Multi
HomeHome > News > Multi

Multi

Jul 09, 2023

Scientific Reports volume 12, Article number: 8365 (2022) Cite this article

678 Accesses

Metrics details

In this paper, a multi-dimensional quantitative model is firstly founded for evaluating communication network value, and the quantification of the abstract concept of network value is realized. By analyzing various factors that influence the evaluation of network value from multiple perspectives, an index system of multi-dimensional network value evaluation is established. By adopting the analytic hierarchy process (AHP) method, not only the weight of each dimension is reasonably determined, but also the weight of different indicators in the second dimension is determined. By the characteristics of each dimension and its weight in the evaluation system, a multi-dimensional quantitative model for evaluating communication network value is constructed. By analyzing the value of Ethernet passive optical network (EPON), the rationality of the proposed quantitative model is demonstrated.

As the important infrastructure of modern information society, communication network has a huge scale. And with the development of the times, the scale will expand rapidly1,2. How to make full use of huge network resources to serve the society better and more efficiently has attracted people (especially operators) to attach great importance3,4,5. The evaluation of communication network value provides key support for solving the above problems. By evaluating the value of communication networks, operators can precisely optimize their networks and rationally allocate resources. Therefore, the research on network value evaluation is of great significance and practical application value.

At present, the research on network value mainly focuses on the business model6,7,8, and the research on communication network value is still in the initial stage. Bob Metcalfe who first proposed the concept of network value only considered the number of network devices when defining network value9. Xia et al. defined the network value as the proportion of the priority of each service to the sum of the priorities of all services in virtual passive optical network (VPON), which is from a single perspective of service priority10. In11 and12, in addition to service priorities, network service value is also related to bandwidth. These studies only provide a simple definition of network value, without further research and analysis. Here, this paper will deeply analyze various factors that affect the evaluation of network value from multiple perspectives, and establish a quantitative model of communication network value. It will provide a theoretical basis for the evaluation and optimization of the network value in the future.

In this paper, we first propose a network value evaluation index system. In this multi-dimensional system, the evaluation indicators of network value are analyzed in detail from three dimensions, namely, safe and reliable value, QoS value and economic value. Then, a multi-dimensional network value quantification model is established according to the network value evaluation index system. The analytic hierarchy process is used to determine the weights of different dimensions and the weights of indicators in QoS value. It realizes the transformation of the evaluation of network value from qualitative description to quantitative calculation. Finally, a detailed network value analysis of Ethernet passive optical networks is performed.

The rest of this article is organized as follows. In section “The index system of multi-dimensional network value evaluation”, an index system of multi-dimensional network value evaluation is proposed. In section “Multi-dimensional quantitative model of network value”, the multi-dimensional quantitative model of network value is constructed. In section “Network value analyses”, the network value of Ethernet passive optical network (EPON) is calculated and analyzed. Finally, we conclude the paper in section “Conclusion”.

For a communication network, the value of the network not only refers to the profit that the network can bring, but also refers to the quality of the network. Therefore, the evaluation of network value should be multi-dimensional. The network value evaluation index system is shown in Fig. 1. It can be seen from the figure that this paper constructs network value model from three dimensions. The first dimension is the safe and reliable value of network. The security and reliability of the network are taken as evaluation indexes to ensure that network can communicate successfully. The second dimension is the quality of service (QoS) value of network. Evaluating the value of a network in terms of its quality of service can reflect the performance of the network. The third dimension is the economic value of network. Network revenue as one of the metrics to measure network value can ensure that operators get higher profits from the network. The evaluation indicators of these three dimensions are described in detail below.

Network value evaluation index system.

