Table of Contents

 1     Scope          
 2     References
 3     Definitions
 4     Abbreviations and acronyms             
 5     Conventions            
 6     NG-PON2 transmission convergence layer overview
        6.1     TWDM transmission convergence layer            
        6.2     PtP WDM AMCC transmission convergence layer overview     
 7     TWDM resource allocation and quality of service     
        7.1     Principles of downstream and upstream resource allocation   
        7.2     Dynamic bandwidth assignment overview      
        7.3     Reference model of dynamic bandwidth assignment  
        7.4     DBA performance requirements          
 8     NG-PON2 transmission convergence framing sublayer          
        8.1     TWDM transmission convergence framing sublayer    
        8.2     PtP WDM management framing sublayer        
 9     TWDM encapsulation method         
        9.1     XGEM framing             
        9.2     XGEM frame delineation         
        9.3     SDU fragmentation    
        9.4     Mapping of services into XGEM frames             
10     NG-PON2 PHY adaptation sublayer
       10.1     TWDM PHY adaptation sublayer         
       10.2     PtP WDM management PHY adaptation sublayer        
11     NG-PON2 PLOAM messaging channel          
       11.1     Overview     
       11.2     PLOAM message format        
       11.3     PLOAM message definitions 
12     NG-PON2 ONU activation 
       12.1     TWDM PON ONU activation cycle      
       12.2     PtP WDM ONU activation cycle           
13     NG-PON2 OLT and ONU timing relationships            
       13.1     TWDM ONU transmission timing and equalization delay          
       13.2     Time of day distribution over TWDM Channel               
       13.3     PtP WDM ONU transmission timing   
       14.1     Performance monitoring       
       14.2     Defects         
14     TWDM performance monitoring, supervision and defects  
15     TWDM security     
       15.1     Threat model for NG-PON2  
       15.2     Authentication           
       15.3     Key derivation            
       15.4     XGEM payload encryption system     
       15.5     Data encryption key exchange and activation mechanism       
       15.6     Integrity protection and data origin verification for PLOAM    
       15.7     Integrity protection and data origin verification for OMCI        
       15.8     Integrity and data origin verification key switching     
       15.9     NG-PON2 systems with reduced data encryption strength      
16     NG-PON2 power management       
       16.1     TWDM power management 
       16.2     PtP WDM power management           
17     TWDM channel management         
       17.1     Profile announcement            
       17.2     ONU calibration         
       17.3     ONU wavelength channel handover 
       17.4     ONU wavelength channel locking       
18     TWDM system protection 
       18.1     OLT CT coordination in 1:1 Type B protection
       18.2     OLT CT Type B protection state machine         
       18.3     Simplified state transition diagram    
19     Rogue behaviour and its mitigation               
       19.1     Rogue ONU behaviour model in TWDM-PON
       19.2     Rogue ONU behaviour model for PtP WDM   
       19.3     Behaviour model when coexisting with ITU-T G.984 and ITU-T G.987 ONUs     
       19.4     Protection from noise and alien ONUs             
       19.5     Troublesome ONU presence detection enabled through idle window
Annex A – Hybrid error control (HEC) decoding and scrambler sequence codes    
        A.1     HEC decoding              
        A.2     Scrambler sequence 
Annex B – Forward error correction using shortened Reed-Solomon codes    
Annex C – Secure mutual authentication via OMCI    
Annex D – Secure mutual authentication using IEEE 802.1X    
Annex E – Auxiliary management and control channel    
      Page
Annex F – Tuning sequences    
        F.1     Tuning sequences      
        F.2     Definition of TC layer tuning time        
Annex G – Transcoded framing with FEC and OAM for PtP WDM AMCC TC    
        G.1     Services with 8B/10B line code            
        G.2     Services with 64B/66B line code          
Annex H – Wavelength channel bonding    
        H.1     Bonded ONU activation           
Appendix I – Downstream line data pattern conditioning    
Appendix II – Time of day derivation and error analysis    
Appendix III – Burst profiles    
Appendix IV – Golden vectors    
       IV.1     10G downstream and upstream FEC codeword             
      IV.2      10G upstream FEC short codeword    
       IV.3     2.5G downstream and upstream FEC codeword           
       IV.4     2.5G downstream FEC short codeword             
       IV.5     2.5G upstream FEC short codeword   
       IV.6     Downstream AES-128 encryption        
       IV.7     Upstream AES-128 encryption              
       IV.8     Key derivation encryption      
       IV.9     Downstream PLOAM message integrity check
      IV.10     Upstream PLOAM message integrity check    
      IV.11     Upstream key reporting         
      IV.12     Downstream OMCI message integrity check 
Appendix V – Protection examples    
Appendix VI – ICTP: Inter-channel-termination protocol    
       VI.1     ICTP use cases             
       VI.2     ICTP primitives description     
Appendix VII – ONU equalization delay coordination across TWDM channels    
      VII.1     Re-ranging    
      VII.2     Consistent equalization delay method              
      VII.3     EqD pre-configuration             
Appendix VIII – PON-ID and NG-PON2 system identifier examples    
Appendix IX – Cooperative DBA by client systems for low-latency services    
       IX.1     PON application to low-latency services and its challenge         
       IX.2     Cooperative DBA by client systems     
       IX.3     Use case – mobile fronthaul  
       IX.4     Reference Point          
Appendix X – Combining OLT CTs with multiple ODN optical path loss classes  in the same NG-PON2 system     
        X.1     Motivation for combining multiple optical path loss classes in an NG-PON2 system    
        X.2     Best practice use case description       
Bibliography