Professional Documents
Culture Documents
Contents
Chapter 1 .........................................................................3
GPON General Characteristics.........................................3
Development History ........................................................ 3
Network Architecture ........................................................ 3
Reference Configuration ................................................... 5
Services ......................................................................... 5
Bit Rate .......................................................................... 6
Logical Reach .................................................................. 6
Physical Reach................................................................. 6
Differential Fibre Distance ................................................. 6
Maximum Mean Signal Transfer Delay ................................ 7
Split Ratio ....................................................................... 7
Protection on the PON section ........................................... 7
Possible Switching Types ......................................................... 7
GPON Protection Types ........................................................... 8
Chapter 2 .......................................................................17
GPON Physical Medium Dependent(PMD) Layer ..........17
Physical Medium Dependent Layer Requirements for GPON . 17
Digital Signal Nominal Bit Rate ............................................... 17
Physical Media and Transmission Method ................................. 18
Bit Rate............................................................................... 18
Line Code ............................................................................ 19
Operating Wavelength .......................................................... 19
Chapter 3 .......................................................................26
GPON Transmission Convergence Layer .......................26
GTC Overview ............................................................... 26
Overview ............................................................................ 26
Protocol Stack for C/M Planes ................................................ 27
Protocol Stack for U-Plane .................................................... 29
GTC Key Functions ............................................................... 30
Functions of Sub-Layers in GTC ............................................. 31
Traffic Flows and QoS ........................................................... 33
DBA Specification ................................................................ 34
Security ........................................................................ 57
Basic threat model ............................................................... 57
Encryption system ............................................................... 58
Key exchange and switch-over .............................................. 59
Chapter 4 .......................................................................61
GPON OMCI Specification..............................................61
Overview ...................................................................... 61
OMCI in ITU-T Rec. G.984.2 ............................................ 61
Configuration Management ............................................. 62
Fault Management ......................................................... 63
Performance Management .............................................. 65
Security Management ..................................................... 66
Chapter
GPON General
Characteristics
Development History
In 2001, the FSAN group initiated an effort for standardizing
PON networks operating at bit rates above 1 Gbps. Apart from
the need to support higher bit rates, the overall protocol had to
be opened for reconsideration so that the solution would be
most optimal and efficient to support multiple services and
operation, administration, maintenance and provisioning
(OAM&P) functionality and scalability.
As a result of FSAN efforts, a new solution emerged in the
optical access market place Gigabit PON (GPON), offering
unprecedented high bit rate support (up to 2.488 Gbps) while
enabling the transport of multiple services, specifically data and
TDM, in native formats and with extremely high efficiency.
In January 2003, the GPON standards were ratified by ITU-T and
are known as ITU-T Recommendations G.984.1, G.984.2 and
G.984.3.
GPON is a flexible optical fibre access network capable of
supporting the bandwidth requirements of business and
residential services and covers systems with nominal line rates
of 1.2 Gbit/s and 2.4 Gbit/s in the downstream direction and 155
Mbit/s, 622 Mbit/s, 1.2 Gbit/s and 2.4 Gbit/s in the upstream
direction.
Network Architecture
The optical section of a local access network system can be
either active or passive and its architecture can be either
Chapter 1 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
Reference Configuration
FIGURE 1 GPON REFERENCE CONFIGURATION)
Services
GPON is required to support all currently known services and
new services being discussed for the residential subscribers and
business customers, because of such a broadband capability.
What specific services should be provided is clearer to some
operators than to others and depends heavily on the particular
regulatory conditions of each operators' markets, as well as on
the own markets potential. How these services are delivered in a
cost effective way is a function not only of legal conditions, but
also
of
factors
including
existing
telecommunications
infrastructure, dwelling distribution and residential and business
customers mix.
The services include data service, PSTN, private line, video, and
so on.
Bit Rate
Basically, GPON aims at transmission speeds greater than or
equal to 1.2 Gbit/s. However, in the case of FTTH or FTTC with
asymmetric xDSL, such a high-speed upstream bit rate might
not be needed. Accordingly, GPON identifies 7 transmission
speed combinations as follows:
155 Mbit/s up, 1.2 Gbit/s down;
622 Mbit/s up, 1.2 Gbit/s down;
1.2 Gbit/s up, 1.2 Gbit/s down;
155 Mbit/s up, 2.4 Gbit/s down;
622 Mbit/s up, 2.4 Gbit/s down;
1.2 Gbit/s up, 2.4 Gbit/s down;
2.4 Gbit/s up, 2.4 Gbit/s down.
Logical Reach
Logical reach is the maximum distance between ONU/ONT and
OLT except for the limitation of the physical layer. In GPON, the
maximum logical reach is defined as 60 km.
