Tuesday, August 6, 2019

RoseColored Glasses and The Glass Menagerie Essay Example for Free

RoseColored Glasses and The Glass Menagerie Essay The Glass Menagerie is about a dysfunctional family that consists of a mother, and her two adult children, Tom and Laura. All of them dream to seek comfort and to escape reality because none of them enjoys the life they lead. Similarly, in Rose-Colored Glasses, the narrator of the poem is inclined to dream rather than to face reality because she has not overcome the transition from one big happy family to getting kicked out of her old home and having divorced parents. These two families are reflections of each other because in both families, the characters rely on dreaming to overcome not only the fathers abandoning the family, but also to escape the financial and emotional despair in their livesboth of which are direct impacts from the fathers absence. Faced with disappointment because the fathers desert the family, the characters In Tennessee Williams The Glass Menagerie and Elizabeth Alexanders Rose-Colored Glasses, withdraw into their distinct worlds to escape the expectations that reality demands. Disappointment is a theme in both the story and the play and with similar impacts on the family. The first time the characters face disappointment is when the fathers leave the familyone through divorce, the other fell in love with long distances. The first impact is emotional despair for both families. In the Wingfield family, Amanda openly expresses her remorse and regret for marrying the absent father. Tom is emotionally distraught because he has to fill his fathers shoes in providing for the family when all he wants to do is to leave and become a sailor. The narrator in Rose-Colored Glasses experiences sadness because her family is broken apart. Besides emotional despair, both families are faced with financial problems. The narrator is kicked out of her apartment which is even more beautiful then it was then, and perfect. This shows how much she wants it back and how sad she must have been when she moved. As for the Wingfields, Tom makes so little money that he has to sacrifice the money for the light bill in order to pay for membership in the Merchant Marines. Laura is deeply disappointed when Jim tells her he is engaged that she may never have renewed hope for anyone again. Disappointment is a theme that partly drives the characters to retreat more so into their illusional worlds in order to escape emotional hurt and financial problems in the real world. The illusional worlds that the characters imagine themselves to be in are sometimes caused by the theme, expectations. Amanda expects Laura to be just like her and actually dreams Laura can be if she just develops vivacity and charm. Amanda fantasizes that these traits can easily be developed if one wills it. However, this is not an easy task for Laura because she is extremely shy. Although Laura is never expecting any gentlemen caller, Amanda never stops telling her to stay fresh and pretty because its almost time for our gentlemen callers to start arriving! 10 From this, we can tell that Amanda expects too much that in her mind, it becomes believable. In another scene, Amanda expects Tom to find Laura a husband in order to secure her future. Amanda so strongly expects Jim to be Lauras future husband that she actually begins to believe it. She ends up over preparing the house and over dressing Laura. She later accuses Tom of playing a joke on her when in fact, she never minded to ask him about it. Laura, on the other hand expects something to come out of her and Jims meeting because he kissed her. She sits dazed after he kisses her, possibilly imagining that he likes her when in fact, this is a false illusion created by her expectation. The narrator in Rose-Colored Glasses however, does not expect, but is expected from her mother to act grown up. When contrasting the time when she would Played checkers with a dolly being enough to be your sister and there was no desperation where one day [she] would cut off [her] tow long braids to now, she is obviously desperate to grow up because she is expected to be. during the years before the divorce she was still a child however the family breaks apart, she walks the passage to overcoming the impact of the divorce and during the process, matured. She feels obliged to deal with the divorce maturely, but at the same time does not want to stop being a child alotgehter, and so she retreats into her own illusional world where she can do whatever she wants. In order to escape disappointment and expectations in life, escapism is a theme in both Rose-Colored Glasses and The Glass Menagerie. Characters from both texts escape in one way or another in order to avoid confrontation with the harshness of reality. Tom goes to the movies to escape the mundane life he leads. Laura indulges in her glass menagerie and music to avoid her mothers expectations of her to socialize. Laura actually wants to be a part  of her glass menagerie and imagines herself to be. In fact, Lauras separation [from reality] increases till she is like a piece of her own glass collection. ixx Amanda and the narrator nostalgically reminisces their pasts as a way to escape. The narrator relives the past in her mind when there was no divorce and where you swung on a trapeze in the dining room archway and Plinked-plinked on the piano and Your little dogs nails scritch-scratching the hardwood floors when he heard you walking from the elevator. The narrator seeks comfort by immersing herself in her past, or perhaps she feels control over her life when she recalls these memories. Similarly, Amandas memories not only let her cling to another time, but also offer her escape from the blow to her self image when her husband deserted her. It is hard for any reasonable reader to believe that Amanda had 17 gentlemen callers in one day. She retreats so far into her world of illusions that this illusion becomes almost too real for her. She wears her yellow dress, believing that she can be just as youthful and vivacious as she was years ago when in fact, the dress is clearly out of place and time, and elicits surprise from both Jim and Tom. In both the novel and play, the theme disappointment leads the narrator in Elizabeth Alexanders Rose Colored-Glasses and Amanda, Tom and Laura in Tennessee Williams The Glass Menagerie to similar problemsthat is Amanda, Tom and Laura and the narrator become emotionally detached from the real world as they are left to cope with the disappointment that the fathers instill in them. Furthermore, the father leaves all his problems behind for the rest of the family which means every member of the family must fill new expectations in place of the father. Tom is expected to provide for the family, Amanda to care for her two children, Laura to get married so that she does not need to depend on Tom, and the narrator is expected to handle the divorce maturely. All of these expectations are against the wishes of the person expected to initiate them. Tom would rather become a sailor, Amanda to become youthful and to be given the chance to choose a new husband, Laura to become part of her glass menagerie world, and the narrator to live her childhood. All these expectations make reality hard to face and so the characters escape into worlds dreamt in their minds. Amanda and the narrator dream their old times, Tom dreams his sailing prospects, and Laura  dreams to be part of her glass menagerie world. Disappointment, expectation, and escapism are all central themes to both plays in order to convey the major theme that although the human need to dream may give one escape for a brief period of time, retreating too deeply into the dream can be harmful because you do not see reality as it is.

