Free Essay

What Is Wi-Max

In:

Submitted By ajwd20
Words 1770
Pages 8
What is Wi-Max?

University of Maryland University College of Asia

Alvin William DeMore

Introduction

An explosion of mobile, wearable and traditional computing devices across the world, and their interconnections, has made computer security an area of paramount importance. Security is required for the computing host, applications running on it and the data being processed or exchanged between different applications or different hosts. In the security context, an application can be thought of as any executing thread or process, a host contains all such processes, and data is any information asset that can be accessed by an interactive user (Price, 2008, p. 170). A comprehensive definition of information security (IS) was given by the Committee on National Security Systems (CNSS): it is the protection of the critical elements of information, including usage, storage and transmission through systems and hardware components (Whitman & Mattord, 2012, p. 8). According to this model, IS has many aspects, such as physical protection of assets, protection against passive or active attacks, access control, risk minimization and assessment of threats and vulnerabilities (p. 11). Computer security is indeed a vast subject, and out of this I picked the specific subject of latest Wi-fi innovations. The reason is that wireless networking is being used more and more to connect various mobile devices and appliances, and I wish to research into this fast changing field. One of the new broadband wireless technologies being developed is WiMAX. This paper provides a brief overview of this emerging protocol and its implementation of security in terms of application, data and host.

Brief Overview of WiMAX

WiMAX, or Worldwide Interoperability for Microwave Access, is a Metropolitan Area Network (MAN) protocol based on the IEEE 802.16e-2005 standard. It works as a Broadband Wireless Access (BWA) system with applications in last-mile connectivity, mobile telephony, network backhauling, etc. (Nuaymi, 2007). WiMAX evolved from a series of precursor standards, such as the Wireless Internet Service Provider (WISP) of the late 1990s; the Local Multipoint Distribution System (LMDS) that utilized the 24-39 GHz portion; the Multichannel Multipoint Distribution System (MMDS) that utilized the 2.5 GHz band; etc. A schematic diagram of the technology is presented in Figure 1:

[pic]

Figure 1: Simplified representation of WiMAX technology showing both fixed and mobile usage. Source: Tang, Muller & Shariff, 2010, p. 7.

The IEEE implementation of the BWA 802.16 standard has two usage targets: the IEEE 802.16-2004 (802.16d) for fixed wireless access at home; and the revised IEEE 802.16e-2005 (802.16e) for mobile users who need fast, uninterrupted switching between cells. Compared to other wireless standards such as “Wi-Fi” or “Bluetooth”, WiMAX offers a greater range of up to 20 Km, while a few thousand clients can be simultaneously serviced by a single base station. The technology achieves typical transmission rates of 10 Mb/s, going up to 70 Mb/s under test conditions with a small number of users. While it can operate on the entire spectrum between 2-11 GHz, and use both licensed and unlicensed portions of it, practical usage is restricted to the 2.5 GHz, 3.5 GHz and 5.7 GHz bands. It is based on Orthogonal Frequency Division Multiplexing (OFDM), and uses the IP packet-based system for delivering voice and/or data packets (Abate, 2009). The WiMAX implementation concerns itself only with the physical (Layer 1) and MAC (Layer 2) strata, leaving the network (Layer 3) stratum open to innovations by 3rd party vendors. The high Line-Of-Sight (LOS) offered by WiMAX makes it particularly suitable for mobile internet access, whereby users can simply plug-in their WiMAX enabled clients into their laptops for seamless connectivity. In addition to implementing Quality of Service (QOS) features for voice and streaming applications, WiMAX also offers better security, with support for multi-level encryption at various points of the network, and guaranteed security mechanisms implemented through a separate security sub-layer (Tang, Muller and Sharif (Eds.), 2010).

Because of these advanced features, WiMAX has been sometimes described as “wireless on steroids”, and it is one of the most promising new technologies that are being evaluated by service providers across the world.

