• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Ring Protection and Survivability Mechanisms for Packet Transport Networks

    2010-06-05 03:32:04LuYueming
    ZTE Communications 2010年3期

    Lu Yueming

    (Key Laboratory of Information Photonics and Optical Communications of Ministry of Education,Beijing University of Posts and Telecommunications,Beijing 100876,P.R.China)

    Abstract:Packet Transport Networks(PTNs)must resolve issues in their protection and recovery mechanisms.These issues include the detection performance of Operation,Administration and Maintenance(OAM),network resource optimization,resource allocation deadlock,and resource deployment blocking.Traditional protection and recovery mechanisms cannot meet the requirements of PTN.In order to improve the protection and recovery performance,network resource use,probability of service recovery,and to decrease the probability of service blocking,this paper introduces overlapped segment shared protection,Pre-configured Multi-Cycle(P-mcycle),conflict-free algorithm,and delay restoration algorithm.Only with appropriate protection and restoration mechanisms is it possible to achieve smooth evolution from TDM networks to integrated packet-based bearer networks and all-IPservices.

    This work was funded by the National High Technology Research and Development Program of China(“863”program)under Grant No.2007AA01Z252.

    T he development of metro transport networking has been driven by access and transmission demands of broadband data services(e.g.3-play),Ethernet Private Line(EPL)enterprise services,Layer 2 Virtual Private Network(L2VPN)services,and common broadband services.As service and bearer networks move towards IP,basic transport networks are evolving into Packet Transport Networks(PTNs)[1].

    With good scalability,powerful OAM,and fast protection switching,PTN inherits some of the characteristics of traditional Synchronous Digital Hierarchy(SDH)transport networking.New features such as packet switching,statistical multiplexing,connection-oriented label switching,Quality of Service(QoS)guarantee,and flexible dynamic control are added for adaptation to data services.These are basic but important technologies for network convergence.In terms of transport mode,PTN not only provides packet data services and traditional Time Division Multiplexing(TDM)services,but also offers Asynchronous Transfer Mode(ATM),Inverse Multiplexing for ATM(IMA)[2],and Multi-Level Pre-Emptive Priority(MLPPP)to meet transmission demands of 3G mobile systems.PTN devices adopt severalencapsulation and adaptation technologies,integrating various TDM and data services on a unified packet transport plane.PTN is thus a unified,packet-switched multi-service transmission platform[3].

    However,integration of various demands and diversified application scenarios creates some critical problems for survivability.This issue directly impacts both the networking mode(ring,mesh,or star)and the service setup mode(1+1 or 1:1 path protection)of a PTN network,and thus affects services.The survivability of PTN involves blocking during Label Switching Path(LSP)setup,resource utility,and coordination for resource allocation[4].Unlike SDH networks,PTN protection mechanisms are still being studied and protection performance is far from adequate.

    Protection and restoration strategies of PTN play an important role in the network’s service performance,resource utility,and survivability.Because PTN imposes high requirements on survivability,research on its protection and restoration strategies is important.Only with adequate protection and restoration mechanisms is it possible to evolve smoothly from TDM-based transport to packet transport,to achieve network convergence and to deliver all-IP services.

    1 PTN Research Status

    There are currently two main technologies for implementing PTN:Transport Multiprotocol Label Switching(T-MPLS)[5]/Transport Multiprotocol Label Switching Traffic Engineering(MPLS-TE)[6],and Provider Backbone Bridge(PBB)/Provider Backbone Transport(PBT)[7].Research into survivability strategies for PTNs with these 2 technologies has attracted much attention.Internationally,institutes and organizations such as Alcatel[8],Nortel[7],Cisco[9],Sycamore[10],European Union Seventh Framework Programme(FP7)[11],the University of Texas[12],Stanford University[13]and Bell Labs[14]are carrying out research.In China,telecom equipment manufacturers such as ZTE,Huawei,and Fiberhome are studying survivability strategies,while research institutes at Tsinghua University,Peking University,Shanghai Jiaotong University,and Beijing University of Posts and Telecommunications are initiating research into protection and restoration mechanisms from the perspective of resource management,distributed parallel resource allocation,and contention.

    The International Telecommunication Union-Telecommunication Standardization Sector(ITU-T)and the Internet Engineering Task Force(IETF)have brought forward their own solutions.ITU-Tdefines T-MPLS,and supports 1+1 and 1:1 linear protection(G8131)as well as wrapping and steering ring protection(G8132)[15].IETF prefers the Fast ReRoute(FRR)[16]technique of Multiprotocol Label Switching(MPLS)to implement 1:N linear and ring protection.In 2008,IETF and ITU-Testablished a Joint Work Team(JWT),and currently,experts within this team are studying ring protection requirements of MPLS Transport Profile(MPLS-TP).Limited by its global labels,PBB Traffic Engineering(PBB-TE)supports 1:1 linear protection,but does not support subnetwork protection and connection-based ring protection.