Monday, August 5, 2019

Selection Of Qualitative Descriptive Method Nursing Essay

Selection Of Qualitative Descriptive Method Nursing Essay Violence and aggression against nurses is a complex occupational hazard facing the nursing profession. Recently, the phenomenon has started receiving a growing national attention. Paradoxically, the job sector with the aim of providing to care for people appears to be at the highest risk of workplace violence. It   is   difficult   to   provide   an   accurate  and adequate definition   of   violence  and  aggression because  the opinion of a person of what  constitutes   violent   behavior   varies   between   cultures   and   social  backgrounds and often   the   limits   between   acceptable   and   unacceptable   behavior   can   be  various.  Ã‚   The  term  aggression is referred generally to the  behavior  that  aims to cause harm to   another  person. On the other hand, with term of violence we call characterize the  attack to  a  person  with  the  intent  to  cause  harm.  Violence  can  be  physical  or  psychological  it  includes:  Ã‚  Threatening  behavior  (expression  of  intention  to  harm,  threatening  body  language,  expression  of  verbal  or  written  threats), Verbal abuse, Humiliation, Destruction of  items, Assault (physical   violence, use of  weapons,  rape,  murder), Robbery. Nurses are among the workers in the workforce that many times during their daily duties can become recipients of a violent behaviour. Too frequently, nurses are exposed to violence primarily from patients, patients families, and visitors. This violence can take the form of intimidation, harassment, stalking, beatings, stabbing, shootings, and other forms of assault. The consequences from such behaviors can be many; first of all there is a risk of injury. On the other hand, the physiological effects for the nurses that faced a violent incident can result to fear, frustration, lack of trust in hospital administration, and decreased job satisfaction decreased desire for their own profession. Especially, if the violent incidences take place in the early carrier stages of nurses can even lead them to leave their profession. Violence not only affects nurses perspectives of the profession, but it also undermines recruitment and retention efforts which is a disadvantage threaten in the pa tients care effort. Problem area There is considerable evidence that workers in the health care sector are at greater risk of violence than workers in any other sector. The National Nursing council of Greece reveled data which indicate showed that half of all non-fatal injuries from occupational assaults and violent acts occurred in health care and social services settings (ENE, 2011). In addition, they reported that in a annually base, almost 10 in 10,000 employees in the health services sector suffer injuries that require time off from work. In a national survey conducted in 2008, the results report that in a generally at least 86 per cent of nursing staff has been the recipient of a violent behaviour during their employment. In the same survey, data demonstrate that less than the half of the physical violence incidents against the nurses were reported to the appropriate authorities (Gerberich et al., 2004). This, it happens mainly because of two reasons: a) The nursing staff has inadequate knowledge information about their rights or they do not trust the national system about the administration of their case regarding the dispensing of justice. b) A big part of the nursing staff has developed the wrong belief that the violent incidents are an expected part of the daily nursing routine that is inevitable. These factors are challenges that should be combated in the nursing profession. The requirements in order to achieve this goal are many; enhance of relevant legislation, administrative support of professionals, improve ment of knowledge of nurses about their rights and the appropriate naming of a legally accepted behaviour. Moreover, the recruitment and retention problem resulting from this violence is especially problematic. According to projections from the Greek Bureau of Labor Statistics, more than 20.000 new nurses will replace currently working register nurses by the next ten years in Greece. (Greek Bureau of Labor Statistics, 2011). This number can be consider as a much more higher if taking into consideration the number of nurses that are going to move in specialties that is less possible to phase a violent behaviour from patient of their familys members, for instance working in research area. In addition, recent research data indicate that more than the twenty per cent of registered nurses positions are vacant (ENE, 2001). Furthermore, this reduced number of the health care staff poses a risk regarding the receiving of good quality patient care across the Greek National Health care system, which reasonable is going to be decreased (ENE, 2004). The last years, there have been many efforts to characterize the dimensions size of the phenomenon of violence against nurses; some of them containing educational seminars of the violence in the workforce or the cultural understanding of health care providers about the violence during the performance of their occupational duties. However, only few of such activities have been tested in a adequate level in order to describe set their effectiveness or implemented on a wide scale basis. Sources of Data and Research One of the basic challenges in documenting violence that nurses have faced during their occupation is the absence of systematically organized and collected data in the past. Problems with the availability of data include few data sources to determine the magnitude of the problem and variations in definitions, data sources, and methods used in research. Research Question What are the nursing staff responses when caring for patients who express violent behaviors within the national health care units in Sparta, Greece? Aims and objectives Purpose and specific research issues The aim of this study is to investigate the effects of a aggressive behaviour from patients to the nursing staff. There will be an effort to meet the following objectives: 1. To report the experiences and responses of nursing staff when caring for patients with who exhibit aggressive behaviors. 