• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Study of Configuration Evolution of an Operational IP Backbone Network

    2017-05-09 07:48:33FuliangLiJiahaiYangHuijingZhangXingweiWangSuogangLiJianpingWu
    China Communications 2017年6期

    Fuliang Li, Jiahai Yang, Huijing Zhang, Xingwei Wang*, Suogang Li, Jianping Wu

    1 School of Computer Science and Engineering, Northeastern University, China

    2 Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, 100084, China

    3 Department of Computer Science, Beijing University of Posts and Telecommunications, China

    4 CERNET National Network Center, Beijing, 100084, China

    * The corresponding author, email: wangxw@mail.neu.edu.cn

    I. INTRODUCTION

    Misconfigurations are the main reasons for network interruption and anomalies [1-4].Furthermore, network devices tend to support more functions and provide more services,which will cause more configuration errors.Therefore, configuration management is still a crucial research topic.

    1.1 Configuration analysis

    Many studies have been conducted to address configuration properties and diagnose misconfigurations. H. Kim et al. [5] analyzed fiveyear configuration data of router, switch and firewall from two large campus networks.They presented a long-term longitudinal study on the configuration evolution, such as how configurations of each task evolve, which parts of configurations change more frequently, etc.Y. Sung et al. [6] investigated the configuration dynamics of five enterprise VPN customers. N. Feamster et al. [7] conducted a statistical analysis of router configurations to identify BGP misconfigurations. F. Le et al. [8] applied data mining technologies to extract router configuration policies, which would be utilized as test cases to detect configuration errors. G. Xie et al. [9] used the router configuration snapshots to investigate network reachability and further to troubleshoot reachability problems.T. Benson et al. proposed two models to quan-tify configuration complexity [10, 11]. They not only captured the router configuration difficulties, but also unraveled the complexity of configuring network services.

    This paper analyzes the distribution of configuration tasks and network failures about weekly reports of an operational IP backbone, and draws a conclusion that rate limiting and launching routes for new customers are most frequently configured.An example of how to provide semi-automated configuration is also described in this paper.

    Our work is close to a previous study on configuration evolution analysis [5]. However,there are two differences. 1) Unlike existing methodologies that extract changes by comparing two consecutive versions of the configuration files, we capture the configuration evolution by tracking high-level configuration tasks recorded in the weekly reports. 2) We unveil the beneficial information hidden in the weekly reports of an operational IP backbone network, which can supplement our understanding on configuration evolution of backbone networks distinguishing from campus and enterprise networks.

    1.2 Configuration provisioning

    Network configuration is a complicated and error-prone job that lays heavy burden on operators. Thus, extensive studies have been conducted to achieve the goal of automated configuration provisioning. D. Caldwell et al.[12] developed a tool to identify configuration policies and templates, which could drive the migration of the network towards automated provisioning. J. Gottlieb et al. [13] put forward a template-driven approach for ISPs to configure connections for new BGP-speaking customers automatically. W. Enck et al. [14]proposed a system calledPRESTOto construct device-native configuration templates. They also showed how to configure the service of VPN with the proposed system. X. Chen, et al. [15, 16] put forward a mechanism for configuration management by taking advantage of the database to abstract specific configurations and adopting declarative language to describe dependencies and restrictions among the network components.

    The contributions of this paper include two aspects. 1) We make a first-ever and high-level analysis on configuration evolution of an operational IP backbone network. According to the dataset gathered from January 2006 to January 2013, we conduct a statistics of the configuration tasks and capture the tasks which are configured more frequently. 2) We extract configuration templates by associating high-level configuration tasks with specific configuration commands in the configuration files, which provides a practical basis for automated configuration provisioning.

    The reminder of the paper is organized as follows. Section II introduces the data sources.Section III presents the analysis methodology and results. We discuss the implications of the observations in Section IV. We conclude the whole paper in Section V.

    II. DATA SOURCES

    The data sources are collected from an operational IP backbone network. In this section, we first introduce the studied network, and then describe the data sources in details.

    2.1 The Studied network

    The studied network is China Education and Research Network (i.e., CERNET) [17]. It is a nationwide IP backbone network and provides Internet access to universities and research institutes of China. CERNET operation team focuses on solving technical challenges and overcoming difficulties in network operation and management. The backbone network nodes (POPs) are scattered over 38 universities located in 36 cities. The PoPs connect with each other via 2.5 Gbps, 10 Gbps or 100 Gbps links, providing Internet access for more than 2000 campus networks at 1 Gbps, 2.5 Gbps or 10 Gbps. The users of the studied network are over 20 million. In addition, it has 28 international lines interconnecting with North America, Europe, and Asia Pacific Rim, etc.The total bandwidth of CERNET connecting to domestic ISPs and international ISPs reaches over 70 Gbps and 30 Gbps respectively.

    2.2 Historical data

    Weekly reports:Our high-level configuration evolution analysis is based on the weekly reports, which contain abundant and valuable information of operating an IP backbone net-work. Each weekly report mainly consists of two aspects of information. 1) It records the tasks processed by the operators. The tasks include adding a new customer (e.g., a university or a research institute) to make it access the studied network, stopping a customer from accessing the studied network, and rate limiting, etc. 2) It also records the failures of the backbone network. The failures include link failure, device failure, and power failure, etc.We gather the weekly reports of the studied network from January 2006 to January 2013.According to the weekly reports, we can track which configuration behaviors dominate the configuration operations and which configuration tasks are configured most frequently,i.e., we can restore the truth and uncover the network configuration evolution.

    Configuration files:The studied network consists of more than 100 backbone routers.Operators backup the configuration files of these routers through a self-developed system.Note that only the changed configuration files and the differences between two consecutive versions of the configuration files are recorded. Once we conduct a wrong configuration operation, we can quickly roll back the router configuration to the most recent valid version.The configuration files are regarded as an auxiliary data source to the weekly reports,because each task can be associated with a certain set of commands that are manually implanted into the configuration files.

