{"id":785,"date":"2025-09-27T13:04:58","date_gmt":"2025-09-27T09:34:58","guid":{"rendered":"https:\/\/rayka-co.ir\/new\/?post_type=product&#038;p=785"},"modified":"2025-12-24T03:53:28","modified_gmt":"2025-12-24T00:23:28","slug":"l2vpn-architecture-inc-atom-l2tpv3-and-vpls","status":"publish","type":"product","link":"https:\/\/rayka-co.ir\/new\/product\/l2vpn-architecture-inc-atom-l2tpv3-and-vpls\/","title":{"rendered":"L2VPN Architecture Inc. ATOM, L2TPV3 and VPLS"},"content":{"rendered":"<div style=\"direction: rtl; text-align: right; font-family: Vazir, Tahoma, sans-serif; line-height: 1.8; padding: 20px;\">\n<p><!-- \u0648\u06cc\u062f\u06cc\u0648 \u0645\u0639\u0631\u0641\u06cc \u062f\u0648\u0631\u0647 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<div style=\"position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden;\"><iframe style=\"position: absolute; top: 0; left: 0; width: 100%; height: 100%;\" src=\"https:\/\/www.aparat.com\/video\/video\/embed\/videohash\/yCWpA\/vt\/frame\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><br \/>\n<\/iframe><\/div>\n<\/div>\n<p><!-- \u0633\u0631\u0641\u0635\u0644\u200c\u0647\u0627 --><\/p>\n<h2 style=\"margin-bottom: 1em;\">\u0633\u0631\u0641\u0635\u0644\u200c\u0647\u0627\u06cc \u062f\u0648\u0631\u0647<\/h2>\n<p><!-- Understanding Layer 2 VPNs --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>Understanding Layer 2 VPNs<\/h3>\n<p>\u0622\u0634\u0646\u0627\u06cc\u06cc \u0628\u0627 \u0645\u0641\u0627\u0647\u06cc\u0645 \u067e\u0627\u06cc\u0647 \u0648 \u0627\u0635\u0648\u0644 \u0639\u0645\u0644\u06a9\u0631\u062f Layer 2 VPN\u0647\u0627\u060c \u0634\u0627\u0645\u0644 \u0633\u0627\u062e\u062a\u0627\u0631 \u0648 \u06a9\u0627\u0631\u0628\u0631\u062f\u0647\u0627\u06cc \u0622\u0646\u200c\u0647\u0627 \u062f\u0631 \u0634\u0628\u06a9\u0647\u200c\u0647\u0627\u06cc \u0645\u062f\u0631\u0646.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Pseudowire Emulation Framework and Standards --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>Pseudowire Emulation Framework and Standards<\/h3>\n<p>\u0628\u0631\u0631\u0633\u06cc \u0686\u0627\u0631\u0686\u0648\u0628\u200c\u0647\u0627 \u0648 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627\u06cc \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0634\u0628\u06cc\u0647\u200c\u0633\u0627\u0632\u06cc Pseudowire \u0628\u0631\u0627\u06cc \u0627\u0646\u062a\u0642\u0627\u0644 \u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627\u06cc \u0644\u0627\u06cc\u0647 \u062f\u0648\u0645 \u062f\u0631 \u0634\u0628\u06a9\u0647\u200c\u0647\u0627.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Layer 2 VPN Architectures --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>Layer 2 VPN Architectures<\/h3>\n<p>\u0645\u0639\u0631\u0641\u06cc \u0645\u0639\u0645\u0627\u0631\u06cc\u200c\u0647\u0627\u06cc \u0645\u062e\u062a\u0644\u0641 Layer 2 VPN \u0648 \u0646\u062d\u0648\u0647 \u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc \u0622\u0646\u200c\u0647\u0627 \u062f\u0631 \u0633\u0646\u0627\u0631\u06cc\u0648\u0647\u0627\u06cc \u0645\u062e\u062a\u0644\u0641 \u0634\u0628\u06a9\u0647.<\/p>\n<\/div>\n<hr \/>\n<p><!-- LAN Protocols --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>LAN Protocols<\/h3>\n<p>\u0628\u0631\u0631\u0633\u06cc \u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627\u06cc \u0634\u0628\u06a9\u0647 \u0645\u062d\u0644\u06cc (LAN) \u0648 \u0646\u0642\u0634 \u0622\u0646\u200c\u0647\u0627 \u062f\u0631 \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a \u0644\u0627\u06cc\u0647 \u062f\u0648\u0645.