• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    SEM-Based Method for Performance Evaluation of Wired LANs

    2018-07-11 02:57:14QiXiaogangXuChunxiaLiuLifang

    Qi Xiaogang,Xu Chunxia,Liu Lifang

    1.School of Mathematics and Statistics,Xidian University,Xi’an,Shaanxi 710071,P.R.China;

    2.School of Computer Science and Technology,Xidian University,Xi’an,Shaanxi 710071,P.R.China

    Abstract:For wired local area networks(LANs),their effectiveness and invulnerability are very critical.It is extraordinarily significant to evaluate the network performance effectively in the design of a reasonable network topology and the performance improvement of the networks.However,there are many factors affecting the performance of the networks,and the relation among them is also complicated.How to evaluate the performance of the wired LANs more accurately has been a heavy challenge in the network research.In order to solve the problem,this paper presents a performance evaluation method that evaluates the effectiveness and invulnerability of the wired LANs.Compared to traditional statistical methods,it has the distinct advantage of being able to handle several dependent variables simultaneously and tolerates the measurement errors among these independent variables and dependent variables.Finally,the rationality and validity of this method are verified by the extensive experimental simulation.

    Key words:wired local area networks(LANs);structural equation model(SEM);node contribution;performance prediction;network topology

    0 Introduction

    Wired local area networks(LANs)can achieve the information transmission functions among the computers connected by the physical lines in reachable range.Wired LANs have many advantages in transmission rate,reliability and security over wireless LANs(WLANs)[1],which make it have wide application prospect in the future.Wired LANs can be applied in many fields,such as bank,military and company.How to effectively and reasonably evaluate the performance of wired LANs has been one of the important issues in this field.Network performance evaluation achieves three purposes[2]:The first one is to choose the most suitable and satisfactory one from the numerous schemes;the second one is to improve its defects and bottlenecks of the existing scheme;the third one is to predict the performance of the candidate system upon the reasonable configuration.So it is necessary to choose the appropriate indexes and establish the appropriate evaluation model for network performance evaluation.Zhang et al.[3]proposed an approach,which uses multiple indicators to evaluate the performance of the whole network.The method can compare the performance of different networks at different time,but the method for determining the weight of index was not mentioned in this paper.Mao et al.[4]proposed a method for determining the weight of index by employing fuzzy analytic hierarchy process,but the method is subjective and the evaluation process is complicated.Method based on historical data was proposed to determine the weight of index by Nan et al.[5].Network performance can be evaluated according to the health value of the network equipment.The above methods are all to evaluate the overall network performance.We need to focus more on some aspect of the network performance in some cases.Structural equation model(SEM)is a new type of multivariate statistical analysis method,which can analyze the relationship among dependent variables based on the large sample data.All kinds of network performances can be analyzed,such as invulnerability,effectiveness,survivability,safety and so on,as long as we get observable indicators.

    There are three main topologies of wired LANs:ring network,star network and tree network.They are the basis of other complex topologies.So this paper uses SEM to evaluate effectiveness and invulnerability of the three networks.Effectiveness measures network performance in terms of dynamic network transmission ability,and invulnerability measures network performance in terms of static network topology.Firstly,it is necessary to calculate effectiveness and invulnerability of the entire network,and then,the contribution of the forwarding nodes to the entire network is calculated by deleting nodes or attacking links randomly.Next,according to the contribution of these nodes to the entire network in the effectiveness and invulnerability,the importance of these nodes can be judged comprehensively.Finally,the different monitoring and protection measures can be taken according to the importance of nodes.It can reduce the probability of network failure on the basis of the realization of network functions,and then reduce the cost of the entire network.

    The research of this paper can be applied in many fields.The contribution of each type of weapon can be calculated in the military system network[6].We can choose proper kind and the number of weapons according to the combat environment,and the probability of winning a combat increases.When failure occurs in a network,nodes can be inspected according to the contribution of each node,and the bottleneck of the whole network can be predicted.We can employ an improved routing algorithm to reduce congestion when the network bottlenecks emerge.In addition,this method can be used in the traffic safety evaluation[7]and power network.