The safe and reliable value is regarded as the first-dimension value. This is because security and reliability are the most important performances for communication networks, and other performances of the network are based on this performance. The evaluation of this dimension’s value can be carried out from security and reliability respectively. Here, the security of network refers to the ability of network to resist external attacks. We all know that different networks are of different importance to national security, economic development and social life. Therefore, the requirements of security for different networks are different. The purpose of using network security level as one of the evaluation factors of network security value is to analyze different levels of networks differently so as to achieve more accurate value evaluation. The security index of network architecture mainly measures three aspects. One is to determine whether the network is divided into different network areas based on factors such as importance, and whether technical isolation measures are taken between important network areas and other network areas. It ensures the security of important network areas. The second is to determine whether the network provides hardware redundancy of communication lines, critical network equipment and critical computing equipment. This ensures the availability of the network system. The third is to determine whether the service processing capability of the network equipment and the bandwidth of each part of the network can meet the needs of service peak. This ensures the security of peak service. The indicator for communication transmission is to determine whether authentication techniques and security measures are used during data transmission. This indicator guarantees the integrity and confidentiality of the data during communication. Trusted authentication is to determine whether the network is based on a trusted root, to verify the system bootloader, system programs, important configuration parameters and communication applications of the communication device. And whether to alarm when the credibility of the device is destroyed. This index ensures that the network is not damaged by application software and viruses, and can effectively protect the security of the network system.

The reliability of the communication network here refers to the ability of network to successfully transmit data. It mainly includes three aspects: infrastructure reliability, network connectivity and data retransmission rate. Infrastructure reliability refers to the reliability of network hardware facilities. This index can be calculated according to the unreliability of network equipment in the design of network architecture. Generally, it must meet the condition of greater than 99.999%. Network connectivity refers to the ratio of the number of interconnected node pairs to the maximum possible number of node pairs in the network. It judges network reliability from overall connection of network. The larger the value of this indicator, the more paths the data has from the origin to the destination. Accordingly, the higher the probability of successful data transfer. Data retransmission rate refers to the ratio of the amount of data that needs to be retransmitted in the network to the total amount of data transmitted in the network. It judges the reliability of network from the data link transmission level. The larger the value, the less reliable the data link transmission.

QoS value, as the second dimension of network value, evaluates network value from the level of network service quality. ITU-T defines network inherent QoS as network performance, which can be reflected by parameters such as bandwidth, packet loss rate, delay and delay jitter. In order to describe the network quality of service more comprehensively, user perception is also taken into account in this paper. The QoS value of network can be reflected by users’ satisfaction with network. Therefore, the evaluation indexes of QoS value are bandwidth satisfaction, packet loss satisfaction, delay satisfaction and delay jitter satisfaction. Here, we introduce the user satisfaction model to represent these indicators. Referring to13,14, these four indicators are defined in the form of sigmoid functions, as shown in Eqs. (1)–(4). \({Q}_{bs}\), \({Q}_{pl}\), \({Q}_{d}\) and \({Q}_{j}\) represent bandwidth satisfaction, packet loss satisfaction, delay satisfaction and delay jitter satisfaction, respectively. \({b}_{m}\), \({d}_{m}\) and \({d}_{jm}\) represent user’s requested bandwidth, satisfied delay and satisfied delay jitter. \(b\), \(l\), \(d\) and \({d}_{j}\) represent allocated bandwidth, packet loss rate, delay and delay jitter. \(\delta \) is a parameter that controls the shape of the curve. The larger \(\delta \) is, the more sigmoid function tends to be a step function.

The last dimension is the economic value dimension. This dimension refers to the economic profit that the network can obtain. It can be calculated by revenue and cost of network. Network revenue refers to the total economic revenue obtained by selling network resources to users. It is mainly related to the total available resources of the network, the unit price of resources and the number of network users. Network costs refer to capital expenditures (CAPEX) and operational expenditures (OPEX). Capital expenditures refer to the initial set up cost of the network, mainly for network construction cost, including the cost of deploying network and network equipment cost15. Operational expenditures mainly refer to the cost of network operation and maintenance.

Section “The index system of multi-dimensional network value evaluation” analyzes the evaluation index system of network value. In this section, a multi-dimensional quantitative model of network value is constructed according to the evaluation index system.

The network security value is closely related to the security level requirements of network. Therefore, it is necessary to understand how many security levels a communication network has and the difference in requirements for each level. According to Baseline for Classified Protection of Cybersecurity16 and Evaluation Requirement for Classified Protection of Cybersecurity17, the network security protection level can be divided into five levels as shown in Table 1. The process for operators to determine the level of network security protection is as follows: determine the object of the rating—preliminarily determine the level—expert review—approval by the competent authority—record review.