<\/p>\n<\/div>\n<hr \/>\n<p><!-- WAN Data-Link Protocols --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>WAN Data-Link Protocols<\/h3>\n<p>\u0622\u0634\u0646\u0627\u06cc\u06cc \u0628\u0627 \u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627\u06cc \u0644\u0627\u06cc\u0647 \u067e\u06cc\u0648\u0646\u062f \u062f\u0627\u062f\u0647 \u062f\u0631 \u0634\u0628\u06a9\u0647\u200c\u0647\u0627\u06cc \u06af\u0633\u062a\u0631\u062f\u0647 (WAN) \u0648 \u06a9\u0627\u0631\u0628\u0631\u062f\u0647\u0627\u06cc \u0622\u0646\u200c\u0647\u0627.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Understanding Any Transport over MPLS --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>Understanding Any Transport over MPLS<\/h3>\n<p>\u062a\u0648\u0636\u06cc\u062d \u0645\u0641\u0647\u0648\u0645 AToM \u0648 \u0686\u06af\u0648\u0646\u06af\u06cc \u0627\u0646\u062a\u0642\u0627\u0644 \u0627\u0646\u0648\u0627\u0639 \u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627 \u0627\u0632 \u0637\u0631\u06cc\u0642 MPLS \u062f\u0631 \u0634\u0628\u06a9\u0647\u200c\u0647\u0627\u06cc \u0644\u0627\u06cc\u0647 \u062f\u0648\u0645.<\/p>\n<\/div>\n<hr \/>\n<p><!-- LAN Protocols over MPLS Case Studies --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>LAN Protocols over MPLS Case Studies<\/h3>\n<p>\u0645\u0637\u0627\u0644\u0639\u0627\u062a \u0645\u0648\u0631\u062f\u06cc \u062f\u0631 \u0645\u0648\u0631\u062f \u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc \u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627\u06cc LAN \u0628\u0631 \u0628\u0633\u062a\u0631 MPLS \u0648 \u0686\u0627\u0644\u0634\u200c\u0647\u0627\u06cc \u0645\u0631\u062a\u0628\u0637.<\/p>\n<\/div>\n<hr \/>\n<p><!-- WAN Protocols over MPLS Case Studies --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>WAN Protocols over MPLS Case Studies<\/h3>\n<p>\u0628\u0631\u0631\u0633\u06cc \u0646\u0645\u0648\u0646\u0647\u200c\u0647\u0627\u06cc \u0639\u0645\u0644\u06cc \u0627\u0632 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627\u06cc WAN \u062f\u0631 \u0628\u0633\u062a\u0631 MPLS \u0648 \u0646\u062a\u0627\u06cc\u062c \u0622\u0646\u200c\u0647\u0627.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Advanced AToM Case Studies --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>Advanced AToM Case Studies<\/h3>\n<p>\u0645\u0637\u0627\u0644\u0639\u0627\u062a \u0645\u0648\u0631\u062f\u06cc \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u062f\u0631 \u0645\u0648\u0631\u062f \u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc AToM \u062f\u0631 \u0633\u0646\u0627\u0631\u06cc\u0648\u0647\u0627\u06cc \u067e\u06cc\u0686\u06cc\u062f\u0647 \u0634\u0628\u06a9\u0647.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Understanding L2TPv3 --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>Understanding L2TPv3<\/h3>\n<p>\u0622\u0634\u0646\u0627\u06cc\u06cc \u0628\u0627 \u067e\u0631\u0648\u062a\u06a9\u0644 L2TPv3 \u0648 \u06a9\u0627\u0631\u0628\u0631\u062f\u0647\u0627\u06cc \u0622\u0646 \u062f\u0631 \u0627\u06cc\u062c\u0627\u062f \u062a\u0648\u0646\u0644\u200c\u0647\u0627\u06cc \u0644\u0627\u06cc\u0647 \u062f\u0648\u0645.<\/p>\n<\/div>\n<hr \/>\n<p><!