    1 Basic Principle of SEM

    SEM is a statistical method that can analyze the relationship among variables based on the covariance matrix or correlation matrix of the variables.This method is originated from the path analysis,which was proposed by the geneticist Eswall Wright in the 1920s.It was originally used in psychology and sociology in the 1970s.It has become a new development direction in statistical analysis methods and been widely used in psychology,economics,sociology,military science[8]and other research fields.The basic idea is to find the correlation matrix(covariance matrix)of the model that has the smallest distance with the correlation matrix(covariance matrix)of the samples in all reasonable hypothesis models.First of all,we need to determine whether the model is identifiable after constructing SEM.Maximum likelihood function is the most commonly used fitting function in the model fitting.In the model assessment,we first need to examine whether the estimated parameters are appropriate.Secondly,the commonly used fitting indexes have to be examined to judge whether the model fitting degree can meet the requirements.The model modification will be necessary if there is an inappropriate value.In addition,choosing the proper samples also have an impact on the model evaluation to some extent.

    There are four types of variables in SEM,including endogenous observable variables,endogenous latent variables,exogenous observable variables and exogenous latent variables[9].Endogenous variables are affected by other variables and exogenous variables can affect other variables.In other words,exogenous variables affect endogenous variables.Observable variables can be directly measured,such as the score of a subject,latent variables cannot be accurately and directly measured,such as intelligence,learning ability,family background and so on.There can be multiple latent variables in SEM.If there is no causal relationship among latent variables,endogenous latent variables are not included in the model.

    Full model of SEM is divided into measurement model and structural model.The measurement model is used to study the relationship between observable variables and latent variables.The measurement equation is given as follows[10]

    where x is the vector of the exogenous observable variables;y is the vector of the endogenous observable variables;Λxis the factor loading matrix of exogenous observable variables on exogenous latent variables;Λyis the factor loading matrix of endogenous observable variables on endogenous latent variables;ηis the vector of the endogenous latent variables;ξis the vector of the exogenous latent variables;δis the error term of the exogenous observable variable x;εis the error term of the endogenous observable variable y.

    Structural model is used to study the relationship among latent variables.The endogenous latent variables can be affected by the endogenous latent variables and the exogenous latent variables.So the structural equation can be shown as[10]

    whereΒrepresents the relationship among endogenous latent variables;Γrepresents the effect of the exogenous latent variables on the endogenous latent variables;ζis the residual term of the equation.It represents the part ofηthat is not explained by the equation.

    In order to get unbiased estimators of the parameter,Eqs.(1)—(3)satisfy the following conditions[10]:

    (1)E(δ)=0,E(ε)=0,E(ζ)=0;

    (2)There is no relationship between the error termsε,δand the latent variablesη,ξ;

    (3)There is no relationship betweenεandδ;

    (4)There is no relationship between the residual termζand termsξ,δ,ε.

    At present,SEM can be analyzed by software.LISREL is one of the earliest and popular softwares.Currently,many other software products like EQS,AMOS and Mplus are also commonly used.

    2 Selection of Evaluation Index

    The most important principle of the index selection is testability[11].The evaluation indexes need to be measured by simulation software.Next,the selected indexes can reflect the measured performance as much as possible.Finally,the selected indexes need to be tested by SEM.This paper evaluates the network performance in term of effectiveness and invulnerability.The corresponding evaluation indexes are described below.

    2.1 Effectiveness evaluation index

    Effectiveness indicates that how well the network meets business performance requirements under certain conditions[11].It is an important measure of network utilization efficiency.The research of the network aims to study the ultimate availability of the network.That is called effectiveness.At last,total delay,throughput,and packet loss rate are selected as the evaluation indexes of effectiveness in this paper according to the fitting indexes of the model.

