1 Scope
2 References
3 Definitions
4 Abbreviations
and acronyms
5 Conventions
6 NG-PON2
transmission convergence layer overview
6.1 TWDM
transmission convergence layer
6.2 PtP
WDM AMCC transmission convergence layer overview
7 TWDM resource
allocation and quality of service
7.1 Principles
of downstream and upstream resource allocation
7.2 Dynamic
bandwidth assignment overview
7.3 Reference
model of dynamic bandwidth assignment
7.4 DBA
performance requirements
8 NG-PON2
transmission convergence framing sublayer
8.1 TWDM
transmission convergence framing sublayer
8.2 PtP
WDM management framing sublayer
9 TWDM
encapsulation method
9.1 XGEM
framing
9.2 XGEM
frame delineation
9.3 SDU
fragmentation
9.4 Mapping
of services into XGEM frames
10 NG-PON2 PHY
adaptation sublayer
10.1 TWDM
PHY adaptation sublayer
10.2 PtP
WDM management PHY adaptation sublayer
11 NG-PON2 PLOAM
messaging channel
11.1 Overview
11.2 PLOAM
message format
11.3 PLOAM
message definitions
12 NG-PON2 ONU
activation
12.1 TWDM
PON ONU activation cycle
12.2 PtP
WDM ONU activation cycle
13 NG-PON2 OLT and
ONU timing relationships
13.1 TWDM
ONU transmission timing and equalization delay
13.2 Time
of day distribution over TWDM channel
13.3 PtP
WDM ONU transmission timing
14 TWDM
performance monitoring, supervision and defects
14.1 Performance
monitoring
14.2 Defects
15 TWDM security
15.1 Threat
model for NG-PON2
15.2 Authentication
15.3 Key
derivation
15.4 XGEM
payload encryption system
15.5 Data
encryption key exchange and activation mechanism
15.6 Integrity
protection and data origin verification for PLOAM
15.7 Integrity
protection and data origin verification for OMCI
15.8 Integrity
and data origin verification key switching
15.9 NG-PON2
systems with reduced data encryption strength
16 NG-PON2 power
management
16.1 TWDM
power management
16.2 PtP
WDM power management
17 TWDM channel
management
17.1 Profile
announcement
17.2 ONU
calibration
17.3 ONU
wavelength channel handover
17.4 ONU
wavelength channel locking
18 TWDM system
protection
18.1 OLT CT
coordination in 1:1 Type B protection
18.2 OLT CT
Type B protection state machine
18.3 Simplified
state transition diagram
19 Rogue behaviour and its mitigation
19.1 Rogue
ONU behaviour model in TWDM-PON
19.2 Rogue
ONU behaviour model for PtP WDM
19.3 Behaviour
model when coexisting with ITU-T G.984 and ITU-T G.987 ONUs
19.4 Protection
from noise and alien ONUs
19.5 Troublesome
ONU presence detection enabled through idle window
Annex A Hybrid error control (HEC) decoding and
scrambler sequence codes
A.1 HEC
decoding
A.2 Scrambler
sequence
Annex B Forward error correction using shortened
Reed-Solomon codes
Annex C Secure mutual authentication via OMCI
Annex D Secure mutual authentication using IEEE
802.1X
Annex E Auxiliary management and control channel
Page
Annex F Tuning sequences
F.1 Tuning
sequences
F.2 Definition
of TC layer tuning time
Annex G Transcoded framing with FEC and OAM for PtP
WDM AMCC TC
G.1 Services
with 8B/10B line code
G.2 Services
with 64B/66B line code
Annex H Wavelength channel bonding
H.1 Bonded
ONU activation
Annex I
Annex J Contention-based PON operation
J.1 Contention-based
allocations
J.2 Contention-based
functions overview
J.3 Contention-based
functions associated with explicitly assigned Alloc-IDs
J.4 PLOAM
message modifications
Annex K Collision resolution for contention-based
allocations
K.1 Collision
resolution for contention-based allocation
K.2 Set-splitting
collision resolution protocol
K.3 Reporting
collision outcome
K.4 ONU
support of the Set-splitting collision resolution protocol
K.5 New
PLOAM message
Appendix I Downstream line data pattern conditioning
Appendix II Time of day derivation and error
analysis
Appendix III Burst profiles
Appendix IV Golden vectors
IV.1 10G
downstream and upstream FEC codeword
IV.2 10G upstream
FEC short codeword
IV.3 2.5G
downstream and upstream FEC codeword
IV.4 2.5G
downstream FEC short codeword
IV.5 2.5G
upstream FEC short codeword
IV.6 Downstream
AES-128 encryption
IV.7 Upstream
AES-128 encryption
IV.8 Key
derivation encryption
IV.9 Downstream
PLOAM message integrity check
IV.10 Upstream
PLOAM message integrity check
IV.11 Upstream
key reporting
IV.12 Downstream
OMCI message integrity check
Appendix V Protection examples
Appendix VI ICTP:
Inter-channel-termination protocol
VI.1 ICTP use cases
VI.2 ICTP
primitives description
Appendix VII ONU equalization delay coordination
across TWDM channels
VII.1 Re-ranging
VII.2 Consistent
equalization delay method
VII.3 EqD
pre-configuration
Appendix VIII PON-ID and NG-PON2 system identifier
examples
Appendix IX Cooperative
DBA by client systems for low-latency services
IX.1 PON
application to low-latency services and its challenge
IX.2 Cooperative
DBA by client systems
IX.3 Use
case mobile fronthaul
IX.4 Reference
Point
Appendix X Combining OLT CTs with multiple ODN
optical path loss classes in the same NG-PON2 system
X.1 Motivation
for combining multiple optical path loss classes in an NG-PON2 system
X.2 Best
practice use case description
Appendix XI ONU in the Emergency Stop state
Bibliography