2. To identify effective ways in improving the quality of nursing practice in this area. Research Methodology Here we focus on the research design and method for the research proposal. The selection of the appropriate research method is essential in order to achieve the aims and objectives of a study. Research design, simply can be referred as a map that explains all the conditions and the data under which the study was performed. The basic designs used in most of the research studies in order to collect the data and extract the research questions are methods based on qualitative or quantitative analysis. The goal of quantitative research is to generate research data that can be analyzed using numerical or statistical techniques. It actually focuses on the size, prevalence, frequency and quantifiable aspects of the analyzed problem (Polit Beck 2010). However, many researchers believe that the quantitative approach is limited because it does not address the meaning of life experience in depth that qualitative research can. On the other hand qualitative approaches are mainly suitable for coll ection of information with more a subjective approach regarding the examining phenomenon (Burns Grove 2008). Barbour (2009) suggests that the qualitative method is more adequate in order for studies that are more interested for the effect of a problem on the individuals associated with it. In this project, because of the type of the aims and objectives of the proposed research we have adopted a qualitative approach for analyzing explaining our final data. By choosing a qualitative method for the data analysis, we will be able to provide a detailed in depth explanation of the experiences and responses (Burns Groves 2011) of nursing staff who work with patients who express violent behaviour. Selection of qualitative descriptive method The number of approaches exist within qualitative research are various; some of them focusing on cultural national or sociological effects (Burns Grove 2011). All these approaches can provide us with valuable results, however in our case another qualitative research approach is selected; this method is called qualitative descriptive approach. The goal of qualitative description is not detailed explanation of the problem in order to conclude in the formation of a sociological explanation of a phenomenon. Here we aim for a straight description phenomenon is desired. This means we are not going to move away from the original data (Sandelowski 2000). This data analysis approach can provide as with the advantage of a direct explanation initially and then understanding of the nursing staff responses behaviour. Sample / Population The term of population can be referred as the total number of elements in which data can be extracted from. A sample is a subset of a population selected to partake in a study (Polit Beck 2010) which will be a source of information (Clifford Clark 2004). Identification and determination of the population who is more appropriate for our data collection from is the initial step of our research. The sampling source should be appropriate to provide us with adequate related to our research data. The Qualitative descriptive method is based on the analysis of a large volume of information. For this reason our sample population source is going to be a limited small number of nursing staff. In this project, we are going to use a sample of 50 participants. We are aware of the limitations of small sampling sizes, however qualitative research is more concerned with the phenomenon of interest and not the applicability of the findings in other contexts. The inclusion and exclusion criteria for participants in the groups will be as follows: Inclusion Criteria à ¢Ã¢â€š ¬Ã‚ ¢ Nursing staff that have face a violent incident in the past from a patient or from a member of his/her family. à ¢Ã¢â€š ¬Ã‚ ¢ More than one year work experience within the nursing field. Exclusion criteria à ¢Ã¢â€š ¬Ã‚ ¢ Agency staff working in the health care units at the time of the study. à ¢Ã¢â€š ¬Ã‚ ¢ Staff with less than one year of work experience. à ¢Ã¢â€š ¬Ã‚ ¢ Clinical nurse managers (as many times are responsible, directly or indirectly, for the violent behaviour). Data collection The data collection method should best suit the aims and objectives of the research. In our case the answers to our main research questions cannot be closed type answers. For this reason, we are going to work in a dialogue basis with the participants of the study. This, will provide us the required answers, open type answers about the experience and thoughts of nurses faced a violent incident in the past during the performance of their professional