Table of Contents

 1     Scope          
 2     References 
 3     Definitions 
 4     Abbreviations and acronyms
 5     Conventions             
 6     XG-PON transmission convergence layer overview      
        6.1     XGTC layer structure   
        6.2     XGTC sublayer functions          
        6.3     Management of an XG-PON system        
        6.4     Time division multiplexing architecture
        6.5     Media access control   
 7     Resource allocation and quality of service      
        7.1     Principles of downstream and upstream resource allocation           
        7.2     Dynamic bandwidth assignment overview            
        7.3     Reference model of dynamic bandwidth assignment         
        7.4     DBA performance requirements              
 8     XG-PON transmission convergence layer framing        
        8.1     Downstream XGTC framing      
        8.2     Upstream XGTC framing            
 9     XG-PON encapsulation method          
        9.1     XGEM framing              
        9.2     XGEM frame delineation           
        9.3     SDU fragmentation       
        9.4     Mapping of services into XGEM frames
10     PHY adaptation sublayer     
       10.1     Downstream PHY frame            
       10.2     Upstream PHY frames and upstream PHY bursts              
       10.3     Forward error correction           
       10.4     Scrambling    
11     PLOAM messaging channel 
       11.1     Overview       
       11.2     PLOAM message format           
       11.3     PLOAM message definitions    
12     ONU activation       
       12.1     Overview       
       12.2     Activation mechanism at the ONU         
       12.3     OLT support of the activation process  
13     OLT and ONU timing relationships   
       13.1     ONU transmission timing and equalization delay             
       13.2     Time of day distribution over XG-PON 
14     Performance monitoring, supervision, and defects       
       14.1     Performance monitoring           
       14.2     Defects           
15     XG-PON security    
       15.1     Threat model for XG-PON        
       15.2     Authentication             
       15.3     Key derivation             
       15.4     XGEM payload encryption system        
       15.5     Data encryption key exchange and activation mechanism             
       15.6     Integrity protection and data origin verification for PLOAM         
       15.7     Integrity protection and data origin verification for OMCI            
       15.8     Integrity and data origin verification key switching         
       15.9     XG-PON systems with reduced data encryption strength 
16     ONU power management     
       16.1     Power management configuration and signalling              
       16.2     Power management parameter definitions           
       16.3     Power management state machine specifications              
       16.4     Management transactions during low power mode           
Annex A – Hybrid error correction (HEC) decoding and scrambler sequence    
        A.1     HEC decoding              
        A.2     Scrambler sequence    
Annex B – Forward error correction using shortened Reed-Solomon codes    
        B.1     Polynomial representation over Galois field        
        B.2     Construction of RS(248, 232) codeword              
        B.3     Construction of RS(248, 216) codeword              
Annex C – Secure mutual authentication via OMCI    
Annex D – Secure mutual authentication based on IEEE 802.1X    
        D.1     Introduction   
        D.2     Stack model for XG-PON authentication using [IEEE 802.1X]      
        D.3     Behaviour at network entry      
Appendix I – Downstream line data pattern conditioning    
        I.1                 Spectrum control using idle XGEM frames              
        I.2                 Intentional PON disruption           
Appendix II – Time of day derivation and error analysis    
Appendix III – Burst profiles     
      Page
Appendix IV – Golden vectors    
       IV.1     Downstream FEC codeword     
       IV.2     Upstream FEC codeword          
       IV.3     Upstream FEC short codeword
       IV.4     Downstream AES-128 encryption          
       IV.5     Upstream AES-128 encryption
       IV.6     Key derivation encryption        
       IV.7     Downstream PLOAM message integrity check   
       IV.8     Upstream PLOAM message integrity check         
Bibliography