Thursday, January 30, 2020

Network Typologies Essay Example for Free

Network Typologies Essay A network is a system of two or more computers that are connected in some manner. Each computer on the network has access to the files and peripheral equipment (such as printers or modems) on all the other computers on the network. The origin of local area networks can be traced, in part, to IBM terminal equipment introduced in 1974. At that time, IBM introduced a series of terminal devices designed for use in transaction-processing applications for banking and retailing. What was unique about those terminals was their method of connection: a common cable that formed a loop provided a communications path within a localized geographical area. Unfortunately, limitations in the data transfer rate, incompatibility between individual IBM loop systems, and other problems precluded the widespread adoption of this method of networking. The economics of media sharing and the ability to provide common access to a centralized resource were, however, key advantages, and they resulted in IBM and other vendors investigating the use of different techniques to provide a localized communications capability between different devices. However, Datapoint Corporation began selling its Attached Resource Computer Network (ARCNet), considered by most people to be the first commercial local area networking product. Since then, hundreds of companies have developed local area networking products, and the installed base of terminal devices connected to such networks has increased exponentially. They now number in the hundreds of millions. Designing a manageable network One of the most important considerations in designing a network to be manageable is deciding how and where to connect the network-management equipment. Is there a separate network-management center to accommodate? Do nonoperational staff members like the network designer sit in a different area? Do they require access to the network-management centers equipment through the network? In general, the design should include a separate virtual local area network (VLAN) just for network-management equipment. The management VLAN was used to access management functions on remote network equipment. This network management-equipment VLAN houses servers and workstations used to manage the network. Design Types A large-scale network design is composed of several common building blocks. Every LAN, of whatever size, has to have an access system by which the end stations connect to the network. There are several inexpensive options for LAN connections, such as Ethernet and Token Ring. As a philosophical principle, the network should be built using basic commonly available technology. The design shouldnt have to reinvent any wheels just to allow the machines to talk to one another. So, just as basic commonly available technologies exist for connecting end stations to LANs, there are common methods for interconnecting LAN segments. Once again, these technologies and methods should involve the most inexpensive yet reliable methods. But in this stage of interconnecting, aggregating, and distributing traffic between these various LAN segments, the designer may run into some serious hidden problems. There may be thousands of ways to connect things, but most of these methods result in some kind of reliability problems. Network topology The topology of a local area network is the structure or geometric layout of the cable used to connect stations on the network. Unlike conventional data communications networks, which can be configured in a variety of ways with the addition of hardware and software, most local area networks are designed to operate based on the interconnection of stations that follow a specific topology. The most common topologies used in LANs include the loop, bus, ring, star, and tree, as illustrated in the figure below Loop As previously mentioned, IBM introduced a series of transaction-processing terminals in 1974 that communicated through the use of a common controller on a cable formed into a loop. This type of topology is illustrated at the top of Figure below. Local area network topology. The five most common geometric layouts of LAN cabling form a loop, bus, ring, star, or tree structure. Because the controller employed a poll-and-select access method, terminal devices connected to the loop require a minimum of intelligence. Although this reduced the cost of terminals connected to the loop, the controller lacked the intelligence to distribute the data flow evenly among terminals. A lengthy exchange between two terminal devices or between the controller and a terminal would thus tend to weigh down this type of network structure. A second problem associated with this network structure was the centralized placement of network control in the controller. If the controller failed, the entire network would become inoperative. Due to these problems, the use of loop systems is restricted to several niche areas, and they are essentially considered a derivative of a local area network. Bus In a bus topology structure, a cable is usually laid out as one long branch, onto which o ther branches are used to connect each station on the network to the main data highway. Although this type of structure permits any station on the network to talk to any other station, rules are required for recovering from such situations as when two stations attempt to communicate at the