Table of Contents

 1     Scope          
 2     References
 3     Definitions 
 4     Abbreviations and acronyms
 5     Conventions             
 6     XG-PON transmission convergence layer overview     
        6.1     XGTC layer structure   
        6.2     XGTC sublayer functions           
        6.3     Management of an XG-PON system      
        6.4     Time division multiplexing architecture
        6.5     Media access control  
 7     Resource allocation and quality of service     
        7.1     Principles of downstream and upstream resource allocation       
        7.2     Dynamic bandwidth assignment overview          
        7.3     Reference model of dynamic bandwidth assignment      
        7.4     DBA performance requirements             
 8     XG-PON transmission convergence layer framing       
        8.1     Downstream XGTC framing      
        8.2     Upstream XGTC framing           
 9     XG-PON encapsulation method         
        9.1     XGEM framing              
        9.2     XGEM frame delineation           
        9.3     SDU fragmentation     
        9.4     Mapping of services into XGEM frames
10     PHY adaptation sublayer     
       10.1     Downstream PHY frame          
       10.2     Upstream PHY frames and upstream PHY bursts             
       10.3     Forward error correction         
       10.4     Scrambling    
11     PLOAM messaging channel 
       11.1     Overview       
       11.2     PLOAM message format          
       11.3     PLOAM message definitions   
12     ONU activation      
       12.1     Overview       
       12.2     Activation mechanism at the ONU       
       12.3     OLT support of the activation process 
13     OLT and ONU timing relationships   
       13.1     ONU transmission timing and equalization delay            
       13.2     Time of day distribution over XG-PON 
14     Performance monitoring, supervision, and defects   
       14.1     Performance monitoring         
       14.2     Defects          
15     XG-PON security     
       15.1     Threat model for XG-PON       
       15.2     Authentication            
       15.3     Key derivation             
       15.4     XGEM payload encryption system        
       15.5     Data encryption key exchange and activation mechanism          
       15.6     Integrity protection and data origin verification for PLOAM       
       15.7     Integrity protection and data origin verification for OMCI          
       15.8     Integrity and data origin verification key switching        
       15.9     XG-PON systems with reduced data encryption strength             
16     ONU power management   
       16.1     Power management configuration and signalling           
       16.2     Power management parameter definitions       
       16.3     Power management state machine specifications         
       16.4     Management transactions during low power mode       
Annex A – Hybrid error correction (HEC) decoding and scrambler sequence    
        A.1     HEC decoding
        A.2     Scrambler sequence    
Annex B – Forward error correction using shortened Reed-Solomon codes    
        B.1     Polynomial representation over Galois field      
        B.2     Construction of RS(248, 232) codeword             
        B.3     Construction of RS(248, 216) codeword             
Annex C – Secure mutual authentication via OMCI    
Annex D – Secure mutual authentication based on IEEE 802.1X    
        D.1     Introduction  
        D.2     Stack model for XG-PON authentication using [IEEE 802.1X]       
        D.3     Behaviour at network entry     
Annex E – PON-ID maintenance    
        E.1     Introduction   
        E.2     PON-ID structure         
Annex F Extended rogue ONU mitigation capabilities    
        F.1     Introduction   
        F.2     Extra codepoint of disable PLOAM message type            
      Page
        F.3     Extra transition of the ONU activation cycle state transition diagram      
Appendix I – Downstream line data pattern conditioning    
        I.1     Spectrum control using idle XGEM frames           
        I.2     Intentional PON disruption        
Appendix II – Time of day derivation and error analysis    
Appendix III – Burst profiles    
Appendix IV – Golden vectors    
       IV.1     Downstream FEC codeword    
       IV.2     Upstream FEC codeword          
       IV.3     Upstream FEC short codeword              
       IV.4     Downstream AES-128 encryption          
       IV.5     Upstream AES-128 encryption
       IV.6     Key derivation encryption        
       IV.7     Downstream PLOAM message integrity check  
       IV.8     Upstream PLOAM message integrity check        
       IV.9     Upstream key reporting            
      IV.10     Downstream OMCI message integrity check    
Bibliography