Different levels of communication networks have different requirements for network architecture, communication transmission and trusted authentication. When evaluating the security level of a communication network, the number of evaluation items for each index of the network of different levels is different. The specific number is shown in Table 2. For the fifth-level network, it is only necessary to judge whether the network will cause particularly severe damage to national security when the network is infringed. So, it is not shown in the table. The details of each evaluation item in Table 2 can be found in16.

According to the security level of the communication network and the degree that each level of network meets the requirements of the national network security level evaluation, we can give the security value of the network:

In the above equation, “Does not meet the standards” refers to the existence of non-compliance items in the evaluation results of the network at this level, and the security problems in the network will cause the network to face a higher level of risk. “Basically meet the standards” means that there are items in the evaluation results that do not fully meet the standard, but these issues do not result in high risk to the network. \({num}_{i\_m}^{item}\) represents the number of evaluation items that meet the standard in the ith index. \({num}_{i}^{item}\) represents the total number of evaluation items of the ith index. When all the evaluation indexes of the communication network meet the requirements, S is 1. The degree to which the various indexes of a network meet the evaluation requirements can be evaluated by professional evaluation institutions.

The reliability value of the network is mainly related to the infrastructure reliability, the network connectivity and the data retransmission rate. The infrastructure reliability \({R}_{f}\), network connectivity \({R}_{c}\), and data retransmission rate \({R}_{t}\) are defined as follows:

In the above formula, \({R}_{fa}\) represents network architecture reliability, \({num}_{pair}\) represents the number of interconnected node pairs,\({num}_{max}\) represents the maximum possible number of node pairs in the network, \({T}_{re}\) represents the amount of data that needs to be retransmitted, \({T}_{total}\) represents the total amount of data transmitted in the network. Since operators require network infrastructure reliability to reach more than 99.999%, \({R}_{f}\) equal to 1 becomes the premise of network reliability value. In addition, network reliability is positively correlated with network connectivity and negatively correlated with data retransmission rate. We assume that network connectivity and data retransmission rate have the same degree of impact on network reliability. This is reflected in the formula for the same absolute value of the derivative. Moreover, the reliability value of network should range from 0 to 1. For the above reasons, the reliability value \(R\) can be defined as:

The partial derivative of the above formula can be obtained:

It can be seen from the above two equations that the absolute values of the two partial derivative are equal. This verifies the assumption that network connectivity and data retransmission rate have the same effect on network reliability. \(\frac{\partial R}{\partial {R}_{c}}\) is a positive number indicating that network reliability is positively correlated with network connectivity. \(\frac{\partial R}{\partial {R}_{t}}\) is a negative number indicating that network reliability is negatively correlated with the data retransmission rate.

The final safe and reliable value model is as follows:

It can be seen from the above formula that when the network does not meet the requirements of the security level at all or the architecture reliability of the network does not reach 99.999%, the safe and reliable value of the network is directly equal to zero. Therefore, the premise that a network has safe and reliable value is that the network is basically secure and the network architecture is reliable.

From the second section, we can know that the QoS value of the network is related to four indicators: bandwidth satisfaction, packet loss satisfaction, delay satisfaction and delay jitter satisfaction. The weighted sum of these four indicators is used to construct the QoS value model of the network. It is defined as follows:

where \({W}_{i}\) represents the weight of each index, \({Q}_{i}\) represents the value of each index.

Here, the weight refers to the quantitative contribution of each indicator to QoS value. Analytic Hierarchy Process (AHP) is a simple, flexible and practical method to quantitatively determine the weight of indicators18. In this paper, AHP is applied to determine the weight of each index. AHP generally decomposes the problem into three levels, namely the target level, the criterion level and the scheme level. Based on the judgment of objective reality, this method determines the relative importance of each factor in each level through pairwise comparison, and expresses it quantitatively. Then the weight of relative importance of all factors at each level is determined by mathematical method to provide reference for the final decision. In this paper, we only need to calculate the relative importance weights of all indicators in QoS, so only hierarchical single sorting is required. The relative importance between each index is determined by Delphi Method19. Next, the weight of each index is calculated.