same time. Ring In a ring topology, a single cable that forms the main data highway is shaped into a ring. As with the bus topology, branches are used to connect stations to one another via the ring. A ring topology can thus be considered to be a looped bus. Typically, the access method employed in a ring topology requires data to circulate around the ring, with a special set of rules governing when each station connected to the network can transmit data. Star The fourth major local area network topology is the star structure, illustrated in the lower portion of Figure 1. In a star network, each station on the network is connected to a network controller. Then, access from any one station on the network to any other station can be accomplished through the network controller. Here, the network controller functions like a telephone switchboard, because access from one station to another station on the network can occur only through the central device. In fact, you can consider a telephone switchboard or PBX as representing a star-structured LAN whose trunks provide connections to the wide area network telephone infrastructure. Tree A tree network structure represents a complex bus. In this topology, the common point of communications at the top of the structure is known as the head-end. From the head-end, feeder cables radiate outward to nodes, which in turn provide workstations with access to the network. There may also be a feeder cable route to additional nodes, from which workstations gain access to the network. One common example of a tree structure topology is the cable TV network many readers use on a daily basis. With the upgrade introduction to networking of many cable TV systems to two-way amplifiers and the support of digital transmission, the local cable TV infrastructure can be considered to represent an evolving type of tree-structured local area network. Mixed Topologies Some networks are a mixture of topologies. For example, a tree structure can be viewed as a series of interconnected buses. Another example of the mixture of topologies is a type of ethernet known as 10BASE-T. 10BASE-T network can actually be considered a star-bus topology, because up to 16 or 24 devices known as stations are first connected to a common device known as a hub, which in turn can be connected to other hubs to expand the network. Transmission Medium Used in LAN. The transmission medium used in a local area network can range in scope from twisted-pair wire, such as is used in conventional telephone lines, to coaxial cable, fiber-optic cable, and electromagnetic waves such as those used by FM radio and infrared. Each transmission medium has a number of advantages and disadvantages. The primary differences between media are their cost and ease of installation; the bandwidth of the cable, which may or may not permit several transmission sessions to occur simultaneously; the maximum speed of communications permitted; and the geographic scope of the network that the medium supports. Twisted-pair wire In addition to being the most inexpensive medium available for LAN installations, twisted-pair wire is very easy to install. Since this wiring uses the same RJ11 and RJ45 modular connectors as a telephone system, once a wire is cut and a connector fastened, the attachment of the connector to network devices is extremely simple. Normally, a screwdriver and perhaps a pocket knife are the only tools required for the installation of twisted-pair wire. Anyone who has hooked up a pair of speakers to a stereo set has the ability to install this transmission medium. Unshielded twisted-pair Although inexpensive and easy to install, unshielded twisted-pair (UTP) wire is very susceptible to noise generated by fluorescent light ballasts and electrical machinery. In addition, a length of twisted-pair wire acts as an antenna; however, the twists serve as a mechanism to partially counteract this antenna effect. Unfortunately, due to the law of physics, the longer the wire length, the greater the noise it gathers. At a certain length, the received noise will obliterate the signal, which attenuates or decreases in strength as it propagates along the length of the wire. This noise can affect the error rate of data transmitted on the network, although lead-shielded twisted-pair (STP) cable can be employed to provide the cable with a high degree of immunity to the line noise and enable extended transmission distances. Examining a building cabling standard and the various categories of twisted-pair that can support different transmission rates which, in turn, enable different types of Ethernet networks to be supported. Because the bandwidth of twisted-pair cable is considerably less than coaxial or fiber-optic cable, normally only one signal is transmitted on this cable at a time. Although a twisted-pair wire system can be used to transmit both voice and data, the data transmission is baseband because only one channel is normally used for data. In comparison, a broadband system on coaxial or fiber-optic cable can be designed to carry voice and several sub channels of data, as well as fax and video transmission. Other constraints of unshielded twisted-pair wire are the rate at which data can flow on the network and the distance it can flow. Although data rates up to 1 gigabit per second (Gbps) can be achieved, normally local area networks employing UTP wiring operate at a lower data rate. In addition, UTP systems normally cover