Table of Contents

�1���� Scope��
�2���� References
�3���� Definitions
�4���� Abbreviations and acronyms
�5���� Conventions
�6���� NG-PON2 transmission convergence layer overview���
������� 6.1���� TWDM transmission convergence layer
������� 6.2���� PtP WDM AMCC transmission convergence layer overview���
�7���� TWDM resource allocation and quality of service��
������� 7.1���� Principles of downstream and upstream resource allocation��
������� 7.2���� Dynamic bandwidth assignment overview���
������� 7.3���� Reference model of dynamic bandwidth assignment
������� 7.4���� DBA performance requirements
�8���� NG-PON2 transmission convergence framing sublayer
������� 8.1���� TWDM transmission convergence framing sublayer
������� 8.2���� PtP WDM management framing sublayer
�9���� TWDM encapsulation method��
������� 9.1���� XGEM framing
������� 9.2���� XGEM frame delineation��
������� 9.3���� SDU fragmentation��
������� 9.4���� Mapping of services into XGEM frames
10���� NG-PON2 PHY adaptation sublayer
������ 10.1���� TWDM PHY adaptation sublayer
������ 10.2���� PtP WDM management PHY adaptation sublayer
11���� NG-PON2 PLOAM messaging channel
������ 11.1���� Overview���
����� �11.2���� PLOAM message format
������ 11.3���� PLOAM message definitions
12���� NG-PON2 ONU activation��
������ 12.1���� TWDM PON ONU activation cycle��
������ 12.2���� PtP WDM ONU activation cycle��
13���� NG-PON2 OLT and ONU timing relationships
������ 13.1���� TWDM ONU transmission timing and equalization delay
������ 13.2���� Time of day distribution over TWDM channel
������ 13.3���� PtP WDM ONU transmission timing
14���� TWDM performance monitoring, supervision and defects
������ 14.1���� Performance monitoring
������ 14.2���� Defects
15���� TWDM security
������ 15.1���� Threat model for NG-PON2
������ 15.2���� Authentication��
������ 15.3���� Key derivation��
������ 15.4���� XGEM payload encryption system���
������ 15.5���� Data encryption key exchange and activation mechanism���
������ 15.6���� Integrity protection and data origin verification for PLOAM���
������ 15.7���� Integrity protection and data origin verification for OMCI
������ 15.8���� Integrity and data origin verification key switching
������ 15.9���� NG-PON2 systems with reduced data encryption strength��
16���� NG-PON2 power management
������ 16.1���� TWDM power management
������ 16.2���� PtP WDM power management
17���� TWDM channel management
������ 17.1���� Profile announcement
������ 17.2���� ONU calibration��
������ 17.3���� ONU wavelength channel handover
������ 17.4���� ONU wavelength channel locking
18���� TWDM system protection��
������ 18.1���� OLT CT coordination in 1:1 Type B protection��
������ 18.2���� OLT CT Type B protection state machine��
������ 18.3���� Simplified state transition diagram���
19���� Rogue behaviour and its mitigation��
������ 19.1���� Rogue ONU behaviour model in TWDM-PON��
������ 19.2���� Rogue ONU behaviour model for PtP WDM���
���� ��19.3���� Behaviour model when coexisting with ITU-T G.984 and ITU-T G.987 ONUs
������ 19.4���� Protection from noise and alien ONUs
������ 19.5���� Troublesome ONU presence detection enabled through idle window���
Annex A � Hybrid error control (HEC) decoding and scrambler sequence codes����
������� A.1���� HEC decoding
������� A.2���� �Scrambler sequence��
Annex B � Forward error correction using shortened Reed-Solomon codes����
Annex C � Secure mutual authentication via OMCI����
Annex D � Secure mutual authentication using IEEE 802.1X����
Annex E � Auxiliary management and control channel����
����� Page
Annex F � Tuning sequences����
������� F.1���� Tuning sequences
������� F.2���� Definition of TC layer tuning time��
Annex G � Transcoded framing with FEC and OAM for PtP WDM AMCC TC����
������� G.1���� Services with 8B/10B line code��
������� G.2���� Services with 64B/66B line code��
Annex H � Wavelength channel bonding����
������� H.1���� Bonded ONU activation��
Annex I����
Annex J � Contention-based PON operation����
������� J.1���� Contention-based allocations
������� J.2���� Contention-based functions overview��
������� J.3���� Contention-based functions associated with explicitly assigned Alloc-IDs
������� J.4���� PLOAM message modifications
Annex K � Collision resolution for contention-based allocations����
������� K.1���� Collision resolution for contention-based allocation��
������� K.2���� Set-splitting collision resolution protocol
������� K.3���� Reporting collision outcome��
������� K.4���� ONU support of the Set-splitting collision resolution protocol
������� K.5���� New PLOAM message��
Appendix I � Downstream line data pattern conditioning����
Appendix II � Time of day derivation and error analysis����
Appendix III � Burst profiles����
Appendix IV � Golden vectors����
������ IV.1���� 10G downstream and upstream FEC codeword��
����� IV.2 �����10G upstream FEC short codeword��
������ IV.3���� 2.5G downstream and upstream FEC codeword��
������ IV.4���� 2.5G downstream FEC short codeword��
������ IV.5���� 2.5G upstream FEC short codeword��
������ IV.6���� Downstream AES-128 encryption��
������ IV.7���� Upstream AES-128 encryption��
������ IV.8���� Key derivation encryption��
������ IV.9���� Downstream PLOAM message integrity check
����� IV.10���� Upstream PLOAM message integrity check
����� IV.11���� Upstream key reporting
����� IV.12���� Downstream OMCI message integrity check
Appendix V � Protection examples����
Appendix VI � ICTP: Inter-channel-termination protocol����
������ VI.1���� ICTP use cases
������ VI.2���� ICTP primitives description��
Appendix VII � ONU equalization delay coordination across TWDM channels����
����� VII.1���� Re-ranging
����� VII.2���� Consistent equalization delay method��
����� VII.3���� EqD pre-configuration��
Appendix VIII � PON-ID and NG-PON2 system identifier examples����
Appendix IX � Cooperative DBA by client systems for low-latency services����
������ IX.1���� PON application to low-latency services and its challenge��
������ IX.2���� Cooperative DBA by client systems
������ IX.3���� Use case � mobile fronthaul
������ IX.4� ���Reference Point
Appendix X � Combining OLT CTs with multiple ODN optical path loss classes� in the same NG-PON2 system����
������� X.1���� Motivation for combining multiple optical path loss classes in an NG-PON2 system����
������� X.2���� Best practice use case description��
Appendix XI � ONU in the Emergency Stop state����
Bibliography����