First, the expert’s indices comparison matrix is constructed by Delphi Method. We invited 20 professors, researchers and other experts to independently compare QoS value indicators pair by pair20. And they were asked to rate the importance of each factors using nine-point scale. The meaning of different scores is shown in Table 3.

According to the scoring results of experts, a comparison matrix can be constructed. Here, one of the results is taken as an example for analysis. The scoring results are shown in Table 4. The “3” in the first column of Table 4 indicates that the delay satisfaction is moderately more important than the bandwidth satisfaction, and the last “1/3” in the second column indicates that the packet loss satisfaction is moderately important than the delay jitter satisfaction.

According to the above pair-wise comparison results, a comparison matrix can be constructed:

The eigenvalue of matrix \(Q\) can be calculated by the following formulas:

Solving the above formula, the maximum eigenvalue is \({\lambda }_{max}=4.0335\). The corresponding eigenvector is \({[0.1454 0.8776 0.3405 0.3045]}^{T}\).

To prevent the results of the hierarchical single sort from being too random, it is necessary to judge whether the current result meets the consistency test standard. The Consistency Index (\(CI\)) can be calculated by the maximum eigenvalue \({\lambda }_{max}\), as shown in Eq. (17).

where \(n\) is the size of matrix.

Next, it is necessary to calculate the Consistency Ratio (\(CR\)). The definition formula is shown in Eq. (18). If \(CR\) is greater than 0.1, it indicates that the current judgment matrix is highly random and does not meet the consistency test. Therefore, appropriate modifications are required. Only when \(CR\) is less than 0.1, the result is valid.

In the above equation, \(RI\) is the average random consistency index, which can be obtained from Table 5.

In this paper, there are four QoS value indicators, so \(n\) is equal to 4 and \(RI\) is 0.9. Therefore, the calculation results of \(CI\) and \(CR\) are as follows:

It can be seen from the above formula that the obtained result meets the consistency test. So, the result is valid. Finally, the weight \({W}_{sample}\) can be obtained by normalizing the eigenvector corresponding to the maximum eigenvalue.

The processing procedures for other samples are the same as the above sample. Finally, take the average weight of all samples to get the final weight:

Therefore, the constructed QoS value model is as follows:

The solution to the economic value can be decomposed into two parts: revenue and cost. Network revenue is mainly related to the network resources, the unit price of resources, and the number of users. Assuming that the annual revenue of the communication network is constant under the condition that the total network resources remain unchanged, the network revenue is defined as follows:

where \({\alpha }_{1}\) and \({\alpha }_{2}\) are represent the unit price of bandwidth for household users and the unit price of bandwidth for enterprise users, respectively. \({y}_{ij}\) represents the amount of resources allocated to user i by link j. \({x}_{ij}\) can only be 0 or 1. The value of 0 indicates that user i is not connected to link j, and the value of 1 indicates that there is a connection. N represents the number of links, m represents the number of household users, and n represents the number of enterprise users. Y represents the year of network usage. As the years of network usage increase, network revenues gradually increase.

The cost of a communication network mainly includes capital expenditures (CAPEX) and operational expenditures (OPEX). CAPEX are accounted for the first year15. It can be expresses by:

where \({C}_{fd}\) and \({C}_{eq}\) are the optical-fiber deployment cost and the equipment cost, respectively. OPEX can be decomposed as:

where \({C}_{co}\), \({C}_{O\&M\_H}\) and \({C}_{O\&M\_E}\) are the operation and maintenance (\(O\&M\)) cost of the central office, the household user end and the enterprise user end, respectively.

Assuming that OPEX is increasing year by year, the increase amount is \({C}_{opex\_incre}\). The total cost of using the network for Y years is:

The economic value of network is defined as:

The normalization of network economic value can be calculated by the ratio of the current value to the maximum value:

In the previous subsections, the values of the three dimensions were modeled. In this section, the communication network value will be modeled. The communication network value is the weighted sum of each dimension value. Similarly, the hierarchical single sorting method is used to determine the weights of different dimensions. The judgment matrix obtained is as follows:

The maximum eigenvalue of the matrix V is \({\lambda }_{max}=3.0536\). The corresponding eigenvector is \({[0.8021 0.5053 0.3183]}^{T}\).