    In China,PTN protection and restoration technologies are still in the early stages of research and discussion,with network device manufacturers focused on carrier-class protection switching strategies.Key technologies being considered include fault detection and fault notification.These technologies aim to achieve an overall switching time of less than 50 ms,supporting MPLS FRRprotection(by enabling local protection of important links and network elements in the network topology),and supporting Link Aggregation(LAG)protection of the links.In 2008,the China Communications Standards Association(CCSA)established a forum specifically focused on transport devices based on a unified switching plane.In 2010,the forum has turned to T-MPLSprotection mechanisms.

    Overall,current research into PTN protection mechanisms is focused on improving T-MPLS 1+1 and 1:1 linear protection—as it no longer meets the demands of various services.PTN requires multi-level multi-layer protection and restoration.To achieve this,path-level and link-level protection as well as quick routing or rerouting of services by Generalized MPLS(GMPLS)intelligent software is necessary.

    In fact,precursors to packet network protection mechanisms already exist.W.Grover,for example,introduced the concept of P-cycle[17](designed for IP networks).Before a fault occurs,a set of P-cycles are pre-configured and routed through all nodes and links to be protected,and resources are reserved for them.When a fault occurs,switching is performed according to the pre-designed ring.In this way,ring protection is achieved.In a public patent,Robert Sultan proposes a server trail failure message notification mechanism.This increases the probability of service recovery in cases of network congestion[18].Raymond Xie of Sycamore suggests an intelligent protection and restoration mechanism in EtherOptics-based PTN[19-20].

    2 Challenges for PTN Survivability

    Survivability is an important issue that must be addressed before deployment of carrier-class PTNs can occur.Challenges for PTN include survivability evaluation and optimization,distributed deadlock and resource contention,PTN-oriented protection and restoration blocking,as well as fault detection of OAM.

    (1)Survivability Evaluation and Optimization

    Among these challenges,survivability evaluation and optimization is particularly troublesome.First,determining reasonable criteria for evaluating survivability is difficult.Second,there are few good optimization methods and technologies for PTN survivability.Perhaps due to limitations in human cognitive ability when compared with computing capability,many optimization issues seem particularly difficult to solve.People simply do not know what the best network is.Moreover,limited computing capability makes the method of exhaustion infeasible.Only algorithms such as genetic and greedy algorithms can be used to find a better solution to survivability optimization in distributed networks.(2)Distributed Deadlock and Resource Contention

    To a greater or lesser extent,PTN may encounter distributed deadlock and resource contention problems when establishing a fast LSP,preempting a fast LSPin 1:N protection,or reselecting a quick LSP.At present,the ostrich algorithm is commonly used to solve these problems.This algorithm meets the minimum requirements of IP networks,but cannot realize fast protection and restoration.Distributed deadlock is an awkward problem affecting computer operating systems and networks,and it has yet to be solved.For computer operating systems,Dijkstra proposes banker’s algorithm,but its effectiveness has been proven poor.The deadlock problem receives little attention in the research of MPLS;however,in GMPLS research,Zafar Aliet alhave begun to think deeply about the problem and have addressed it to the IETF.Currently,studies into deadlock are underway.

    (3)Blocking in Deploying PTN-Oriented Protection and Restoration Some protection mechanisms similar to SDHhave already been adopted in PTN.However,in distributed routing environments rigid protection paths are set up,and blocking with these mechanisms is very high.To solve this problem,lenient protection and restoration mechanisms must be worked out to complement traditional rigid ones,and to meet the specific requirements of PTN.

    (4)Fault Detection of OAM

    OAM detects Peer-to-Peer(P2P)connectivity status using connectivity detection messages which interact periodically.Along with other methods,it detects packet loss rate,delay,and jitter,and thus achieves loop-back,alarm suppression,and alarm feedback.Moreover,OAM uses Automatic Protection Switching(APS)protocol to protect the two End-to-End(E2E)paths.Whatever the situation,SDH-like protection mechanisms must provide carrier-class protection,and this implies a switching time of no more than 50 ms.The time for the OAM engine to complete path fault detection should not be too long.Specifically,to ensure an overall switching time of less than 50 ms,fault detection and switch triggering must be done 25 ms after a fault occurs.Therefore,OAM fault detection performance is very important.

    3 Ring Protection and Survivability Mechanisms for PTN

    Most core networks of PTN adopt a mesh structure,so ring protection differs to that of SDH.Here,research carried out by BUPTconcerning ring protection and survivability

    mechanisms of PTN is introduced.

