�1���� Scope
�2���� References
�3���� Definitions
�4���� Abbreviations
and acronyms
�5���� Conventions
�6���� NG-PON2
transmission convergence layer overview
������� 6.1���� TWDM
transmission convergence layer
������� 6.2���� PtP
WDM AMCC transmission convergence layer overview���
�7���� TWDM resource
allocation and quality of service
������� 7.1���� Principles
of downstream and upstream resource allocation
������� 7.2���� Dynamic
bandwidth assignment overview
������� 7.3���� Reference
model of dynamic bandwidth assignment
������� 7.4���� DBA
performance requirements
�8���� NG-PON2
transmission convergence framing sublayer
������� 8.1���� TWDM
transmission convergence framing sublayer
������� 8.2���� PtP
WDM management framing sublayer
�9���� TWDM
encapsulation method
������� 9.1���� XGEM
framing
������� 9.2���� XGEM
frame delineation
������� 9.3���� SDU
fragmentation
������� 9.4���� Mapping
of services into XGEM frames
10���� NG-PON2 PHY
adaptation sublayer
������ 10.1���� TWDM
PHY adaptation sublayer
������ 10.2���� PtP
WDM management PHY adaptation sublayer
11���� NG-PON2 PLOAM
messaging channel
������ 11.1���� Overview
����� �11.2���� PLOAM
message format
������ 11.3���� PLOAM
message definitions
12���� NG-PON2 ONU
activation
������ 12.1���� TWDM
PON ONU activation cycle
������ 12.2���� PtP
WDM ONU activation cycle
13���� NG-PON2 OLT and
ONU timing relationships
������ 13.1���� TWDM
ONU transmission timing and equalization delay
������ 13.2���� Time
of day distribution over TWDM channel
������ 13.3���� PtP
WDM ONU transmission timing
14���� TWDM
performance monitoring, supervision and defects�
������ 14.1���� Performance
monitoring
������ 14.2���� Defects
15���� TWDM security
������ 15.1���� Threat
model for NG-PON2
������ 15.2���� Authentication
������ 15.3���� Key
derivation
������ 15.4���� XGEM
payload encryption system
������ 15.5���� Data
encryption key exchange and activation mechanism���
������ 15.6���� Integrity
protection and data origin verification for PLOAM���
������ 15.7���� Integrity
protection and data origin verification for OMCI
������ 15.8���� Integrity
and data origin verification key switching
������ 15.9���� NG-PON2
systems with reduced data encryption strength
16���� NG-PON2 power
management
������ 16.1���� TWDM
power management
������ 16.2���� PtP
WDM power management
17���� TWDM channel
management
������ 17.1���� Profile
announcement
������ 17.2���� ONU
calibration
������ 17.3���� ONU
wavelength channel handover
������ 17.4���� ONU
wavelength channel locking
18���� TWDM system
protection
������ 18.1���� OLT CT
coordination in 1:1 Type B protection
������ 18.2���� OLT CT
Type B protection state machine
������ 18.3���� Simplified
state transition diagram
19���� Rogue behaviour and its mitigation��
������ 19.1���� Rogue
ONU behaviour model in TWDM-PON
������ 19.2���� Rogue
ONU behaviour model for PtP WDM
���� ��19.3���� Behaviour
model when coexisting with ITU-T G.984 and ITU-T G.987 ONUs
������ 19.4���� Protection
from noise and alien ONUs
������ 19.5���� Troublesome
ONU presence detection enabled through idle window
Annex A � Hybrid error control (HEC) decoding and
scrambler sequence codes
������� A.1���� HEC
decoding
������� A.2���� �Scrambler
sequence
Annex B � Forward error correction using shortened
Reed-Solomon codes
Annex C � Secure mutual authentication via OMCI
Annex D � Secure mutual authentication using IEEE
802.1X
Annex E � Auxiliary management and control channel
����� Page
Annex F � Tuning sequences
������� F.1���� Tuning
sequences
������� F.2���� Definition
of TC layer tuning time
Annex G � Transcoded framing with FEC and OAM for PtP
WDM AMCC TC
������� G.1���� Services
with 8B/10B line code
������� G.2���� Services
with 64B/66B line code
Annex H � Wavelength channel bonding
������� H.1���� Bonded
ONU activation
Annex I
Annex J � Contention-based PON operation
������� J.1���� Contention-based
allocations
������� J.2���� Contention-based
functions overview
������� J.3���� Contention-based
functions associated with explicitly assigned Alloc-IDs
������� J.4���� PLOAM
message modifications
Annex K � Collision resolution for contention-based
allocations
������� K.1���� Collision
resolution for contention-based allocation
������� K.2���� Set-splitting
collision resolution protocol
������� K.3���� Reporting
collision outcome
������� K.4���� ONU
support of the Set-splitting collision resolution protocol
������� K.5���� New
PLOAM message
Appendix I � Downstream line data pattern conditioning
Appendix II � Time of day derivation and error
analysis
Appendix III � Burst profiles
Appendix IV � Golden vectors
������ IV.1���� 10G
downstream and upstream FEC codeword
����� IV.2 �����10G upstream
FEC short codeword
������ IV.3���� 2.5G
downstream and upstream FEC codeword
������ IV.4���� 2.5G
downstream FEC short codeword
������ IV.5���� 2.5G
upstream FEC short codeword
������ IV.6���� Downstream
AES-128 encryption
������ IV.7���� Upstream
AES-128 encryption
������ IV.8���� Key
derivation encryption
������ IV.9���� Downstream
PLOAM message integrity check
����� IV.10���� Upstream
PLOAM message integrity check
����� IV.11���� Upstream
key reporting
����� IV.12���� Downstream
OMCI message integrity check
Appendix V � Protection examples
Appendix VI � ICTP:
Inter-channel-termination protocol����
������ VI.1���� ICTP use cases
������ VI.2���� ICTP
primitives description
Appendix VII � ONU equalization delay coordination
across TWDM channels
����� VII.1���� Re-ranging
����� VII.2���� Consistent
equalization delay method
����� VII.3���� EqD
pre-configuration
Appendix VIII � PON-ID and NG-PON2 system identifier
examples
Appendix IX � Cooperative
DBA by client systems for low-latency services
������ IX.1���� PON
application to low-latency services and its challenge
������ IX.2���� Cooperative
DBA by client systems
������ IX.3���� Use
case � mobile fronthaul
������ IX.4� ���Reference
Point
Appendix X � Combining OLT CTs with multiple ODN
optical path loss classes� in the same NG-PON2 system
������� X.1���� Motivation
for combining multiple optical path loss classes in an NG-PON2 system
������� X.2���� Best
practice use case description
Appendix XI � ONU in the Emergency Stop state
Bibliography