As can be seen from the above equation, the solution conforms to the consistency test. The weight W of each dimension value can be gotten by normalizing the eigenvector corresponding to the maximum eigenvalue:

The final quantitative model of network value is as follows:

The model proposed in this paper is applicable to all optical communication networks. To show how the model can be applied to optical networks, in this section, we analyze the network value of an EPON. The EPON architecture used in this paper is shown in Fig. 2. The network consists of one optical line terminal (OLT) and 16 optical network units (ONUs). Three ONUs serve enterprise users and 13 ONUs serve household users. The network link transmission rate is 1 Gb/s. At the OLT end, Interleaved polling with adaptive cycle time (IPACT) and Cyclic polling with fixed cycle time (CPFCT) algorithms are used for DBA22,23. In order to be suitable for the communication network adopted in this paper, IPACT and CPFCT algorithms are adjusted to ensure QoS performance of users with high priority. The safe and reliable value, QoS value, economic value and overall value of the network are respectively analyzed in the following.

EPON architecture.

When the EPON network used in this paper is damaged, it will cause serious damage to individuals or organizations. So, the network is a third-level security protection network. Assume that the network meets all the evaluation requirements of the third-level security network, and the infrastructure reliability meets the requirement of 99.999%, that is, \(S=1\), \({R}_{f} =1\). Because all ONUs are connected to OLT in this network, the network connectivity is 1.

The safe and reliable values of network under different security scenarios are shown in Fig. 3. As can be seen from the solid line in the figure, when the network load is less than 0.8, the safe and reliable values of the two algorithms are almost the same. This is because when load is light, no matter what algorithm is adopted, the data retransmission rate of the network can always keep very low. When the load exceeds 0.8, the safe and reliable value of network begins to decline. This is because the data packet processing rate is lower than the data packet generation rate at this time. And the data packet is prone to transmission failure, resulting in a higher data retransmission rate and lowering the safe and reliable value. With the decrease of network security value or network connection rate, the safe and reliable value of network is greatly reduced. Moreover, the impact of reduced security value on the safe and reliable value of network is greater than the impact of reduced network connection rates. It also shows that security value has a greater weight. As can be seen from Fig. 3, network security, network connectivity and the use of different DBA algorithms will affect the safe and reliable value of the network. Operators can improve the safe and reliable value of the network through these three aspects.

Safe and reliable value.

This section analyzes the QoS value of the network. The values of \(\delta \) in formula (1) and formula (2) are 1 and 5 respectively13. The value of \({d}_{m}\) in formula (3) is half of the average delay when the load is 0.9, and \(\delta \) is 1. The value of \({d}_{jm}\) in formula (4) is half of the delay jitter when the load is 0.9, and \(\delta \) is 1. When using different DBA algorithms, the QoS value curve of the EPON is shown in Fig. 4. It can be seen from the figure that when the network load is less than 0.7, the network QoS value is greater than 0.9. Because the bandwidth, delay, delay jitter, and packet loss rate of the network can meet user needs at this time. When the load is greater than 0.7, as the load increases, the QoS value of the network begins to drop sharply. This is because when the network load is heavy, the resources of the network are not enough to meet the needs of all users, which leads to a decrease in user satisfaction. On the whole, the QoS value of IPACT algorithm is greater than that of CPFCT algorithm. This indicates that different algorithms have different effects on network QoS value.

Network QoS value of different algorithms.

When IPACT algorithm is adopted, the QoS value of network changes with the number of ONUs serving enterprise users, as shown in Fig. 5. While the load is less than 0.7, the QoS value of networks with different numbers of enterprise users has little difference. When the load is greater than 0.7, with the increase of the number of enterprise users in the network, the QoS value of the network gradually increases. And the greater the load, the greater the increase. This is because enterprise users have a higher priority. When under heavy load, the QoS of enterprise users can still be guaranteed. Correspondingly, the QoS value of the network will increase.