    Total delay is divided into transmission delay,propagation delay and queuing delay.The total delay T_Delay is given by Eq.(4).

    where Delay_1 is the transmission delay,which deals with the time of data packets reaching the link from the sending node.It is given by Eq.(5).

    where Packet_Length is the total length of the data packets that are sent,and Send_Rate is the transmission rate.Delay_2 is the propagation delay,which is the time required to receive from the first packet to the last.It depends on the length of the link and the transmission medium;Delay_3 is the queuing delay,which is the time between the receipt of packets and the transmission of packets.It depends on the queue length and scheduling policy.

    Throughput is the number of packets re-ceived and transmitted by two nodes in the network per unit time.The throughput T_put is implemented by Eq.(6).

    where Send is the number of packets transmitted per unit time;Receive is the number of packets received per unit time.

    Packet loss rate is the probability of data packet losses when packets are sent between the sending node and the receiving node.The packet loss rate L_R is implemented by Eq.(7).

    2.2 Invulnerability evaluation index

    Invulnerability describes the reliability of the network under a certain strategy of attack[12].We select nodes attacking and links attacking as the attack strategy.The nodes attacking is to remove some nodes in the network randomly and the links attacking is to attack some links in the network randomly.At last,average degree[13]and average clustering coefficient[14]are selected as the evaluation indexes of invulnerability in this paper according to the fitting indexes of the model.

    Complex networks can be represented by unweighted diagram G=(V,E),where V represents the node set;E represents the edge set.Let M=,the average degree DG is implemented by Eq.(8).

    where d(i)is the degree of node i.

    The average clustering coefficient CC is implemented by Eq.(9).

    where node i and its neighboring nodes form a cluster;Eirepresents the number of edges in the cluster.

    3 Modeling and Evaluation of Wired LANs Performance

    According to the evaluation indexes of network performance and the principle of SEM,the evaluation model is established as shown in Fig.1,and Table 1 is the corresponding variable table.There are five exogenous observable variables,two exogenous latent variables and eleven variables that need to be estimated.According to t-rule,we have t=11<p*(p+1)/2=15,so the SEM can be identified.

    Fig.1 SEM of network performance evaluation

    Table 1 Variable table of SEM

    In this paper,the effectiveness and invulnerability are selected as two exogenous latent variables because there is no obvious causal relationship between them.The relevant contribution indexes are served as the exogenous observable variables.The mathematical model between exogenous latent variables and exogenous observable variables is constructed by the contribution coefficientλand the deviation of contributionδ.Such as effectivenessξ1is represented by the throughput x1,the contribution coefficientλ11and the deviation of the contributionδ1.It also can be expressed by the total delay x2,the contribution coefficientλ21and the deviation of the contribution δ2.It can still be expressed by the packet loss rate x3,the contribution coefficientλ31and the deviation of the contributionδ3.Similarly,invulnerabilityξ2is represented by the average degree x4,the contribution coefficientλ42and the deviation of the contributionδ4.It also can be expressed by the average clustering coefficient x5,the contribution coefficientλ52and the deviation of the contributionδ5.In addition,the relationship between the exogenous latent variables in Fig.1 is rather complicated,so this paper does not focus on it.We need maximum likelihood function FML=tr(ΣΣ-1(θ))+to estimate these key parameters,whereΣ(θ)is the covariance matrix of the model;Σis the covariance matrix of the samples;p is the order of the covariance matrix.The estimated value^θcan minimize FML,which is necessary for parameter estimation.

    Measurement equation of the model is given by Eq.(10).

    Based on equivalent transformation of the equations,the quantitative relationship model between effectiveness,invulnerability and contribution indicators is shown by Eqs.(11),(12).

    In this way,if observable variables x1—x5can be obtained easily,the values ofξ1andξ2can be calculated.The effectiveness and invulnerability of the network are divided into “very good”“better”“medium”“worse”,and“very bad”.The corresponding evaluation intervals are(0.85,1],(0.6,0.85],(0.40,0.60],(0.15,0.40]and(0,0.15].

    The contribution of all the forwarding nodes to the network in terms of effectiveness and invulnerability can be calculated by deleting nodes.Meanwhile,the contribution of effectiveness and invulnerability can be sequenced.