Physical Reach
Physical reach is the maximum physical distance between the
ONU/ONT and the OLT. In GPON, two options are defined for the
physical reach: 10 km and 20 km.
Chapter 1 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
Split Ratio
Basically, the larger the split ratio is for GPON, the more
attractive it is for operators. However, a larger split ratio implies
greater optical splitting which creates the need for an increased
power budget to support the physical reach.
Split ratios of up to 1:64 are realistic for the physical layer given
current technology. However, anticipating the continued
evolution of optical modules, the TC layer must consider split
ratios up to 1:128.
Chapter 1 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
Chapter 1 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
Embedded GEM
GEM (G-PON Encapsulation Method) is similar to other data
service framing methods from a frame structure point of view.
However, GEM is embedded into the PON section, and is
11
Multiplexing Architecture
This section provides two multiplexing mechanisms: ATM base
and GEM base. These concepts are summarized in Figure 4 and
Figure 5.
Chapter 1 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
F I G U R E 4 G P O N M U L T I P L E X I N G I N AT M S E R V I C E
13
Chapter 1 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
15
Chapter 2 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
Chapter
17
Transmission Direction
The signal is transmitted both upstream and downstream
through the transmission medium.
Transmission Methodology
Bidirectional transmission is accomplished by use of either
wavelength division multiplexing (WDM) technique on a single
fibre, or unidirectional transmission over two fibers
Bit Rate
This clause deals with bit-rate requirements for the GPON.
Downstream
The nominal bit rate of the OLT-to-ONU signal is 1244.16, or
2488.32 Mbit/s. When the OLT and the end office are in their
normal operating state, this rate is traceable to a Stratum-1
clock (accuracy of 1 1011). When the end office is in its
free-running mode, the rate of the downstream signal is
traceable to a Stratum-3 clock (accuracy of 4.6 106). When
the OLT is in its free-running mode, the accuracy of the
downstream signal is that of a Stratum-4 clock (3.2 105).
Upstream
The nominal bit rate of the ONU-to-OLT signal is 155.52, 622.08,
1244.16, or 2488.32 Mbit/s. When in one of its operating states
and given a grant, the ONU shall transmit its signal with an
accuracy equal to that of the received downstream signal. The
ONU shall not transmit any signal when not in one of its
operating states, or when not given a grant.
Chapter 2 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
Line Code
Downstream and upstream: NRZ coding.
Scrambling method not defined at PMD layer.
Convention used for optical logic level is:
high level of light emission for a binary ONE;
low level of light emission for a binary ZERO.
Operating Wavelength
Downstream direction
The operating wavelength range for the downstream direction on
single fibre systems shall be 1480-1500 nm.
The operating wavelength range for the downstream direction on
two fibre systems shall be 1260-1360 nm.
Upstream direction
The operating wavelength range for the upstream direction shall
be 1260-1360 nm
19
Chapter 2 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
21
Chapter 2 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
23
Chapter 2 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
25
Chapter
GPON Transmission
Convergence Layer
GTC Overview
Overview
This clause describes the TC layer architecture in the G-PON
system. Figure 7-1 shows the protocol stack for the overall
G-PON TC (GTC) layer system. The GTC layer is comprised of
two sub-layers, the GTC Framing sub-layer and the TC
adaptation sub-layer. From another point of view, GTC consists
of a C/M plane, which manages user traffic flows, security, and
OAM features, and a U plane which carries user traffic. As shown
in Figure 7-1, in the GTC framing sub-layer, ATM partition, GEM
partition, Embedded OAM and PLOAM partitions are recognized
according to location on a GTC frame. Only Embedded OAM is
terminated at this layer for control over this sub-layer, because
information of Embedded OAM is embedded in GTC frame
header directly. PLOAM information is processed at PLOAM block
located as a client of this sub-layer. SDUs (Service Data Unit) in
ATM and GEM partitions are converted from/to conventional
PDUs (Protocol Data Unit) of ATM and GEM at each adaptation
sub-layer, respectively. Moreover, these PDUs include OMCI
channel data. This data is also recognized at this sub-layer, and
is interchanged from/to OMCI entity. Embedded OAM, PLOAM
and OMCI are categorized into C/M planes. SDUs except for
OMCI on ATM and GEM partitions are categorized into U plane.