    III. METHODOLOGIES AND HIGH-LEVEL ANALYSIS

    First of all, we describe the methodology of capturing the configuration evolution of the studied network. Secondly, we analyze the configuration evolution in a high-level analysis way. At last, we investigate the network failures, which are indirectly related to network configurations.

    3.1 Methodology

    We capture the configuration evolution by tracking high-level configuration tasks recorded in the weekly reports. Table I shows the types of configuration tasks that can be tracked from the weekly reports. In addition,we correlate each high-level task to a certain set of commands that are manually implanted into the configuration files, based on which,we associate the tasks with three types of basic configuration operations, i.e., modification,addition and deletion. Our method is more direct and efficient to investigate the evolution of network configurations. However, our method may be a more general and coarsegrained classification method. For example,modifying a routing policy may also involve adding or deleting operations.

    3.2 High-level analyses of configuration evolution

    1) Distribution of the configuration tasks: As depicted in Fig. 1, rate limiting accounts for 37.04% of the configuration changes. Task of rate limiting refers to increasing or decreasing the access bandwidth for the customers.As more and more emerging applications and services with highe network performance demand, customers often have the requirements of bandwidth upgrading. In addition, to maximize their profits, customers will access the Internet in a multi-homing way, so they may decrease the bandwidth of the existing connected ISPs, which can save money for accessing a new ISP to satisfy their special needs. Operators need to conduct rate-limiting configurations to satisfy different requirements of the customers. Configurations of adding customer account for 36.78% of the configura-tion changes. Adding customer (i.e., launching routes for new customers) mainly refers to making a new customer access the studied network. Benefiting from the rapid development of the studied network, more and more customers choose it to access the Internet either for the high speed or for the abundant resources.

    Table I types of the configuration behaviors

    Suspending customer refers to temporarily preventing a customer without paying in time from accessing the network, while rebooting customer refers to re-activating a customer to access the studied network. These two types of configuration tasks account for 15.73% of the configuration changes. Configurations of routing related account for about 7.81% of the configuration changes. The routing related tasks include adjusting the parameters ofOSPFandBGPfor load balancing, as well as adding new physical links, which will cause the network topology to change. By comparison, routing related configurations are more complicated and error-prone. Tasks of canceling customer account for 2.64% of the configuration changes. With the increasing customers who are willing to access the studied network, and fewer customers who are revoked the privilege to access it, we can expect that the scale of the studied network is still expanding.

    Fig. 1 Statistics of the configuration tasks over the seven years

    2) Changes of the configuration commands:We roughly correlate each high-level task with a basic configuration operation as shown in Table I. Then we correlate each high-level task with specific commands executed in the configuration files. For example, operation of adding customer will add about eight configuration command lines.

    We calculate the number of command lines for the three types of operations. As shown in Table II, operators conduct the adding operations in most cases, which is accordance with the conclusion we could get from Fig. 1.Adding operation mainly refers to the configurations of adding customers. Due to the rapid development of the studied network, more and more customers want to get the permission to access it. With the growth of the customers,the increasing traffic may lead congestion to some links. Operators need to add new links or upgrade the existing links among the backbone routers, as well as adjust the routing policies. Adding new links will invoke a chain of routing adjustments to make the links evenly used. Due to its complexity, operators should pay attention to the adding operations in order to decrease the possibility of misconfigurations.

    Modifying operations also account for a considerable part of the basic operations.Modifying operation mainly refers to the configurations of routing related and rate limiting.Routing related tasks play a quite crucial role in a large-scale network operation. Operators need to make a better choice for both inter-domain and intra-domain routing in order to balance the cost and the performance, and gain the maximum profit at the same time. With the growth of the users, as well as the demand on performance improvement and commercial profits maximization, customers of the studied network also need operators to conduct many rate limiting operations. We are delighted to witness the rapid development of the studied network, but we also have to admit that the development also brings many configuration operations that need to be handled timely and successfully. Therefore, we should be aware of the importance of the modifying operations,which are complicated to deal with.

    3) Longitudinal analysis of the configuration tasks:Fig. 2 shows how each configuration task evolves over the seven years. We find that the configuration tasks present different patterns during these years. Taking rate limiting as an example, we can see that there are no rate limiting tasks before the year of 2010.However, it presents a sharp increase after that year. We can infer that due to the rapid development, the customer networks need to change the access bandwidth to improve the network performance or realize multi-homing. We also find that some configuration tasks present a downward trend, such as adding customer and routing related. For one thing, the studied network devotes to be an education and research network. Therefore, customers are mainly universities, research institutes and government departments. These types of customers tend to be in a stable scale and new customers become less and less. However, since there are more tasks of adding customers than canceling customers, the size of the studied network is still increasing. For another thing, once an ISP develops to a mature phase, the backbone network will run in a stable state, so configuration tasks related to routing adjustments decrease.Note that operators did not record the tasks of routing related in weekly reports since 2010.

    We also find that the configuration tasks concentrate in a few months of each year.Therefore, operators need to try their best to avoid misconfigurations during these months.In addition, adding customer and rate limiting are configured most frequently. Operators can correlate a set of certain command lines in the configuration files to these tasks in order to construct configuration templates. The templates can be transformed into executable scripts (including syntax ofexpect[18]),which can configure the task on the corresponding devices automatically.

    3.3 High-level analysis of network failures

    We separate configuration behaviors into direct configuration behaviors and indirect configuration behaviors. The former refers to the specific configuration tasks depicted in Table I, while the latter refers to the network failures that may need pre-configurations to reduce the influence caused by them, such as link failure,routing failure and device failure, etc. If we can configure redundant links for some links,which may be congested or broken down, the network can reroute the traffic to other linksor devices automatically. This will greatly enhance the network reliability. Ideally, backups for all the links and devices are necessary.However, due to the high cost and complicated network environment, it is difficult to realize.A tradeoff is to understand the network failures and configure redundant links for those links with high failure frequency.