    (1)Overlapped Segment Shared Protection Mechanism

    After intensive analysis of constraint mechanism and overlapped segment protection mechanism,the 2 mechanisms were integrated,and overlapped segment shared protection algorithm[21]was used to dynamically adjust the working and protection paths based on link weights.This algorithm provides multiple overlapped protection segments in the entire working path,enabling reasonable and effective selection of these overlapped protection segments.Compared with traditional protection algorithms,the overlapped segment shared protection mechanism enhances network connection reliability,and improves the utility of network resources by reasonably sharing resources among overlapped protection segments.

    ▲Figure 1.Non-overlapped and overlapped segment protection.

    This mechanism protects the entire end-to-end working path using multiple backup protection segments.Compared with path protection,its limited restoration scope is a major advantage.When a link or node fails to work,only its corresponding protection segment is activated.As a result,restoration time is shortened.The mechanism does not provide a protection segment for each link in the working path,so it achieves higher resource utility than link protection.Instead,it provides a backup overlapped protection segment for each segment in the working path,allowing some working links to fall under the protection of several backup segments.This enables flexible network resource allocation and increases the survivability of the network.Traditional non-overlapped segment protection mechanisms cannot protect nodes between segments.Overlapped segment protection mechanism resolves this problem.With neighboring segments overlapped,a faulty node between segments will not lead to failure of both working and protection segments.Overlapped and non-overlapped segment protection is illustrated in Figure 1.

    (2)Pre-configured Multi-Cycle(P-mcycle)Scheme

    To resolve uncertain restoration of a fault point in mesh networks,a new restoration scheme,P-mcycle,is introduced.This scheme uses Integer Linear Programming(ILP)optimization algorithm(for P-mcycle generation),as well as Sub-cycle secondary routing algorithm.P-mcycle ensures a valid fault restoration time,greatly enhances fault protection success rate,and enchances the efficiency of protection resource reservation.Thus,it improves effectiveness and reliability of restoration in PTN.

    P-mcycle generation algorithm is based on ILP.It introduces a Pring for fault-independent path protection.However,the algorithm involves complex computation which often takes a long time.For a small network,P-mcycle generation takes 1 hour;and for a large network,2 days.In contrast,ILPoptimization algorithm leaves variables and constraints such as dynamic service distribution and service symmetry to secondary routing algorithm.A pure ILPmodel is only used for sourcing optimal P-ring combinations.In this way,the computation involved in P-mcycle generation decreases considerably,and the generation task becomes static planning of network topology.

    With the number of variables and constraints decreased,and computational complexity dramatically reduced,an effective pre-selection method can be used to narrow down the number of possible solutions to an ILPproblem.In a given network topology,enhanced Depth-First Search(DFS)algorithm is used first to search all simple rings.Then,the searched rings are checked one by one to determine whether their links satisfy the constraints.M rings with the largest AEvalues are selected to form a sub-optimal solution space.Finally,ILP optimization algorithm is used to select a group for P-mcycle.P-mcycle obtained in this way can protect all working wavelengths,and ensure the preset maximum reserved wavelength is not exceeded.Service is 100%restored with the least resources.

    ▲Figure 2.Conflict-free algorithm.

    Secondary routing algorithm simplifies pre-configuration computation in traditional P-cycle,and optimizes protection path selection during switching.With P-mcycle,fault restoration time satisfies the rigid survivability requirements of PTN.Compared with traditional P-cycle,P-mcycle has a higher protection success rate,better resource utility,and better efficiency.Simulation results show that optimization is more pronounced in the Mesh network where the average node density is low.

    P-mcycle research will continue to focus on the following aspects:achieving P-mcycle optimization based on node fault restoration and multi-link/multi-node restoration;enabling reasonable distribution of P-mcycle generation resources by taking into account dynamic service distribution changes during candidate ring selection;and studying traffic engineering involved in secondary routing based on the direction of services in order to improve service protection success with fewer network resources.

    (3)Conflict-Free Algorithm

    In establishing paths,2 nodes request the same resources(port or wavelengthλ)at both ends of a link and send Reservation(Resv)messages.When the messages reach the other end of the link,the requested resources may already be occupied.In traditional solutions,the node receiving the Resv message treats this as a path error,and returns a Reservation Error(Resverr)message.If resources at both ends are occupied,the nodes at both ends determine that their paths have not been established.As a result,the resources used for path establishment have been wasted.