The GTC framing layer has global visibility to all data transmitted,
and the OLT GTC framing layer is a direct peer of all the ONU
GTC framing layers.
Chapter 3 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
27
Chapter 3 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
29
VPI. Only cells with the appropriate VPIs are allowed through to
the ATM client function.
In the upstream, the ATM traffic is carried over one or more
T-CONTs. Each T-CONT is associated with only ATM or GEM
traffic, so there is no ambiguity of multiplexing. The OLT
receives the transmission associated with the T-CONT identified
by Alloc-ID, and the cells are forwarded to the ATM TC adapter,
and then the ATM client.
2)
GEM in GTC
Chapter 3 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
ONU Registration
The ONU registration is done in the auto discovery procedure.
There are two methods for ONU registration. In case of
Method-A, the Serial Number of the ONU is registered at the OLT
by the management system (e.g., NMS and/or EMS). In case of
Method-B, the Serial Number of the ONU is not registered at the
OLT by the management system. For more details, refer to
clause 10.
31
GEM interfaces
Overview of PLOAM
The GTC framing sub-layer provides an interface for the
interchange of PLOAM messages. The PLOAM messages are
defined in clause 9.
Chapter 3 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
GEM service
33
Guarantee of QoS
Various QoS is provided by DBA functionalities as well as ITU-T
Rec. G.983.4. The G-PON TC layer specifies five T-CONT types
(such as Types 1, 2, 3, 4 and 5) with the same characteristics as
T-CONT types specified in ITU-T Rec. G.983.4. The case of ATM
is fully compatible with ITU-T Rec. G.983.4. VCC or VPC shaped
by several traffic descriptors can be carried on one T-CONT
types according to QoS requirements. This mapping scheme is
managed by operators.
In case of GEM, "ATM cell" is replaced by "Fixed length block"
defined in 7.7.2. This case is also compatible with ITU-T Rec.
G.983.4 except for this point. In case of GEM, GEM connections
identified by Port can be shaped by some traffic descriptors,
which are under study, and can also be carried on one T-CONT
type.
DBA Specification
This clause describes DBA specifications for G-PON. G-PON DBA
for ATM is the same as ITU-T Rec. G.983.4 except for
management issues, such as negotiation procedure. G-PON DBA
for GEM also adopts the same architecture as ITU-T Rec.
G.983.4 as the default method. In short, even when variable
length packets are supported in GEM, these packets are
normalized by the fixed length data block in DBA operations. In
short, the number of blocks is mapped into the number of cells
in ITU-T Rec. G.983.4.
Chapter 3 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
bandwidth
by
OLT
according
to
35
2)
NSR-DBA
Chapter 3 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
Management Aspect
To operate DBA, some parameters should be provisioned or
negotiated by management functionalities. Using these means,
the OLT and ONU agree on the DBA mode of operation, and
respond correctly to requests from each other. All of the DBA
parameters should be provisioned or negotiated by G-PON
OMCI.
GPON Frame
Figure 7 shows the GPON frame structure for downstream and
upstream direction. The downstream frame consists of the
physical control block downstream (PCBd), the ATM partition,
and the GEM partition. The upstream frame consists of multiple
transmission bursts. Each upstream burst contains at a
minimum the Physical layer overhead (PLOu). Besides the
payload, it may also contain the PLOAMu, PLSu, and DBRu
sections. The downstream frame provides the common time
reference for the PON, and provides the common control
signaling for the upstream.
FIGURE 7
37
Chapter 3 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
FIGURE 9 GPON DOWNSTREAM FRAME STR UCTURE
contains
The OLT
receives
relevant
PCBD
Ident field
Figure 11 illustrates the Ident field.
FIGURE 11
IDENT FIELD
39
PLOAMd field
The PLOAM downstream field is a 13-byte field that contains
the PLOAM message. The format of these messages is show
in Figure 12.
F I G U R E 1 2 P L O AM D M E S S A G E
Chapter 3 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
BIP field
The BIP field is an 8-bit field that contains the
bit-interleaved parity of all bytes transmitted since the last
BIP. The receiver shall compute the bit interleaved parity
also, and compare its result to the BIP transmitted in order
to measure the number of errors on the link.
Plend field
The Payload Length downstream field specifies the length of
the Bandwidth map and the ATM partition. This field is sent
twice for error robustness.