    4 Simulation

    In order to make the evaluation data close to the real network,the network simulation software OPNET14.5 is used to build network topology and get simulation data[15-17].The topology diagram of the networks is shown in Fig.2.This experiment selects a generalized network with 100 nodes.Other networks consist of 50 nodes.

    Fig.2 Topology diagram of the networks

    The generalized network is used to obtain parameters in the model and other networks are used to verify the rationality of the model by comparing the simulation data.The nodes in the network can be divided into leaf nodes and forwarding nodes.The leaf nodes have the function of sending and receiving data packets and the forwarding nodes have the function of forwarding packets.The thick solid lines of connected nodes in Fig.2 represent the links among the nodes.The address of the next hop is determined by setting a routing table in the forwarding node.This article sets up 14 leaf nodes and every two leaf nodes compose one link.The matching table is shown in Table 2.

    Table 2 Communication relationship of leaf nodes

    Input the example of performance evaluation of SEM into LISREL8.70,in which the maximum likelihood estimation method is used to estimate the parameters.The estimated values and significance testing(t-test)values of 11 parameters are shown in Table 3.The values of the main fitting index are shown in Table 4.

    From Tables 3,4,we can see that parameter estimation based on SEM is reasonable.The values of the main fitting index must be verified in SEM.The fitting of the model is good when RMSEA is less than 0.05[18].When the values of NFI,NNFI and CFI are all greater than 0.9[19-20],it means that the model is acceptable.Therefore,the SEM in this paper is a suitable model.According to the estimated values of parameters,the quantitative relationship between effectiveness,invulnerability and the contribution index can be shown as

    Table 3 Estimated values and t-test values of SEM

    Table 4 Values of the main fitting index

    After the model is constructed,it is necessary to analyze the relationship between the sending rate and effectiveness.The relationship between the sending rate and effectiveness is shown in Fig.3.From it,we can know that the effectiveness increases with the increasing of sending rate at first.While,the effectiveness of all networks suffers a drop through to various degree when the sending rate is more than 100.And the effectiveness of star network decreases most greatly with the increase of the sending rate.Besides,effectiveness can be predicted according to the sending rate with in proper range.

    Fig.3 Relationship between the sending rate and effectiveness(normalized values)

    In order to analyze the main affecting factors of the effectiveness,the relationship between the affecting factors and effectiveness will be discussed in Figs.4—6.

    From Fig.4,we can see that the effectiveness increases with the throughput.The throughput of the ring network is the largest if the effec-tiveness is the same,while the throughput of the star network is the smallest.

    Fig.4 Relationship between the throughput and effectiveness(normalized values)

    Fig.5 Relationship between the total delay and effectiveness(normalized values)

    Fig.6 Relationship between the packet loss rate and effectiveness(normalized values)

    From Fig.5,we can see that the effectiveness decreases with the total delay.The total delay of the star network is the largest if the effectiveness is the same,while total delay of the ring network is the smallest.

    From Fig.6,we can know that the effectiveness decreases with the packet loss rate.The packet loss rate of the star network is the largest if the effectiveness is the same,while the packet loss rate of the ring network is the smallest.

    Overall,the result of evaluation is similar to actual circumstance.The star network only has one forwarding node,so it is easy to congest especially when the sending rate becomes large.For ring network,a forwarding node only affects a link,so packets can be transmitted normally in general.

    To detect the invulnerability of the different networks,we remove some nodes or attack some links randomly.The relationship between the number of the deleted nodes and invulnerability is shown in Fig.7 and the relationship between the number of the failure links and invulnerability is shown in Fig.8.

    Fig.7 Relationship between the number of deleted nodes and invulnerability(normalized values)

    Fig.8 Relationship between the number of failure links and invulnerability(normalized values)

    From Figs.7,8,we can conclude that the invulnerability of the general network is higher than other networks mainly because the average clustering coefficient of other networks equals to 0.In the general network,there are some points whose invulnerability change is acute,that is mainly because deleting these nodes has large impact on the average degree and the average clustering coefficient.In other networks,however,the invulnerability decreases with the increase of the number of the deleted nodes.The reason is that the invulnerability of those networks all depends on the average degree.And the more nodes are deleted,the faster the average degree decreases.From Fig.8,we can know that the invulnerability of star network,ring network and tree network is the same mainly because the degree of those net-works decreases by 2 when a link gets some faults.