Network QoS value of different enterprise users.

The economic value of the network is analyzed in the following part. The values of each parameter in formulas (24)–(32) are shown in Table 6. Assume that up to 25 household users can share 100Mbps. The change of EPON network profit over the years is shown in Fig. 6. It can be seen from the figure that in the first year, the network generated very little profit. This is because of the high cost of network construction. With the year increase, network profits will gradually increase. However, as the number of enterprise users increases, network profits show a downward trend. And the greater the number of years, the greater the reduction. This is because when total network capacity is constant, the number of household users that the network can accommodate is much more than that of enterprise users. Although the unit price of bandwidth for enterprise users is much higher than that for home users, the network’s profit through home users is still greater than that for enterprise users.

EPON profit varies with year.

The curve of network economic value over the years is shown in Fig. 7. It can be seen from the figure that the economic value of the network in the first year is relatively low. Starting from the second year, with the increase of the network service life, the economic value of network gradually increases, and finally tends to be stable. As the number of enterprise users increases, the value of network economic benefits declines, which is consistent with changes in network profits. In general, the value of economic benefits can be improved by reducing network costs, or by reasonably planning the number of enterprise users and household users.

Economic value.

The first three subsections analyzed the value of each dimension respectively, and this part analyzes the overall value of the network. Both the safe and reliable value and QoS value are taken the value when load is 0.9. The network values change with the number of enterprise users are shown in Fig. 8. Among them, the solid line is the network value of EPON used in this article, the dotted line is the network value when changing the number of enterprise users. As can be seen from the figure, the network value in the first year is much lower than that in other years. This is because the economic value of network in the first year is very low. From the second year on, the network value changed little with the year and basically maintained at a stable value. As the number of enterprise users increases, the value of the network increases. This is because QoS value of the network increases with the number of enterprise users. Although the economic value of the network decreases with the increase of the number of enterprise users, the increase of QoS value makes up for the decrease of the economic value. So, the value of the network increases. In real life, the number of users of the network will continue to change, and the algorithms used by the network will also be updated. Therefore, in practical applications, the network value continues to change even after the second year.

Network value varies with the number of enterprise users.

The network values in different security scenarios are shown in Fig. 9. The figure shows that when security value of network is reduced, the network value will be greatly reduced. Similarly, when the network connectivity decreases, the network value will also decrease. And the impact of security value reduction on network value is much greater than network connectivity. Compared with Fig. 8, the curve in Fig. 9 has a larger change. This is determined by the weight of indicator. The safe and reliable value occupies the largest weight in the network value, so it has the greatest influence on the network. At the same time, it can be seen from the two figures that different algorithms have different effects on network value. Comparatively, the network using IPACT algorithm has higher network value than using CPFCT algorithm.

Network value in different security scenarios.

Like the single OLT network mentioned above, the value evaluation of a multi-OLT network is also carried out from three dimensions: safe and reliable value, QoS value and economic value. For the safe and reliable value, the security of multi-OLT networks is evaluated in the same way as the security of single OLT networks. In terms of reliability, the connection rate of a multi-OLT network should consider the connection between the ONU and all OLTs. For QoS value and economic value, there is no difference between the quantitative model of multi-OLT network and single-OLT network. It is just that the algorithm adopted by the multi-OLT network needs to consider the resource allocation among the multiple OLTs.

In general, there are three ways to improve the network value. The first is to make the network indicators meet the corresponding level evaluation requirements as much as possible to improve the security value of the network. The second is that the network value can be enhanced by rationally planning the number of enterprise users and the number of home users. Finally, higher performance DBA algorithms can be used to enhance the value of the network.

We constructed a multi-dimensional quantitative model of communication network value for the first time, and quantified the abstract concept of network value. At first, we analyzed various factors that influence the evaluation of network value from multiple perspectives, and established an index system of multi-dimensional network value evaluation. Next, the AHP method was adopted to determine the weight of each dimension and the weight of different indicators in the second dimension. Furthermore, according to the characteristics of each dimension and its weight in the evaluation system, a multi-dimensional quantitative model of communication network value was constructed. Finally, the value of EPON was calculated and analyzed in detail, and three strategies were proposed for operators to increase the network value.

