LLMpediaThe first transparent, open encyclopedia generated by LLMs

G.984

Generated by GPT-5-mini
Note: This article was automatically generated by a large language model (LLM) from purely parametric knowledge (no retrieval). It may contain inaccuracies or hallucinations. This encyclopedia is part of a research project currently under review.
Article Genealogy
Parent: Broadband Forum Hop 5
Expansion Funnel Raw 56 → Dedup 0 → NER 0 → Enqueued 0
1. Extracted56
2. After dedup0 (None)
3. After NER0 ()
4. Enqueued0 ()
G.984
TitleG.984
StatusITU-T Recommendation
Year2003
DomainTelecommunications
OrganizationInternational Telecommunication Union

G.984.

G.984 is an ITU-T Recommendation that defines a set of standards for passive optical network technologies adopted by telecommunications operators, equipment manufacturers, and standards bodies worldwide. It provides a framework adopted in deployments by carriers, system integrators, and municipalities to deliver broadband access over fiber optic infrastructure, interfacing with consumer premises equipment from vendors and ecosystem partners. The Recommendation influences interoperability across suppliers, network planning used by regulators and standardization groups, and deployment strategies evaluated by operators and consultancies.

Overview

G.984 establishes the baseline specification for passive optical network systems, aligning with practices found in documents from the International Telecommunication Union, coordination efforts involving the European Telecommunications Standards Institute, and collaboration with industry consortia such as the Institute of Electrical and Electronics Engineers working groups. The Recommendation is frequently cited in procurement by national carriers like China Telecom, Deutsche Telekom, AT&T, and NTT when evaluating optical access solutions alongside regional regulators such as the Federal Communications Commission and the European Commission. Technology suppliers including Huawei, Nokia, Ericsson, and ZTE implement profiles from the Recommendation to ensure equipment interworking in metropolitan and access networks serving municipalities and enterprises.

Technical Specifications

The standard prescribes physical layer parameters, optical budget classes, wavelength plans, and transmission convergence functions consistent with fiber deployments favored by municipal projects and backbone providers. It specifies optical line termination requirements that operators such as Orange S.A. and Verizon use for service delivery, as well as user-network interfaces utilized by customer premises equipment vendors like Cisco Systems and Juniper Networks. Wavelength allocation follows conventions interoperable with submarine cable systems employed by consortiums such as SAFE and terrestrial fiber projects coordinated with entities including World Bank–funded infrastructure programs. The Recommendation defines power levels, attenuation margins, and link budgets referenced in engineering documents from consulting firms such as Accenture and McKinsey & Company.

Architecture and Components

G.984 outlines a point-to-multipoint fiber topology that leverages passive splitters, optical distribution networks, and active terminations including optical line terminals and optical network units provided by manufacturers like Calix, Adtran, and FiberHome. Network planning often integrates civil works managed by utilities such as EDF (Électricité de France) and construction contractors contracting with multinational groups like Bechtel. The architecture interoperates with customer devices produced by electronics firms such as Samsung Electronics and LG Electronics, and coordinates with access aggregation equipment from data-center operators like Equinix and backbone carriers like Level 3 Communications.

Deployment and Interoperability

Deployment scenarios described in the Recommendation include greenfield fiber-to-the-home rollouts executed by municipal initiatives similar to those in Stockholm and Singapore, as well as brownfield upgrades carried out by incumbent operators such as BT Group and Telefónica. Interoperability testing regimes align with conformance programs run by test laboratories accredited by organizations like ETSI and independent labs associated with universities such as Massachusetts Institute of Technology and Tsinghua University. Equipment certification and multi-vendor interop events mirror activities hosted by bodies like the Broadband Forum and partnership programs between carriers including Sprint and regional wholesalers.

Performance and QoS Metrics

Performance metrics in the Recommendation encompass upstream and downstream throughput, latency targets, jitter limits, and packet-loss tolerances that service providers such as Comcast and Rogers Communications measure in customer trials and service-level agreements negotiated with enterprise clients like Siemens and General Electric. Quality of Service parameters are applied in network management systems from vendors such as Hewlett Packard Enterprise and IBM, and monitored using protocols standardized in ensembles that include work from IETF task forces. Service assurance workflows referenced by operators coordinate with billing platforms from corporations like SAP SE and Oracle Corporation to map performance KPIs to commercial SLAs.

Security Considerations

Security guidance associated with the Recommendation addresses physical-layer threats, unauthorized tapping risks, and management-plane vulnerabilities mitigated through measures adopted by national security agencies such as NCSC and standards offices including the National Institute of Standards and Technology. Operational security practices implemented by carriers like Telefonica and Altice include encryption of management channels, strict access controls, and supply-chain due diligence coordinated with industry alliances such as the Cybersecurity and Infrastructure Security Agency. Security testing and certification draw on methodologies promoted by research institutions including Carnegie Mellon University and ETH Zurich to reduce risks stemming from component tampering, firmware compromise, and insider threats.

Category:ITU-T Recommendations