1
Scope
2 References
3 Definitions
4 Abbreviations and acronyms
5 Conventions and terminology
5.1 ONT and ONU
5.2 Data encapsulation
method and deprecation of ATM transport
5.3 Traffic monitoring
versus non-status-reporting
5.4 Bandwidth assignment
versus bandwidth allocation
5.5 G-PON time division
multiplexing architecture
5.6 Disambiguation of the
concept of frame
5.7 Concepts associated
with upstream physical layer overhead
6 G-PON system architecture
6.1 Network architecture
and reference configuration
6.2 Parameters of the GTC
layer
6.3 Functional blocks
6.4 Interoperability
between G-PON and B-PON
7 G-PON transmission convergence
layer overview
7.1 GTC protocol stack
7.2 GTC key functions
7.3 Functions of Sublayers
in GTC
7.4 Dynamic bandwidth
assignment
7.5 Resource allocation
and quality of service (QoS)
8 GTC layer framing
8.1 Downstream GTC frame
structure
8.2 Upstream burst
structure
8.3 Mapping of GEM frames into
GTC payload
8.4 Status reporting DBA signalling and configuration
9 GTC messages
9.1 PLOAM
message format
9.2 Control
messages
10 Activation method
10.1 Overview
10.2 Activation mechanism
at the ONU
10.3 OLT support of the
activation process
10.4 OLT and ONU timing
relationships
10.5 Power levelling
11 Alarms and performance
monitoring
11.1 Alarms
11.2 Performance monitoring
12 Security
12.1 Basic threat model
12.2 Encryption system
12.3 Key exchange and
switch-over
13 Forward error correction
13.1 Introduction
13.2 Downstream FEC
13.3 Upstream FEC
13.4 ONU activation
transmissions
14 OMCI transport
mechanism
14.1 OMCI
transport schema
14.2 OMCI
adapters
Annex A – Implementers' guide for Recommendation UIT-T
G.984.3
A.1 Introduction
A.2 AES mechanism and
golden vectors
A.3 FEC encoding golden
vector
A.4 Scrambler diagram
A.5 A downstream frame
example
A.6 ONU activation process
A.7 PLOAM messages
A.8 Transmitter block
diagram
Appendix I – Transport of user traffic over GEM channels
I.1 Mapping of GEM
frames into the GTC payload
I.2 TDM over GEM
I.3 Ethernet over GEM
I.4 SDH over GEM
I.5 IP over GEM
Appendix II – Survivability in GTC-based systems
Appendix III – GEM header error control decoding
Appendix IV – OLT activation procedures overview
IV.1 Common part
IV.2 ONU-specific part
IV.3 Automatic ONU
Discovery Method
IV.4 POPUP process
Page
Appendix V – Downstream line data pattern conditioning
V.1 Idle
pattern control
V.2 Intentional
PON disruption
Bibliography