a limited distance, measured in terms of several hundred to a few thousand feet, while coaxial and fiber-optic cable–based systems may be limited in terms of miles. Extending transmission distances over twisted-pair wire requires the periodic insertion of repeaters into the cable. A repeater receives a digital signal and then regenerates it; hence, it is also known as a data regenerator. Coaxial cable At the center of a coaxial cable is a copper wire, which is covered by an insulator known as a dielectric. An overlapping woven copper mesh surrounds the dielectric, and the mesh, in turn, is covered by a protective jacket consisting of polyethylene or aluminum. The figure below illustrates the composition of a typical coaxial cable; however, it should be noted that over 100 types of coaxial cable are currently marketed. The key differences between such cables involve the number of conductors contained in the cable, the dielectric employed, and the type of protective jacket and material used to provide strength to the cable so it can be pulled through conduits without breaking. Two basic types of coaxial cable are used in local area networks. The type of cable used is based on the transmission technique employed: baseband or broadband signaling. Both cable types are much more expensive than twisted-pair wire; however, the greater frequency bandwidth of coaxial cable permits higher data rates for longer distances than you can obtain over twisted-pair wire. Normally, 50-ohm coaxial cable is used in baseband networks, while 75-ohm cable is used in broadband networks. The latter coaxial is identical to that used in cable television (CATV) applications, including the coaxial cable used in a home. Data rates on baseband networks using coaxial cable range from 50 to 100 Mbps. With broadband transmissions, data rates up to and including 400 Mbps are obtainable. A coaxial cable with a polyethylene jacket is normally used for baseband signaling. Data is transmitted from stations on the network to the baseband cable in a digital format, and the connection from each station to the cable is accomplished by the use of a simple coaxial T-connector. Because data on Coaxial cable. baseband network travels in a digital form, those signals can be easily regenerated by the use of a device known as a line driver or data regenerator. The line driver or data regenerator is a low-cost device that is constructed to look for a pulse rise, and upon detecting the occurrence of the rise, it will disregard the entire pulse and regenerate an entirely new pulse. Thus, you can install low-cost line drivers into a baseband coaxial network to extend the distance over which transmission can occur on the cable. Typically, a coaxial cable baseband system can cover an area of several miles, and may contain hundreds to thousands of stations on the network. Obtaining independent sub channels defined by separate frequencies on coaxial cable broadband transmission requires the translation of the digital signals from workstations into appropriate frequencies. This translation process is accomplished by the use of radio-frequency (RF) modems, which modulate the digital data into analog signals and then convert or demodulate received analog signals into digital signals. Because signals are transmitted at one frequency and received at a different frequency, a head-end or frequency translator is also required for broadband transmission on coaxial cable. This device is also known as a demodulator, as it simply converts the signals from one sub channel to another sub channel. Fiber-optic cable Fiber-optic cable is a transmission medium for light energy, and as such, provides a very high bandwidth, permitting data rates ranging up to billions of bits per second. The fiber-optic cable has a thin core of glass or plastic, which is surrounded by a protective shield. Several of these shielded fibers are bundled in a jacket, with a central member of aluminum or steel employed for tensile strength. Digital data represented by electrical energy must be converted into light energy for transmission on a fiber-optic cable. This is normally accomplished by a low-power laser, or through the use of a light-emitting diode and appropriate circuitry. At the receiver, light energy must be reconverted into electrical energy. Normally, a device known as a photo detector, as well as appropriate circuitry to regenerate the digital pulses and an amplifier, are used to convert the received light energy into its original digital format. The figure below provides an illustration of the cross sectio n of a single-strand fiber cable. The cladding that surrounds the core of the fiber can be considered to represent a cylindrical mirror whose job is to ensure light stays in the core as it flows along the fiber. The Kevlar fibers add strength to the cable, while the outer jacket, which is commonly colored orange, represents a polymer-based shield that protects the cable from the elements. There are two key factors that govern the manner by which light flows through a fiber-optic cable. Those factors are the diameter of the core and the light source. The first type of fiber-optic cable developed had a relatively large diameter that ranged from 50 to 140 microns, where a micron is a millionth of a meter. The original light source used to transmit information was a light-emitting diode (LED). Horizontal cross section of a single-strand fiber cable The coupling of an LED