This website provides step-by-step instructions on how to run a SCION autonomous system (AS) in SCIONLab. It also provides a list of interesting projects that are using the SCION infrastructure for communication.
- Register on the SCIONLab coordination website
- Navigate to
My ASesand click
Create a new SCIONLab AS:
- Select any of the available attachment points; pick the closest one for shorter latency
Use VPNand select the installation type
Run SCION in a Vagrant virtual machine
- Confirm by clicking
- Install Vagrant and VirtualBox
- Download the generated tarfile, extract the
Vagrantfileand start the VM by executing
SCION (Scalability, COntrol and Isolation on next-generation Networks) is an inter-domain network architecture, designed to provide route control, failure isolation, and explicit trust information for end-to-end communication.
SCION organizes ASes into groups of independent routing planes, called isolation domains (ISDs), which interconnect to provide global connectivity.
Its path-aware architecture allows end hosts to learn about available network path segments, and combine them into end-to-end paths that are carried in packet headers. Furthermore, thanks to embedded cryptographic mechanisms, path construction is constrained to the route policies of ISPs and receivers, offering path choice to all the parties: senders, receivers, and ISPs.
These features also enable multi-path communication, which is an important approach for:
- high availability,
- rapid failover in case of network failures,
- increased end-to-end bandwidth,
- dynamic traffic optimization, and
- DDoS attack resilience
SCION is designed to interoperate with the existing networking infrastructure. Deployment of SCION can utilize existing internal routing and forwarding infrastructure of an AS, and only require installation or upgrade of a few border routers. A SCION-IP-Gateway (SIG) in the local infrastructure allows legacy end hosts and applications to be unaware of SCION.
- SCION Architecture website
- Summary paper: The SCION Internet Architecture
- Book: SCION: A Secure Internet Architecture (Open Access PDF)
- Implementation: scionproto/scion on GitHub
SCIONLab is a global research network to test and experiment with the SCION internet architecture. As a participant of SCIONLab, you will be able to create your own ASes that actively participate in the SCION inter-domain routing.
An autonomous system (AS) is a network under the control of a single administrative entity or domain. In SCION, ASes are connected only in well defined locations and links are defined by a provider/customer or a peering relation.
Each AS is in charge of providing essential informations to the collection of devices connected to it, called end hosts (e.g Smartphones, Laptops and so on). The ASes in SCION are fundamental in the two main phases of the architecture: the control plane, which is the process responsible for discovering paths and making those paths available to end hosts; and the data plane, which is the process responsible for the transmission of the packets.
For the control plane, each AS hosts different infrastructure services (beacon server, path server, certificate server and possibly others) that actually perform the process. For the data plane, the inter-AS traffic is routed through the SCION border routers of the ASes along a path. SCION is agnostic about the intra-AS routing, typically ASes run IP internally.
Running an AS means running the various AS control plane services and running border routers that connect the AS to other ASes.
For the sake of simplicity, a SCIONLab AS network typically consists of only a single host, which is running both all control plane services, border routers and end host applications at the same time.
Practically speaking your AS will be running on your own hardware, under your full control, and it is as simple as bringing up a Vagrant VM.
As already mentioned, the infrastructure of SCIONLab comprises a network of globally connected ASes, and number of these are configured to act as “Attachment Points”, and you can choose some as the uplink for your AS. The link between your AS and the attachment point AS is established as an overlay link over the legacy Internet. You can choose whether to instantiate this connection publicly (through a static public IP) or through a VPN offered by the Attachment Point itself (allowing also devices behind a NAT to act as AS). Whenever a change is made to the configuration of a SCIONLab AS, the configuration of the attachment point AS is automatically updated.
The SCIONLab website serves to simplify and coordinate the setup of experimental SCION ASes. SCIONLab is not connected to the production SCION network and all the SCIONLab ASes have AS-IDs specifically set aside for experimentation.
In order to simplify the management of ASes and lower the entry-barrier for participation, the design of SCIONLab deliberately has some restrictions that are not present in the production deployment of SCION:
- SCIONLab centralizes management of the control plane public key infrastructure. In the real deployment of SCION, there is no such single point of failure.
- Overlay links over the publicly routed Internet are used both in the infrastructure and between the infrastructure and user-owned ASes. Therefore, the security, availability, and performance properties of SCION are not fully realized.
- For questions on running your SCIONLab AS and discussion about SCION-related topics, visit our SCION community mailing list
- For suggestions or bugs on these pages, please post them on the tutorial GitHub repo
- For bug reports when running SCION, please post them on the SCIONLab GitHub repo
- SCIONLab NOC is available via email firstname.lastname@example.org