Figure 13 depicts the Plend field.
BWmap fields
The bandwidth map (BWmap) is a scalar array of 8 byte
allocation structures. Each entry in this array represents a
single bandwidth allocation to a particular T-CONT. The
number of entries in the map is given in the Plend field. The
format of each entry is given below, and is shown in Figure
14.
41
FIGURE 14
US BW MAP
Chapter 3 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
Downstream Payload
Immediately following the last entry of the bandwidth map are
the GTC payload partitions. There are two partitions, as
described below.
The ATM partition contains a number of 53 byte ATM cells. The
length of this partition (in cells) is given by the Plend/Alen field.
The field is therefore always an integer multiple of 53 bytes long,
and the cells are always aligned to the partition. The delineation
of the cells is therefore trivial, and the delineation shall be
confirmed by insuring that the HEC byte does check with the
remainder of the cell header.
The downstream cell stream is then filtered at the ONU based
upon the VPI contained in each cell. ONTs are configured to
recognize which VPIs belong to it, and cells that do belong to the
ONU are passed on to the ATM client process.
The GEM partition contains any number of GEM frame-mode
delineated frames. The length of the GEM partition is whatever
remains after the PCBd and ATM partitions are subtracted from
the entire frame length.
The downstream frame stream is then filtered at the ONU based
upon the 12-bit Port-ID field contained in each frame fragment.
ONTs are configured to recognize which Port-IDs belong to it,
and frames that do belong to the ONU are passed on to the GEM
client process.
43
Chapter 3 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
FIGURE 16 UPSTRE AM FRAME STRUCTURE
The frame length is the same as in the downstream for all rates.
Each frame contains a number of transmissions from one or
more ONUs. The BWmap dictates the arrangement of these
transmissions. During each allocation period according to the
OLT control, the ONU can transmit from one to four types of
PON overheads, and user data. The four types of overheads are:
1) physical layer overhead (PLOu);
2) physical layer operations, administration and management
upstream (PLOAMu);
3) power levelling sequence upstream (PLSu);
4) dynamic Bandwidth Report upstream (DBRu).
Figure 17 shows the contents of these overheads in detail.
The OLT indicates through the flags field in the BWmap whether
or not the PLOAMu, PLSu, or DBRu information should be sent
on each allocation. The scheduler in the OLT needs to take the
bandwidth and latency demands of these ancillary channels into
account when setting the frequency of their transmission.
The status of the PLOu information is implicit in the
arrangements of the allocations themselves. The rule is that
every time an ONU takes over the PON medium from another
ONU, it must send a new copy of the PLOu data. In the case
where an ONU is given two allocation IDs that are contiguous
(the StopTime of one is 1 less than the StartTime of the other),
then the ONU shall suppress sending the PLOu data for the
second Alloc-ID. This suppression can reoccur for as many
contiguous Allocation IDs the ONU is granted by the OLT. Note
that the requirement for contiguous allocations forbids the OLT
from leaving gaps between same-ONU transmissions. The
allocations must either be exactly contiguous, or they must be
scheduled as if they are coming from two different ONUs.
Following any of these overhead transmissions, the user payload
data is sent until the location indicated by the StopTime pointer.
45
Chapter 3 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
47
Activation Method
Overview
A full digital in-band based activation method should be used by
the PON system to measure the logical reach distances between
each ONU and the OLT. Once the ONU is ranged, it can be
operational on the PON.
The maximum range of the PON is at least 20 km. The
transmission delay measurement for each ONU should be
capable of being performed whilst the PON is in-service without
disrupting service to other ONUs.
When ranging new ONUs, working ONUs must temporarily stop
transmissions, thereby opening a ranging window. Information
about the position of the new ONUs can minimize this duration,
but for ONUs which have not been previously ranged, the
duration is determined according to the maximum differential
range of the PON.
The activation protocol is specified and applicable for several
types of installation methods of ONUs.
Chapter 3 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
Initial-state (O1)
49
Power-Setup-state (O3b)
Serial-Number-state (O4b)
SN-Power-Levelling-state (O4c)
In some cases, due to a large ONU's distance from the OLT, its
Tx power level may be too low. Therefore in this state, the ONU
can receive the broadcast Change_Power_Level message, and
subsequently re-calibrate its transmitter to operate at the higher
power level.
e)
Ranging-state (O5)
Chapter 3 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
which are located in different distances from the OLT, will seem
to be in equal distance from the OLT, an Equalization-Delay per
ONU is required.