Security Implementation in WiMAX

Strong security was one of the design goals of WiMAX and has therefore been implemented as a separate sub-layer, called privacy and key management (PKM), within its MAC layer. This sub-layer can be used to provide message authentication via the HMAC or CMAC schemes, provide device or user authentication via the EAP method, and endure data confidentiality via the AES-CCM encryption algorithm (Shon et al., 2010, p. 1). Implementation of end-to-end security and quality of service (QoS) by WiMAX vendors is mandatory.

The WiMAX uses two types PKM security associations (SAs) – data and authorization. Data SA specifies the encryption method and algorithms for data communication between the base station (BS) and each user, also called subscriber station (SS). It is comprised of an authorization ID (SAID), encryption to protect message confidentiality, two traffic encryption keys (TEKs) with their own identifiers, a TEK lifetime, and an indicator specifying whether the SA is primary or dynamic. The authorization SA contains a user credential, authorization key (AK) with its identifier and lifetime, a key encrypting key (KEK), a downstream message identification key that uses a hash function (DHMAC), a corresponding upstream hashing key (UHMAC) and a set of authorized data SAs (Fernandez & VanHilst, 2008, p. 200). The SS can enter the network by sending a request to the BS that encrypted with its own 48-bit MAC ID and a manufacturer suppied X.509 certificate. Reply from the BS is in turn encrypted with its public key and this is followed by encrypted message transmission (p. 203). A complete overview of the WiMAX PKM is presented in Figure 2:

[pic]

Figure 2: Security implementation in WiMAX in the form of privacy and key management. Source: Fernandez & VanHilst, 2008, p. 200.

Attacks and Countermeasures in WiMAX
Although WiMAX has several attractive security features especially as a MAN protocol, there are several known exploits against both its physical layer and MAC layer – and appropriate countermeasures have also been developed in some cases. Some of these attacks are only theoretical, while others have actually been tested under operational conditions. The newest management version, PKMv.3, has not been properly examined by the community yet, so the exploits discussed here are based on PKMv.2. Attacks on the WiMAX security mechanism can be divided into several types, including handover, power saving, ranging, multicast/broadcast, mesh mode and control message attacks (Kolias, Kambourakis, & Gritzalis, 2013, p. 503). To pick one of these attack types, ranging is a network entry procedure in which the BS and SS agree on the correct timing and power offsets for their chosen physical connection mode. However, ranging occurs not only during initial connection, but periodically during the entire session. The latter messages are stateless and do not have encryption or identity protection, and this fact can be exploited in several ways. One method, known as RNG-RSP DoS attack, can be used against a single BS as well as multiple BSs; however, it requires knowledge of the Initial Ranging Connection Identifier (CID) being used by the intended victim (or SS). The attacker obtains the necessary CID by sniffing management messages between the BS and SS, creates a forged RNG-RSP message with “abort status” and sends it to the victim, forcing her to disconnect from the network, resulting in a denial of service. A variant of this exploit forces the victim to switch her channel, whereupon the SS must rescan for an available channel. Several attackers can collaborate to create distributed DoS (DDoS) attacks, with possibly disastrous consequences for the entire network (Bhargava et al., 2009, p. 375).

These exploits can be prevented by improving security of management messages. Naseer et al. (2008, p. 344) proposed implementation of a Diffie-Hellman key exchange protocol, with the public/private key pair being generated on the basis of the user’s basic CID and the initial ranging codes of the BS. This would enable both the BS and SS to know the correct keys and thus authenticate each other. Another countermeasure is improving security of the PKM itself, for example by creation of timestamps that would thwart replay exploits. A further improvement is combining timestamps with nonces, which has the further advantage that clock synchronization between the BS and SS is not essential (). The TEK sequence number can also be increased from 2 bits to at least 12 bits, thus exponentially increasing the number of keys (Sreejesh & Sebastian, 2010, p. 34).

Conclusion

Computer security is an ever changing field, with new exploits and their countermeasures being announced almost every day. The use of wireless communication networks for the delivery of a wide variety of services, ranging from personal to enterprise to financial, is only making the implementation of strong wireless security all the more essential. As vendors come up with new protocols and service delivery mechanisms, it is to be hoped that various standards bodies will also strive to keep devices, applications and data secure.