The code and relevant dataset have been published in the following URL: https://github.com/Echoooooo121/network-value.git.

Bennis, M., Debbah, M. & Poor, H. V. Ultrareliable and low-latency wireless communication: Tail, risk, and scale. Proc. IEEE 106(10), 1834–1853. https://doi.org/10.1109/JPROC.2018.2867029 (2018).

Article Google Scholar

Ji, B. et al. Performance analysis of UAV relay assisted IoT communication network enhanced with energy harvesting. IEEE Access 7, 38738–38747. https://doi.org/10.1109/ACCESS.2019.2906088 (2019).

Article Google Scholar

Surendran, R. & Tamilvizhi, T. How to improve the resource utilization in cloud data center? in 2018 Int. Conf. Innov. Intell. Inform. Comput. Technol. (3ICT), 1–6. https://doi.org/10.1109/3ICT.2018.8855740 (2018).

Sun, Y., Qin, S., Feng, G., Zhang, L. & Imran, M. A. Service provisioning framework for RAN slicing: User admissibility, slice association and bandwidth allocation. IEEE Trans. Mob. Comput. 20(12), 3409–3422. https://doi.org/10.1109/TMC.2020.3000657 (2020).

Article Google Scholar

Panayiotou, T., Manousakis, K., Chatzis, S. P. & Ellinas, G. A data-driven bandwidth allocation framework with QoS considerations for EONs. J. Lightwave Technol. 37(9), 1853–1864. https://doi.org/10.1109/JLT.2019.2894179 (2019).

Article ADS Google Scholar

Haaker, T., Bouwman, H., & Faber, E. Customer and network value of mobile services: Balancing requirements and strategic interests. in Int. Conf. Inf. Syst, DBLP (2004).

Soviar, J. & Vodak, J. Value network as part of new trends in communication. Commun. Sci. Lett. Univ. Zilina 14(2), 70–75. https://doi.org/10.26552/com.C.2012.2.70-75 (2012).

Article Google Scholar

Haaker, T., Faber, E. & Bouwman, H. Balancing customer and network value in business models for mobile services. Int. J. Mob. Commun. 4(6), 645–661. https://doi.org/10.1504/ijmc.2006.010360 (2006).

Article Google Scholar

Metcalfe, B. Metcalfe’s law after 40 years of ethernet. Computer 46(12), 26–31. https://doi.org/10.1109/MC.2013.374 (2013).

Article Google Scholar

Xia, W. et al. Bandwidth-allocated algorithm modeled with matrix theory for traffic-orientated multisubsystem-based virtual passive optical network in metro-access optical network. Opt. Eng. 55(9), 096111 (2016).

Article ADS Google Scholar

Wang, X., Gan, C., Chen, Y. & Tong, L. (Network-service value)-based admission decision mechanism for ONU’s virtual access under distributed control in virtual passive optical network. Opt. Fiber Technol. 52, 101940. https://doi.org/10.1016/j.yofte.2019.101940 (2019).

Article Google Scholar

Qian, C., Li, Y., & Wang, M. Jointly Bandwidth Allocation and Admission Decision Algorithm Based on Network Value in Software-Defined Hybrid Passive Optical Network. in 2019 Asia Communications and Photonics Conference (ACP), 1–3. (2019).

Zhan, N., Gan, C., Hui, J. & Guo, Y. Fair resource allocation based on user satisfaction in multi-olt virtual passive optical network. IEEE Access 8, 134707–134715. https://doi.org/10.1109/ACCESS.2020.3010962 (2020).

Article Google Scholar

Antonioli, R. P., Rodrigues, E. B., Maciel, T. F., Sousa, D. A. & Cavalcanti, F. R. Adaptive resource allocation framework for user satisfaction maximization in multi-service wireless networks. Telecommun. Syst. 68(2), 259–275. https://doi.org/10.1007/s11235-017-0391-3 (2018).

Article Google Scholar

Rahman, M. M., Despins, C. & Affes, S. Design optimization of wireless access virtualization based on cost & QoS trade-off utility maximization. IEEE Trans. Wirel. Commun. 15(9), 6146–6162. https://doi.org/10.1109/TWC.2016.2580505 (2016).

