The Computer and Information Technology Center is solely responsible for keeping the Information and Communication Technology & Computation related facilities available to each and every member of IIT Indore.
These facilities are constantly upgraded to meet the evolving standards of IIT. Many departments use the facilities of the Computer Lab to conduct their practical classes & examinations. The campus LAN has been extended to all the hostels and residences. New hardware and software are procured on a regular basis so as to provide a state of the art computing facility to the IIT Indore family.
The Centre is also engaged in designing and facilitates the NKN Project with NIC in the Simrol Campus. National Knowledge Network (NKN) project is aimed at establishing a strong and robust internal Indian network which will be capable of providing secure and reliable connectivity. Using NKN, all vibrant institutions with vision and passion will be able to transcend space and time limitations in accessing information and knowledge and derive the associated benefits for themselves and for the society towards ushering in a knowledge revolution in the country. NKN is intended to connect all the knowledge and research institutions in the country using high bandwidth / low latency network.
Web & Email Services
- The Institute develops In-house websites for several departments. It is hosted and managed in the data center premises.
- The Institute has a GSuite email subscription to cater to the electronic communication requirements of employees & students.
- Samba Sharing and Computation Facilities.
- IITI has 1 Gbps National Knowledge Network (NKN) for providing high speed internet connectivity to all the users in the premises. Besides NKN, there is 1 Gbps Internet leased line connection as a backup is available at the Institute.
- Local Area Network is installed in all buildings and approximately 800 campus enabled Wi-Fi access point are deployed for roaming free internet access.
- VPN facilities for accessing Journals and E-contents from outside of the Institute.
- The Institute provides both wired and wireless gigabit network connectivity to the entire campus that connects all the Academic Departments, Hostels, Central Library, Administrative Departments, Lecture Halls, Auditorium, Guest House and Residences.
- Users can get access to internet by completing the registration process.
Technical Support Services
- By utilizing 900 nodes, the Institute provides seamless technical support to the Academic and Administrative Staff, Students, and Researchers/
- Providing facilities to the Students who come from various academic institutes from all over the India for their short-term courses, mini project work and summer training etc.
Dr. Neminath Hubballi
Professor In-charge, CITC
Computer Science & Engineering (CSE)
Email Id: head-cc [at] iiti.ac.in
Tel: +91-731-660 3553
Third Floor, Room No 417, Pod 1A Building
Mr. Yogendra Singh
Tel: +91-731-660 3530
First Floor, Room 109
Mr. Subhash Soni
Tel: +91-731-660 3530
First Floor, Room 109
Mr. Jitendra Gupta
Tel: +91-731-660 3540
First Floor, Room 109
Mr. Dhiraj VijayVargiya
First Floor, Room 109
Mr. Prahalad Singh Panwar
Email: prahalad [at] iiti.ac.in
Tel: +91-731-660 3404
Ms Princy Awadhiya
Email: princy [at] iiti.ac.in
Tel: +91-731-660 3404
Mr. Shailesh Kaushal
Email: shaileshk [at] iiti.ac.in
Tel: +91-731-660 3124
Mr. Subha jana
Email:subbu [at] iiti.ac.in
Tel: +91 6268357397 (M), +91-731-660 3124
Basic Network Problems
- Cable Problem: The cable which is used to connect two devices can get faulty, shortened or can be physically damaged.
- Connectivity Problem: The port or interface on which the device is connected or configured can be physically down or faulty due to which the source host will not be able to communicate with the destination host.
- Configuration Issue: Due to a wrong configuration, looping the IP, routing problem and other configuration issues, network fault may arise and the services will get affected.
- Software Issue: Owing to software compatibility issues and version mismatch, the transmission of IP data packets between the source and destination is interrupted.
- Traffic overload: If the link is over utilized then the capacity or traffic on a device is more than the carrying capacity of it and due to overload condition the device will start behaving abnormally.
- Network IP issue: Due to improper configuration of IP addresses and subnet mask and routing IP to the next hop, the source will not be able to reach the destination IP through the network.
Before creating a Ticket on IT Help Desk, you are requested to perform the below troubleshooting steps:
Have you checked the physical connectivity?
Have you entered correct IP address, subnet mask, gateway and DNS server?
Can you ping your neighbors IP address?
Can you telnet to the gateway?
Steps for checking physical connectivity
Check if LEDs are glowing in the place where network cable is plugged into your PC.
If they are not, check if the cable is plugged properly. Remove and replug it at both ends. One end is in your computer and other is in the wall jack.
If LED’s are glowing, go to next step. If they are still not glowing, please call a vendor to rectify the situation.
If physical connectivity seems fine then go to the next section:
1. Check if your IP address, subnet mask, gateway and DNS entries are correct.
2.Type the following command in command prompt/ terminal for finding your IP on the machine:
On windows system: “ipconfig /all”. This command shows the machines IP address, subnet mask default gateway and DNS.
On Linux: Login as root. And type “/sbin/ifconfig”
3. Try to ping other systems in your building using the command prompt/ terminal. The command is: “ping x.x.x.x”
where x.x.x.x is the IP address.