duties (Burns Grove 2011). Pilot study Procedure When the methodology has been developed, it is advisable to test it out before applying it to the actual sample. This procedure of testing it out is done by a means of a pilot study (Welman et al. 2005). According to Burns Grove (2011) a pilot study is simply a smaller version of the actual study done in preparation of a proposed study. Conducting a pilot study will authenticate the feasibility of conducting a larger scale study. This will help the research team to spot any problems with the research methodology and to refine and develop data collection instruments. For the proposed research a pilot study must be tested upon a smaller sample with a similar design as the actual study (10% of the final). A smaller focus group with only five nursing staff will be conducted by the researcher for the pilot study. The participants of the pilot study will not be permitted to participate in the main study. Depending on the outcomes of the pilot there maybe areas in the research methodology that the researcher may need to be modify. Data analysis According to Polit Beck (2010) data analysis is the systematic organisation and synthesis of research data. The analysis of data will take place in parallel with a data collection. The researcher intends to utilise qualitative content analysis. This is the ideal method for the analysis of qualitative description (Sandelowski 2000). Hsieh Shannon (2005) define qualitative content analysis as a research method for the subjective interpretation of the content of text data through the systematic classification process of coding and identifying themes or patterns. Inductive and deductive are the two methods of qualitative content analysis. The researcher will use the inductive approach because analysis is derived mostly from raw data. This approach will allow the researcher to immerse themselves in the data to allow new insight to emerge. Ethical Considerations Ethical issues are a central part of the research process (Burns Grove 2011). The principles underlying research are universal and concern issues such as honesty and respect for the rights of individuals in the study (Welman et al. 2005). In Ireland accountability when carrying out nursing research is specified by National Nursing Council (ENE) code of professional conduct for each nurse and midwife which states: In taking part in research, the principles of confidentiality and the provision of appropriate information to enable an informed judgment to be made by the patient must be safeguarded. The nurse has an obligation to ascertain that the research is sanctioned by the appropriate body and to ensure that the rights of the patient are protected at all times. The nurse should be aware of ethical policies and procedures in his/her area of practice. The right to self determination This ethical principal is based on respect for a persons autonomy (Burns Grove 2011). Participants in the research will be allowed to make a free and informed choice without coercion (Holloway Wheeler 2002). Potential participants will have the right to ask any questions concerning the study, refuse to give information and withdraw from the study at any stage. The right to Anonymity and confidentiality According to Barbour (2008) the need to preserve confidentiality and anonymity is an enshrined principle when undertaking qualitative research. Anonymity refers to the safest way of shielding confidentiality (Polit Beck 2010). Details such as names of the participants, location and residential care home names will be kept anonymous throughout the study and within the findings. Also we will ensure that identifying information is safely locked away. Passwords will be put in place to ensure that information in the form of computer software/data the data is not accessed by anyone else other than the members of the research team. Setting up these procedures will prevent any accidental breech of confidentiality (Polit Beck 2010). Proposed outcome of the study A report that will outline the research design together with the procedures applied for data collection and analysis will be written up at the end of the research process. A clear explanation of the findings and results will also be written up by the researcher. The researcher anticipates that the findings of the study will provide insight into the responses together with experiences of nursing staff when caring for patients with dementia who exhibit aggressive behaviours in Spartas health care units. This will also give the nursing staff an opportunity to reflect on their care for people with dementia who exhibit these challenging behaviours. If the findings of the proposed study are consistent with findings in the literature reviewed, then the following recommendations will be made: à ¢Ã¢â€š ¬Ã‚ ¢ Increased education and training on aggression mainly focused for nurses in residential care homes. à ¢Ã¢â€š ¬Ã‚ ¢ More research into the nursing staff role in residential care homes to establish best practice à ¢Ã¢â€š ¬Ã‚ ¢ The introduction of local and national Policies and procedures regarding reporting and recording incidences of aggression exhibited by people with dementia. à ¢Ã¢â€š ¬Ã‚ ¢ Set up of support systems for staff who experience aggression in this environment at a local and national level Limitations This is the first research study that will be carried out by researcher and this lack of experience may add on to the limitations of the study. Risks / benefits