    Conflict-free algorithm avoids such a problem,as shown in Figure 2.This method works on the principle of adopting a priority comparison strategy for the Resv messages sent at the same time,enabling one path to be established[22].Suppose conflict takes place between Node C and Node D,and the resource allocated by Node C for Path 1 is the same as that allocated by Node D for Path 2.In traditional solutions,Resv 1 message sent by Node C arrives at Node D,the requested resource has been occupied,and Node D treats it as a path error.Similarly,Node C registers a path error when it receives Resv 2 message from Node D.Therefore,neither path can be established.

    In conflict-release algorithm,a counter iis carried along with a path message.The counter is set to 0 at the source node.A"1"is added whenever the path message reaches a node,and the new value is stored at the node.When the path message arrives at the destination node,the value of the counter corresponds to the number of links needed to establish a path from the source node to the destination node.As shown in Figure 2,to establish a path from Node Ato Node E,5 links must be passed;from Node B to Node E,4 links must be passed.

    Using conflict-free algorithm for establishing long-distance paths is unlikely to be successful.Suppose there are 2 path establishment requests:Request A involves 7 links,and Request Binvolves 3 links.If the conflict link is 2 links away from the source node of Request A,and one link away from the resource node of Request B,Request Bwillsucceed in establishing a path but Request A will fail.As a result,the 5 paths that have been established by Request Abefore the conflict must be released,resulting in resource waste.

    (4)Delay Recovery Algorithm

    Delay recovery algorithm is used for handling network faults,adopting sequenced delay during network fault recovery.

    After a fault occurs,the algorithm allows the source node of the service to send a delayed Notify message.As shown in Figure 3,a time interval t is inserted between two Notify messages.With this method,the probability of resource conflict is reduced in the re-routing and signaling process for fault recovery.When services in two opposite directions are recovered,signaling messages are sent in a certain sequence and no resource conflict occurs.

    4 Conclusion

    PTN is a future direction in telecom network development.However,ring protection and survivability directly impact its QoS.PTN must resolve issues in fault detection,network deployment,protection and restoration.Existing protection and restoration methods cannot meet the requirements of PTN and new mechanisms must be worked out.These challenges will eventually be solved in the future.

    ?Figure 3.Delay recovery algorithm.