-- LAN Protocols over L2TPv3 Case Studies --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>LAN Protocols over L2TPv3 Case Studies<\/h3>\n<p>\u0645\u0637\u0627\u0644\u0639\u0627\u062a \u0645\u0648\u0631\u062f\u06cc \u062f\u0631 \u0645\u0648\u0631\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627\u06cc LAN \u0628\u0631 \u0628\u0633\u062a\u0631 L2TPv3.<\/p>\n<\/div>\n<hr \/>\n<p><!-- WAN Protocols over L2TPv3 Case Studies --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>WAN Protocols over L2TPv3 Case Studies<\/h3>\n<p>\u0628\u0631\u0631\u0633\u06cc \u0646\u0645\u0648\u0646\u0647\u200c\u0647\u0627\u06cc \u0639\u0645\u0644\u06cc \u0627\u0632 \u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc \u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627\u06cc WAN \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 L2TPv3.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Advanced L2TPv3 Case Studies --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>Advanced L2TPv3 Case Studies<\/h3>\n<p>\u0645\u0637\u0627\u0644\u0639\u0627\u062a \u0645\u0648\u0631\u062f\u06cc \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u062f\u0631 \u0645\u0648\u0631\u062f \u06a9\u0627\u0631\u0628\u0631\u062f\u0647\u0627\u06cc \u067e\u06cc\u0686\u06cc\u062f\u0647 L2TPv3 \u062f\u0631 \u0634\u0628\u06a9\u0647\u200c\u0647\u0627\u06cc \u0645\u062f\u0631\u0646.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Layer 2 Interworking and Local Switching --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>Layer 2 Interworking and Local Switching<\/h3>\n<p>\u0628\u0631\u0631\u0633\u06cc \u062a\u0639\u0627\u0645\u0644 \u0628\u06cc\u0646 \u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627\u06cc \u0644\u0627\u06cc\u0647 \u062f\u0648\u0645 \u0648 \u0645\u06a9\u0627\u0646\u06cc\u0632\u0645\u200c\u0647\u0627\u06cc \u0633\u0648\u0626\u06cc\u0686\u06cc\u0646\u06af \u0645\u062d\u0644\u06cc \u062f\u0631 \u0634\u0628\u06a9\u0647.<\/p>\n<\/div>\n<hr \/>\n<p><!-- Virtual Private LAN Service --><\/p>\n<div style=\"margin-bottom: 2em;\">\n<h3>Virtual Private LAN Service<\/h3>\n<p>\u0622\u0634\u0646\u0627\u06cc\u06cc \u0628\u0627 VPLS \u0648 \u0646\u062d\u0648\u0647 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0646 \u0628\u0631\u0627\u06cc \u0627\u06cc\u062c\u0627\u062f \u0634\u0628\u06a9\u0647\u200c\u0647\u0627\u06cc LAN \u0645\u062c\u0627\u0632\u06cc \u062f\u0631 \u0628\u0633\u062a\u0631 MPLS.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<article class=\"text-token-text-primary w-full focus:outline-none scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" tabindex=\"-1\" data-testid=\"conversation-turn-2\" data-scroll-anchor=\"true\" data-turn=\"assistant\">\n<p data-start=\"0\" data-end=\"432\">\u062f\u0631 \u062f\u0648\u0631\u0647 <strong data-start=\"8\" data-end=\"30\">L2VPN Architecture<\/strong> \u0634\u0645\u0627 \u0628\u0627 \u0645\u0639\u0645\u0627\u0631\u06cc \u0648 \u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc <strong data-start=\"58\" data-end=\"74\">Layer 2 VPNs<\/strong> \u0622\u0634\u0646\u0627 \u0645\u06cc\u200c\u0634\u0648\u06cc\u062f. \u0645\u0628\u0627\u062d\u062b \u0634\u0627\u0645\u0644 <strong data-start=\"100\" data-end=\"148\">Pseudowire Emulation Framework \u0648 \u0627\u0633\u062a\u0627\u0646\u062f\u0627\u0631\u062f\u0647\u0627<\/strong>\u060c \u0628\u0631\u0631\u0633\u06cc <strong data-start=\"156\" data-end=\"185\">Layer 