to a large-diameter optical fiber results in photons flowing along multiple paths through the optical fiber, resulting in the transmission referred to as multimode, which is also the same name used to reference the type of optical fiber. There are two types of multimode fiber, referred to as step-index and graded index. A step-index fiber has a core with a uniform refractive index, resulting in the different components of a light signal in the form of modes or rays flowing in a non-uniform manner through the optical cable. The top portion of the figure below illustrates the flow of light through a step-index, multimode fiber. In a graded-index multimode fiber, the refractive index is varied from the center to the edge of the core to minimize modal dispersion. The middle portion of the figure below illustrates the flow of light through a graded-index, multimode fiber. This type of fiber minimizes model dispersion and supports higher data rates than a step-index multimode optical fiber. A third type of optical fiber has a relatively small core diameter, typically between 7 and 12 microns (10−6 meters). This type of optical fiber permits only one path for the flow of light due to the small diameter of the core. As a result of the lack of modal dispersion, single mode supports a much higher data rate than multimode fiber. Because of the small diameter of single-mode fiber, lasers are used as the light source instead of LEDs. Both the core thickness and the cladding of an optical fiber are measured in microns. The three major core thicknesses used in optical fiber are 50, 62 and 100 microns. The associated claddings for those core diameters are 125 and 140 microns, respectively. Light flow in multimode and single-mode optical fiber. Computer networks are everywhere; from a simple two-node home setup to the vast number of computers on the internet. However, any computer network includes certain basic components, regardless of which operating system one is running. Network scope refers to the extent to which a network provides coverage. There are two major divisions of network scope; Local Area Networks and Wide Area Networks. †¢ A Local Area Network (LAN) consists of any number of computers that are linked directly together and are housed in a clearly defined geographic area, such as in a single building or campus. A LAN can only be as large as the physical limitations of the cabling you use which also depends on the cabling type. Usually the computers linked together in a LAN are workstations that can access data on computers on the same LAN, and use devices like printers that are connected to the LAN. †¢ A Wide Area Network (WAN) can span large geographic areas like countries and continents. WANs often contain two or more LANs. At least some of the connections used in WAN rely on long distance communications media such satellite links, long distance fiber optic cable, or specialized high speed telephone lines. WAN technology is essentially used to link all the computers in a multi-site or multinational enterprise in a reliable way Note that the key characteristic of a LAN or WAN is not how big it is, but rather the technologies used to connect the computers. There are other more specialized scopes used to describe networks. These include: †¢ Metropolitan Area Networks (MAN): this is a mini-wan or a giant LAN that is confined to a single municipality. A company might use a private MAN to link different offices together within the same compound. Computers on a MAN are linked using high-speed media like fiber optic or dedicated digital lines. This is the typical description of the IITA Ibadan network as will be discussed later. †¢ Storage Area Network (SAN): A specialized LAN linking several network servers that are dedicated to storing large amounts of data in a centralized secure repository. †¢ Personal Area Network (PAN): This is a connection you personally have with the technology that is around you (within your body) e.g. the way your cell phone communicates with your Bluetooth headset and your laptop. Bluetooth and infrared are currently the major types of PAN. Network Topology A network topology refers to the layout of the transmission medium and devices on a network. Topologies use either a point to point or multipoint connection scheme. A connection scheme indicates how many devices are connected to a transmission media segment or an individual cable. An example of point-to-point connection scheme is a printer or modem connected to your computer. Another is two computers connected directly to each other to use file transfer software like windows i.e. the network computer communicates with other network devices via direct cable connection between them. An example of a multi point connection scheme is a star or bus topology network. The entire physical structure of the network is called its physical topology. Star topology: This is a local area network topology where all the nodes are connected individually to a central connecting device called a hub. Signals travel from the nodes to the hub which then sends signals to other nodes on the network. A star topology network is easily scaleable – nodes can be added and removed fairly easily- and if a computer fails, none of the other nodes are affected. However if the hub fails the entire network fails. A hub does not perform any type of filtering or routing of the data. It is simply a junction that joins all the different nodes together.

