Table of Contents - G.989.3 (2021) Amd. 2 (05/2025) -
1 Scope 2 References 3 Definitions 4 Abbreviations and acronyms 5 Conventions 6 NG-PON2 transmission convergence layer overview 6.1 TWDM transmission convergence layer 6.2 PtP WDM AMCC transmission convergence layer overview 7 TWDM resource allocation and quality of service 7.1 Principles of downstream and upstream resource allocation 7.2 Dynamic bandwidth assignment overview 7.3 Reference model of dynamic bandwidth assignment 7.4 DBA performance requirements 8 NG-PON2 transmission convergence framing sublayer 8.1 TWDM transmission convergence framing sublayer 8.2 PtP WDM management framing sublayer 9 TWDM encapsulation method 9.1 XGEM framing 9.2 XGEM frame delineation 9.3 SDU fragmentation 9.4 Mapping of services into XGEM frames 10 NG-PON2 PHY adaptation sublayer 10.1 TWDM PHY adaptation sublayer 10.2 PtP WDM management PHY adaptation sublayer 11 NG-PON2 PLOAM messaging channel 11.1 Overview 11.2 PLOAM message format 11.3 PLOAM message definitions 12 NG-PON2 ONU activation 12.1 TWDM PON ONU activation cycle 12.2 PtP WDM ONU activation cycle 13 NG-PON2 OLT and ONU timing relationships 13.1 TWDM ONU transmission timing and equalization delay 13.2 Time of day distribution over TWDM channel 13.3 PtP WDM ONU transmission timing 14 TWDM performance monitoring, supervision and defects 14.1 Performance monitoring Page 14.2 Defects 15 TWDM security 15.1 Threat model for NG-PON2 15.2 Authentication 15.3 Key derivation 15.4 XGEM payload encryption system 15.5 Data encryption key exchange and activation mechanism 15.6 Integrity protection and data origin verification for PLOAM 15.7 Integrity protection and data origin verification for OMCI 15.8 Integrity and data origin verification key switching 15.9 NG-PON2 systems with reduced data encryption strength 16 NG-PON2 power management 16.1 TWDM power management 16.2 PtP WDM power management 17 TWDM channel management 17.1 Profile announcement 17.2 ONU calibration 17.3 ONU wavelength channel handover 17.4 ONU wavelength channel locking 18 TWDM system protection 18.1 OLT CT coordination in 1:1 Type B protection 18.2 OLT CT Type B protection state machine 18.3 Simplified state transition diagram 19 Rogue behaviour and its mitigation 19.1 Rogue ONU behaviour model in TWDM-PON 19.2 Rogue ONU behaviour model for PtP WDM 19.3 Behaviour model when coexisting with ITU-T G.984 and ITU-T G.987 ONUs 19.4 Protection from noise and alien ONUs 19.5 Troublesome ONU presence detection enabled through idle window Annex A – Hybrid error control (HEC) decoding and scrambler sequence codes A.1 HEC decoding A.2 Scrambler sequence Annex B – Forward error correction using shortened Reed-Solomon codes Annex C – Secure mutual authentication via OMCI Annex D – Secure mutual authentication using IEEE 802.1X Annex E – Auxiliary management and control channel Annex F – Tuning sequences F.1 Tuning sequences Page F.2 Definition of TC layer tuning time Annex G – Transcoded framing with FEC and OAM for PtP WDM AMCC TC G.1 Services with 8B/10B line code G.2 Services with 64B/66B line code Annex H – Wavelength channel bonding H.1 Bonded ONU activation Annex I Annex J – Contention-based PON operation J.1 Contention-based allocations J.2 Contention-based functions overview J.3 Contention-based functions associated with explicitly assigned Alloc-IDs J.4 PLOAM message modifications Annex K – Collision resolution for contention-based allocations K.1 Collision resolution for contention-based allocation K.2 Set-splitting collision resolution protocol K.3 Reporting collision outcome K.4 ONU support of the Set-splitting collision resolution protocol K.5 New PLOAM message Appendix I – Downstream line data pattern conditioning Appendix II – Time of day derivation and error analysis Appendix III – Burst profiles Appendix IV – Golden vectors IV.1 10G downstream and upstream FEC codeword IV.2 10G upstream FEC short codeword IV.3 2.5G downstream and upstream FEC codeword IV.4 2.5G downstream FEC short codeword IV.5 2.5G upstream FEC short codeword IV.6 Downstream AES-128 encryption IV.7 Upstream AES-128 encryption IV.8 Key derivation encryption IV.9 Downstream PLOAM message integrity check IV.10 Upstream PLOAM message integrity check IV.11 Upstream key reporting IV.12 Downstream OMCI message integrity check Appendix V – Protection examples Appendix VI – ICTP: Inter-channel-termination protocol VI.1 ICTP use cases VI.2 ICTP primitives description Page Appendix VII – ONU equalization delay coordination across TWDM channels VII.1 Re-ranging VII.2 Consistent equalization delay method VII.3 EqD pre-configuration Appendix VIII – PON-ID and NG-PON2 system identifier examples Appendix IX Cooperative DBA by client systems for low-latency services IX.1 PON application to low-latency services and its challenge IX.2 Cooperative DBA by client systems IX.3 Use case – mobile fronthaul IX.4 Reference Point Appendix X – Combining OLT CTs with multiple ODN optical path loss classes in the same NG-PON2 system X.1 Motivation for combining multiple optical path loss classes in an NG-PON2 system X.2 Best practice use case description Appendix XI – ONU in the Emergency Stop state Bibliography
|