILDING SERVICES MODULE OUTLINE
SEM 4 : BUILDING SERVICES MODULE OUTLINEDarshiini Vig
 
Orientation-MCA-2021- 2nd sem.pptx
Orientation-MCA-2021- 2nd sem.pptxOrientation-MCA-2021- 2nd sem.pptx
Orientation-MCA-2021- 2nd sem.pptxShaikAhamad3
 
Lec01_Course_Overview.ppt
Lec01_Course_Overview.pptLec01_Course_Overview.ppt
Lec01_Course_Overview.pptssuser4ca1eb
 
Final reportguidelines
Final reportguidelinesFinal reportguidelines
Final reportguidelinesrajes2411
 
Mo bld 60403 building services 1
Mo bld 60403 building services 1 Mo bld 60403 building services 1
Mo bld 60403 building services 1 chloeesim
 
Preparation for NBA
Preparation for  NBAPreparation for  NBA
Preparation for NBASHIMI S L
 
Sem 2 Building services 1
Sem 2 Building services 1 Sem 2 Building services 1
Sem 2 Building services 1 Est
 

Similar to Wireless Communications courses and research at COMNET (20)

Project Guidelines-LMU TOPUP.pptx
Project Guidelines-LMU TOPUP.pptxProject Guidelines-LMU TOPUP.pptx
Project Guidelines-LMU TOPUP.pptx
 
B.Sc_.CSIT-8th-sem-syllabus.pdf
B.Sc_.CSIT-8th-sem-syllabus.pdfB.Sc_.CSIT-8th-sem-syllabus.pdf
B.Sc_.CSIT-8th-sem-syllabus.pdf
 
00 syllabus
00 syllabus00 syllabus
00 syllabus
 
Course Presentation: Electronic & Computer Engineering
Course Presentation: Electronic & Computer EngineeringCourse Presentation: Electronic & Computer Engineering
Course Presentation: Electronic & Computer Engineering
 
SE-IT MINI PROJECT SYLLABUS
SE-IT MINI PROJECT SYLLABUSSE-IT MINI PROJECT SYLLABUS
SE-IT MINI PROJECT SYLLABUS
 
Discrete-Mathematics syllabus sample.docx
Discrete-Mathematics syllabus sample.docxDiscrete-Mathematics syllabus sample.docx
Discrete-Mathematics syllabus sample.docx
 
PHYSICS: Learning outcomes and Competences
PHYSICS: Learning outcomes and CompetencesPHYSICS: Learning outcomes and Competences
PHYSICS: Learning outcomes and Competences
 
Melbourne t1 2016-assignment_2_mn504
Melbourne   t1 2016-assignment_2_mn504Melbourne   t1 2016-assignment_2_mn504
Melbourne t1 2016-assignment_2_mn504
 
Introduction to the Telecom Forum Course
Introduction to the Telecom Forum CourseIntroduction to the Telecom Forum Course
Introduction to the Telecom Forum Course
 
SEM 4 : BUILDING SERVICES MODULE OUTLINE
SEM 4 : BUILDING SERVICES MODULE OUTLINESEM 4 : BUILDING SERVICES MODULE OUTLINE
SEM 4 : BUILDING SERVICES MODULE OUTLINE
 
Orientation-MCA-2021- 2nd sem.pptx
Orientation-MCA-2021- 2nd sem.pptxOrientation-MCA-2021- 2nd sem.pptx
Orientation-MCA-2021- 2nd sem.pptx
 
Lec01_Course_Overview.ppt
Lec01_Course_Overview.pptLec01_Course_Overview.ppt
Lec01_Course_Overview.ppt
 
Final reportguidelines
Final reportguidelinesFinal reportguidelines
Final reportguidelines
 
Mo bld 60403 building services 1
Mo bld 60403 building services 1 Mo bld 60403 building services 1
Mo bld 60403 building services 1
 
8th sem (1)
8th sem (1)8th sem (1)
8th sem (1)
 