    亚洲专区中文字幕在线| 精品国产美女av久久久久小说| 国产又色又爽无遮挡免费看| 97人妻精品一区二区三区麻豆| 我的老师免费观看完整版| 国产aⅴ精品一区二区三区波| 免费观看的影片在线观看| 国产私拍福利视频在线观看| 午夜视频精品福利| 成人高潮视频无遮挡免费网站| 伦理电影免费视频| 后天国语完整版免费观看| 午夜福利视频1000在线观看| 男插女下体视频免费在线播放| 久久精品91无色码中文字幕| 十八禁网站免费在线| 婷婷精品国产亚洲av在线| 国产精品国产高清国产av| 级片在线观看| x7x7x7水蜜桃| av视频在线观看入口| 美女黄网站色视频| 一进一出抽搐gif免费好疼| 国产伦一二天堂av在线观看| 蜜桃久久精品国产亚洲av| 青草久久国产| 黄色视频,在线免费观看| 在线观看一区二区三区| 999久久久精品免费观看国产| 亚洲av成人一区二区三| 国内精品久久久久精免费| 亚洲国产中文字幕在线视频| 欧美另类亚洲清纯唯美| 亚洲成a人片在线一区二区| 国内精品久久久久久久电影| 女人被狂操c到高潮| 非洲黑人性xxxx精品又粗又长| 午夜福利免费观看在线| 美女黄网站色视频| 99在线人妻在线中文字幕| 精品久久久久久久毛片微露脸| 两个人视频免费观看高清| 俺也久久电影网| 99精品久久久久人妻精品| 亚洲精品久久国产高清桃花| 欧美在线一区亚洲| 中亚洲国语对白在线视频| 欧美xxxx黑人xx丫x性爽| 国产成人影院久久av| 性色avwww在线观看| 91久久精品国产一区二区成人 | 中文字幕精品亚洲无线码一区| 亚洲人成伊人成综合网2020| 桃色一区二区三区在线观看| 精品久久久久久成人av| 色av中文字幕| 99热6这里只有精品| 日本撒尿小便嘘嘘汇集6| xxxwww97欧美| 禁无遮挡网站| 亚洲成av人片免费观看| 国产成人欧美在线观看| 欧美国产日韩亚洲一区| 日日摸夜夜添夜夜添小说| 激情在线观看视频在线高清| 成人特级黄色片久久久久久久| 亚洲最大成人中文| 99热这里只有是精品50| 丰满人妻熟妇乱又伦精品不卡| 91老司机精品| 9191精品国产免费久久| 国产精品国产高清国产av| 精品久久久久久久人妻蜜臀av| 婷婷丁香在线五月| 成人18禁在线播放| 人妻丰满熟妇av一区二区三区| 一区二区三区国产精品乱码| 亚洲在线观看片| 国产亚洲精品久久久久久毛片| 国产97色在线日韩免费| 久久久久久久久中文| www日本在线高清视频| 亚洲精品在线观看二区| 香蕉av资源在线| cao死你这个sao货| bbb黄色大片| www.精华液| 成人一区二区视频在线观看| 婷婷亚洲欧美| 国产三级中文精品| 丰满的人妻完整版| 成在线人永久免费视频| 黄片大片在线免费观看| av片东京热男人的天堂| 久久热在线av| 久久久久国产精品人妻aⅴ院| 变态另类成人亚洲欧美熟女| 久久久精品大字幕| 午夜精品在线福利| 亚洲一区高清亚洲精品| 天堂影院成人在线观看| 91老司机精品| netflix在线观看网站| 亚洲国产精品合色在线| av在线蜜桃| 欧美日本亚洲视频在线播放| 亚洲激情在线av| 亚洲无线在线观看| 夜夜爽天天搞| 久久这里只有精品19| 老司机福利观看| xxx96com| 91老司机精品| 91在线观看av| 国产精品一区二区精品视频观看| 精品国产超薄肉色丝袜足j| 亚洲国产精品sss在线观看| 婷婷六月久久综合丁香| 成人无遮挡网站| 国产一区二区激情短视频| 波多野结衣高清作品| 国产91精品成人一区二区三区| 国产精品免费一区二区三区在线| 少妇丰满av| 最新中文字幕久久久久 | 人人妻人人澡欧美一区二区| 亚洲 国产 在线| ponron亚洲| 1000部很黄的大片| 老汉色∧v一级毛片| 中文亚洲av片在线观看爽| 国产精品1区2区在线观看.| www日本在线高清视频| 亚洲电影在线观看av| 日本成人三级电影网站| 国产精品一区二区三区四区免费观看 | 亚洲欧洲精品一区二区精品久久久| 夜夜躁狠狠躁天天躁| 成年版毛片免费区| 最好的美女福利视频网| 国产一区二区激情短视频| 亚洲精品久久国产高清桃花| 女人被狂操c到高潮| 啦啦啦观看免费观看视频高清| 亚洲av成人精品一区久久| 天堂网av新在线| 亚洲中文日韩欧美视频| 一二三四在线观看免费中文在| 国产精品久久久久久亚洲av鲁大| 国产精品免费一区二区三区在线| 夜夜爽天天搞| 久久草成人影院| 国产av麻豆久久久久久久| 欧美精品啪啪一区二区三区| ponron亚洲| 