Computer Services Centre

Indian Institute of Technology Delhi

  • Increase font size
  • Default font size
  • Decrease font size
Welcome to the Computer Services Centre

Revision of IITD Internet Access Policies

E-mail Print PDF
Revision of IITD Internet Access Policies.
Recently, the Institute resolved to liberalise the port restrictions and proxy requirements for IITD Internet. 
Some of the key highlights are:
  • the domain will be the primary domain for IIT Delhi ( is deprecated and may not be supported in future)
  • a revised IIT Delhi IT Policy comprising of (1) The IITD IT Usage Policy (ii) The IITD IT Privacy Policy & (iii) The Network Access & Monitoring policy. (see for details).
  • Port restriction are being removed from all authenticated (802.1x) access points (e.g. IITD_WIFI)
  • Please note that this means users may visit any sites/services. Howeve proper traceability of IP addresses will be maintained and in case of any violation of IITD Policies including illegal downloads of copyrighted content, strict action will be taken which may includes appropriate fines and or suspension of Internet priviliges and or the CSC ID.
  • For unauthenticated Wired Services — Current Proxy Based Access will continue.
  • Guest access is now permitted only through IITD_Secure_GUEST and the unsecured IITD_GUEST/IITD_Guests is being withdrawn.
User Acceptance of Revised Policies
As a part of the implementation process, the administration also approved a revised IIT Delhi IT Policy comprising of (1) The IITD IT Usage Policy (ii) The IITD IT Privacy Policy & (iii) The Network Access & Monitoring policy. As resolved by the Dean's Committee, each user is required to review & accept these policies to avail of IITD Internet & IT Facilities. You may visit to review and accept these policies. You will need to login with your kerberos ID.

Please note that you will need to visit the above site and agree to the policy by the 15th of Jan 2017, failing which your Internet privileges will be suspended.

The revised policies will come into effect from Jan 16th 2017.

For any queries you may call x-7126 or write to
Note regarding Security:Please be sure to check whether a email is genuinely from the IIT Admins -- look at the original source (all email clients can show this) and check the authenticated sender & DKIM signature for IIT Delhi. Also before entering your user ID/Password at a site you should make sure the sites security certificate is valid and authenticated with the IITD Certificate(s). See CSC website for further details on Digital Singing of emails and IITD CA Certificates.
Last Updated on Thursday, 05 January 2017 21:05

Track Wifi & Proxy Usage

E-mail Print PDF


CSC has introduced a site for user to view  proxy Usage and track Wifi & Proxy Session data usage. You may visit


Baadal: the IITD computing cloud

Print PDF

The CSC has commissioned a new cloud computing environment for high performance computing based on

  1. 64 blade servers each with 2x8 core Intel(R) Xeon(R) CPU X5670  @ 2.93GHz and 200 GB RAM
  2. A  2 x 10Gbps ethernet backbone
  3. 150 TB of virtualized storage based on a NetApp 8040V NAS and HP EVA6400 SAN with FC disks.
  4. Open source virtualization technology based on KVM.
  5. Baadal: an indigineously developed cloud orchestration and virtualization management software that can work with multiple virtualization technologies like KVM, Xen and VmWare

The cloud computing environment above has a raw processing capacity of around 30 TFlops. 

Last Updated on Friday, 13 January 2017 06:26


E-mail Print PDF

Request Access

More details at

How to Use

You will need an ssh client to connect to the Padum cluster. CPU login is available through ssh (Use IITD credentials). To copy data use scp to GPU or Mic (Xeon Phi) nodes can be directly accessed through and respectively. Please avoid using gpu and mic for large data transfer.

Last Updated on Thursday, 08 December 2016 22:15

New Software Repository

E-mail Print PDF

CSC has commissioned a new software repositiory designed and executed by Phani Mahesh. The repository has the advantage that it uses a caching proxy to cache only those software packages that are needed by users from time to time, rather than mirroring whole sites like Ubuntu, Centos, Debian or Gentoo. With this new architecture we have been able to provide links for more than just software. The style of presentation is also different from the usual CSC style of web-pages.

Last Updated on Friday, 13 January 2017 06:30
  • «
  •  Start 
  •  Prev 
  •  1 
  •  2 
  •  3 
  •  4 
  •  5 
  •  Next 
  •  End 
  • »

Page 1 of 5