Table of Contents

 1     Scope          
 2     References
 3     Definitions 
 4     Abbreviations and acronyms             
 5     Conventions             
 6     NG-PON2 transmission convergence layer overview              
        6.1     TWDM transmission convergence layer             
        6.2     PtP WDM AMCC transmission convergence layer overview      
 7     TWDM resource allocation and quality of service     
        7.1     Principles of downstream and upstream resource allocation    
        7.2     Dynamic bandwidth assignment overview       
        7.3     Reference model of dynamic bandwidth assignment  
        7.4     DBA performance requirements           
 8     NG-PON2 transmission convergence framing sublayer          
        8.1     TWDM transmission convergence framing sublayer     
        8.2     PtP WDM management framing sublayer         
 9     TWDM encapsulation method          
        9.1     XGEM framing               
        9.2     XGEM frame delineation          
        9.3     SDU fragmentation     
        9.4     Mapping of services into XGEM frames             
10     NG-PON2 PHY adaptation sublayer               
       10.1     TWDM PHY adaptation sublayer          
       10.2     PtP WDM management PHY adaptation sublayer        
11     NG-PON2 PLOAM messaging channel          
       11.1     Overview       
       11.2     PLOAM message format         
       11.3     PLOAM message definitions  
12     NG-PON2 ONU activation  
       12.1     TWDM PON ONU activation cycle        
       12.2     PtP WDM ONU activation cycle            
13     NG-PON2 OLT and ONU timing relationships            
       13.1     TWDM ONU transmission timing and equalization delay           
       13.2     Time of day distribution over TWDM Channel
       13.3     PtP WDM ONU transmission timing    
14     TWDM performance monitoring, supervision and defects  
       14.1     Performance monitoring         
       14.2     Defects           
15     TWDM security      
       15.1     Threat model for NG-PON2   
       15.2     Authentication            
       15.3     Key derivation             
       15.4     XGEM payload encryption system      
       15.5     Data encryption key exchange and activation mechanism        
       15.6     Integrity protection and data origin verification for PLOAM     
       15.7     Integrity protection and data origin verification for OMCI         
       15.8     Integrity and data origin verification key switching      
       15.9     NG-PON2 systems with reduced data encryption strength      
16     NG-PON2 power management       
       16.1     TWDM power management  
       16.2     PtP WDM power management            
17     TWDM channel management          
       17.1     Profile announcement             
       17.2     ONU calibration           
       17.3     ONU wavelength channel handover  
       17.4     ONU wavelength channel locking        
18     TWDM system protection 
       18.1     OLT CT coordination in 1:1 type B dual parenting protection    
       18.2     OLT CT state coordination using inter-channel-termination protocol   
19     Rogue behaviour and its mitigation               
       19.1     Rogue ONU behaviour model in TWDM-PON
       19.2     Rogue ONU behaviour model for PtP WDM   
       19.3     Behaviour model when coexisting with ITU-T G.984 and ITU-T G.987 ONUs     
       19.4     Protection from noise and alien ONUs              
       19.5     Troublesome ONU presence detection enabled through idle window
Annex A – Hybrid error control (HEC) decoding and scrambler sequence codes    
        A.1     HEC decoding
        A.2     Scrambler sequence  
Annex B – Forward error correction using shortened Reed-Solomon codes    
Annex C – Secure mutual authentication via OMCI    
Annex D – Secure mutual authentication using IEEE 802.1X    
Annex E – Auxiliary management and control channel    
Annex F – Tuning sequences    
        F.1     Tuning sequences       
        F.2     Definition of TC layer tuning time         
      Page
Annex G – Transcoded framing with FEC and OAM for PtP WDM AMCC TC    
        G.1     Services with 8B/10B line code              
        G.2     Services with 64B/66B line code           
Appendix I – Downstream line data pattern conditioning    
Appendix II – Time of day derivation and error analysis    
Appendix III – Burst profiles    
Appendix IV – Golden vectors    
       IV.1     10G downstream and upstream FEC codeword             
      IV.2      10G upstream FEC short codeword     
       IV.3     2.5G downstream and upstream FEC codeword           
       IV.4     2.5G downstream and upstream FEC short codeword
       IV.5     Downstream AES-128 encryption        
       IV.6     Upstream AES-128 encryption              
       IV.7     Key derivation encryption       
       IV.8     Downstream PLOAM message integrity check               
       IV.9     Upstream PLOAM message integrity check     
      IV.10     Upstream key reporting         
      IV.11     Downstream OMCI message integrity check 
Appendix V – Protection examples    
Appendix VI – ICTP: Inter-channel-termination protocol    
       VI.1     ICTP use cases              
       VI.2     ICTP primitives description     
Appendix VII – ONU equalization delay coordination across TWDM channels    
      VII.1     Re-ranging     
      VII.2     Consistent equalization delay method              
      VII.3     EqD pre-configuration              
Appendix VIII – PON-ID and NG-PON2 system identifier examples    
Bibliography