亚洲av免费在线观看| 露出奶头的视频| 国产伦人伦偷精品视频| 给我免费播放毛片高清在线观看| 国产精品久久电影中文字幕| 中文资源天堂在线| 亚洲欧美日韩无卡精品| 岛国在线免费视频观看| 日韩欧美在线二视频| 在线国产一区二区在线| 国产精品亚洲一级av第二区| 国产真人三级小视频在线观看| 亚洲中文av在线| 免费观看的影片在线观看| 亚洲男人的天堂狠狠| 国产成人精品久久二区二区免费| 欧美日韩黄片免| 他把我摸到了高潮在线观看| 99国产精品一区二区蜜桃av| 国产精品久久久久久亚洲av鲁大| 国产一级毛片七仙女欲春2| 久久久久久人人人人人| 热99在线观看视频| 在线观看美女被高潮喷水网站 | 美女扒开内裤让男人捅视频| 久久精品国产综合久久久| 国产一级毛片七仙女欲春2| 国产蜜桃级精品一区二区三区| 国产精品女同一区二区软件 | 91在线精品国自产拍蜜月 | 香蕉丝袜av| 午夜免费激情av| 久久草成人影院| 欧美高清成人免费视频www| 亚洲专区国产一区二区| 悠悠久久av| 无遮挡黄片免费观看| 午夜a级毛片| 亚洲国产欧洲综合997久久,| 听说在线观看完整版免费高清| 免费搜索国产男女视频| 久久午夜亚洲精品久久| 中文字幕精品亚洲无线码一区| 国产aⅴ精品一区二区三区波| 亚洲无线观看免费| 亚洲专区中文字幕在线| 欧美在线黄色| 男女下面进入的视频免费午夜| 在线永久观看黄色视频| 久久99热这里只有精品18| 国产精品免费一区二区三区在线| 久久精品影院6| 久久久精品欧美日韩精品| 日本免费a在线| 久久精品91无色码中文字幕| 国产久久久一区二区三区| 99久久99久久久精品蜜桃| 日韩精品青青久久久久久| 黄色视频,在线免费观看| 两人在一起打扑克的视频| 国产精品乱码一区二三区的特点| 日本五十路高清| 日韩欧美免费精品| 男人和女人高潮做爰伦理| 国产成人av教育| 欧美成人免费av一区二区三区| 中文字幕最新亚洲高清| 国产激情偷乱视频一区二区| 欧美乱色亚洲激情| 欧美日韩精品网址| 午夜福利在线观看免费完整高清在 | 国产久久久一区二区三区| 成年免费大片在线观看| 久久久久精品国产欧美久久久| 免费一级毛片在线播放高清视频| 久久精品夜夜夜夜夜久久蜜豆| 亚洲精品在线美女| 国产蜜桃级精品一区二区三区| 亚洲av第一区精品v没综合| e午夜精品久久久久久久| 性欧美人与动物交配| 久久久精品大字幕| h日本视频在线播放| 国内揄拍国产精品人妻在线| 亚洲aⅴ乱码一区二区在线播放| 欧美日韩亚洲国产一区二区在线观看| 成人永久免费在线观看视频| av中文乱码字幕在线| 黄色视频,在线免费观看| 久久九九热精品免费| 色综合欧美亚洲国产小说| 好看av亚洲va欧美ⅴa在| 女人高潮潮喷娇喘18禁视频| 久久久久久大精品| 在线免费观看不下载黄p国产 | 免费看日本二区| 国产 一区 欧美 日韩| 亚洲欧美激情综合另类| 亚洲国产中文字幕在线视频| 久久热在线av| 特级一级黄色大片| 国产午夜福利久久久久久| 村上凉子中文字幕在线| 18禁国产床啪视频网站| 嫩草影院精品99| 俺也久久电影网| 国产精品亚洲av一区麻豆| 级片在线观看| 亚洲一区二区三区不卡视频| 亚洲熟女毛片儿| 日韩成人在线观看一区二区三区| 久久久久久久久久黄片| 天天躁日日操中文字幕| 亚洲欧美精品综合久久99| 在线十欧美十亚洲十日本专区| 一区二区三区激情视频| 男女午夜视频在线观看| 在线观看舔阴道视频| 欧美乱色亚洲激情| 国内精品美女久久久久久| 美女免费视频网站| 亚洲av成人av| 69av精品久久久久久| bbb黄色大片| 亚洲欧洲精品一区二区精品久久久| 国产成+人综合+亚洲专区| 三级国产精品欧美在线观看 | 夜夜夜夜夜久久久久| 中文资源天堂在线| 村上凉子中文字幕在线| 91av网站免费观看| 国产美女午夜福利| 亚洲第一电影网av| 欧美日本视频| av天堂在线播放| 日本免费a在线| 日韩欧美在线二视频| 亚洲精品一卡2卡三卡4卡5卡| 国产欧美日韩一区二区三| 美女cb高潮喷水在线观看 | 啦啦啦免费观看视频1| 一个人免费在线观看的高清视频| 一本一本综合久久| 亚洲欧洲精品一区二区精品久久久| 不卡av一区二区三区| 亚洲av成人不卡在线观看播放网| 亚洲av熟女| 午夜福利成人在线免费观看| 一个人看视频在线观看www免费 | 国产精品香港三级国产av潘金莲| 久久精品91无色码中文字幕| 国产高清三级在线| 亚洲成人久久性| 