OBE_PPT_CE.pptx
OBE_PPT_CE.pptxOBE_PPT_CE.pptx
OBE_PPT_CE.pptx
 
Preparation for NBA
Preparation for  NBAPreparation for  NBA
Preparation for NBA
 
0. CSE205 (3).ppt
0. CSE205 (3).ppt0. CSE205 (3).ppt
0. CSE205 (3).ppt
 
III-1ece.pdf
III-1ece.pdfIII-1ece.pdf
III-1ece.pdf
 
Sem 2 Building services 1
Sem 2 Building services 1 Sem 2 Building services 1
Sem 2 Building services 1
 

More from ProjectENhANCE

5 g talk_das_jyri_hamalainen_jan_2015
5 g talk_das_jyri_hamalainen_jan_20155 g talk_das_jyri_hamalainen_jan_2015
5 g talk_das_jyri_hamalainen_jan_2015ProjectENhANCE
 
Telecom specrtum management
Telecom specrtum managementTelecom specrtum management
Telecom specrtum managementProjectENhANCE
 
Presentation to telecom forum co ict 13012015
Presentation to telecom forum co ict 13012015Presentation to telecom forum co ict 13012015
Presentation to telecom forum co ict 13012015ProjectENhANCE
 
Mobile broadband development in tz 13 jan 2015
Mobile broadband development in tz   13 jan 2015Mobile broadband development in tz   13 jan 2015
Mobile broadband development in tz 13 jan 2015ProjectENhANCE
 
Telecom specrtum management
Telecom specrtum managementTelecom specrtum management
Telecom specrtum managementProjectENhANCE
 
Presentation to telecom forum co ict 13012015
Presentation to telecom forum co ict 13012015Presentation to telecom forum co ict 13012015
Presentation to telecom forum co ict 13012015ProjectENhANCE
 
Overview of the EIT-ICT Labs Helsinki
Overview of the EIT-ICT Labs HelsinkiOverview of the EIT-ICT Labs Helsinki
Overview of the EIT-ICT Labs HelsinkiProjectENhANCE
 
Delay-Tolerant Networking Paradigm and the Ongoing Research Activities
Delay-Tolerant Networking Paradigm and the Ongoing Research ActivitiesDelay-Tolerant Networking Paradigm and the Ongoing Research Activities
Delay-Tolerant Networking Paradigm and the Ongoing Research ActivitiesProjectENhANCE
 
Indoor Positioning Systems
Indoor Positioning SystemsIndoor Positioning Systems
Indoor Positioning SystemsProjectENhANCE
 
WLAN and Bluetooth Indoor Positioning System
WLAN and Bluetooth Indoor Positioning SystemWLAN and Bluetooth Indoor Positioning System
WLAN and Bluetooth Indoor Positioning SystemProjectENhANCE
 
WinProp propagation modeling and network planning tool
WinProp propagation modeling and network planning toolWinProp propagation modeling and network planning tool
WinProp propagation modeling and network planning toolProjectENhANCE
 
Introductory Presentation on CoICT of UDSM
Introductory Presentation on CoICT of UDSMIntroductory Presentation on CoICT of UDSM
Introductory Presentation on CoICT of UDSMProjectENhANCE
 
Introductory Presentation on the AAiT S.ECE Department
Introductory Presentation on the AAiT S.ECE Department Introductory Presentation on the AAiT S.ECE Department
Introductory Presentation on the AAiT S.ECE Department ProjectENhANCE
 
Introductory Presentation on COMNET Aalto Department
Introductory Presentation on COMNET Aalto Department Introductory Presentation on COMNET Aalto Department
Introductory Presentation on COMNET Aalto Department ProjectENhANCE
 
COMNET as a Capacity-Building Partner for Two African Institutions
COMNET as a Capacity-Building Partner for Two African InstitutionsCOMNET as a Capacity-Building Partner for Two African Institutions
COMNET as a Capacity-Building Partner for Two African InstitutionsProjectENhANCE
 

More from ProjectENhANCE (16)

5 g talk_das_jyri_hamalainen_jan_2015
5 g talk_das_jyri_hamalainen_jan_20155 g talk_das_jyri_hamalainen_jan_2015
5 g talk_das_jyri_hamalainen_jan_2015
 