Wednesday, January 22, 2020

Contemporary Significance of the Greek Views of Paideia :: Philosophy

Contemporary Significance of the Greek Views of Paideia ABSTRACT: We argue that there are three basic views of paideia in ancient Greece. After briefly discussing them, we turn our attention to the contemporary situation. We try to show that the dialogical or Socratic view of paideia can contribute toward a deeper understanding of the contemporary problem of multiculturalism. In this article we will argue first that there are three basic views of paideia in ancient Greece (I). Then after making a brief overview of their fate in the later history (II), we will turn our attention to our contemporary situation and try to show that it is the dialogical or Socratic view of paideia which can contribute to a deeper understanding of the contemporary problem of multiculturalism (III). I. The three basic views of Greek paideia are all connected with the concept of truth and the relation of man to it. I call these views "basic", simply because I consider the man's "transcendental" relationship to truth (which includes the denial of this relationship) fundamental for our understanding of paideia, especially in ancient Greece after Parmenides. 1) The authoritarian view is found in the so-called Presocratic thinkers, such as Parmenides and Heracleitus. They assert the existence of absolute eternal truth that can be grasped intuitively and expressed verbally by a few wise men (sophoi). Even though they disagree and dispute each other on the content of truth, they all share in the esoteric view of truth. Just as Being is separated from the realm of appearance by Parmenides, so the wise man who alone can discern Being is clearly distinguished from the common crowd who cannot move beyond the realm of appearance. Or according to Heracleitus only the wise man can give ears to the eternal Logos amid the ever-changing flow of the world; whereas fools are compared with swine that are content with mud. This view gives the wise the authority to teach Truth ex cathedra. 2) The relativistic view of the Sophists, especially of Protagoras and Gorgias, is more "democratic". We should not forget that the Sophists flourished especially in democratic Athens as testified among others by the friendship between Protagoras and Pericles, the greatest statesman of democratic Athens. Both Protagoras and Gorgias criticized and ridiculed the Parmenidean concept of Being. The famous words of Protagoras, "man is the measure of all things" should be interpreted in this light.

Tuesday, January 14, 2020

Macbeth †Blind Ambition Essay

Q. The play Macbeth explores the dangers associated with blind ambition. Discuss. William Shakespeare’s play Macbeth is primarily concerned with exploring the dangers associated with blind ambition. Shakespeare presents the audience with a character faced with clear moral choices and who is led down a path towards destruction because of his tragic character flaw, his overarching ambition. We can see this in how easily Macbeth is initially convinced to start down this road by the witches’ prophecy. Finally we see how Macbeth is driven to ever greater extremes of cruelty in order to maintain the position that his ambition has allowed him to attain. The dangers associated with blind ambition are portrayed in the manner in which the crimes they commit take a terrible toll on the minds of both Macbeth and Lady Macbeth. Macbeth is initially presented in the play as a brave and noble character but it takes only a hint in the direction of kingship from the witches to enflame his ambition. Early in the play Macbeth is praised by the king for his courage and loyalty. He is a figure of admiration and is rewarded for his efforts with the Thane of Cawdor. Shakespeare gives Macbeth his first taste of power and ambition with the prophecy of the witches and this kindles a sense of curiosity in him about what the future may hold. He makes a leap between being a passive figure in the face of destiny to entertaining the idea that he may himself direct the workings of fate. As Macbeth says, â€Å"The Prince of Cumberland: that is a step On which I must fall down, or else o’erleap,† It seems to take only the merest nudge in the direction of his â€Å"dark desires† to cause a deep change in his character and to lure him into entertaining some awful crimes in order to achieve those ambitions. We are left with the question, would Macbeth have ever strayed from his noble character if he had not been given the initial push in that direction by the witches? The answer seems to be that the witches have merely allowed something that was dark and evil within Macbeth’s character to be pulled out into the light. If we begin to covet what others have then our ambitions can run amok and destroy us. Having achieved his goal to become the King of Scotland Macbeth is forced to become ever more brutal and cruel in order to defend his illegitimate position. Initially we see that Macbeth has