Skip to main content

Digital communicationLaajuus (5 cr)

Code: TI00BI21

Credits

5 op

Responsible person

  • Martti Kettunen

Objective

You are able to calculate the theoretical limits of data communication channels.
You manage the most important coding and modulation methods.
You are able to implement an error detection and correction method.
You know data compression and encryption methods.
You understand the function of blockchains.

Content

How to calculate the highest possible data transmission rate for a communication channel?
How to select a proper modulation method?
Why are data forward error correction methods used?
Are there any benefits or drawbacks in using data compression?

Qualifications

Mathematics 1
Mathematics 2

Enrollment

06.11.2023 - 17.11.2023

Timing

15.01.2024 - 30.04.2024

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Campus

Kotka Campus

Teaching languages
  • Finnish
Seats

15 - 30

Degree programmes
  • Degree Programme in Cyber Security
Teachers
  • Vesa Kankare
Teacher in charge

Martti Kettunen

Groups
  • KTKT22SP
    Cybersecurity, full-time studies

Objective

You are able to calculate the theoretical limits of data communication channels.
You manage the most important coding and modulation methods.
You are able to implement an error detection and correction method.
You know data compression and encryption methods.
You understand the function of blockchains.

Content

How to calculate the highest possible data transmission rate for a communication channel?
How to select a proper modulation method?
Why are data forward error correction methods used?
Are there any benefits or drawbacks in using data compression?

Materials

Online self-study material, online resources and laboratory exercises

Teaching methods

Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities.

Blended and Independent track:
You study the topics by yourself and execute required learning activities. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills

Employer connections

No

Exam schedules

Retakes are arranged as needed in agreement with the teacher

Student workload

Achieving the learning outcomes requires 135 hours of work of which about third are contact lessons and guided exercises and the rest are self study, practice exams and remote exercises

Evaluation scale

1-5

Assessment methods and criteria

Assessment is based on learning activities, assignments and exam.

Qualifications

Mathematics 1
Mathematics 2

Enrollment

07.11.2022 - 18.11.2022

Timing

09.01.2023 - 02.05.2023

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Campus

Kotka Campus

Teaching languages
  • Finnish
Seats

20 - 30

Degree programmes
  • Degree Programme in Information Technology
Teachers
  • Vesa Kankare
Teacher in charge

Martti Kettunen

Groups
  • KTKT21SP
    Cybersecurity, full-time studies

Objective

You are able to calculate the theoretical limits of data communication channels.
You manage the most important coding and modulation methods.
You are able to implement an error detection and correction method.
You know data compression and encryption methods.
You understand the function of blockchains.

Content

How to calculate the highest possible data transmission rate for a communication channel?
How to select a proper modulation method?
Why are data forward error correction methods used?
Are there any benefits or drawbacks in using data compression?

Materials

Online self-study material, online resources and laboratory exercises

Teaching methods

Scheduled track:
You participate into scheduled contact lessons. You studies are progressing in the pace of the group schedule and self paced learning activities.

Blended and Independent track:
You study the topics by yourself and execute required learning activities. In this case contact your responsible teacher in the beginning of the studies to agree on the required activities and demonstration of your skills

Employer connections

No

Exam schedules

Retakes are arranged as needed in agreement with the teacher

Student workload

Achieving the learning outcomes requires 135 hours of work of which about third are contact lessons and guided exercises and the rest are self study, practice exams and remote exercises

Evaluation scale

1-5

Assessment methods and criteria

Assessment is based on learning activities, assignments and exam.

Qualifications

Mathematics 1
Mathematics 2

Enrollment

08.11.2021 - 21.11.2021

Timing

03.01.2022 - 01.05.2022

Number of ECTS credits allocated

5 op

Mode of delivery

Contact teaching

Campus

Kotka Campus

Teaching languages
  • Finnish
Seats

15 - 35

Degree programmes
  • Degree Programme in Information Technology
Teachers
  • Vesa Kankare
  • Martti Kettunen
Teacher in charge

Martti Kettunen

Groups
  • KTKT20SP
    Cybersecurity, full-time studies

Objective

You are able to calculate the theoretical limits of data communication channels.
You manage the most important coding and modulation methods.
You are able to implement an error detection and correction method.
You know data compression and encryption methods.
You understand the function of blockchains.

Content

How to calculate the highest possible data transmission rate for a communication channel?
How to select a proper modulation method?
Why are data forward error correction methods used?
Are there any benefits or drawbacks in using data compression?

Evaluation scale

1-5

Qualifications

Mathematics 1
Mathematics 2