国产欧美日韩精品亚洲av| tocl精华| 国产激情欧美一区二区| 神马国产精品三级电影在线观看| 亚洲狠狠婷婷综合久久图片| 久9热在线精品视频| 亚洲国产精品久久男人天堂| 老司机在亚洲福利影院| 亚洲av成人av| 三级毛片av免费| 国产精品99久久久久久久久| 啦啦啦免费观看视频1| 99国产精品一区二区蜜桃av| 成人鲁丝片一二三区免费| 天堂av国产一区二区熟女人妻| 小说图片视频综合网站| 91麻豆精品激情在线观看国产| 久久午夜亚洲精品久久| 天堂av国产一区二区熟女人妻| 久久久国产欧美日韩av| 欧美日韩乱码在线| 欧美日韩福利视频一区二区| 国产成人啪精品午夜网站| 日韩精品中文字幕看吧| 中文字幕人成人乱码亚洲影| 日日干狠狠操夜夜爽| 成人三级做爰电影| 国产免费男女视频| 国产成人系列免费观看| 日韩欧美免费精品| 欧美成人免费av一区二区三区| 国产视频一区二区在线看| 亚洲熟妇中文字幕五十中出| 十八禁人妻一区二区| 成人18禁在线播放| 又黄又爽又免费观看的视频| 天天躁狠狠躁夜夜躁狠狠躁| 久久久精品欧美日韩精品| 国产成人aa在线观看| 啦啦啦韩国在线观看视频| 亚洲一区二区三区色噜噜| 欧美黄色片欧美黄色片| 99riav亚洲国产免费| 精品久久久久久久久久久久久| 亚洲国产精品合色在线| 亚洲国产精品999在线| 极品教师在线免费播放| 精品无人区乱码1区二区| 国产av麻豆久久久久久久| 久久精品国产亚洲av香蕉五月| 国产成人aa在线观看| 成人欧美大片| 12—13女人毛片做爰片一| 久久精品影院6| av女优亚洲男人天堂 | 精品国产亚洲在线| 十八禁网站免费在线| 国产精品亚洲av一区麻豆| 亚洲人成网站在线播放欧美日韩| 九九热线精品视视频播放| 日本黄色片子视频| 黑人巨大精品欧美一区二区mp4| 免费高清视频大片| e午夜精品久久久久久久| 精品久久久久久久久久免费视频| 欧美日韩综合久久久久久 | 99国产极品粉嫩在线观看| 久久久久久久精品吃奶| 国产伦精品一区二区三区四那| 一级a爱片免费观看的视频| 男人和女人高潮做爰伦理| 91在线观看av| 老汉色∧v一级毛片| 久久中文字幕人妻熟女| 99久久成人亚洲精品观看| 亚洲乱码一区二区免费版| 欧美成人一区二区免费高清观看 | 99热只有精品国产| 午夜激情福利司机影院| 亚洲国产精品合色在线| 婷婷六月久久综合丁香| 欧美乱妇无乱码| 国产精品一区二区免费欧美| 99久久久亚洲精品蜜臀av| 国产精品av久久久久免费| 法律面前人人平等表现在哪些方面| 男人舔女人的私密视频| 免费人成视频x8x8入口观看| 国产高清三级在线| 日韩欧美精品v在线| 男人的好看免费观看在线视频| 看黄色毛片网站| 色视频www国产| 国产精品电影一区二区三区| 国产精品综合久久久久久久免费| 国产一区二区激情短视频| 很黄的视频免费| 亚洲一区二区三区不卡视频| av国产免费在线观看| 亚洲五月天丁香| 久久久久久久久免费视频了| 国内少妇人妻偷人精品xxx网站 | 国内久久婷婷六月综合欲色啪| 在线a可以看的网站| 黄片小视频在线播放| tocl精华| netflix在线观看网站| 无遮挡黄片免费观看| 国产精品久久久久久人妻精品电影| 熟女少妇亚洲综合色aaa.| 黄色成人免费大全| 亚洲av成人av| 久久久久性生活片| 一个人看视频在线观看www免费 | 丁香欧美五月| 18美女黄网站色大片免费观看| 亚洲人成网站高清观看| 男人舔女人的私密视频| 观看美女的网站| www.熟女人妻精品国产| 黄色 视频免费看| 嫩草影院精品99| 美女扒开内裤让男人捅视频| 免费在线观看影片大全网站| 午夜亚洲福利在线播放| 国产人伦9x9x在线观看| 精品电影一区二区在线| 男女视频在线观看网站免费| 亚洲中文日韩欧美视频| 国产精品久久久av美女十八| www日本在线高清视频| 日本精品一区二区三区蜜桃| 18禁裸乳无遮挡免费网站照片| 成人精品一区二区免费| 日韩欧美三级三区| 欧美成人免费av一区二区三区| 日本免费一区二区三区高清不卡| 久久精品91无色码中文字幕| 一个人看视频在线观看www免费 | 女生性感内裤真人,穿戴方法视频| 黄色丝袜av网址大全| 亚洲成人精品中文字幕电影| 欧美日韩一级在线毛片| 欧美日韩瑟瑟在线播放| 亚洲国产欧洲综合997久久,| 色视频www国产| ponron亚洲| 免费观看的影片在线观看| 国产精品乱码一区二三区的特点| 美女黄网站色视频| 日本黄色片子视频| 免费在线观看影片大全网站| 