    We calculate the contribution of all the forwarding nodes to the entire network in terms of effectiveness and invulnerability when the sending rate is set as 5.For star network,unique forwarding node has an important role in transmitting data packets.The whole network will break down if the forwarding node malfunctions.For ring network,the contribution of all the forwarding nodes in invulnerability is the same.The removal of any forwarding node only affects the reception of data packets of one link,so the difference of the contribution in effectiveness among all the forwarding nodes is very small.For tree network,the contribution of the top six nodes to the entire network in terms of effectiveness and invulnerability is shown in Tables 5,6.

    Table 5 Node contribution of tree network in effectiveness

    Table 6 Node contribution of tree network in invulnerability

    From Table 5,we can know that Node 15 has the greatest contribution in effectiveness.The deletion of the Node 15 will affect the reception of data packets of six links.The deletion of the Node 16 will affect the reception of data packets of five links.The deletion of the Node 14 and Node 17 will affect the reception of data packets of four links.The reception of data packets of two links will be affected when Node 22 and Node 24 are deleted.From Table 6,we can see that the contribution of all the forwarding nodes in invulnerability is the same.

    For generalized network,this paper lists the contribution of some nodes to the entire network in terms of effectiveness and invulnerability.Due to limited space,contribution of the top six nodes in effectiveness and invulnerability is shown in Tables 7,8.

    Table 7 Node contribution of generalized network in effectiveness

    Table 8 Node contribution of generalized network in invulnerability

    From Table 7,we can know that Node 19 has the greatest contribution in effectiveness.The deletion of the Node 19 will affect the reception of data packets of six links.Therefore,the Node 19 plays a crucial role in the entire network.The deletion of the Node 73 will affect the reception of data packets of three links.The reception of data packets of two links will be affected when Node 86,Node 43 and Node 87 are deleted.All these show that the more links affected by the deleted node are,the greater the contribution of the node becomes.

    It can be seen from Table 8 that the contribution of the forwarding nodes to the network is not particularly large in terms of invulnerability because the structural change of the entire network is not particularly large with removing a node.

    Some nodes do not play the role of forwarding data packets in the generalized network,so the contribution of effectiveness is zero.But whether these nodes can be removed depends on whether the invulnerability of the network will increase by deleting the corresponding node.The relationship between the contribution of nodes in invulnerability and the number of nodes are shown in Fig.9 when the contribution of these nodes in effectiveness is zero.

    Fig.9 Relationship between the contribution of nodes in invulnerability and the number of nodes

    It is known from the experiment and analysis that there are 51 nodes which have no contribution to the network in effectiveness.But there are 23 nodes(Fig.9(b))which reduce the invulnerability of the network after the deletion of those nodes.These results show that there are 28 nodes(Fig.9(a))which can be deleted in the general network designed in this paper.

    5 Conclusions

    The key of the network performance evaluation is to establish a quantitative relationship model between latent variables and observable variables,and the research on this issue relies heavily on the quality of the evaluation data.The latent variables selected in this paper have effectiveness and invulnerability.And then we need to determine observable variables according to latent variables.Due to the complexity of the network and the impact among contribution indexes,the existing methods of the network performance evaluation still lag behind the practical application.The work in this paper can only be regarded as a useful attempt to apply the SEM.It is also necessary to select the appropriate latent variable according to the actual network situation.Other latent variables can be added to evaluate the network performance.By this way,the network performance evaluation will be more realistic and reliable.

    Acknowledgements

    This work was supported by the National Natural Science Foundations of China(Nos.61572435,61472305,61473222),the Ningbo Natural Science Foundations(Nos.2016A610035,2017A610119),the Complex Electronic System Simulation Laboratory(No.DXZT-JC-ZZ-2015-015),and the Joint Fund of China State Shipbuilding Corporation(No.6141B03010103).