a profound struggle with his conscience over the prospect and indeed finds many good reasons for not killing him. It is only the goading of Lady Macbeth over his manhood that keeps him on his bloody path. The murder causes Macbeth a great deal of mental anguish and we see a character distraught by the trauma of going against his essential character in the moments directly after the act. â€Å"†¦ Sleep no more: Macbeth does murder sleep†¦Ã¢â‚¬  As the play progresses he overcomes his compunctions and supresses his conscience completely. The implication is that in order to maintain his position he must become more and more bloodthirsty and that his character must become more and more deformed. Shakespeare is making the observation that ambition is like a ravenous fire that consumes all in its path in order to maintain itself. Like tyrants throughout history we can see that, â€Å"Who is all powerful should fear everything.† The fear, suspicion and paranoia created by supreme power illegitimately gained leads to an inevitable bloodbath as the natural order is destroyed and chaos is unleashed. Macbeth’s ambition is such a force for disorder in the play and causes not only his downfall but that of many other characters and the whole state of Scotland. The greatest element of tragedy in the play is the spectacle of Macbeth slowly losing his mind as a result of his guilt over the crimes that he has committed in order to fulfil his ambition. The beginning of the play portrays Macbeth as a noble warrior of sound mind and sound body. This however changes as the play progresses to the point where Macbeth becomes insane. This is due to the guilt of his actions. What emphasises the guilt that Macbeth feels even more is the core values that he has. He battles with his mind attempting to convince himself that it was justifiable yet his core morals and values tell him otherwise. â€Å"It will have blood; they say, blood will have blood† Here Macbeth reflects on his deeds after Banquos ghost disappears. This is  the start of his battle for his sanity. Because of his righteous core values, he believes that the evil deed that he has committed will ultimately result in his death. As the play progresses, his mental stability degrades with each evil deed he commits to the point where he has no desire to live anymore as he realises that all there is to live for, he has wasted away. â€Å"I have liv’d long enough: my way of life Is fall’n into the sear, the yellow leaf; And that which should accompany old age,† He comments that old age has come upon him hastily as his way of life has caused this.

Monday, January 6, 2020

The United States Prison System Essay - 1562 Words

Within this paper, you will find a comprehensive review of the United States prison system, and why it needs to analyzed to better support and reform the people of this country. I plan to persuade the other side (politicians and society) into seeing that the way the prison system is now, is not ethical nor economical and it must change. We have one of the world’s largest prison population, but also a very high rate of recidivism. Recidivism is when the prisoners continuously return to prison without being reformed. They return for the same things that they were doing before. So, this leads us to ask what exactly are we doing wrong? When this happens, we as a nation must continuously pay to house and feed these inmates. The purpose of a prison needs to be examined so we can decide if we really are reforming our inmates, or just continuing a vicious cycle. What is the true purpose of prison besides just holding them in a cell? There must be more we can do for these hopeless mem bers of society. The Prison System in the United States: Is it ethical? As of 2016, the United States has one of the highest prison populations of men in women in state, federal, private penitentiaries in the world. Not only is it the highest, but it is a constant revolving door for those who do their time, but continue to come back into the system for either short term or long term sentences. This trend has been continuous for many years and nothing has changed. Yes, some states have tried toShow MoreRelatedThe United States Prison System996 Words   |  4 PagesSince the 1980s, the United States prison population has quadrupled to 2.4 million inmates; with nearly half of the inmates in federal prison serving time for drug offenses. The majority of America’s general population has been hoodwinked into believing that the prison system helps prevent crime, but the side effects of mass incarceration is like spilling gasoline on a burning car. The side effects of fabricating additional prison complexes for the sole purpose of preventing crime will continue toRead MoreThe United States Prison System1215 Words   |  5 Pages The United States prison system incarcerates more people per capita than nearly all European countries, and roughly two-thirds of those inmates that are released will be arrested again within three years (Ward et