Sunday, August 4, 2019

Lorraine Hansberrys A Raisin In The Sun Essay -- essays research pap

I really enjoyed the movie A Raisin in the Sun. It follows a black family's struggle to reach their long anticipated dreams. These dreams, and the struggles necessary to attain them, is one of the main focuses of the movie. The movie began with a husband, Walter, and wife, Ruth, fighting over Walter's dream to make it in the business world by using an insurance check as a down payment on opening a liquor store. He believes that if someone in the family would just listen to him and put forth their trust, his dreams would become a success. This episode illustrates a major conflict throughout the story. As Walter dreams bigger and bigger he seems to leave the â€Å"smaller†' things, such as his family behind. This movement away from the family is against the advancement of the values and morals ...

Essay on Things Fall Apart and Heart of Darkness -- comparison compare

The Tragic Fall in Things Fall Apart and Heart of Darkness      Ã‚   In Achebe's Things Fall Apart and Conrad Heart of Darkness, the role of Africa is intertwined. It is seen as extremely primitive and the African's belief system is belittled. The two heroes in the novels also are very similar, and most especially in one aspect. They both experience a downfall. This is a vital theme throughout both books. Aristotle would say it is the fall of two "tragic heroes". However, even though these two characters share these similar incidences, the readers are given several different perceptions of one event. The colonization of the Europeans paid a heavy toll on the Africans and their way of life. The Europeans are consistently portrayed at the outsiders. Okonkwo is also quite familiar with Africa, yet Marlow was not. In his eyes, the Africans are seen as the outsiders. Okonkwo's father, Unoka, was seen as a person who was very lazy and who made no contribution to their society. This made Okonkwo hate him and any trait of any kind that correlated wit h that of his father. One way that this is displayed is that "Okonkwo never showed emotion openly, unless it be the emotion of anger. To show emotion was a sign of weakness, the only thing worth demonstrating was strength" (Achebe 28). Okonkwo's greatest weakness was fear, yet this a contradiction in it's own terms. His fear of fear played such a big part of his adult life that it came back to haunt him. He never wanted to be considered a victim. Yet, ironically, he was only setting himself up to self-destruction and tragedy. Because of fear, it drives him pull his machete and strike a blow, first killing Ikemefuna and later the Court Messenger. Finally, this drives him to be physically abus... ...d, but instead because he could have been so great. Instead, he becomes cruel, unfeeling, and greedy. The true tragedy is that Kurtz did not become the great man that he could have been. Okonkwo and Kurtz were two men from the opposite ends of the spectrum. Their beliefs did not coincide, but they did have one aspect in common. They both brought themselves to the point of a tragic fall. For some reason or another, they both had to leave their homes. This is the marking of their fall. As soon as they do leave, the downfall begins, and it does not stop until there is nothing else to lose.    Works Cited Achebe, Chinua. Things Fall Apart. New York: Bantam Doubleday Dell Publishing Group, 1959. Conrad, Joseph. Heart of Darkness. New York: W.W. Norton & Company, 1988. Daniel, Patsy J. ConradÕs Heart of Darkness. Explicator. 54(3):164-165.      

