Table of Contents

 1     Scope  
 2     References 
 3     Definitions 
 4     Abbreviations and acronyms 
 5     Conventions 
 6     NG-PON2 transmission convergence layer overview   
        6.1     TWDM transmission convergence layer 
        6.2     PtP WDM AMCC transmission convergence layer overview   
 7     TWDM resource allocation and quality of service  
        7.1     Principles of downstream and upstream resource allocation  
        7.2     Dynamic bandwidth assignment overview   
        7.3     Reference model of dynamic bandwidth assignment 
        7.4     DBA performance requirements 
 8     NG-PON2 transmission convergence framing sublayer 
        8.1     TWDM transmission convergence framing sublayer 
        8.2     PtP WDM management framing sublayer 
 9     TWDM encapsulation method  
        9.1     XGEM framing 
        9.2     XGEM frame delineation  
        9.3     SDU fragmentation  
        9.4     Mapping of services into XGEM frames 
10     NG-PON2 PHY adaptation sublayer 
       10.1     TWDM PHY adaptation sublayer 
       10.2     PtP WDM management PHY adaptation sublayer 
11     NG-PON2 PLOAM messaging channel
       11.1     Overview   
       11.2     PLOAM message format 
       11.3     PLOAM message definitions 
12     NG-PON2 ONU activation  
       12.1     TWDM PON ONU activation cycle  
       12.2     PtP WDM ONU activation cycle  
13     NG-PON2 OLT and ONU timing relationships 
       13.1     TWDM ONU transmission timing and equalization delay 
       13.2     Time of day distribution over TWDM channel
       13.3     PtP WDM ONU transmission timing 
14     TWDM performance monitoring, supervision and defects 
       14.1     Performance monitoring 
       14.2     Defects 
15     TWDM security 
       15.1     Threat model for NG-PON2 
       15.2     Authentication  
       15.3     Key derivation  
       15.4     XGEM payload encryption system   
       15.5     Data encryption key exchange and activation mechanism   
       15.6     Integrity protection and data origin verification for PLOAM   
       15.7     Integrity protection and data origin verification for OMCI
       15.8     Integrity and data origin verification key switching 
       15.9     NG-PON2 systems with reduced data encryption strength  
16     NG-PON2 power management 
       16.1     TWDM power management 
       16.2     PtP WDM power management 
17     TWDM channel management 
       17.1     Profile announcement
       17.2     ONU calibration  
       17.3     ONU wavelength channel handover 
       17.4     ONU wavelength channel locking 
18     TWDM system protection  
       18.1     OLT CT coordination in 1:1 Type B protection  
       18.2     OLT CT Type B protection state machine  
       18.3     Simplified state transition diagram   
19     Rogue behaviour and its mitigation  
       19.1     Rogue ONU behaviour model in TWDM-PON  
       19.2     Rogue ONU behaviour model for PtP WDM   
       19.3     Behaviour model when coexisting with ITU-T G.984 and ITU-T G.987 ONUs 
       19.4     Protection from noise and alien ONUs 
       19.5     Troublesome ONU presence detection enabled through idle window   
Annex A – Hybrid error control (HEC) decoding and scrambler sequence codes    
        A.1     HEC decoding 
        A.2      Scrambler sequence  
Annex B – Forward error correction using shortened Reed-Solomon codes    
Annex C – Secure mutual authentication via OMCI    
Annex D – Secure mutual authentication using IEEE 802.1X    
Annex E – Auxiliary management and control channel    
      Page
Annex F – Tuning sequences    
        F.1     Tuning sequences 
        F.2     Definition of TC layer tuning time  
Annex G – Transcoded framing with FEC and OAM for PtP WDM AMCC TC    
        G.1     Services with 8B/10B line code  
        G.2     Services with 64B/66B line code  
Annex H – Wavelength channel bonding    
        H.1     Bonded ONU activation  
Annex I    
Annex J – Contention-based PON operation    
        J.1     Contention-based allocations 
        J.2     Contention-based functions overview  
        J.3     Contention-based functions associated with explicitly assigned Alloc-IDs 
        J.4     PLOAM message modifications 
Annex K – Collision resolution for contention-based allocations    
        K.1     Collision resolution for contention-based allocation  
        K.2     Set-splitting collision resolution protocol
        K.3     Reporting collision outcome  
        K.4     ONU support of the Set-splitting collision resolution protocol
        K.5     New PLOAM message  
Appendix I – Downstream line data pattern conditioning    
Appendix II – Time of day derivation and error analysis    
Appendix III – Burst profiles    
Appendix IV – Golden vectors    
       IV.1     10G downstream and upstream FEC codeword  
      IV.2      10G upstream FEC short codeword  
       IV.3     2.5G downstream and upstream FEC codeword  
       IV.4     2.5G downstream FEC short codeword  
       IV.5     2.5G upstream FEC short codeword  
       IV.6     Downstream AES-128 encryption  
       IV.7     Upstream AES-128 encryption  
       IV.8     Key derivation encryption  
       IV.9     Downstream PLOAM message integrity check 
      IV.10     Upstream PLOAM message integrity check 
      IV.11     Upstream key reporting 
      IV.12     Downstream OMCI message integrity check 
Appendix V – Protection examples    
Appendix VI – ICTP: Inter-channel-termination protocol    
       VI.1     ICTP use cases 
       VI.2     ICTP primitives description  
Appendix VII – ONU equalization delay coordination across TWDM channels    
      VII.1     Re-ranging 
      VII.2     Consistent equalization delay method  
      VII.3     EqD pre-configuration  
Appendix VIII – PON-ID and NG-PON2 system identifier examples    
Appendix IX – Cooperative DBA by client systems for low-latency services    
       IX.1     PON application to low-latency services and its challenge  
       IX.2     Cooperative DBA by client systems 
       IX.3     Use case – mobile fronthaul
       IX.4     Reference Point 
Appendix X – Combining OLT CTs with multiple ODN optical path loss classes  in the same NG-PON2 system    
        X.1     Motivation for combining multiple optical path loss classes in an NG-PON2 system    
        X.2     Best practice use case description  
Appendix XI – ONU in the Emergency Stop state    
Bibliography