The Equalization-Delay factor, per ONU, is calculated during the
ranging process, which is initiated by the transmission of a
Ranging-request from the OLT to the ranged ONU. The ONU
responds with a transmission in the upstream direction.
Based on the round-trip-delay time, the OLT calculates the
ONU's Equalization-Delay and sends it to the ONU using a
'Ranging Time' message.
In addition, the Ranging-transmission contains the ONU's SN.
As part of the ranging cycle, the OLT verifies that the ONU-ID
matches the SN, i.e., that the ONU-ID assignment in
Serial-Number-state (O4) was successful.
Once the ONU received the Ranging_Time message, it moves to
Operation-state (O6).
f) Operation-state (O6)
Once the network is ranged, and all ONUs are working with
their correct Equalization-Delay, all upstream frames will be
synchronized together between all ONUs. The upstream
transmissions will arrive separately, each one in its correct
location within the frame.
Halting operating ONUs: In some cases, due to serial number
or ranging processes on other
ONUs, an operating ONU may be halted by the OLT. This may be
accomplished by setting the Slot start & slot end pointers to zero
for the Alloc-ID(s) corresponding to the ONU.
Alternatively, the OLT may simply not send any allocation
structures in the BWmap to the ONU. The ONU will process
either method's allocations in the normal way, which will result
in the ONU not transmitting for a time.
g) POPUP-state (O7)
The ONU enters this state from the Operation state (O6)
following the detection of LOS or LOF alarms. When entering the
POPUP state (O7), the ONU immediately stops upstream
transmission. As a result, the OLT will detect LOS alarm for that
ONU. Based on the network survivability scheme, one of the
following options will be implemented:
In case the OLT switches all ONUs to the protection fibres, all
ONUs have to be re-ranged. Therefore, the OLT will send a
Broadcast POPUP message to the ONU, which, as a result, will
move to Ranging state (O5).
51
Emergency-Stop-state (O8)
Chapter 3 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
53
Chapter 3 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
55
Chapter 3 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
Security
Basic threat model
The basic concern in PON is that the downstream data is
broadcast to all ONUs attached to the PON. If a malicious user
were to re-program his ONU, then he could listen to all the
downstream data of all the users. It is this 'eavesdropping
threat' that the PON security system is intended to counter.
Other, more exotic threats are not considered practically
important; because, in order to attempt these attacks, the user
would have to expend more resources than it would be worth.
57
Encryption system
The encryption algorithm to be used is the Advanced Encryption
Standard (AES). It is a block cipher that operates on 16-byte
(128-bit) blocks of data. It accepts 128, 192, and 256 byte keys.
This algorithm is described in documents published by the
National Institute of Standards and Technology (NIST) in the
USA.
There are several modes of operation for this standard; however,
only the 'Counter' (CTR) mode shall be used. The cipher
generates a stream of 16-byte pseudo-random cipher blocks
which are exclusive-or'ed with the input clear-text to produce
the output of cipher-text. The cipher-text is exclusive-or'ed with
the same pseudo-random cipher blocks to regenerate the
clear-text. Also, the key length is fixed at 128 bits. Larger keys
may be supported, but this usage will be optional.
The counter mode uses a synchronized crypto-counter that is
common to the OLT and all ONUs.
The structure of this crypto-counter is as follows. The counter is
46 bits wide. The least significant 16 bits are the intra-frame
counter, and the most significant 30 bits are the inter-frame
counter.
The intra-frame counter is reset to zero at the beginning of the
downstream frame (the first byte of the PCBd), and is
incremented every four bytes. For example, in the 1.244 Gbit/s
downstream rate system, the counter will run from 0 up to
4859.
The inter-frame counter is the same as the super-frame counter
passed in the Ident field in the PCBd. The ONU implements a
synchronized local counter, and therefore has resilience to errors
in this field.
The blocks of random cipher are aligned to the beginning of the
datagram payloads. In the case of ATM data, the 48 bytes of
payload will be encrypted. Since this data is equal to three equal
blocks of 16 bytes, three blocks of random cipher are XORed to
the data directly.
Chapter 3 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
The 46-bit block counter value drives the 128-bit input of the
AES algorithm in the following way.
The 46 bits are duplicated 3 times, producing a 138-bit
sequence. The 10 most significant bits are then discarded. The
resulting 128-bit number is then encrypted with the AES
algorithm, producing 128 bits of random cipher, which is then
XORed with the user payload data.