    香蕉丝袜av| 9色porny在线观看| 国产精品1区2区在线观看. | 欧美日韩黄片免| 亚洲第一av免费看| 少妇裸体淫交视频免费看高清 | 视频区欧美日本亚洲| 如日韩欧美国产精品一区二区三区| 午夜成年电影在线免费观看| 美女国产高潮福利片在线看| 日韩欧美一区视频在线观看| 最近最新中文字幕大全免费视频| 日本一区二区免费在线视频| 色播在线永久视频| 国产男靠女视频免费网站| 岛国毛片在线播放| 亚洲人成电影免费在线| 国精品久久久久久国模美| 午夜两性在线视频| 男女床上黄色一级片免费看| 欧美人与性动交α欧美精品济南到| 久久久久精品国产欧美久久久| 岛国在线观看网站| av视频免费观看在线观看| 中文字幕另类日韩欧美亚洲嫩草| 日韩中文字幕视频在线看片| 国产精品久久久久久精品电影小说| 欧美av亚洲av综合av国产av| 高清黄色对白视频在线免费看| 在线av久久热| 国产成+人综合+亚洲专区| 国产在线一区二区三区精| av有码第一页| 两人在一起打扑克的视频| 少妇猛男粗大的猛烈进出视频| 黄色 视频免费看| 亚洲男人天堂网一区| 亚洲av国产av综合av卡| 制服人妻中文乱码| 动漫黄色视频在线观看| 亚洲熟妇熟女久久| 三级毛片av免费| 黄色毛片三级朝国网站| 男女午夜视频在线观看| 满18在线观看网站| 国产亚洲欧美精品永久| 又紧又爽又黄一区二区| 人人妻人人爽人人添夜夜欢视频| 日本一区二区免费在线视频| 午夜福利影视在线免费观看| 免费少妇av软件| 肉色欧美久久久久久久蜜桃| 中文字幕人妻熟女乱码| av一本久久久久| 国产精品99久久99久久久不卡| 国产成人免费无遮挡视频| 丝袜美足系列| 久热爱精品视频在线9| 在线观看人妻少妇| 99在线人妻在线中文字幕 | 少妇精品久久久久久久| 动漫黄色视频在线观看| 亚洲熟女毛片儿| 国产精品久久久久久精品电影小说| www日本在线高清视频| 男男h啪啪无遮挡| 国产99久久九九免费精品| 国产人伦9x9x在线观看| 亚洲国产中文字幕在线视频| 久久久久视频综合| 在线av久久热| 十分钟在线观看高清视频www| 黄色片一级片一级黄色片| 欧美人与性动交α欧美精品济南到| 欧美乱妇无乱码| 成人黄色视频免费在线看| 一区二区三区精品91| 一边摸一边抽搐一进一小说 | 视频区欧美日本亚洲| 日本黄色日本黄色录像| 国产精品二区激情视频| 黄片小视频在线播放| 国产不卡av网站在线观看| 午夜福利乱码中文字幕| 国产不卡一卡二| 国产亚洲精品第一综合不卡| 极品少妇高潮喷水抽搐| 精品人妻1区二区| 亚洲伊人色综图| 精品亚洲乱码少妇综合久久| 亚洲专区中文字幕在线| 超碰97精品在线观看| 国产无遮挡羞羞视频在线观看| 亚洲熟女毛片儿| 久久久久久久国产电影| 在线观看一区二区三区激情| 国产av一区二区精品久久| 国产欧美日韩精品亚洲av| 欧美日韩中文字幕国产精品一区二区三区 | 亚洲精品一卡2卡三卡4卡5卡| 久久毛片免费看一区二区三区| 久久久久国内视频| 成人精品一区二区免费| 久久狼人影院| 麻豆av在线久日| 国产人伦9x9x在线观看| 国产在线一区二区三区精| 免费观看人在逋| 亚洲avbb在线观看| 久久久久久免费高清国产稀缺| 亚洲成av片中文字幕在线观看| 日韩人妻精品一区2区三区| 人人妻人人澡人人看| 亚洲av成人一区二区三| 