    Table II Change analysis of configuration commands over the seven years

    Fig. 2 Longitudinal analysis of the configuration tasks over the seven years

    1) Distribution of the network failures: We firstly analyze the failure types and failure ratio of each type of failure. We do not show the number of each failure for privacy reasons. As shown in Table III, network failures are mainly classified into four types. The reasons for these failures are identified and recorded by the operators in the Network Operation Center(NOC) or operators in the regional POPs. We find that link failures account for 82.9% of the network failures. Link failure will cause interruptions of data transmission. However, these links may carry the traffic for some real-time services, which should be guaranteed with a reliable data transmission. Actually, operators often configure redundant links to enhance the fault tolerance of the links. However, we cannot configure redundant links for all the links limited by the network environment and high cost. Thus, it is better to configure redundant links in a selective way, i.e., configuring redundant links for some links which present high frequency of failures.

    Routing failure ranks following the link failure. Many undesirable outcomes may stem from routing failure, such as network congestion and routing oscillation, etc. Operators need to resort to reasonable configuration operations to minimize the influence. For example, when a link is congested, some traffic of this link can be rerouted to an underutilized link automatically. Power failure ranks thethird place among these failures. Power failure is mainly caused by some planned factors, so power failures are easy to manage. Operators can take some reasonable measures such as employingUPS, which can effectively solve such emergencies once a power failure happens as planned. Device failure ranks the fourth place. To prevent device failures, operators need to deploy and configure redundant devices for the devices that are often broken down. Once a primary device is out of order,the redundant device will take over the responsibility automatically. Other failures refer to some uncertain failures. These factors may be caused by hostile attacks. Operators should consider security policies on data plane when configuring routers, such as ingress filtering,egress filtering, rate limiting and black hole,etc.

    2) Detailed analysis of the link failures: All the network failures finally performs like link failures. For a fault-tolerant network, once a link failure happens, redundant links for this link will be activated. In this section, we conduct a detailed analysis of link failures, which is helpful to make intelligent routing policies configured on the routers. As depicted in Fig.3, each point represents a failure happened in the link during the past seven years. If the points of a link are very dense, we can infer that the link encounters a high rate of failure.Operators should configure redundant links for the links that are easy to break down in order to enhance the reliability of data transmission.We also find that the number of the links that encounter link failures seems to show an increase during the past years. Due to the rapid development of customer networks and the growth of new customers accessing the studied network, operators add some new links to offload the traffic from the heavily utilized links. Operators also need to configure redundant links for the new links with high failure frequency.

    IV. IMPLICATIONS OF OBSERVATIONS

    We discuss the implications of network man-agement and configuration provisioning according to our observations.

    4.1 Network manageme nt

    As stated in Table III, link failures are the main reasons for network failures. The failures are either caused by planned operations or by unexpected behaviors. Link failures increase the complexity of the management of a largescale network. Some backbone links may carry the traffic for important or real-time services, such as financial transactions, video conferences and voice-over-IP, etc. In order to guarantee the reliability of data transmission,operators can configure redundant links for all the links. However, this approach is unwise and not encouraged. As depicted in Fig. 3, we can find the links with high rate of failures.As an alternative, operators can configure the redundant links for these links to achieve the goal of fault tolerance. In addition, routing failure also trigger many network failures,which will bring in significant influence to the data transmission. For example, network congestion can be caused by routing failures.Operators should monitor the status of each link in real time. Once a link is congested,redundant link configured in advance will offload the traffic from the overloaded link automatically. In summary, pre-configurations are necessary to guarantee the reliable data transmission.

    4.2 Configuration provisioning

    As shown in Fig. 1 and Fig. 2, we find that tasks usually configured by the operators are rate limiting and adding customer. Operations of adding customer involve about eight configuration command lines, while operations of rate limiting only need to modify one command line. According to the types of configuration tasks gathered from analyzing the configuration changes, and combining with correlating each task to a certain set of command lines in the configuration files, our goal of providing semi-automated configuration for an operational backbone network is close to the reality. We take the tasks of rate limiting and adding customer as examples to show how to create the configuration template.

    Fig. 3 Detailed analysis of the link failures over the seven years

    1) Rate limiting

    Given a customer (C1) who wants to increase the access bandwidth, we illustrate the processes oftemplate creation under the environment of Cisco IOS Release 12.0(32)SY16.

    Step-1: According to the customer name,i.e.,C1, we extract corresponding configurations ofrate limitingofC1from the configuration file. Related Configurations ofrate limitingofC1is shown in Fig. 4(a). In our studied network, operators name theclass-mapforrate limitingin a consistent way. For example,they uselimit-C1to denoteclass-mapofC1.

    Step-2: As shown in Fig. 4(a), 300000000 represents that the access bandwidth ofC1is 300Mbit/s. The number of 9375000 is calculated by 300000000 dividing 32. Now,C1wants to increase the access bandwidth to 800Mbit/s.We should modify the underlined values in the line 7 of Fig. 4(a). The bandwidth is needed to be adjusted to 800000000. Correspondingly,the following value is also calculated by dividing 32, i.e., 800000000/32=25000000. Based on the above analysis, we create the configuration template forC1to increase the bandwidth.The configuration template is shown in Fig.4(b).

    Step-3: In order to reduce the workload and the possibility of misconfigurations, we transform the configuration template into an automated script, which can connect to the corresponding router and execute the configuration commands automatically. The automated execution benefits from the functionality ofexpect[18]. The script is shown in Fig. 4(c).Note that all the characters underlined can be regarded as variables, the values of which can be got from a text file through ashellprogram.