Telecom specrtum management
Telecom specrtum managementTelecom specrtum management
Telecom specrtum management
 
Presentation to telecom forum co ict 13012015
Presentation to telecom forum co ict 13012015Presentation to telecom forum co ict 13012015
Presentation to telecom forum co ict 13012015
 
Mobile broadband development in tz 13 jan 2015
Mobile broadband development in tz   13 jan 2015Mobile broadband development in tz   13 jan 2015
Mobile broadband development in tz 13 jan 2015
 
Telecom specrtum management
Telecom specrtum managementTelecom specrtum management
Telecom specrtum management
 
Presentation to telecom forum co ict 13012015
Presentation to telecom forum co ict 13012015Presentation to telecom forum co ict 13012015
Presentation to telecom forum co ict 13012015
 
Overview of the EIT-ICT Labs Helsinki
Overview of the EIT-ICT Labs HelsinkiOverview of the EIT-ICT Labs Helsinki
Overview of the EIT-ICT Labs Helsinki
 
Delay-Tolerant Networking Paradigm and the Ongoing Research Activities
Delay-Tolerant Networking Paradigm and the Ongoing Research ActivitiesDelay-Tolerant Networking Paradigm and the Ongoing Research Activities
Delay-Tolerant Networking Paradigm and the Ongoing Research Activities
 
Indoor Positioning Systems
Indoor Positioning SystemsIndoor Positioning Systems
Indoor Positioning Systems
 
WLAN and Bluetooth Indoor Positioning System
WLAN and Bluetooth Indoor Positioning SystemWLAN and Bluetooth Indoor Positioning System
WLAN and Bluetooth Indoor Positioning System
 
Software Radio Course
Software Radio CourseSoftware Radio Course
Software Radio Course
 
WinProp propagation modeling and network planning tool
WinProp propagation modeling and network planning toolWinProp propagation modeling and network planning tool
WinProp propagation modeling and network planning tool
 
Introductory Presentation on CoICT of UDSM
Introductory Presentation on CoICT of UDSMIntroductory Presentation on CoICT of UDSM
Introductory Presentation on CoICT of UDSM
 
Introductory Presentation on the AAiT S.ECE Department
Introductory Presentation on the AAiT S.ECE Department Introductory Presentation on the AAiT S.ECE Department
Introductory Presentation on the AAiT S.ECE Department
 
Introductory Presentation on COMNET Aalto Department
Introductory Presentation on COMNET Aalto Department Introductory Presentation on COMNET Aalto Department
Introductory Presentation on COMNET Aalto Department
 
COMNET as a Capacity-Building Partner for Two African Institutions
COMNET as a Capacity-Building Partner for Two African InstitutionsCOMNET as a Capacity-Building Partner for Two African Institutions
COMNET as a Capacity-Building Partner for Two African Institutions
 

Recently uploaded

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Wireless Communications courses and research at COMNET