References

Abate, Z. (2009). WiMax RF systems engineering. Norwood: Artech House.

Bhargava, B. et al. (2009). Collaborative attacks in WiMAX networks. Security and Communication Networks, 2, 373–391.

Fernandez, E. B. & VanHilst, M. (2008). An Overview of WiMAX Security. In S. Ahson & M. Ilyas (Eds.), WiMAX standards and security (197-204). Boca Raton, FL: CRC Press.

Kolias, C., Kambourakis, G., & Gritzalis, S. (2013). Attacks and Countermeasures on 802.16: Analysis and Assessment. IEEE Communications Surveys & Tutorials, 15(1), 487-514.

Naseer, S., Younus, M., & Ahmed, A. (2008). Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A Survey. In Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD ’08, 344-349.

Nuaymi, L. (2007). WiMAX: technology for broadband wireless access. Chichester: Wiley.

Price, S. M. (2008). Host-Based Security Challenges and Controls: A Survey of Contemporary Research. Information Security Journal: A Global Perspective, 17, 170-178.

Shon, T. et al. (2010). Novel Approaches to Enhance Mobile WiMAX Security. EURASIP Journal on Wireless Communications and Networking, 2010, 1-11.

Sreejesh, S. & Sebastian, M. P. (2010). A Revised Secure Authentication Protocol for IEEE 802.16 (e). In International Conference on Advances in Computer Engineering (ACE), 34-38.

Tang, S. Y., Muller, P., & Shariff, H. (Eds.). (2010). WiMAX Security and Quality of Service: An End-to-End Perspective. Chichester: Wiley.

Whitman, M. E. & Mattord, H. J. (2012). Principles of information security, 4th Ed. Boston, MA: Course Technology Cengage Learning.

Similar Documents

Premium Essay

Strategic Management

...Introduction Bangladesh’s telecommunications industry Mobile phone has become a crucial part of Bangladesh's everyday-life and has made a “safe haven” in one of people’s pockets much like their wallet that they never want to leave home while they head for our work. The telecom-revolution and its persistent evolution together have made it possible even in developing countries like Bangladesh. This is the leading device that people now express themselves through, get their work done and share their pains and pleasures with (Blitz). The almost exponential enlargement in the Telecoms sector in Bangladesh in the last 5-10 years has had the same transformative impact on Bangladesh's economy as the growth of Ready Made Garments and Remittances. As well as being the largest provider to Foreign Direct Investment and tax revenues, the catalytic effect of rapid mobile infiltration on increasing the quality of life of tens of millions of people has been significant (The News Today). The number of mobile phone subscribers in Bangladesh achieved 82.442 million in November 2011 (The Independent, 2012), 92.12 million at the end of May 2012 (People’s Review) and subscribers has reached 110.675 million at the end of September 2013. Major players Bangladesh has 6 mobile phone operators: 1. Grameenphone – a joint venture enterprise between Telenor and Grameen Telecom Corporation (Wikipedia, a) 2. Banglalink – a wholly owned subsidiary of Orascom Telecom (Wikipedia, b) 3. Robi – a joint venture...

Words: 1467 - Pages: 6

Premium Essay

Mis Networking Questions

...2. What are the main telecommunications transmission media and types of networks? Name the different types of physical transmissions media and compare them in terms of speed and cost? Twisted wire consists of strands of copper wire twisted in pairs and is the oldest transmission medium. Many telephone systems had twisted wires installed for analog communication but can also be used for digital. The twisted wires used in today’s LANs, such as CAT5, can obtain speeds up to 1 Gbps but is limited to a maximum run of 100 meters. Coaxial cable consists of thickly insulated copper wire that can transmit a larger volume of data than that of twisted wire. Coax was used in early LANs and is still used for longer runs on larger buildings. Coax has a maximum speed of up to 1 Gbps. Fiber-optic cable has bound strands of clear glass fiber – each one the thickness of human hair. Data is transformed into pulses of light that are then sent through the cable by a laser device at rates varying from 500 Kbps to several trillion bits per second. Fiber-optic is considerably faster, lighter, and durable that wire media and well suited to systems requiring transfers of large volumes of data. But it is more expensive and harder to install than other physical media. Define a LAN, and describe its components and the functions of each component. LAN is a local area networks connect PCs and other digital devices together within a 500-meter radius and used for many corporate computing tasks...

