1     Scope           
 2     References 
 3     Definitions  
 4     Abbreviations and acronyms 
 5     Conventions              
 6     XG-PON transmission convergence layer overview      
        6.1     XGTC layer structure    
        6.2     XGTC sublayer functions            
        6.3     Management of an XG-PON system       
        6.4     Time division multiplexing architecture 
        6.5     Media access control   
 7     Resource allocation and quality of service      
        7.1     Principles of downstream and upstream resource allocation        
        7.2     Dynamic bandwidth assignment overview           
        7.3     Reference model of dynamic bandwidth assignment       
        7.4     DBA performance requirements              
 8     XG-PON transmission convergence layer framing        
        8.1     Downstream XGTC framing       
        8.2     Upstream XGTC framing            
 9     XG-PON encapsulation method          
        9.1     XGEM framing               
        9.2     XGEM frame delineation            
        9.3     SDU fragmentation      
        9.4     Mapping of services into XGEM frames 
10     PHY adaptation sublayer      
       10.1     Downstream PHY frame           
       10.2     Upstream PHY frames and upstream PHY bursts              
       10.3     Forward error correction          
       10.4     Scrambling     
11     PLOAM messaging channel  
       11.1     Overview        
       11.2     PLOAM message format           
       11.3     PLOAM message definitions    
12     ONU activation       
       12.1     Overview        
       12.2     Activation mechanism at the ONU        
       12.3     OLT support of the activation process  
13     OLT and ONU timing relationships    
       13.1     ONU transmission timing and equalization delay             
       13.2     Time of day distribution over XG-PON  
14     Performance monitoring, supervision, and defects    
       14.1     Performance monitoring          
       14.2     Defects           
15     XG-PON security      
       15.1     Threat model for XG-PON        
       15.2     Authentication             
       15.3     Key derivation              
       15.4     XGEM payload encryption system         
       15.5     Data encryption key exchange and activation mechanism           
       15.6     Integrity protection and data origin verification for PLOAM        
       15.7     Integrity protection and data origin verification for OMCI           
       15.8     Integrity and data origin verification key switching         
       15.9     XG-PON systems with reduced data encryption strength              
16     ONU power management    
       16.1     Power management configuration and signalling            
       16.2     Power management parameter definitions        
       16.3     Power management state machine specifications          
       16.4     Management transactions during low power mode        
Annex A – Hybrid error correction (HEC) decoding and scrambler sequence     
        A.1     HEC decoding 
        A.2     Scrambler sequence     
Annex B – Forward error correction using shortened Reed-Solomon codes     
        B.1     Polynomial representation over Galois field       
        B.2     Construction of RS(248, 232) codeword              
        B.3     Construction of RS(248, 216) codeword              
Annex C – Secure mutual authentication via OMCI     
Annex D – Secure mutual authentication based on IEEE 802.1X     
        D.1     Introduction   
        D.2     Stack model for XG-PON authentication using [IEEE 802.1X]        
        D.3     Behaviour at network entry      
Annex E – PON-ID maintenance     
        E.1     Introduction    
        E.2     PON-ID structure          
Annex F – Extended rogue ONU
mitigation capabilities     
        F.1     Introduction    
        F.2     Extra codepoint of disable PLOAM message type             
      Page
        F.3     Extra transition of the ONU activation cycle state transition
diagram       
Appendix I – Downstream line data pattern conditioning     
        I.1     Spectrum control using idle XGEM frames            
        I.2     Intentional PON disruption         
Appendix II – Time of day derivation and error analysis     
Appendix III – Burst profiles     
Appendix IV – Golden vectors     
       IV.1     Downstream FEC codeword     
       IV.2     Upstream FEC codeword           
       IV.3     Upstream FEC short codeword               
       IV.4     Downstream AES-128 encryption           
       IV.5     Upstream AES-128 encryption 
       IV.6     Key derivation encryption         
       IV.7     Downstream PLOAM message integrity check   
       IV.8     Upstream PLOAM message integrity check         
       IV.9     Upstream key reporting             
      IV.10     Downstream OMCI message integrity check     
Bibliography