{"id":15520,"date":"2016-11-05T08:38:59","date_gmt":"2016-11-05T08:38:59","guid":{"rendered":"http:\/\/blogs.nist.ac.th\/technology\/?post_type=ht_kb&#038;p=15520"},"modified":"2020-08-31T04:37:52","modified_gmt":"2020-08-31T04:37:52","slug":"internet-and-network-access","status":"publish","type":"ht_kb","link":"https:\/\/blogs.nist.ac.th\/technology\/knowledge-base\/internet-and-network-access\/","title":{"rendered":"Internet and Network Access"},"content":{"rendered":"<h2>Network Access for Community Members<\/h2>\n<p>We allow any device to connect to our wifi system using a NIST provided credential. For parents, students, and staff this is as easy as typing your NIST credentials (same that is used in all our systems) when joining <strong>nistwifi<\/strong>.<br \/>\n<em>**Note: Do NOT use the @nist.ac.th part of your credential.<\/em><\/p>\n<h2>Network Access for\u00a0Visitors<\/h2>\n<p>We allow any device to connect to our wifi system using a NIST provided credential. For visitors\u00a0this is as easy as getting a visitor wifi credential from any of the school offices and then using\u00a0those\u00a0credentials (same that is used in all our systems) when joining <strong>nistwifi<\/strong>.<\/p>\n<h2>Internet Access<\/h2>\n<p><a href=\"\/technology\/files\/2016\/11\/internet-icon.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-15525 alignright\" src=\"\/technology\/files\/2016\/11\/internet-icon.jpeg\" alt=\"internet-icon\" width=\"128\" height=\"134\" srcset=\"https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2016\/11\/internet-icon.jpeg 128w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2016\/11\/internet-icon-48x50.jpeg 48w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2016\/11\/internet-icon-57x60.jpeg 57w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2016\/11\/internet-icon-33x35.jpeg 33w\" sizes=\"auto, (max-width: 128px) 100vw, 128px\" \/><\/a>NIST has robust and safe internet access for devices on our network. Currently, the\u00a0bandwidth is shared between all our users. We block adult content using our firewall, but most other categories are unrestricted so as to create a more real-life experience so that students can learn to make better choices. The following\u00a0categories are blocked for all users.<br \/>\nAdult Content,\u00a0Proxy Avoidance &amp; VPN,\u00a0Gambling,\u00a0Peer 2 Peer File Sharing, Games (however, some\u00a0educational games sites are allowed). Furthermore, social media and chat\/VoIP applications are blocked for secondary students.<\/p>\n<h3>Internet\u00a0Sharing<\/h3>\n    \t\t<div class=\"hts-messages hts-messages--alert   hts-messages--withicon \"   >\r\n    \t\t\t    \t\t\t    \t\t\t\t<p>\r\n    \t\t\t\t\tHelp yourself and everyone to have better internet access!    \t\t\t\t<\/p>\r\n    \t\t\t    \t\t\t\r\n    \t\t<\/div><!-- \/.ht-shortcodes-messages -->\r\n    \t\t\n<p>The internet link at NIST costs a lot of money. In order to get the most educational value out of our link, we must all do our part. <strong>Please do use the internet lots for educational purposes at any time you want.<\/strong> It is a valuable resource that should be cultivated.<\/p>\n<ul>\n<li>The following are considered to be \u201cheavy\u201d files in increasing file size. (pictures, streaming audio, audio, video). Length of song\/movie also determines file size.<\/li>\n<li>Viewing\/hearing something on your computer is the same as downloading (YouTube, radio streaming, photo gallery, etc. (i.e. If you can see\/hear it on your computer, the information has passed from the internet to your computer)<\/li>\n<li>Using BitTorrent and\/or any other file download\/upload services\/sites during school hours (6:30am \u2013 4:00 pm) is forbidden. <em>(This includes forgetting to pause downloads when coming to school.)<\/em><\/li>\n<li>If in doubt about whether something is permitted, please ask technology support staff.<\/li>\n<\/ul>\n<h2>Internet Issues<\/h2>\n<p>If you experience any issue with our wifi or internet service, please check this article about <a href=\"http:\/\/blogs.nist.ac.th\/technology\/knowledge-base\/get-tech-support\/\">Getting Tech Support<\/a>.<\/p>\n<p><a href=\"http:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2016\/11\/nistwifichoices.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-17789\" src=\"\/technology\/files\/2016\/11\/nistwifichoices-248x300.png\" alt=\"\" width=\"248\" height=\"300\" srcset=\"https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2016\/11\/nistwifichoices-248x300.png 248w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2016\/11\/nistwifichoices-41x50.png 41w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2016\/11\/nistwifichoices-50x60.png 50w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2016\/11\/nistwifichoices-83x100.png 83w, https:\/\/blogs.nist.ac.th\/technology\/wp-content\/uploads\/2016\/11\/nistwifichoices.png 508w\" sizes=\"auto, (max-width: 248px) 100vw, 248px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Network Access for Community Members We allow any device to connect to our wifi system using a NIST provided credential. For parents, students, and staff this is as easy as typing your NIST credentials (same that is used in all our systems) when joining nistwifi. **Note: Do NOT use the&#8230;<\/p>\n","protected":false},"author":3,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"footnotes":""},"ht-kb-category":[1154431],"ht-kb-tag":[383901,1123241,1123039,1123239,1123240,201657,747123,1123038,1123233],"class_list":["post-15520","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_category-it-support2","ht_kb_tag-access","ht_kb_tag-block","ht_kb_tag-credentials","ht_kb_tag-filter","ht_kb_tag-firewall","ht_kb_tag-internet","ht_kb_tag-network","ht_kb_tag-wifi","ht_kb_tag-wireless"],"_links":{"self":[{"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb\/15520","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/comments?post=15520"}],"version-history":[{"count":8,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb\/15520\/revisions"}],"predecessor-version":[{"id":17790,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb\/15520\/revisions\/17790"}],"wp:attachment":[{"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/media?parent=15520"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb-category?post=15520"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/blogs.nist.ac.th\/technology\/wp-json\/wp\/v2\/ht-kb-tag?post=15520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}