Words: 1021 - Pages: 5

Free Essay

A Report on Business Plan

...part of the report to enrich it. We believe that with our limited knowledge, this report will provide a core concept about a Business plan. We have tried our level best to put thorough efforts for preparing the report. Any shortcoming or flaw may arise as we are very novice in this aspect. We will wholeheartedly welcome any clarification and suggestion about any view and conception disseminated in our report. Sincerely Yours Member of the GlobeNet BBA, 5th Semester (Sec-B) Department of management studies Group List Executive Summary GlobeNet Wireless Broadband will be an innovative start-up company that will provide wireless broadband internet connections to several Dhaka Metropolitan Areas utilizing Wi-MAX technology, proprietary antennas and repeaters. GlobeNet will be able to serve a larger area with broadband Internet connections. GlobeNet will be founded by Fahad Karim, with a MBA and an undergraduation on Computer Science from Harvard University (USA), Fahad has the skills to execute on this well-researched business plan. Fahad spent two years at Karim Associates, which gave him not only an incredible and reasonable boost in confidence to accomplish a business venture, but also provided him with solid project management skills and experience. The market for wireless broadband Internet connection in Bangladesh is new but widely open. Demand for traditional broadband connections is a surpassing forecast. The wireless...

Words: 4005 - Pages: 17

Premium Essay

Cmgt 400 Week 3

...Securing and Protecting Information CMGT 400 April 8, 2013 Securing and Protecting Information Authentication With the advances in technology, authentication has become part of our everyday lives, whether scanning your badge at work, signing for a credit card purchase, or logging into your Facebook/Twitter accounts. Authentication is the act of validating your identity while requesting access to software, purchases, or entry to a secured facility. There are four types of authentication; something you know, something you have, something you are, and something you can produce. When a service requests two or more types of authentication, it is called strong authentication, such as inserting an identification card and providing a password to access a computer workstation. “Something you know” refers to the use of passwords, passphrases, and codes or PINs. When creating a password, the user must make the decision to create a string of alphanumeric and special characters with differing cases. The longer and more complicated a password the user creates drastically reduces the risk of cracking or brute force attacks. The same password must also be something easily remembered by the user to dissuade it from being written down and stored onsite or left at the workstation. A solution to this is creating a passphrase, a common phrase or date abbreviated and linked together with special characters to create a personal passphrase difficult to crack but easy to remember. An example...

Words: 1768 - Pages: 8

Free Essay

Game Theory

...to spiritual activities along the lines of the human capital literature. Several testable implications are analyzed. We study exogenous and endogenous changes in life expectancy, and we argue that the traditional value of life or willingness to pay formulas for reductions in risks to life have to be modified when we account for afterlife utility. The model is then extended to rationalize the existence of suicide bombings and to discuss the complementarity between religiosity and patience. Jews, Christians, and Muslims all profess belief in immortality, but the veneration paid to the first century of life is proof that they truly believe only in those hundred years, for they destine all the rest, throughout eternity, to rewarding or punishing what one did when alive. [J.L. BORGES, ”The immortal”.] COMMENTS WELCOME!. I’d like to thank Gary Becker for his encouragement and the very helpful comments. I also thank the participants of the workshop of Applications of Economics at the University of Chicago for their comments. † E-mail: chevia@uchicago.edu. ∗ 1 1 Introduction Since the seminal paper of Azzi and Ehrenberg [1975] (AE hereafter) there has been an increasing interest in the economics of religion. This literature is growing substantially, specially since the work of Iannaccone ( e.g. [1984], [1990], [1992]). The main idea of this field is to use the tools provided by economic theory to analyze questions about the allocation of time and resources to religious activities...