  • 1. Wireless Communications: On the education and research J. Hämäläinen, August 2013 Department of Communications and Networking
  • 2. Contents • International Master’s Programme in Communications Engineering • Master’s Thesis • Doctoral education • Comnet research
  • 4. The general structure Our focus areas in the following discussion
  • 5. Master’s Programme in Communications Engineering: The general structure Degree: Master of Science in Technology - Two-year programme (120 ECTS) - Three majors: Networking Technology, Radio Communications, Digital Signal Processing Structure: Six study modules: 1. Basic Module in Communications Engineering (20 cr) 2. Intermediate Module in Communications Engineering (20 cr) 3. Advanced Module in major (20 cr) 4. Methodological Studies (10 cr) 5. Elective Studies (20 cr) 6. Master Thesis (30 cr) In the following we focus on Radio communications major =>>>>>> https://into.aalto.fi/display/enmasterelec/Homepage
  • 6. Basic module in Radio Communications (20cr) Compulsory courses: In addition at least 5cr is selected from a list of 3 courses This module gives basic understanding on the communications systems from radio communications perspective
  • 7. Intermediate module in Radio Communications (20cr) Compulsory courses: In addition at least 7cr is selected from a list of 8 courses This module further enhance the understanding on the communications systems from radio communications perspective
  • 8. Advanced module in Radio Communications (20cr) Compulsory courses: At least 5cr is selected from a list of 7 courses Let us dig in bit deeper on some ideas in this module =>>>>>>
  • 9. Course contents • Radio Communication Systems I (RCS I) – Contents: Fundamentals of channel modeling, radio system evaluation methodology, general interference models, radio interface protocols and procedures (general level perspective) • Radio Communication Systems II (RCS II) – Contents: Principles and standards of recent mobile communication systems (HSPA, LTE, LTE-Advanced) are considered in details. • Radio Resource and Spectrum Management (RRSM) – Contents: Modeling of interference in wireless networks, interference mitigation and control, spectrum access methods and policies, fairness - performance tradeoff.
  • 10. Idea behind the studies in this module • RCS I and RRSM: – Goal of the courses is to strengthen the student’s understanding on the radio communication systems and control principles. – Content of the courses is relatively static • RCS II: – The course material is updated almost every year according to progress in technology evolution. – Focus is in most recent/widely deployed communication system(s). This year main focus will be in LTE and LTE- Advanced. Last year focus was on WCDMA/HSPA and LTE – Course is focusing on radio communication principles from standards perspective. Goal: Understanding on theoretical principles, practical systems and standards. Target is also that students can more easily find MSc thesis work from industry
  • 11. RCS II: Implementation 1/3 • Lectures and exercises – Exercise problems consider both mathematical problems and literature study where publications are used as a reference material • Group assignment – Done in groups of 4-6 students – Consists of: presentation, debate, and report – Each group has assigned instructor (MSc/DSc level teacher) – Topics related to technologies that are recently/currently standardized – Applied material should include both scientific papers and standardization documents
  • 12. RCS II: Implementation 2/3 Presentation and debate: – Each presentation consists of two parts, and has duration of 30 minutes. – First, 2-3 members of the group (supporters of the technology) give a brief overview of the topic and their findings (10-15 min). – This is followed by a debate (15 min), where the rest of the group takes the role of opponents of the technology that was presented – Audience and teachers may make questions as well.
  • 13. RCS II: Implementation 3/3 • Report – group prepares a final report related to the presentation topic. The report should have a length of approximately 7-10 pages and form of the report is defined by report guidelines • Grading – The course exam gives a maximum of 30 points • On top of exam points student may get (at maximum) 12 points from the group assignment and 3 points from the exercises. – Out of the 12 points, the teachers will give a maximum of 8 points, and the remaining 4 points will be given based on group peer evaluation • each group member evaluates the work done by the other group members. The peer evaluation will be carried out at the end of the course by e-mail.