59
Chapter 4 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
Chapter
Overview
The OMCI specification addresses the ONT configuration
management, fault management and performance management
for G-PON system operation and for several services including:
ATM adaptation layers 1, 2, and 5;
voice services;
wavelength division multiplexing.
The focus of this OMCI specification is on FTTH and FTTBusiness
ONTs; however, support for ONUs is addressed as well. This
Recommendation defines a protocol necessary to support the
capabilities identified for these ONTs. It also allows optional
components and future extensions.
61
Configuration Management
Configuration management provides functions to exercise
control over, identify, collect data from and provide data to the
ONT. This involves the following:
a) Configuration of equipment;
b) Configuration of the UNIs;
c) Configuration of the VP Network CTP-Gs,
Cross-Connections, and GEM Port Network CTPs;
ATM
VP
Chapter 4 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
value on the ANI is not free because the VPI values on the ANI
are shared with all ONUs in the PON. VP cross-connection on the
ONT resolves this limitation for the UNI). In the case of the
OMCI, VC termination and interworking VCCTP are unified to the
ATM Interworking VCC Termination Point ME. Figure 3 shows the
termination model. For non-ATM LIMs, the aggregate of traffic
parameters for the various VC terminations is represented by
the Traffic Descriptor Profile Pointer associated with the VP
Network CTP-G ME that contains the VC terminations.
Fault Management
The ONT supports limited fault management only. Most of the
operations are limited to failure indication. The OMCI supports
failure reporting on the following managed entities that are
described throughout clause 9, ITU-T Recs G.983.2 and
G.983.8:
63
a) ONT-G;
b) Subscriber Line Cardholder;
c) Subscriber Line Card;
d) PON IF Line Card-G;
e) Physical Path Termination Point ATM UNI;
f) Physical Path Termination Point Ethernet UNI;
g) Physical Path Termination Point CES UNI;
h) Physical Path Termination Point ISDN UNI;
i) Physical Path Termination Point POTS UNI;
j) Physical Path Termination Point Video UNI;
k) Physical Path Termination Point Video ANI;
l) Physical Path Termination Point ADSL UNI;
m) Physical Path Termination Point VDSL UNI;
n) TC AdapterB-PON;
o) ATM Interworking VCC Termination Point;
p) GEM Interworking Termination Point;
q) VP Network CTP-G;
r) VC Network CTP-G;
s) GEM Port Network CTP;
t) ONU-G.
An alarm table is defined for each of these entities.
The ONT also supports selective OAM cell loop-back testing at
the UNI. The ONT diagnostics are limited to the ONT self test.
The OLT or element manager will process the information from
the ONT; for example, the OLT will determine the severity of
each alarm when reporting it to the network operator. ATM
management of continuity monitoring is not a part of this
Recommendation (see af-nm-0020.001 (Bibliography) and ITU-T
Rec. I.751).
Chapter 4 Error! Use the Home tab to apply 1 to the text that you want to appear h
ere.
Performance Management
The ONT has only limited performance monitoring. The following
are related managed entities:
a) UPC Disagreement Monitoring History DataB-PON;
b) AAL1 Protocol Monitoring History DataB-PON;
c) AAL5 Protocol Monitoring History DataB-PON;
d) Ethernet Performance Monitoring History Data;
e) Ethernet Performance Monitoring History Data 2;
f) CES Physical Interface Monitoring History Data;
g) TC Adapter Protocol Monitoring History Data;
h) AAL 2 CPS Protocol Monitoring History Data B-PON;
i) AAL 2 SSCS Protocol Monitoring History Data B-PON;
j) Priority Queue-G;
k) MAC Bridge PM History Data;
l) MAC Bridge Port PM History Data;
m) Voice PM History Data;
n) VP PM History Data;
o) VC PM History Data;
p) ICMP PM History Data1;
q) ICMP PM History Data2
r) IP Router PM History Data1;
s) IP Router PM History Data2;
t) 802.11 Counters;
u) GEM Port Protocol Monitoring History Data;
v) GAL TDM Protocol Monitoring History Data;
w) GAL Ethernet Protocol Monitoring History Data;
x) ADSL ATU-C Performance Monitoring History Data;
65
Security Management
ITU-T Rec. G.984.3 specifies some
viewpoint of security. That includes
encryption and password protection
managed entity can enable/disable the
function.
Error! Use the Home tab to apply 1 to the text that you want to appear here.
67