Wi-Fi at the Library
Patrons can connect their laptop computers to the Internet at the Johnson City Public Library using the library’s wireless network. The wireless network (also known as Wi-Fi) is a widely used technology that enables laptop computers and other portable devices to connect to the Internet. The wireless network at the library
supports the 802.11a, b, and g standards. Using wireless, patrons can work on the Internet at study tables, in reading chairs, and during meetings and events in the Jones Meeting Center.
- Your laptop must have a wireless adapter. If one is not already built in, one may be added to your laptop using a PCMCIA wireless adapter. (Wireless adapters are also called Wi-Fi or 802.11- A, B, or G adapters)
- Your laptop’s Wireless Network Connection must use Internet Protocol (TCP/IP). The TCP/IP properties must direct the laptop to obtain an IP address automatically and to obtain a DNS server address automatically. Patrons are advised to use any built-in firewall measures available to them by their laptop’s operating system
- The SSID for the library’s network is JCPL Open Network. Network Authentication is Open (that is, there is no authentication required), and Data Encryption is Disabled. These are subject to change, without notice, at any time.
- The library does not provide wireless adapters
- Wireless network users can not print to library printers
- The wireless network does not use data encryption. The library is not liable for intercepted data transmissions; use at your own risk
- Due to liability issues, the library staff will not provide any technical assistance to patrons experiencing problems using the wireless network at the library
- Usage of the wireless network at the library must be in accordance with all applicable library policies, including the Internet Use Policy and Acceptable Internet Use Guidelines
- The use of the wireless network at the library is strictly as-is, and the library assumes no liability for damage to the patron’s laptop due to electrical surges or network intrusions such as downloaded viruses, adware, spyware, Trojan-horses, etc.