Saturday, August 3, 2019

Transformation of Global Technology :: essays research papers

The increase in the flow of information between nations has proven to be a critical part of the developing international community. Deficiencies in this field have lead to the ill-preparation by the United States during the Bombing of Pearl Harbor and the attacks on the World Trade Center in September 2001. In both cases, critical data was received from surveillance instruments but was not acted upon expediently enough to avoid disaster. With the transition from a state-based threat to non-state terrorist organizations, the need for more thorough scrutiny then before has become paramount to the national security of the United States. When the term â€Å"global surveillance† is mentioned, it is usually referring to what has been deemed â€Å"signals intelligence.† This is the analysis of the target’s communication signals and it consists of four distinct parts: collection, processing, analysis and dissemination. In 1952, President Truman established the National Security Agency (NSA) with the dual responsibilities of providing information security for the U.S. government as well as organizing and obtaining intelligence information. Most recently, a global communications cooperative between the U.S. and the U.K. known as ECHELON, has been implemented to collect national security intelligence and spread critical information to its members. This program monitors commercial communications both over phones lines as well as the internet. In 1978, the U.S. Foreign Intelligence Surveillance Act (FISA) was passed which limited the wiretapping of â€Å"U.S. persons† for national security purposes. This legislation developed out of concerns that the United States was abusing its power to unjustly listen to citizens’s conversations. In order to avoid the dissemination of personal as well as national information, cryptography can be implemented to specifically keep unwanted viewers from tampering with internet and mail transactions.

Friday, August 2, 2019

The reigns of Justinian as the emperor of Byzantium during

The reigns of Justinian as the emperor of Byzantium during 527 to 565 BC and Romanus IV in 1068 to 1071 AD were two most important events in Byzantine. The former marked the stability and economic growth of the land and the former was known to start the end of the empire. Byzantine (Istanbul today), which was called as an extension of Roman Empire in eastern part, after it was captured and made it a province. Justinian known as ‘Justinian the Great’ according to Alexander A.Vasiliev â€Å"is the central figure of this entire period† (1954, 132) for invading Italy, pacifying Africa and controlling Persia from invading the land through his faithful and able generals named Belisarius and Mundo (Treadgold, 1997, 207). Romanus IV on the other hand had a strategy that did not work for him. Romanus IV gathered large army in troops enough to defeat the enemy, yet he lost the battle for he lost control of them due to disloyalty of his men.Justinian seldom joined the army, while Romanus was at the center of the battle. Justinian delivered direction and instruction to his trusted men, and Romanus IV if not misunderstood, was left alone by his warriors to seek refuge (Bradbury, 2004, 176). The challenges in the reign of Justinian were the uprising of the people and uncontrollable circumstances that weakened his control – the plagues and earthquakes that befell the land.Romanus IV’s challenges were much severe since he reigned at the time when Byzantine never had any recur but to drive away the Seljuk Turks to contain the territory at the midst of unfaithful generals and warriors. Justinian was just fortunate to have a wife and Belisarius who advised and obeyed his command. Romanus IV had a different case instead because he was caught unprepared despite a well-organized plan he made to win the battle.His greatest challenge was not the number of enemy but the sphere of his influence as a leader to execute commands. Romanus had no lawful men and he was unaware of that; besides, the empire was surrounded by men with greedy ambition. Bibliography Bradbury, J. 2004. The Routledge Companion to Medieval Warfare. USA: Routledge. Treadgold, W. 1997. A History of the Byzantine State and Society. USA: Stanford University Press. Vasiliev, A. 1954. History of the Byzantine Empire, 324-1453. USA: University of Wisconsin Press.