  • 14. Experiences from RCS II • In general experiences has been very good and students have liked the course • Participation to group work should be closely followed. Otherwise 1-2 students in each group may work less than others • Grading is slightly challenging - especially the comparison of group works • Students have been maybe too easily gaining high grades but that has been incentive to attract students to the groups – Course can be optionally carried out individually, then individual assignment needs to be done but no extra points are granted
  • 15. Methodological (10cr) and elective studies (20cr) Methodological module: Compulsory course At least 5cr is selected from the list that includes mostly math courses Elective studies: Compulsory course In addition, choose any courses to fulfill 20cr module
  • 17. MSc thesis principles • Work load: 30cr (= 6 months work) • Supervised by Aalto professor, instructor must admit at least MSc degree – The purpose of the thesis is to prove that the student has acquired the level of maturity that is required for a higher university degree. – Thus, students are required to prove that they master their majors and the methods of research in their respective fields, and are also capable of carrying out an academic research project in an independent and mature way. 8/20/2013 17 https://into.aalto.fi/display/enmasterelec/Master%27s+thesis
  • 18. MSc thesis principles • Most thesis works done while working fulltime (either employed or on a scholarship) • The objective is to complete the thesis work in 6 months, – It is not uncommon to finalize the project in eight or nine months. • Thesis options: – Based on needs of businesses and industries (most usual case) • Funding and instructor from the company that orders the work – Based on the needs of the academic community • Funding (in some cases) and instructor from university – Students can also suggest a topic based on their own interests • Not very usual case, thesis done without funding
  • 19. Typical MSc thesis structure 1. Introduction – Background discussion and setting the research problems, and discussing the importance and justification of the study. 2. Theory – May include required theoretical background, literature study on the topic, and general level system description (example: description of 3G or 4G including the parts needed to understand the thesis problem) These parts of the thesis can be usually written based on textbooks, publications and e.g. standardization documents
  • 20. Typical MSc thesis structure 3. Description (=what has been done and how) – May include discussion on research methodology, especially in case of simulations and experimental studies. Also specific aspects of the research problem and its potential solutions can be discussed. 4. Presentation of the results and analysis – Student show the results and analyze them carefully. 5. Conclusions – Summary of the results and optionally a discussion on the future research directions These parts contain core part of the student’s own work.
  • 21. Follow-up • Supervisor: – After defining/accepting the structure supervisor gives for the student a possibility to explain the progress made, which the supervisor can then comment. Supervisor may give guidance on some content issues especially when thesis is done in university research project. – In the end of the process supervisor write the statement on the thesis and proposes the grade – after discussing with instructor. • Instructor: – Main advisor on technical, content and writing issues. Instructor also may support student to achieve high quality presentation, and help student to find relevant references. Instructor may also support student with tools and laboratory arrangements.
  • 22. Thesis example Osman Yilmaz: Self-Optimization of Coverage and Capacity in LTE using Adaptive Antenna Systems (Nokia Siemens Networks), 2010. Learning the thesis framework: Network self-optimization in LTE Writing of the thesis report. Also two conference papers were done. Now Osman is with Nokia System modeling Performance evaluation
  • 23. Thesis example Ankit Bhamri: Distributed coding and modulation for 2-hop communication via relays (Eurecom, France), 2010. Writing of the thesis report. Ankit got PhD student position from Eurecom, Fran ce. Understanding LTE and relaying basics. LTE physical layer modeling. Implementation on simulator and HW.
  • 24. Beneyam Berehanu Haile: Co-channel Interference in Heterogeneous Networks: Rician/Rayleigh Scenario (Comnet), 2010.Thesis example Understanding the system model Creating the mathematical toolbox Deducing the results Showing the results Writing of the thesis report. Beneyam is now a doctoral student in Comnet
  • 26. General structure of doctoral studies • Recommended duration: 4 years • Doctoral degree requirements – Theoretical studies (40cr) – Doctoral thesis that is examined by external evaluators and defended in public. – Student should demonstrate independent and critical thinking in relation to their field of research • Theoretical studies are divided into two modules: – Research field (20-35cr) – Scientific practises and principles (5-20cr). https://into.aalto.fi/display/endoctoralelec/Homepage