久久久精品区二区三区| 精品人妻熟女毛片av久久网站| 免费观看a级毛片全部| 大片免费播放器 马上看| 精品亚洲成a人片在线观看| 亚洲av第一区精品v没综合| 国产精品欧美亚洲77777| 黄网站色视频无遮挡免费观看| 欧美日本中文国产一区发布| 一本色道久久久久久精品综合| 国产精品国产高清国产av | 桃红色精品国产亚洲av| 亚洲欧美一区二区三区久久| 国产av一区二区精品久久| 久久九九热精品免费| 国产精品电影一区二区三区 | 久久中文字幕一级| www.熟女人妻精品国产| 日韩免费av在线播放| 久久国产精品大桥未久av| 精品欧美一区二区三区在线| 999精品在线视频| 国产免费现黄频在线看| 午夜成年电影在线免费观看| 一本久久精品| 无限看片的www在线观看| 自拍欧美九色日韩亚洲蝌蚪91| √禁漫天堂资源中文www| 欧美激情久久久久久爽电影 | 女人高潮潮喷娇喘18禁视频| 亚洲精品自拍成人| 久久 成人 亚洲| 欧美精品高潮呻吟av久久| 最近最新免费中文字幕在线| 午夜日韩欧美国产| 热99久久久久精品小说推荐| e午夜精品久久久久久久| 下体分泌物呈黄色| 国产精品一区二区在线观看99| 久久久久视频综合| 成人特级黄色片久久久久久久 | 我的亚洲天堂| 日韩视频在线欧美| 国产极品粉嫩免费观看在线| 水蜜桃什么品种好| 十八禁网站免费在线| 汤姆久久久久久久影院中文字幕| 国产精品亚洲av一区麻豆| 在线观看免费高清a一片| 一二三四在线观看免费中文在| 欧美激情 高清一区二区三区| 精品久久久久久久毛片微露脸| 大片电影免费在线观看免费| 纯流量卡能插随身wifi吗| 久久中文字幕人妻熟女| 黄色丝袜av网址大全| 日韩免费av在线播放| 精品免费久久久久久久清纯 | 亚洲熟女毛片儿| 人人妻人人澡人人爽人人夜夜| 大片电影免费在线观看免费| 嫩草影视91久久| 大型av网站在线播放| 国产在线精品亚洲第一网站| 精品国产一区二区三区四区第35| 99久久国产精品久久久| 亚洲熟女毛片儿| 亚洲人成77777在线视频| 美女扒开内裤让男人捅视频| 免费在线观看影片大全网站| 国产精品久久久久久人妻精品电影 | 亚洲av成人不卡在线观看播放网| 欧美精品一区二区大全| 国产成人精品久久二区二区免费| 国产不卡av网站在线观看| 国产成人av教育| 一边摸一边抽搐一进一出视频| 亚洲成av片中文字幕在线观看| 亚洲成a人片在线一区二区| 一级黄色大片毛片| 国产有黄有色有爽视频| 91大片在线观看| 日韩制服丝袜自拍偷拍| 亚洲国产欧美一区二区综合| 在线观看舔阴道视频| 久久久精品免费免费高清| 亚洲色图 男人天堂 中文字幕| 国产亚洲精品一区二区www | 欧美日韩一级在线毛片| 国产亚洲av高清不卡| 人人妻人人澡人人爽人人夜夜| 午夜成年电影在线免费观看| 十八禁高潮呻吟视频| 视频在线观看一区二区三区| 午夜日韩欧美国产| 少妇被粗大的猛进出69影院| 首页视频小说图片口味搜索| 男人舔女人的私密视频| 一区二区三区精品91| 欧美人与性动交α欧美软件| 成人免费观看视频高清| 天堂8中文在线网| 一个人免费看片子| 国产成人一区二区三区免费视频网站| 久久久精品区二区三区| 欧美在线一区亚洲| 一本综合久久免费| 国产亚洲欧美在线一区二区| www.