al, 2015). Some facilities have relatively successful programs that cut down on the recidivism numbers. However, the majority of prisons are focused on punishment and make no efforts at rehabilitation. Something in the American justice systems needs to change so that the cycle can be brokenRead MoreThe United States Prison System Essay1927 Words   |  8 PagesThe United States prison system struggles eminently with keeping offenders out of prison after being released. According to the Bureau of Justice Statistics, more than third of all prisoners who were arrested within five years of released were arrested within six months after release, with more than half arrested by the end of the year (Hu ghes, Wilson, Beck, 2001). Among prisoners released in 2005 in 23 states with available data on inmates returned to prison, about half (55 percent) had eitherRead MoreReforming The United States Prison System940 Words   |  4 Pages1/19/2016 Reforming the United States Prison System The United States is the largest jailer in the world. With only 5 percent of the world s population and a disproportionate 20 percent of the worlds prison population the United States also has the highest incarceration rate in the world (Chamman). In fact one in every one hundred and ten adults in the United States will be incarcerated. Many of these adults will return to prison later in their life (ACLU). The Prison Crisis has become a recentRead MoreThe United States And The Federal Prison System3063 Words   |  13 PagesToday in the United States a land that claims to be the freest nation on the face of the Earth more people will wake up inside of a federal/state prison or a county jail cell than in any other country on the planet. As of 2012 this figure was a staggering 2,228,400 (jail 744,500; prison 1,483,900) add in to this the additional sum of just over 5 million people on parole (851,200) and probation (3,942,800) giving us a grand total of over 7 million citizens under some level of Federal or State supervisionRead MoreOvercrowding And Its Effects On The United States Prison System1178 Words   |  5 Pages Overcrowding prisons are an issue that has been influencing the United States prison population for decades, however what is the true significance of overcrowding. As indicated by Jeff Bleich (1989) â€Å"the term overcrowding is repetitive, since crowding already refers to a higher level of social density than is desired†. An overcrowded prison is a shocking condition that causes outrage and dissatisfaction among detainees (Haney, 2014). This condition is so undesirable that one can consider it as unconstitutionalRead MorePrison Systems In The United States Is Growing Massively,1739 Words   |  7 PagesPrison Systems in The United States is Growing Massively, And It Needs to Change! The United States Prison Systems is at its all-time high. From 1984 to 2012 about 160,000 inmates were sentenced to life (Hamilton 805). In 2011, one million women were incarcerated or controlled by the Justice system, in which 68 percent of these women were black (Gross 32). Mass incarceration is a process of overfilling prisons with prisoners, who have committed minor and major crimes. The main targets were AfricanRead MoreAfrican American Men And The United States Prison System1422 Words   |  6 PagesAfrican American Men and the United States Prison System There is a racial connection between the United States criminal justice system and the overrepresentation of black men in the United States prison system. There are over 2 million people in the U.S. prison system exceeding that of any other nation and represents 25% of the world’s prisoners (The Sentencing Project, 2016). According to Prison Policy Initiative, African American communities are the most impacted with African American men representingRead MorePregnant Behind Bars And The United States Prison System2060 Words   |  9 Pages Pregnant Behind Bars Men and women in the United States prison system face an adversity of challenges in many aspects of their lives. One area where incarcerated individuals face a hardship is the access to healthcare they receive while they are imprisoned. Access to screenings, check-ups, medications, and treatment for diseases may be limited. Women are particularly vulnerable to inconsistent healthcare if they are pregnant while in prison. They may not receive all the necessary prenatal orRead MoreEvaluating Credibility And Its Impact On The Society Of The United States Prison System1980 Words   |  8 Pagessupport their information, verifiability to see if it still holds context, and organization/professionalism of the source. All of these are important to evaluate the credibility especially when dealing with a controversial topic like the United States prison system where a person might have an agenda of leading the reader to a certain position on the topic. Criteria for Evaluating Credibility There are a variety of elements that should be examined when evaluating these sources. Trying to determine