  • 27. Theoretical studies on the research field • Research field (20-35cr): – Currently in School of Electrical Engineering there are 29 fields (with named responsible professor(s)). – In Comnet there are 5 research fields represented: • Communications Engineering • Network Economics • Information Theory • Networking Technology • Teletraffic Theory • Supervisor of the doctoral student usually is also responsible professor of the research field
  • 28. Scientific practises and principles • Scientific practises and principles (5-20cr): – The aim is to provide students key characteristics of scientific research and scientific knowledge. Students learn to apply the principles of good scientific practice. – The study module may include studies in research methodology, research ethics and the history or philosophy of science and principles of scientific writing. – Also learning about university practices, such as teaching and guidance of research work, can be included. – The module may include some scientific preparatory tasks related to the research project and presentations in a scientific conference in the research field of the student.
  • 29. Doctoral thesis • Article dissertation, i.e., several scientific articles, published or accepted for publication, and a summary of these. – In joint papers the contribution of the doctoral candidate should be independent one. – It is not recommend that an article dissertation contains conference papers alone – Extended abstracts (1-2 pages) and papers published in national conferences must not be included in a doctoral dissertation • Monograph: Coherent scientific contribution on the research field. – In practice almost all monographs are based on papers published by candidate. – In case of monograph candidate must specify his or her own contribution to the dissertation – If number of papers on which the monograph is based is small, then the evaluation of a monograph is difficult. Such works require more often corrections and changes which means that the review process becomes longer https://into.aalto.fi/display/endoctoralelec/Instructions+for+writing+the+doctoral+dissertation
  • 30. Quality control • Doctoral Programme Committee of the School – Approve the research topic and confirm the study plans of doctoral students – Appoint the preliminary examiners for doctoral dissertation – Decide on the permission to publish dissertation manuscript – Appoint the opponent(s) for the defense – Grade dissertation • This is true quality control – There are many cases in which committee has given negative decisions in different phases of the doctoral degree process.
  • 31. Doctoral thesis: Examples • Ömer Bulakci: ”Backhaul Link Enhancement and Radio Resource Management for Relay Deployments”, 2013 – Main publications: 5 Journal papers and 6 conference papers – Length: 76 pages (the summary part) • Jarno Nousiainen: “Forwarding Capacity in Large Wireless Multihop Networks”, 2013 – Main publications: 1 Journal paper and 7 conference papers – Length: 126 pages (the summary part) • Muhammad Al-Rawi: “Opportunistic Packet Scheduling Algorithms for Beyond 3G Wireless Networks”, 2010 – Monograph, 176 pages – Materials from 1 Journal paper and 6 conference papers included • More dissertations can be found from http://otalib.aalto.fi/en/collections/e-publications/dissertations/
  • 32. Funding and supervision • Most usual sources for funding – University research projects: Mosth usual way of funding – Grants from doctoral programmes: Heavy competition – Work outside the university: Part time students working in e.g. industry (Nokia, Ericsson, operators) – Other grants: Some international students fund their studies from grants they have gained in their home countries – https://into.aalto.fi/display/endoctoralelec/Financing+your+studies • Supervision – Depends on the supervisor working style and student’s needs. – Typically weekly/biweekly/monthly follow-up meetings where progress is followed, joint publications prepared, project, teaching and other things updated.
  • 33. Degrees granted 2008 2009 2010 2011 2012 2008 2009 2010 2011 2012 D.Sc. (Tech.) 2 4 7 8 7 Lic.Sc. (Tech.) 3 1 1 2 M.Sc. (Tech.) 81 91 144 68 58
  • 35. Grand Challenges Carbon-neutral networking • Sustainable communications • Connecting the remaining 2 billion to mobile and 5 billion to Internet Instant wireless Internet • Wireless access delays below the limit of human perception Scaling the Internet to a thousand devices per user • Internet of things, cyber-physical systems Secure cyber space • Network security, critical infrastructure protection 8/20/2013 Comnet 35 Source: EU FP7 project EARTH Source: NSN Source: Ericsson “Aalto University found a total of 2 915 automation devices in Finland that were accessible to just about anybody through the Internet – and vulnerable to cyber attacks.”