    2) Adding customer

    Given a customer (C2) who wants to access the studied network, we also illustrate the processes oftemplate creation under the environment of Cisco IOS Release 12.0(32)SY16.We assume thatC2connects to the interface(GigabitEthernet 0/1) ofR1.

    Step-1: This step is mainly about how to configure thestatic route. We first choose an address block forC2. Assume that the address block isa1.a2.a3.a4with the mask number ofb1.b2.b3.b4.With the access permission ofR1,we check whether the interface of GigabitEthernet 0/1 is up or not. The query command isshow interfaces gigabitethernet 0/1. The query results can illustrate the state of the interface. Here, we assume the interface of GigabitEthernet 0/1 is not enabled. We should enable the interface first. The address of the interface isc1.c2.c3.c4and the mask number is255.255.255.252. The address of the corresponding interface of GigabitEthernet 0/1 isc1.c2.c3.c5. Note thatc1.c2.c3.c4andc1.c2.c3.c5are adjacent addresses in the same subnet. We then create astatic routeforC2. The command isip route a1.a2.a3.a4 b1.b2.b3.b4 c1.c2.c3.c5. Thestatic routecan tell the packets coming from other interfaces ofR1how to go to C2.

    Step-2: Assume that the access bandwidth forC2is 500Mbit/s, we then show the processes of configuringrate limiting. We check theaccess list(s)that have been defined inR1.The query command isshow ip access-list.According to the query results, we can get theaccess-list numberthat can be used. For example, if the maximumaccess-list numberis 2043, we can select theaccess-list numberof 2044 forC2. Commands of configuringrate limitingis similar to the commands shown in Fig. 4(a). We should calculate the underlined values in the line 7 of Fig. 4(a). The values forC2are 500000000, 15625000, 15625000 in sequence.

    Step-3: Based on the above analysis, we create the configuration template forC2to access the studied network with the bandwidth of 500Mbit/s. The configuration template is shown in Fig. 4(d). We define some basic attributes of the interface from line 2 to line 6.Thestatic routeforC2is configured in line 8.We configurerate limitingforC2from line 9 to line 18. We also transform the configuration template into an automated script with the syntax ofexpect. The feature of the script is similar to the one shown in Fig. 4(c), so we do not show it any more.

    Fig. 4 Example of configuration template creation provisioning

    Configuration templates depicted in Fig.4(b) and Fig. 4(d) are commonly used. If we want to apply these templates to other customers, we just need to determine and replace all the values of the underlined variables. With the configuration templates constructed manually, we can create corresponding scripts,which can provide automated configuration.

    VI. CONCLUSION AND FUTURE REMARKS

    In this paper, we captured the configuration evolution of an IP backbone network in a high-level analysis way, i.e., correlating each high-level task recorded in the weekly report to specific command lines executed in the configuration files. Results revealed that rate limiting and adding customers are configured most frequently. In addition, we conducted an analysis of network failures. We found that link failures are the main reasons for network failures. We suggested that we should configure redundant links for the links with high rate of failures, which would enhance the reliability of data transmission. More importantly,we showed how to provide semi-automated configuration by the cases of rate limiting and adding customers.

    We note that network failures are more complex than general configuration tasks to deal with. Further investigation of network failures, especially the relationships between configurations and failures, still needs to be conducted.

    ACKNOWLEDGEMENTS

    This work is supported by the National Natural Science Foundation of China under Grant Nos. 61602105 and 61572123; China Postdoctoral Science Foundation under Grant Nos.2016M601323; the Fundamental Research Funds for the Central Universities Project under Grant No. N150403007; CERNET Innovation Project under Grant No. NGII20160126.

    [1] R. Mahajan, D. Wetherall, and T. Anderson, “Understanding BGP misconfiguration”,ACM SIGCOMM Computer Communication Review, vol.32, no. 4, pp. 3-16, 2002.

    [2] Z. Kerravala, “Configuration management delivers business resiliency”,The Yankee Group,2002.

    [3] A. Markopoulou, G. Iannaccone, S. Bhattacharyya, C. N. Chuah, C. Diot, “Characterization of Failures in an IP Backbone”, in proceeding ofTwenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies(INFOCOM), 2004, pp. 2307-2317.

    [4] D. Oppenheimer, A. Ganapathi, D. Patterson,“Why do Internet services fail, and what can be done about it”, InUSENIX Symposium on Internet Technologies and Systems(USITS), 2003, pp.1-15.

    [5] H. Kim, T. Benson, A. Akella, and N. Feamster,“The evolution of network configuration: a tale of two campuses”, InInternet Measurement Conference(IMC), 2011, pp. 499-514.

    [6] Y. Sung, S. Rao, S. Sen, and S. Leggett, “Extracting Network-Wide Correlated Changes from Longitudinal Configuration Data”, InInternational Conference on Passive and Active Network Measurement(PAM), 2009, pp. 111-121.

    [7] N. Feamster and H. Balakrishnan, “Detecting BGP Configuration Faults with Static Analysis”,InProceedings of the 2Nd Conference on Symposium on Networked Systems Design & Implementation(NSDI), 2005, pp. 43-56.

    [8] F. Le, S. Lee, T. Wong, H. Kim, and D. Newcomb,“Minerals: using data mining to detect router misconfigurations”, InProceedings of the 2006 SIGCOMM workshop on Mining network data,2006, pp.293–298.

    [9] G. Xie, J. Zhan, D. Maltz, H. Zhang, A. Greenberg,G. Hjalmtysson. and J. Rexford, “On static reachability analysis of IP networks”, InProceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM), 2005, pp.2170-2183,.

    [10] T. Benson, A. Akella, and D. Maltz, “Unraveling Complexity in Network Management”, InProceedings of the 6th USENIX Symposium on Networked Systems Design & Implementation(NSDI), 2009, pp. 335-348.