Words: 7590 - Pages: 31

Premium Essay

Beyond the Bean

...the knowledge to help understand game rules - No wi-fi - Games purchased second hand - Limited selection of alcoholic beverages (beer and wine)  needs liquor license ( cost $ 1055) o Insurance premium increase, staff training, liabilities - 11 am to 11 pm weekdays and until midnight on weekends - A few months later hopefully they could hire additional staff - Maximum capacity of 50 customers The Industry - Unemployment in the city 8.8% higher than any other major city in Ont. Other than Windsor - Loss of discretionary spending, but this can be an inexpensive form of recreation - Even during the recession the growth rate of 20 % annually during the last decade in the US, similar to Canada (assumption) - Board game popularity increased and sales increased 100% in the last 5 years - This business is popular in Europe and Asia Competition -Direct - Recreational experience in the Richmond Row - Fleetway- bowling alleys and billiards, positioning: new dimension in entertainment , DQ food drink (no alcohol) and targeted children, teenagers and adults - Palasad North- two locations, dining room, bar/lounge, sofa seating , fireplace, billiars and bowling alleys, bar, arcade, focus on big events with large groups, positioning: eat!- Drink!- Bowl! Resturant was more popular Competition- Indirect -Tim Hortons- very popular and successful but a fast- food ambiance -Starbucks: home-style ambiance, free Wi-Fi, premium coffees and pastries -Williams Coffee...

Words: 646 - Pages: 3

Free Essay

Indoor Positioning

...Title: Indoor Positioning using Sensor-fusion in Android Devices Abstract: This project examines the level of accuracy that can be achieved in precision positioning by using built-in sensors in an Android smartphone. The project is focused in estimating the position of the phone inside a building where the GPS signal is bad or unavailable. The approach is sensor-fusion: by using data from the device’s different sensors, such as accelerometer, gyroscope and wireless adapter, the position is determined. The results show that the technique is promising for future handheld indoor navigation systems that can be used in malls, museums, large office buildings, hospitals, etc. Keywords: Sensor fusion, accelerometer, gyroscope, compass, INS, GPS, Wi-Fi, indoor navigation, smartphone, Android, Nexus S Language: English Approved by: _____________________________________ Kamilla Klonowska, PhD, HKr Date Examiner SUMMARY In open air environment a GPS receiver is able to determine its position with very high accuracy. Inside a building, where the GPS signal is bad or unavailable, the position estimation from the GPS receiver is very erroneous and of no practical use. Main...

Words: 15879 - Pages: 64

Premium Essay

Final Exam Study Guide

...1. What is a byte? A: 8 Bits 2. When using a truth table, 1 and 0 equal ______. A: 0 3. What do parentheses do in mathematical equations? A: Ensure that whatever operation is inside the parentheses is performed first 4. What is a node on a network? A: Any device connected to a network. 5. Which of these following physical topologies has the inherent weakness of a single point of failure? A: Star Topology 6. What is the protocol for internet? What are the parts of a web address? A: HTTP7890-= 7. What is basic to every networking standard? A: IEEE 8. Why is the TCP/IP model divided into layers? A: For Troubleshooting and Teaching 9. Which layer of the OSI model (shown below) is responsible for encryption and compression? A: “OSI-7”, “TCP/IP-5” 10. What is a closed electrical circuit? A: A circuitry running currency from – to +. 11. What is a network encoding scheme? A: A Character Set 12. What causes full duplex to transmit and receive simultaneously? A: 4 wires, one pair dedicated to transmit and another to receive data at the same time. 13. Max cable length for cat-5? A: 100m or 328ft 14. What is 802.3? What is 802.11? A: 802.3= Ethernet, 802.11= Wi-Fi 15. What is meant by Ethernet “bit rate” as defined by IEEE standards? A: How many calculations done per second in the exchange of packets. 16. What is the pin out for a cat-5 cable? A: Wires 1, 2, 3, and 6 17. In wireless networking what is a site survey for?...