Thursday, August 1, 2019

OpenBTS

OpenBTS: A Way of Providing Internet Access to Developing CountriesAbstract The mobile network infrastructure of the twenty-first century is monolithic. It de facto closed and complex systems have few suppliers. They are mostly pre-internet protocol run, and their architectural concept keeps evolving. However, this evolution has not resulted in them being economical or flexible. Thus OpenBTS brings the empowerment that is needed to build and operate cellular networks. Given that the technologies and capabilities are necessary to make such systems is readily available. This paper will look at the OpenBTS. What it means, how it works, components needed to create it, how these components function about each other. Also, the paper will look at the cost involved in setting up OpenBTS and how viable it is in the developing nations.? OpenBTS: A Way of Providing Internet Access to Developing CountriesOpen Base Transceiver Station simply is known as OpenBTS is a GSM access point that is software based. It allows the use of mobile phones that are GSM compatible with voice over the internet protocol. The software is categorized as open source by its developers Range Networks. Its public release as an open source software revolutionized the lower three layers of the GSM protocol stack (Iedema, 22). The OpenBTS is abbreviated by the C++, as free software, its controlled by the GNU Affero General Public License terms and conditions. How the OpenBTS works. OpenBTS operates by replacing the third layer of conventional GSM operational infrastructure. As opposed to GSM system that forwards calls through the radio resource management protocol via base stations that are external, OpenBTS has internal units that perform this function. OpenBTS uses SIP to deliver calls to VOIP soft switch and therefore bypasses the need to route the call to the operator's mobile switching center Burgess (David ; Samra, 13). The VIOP software is installed, and the OpenBTS are installed in one computer to form a cellular network that delivers calls to VOIP soft switch and therefore bypasses the need to route the call to the operator's mobile switching center. The VIOP software is installed, and the OpenBTS are installed in one computer to form a cellular network that is self-sufficient. However, it also possible to configure several OpenBTS units to share a common VOIP switch to form a network.Other components of GSMGSM components can be divided into four areas. These are the MS (Mobile Station), BSS (Base-Station Subsystem, NSS (Network and Switching Subsystem) and OSS (Operation and Support Subsystem. These four elements within the GSM network operate together as one unit, and therefore users never realize the difference that exists in the System (Iedema, 32). The components would take the below shape regarding a diagram representation.The MS or mobile stations also known as the cell or mobile phones and is the part of the GSM network that is seen and operated by the users. Technological innovation has improved the size and functionality of this part of the network over the years. The mobile station has two elements that help it carry out its functions. These are the Hardware, and the Subscriber Identity Module often referred to as the SIM (David & Samra, 13). The SIM contains the user's information that the network uses to identify them and the IMSI which is the International Mobile Subscriber Identity (IMSI). The hardware contains the devices that are used to generate data and transmit it. It also contains the International Mobile Equipment Identity which is an international identification used to trace stolen phones. The BSS or Base Station Subsystem has two sections, the Base Transceiver Station (BTS) and the Base Station Controller (BSC). The BTS communicates with the mobile through an Um interface and associated protocols (Iedema, 24). The BTC provides radio resources that communicate with and control through an Abis interface. The NSS or Networking Switching Subsystem is the core element of the GSM network, and it contains several elements. These elements are Mobile Services Switching Centre which acts as the switching node and enables functions such as registration, authentication, and call location among other functions to be performed. The Home Location Register element contains the administrative information used to register the user to the network and direct calls appropriately. The Visitor Location Register contains information that allows individual users to access the services that they request. The Equipment Identity Register, checks for the International Mobile Equipment Identity to verify if the particular equipment is allowed to accesses the services. Authentication Center provides the link between the SIM card and the network through a key that helps in radio connection. The Gateway Mobile Switching Center is responsible for obtaining Mobile Station Roaming Number that helps in call termination.The other element of the GSM network is the OSS (Operation and Support Subsystem). It's the component that connects the NSS and BSC. The GSM network is controlled and monitored by this