    [11] T. Benson, A. Akella, and A. Shaikh, “Demystifying configuration challenges and trade-offs in network-based ISP services”,ACM SIGCOMM Computer Communication Review, vol. 41, no. 4,pp. 302-313, 2011.

    [12] D. Caldwell, A. Gilbert, J. Gottlieb, A. Greenberg,G. Hjalmtysson, and J. Rexford, “The cutting edge of IP router configuration”,ACM SIGCOMM Computer Communication Review, vol.34, no. 1, pp. 21-26, 2003.

    [13] J. Gottlieb, A. Greenberg, J. Rexford, and J.Wang, “Automated Provisioning of BGP Customers”,IEEE Network, vol. 17, no. 6, pp. 44-55,2003.

    [14] W. Enck, T. Moyer, P. McDaniel, S. Sen, P. Sebos,S. Spoerel, A. Greenberg, Y. Sung, S. Rao, and W.Aiello, “Configuration management at massive scale: system design and experience”,IEEE Journal on Selected Areas in Communications,vol.27, no. 3, pp.323–335, 2009.

    [15] X. Chen, Y. Mao, ZM. Mao, and J. Van der Merwe, “Declarative configuration management for complex and dynamic networks”, InProceedings of the 6th International Conference on Emerging networking experiments and technologies(CoN-ext), 2010, pp. 6.

    [16] X. Chen, Y. Mao, ZM. Mao, J. Van der Merwe,“DECOR: DEClarative network management and OpeRation”,ACM SIGCOMM Computer Communication Review, vol. 40, no. 1, pp. 61-66, 2010.

    [17] CERNET - China Education and Research Network. http://www.edu.cn/english/.

    [18] Expect. http://expect.sourceforge.net/.

