1 Scope
2 References
3 Definitions
4 Abbreviations and acronyms
5 Conventions
6 XG-PON transmission convergence layer overview
6.1 XGTC layer structure
6.2 XGTC sublayer functions
6.3 Management of an XG-PON system
6.4 Time division multiplexing architecture
6.5 Media access control
7 Resource allocation and quality of service
7.1 Principles of downstream and upstream resource allocation
7.2 Dynamic bandwidth assignment overview
7.3 Reference model of dynamic bandwidth assignment
7.4 DBA performance requirements
8 XG-PON transmission convergence layer framing
8.1 Downstream XGTC framing
8.2 Upstream XGTC framing
9 XG-PON encapsulation method
9.1 XGEM framing
9.2 XGEM frame delineation
9.3 SDU fragmentation
9.4 Mapping of services into XGEM frames
10 PHY adaptation sublayer
10.1 Downstream PHY frame
10.2 Upstream PHY frames and upstream PHY bursts
10.3 Forward error correction
10.4 Scrambling
11 PLOAM messaging channel
11.1 Overview
11.2 PLOAM message format
11.3 PLOAM message definitions
12 ONU activation
12.1 Overview
12.2 Activation mechanism at the ONU
12.3 OLT support of the activation process
13 OLT and ONU timing relationships
13.1 ONU transmission timing and equalization delay
13.2 Time of day distribution over XG-PON
14 Performance monitoring, supervision, and defects
14.1 Performance monitoring
14.2 Defects
15 XG-PON security
15.1 Threat model for XG-PON
15.2 Authentication
15.3 Key derivation
15.4 XGEM payload encryption system
15.5 Data encryption key exchange and activation mechanism
15.6 Integrity protection and data origin verification for PLOAM
15.7 Integrity protection and data origin verification for OMCI
15.8 Integrity and data origin verification key switching
15.9 XG-PON systems with reduced data encryption strength
16 ONU power management
16.1 Power management configuration and signalling
16.2 Power management parameter definitions
16.3 Power management state machine specifications
16.4 Management transactions during low power mode
Annex A – Hybrid error correction (HEC) decoding and scrambler sequence
A.1 HEC decoding
A.2 Scrambler sequence
Annex B – Forward error correction using shortened Reed-Solomon codes
B.1 Polynomial representation over Galois field
B.2 Construction of RS(248, 232) codeword
B.3 Construction of RS(248, 216) codeword
Annex C – Secure mutual authentication via OMCI
Annex D – Secure mutual authentication based on IEEE 802.1X
D.1 Introduction
D.2 Stack model for XG-PON authentication using [IEEE 802.1X]
D.3 Behaviour at network entry
Annex E – PON-ID maintenance
E.1 Introduction
E.2 PON-ID structure
Annex F – Extended rogue ONU
mitigation capabilities
F.1 Introduction
F.2 Extra codepoint of disable PLOAM message type
Page
F.3 Extra transition of the ONU activation cycle state transition
diagram
Appendix I – Downstream line data pattern conditioning
I.1 Spectrum control using idle XGEM frames
I.2 Intentional PON disruption
Appendix II – Time of day derivation and error analysis
Appendix III – Burst profiles
Appendix IV – Golden vectors
IV.1 Downstream FEC codeword
IV.2 Upstream FEC codeword
IV.3 Upstream FEC short codeword
IV.4 Downstream AES-128 encryption
IV.5 Upstream AES-128 encryption
IV.6 Key derivation encryption
IV.7 Downstream PLOAM message integrity check
IV.8 Upstream PLOAM message integrity check
IV.9 Upstream key reporting
IV.10 Downstream OMCI message integrity check
Bibliography