Words: 1163 - Pages: 5

Free Essay

How to Investigate Stuff

... Do not subject the device to severe impact or drop it from heights.  Do not use the device in extreme hot or cold, dusty or damp conditions. Do not  Avoid using the device near strong magnetic fields.  Normal functioning of the product may be disturbed by ESD. If so, simply reset Safety Precautions expose it to direct sunlight.                 and restart the device following the instruction manual. During file transmission, please handle with care and operate in a static-free environment. Keep the device away from water and other liquids. In the event that water or other liquids enter the device, power off the product immediately and clean the device. Do not use chemicals to clean the device in order to avoid corrosion. Clean it with a dry cloth. Do not install this equipment in a confined space such as a book case or similar unit. The ventilation should not be impeded by covering the ventilation openings with items such as newspaper, table-cloths, curtains etc. No naked flame sources, such as lighted candles, should be placed on the apparatus. Attention should be drawn to environmental aspects of battery disposal. Use the apparatus in moderate climates. We are not responsible for damage or lost data caused by malfunction, misuse, modification of the device or battery replacement. Do not attempt to disassemble, repair or modify the product. This will invalidate the warranty. If the device will not be used for an extended period of time, please charge...

Words: 12681 - Pages: 51

Free Essay

Cis500

...Introduction In the timeline of mobile phone technology, 3G technology will always be tied to the introduction of the smart-phone; but as our mobile phones evolve so does our technology. Our society is a demanding one and for the technologically savvy those demands are in the form of mobility, connectivity and faster mobile technology. 1. Compare and Contrast 3G Wireless Networks to 4G Networks in terms of : Service and Applications In today’s services and applications, the 3G wireless networks offer CDMA2000, UMTS, and EDGE plus other technologies in the list, while 4G networks offer Wimax2, LTE-Advance and HSPA+. Both of 3G and 4G are standards for mobile communications, primarily the 3G networks are designed for voice communications while the 4G networks are designed especially for data transmission rather than voice and it offers faster access to data in mobile phones. For example, 3G is a preferred for mobile phone games, especially those which contain graphics and animation, but for streaming videos, the 4G works better with less stuttering and a higher resolution. Similarly, video conferencing, IP telephony and even 3D television work better with faster data transmission offered by 4G. Network Architecture Essentially, the 3G network is defined as Wide Area Cell Based network with a circuit switched fall-back which it relies on large satellite connections allow connection to many different telecommunication towers. While the 4G networks are based on integration...

Words: 1893 - Pages: 8

Free Essay

Network Attached Storage

...computer that stores and shares files through a network instead of a hard cable. It shares files with other computers through the air the same way wi-fi sends an internet connection through the air. This method of file sharing is ideal for the workplace such as, corporate offices, small offices, or even small businesses like restaurants where mass storage needs to be shared between many computers. Here I will provide more specifics about network attached storage devices, such as communication speed, capacity, fault tolerance, and management capabilities. When dealing with communication speed we must look and the size of information being transferred. Typically, the regular communication speed is a 1 gigabit Ethernet connection but, this can be changed to multiple gigabit. It is hard to say what the max capacity of a network attached storage device is because there are many different adapters that can be used to add on more storage. After doing some research, the biggest set up I found was 72 terabytes. This was done using a 1 to 5 port replicator on a board with 6 SATA ports. Fault tolerance is important because it is how you set up your boards in case a drive fails. The raid 50 set up is one of the most common set ups but raid 10 is the most reliable. No management capabilities were found at this time. One question I was asked was what would be an advantage of all family photos and videos being stored on a network attached storage device in a family where both parents and children...