中亚洲国语对白在线视频| 日韩国内少妇激情av| 国产一区二区激情短视频| 两个人看的免费小视频| 一区福利在线观看| 夜夜夜夜夜久久久久| 免费在线观看影片大全网站| av视频在线观看入口| 免费一级毛片在线播放高清视频| 日韩 欧美 亚洲 中文字幕| 精品欧美国产一区二区三| 亚洲va日本ⅴa欧美va伊人久久| АⅤ资源中文在线天堂| 精品久久久久久成人av| 日本与韩国留学比较| 99久久国产精品久久久| 每晚都被弄得嗷嗷叫到高潮| 免费看十八禁软件| 国产伦在线观看视频一区| 18禁国产床啪视频网站| 桃色一区二区三区在线观看| 熟女电影av网| 一夜夜www| 精品久久久久久久人妻蜜臀av| 九九久久精品国产亚洲av麻豆 | 久久热在线av| 国产一区二区在线观看日韩 | 国产一区二区在线观看日韩 | 听说在线观看完整版免费高清| 精品国产乱子伦一区二区三区| 成人三级黄色视频| 男人和女人高潮做爰伦理| 国产熟女xx| 久久中文看片网| 日本黄色片子视频| 999久久久精品免费观看国产| 搡老妇女老女人老熟妇| 亚洲在线自拍视频| 美女午夜性视频免费| 国产美女午夜福利| 日本成人三级电影网站| 精品国产乱码久久久久久男人| 欧美一级a爱片免费观看看| 丁香欧美五月| 美女 人体艺术 gogo| 我的老师免费观看完整版| 禁无遮挡网站| 日本成人三级电影网站| 天天躁日日操中文字幕| 又黄又爽又免费观看的视频| 欧美日韩乱码在线| 国产亚洲精品综合一区在线观看| 宅男免费午夜| 中出人妻视频一区二区| 欧美一区二区精品小视频在线| 男女视频在线观看网站免费| 久久精品亚洲精品国产色婷小说| 中文字幕熟女人妻在线| 天堂av国产一区二区熟女人妻| 一二三四社区在线视频社区8| 两个人看的免费小视频| 久久精品国产清高在天天线| 国产人伦9x9x在线观看| 久久久成人免费电影| 精品99又大又爽又粗少妇毛片 | 啦啦啦免费观看视频1| 99久国产av精品| www日本黄色视频网| 校园春色视频在线观看| 国产主播在线观看一区二区| 亚洲国产中文字幕在线视频| 国产又色又爽无遮挡免费看| 欧美黄色淫秽网站| 日韩成人在线观看一区二区三区| 九九久久精品国产亚洲av麻豆 | 精品久久久久久久人妻蜜臀av| 亚洲熟妇中文字幕五十中出| 久久午夜综合久久蜜桃| 18禁黄网站禁片免费观看直播| 国产成人aa在线观看| 999久久久精品免费观看国产| 久久亚洲真实| 又黄又爽又免费观看的视频| 91在线精品国自产拍蜜月 | 手机成人av网站| 亚洲国产欧美一区二区综合| 变态另类成人亚洲欧美熟女| 18美女黄网站色大片免费观看| 麻豆成人av在线观看| www.www免费av| 国产精品99久久99久久久不卡| 欧美成人性av电影在线观看| 中文资源天堂在线| 天天添夜夜摸| 亚洲一区二区三区不卡视频| 黄频高清免费视频| 婷婷亚洲欧美| 亚洲国产欧美一区二区综合| 国产视频一区二区在线看| 黄片大片在线免费观看| 日本黄大片高清| 成人性生交大片免费视频hd| 老熟妇仑乱视频hdxx| 好男人在线观看高清免费视频| 亚洲中文字幕一区二区三区有码在线看 | 午夜福利在线观看吧| 少妇熟女aⅴ在线视频| 日韩欧美免费精品| 99国产精品一区二区三区| 两个人视频免费观看高清| 天天一区二区日本电影三级| 两个人视频免费观看高清| 精品福利观看| www.www免费av| 三级国产精品欧美在线观看 | 久久香蕉精品热| 午夜免费激情av| 国产精品久久久久久久电影 | 亚洲欧美日韩高清专用| 999久久久国产精品视频| 三级毛片av免费| 嫩草影视91久久| 美女 人体艺术 gogo| 午夜福利在线在线| 欧美色欧美亚洲另类二区| 在线视频色国产色| 法律面前人人平等表现在哪些方面| av欧美777| 色尼玛亚洲综合影院| 国产精品一及| 日韩大尺度精品在线看网址| 国产三级黄色录像| 亚洲国产日韩欧美精品在线观看 | 成人特级av手机在线观看| 看黄色毛片网站| 欧美性猛交╳xxx乱大交人| 超碰成人久久| 一边摸一边抽搐一进一小说| 国产99白浆流出| 18禁黄网站禁片午夜丰满| 国产三级在线视频| 国产激情久久老熟女| 在线免费观看的www视频| 看片在线看免费视频| 我要搜黄色片| 国产精品国产高清国产av| 中亚洲国语对白在线视频| 麻豆成人av在线观看| 日本一二三区视频观看| 日本黄大片高清| 操出白浆在线播放| 日韩欧美国产一区二区入口| 国产视频内射| av国产免费在线观看| 蜜桃久久精品国产亚洲av|