  • 36. Communications and Information Theory Computational methods in discrete matematics and information theory Prof. Östergård • Mathematical objects (existence and classification problems) • Combinatorial algorithms Advanced Transmission Methods Professors Hämäläinen and Tirkkonen • Space-time codes, • Codeboodk design for MIMO systems • Optimized CQI feedback • Nonlinearity (DirtyRF) 8/20/2013 Comnet 36 libexact package Beamforming codebooks based on Grassmannian Packings
  • 37. Advanced Radio Communication Systems (1/2) Professors Hämäläinen, Jäntti and Tirkkonen Cognitive radio and spectrum aware communications • Co-primary and secondary sharing • Overlay (black space) and underlay (D2D) transmissions • Interference modeling and control Wireless broadband systems and system optimization • HETNETS and deployable networks • Small cells, relays • Self-organization & self-optimization • RRM • Energy efficiency 8/20/2013 Comnet 37 Cognitive radio network testbed TVWS Assesment tool http://quasar.netlab.hut.fi/ 3GPP compliant simulation tools
  • 38. Advanced Radio Communication Systems (2/2) Wireless Sensor Systems Professors Jäntti and Ott • Real-time sensing • HW & SW Architectures • Development and testing tools • Protocols • IoT, automation, and military applications • RF tomographic imaging and Device Free Localization (DFL) 8/20/2013 Comnet 38 Software Model LowLevel Automated Daemons Middleware Application Level Comm.Stack RTOS - APIsPeripheral Drivers Power Manager “Time SYNC”er Device Abstraction APIs Sys Monitoring Comm. Drivers Application Transport Network MAC PHY pRoot node and middeware DFL System http://wsn.aalto.fi/en/
  • 39. Performance analysis and teletraffic theory Queuing theory and teletraffic theory Prof. Aalto • Age and size based scheduling • Dispatching problems • Flow level performance analysis • Internet traffic engineering • P2P, wireless networks, M2M communications,… Performance measurements Prof. Manner • Energy-consumption measurements • Experimental data center • Internet traffic measurements • Mobile access speed measurement service: Netradar (http://www.netradar.org/en) 8/20/2013 Comnet 39 Comnet data center Size- and state aware dispatching Netradar
  • 40. Internet technologies (1/2) Professors Kantola, Manner, and Ott Networking technology • Carrier grade Ethernet • Access and core networks • Software defined networking (OpenFlow) • Energy efficient communications and networking Network security and trust • Internet wide trust / Evolution of cooperation • Customer edge switching • Cyber security: Security of critical infrastructure 8/20/2013 Comnet 40 Control place for Carrier-Grade Ethernet Network Analysis of Cyber weapons and attacks
  • 41. Internet technologies (2/2) Internet protocols • End-to-end transport, multipath transport, flow and congestion control • Customer Edge Traversal • Transport layer cognitivity • Opportunistic Networking • DTN routing, transport, and application protocols • P2P • Content-based networking • Multimedia protocols • Energy efficient operation • IETF standardization Military communications • Tacoms - Tactical Communications for Federated Network Environment • Generic messaging protocol (MICS) 8/20/2013 Comnet 41 The ONE simulator for Opportunisti Networking http://www.netlab.tkk.fi/tutkimus/dtn/theone/ Proxies for Energy-Efficient Web Access
  • 42. Network Economics Prof. Hämmäinen Quantitative analysis of mobile user behavior • Challenging the boundaries of complex data mining, privacy • Understand the behavior in context, social activity and service adaption/diffusion Optimal industry and technical architecture for flexible radio access • Enable flexible spectrum use: Technical, regulatory and economic rules Techno-economic bottlenecks of Internet scalability • Identify and eliminate techno-economical bottlenecks preventing the scaling of Internet 8/20/2013 Comnet 42 Spectrum regulation phase diagram Contextual patterns in mobile service usage
  • 43. Publications 8/20/2013 Comnet 43 0 20 40 60 80 100 120 140 160 180 200 90 141 143 170 186 All publications 2008 2009 2010 2011 2012 0 20 40 60 27 32 33 53 60 Journal articles 2008 2009 2010 2011 2012
  • 44. Advanced Radio Communications Research Group • ~ 6 D.Sc. level researchers • 20-25 Doctoral students • Variable number of M.Sc. thesis workers Jyri Riku Olav Profs:
  • 45. Some research partners (with whom we have joint publications and/or research projects) • Colleagues in Aalto • University of Oulu • Tampere University of Technology • VTT • Nokia Siemens Networks (Germany, Finland, Denmark, C hina) • Nokia Research Center • Renesas Mobile • Ericsson Research • Huawei Technologies • Royal Institute of Technology KTH (Sweden) • University of California at Davis (USA) • Yonsei University (Korea) • Beijing University of Posts and Telecommunications (China) • Peking University (China) • Worchester Polytechnic Institute (USA) • UPC, Barcelona • Texas A&M (USA) • National University of Cordoba (Argentina) • Aalborg University