1 Scope
2 References
3 Definitions
4 Abbreviations and acronyms
5 Conventions
6 NG-PON2 transmission convergence layer overview
6.1 TWDM transmission convergence layer
6.2 PtP WDM AMCC transmission convergence layer overview
7 TWDM resource allocation and quality of service
7.1 Principles of downstream and upstream resource allocation
7.2 Dynamic bandwidth assignment overview
7.3 Reference model of dynamic bandwidth assignment
7.4 DBA performance requirements
8 NG-PON2 transmission convergence framing sublayer
8.1 TWDM transmission convergence framing sublayer
8.2 PtP WDM management framing sublayer
9 TWDM encapsulation method
9.1 XGEM framing
9.2 XGEM frame delineation
9.3 SDU fragmentation
9.4 Mapping of services into XGEM frames
10 NG-PON2 PHY adaptation sublayer
10.1 TWDM PHY adaptation sublayer
10.2 PtP WDM management PHY adaptation sublayer
11 NG-PON2 PLOAM messaging channel
11.1 Overview
11.2 PLOAM message format
11.3 PLOAM message definitions
12 NG-PON2 ONU activation
12.1 TWDM PON ONU activation cycle
12.2 PtP WDM ONU activation cycle
13 NG-PON2 OLT and ONU timing relationships
13.1 TWDM ONU transmission timing and equalization delay
13.2 Time of day distribution over TWDM Channel
13.3 PtP WDM ONU transmission timing
14.1 Performance monitoring
14.2 Defects
14 TWDM performance monitoring, supervision and defects
15 TWDM security
15.1 Threat model for NG-PON2
15.2 Authentication
15.3 Key derivation
15.4 XGEM payload encryption system
15.5 Data encryption key exchange and activation mechanism
15.6 Integrity protection and data origin verification for PLOAM
15.7 Integrity protection and data origin verification for OMCI
15.8 Integrity and data origin verification key switching
15.9 NG-PON2 systems with reduced data encryption strength
16 NG-PON2 power management
16.1 TWDM power management
16.2 PtP WDM power management
17 TWDM channel management
17.1 Profile announcement
17.2 ONU calibration
17.3 ONU wavelength channel handover
17.4 ONU wavelength channel locking
18 TWDM system protection
18.1 OLT CT coordination in 1:1 Type B protection
18.2 OLT CT Type B protection state machine
18.3 Simplified state transition diagram
19 Rogue behaviour and its mitigation
19.1 Rogue ONU behaviour model in TWDM-PON
19.2 Rogue ONU behaviour model for PtP WDM
19.3 Behaviour model when coexisting with ITU-T G.984 and ITU-T
G.987 ONUs
19.4 Protection from noise and alien ONUs
19.5 Troublesome ONU presence detection enabled through idle window
Annex A – Hybrid error control (HEC) decoding and scrambler sequence codes
A.1 HEC decoding
A.2 Scrambler sequence
Annex B – Forward error correction using shortened Reed-Solomon codes
Annex C – Secure mutual authentication via OMCI
Annex D – Secure mutual authentication using IEEE 802.1X
Annex E – Auxiliary management and control channel
Page
Annex F – Tuning sequences
F.1 Tuning sequences
F.2 Definition of TC layer tuning time
Annex G – Transcoded framing with FEC and OAM for PtP WDM AMCC TC
G.1 Services with 8B/10B line code
G.2 Services with 64B/66B line code
Annex H – Wavelength channel bonding
H.1 Bonded ONU activation
Appendix I – Downstream line data pattern conditioning
Appendix II – Time of day derivation and error analysis
Appendix III – Burst profiles
Appendix IV – Golden vectors
IV.1 10G downstream and upstream FEC codeword
IV.2 10G upstream FEC short codeword
IV.3 2.5G downstream and upstream FEC codeword
IV.4 2.5G downstream FEC short codeword
IV.5 2.5G upstream FEC short codeword
IV.6 Downstream AES-128 encryption
IV.7 Upstream AES-128 encryption
IV.8 Key derivation encryption
IV.9 Downstream PLOAM message integrity check
IV.10 Upstream PLOAM message integrity check
IV.11 Upstream key reporting
IV.12 Downstream OMCI message integrity check
Appendix V – Protection examples
Appendix VI – ICTP: Inter-channel-termination protocol
VI.1 ICTP use cases
VI.2 ICTP primitives description
Appendix VII – ONU equalization delay coordination across TWDM channels
VII.1 Re-ranging
VII.2 Consistent equalization delay method
VII.3 EqD pre-configuration
Appendix VIII – PON-ID and NG-PON2 system identifier examples
Appendix IX – Cooperative DBA by client systems for low-latency services
IX.1 PON application to low-latency services and its challenge
IX.2 Cooperative DBA by client systems
IX.3 Use case – mobile fronthaul
IX.4 Reference Point
Appendix X – Combining OLT CTs with multiple ODN optical path loss classes in
the same NG-PON2 system
X.1 Motivation for combining multiple
optical path loss classes in an NG-PON2 system
X.2 Best practice use case description
Bibliography