1 Scope
2 References
3 Definitions
4 Abbreviations and acronyms
5 Conventions
6 NG-PON2 transmission convergence layer overview
6.1 TWDM transmission convergence layer
6.2 PtP WDM AMCC transmission convergence layer overview
7 TWDM resource allocation and quality of service
7.1 Principles of downstream and upstream resource allocation
7.2 Dynamic bandwidth assignment overview
7.3 Reference model of dynamic bandwidth assignment
7.4 DBA performance requirements
8 NG-PON2 transmission convergence framing sublayer
8.1 TWDM transmission convergence framing sublayer
8.2 PtP WDM management framing sublayer
9 TWDM encapsulation method
9.1 XGEM framing
9.2 XGEM frame delineation
9.3 SDU fragmentation
9.4 Mapping of services into XGEM frames
10 NG-PON2 PHY adaptation sublayer
10.1 TWDM PHY adaptation sublayer
10.2 PtP WDM management PHY adaptation sublayer
11 NG-PON2 PLOAM messaging channel
11.1 Overview
11.2 PLOAM message format
11.3 PLOAM message definitions
12 NG-PON2 ONU activation
12.1 TWDM PON ONU activation cycle
12.2 PtP WDM ONU activation cycle
13 NG-PON2 OLT and ONU timing relationships
13.1 TWDM ONU transmission timing and equalization delay
13.2 Time of day distribution over TWDM Channel
13.3 PtP WDM ONU transmission timing
14 TWDM performance monitoring, supervision and defects
14.1 Performance monitoring
14.2 Defects
15 TWDM security
15.1 Threat model for NG-PON2
15.2 Authentication
15.3 Key derivation
15.4 XGEM payload encryption system
15.5 Data encryption key exchange and activation mechanism
15.6 Integrity protection and data origin verification for PLOAM
15.7 Integrity protection and data origin verification for OMCI
15.8 Integrity and data origin verification key switching
15.9 NG-PON2 systems with reduced data encryption strength
16 NG-PON2 power management
16.1 TWDM power management
16.2 PtP WDM power management
17 TWDM channel management
17.1 Profile announcement
17.2 ONU calibration
17.3 ONU wavelength channel handover
17.4 ONU wavelength channel locking
18 TWDM system protection
18.1 OLT CT coordination in 1:1 type B dual parenting protection
18.2 OLT CT state coordination using inter-channel-termination
protocol
19 Rogue behaviour and its mitigation
19.1 Rogue ONU behaviour model in TWDM-PON
19.2 Rogue ONU behaviour model for PtP WDM
19.3 Behaviour model when coexisting with ITU-T G.984 and ITU-T
G.987 ONUs
19.4 Protection from noise and alien ONUs
19.5 Troublesome ONU presence detection enabled through idle window
Annex A – Hybrid error control (HEC) decoding and scrambler sequence codes
A.1 HEC decoding
A.2 Scrambler sequence
Annex B – Forward error correction using shortened Reed-Solomon codes
Annex C – Secure mutual authentication via OMCI
Annex D – Secure mutual authentication using IEEE 802.1X
Annex E – Auxiliary management and control channel
Annex F – Tuning sequences
F.1 Tuning sequences
F.2 Definition of TC layer tuning time
Page
Annex G – Transcoded framing with FEC and OAM for PtP WDM AMCC TC
G.1 Services with 8B/10B line code
G.2 Services with 64B/66B line code
Appendix I – Downstream line data pattern conditioning
Appendix II – Time of day derivation and error analysis
Appendix III – Burst profiles
Appendix IV – Golden vectors
IV.1 10G downstream and upstream FEC codeword
IV.2 10G upstream FEC short codeword
IV.3 2.5G downstream and upstream FEC codeword
IV.4 2.5G downstream and upstream FEC short codeword
IV.5 Downstream AES-128 encryption
IV.6 Upstream AES-128 encryption
IV.7 Key derivation encryption
IV.8 Downstream PLOAM message integrity check
IV.9 Upstream PLOAM message integrity check
IV.10 Upstream key reporting
IV.11 Downstream OMCI message integrity check
Appendix V – Protection examples
Appendix VI – ICTP: Inter-channel-termination protocol
VI.1 ICTP use cases
VI.2 ICTP primitives description
Appendix VII – ONU equalization delay coordination across TWDM channels
VII.1 Re-ranging
VII.2 Consistent equalization delay method
VII.3 EqD pre-configuration
Appendix VIII – PON-ID and NG-PON2 system identifier examples
Bibliography