element. It also used to monitor traffic load that goes through the BSS. The connection between OpenBTS and other GSM network components OpenBTS can be connected to GSM through software or hardware. The software elements are the GNU Radio and the Asterisk. This is a software suite that has several modules that are combined with minimal hardware and used in implementing radio systems in personal computers. It's an interface that is graphical with blocks that represent stages through which data flows. This graphical representation is achieved through the use of Python programming language (David ;Samra, 13). The asterisk is the communication server that provides the capability that enables BTS to route calls accurately, perform correct registration and authentication processes in the GSM networks. The asterisk enables the network to read the Subscriber Identity Modules as the SIP user, and their International Mobile Subscriber Identity as the SIP username. This is achieved by connecting the Asterisk PBX to the OpenBTS. The other way of connecting OpenBTS to GSM network is through the use of hardware such Motherboard Ettus Research Universal Software Radio Peripheral. Also, daughterboards RFX900 with VERT900 antennas and GSM terminals equipped with SIM cards is required. The connection is made through motherboard that can accommodate several daughterboards (David ; Samra, 13). The interface between the motherboard and the daughterboards is provided by USB cable that can transmit Radio frequency bandwidth.Cost of OpenBTS and other components Compared to the traditional cell networks, OpenBTS is low in cost as most of the components needed are easily available. The software and the equipment used to create an OpenBTS through GSM network are readily available in stores and online (Heimerl et al., 3). This has made OpenBTS cost effective as compared to the traditional landline network or the other cellular networks such satellite. The only challenge that OpenBTS faces are the availability of power in rural areas that are of the grid. The use of other sources of power could prove to be expensive and drive the cost of the network high especially in a developing country where income levels are low.Feasibility of OpenBTS in the rural areaThe feasibility of OpenBTS in providing internet access in the rural and remote area is great. Through the use of simple and easily available material, networks that can cover a radius of up to 15miles is easily created (Heimerl et al., 3). This would drastically improve the coverage area of these of grid areas that would otherwise be impossible to reach. Various advantages would come with Using OpenBTS to provide internet to the rural area. The cost of OpenBTS is low compared to other forms of such as satellite or landline. The equipment and technology required to build OpenBTS are affordable and readily available. However, there are also the cons of OpenBTS (David ; Samra, 13). Several regulations hinder the development and use of this technology. The process of getting approval to develop OpenBTS network can be tiresome in some countries. Also, the radius covered by OpenBTS network can be relatively small requiring the creation of multiple networks to cover wide areas. OpenBTS in Indonesia In Indonesia, the OpenBTS is provided by an American startup Endaga. The company operates the module through the Village Base Station which is mounted on the small box and mounted on metallic poles (Heimerl ; Brewer, 3). The equipment is powered by solar panels that are mounted on the same pole. The box is further fit with management software that performs billing and analytics functions. These stations combine the function of a traditional GSM equipment and programmable computer allowing them to provide more value. They provide both voice and data capabilities to the rural villages. After experiencing success with this innovation in two primary towns, Endaga is preparing to expand to other locations within the country and the continent. Conclusion For the two first century to truly be a century of technological advance, there must be an equal distribution of internet services. Both the rural and urban areas must be covered effectively by internet services. There has been concentration on the urban areas with the number of services providers in these areas going up. However, the rural and poor areas have been given little attention or at times completely neglected. Most developing countries in Africa and Asia lack essential internet connectivity. In the areas where the services are available, they are still expensive for many who are poor. The OpenBTS promises to solve the two-fold problem that many remote and poor areas are facing. Since it allows for firms to provide for cheap internet services, it will eliminate the problem of affordability. Also, it will also offer off-grid areas that lack power. Through innovation like the one that has been exhibited by Endaga, it is now possible to provide internet services in any area. It is now upon the various governments of the developing nations to ensure that right policies that will facilitate the development of the concept is in place.