2 VPN Architectures<\/strong> \u0648 \u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627\u06cc <strong data-start=\"199\" data-end=\"212\">LAN \u0648 WAN<\/strong> \u0627\u0633\u062a. \u0633\u067e\u0633 \u0645\u0641\u0627\u0647\u06cc\u0645 <strong data-start=\"229\" data-end=\"263\">Any Transport over MPLS (ATOM)<\/strong> \u0648 \u0645\u0637\u0627\u0644\u0639\u0647\u200c\u06cc \u0645\u0648\u0631\u062f\u06cc \u067e\u0631\u0648\u062a\u06a9\u0644\u200c\u0647\u0627\u06cc LAN \u0648 WAN \u0628\u0631 \u0631\u0648\u06cc MPLS \u0648 \u0633\u0646\u0627\u0631\u06cc\u0648\u0647\u0627\u06cc \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 AToM \u0628\u0631\u0631\u0633\u06cc \u0645\u06cc\u200c\u0634\u0648\u062f. \u0647\u0645\u0686\u0646\u06cc\u0646 \u0645\u0628\u0627\u062d\u062b \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 <strong data-start=\"375\" data-end=\"385\">L2TPv3<\/strong> \u0634\u0627\u0645\u0644 \u0627\u0635\u0648\u0644\u060c Case Study\u0647\u0627\u06cc LAN \u0648 WAN \u0648 \u0633\u0646\u0627\u0631\u06cc\u0648\u0647\u0627\u06cc \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0622\u0645\u0648\u0632\u0634 \u062f\u0627\u062f\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f. \u062f\u0631 \u0627\u062f\u0627\u0645\u0647 \u0645\u0648\u0636\u0648\u0639\u0627\u062a <strong data-start=\"477\" data-end=\"518\">Layer 2 Interworking\u060c Local Switching<\/strong> \u0648 \u062f\u0631 \u0646\u0647\u0627\u06cc\u062a <strong data-start=\"530\" data-end=\"568\">Virtual Private LAN Service (VPLS)<\/strong> \u0628\u0631\u0631\u0633\u06cc \u0645\u06cc\u200c\u0634\u0648\u0646\u062f \u062a\u0627 \u062a\u0648\u0627\u0646\u0627\u06cc\u06cc \u0637\u0631\u0627\u062d\u06cc \u0648 \u067e\u06cc\u0627\u062f\u0647\u200c\u0633\u0627\u0632\u06cc VPN\u0647\u0627\u06cc \u0644\u0627\u06cc\u0647 \u06f2 \u062f\u0631 \u0633\u0646\u0627\u0631\u06cc\u0648\u0647\u0627\u06cc \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0631\u0627 \u0628\u0647 \u062f\u0633\u062a \u0622\u0648\u0631\u06cc\u062f.<\/p>\n<\/article>\n","protected":false},"featured_media":786,"comment_status":"open","ping_status":"closed","template":"","meta":[],"pwb-brand":[29],"product_brand":[],"product_cat":[71],"product_tag":[],"class_list":{"0":"post-785","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"pwb-brand-majid-asadpoor","7":"product_cat-service-provider","8":"post","10":"first","11":"instock","12":"downloadable","13":"virtual","14":"purchasable","15":"product-type-simple"},"brands":[{"id":29,"name":"\u0645\u062c\u06cc\u062f \u0627\u0633\u062f\u067e\u0648\u0631","slug":"majid-asadpoor"}],"_links":{"self":[{"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/product\/785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/comments?post=785"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/media\/786"}],"wp:attachment":[{"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/media?parent=785"}],"wp:term":[{"taxonomy":"pwb-brand","embeddable":true,"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/pwb-brand?post=785"},{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/product_brand?post=785"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/product_cat?post=785"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/rayka-co.ir\/new\/wp-json\/wp\/v2\/product_tag?post=785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}