    xxxhd国产人妻xxx| 少妇猛男粗大的猛烈进出视频| 国产精品 欧美亚洲| 黄色怎么调成土黄色| 五月天丁香电影| 国精品久久久久久国模美| 国产成人啪精品午夜网站| 成人国产av品久久久| 亚洲精华国产精华精| av视频免费观看在线观看| 欧美在线黄色| 水蜜桃什么品种好| 精品少妇久久久久久888优播| 欧美+亚洲+日韩+国产| 黄色 视频免费看| 久久精品亚洲熟妇少妇任你| av网站在线播放免费| 免费观看人在逋| 大香蕉久久网| 欧美激情极品国产一区二区三区| 亚洲中文av在线| 纯流量卡能插随身wifi吗| 精品卡一卡二卡四卡免费| 国产精品欧美亚洲77777| 热99re8久久精品国产| 啪啪无遮挡十八禁网站| 1024香蕉在线观看| 日本五十路高清| 在线亚洲精品国产二区图片欧美| 一边摸一边抽搐一进一出视频| 亚洲第一欧美日韩一区二区三区 | 亚洲五月婷婷丁香| 日本黄色日本黄色录像| 丝袜喷水一区| 日本黄色视频三级网站网址 | 91老司机精品| 国产97色在线日韩免费| 成人三级做爰电影| 久久这里只有精品19| a级毛片在线看网站| 久久亚洲精品不卡| 黄色 视频免费看| 午夜视频精品福利| 91字幕亚洲| 久久国产亚洲av麻豆专区| aaaaa片日本免费| 久久精品国产亚洲av高清一级| 日韩欧美免费精品| 久久99一区二区三区| 考比视频在线观看| 巨乳人妻的诱惑在线观看| 午夜福利视频在线观看免费| 无遮挡黄片免费观看| 男女无遮挡免费网站观看| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲五月色婷婷综合| 国产日韩一区二区三区精品不卡| 女警被强在线播放| bbb黄色大片| e午夜精品久久久久久久| 色综合欧美亚洲国产小说| 久久人妻av系列| 免费不卡黄色视频| 51午夜福利影视在线观看| 一二三四社区在线视频社区8| 欧美av亚洲av综合av国产av| 国产无遮挡羞羞视频在线观看| 国产欧美日韩一区二区三区在线| 亚洲av成人不卡在线观看播放网| 丁香欧美五月| 999精品在线视频| 欧美 日韩 精品 国产| 久久人人97超碰香蕉20202| 日本黄色视频三级网站网址 | 99国产精品99久久久久| 两性午夜刺激爽爽歪歪视频在线观看 | 亚洲伊人色综图| 99久久人妻综合| 丝袜喷水一区| 精品少妇一区二区三区视频日本电影| 怎么达到女性高潮| 精品午夜福利视频在线观看一区 | 丰满迷人的少妇在线观看| 亚洲avbb在线观看| 777米奇影视久久| av超薄肉色丝袜交足视频| 久久中文字幕人妻熟女| 91成人精品电影| 女同久久另类99精品国产91| 久久精品亚洲精品国产色婷小说| 精品一区二区三区av网在线观看 | 在线观看免费高清a一片| 最近最新中文字幕大全电影3 | 欧美人与性动交α欧美软件| 久久人人97超碰香蕉20202| 国产精品98久久久久久宅男小说| 一区二区三区乱码不卡18| 日日夜夜操网爽| 国产人伦9x9x在线观看| 午夜激情久久久久久久| 成人国语在线视频| 最黄视频免费看| 桃花免费在线播放| 亚洲精品国产色婷婷电影| 国产aⅴ精品一区二区三区波| 在线av久久热| 午夜老司机福利片| 无人区码免费观看不卡 | 老司机在亚洲福利影院| 国产一区二区三区视频了| 男女午夜视频在线观看| 老熟女久久久| 老熟妇仑乱视频hdxx| 国产xxxxx性猛交| 一进一出好大好爽视频| 国产在线免费精品| 欧美激情极品国产一区二区三区| 亚洲欧美色中文字幕在线| 亚洲精品中文字幕在线视频| 黄色视频在线播放观看不卡| 在线观看www视频免费| 波多野结衣av一区二区av| 亚洲视频免费观看视频| 视频区欧美日本亚洲| 日韩视频一区二区在线观看| 国产一区二区三区在线臀色熟女 | 国产av又大| 成人黄色视频免费在线看| 国产色视频综合| 菩萨蛮人人尽说江南好唐韦庄| 人妻久久中文字幕网| 9191精品国产免费久久| 午夜福利视频精品| 啦啦啦视频在线资源免费观看| 欧美 亚洲 国产 日韩一| 午夜激情av网站| 欧美人与性动交α欧美软件| 亚洲va日本ⅴa欧美va伊人久久| 亚洲五月色婷婷综合| 午夜免费成人在线视频| 日本五十路高清| 亚洲欧美一区二区三区久久| 啦啦啦中文免费视频观看日本| 精品高清国产在线一区| 9热在线视频观看99| 在线亚洲精品国产二区图片欧美| 久久国产精品影院| 色婷婷久久久亚洲欧美| 老司机亚洲免费影院| 黄色视频在线播放观看不卡| 水蜜桃什么品种好| 精品少妇一区二区三区视频日本电影| 五月天丁香电影| 麻豆乱淫一区二区| 精品亚洲乱码少妇综合久久| 国产亚洲av高清不卡| 欧美人与性动交α欧美软件| 精品国产国语对白av| 亚洲av片天天在线观看| 中文字幕高清在线视频| 啦啦啦视频在线资源免费观看| 国产av国产精品国产| 91精品国产国语对白视频| 真人做人爱边吃奶动态| 精品少妇久久久久久888优播| 亚洲 欧美一区二区三区| 真人做人爱边吃奶动态| 黄色视频在线播放观看不卡| 精品亚洲成国产av| 久久久国产精品麻豆| 久久午夜亚洲精品久久| 日韩大片免费观看网站| 三级毛片av免费| 日本wwww免费看| 国产麻豆69| 亚洲精品久久午夜乱码| 两性午夜刺激爽爽歪歪视频在线观看 | 视频区图区小说| 欧美大码av| 色婷婷久久久亚洲欧美| 人人妻,人人澡人人爽秒播| 国产一区有黄有色的免费视频| 亚洲少妇的诱惑av| 飞空精品影院首页| 国产成人欧美| 国产精品香港三级国产av潘金莲| 成人免费观看视频高清| 国产色视频综合| 久久久国产一区二区| av天堂久久9| 国产aⅴ精品一区二区三区波| 男女下面插进去视频免费观看| 精品福利永久在线观看| 青草久久国产| 久久久久视频综合| 9191精品国产免费久久| 丰满饥渴人妻一区二区三| 亚洲成人免费av在线播放| 国产免费av片在线观看野外av| 捣出白浆h1v1| 麻豆av在线久日| 欧美人与性动交α欧美精品济南到| 一区二区av电影网| 国产片内射在线| 国产成+人综合+亚洲专区| 欧美日韩黄片免| 日韩视频在线欧美| 欧美在线黄色| 国产日韩欧美在线精品| 久久久久精品人妻al黑| 免费看十八禁软件| 欧美成人免费av一区二区三区 | av有码第一页| 精品国产乱码久久久久久男人| 久久天躁狠狠躁夜夜2o2o| 久9热在线精品视频| 亚洲免费av在线视频| 色尼玛亚洲综合影院| 免费一级毛片在线播放高清视频 | 国产欧美日韩一区二区三区在线| 亚洲精品在线观看二区| 亚洲,欧美精品.