Words: 371 - Pages: 2

Free Essay

Image Reconstr

...SIAM J. IMAGING SCIENCES Vol. 1, No. 3, pp. 248–272 c 2008 Society for Industrial and Applied Mathematics A New Alternating Minimization Algorithm for Total Variation Image Reconstruction∗ Yilun Wang†, Junfeng Yang‡, Wotao Yin†, and Yin Zhang† Abstract. We propose, analyze, and test an alternating minimization algorithm for recovering images from blurry and noisy observations with total variation (TV) regularization. This algorithm arises from a new half-quadratic model applicable to not only the anisotropic but also the isotropic forms of TV discretizations. The per-iteration computational complexity of the algorithm is three fast Fourier transforms. We establish strong convergence properties for the algorithm including finite convergence for some variables and relatively fast exponential (or q-linear in optimization terminology) convergence for the others. Furthermore, we propose a continuation scheme to accelerate the practical convergence of the algorithm. Extensive numerical results show that our algorithm performs favorably in comparison to several state-of-the-art algorithms. In particular, it runs orders of magnitude faster than the lagged diffusivity algorithm for TV-based deblurring. Some extensions of our algorithm are also discussed. Key words. half-quadratic, image deblurring, isotropic total variation, fast Fourier transform AMS subject classifications. 68U10, 65J22, 65K10, 65T50, 90C25 DOI. 10.1137/080724265 1. Introduction. In this paper, we propose a fast...

Words: 12310 - Pages: 50

Premium Essay

Marketing

...Assignment Front Sheet Qualification Pearson BTEC Level 5 HND Diploma Business Student Name Unit Number and Title Y-601-1259 / Unit 19 / Marketing Planning Student No. Assessor name Date of Issue 16th February 2015 TOM FARNSWORTH Completion date Submitted on 27th March 2015 Assignment title Unit 19: Marketing Planning Learning outcome Assessment criteria In this assessment you will have the opportunity to present evidence that shows you are able to Task No. Evidence (Page no) 1 Be able to compile marketing audits 1.1 1.2 1.3 1.4 2 3 Understand the main barriers to marketing planning Be able to formulate a marketing plan for a product or service 2.1 2.2 3.1 3.2 3.3 Review changing perspectives in marketing planning Evaluate an organization’s capability for planning its future marketing activity Examine techniques for organizational auditing and for analysing external factors that affect marketing planning Carry out organizational auditing and analysis of external factors that affect marketing planning in a given situation Assess the main barriers to marketing planning Examine how organizations may overcome barriers to marketing planning Write a marketing plan for a product or a service Explain why marketing planning is essential in the strategic planning process for an organization Examine techniques for new product development 2 (b) 1 (b) 1 (a) 1 (e) 1 (c) 1 (d) 2 (e) 2 (a) 2 (c) 1 3.4 3.5 4 Understand...

Words: 5273 - Pages: 22

Premium Essay

Essay On Causes Of Poverty

...Khaled ALDhaheri 12-C 03/02/17 ALDhaheri195@gmail.com Day1/BLOCK1 The Causes of Poverty Poverty is One of the most dangerous things that happened in Earth, Because Poverty Can spread Diseases like Malaria, AIDS and more diseases that can lead to death and when people can’t afford food or something to eat this is a problem that the Government cases, Because the Government should give their people jobs and money so they can buy themselves something to eat and to their kids. People Around the world die and some of them die from the diseases of poverty and Hunger. The diseases can spread all around the World...

Words: 840 - Pages: 4

Premium Essay

Btec Assignment

...Assignment Front Sheet Qualification Unit Number and Title Pearson BTEC Level 5 HND Diploma Business Y-601-1259 / Unit 19 / Marketing Planning Student Name Student No. Assessor name TOM FARNSWORTH Date of Issue Completion date 16th February 2015 Assignment title Learning outcome 1 Be able to compile marketing audits 27th March 2015 Unit 19: Marketing Planning Assessment criteria In this assessment you will have the opportunity to present evidence that shows you are able to Task No. 1.1 Review changing perspectives in marketing planning Evaluate an organization’s capability for planning its future marketing activity Examine techniques for organizational auditing and for analysing external factors that affect marketing planning Carry out organizational auditing and analysis of external factors that affect marketing planning in a given situation Assess the main barriers to marketing planning Examine how organizations may overcome barriers to marketing planning Write a marketing plan for a product or a service Explain why marketing planning is essential in the strategic planning process for an organization Examine techniques for new product development 2 (b) 1.2 1.3 1.4 2 3 Understand the main barriers to marketing planning Be able to formulate a marketing plan for a product or service Submitted on 2.1 2.2 3.1 3.2 3.3 Evidence (Page no) 1 (b) 1...

Words: 5273 - Pages: 22