4. If that succeeds, try to ping the switch of your building.
5. If that succeeds, try to telnet the gateway.
6. If all is done but still you are unable to connect to the network, please register your complaint online at IT HelpDesk
Please specify the outcome of the test your performed as mentioned above in your complaint. This will help to solve your problem faster.
Please update your system regularly and scan your devices for viruses and trojans for infection or vulnerability. Avoid using infected flash drive from known or unknown sources.
System and Network related issues can be reported to the IT team through the medium of Ticket which can be created on IT Helpdesk. After receiving the ticket the IT team will contact you further to resolve the issues based on availability and assignment.
The default Internet Login password can be changed by clicking on the URL https://idpass1.iiti.ac.in/
Please fill up the form A6 for getting an official email ID and internet account. Click on the link to download Internet/Email Account Opening Form. After filling up the form please visit HUB building First Floor room 109.
You will need a Username and Password to connect to the Institute Network. Using the Login credentials you can browse internet either through wired or wireless connection. The Institute Wi-fi SSIDs are IITI_2.4G and IITI_5G. Please visit HUB building for availing the services.
Please login to institute url of MATLAB https://in.mathworks.com/academia/tah-portal/indian-institute-of-technology-indore-31439162.html with institute email id
For more information you may visit Matlab Official Website.
PuTTYgen is used to generate public or private key pair for creating SSH keys. Below is the complete guidance about how to generate RSA key in the Windows operating system:
1. Once you install the PuTTY on your machine, you can easily run PuTTYgen. For the same, go to Windows -> Start Menu -> All Programs -> PuTTY -> PuTTYgen.
2. You will see the PuTTY key generator dialog box on your screen
3. You will find a “Generate” button in that dialog. Clicking on it will lead to generating the keys for you.
4. Now you will need to add a unique key passphrase in the Key passphrase and Confirm passphrase field.
5. Click on the “Save Public Key” and “Save Private Key” buttons to save your public and private keys.
6. You will see the text starting with ssh-RSA in the Public key for pasting into OpenSSH authorized_keys file field which is located at the top of the window. Right-click in the text field labeled Public key for pasting into OpenSSH authorized_keys file and choose Select All. Right-click again in the same text field and choose Copy. Paste this to a notepad and save this text file. Share this file with IT team for ssh access to your web directory.
Please contact CITC for details.
- Always use hard-to-guess passwords or passphrases. A password should have a minimum of 8 characters using uppercase letters, lowercase letters, numbers, and special characters. To make it easy for you to remember but hard for an attacker to guess
- It is suggested to use different passwords for different accounts. If one password gets hacked, your other accounts are not compromised.
- Keep your passwords or passphrases confidential. DON’T share them with others or write them down. You are responsible for all activities associated with your credentials.
- Pay attention to phishing traps in email and watch for telltale signs of a scam. DON’T open mail or attachments from an untrusted source. If you receive a suspicious email, the best thing to do is to delete the message and report it to your manager and to your IT Support vendor.
- Destroy information properly when it is no longer needed. Place paper in designated confidential destruction bins throughout the office or use a crosscut shredder.
- Be aware of your surroundings when printing, copying, faxing or discussing sensitive information. Pick up information from printers, copiers, or faxes in a timely manner.
- Lock your computer and mobile phone when not in use. This protects data from unauthorized access and use.
- Avoid using public Wi-Fi hotspots for confidential browsing. Always use virtual private network tunnels to protect the data and the device.
- Report all suspicious activity and cyber incidents to the CITC team Keep all areas containing sensitive information physically secured and allow access by authorized individuals only.
- Never click on links from an unknown or untrusted source. Cyber attackers often use them to trick you into visiting malicious sites and downloading malware that can be used to steal data and damage networks.
- Don’t be tricked into giving away confidential information. It’s easy for an unauthorized person to call and pretend to be an employee or business partner.
- Don’t respond to phone calls or emails requesting confidential data.
- Don’t leave sensitive information lying around the office.
- Don’t leave printouts or portable media containing private information on your desk. Lock them in a drawer to reduce the risk of unauthorized disclosure.
- Don’t post any private or sensitive information, such as credit card numbers, passwords or other private information, on public sites, including social media sites, and Don’t send it through email unless authorized to do so. (Use privacy settings on social media sites to restrict access to your personal information)
- Don’t leave wireless or Bluetooth turned on when not in use. Only do so when planning to use and only in a safe environment.
- Don’t leave devices unattended. Keep all mobile devices, such as laptops and cell phones physically secured. If a device is lost or stolen, report it immediately to your manager and ISO/designated security representative.
- Don’t plug in portable devices without permission from your management. These devices may be compromised with code just waiting to launch as soon as you plug them into a computer.
- Don’t install unauthorized programs on your work computer. Malicious applications often pose as legitimate software.
Computer and Information Technology Center
HUB Building, Indian Institute of Technology (IIT) Indore
Khandwa Road, Simrol, Indore,
Pin code 453 552, Madhya Pradesh, India
Tel: +91-731-660 3538
Email: ithelpdesk [at] iiti.ac.in