| 香蕉丝袜av| 欧美精品一区二区大全| 国产色视频综合| aaaaa片日本免费| 高清av免费在线| 黑人猛操日本美女一级片| 久久久精品94久久精品| 成人影院久久| 日日爽夜夜爽网站| 夜夜骑夜夜射夜夜干| 水蜜桃什么品种好| 少妇 在线观看| 动漫黄色视频在线观看| 亚洲精品国产区一区二| 在线亚洲精品国产二区图片欧美| 极品少妇高潮喷水抽搐| 亚洲美女黄片视频| h视频一区二区三区| 免费在线观看完整版高清| 精品人妻熟女毛片av久久网站| 99国产精品免费福利视频| 91成年电影在线观看| 男女免费视频国产| 一夜夜www| 久久这里只有精品19| 色综合欧美亚洲国产小说| 男男h啪啪无遮挡| 一边摸一边做爽爽视频免费| 日韩成人在线观看一区二区三区| 亚洲欧美色中文字幕在线| 宅男免费午夜| 视频区欧美日本亚洲| 久久精品成人免费网站| 欧美中文综合在线视频| 色综合婷婷激情| 成人特级黄色片久久久久久久 | 亚洲精品国产区一区二| 美女午夜性视频免费| 成在线人永久免费视频| 欧美人与性动交α欧美精品济南到| 中文字幕最新亚洲高清| 日韩免费高清中文字幕av| 不卡av一区二区三区| 欧美精品啪啪一区二区三区| 美女国产高潮福利片在线看| 激情视频va一区二区三区| 久久人人97超碰香蕉20202| 99精品欧美一区二区三区四区| 男女下面插进去视频免费观看| 亚洲精华国产精华精| 日本av免费视频播放| 成年女人毛片免费观看观看9 | 99国产极品粉嫩在线观看| 成年人免费黄色播放视频| 欧美人与性动交α欧美精品济南到| 亚洲精品av麻豆狂野| 精品国产超薄肉色丝袜足j| 女人高潮潮喷娇喘18禁视频| 国产一区二区三区在线臀色熟女 | 悠悠久久av| 国产精品久久久人人做人人爽| 日韩人妻精品一区2区三区| 精品欧美一区二区三区在线| 国产精品久久久久成人av| 欧美精品高潮呻吟av久久| 久久精品aⅴ一区二区三区四区| 99re6热这里在线精品视频| 免费看十八禁软件| 91大片在线观看| 国产精品秋霞免费鲁丝片| 丝袜美足系列| 欧美日韩精品网址| 涩涩av久久男人的天堂| 黄色视频,在线免费观看| 91国产中文字幕| 免费av中文字幕在线| 色婷婷久久久亚洲欧美| 女人高潮潮喷娇喘18禁视频| 亚洲人成77777在线视频| 波多野结衣一区麻豆| 国产一区二区 视频在线| 成人特级黄色片久久久久久久 | 亚洲成人免费av在线播放| 精品少妇黑人巨大在线播放| 老鸭窝网址在线观看| 久久久久久亚洲精品国产蜜桃av| 黑人欧美特级aaaaaa片| 9热在线视频观看99| 涩涩av久久男人的天堂| 国产在线视频一区二区| 视频在线观看一区二区三区| 精品欧美一区二区三区在线| 亚洲成人手机| 婷婷成人精品国产| 热99久久久久精品小说推荐| 国产有黄有色有爽视频| 久久午夜亚洲精品久久| 在线播放国产精品三级| 国产精品熟女久久久久浪| 自线自在国产av| 99re6热这里在线精品视频| 99riav亚洲国产免费| 亚洲免费av在线视频| 欧美乱码精品一区二区三区| 精品亚洲乱码少妇综合久久| 日韩欧美免费精品| 精品午夜福利视频在线观看一区 | 热re99久久精品国产66热6| av视频免费观看在线观看| 高清毛片免费观看视频网站 | 精品一区二区三区av网在线观看 | 天堂动漫精品| 国产熟女午夜一区二区三区| 热re99久久国产66热| 亚洲成人免费av在线播放| 叶爱在线成人免费视频播放| 精品国产乱码久久久久久小说| 大片免费播放器 马上看| 国产一区有黄有色的免费视频| 精品福利永久在线观看| 国产精品一区二区在线不卡| 麻豆乱淫一区二区| 热99久久久久精品小说推荐| 99国产精品一区二区蜜桃av | 久久精品91无色码中文字幕| 91大片在线观看| 男人舔女人的私密视频| 亚洲av第一区精品v没综合| 欧美国产精品一级二级三级| 黄色成人免费大全| 国产精品麻豆人妻色哟哟久久| 狠狠婷婷综合久久久久久88av| 成人国语在线视频| 无限看片的www在线观看| 久久精品熟女亚洲av麻豆精品| 欧美激情高清一区二区三区| 桃花免费在线播放| 麻豆成人av在线观看| 女人久久www免费人成看片| 在线av久久热| 少妇 在线观看| 考比视频在线观看| 久久久久国内视频| 青青草视频在线视频观看| 悠悠久久av| 99re6热这里在线精品视频| 国产黄频视频在线观看| 日日摸夜夜添夜夜添小说| 韩国精品一区二区三区| 精品国产一区二区三区久久久樱花| 一级片'在线观看视频| 日韩中文字幕欧美一区二区| 日韩精品免费视频一区二区三区| 99国产精品一区二区蜜桃av | 18禁黄网站禁片午夜丰满| 一本综合久久免费| 人妻 亚洲 视频| 别揉我奶头~嗯~啊~动态视频| 黑人操中国人逼视频| 99re在线观看精品视频| 亚洲av第一区精品v没综合| 亚洲综合色网址| 高清欧美精品videossex| 欧美在线黄色| 亚洲精品自拍成人| 淫妇啪啪啪对白视频| 乱人伦中国视频| 精品国产乱码久久久久久男人| 亚洲精品国产一区二区精华液| 久久精品亚洲精品国产色婷小说| 亚洲少妇的诱惑av| 久久中文字幕一级| 18禁黄网站禁片午夜丰满| 亚洲色图综合在线观看| 三上悠亚av全集在线观看| 国产成人精品在线电影| 女人精品久久久久毛片| 亚洲va日本ⅴa欧美va伊人久久| 国产欧美日韩一区二区三| 色婷婷av一区二区三区视频| 国产精品98久久久久久宅男小说| 国产免费现黄频在线看| av一本久久久久| 美女视频免费永久观看网站| 