Article Google Scholar

Information Security Technology. Baseline for Classified Protection of Cybersecurity (GB/T 22239-2019). http://c.gb688.cn/bzgk/gb/showGb?type=online&hcno=BAFB47E8874764186BDB7865E8344DAF (2019).

Information Security Technology. Evaluation Requirement for Classified Protection of Cybersecurity (GB/T 28448–2019). http://c.gb688.cn/bzgk/gb/showGb?type=online&hcno=7E736CDF4502B6FF1258DD250AA3EC8C (2019).

Saaty, T. L. What is the analytic hierarchy process? in Mathematical Models for Decision Support, 109–121. (Springer, 1988). https://doi.org/10.1007/978-3-642-83555-1_5.

Padilla-Rivera, A., do Carmo, B. B. T., Arcese, G. & Merveille, N. Social circular economy indicators: Selection through fuzzy delphi method. Sustain. Prod. Consump. 26, 101–110. https://doi.org/10.1016/j.spc.2020.09.015 (2021).

Article Google Scholar

Tam, M. C. & Tummala, V. R. An application of the AHP in vendor selection of a telecommunications system. Omega 29(2), 171–182. https://doi.org/10.1016/S0305-0483(00)00039-6 (2001).

Article Google Scholar

Al-Harbi, K. M. A. S. Application of the AHP in project management. Int. J. Project Manage. 19(1), 19–27. https://doi.org/10.1016/S0263-7863(99)00038-1 (2001).

Article Google Scholar

Kramer, G., Mukherjee, B. & Pesavento, G. IPACT a dynamic protocol for an Ethernet PON (EPON). IEEE Commun. Mag. 40(2), 74–80. https://doi.org/10.1109/35.983911 (2002).

Article Google Scholar

Choi, S. I. Cyclic polling-based dynamic bandwidth allocation for differentiated classes of service in Ethernet passive optical networks. Photon Netw. Commun. 7(1), 87–96. https://doi.org/10.1023/A:1027461505117 (2004).

Article Google Scholar

Khan, J., Khan, Y., Ullah, S. & Querishi, S. S. Transmission performance and cost analysis of multi-carrier-based wavelength division multiplexed passive optical access network. J. Opt. Commun. 41(2), 159–165. https://doi.org/10.1515/joc-2017-0157 (2020).

Article CAS Google Scholar

Mahloo, M., Machuca, C. M., Chen, J. & Wosinska, L. Protection cost evaluation of WDM-based next generation optical access networks. Opt. Switch. Netw. 10(1), 89–99. https://doi.org/10.1016/j.osn.2012.07.002 (2013).

Article Google Scholar

Download references

This work was supported in part by National Key Research and Development Program of China (2021YFB2900800), the Science and Technology Commission of Shanghai Municipality (Project Nos. 20511102400, 20ZR1420900) and 111 Project (D20031).

Key Laboratory of Specialty Fiber Optics and Optical Access Networks, Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication, Shanghai University, Shanghai, 200444, China

Lijuan Wu, Chaoqin Gan, Zhongsen Xu & Jianqiang Hui

You can also search for this author in PubMed Google Scholar

You can also search for this author in PubMed Google Scholar

You can also search for this author in PubMed Google Scholar

You can also search for this author in PubMed Google Scholar

This paper was completed by a number of authors, each of whom contributed: W.L.: Conceptualization, Methodology, Software, Writing—Original Draft. G.C.: Supervision, Writing—Review and Editing. X.Z.: Data Curation, Investigation. H.J.: Data Curation, Visualization.

Correspondence to Chaoqin Gan.

The authors declare no competing interests.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and Permissions

Wu, L., Gan, C., Xu, Z. et al. Multi-dimensional quantitative model of communication network value. Sci Rep 12, 8365 (2022). https://doi.org/10.1038/s41598-022-12501-0

Download citation

Received: 08 March 2022

Accepted: 11 May 2022

Published: 19 May 2022

DOI: https://doi.org/10.1038/s41598-022-12501-0

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.