国产精品九九99| 桃花免费在线播放| a级毛片黄视频| 他把我摸到了高潮在线观看 | 黄色视频在线播放观看不卡| 欧美激情极品国产一区二区三区| 亚洲国产欧美在线一区| 妹子高潮喷水视频| 亚洲视频免费观看视频| 中文欧美无线码| 国产在视频线精品| 久久av网站| 亚洲第一欧美日韩一区二区三区 | 国产91精品成人一区二区三区 | 久久人妻熟女aⅴ| 自拍欧美九色日韩亚洲蝌蚪91| 99国产精品一区二区三区| 一区福利在线观看| 大香蕉久久成人网| 国产成人精品久久二区二区免费| 日韩欧美一区视频在线观看| 三级毛片av免费| 少妇 在线观看| 国产av精品麻豆| 伦理电影免费视频| 中文字幕制服av| 在线看a的网站| 怎么达到女性高潮| 欧美av亚洲av综合av国产av| 一级,二级,三级黄色视频| 天天躁夜夜躁狠狠躁躁| 国产成人精品在线电影| 国产aⅴ精品一区二区三区波| 嫩草影视91久久| 久久久久久久久久久久大奶| 窝窝影院91人妻| 国产在线观看jvid| 99热国产这里只有精品6| 手机成人av网站| 久久久国产精品麻豆| 成人18禁高潮啪啪吃奶动态图| videos熟女内射| 99香蕉大伊视频| 国产精品1区2区在线观看. | 超碰97精品在线观看| 人成视频在线观看免费观看| 亚洲国产欧美网| 国产真人三级小视频在线观看| 欧美精品一区二区免费开放| 一区二区三区乱码不卡18| 亚洲视频免费观看视频| aaaaa片日本免费| 亚洲精品成人av观看孕妇| 精品久久久久久久毛片微露脸| 一级毛片电影观看| 狠狠精品人妻久久久久久综合| 欧美精品人与动牲交sv欧美| 一级毛片精品| 久久精品国产亚洲av香蕉五月 | 国产精品美女特级片免费视频播放器 | www.自偷自拍.com| 欧美精品一区二区大全| 国产av国产精品国产| 啦啦啦免费观看视频1| 久久午夜亚洲精品久久| 国产精品久久久久成人av| 深夜精品福利| 精品久久蜜臀av无| 欧美亚洲日本最大视频资源| 中文字幕另类日韩欧美亚洲嫩草| 久久影院123| 一个人免费看片子| 久久九九热精品免费| 不卡av一区二区三区| www.999成人在线观看| 大码成人一级视频| 欧美亚洲日本最大视频资源| 91av网站免费观看| 黄色a级毛片大全视频| 欧美在线黄色| 操出白浆在线播放| 777久久人妻少妇嫩草av网站| av福利片在线| 亚洲欧洲日产国产| 999久久久国产精品视频| 国产精品 国内视频| 亚洲专区字幕在线| 日韩三级视频一区二区三区| 制服人妻中文乱码| 国产淫语在线视频| 一本色道久久久久久精品综合| 91字幕亚洲| 一区在线观看完整版| 国产精品1区2区在线观看. | 黄片播放在线免费| 99re在线观看精品视频| 两个人免费观看高清视频| 日韩有码中文字幕| 国产亚洲av高清不卡| 中文字幕另类日韩欧美亚洲嫩草| 黄片播放在线免费| 亚洲av美国av| 欧美日韩亚洲国产一区二区在线观看 | 久久av网站| 久久久久视频综合| 黑人巨大精品欧美一区二区蜜桃| 麻豆av在线久日| 国产精品国产高清国产av | 欧美精品人与动牲交sv欧美| 中文字幕精品免费在线观看视频| 成年人免费黄色播放视频| 亚洲欧洲精品一区二区精品久久久| 韩国精品一区二区三区| 制服诱惑二区| 亚洲三区欧美一区| 久久久久久久精品吃奶| 啦啦啦中文免费视频观看日本| 热99久久久久精品小说推荐| 久久午夜综合久久蜜桃| 人人妻人人爽人人添夜夜欢视频| 国产成人av激情在线播放| 蜜桃在线观看..| 久久人人爽av亚洲精品天堂| 亚洲国产看品久久| www.精华液| 精品国产一区二区三区四区第35| 国产精品偷伦视频观看了| 精品国产亚洲在线| 亚洲av电影在线进入| 日韩免费高清中文字幕av| 国产av精品麻豆| 脱女人内裤的视频| 国产精品久久久人人做人人爽| 亚洲一码二码三码区别大吗| 99国产精品一区二区三区| 亚洲视频免费观看视频| 黑人猛操日本美女一级片| 少妇精品久久久久久久| 久久精品亚洲av国产电影网| 五月天丁香电影| 在线天堂中文资源库| 欧美乱码精品一区二区三区| 精品久久久久久久毛片微露脸| 啦啦啦视频在线资源免费观看| 啦啦啦 在线观看视频| 91精品国产国语对白视频| 精品久久久久久久毛片微露脸| 香蕉久久夜色| 国产成人精品无人区| 岛国在线观看网站| av超薄肉色丝袜交足视频| 日韩一区二区三区影片| 精品福利永久在线观看| 麻豆成人av在线观看| 日韩大码丰满熟妇| 老汉色∧v一级毛片| 视频在线观看一区二区三区| 精品一区二区三区视频在线观看免费 | 亚洲精品国产一区二区精华液| 国产91精品成人一区二区三区 | 国产精品二区激情视频| 搡老乐熟女国产| 久久精品人人爽人人爽视色| 天堂8中文在线网| 亚洲精品粉嫩美女一区| 丰满少妇做爰视频| 一级片免费观看大全| 欧美人与性动交α欧美软件| 国产精品久久久久久人妻精品电影 | 蜜桃国产av成人99| 99久久国产精品久久久| 欧美精品高潮呻吟av久久| av一本久久久久| 国产欧美日韩精品亚洲av| 精品第一国产精品| videosex国产| 香蕉久久夜色| 成人亚洲精品一区在线观看| 午夜福利视频精品| 亚洲av电影在线进入| 黄色视频在线播放观看不卡| 嫁个100分男人电影在线观看| 丝袜在线中文字幕| 操美女的视频在线观看| 丁香欧美五月| 欧美大码av| 欧美日韩中文字幕国产精品一区二区三区 | 自拍欧美九色日韩亚洲蝌蚪91| 日韩欧美一区视频在线观看| 黑人欧美特级aaaaaa片| 老司机影院毛片| 免费在线观看视频国产中文字幕亚洲| 国产免费福利视频在线观看| 国产亚洲av高清不卡| 午夜老司机福利片| 日韩制服丝袜自拍偷拍| 午夜老司机福利片| 亚洲专区中文字幕在线| 国产麻豆69| 久久国产精品男人的天堂亚洲| 精品第一国产精品| 国产精品av久久久久免费| 免费日韩欧美在线观看| 久久久久久久久久久久大奶| 水蜜桃什么品种好| 后天国语完整版免费观看| 精品人妻1区二区| 国产成人啪精品午夜网站| 成年动漫av网址|