熟女人妻精品国产| 精品国产一区二区三区四区第35| av片东京热男人的天堂| 女人被躁到高潮嗷嗷叫费观| 一级,二级,三级黄色视频| netflix在线观看网站| 国产av一区二区精品久久| 亚洲人成伊人成综合网2020| 蜜桃国产av成人99| 最新的欧美精品一区二区| 一本久久精品| 露出奶头的视频| 制服人妻中文乱码| 一个人免费看片子| 日韩有码中文字幕| 久久婷婷成人综合色麻豆| 狠狠狠狠99中文字幕| 啦啦啦中文免费视频观看日本| 国产主播在线观看一区二区| 亚洲精品乱久久久久久| www.自偷自拍.com| 国产精品成人在线| av免费在线观看网站| 亚洲av电影在线进入| 国产精品一区二区在线不卡| 午夜福利乱码中文字幕| 亚洲成国产人片在线观看| 亚洲精品中文字幕在线视频| 又大又爽又粗| 国产精品久久久久久精品电影小说| videosex国产| 精品国内亚洲2022精品成人 | 91精品三级在线观看| av网站在线播放免费| 伊人久久大香线蕉亚洲五| 日韩大码丰满熟妇| av免费在线观看网站| 大陆偷拍与自拍| 久久热在线av| 欧美黑人精品巨大| 自拍欧美九色日韩亚洲蝌蚪91| 久久人人97超碰香蕉20202| 十八禁人妻一区二区| 亚洲va日本ⅴa欧美va伊人久久| 亚洲精品美女久久av网站| 午夜久久久在线观看| 免费看a级黄色片| 国产黄频视频在线观看| 精品少妇一区二区三区视频日本电影| 亚洲黑人精品在线| 免费在线观看视频国产中文字幕亚洲| 午夜福利在线免费观看网站| 在线观看免费高清a一片| 黄片小视频在线播放| 高清av免费在线| 97在线人人人人妻| 在线观看免费午夜福利视频| 在线观看www视频免费| cao死你这个sao货| 天天躁日日躁夜夜躁夜夜| 日韩三级视频一区二区三区| 日本av手机在线免费观看| 国产免费av片在线观看野外av| 狂野欧美激情性xxxx| 少妇粗大呻吟视频| 国产色视频综合| 亚洲欧美精品综合一区二区三区| 午夜福利免费观看在线| 久久 成人 亚洲| 久久av网站| 国产精品免费大片| 亚洲国产看品久久| 婷婷丁香在线五月| 国产精品久久久av美女十八| 国产区一区二久久| 精品亚洲成国产av| 亚洲伊人久久精品综合| 成人国产一区最新在线观看| 国产黄频视频在线观看| 在线观看www视频免费| av超薄肉色丝袜交足视频| 美女福利国产在线| 中文字幕制服av| 精品一区二区三区视频在线观看免费 | 精品国产一区二区三区四区第35| 国产黄色免费在线视频| 国产在线精品亚洲第一网站| 18禁观看日本| 满18在线观看网站| 久久人人爽av亚洲精品天堂| 丝瓜视频免费看黄片| 欧美激情高清一区二区三区| 久久久精品94久久精品| 老汉色∧v一级毛片| 大陆偷拍与自拍| 亚洲国产中文字幕在线视频| 日韩中文字幕欧美一区二区| 成年人免费黄色播放视频| av天堂久久9| 日韩视频在线欧美| 美女扒开内裤让男人捅视频| 精品国产一区二区三区四区第35| 老司机亚洲免费影院| 精品久久久久久久毛片微露脸| 日本av手机在线免费观看| 久久av网站| 国产高清国产精品国产三级| 美女午夜性视频免费| 菩萨蛮人人尽说江南好唐韦庄| 久久久久久久国产电影| 午夜老司机福利片| 亚洲伊人色综图| 18禁黄网站禁片午夜丰满| 欧美亚洲日本最大视频资源| 亚洲天堂av无毛| 超碰97精品在线观看| 777久久人妻少妇嫩草av网站| 天堂中文最新版在线下载| av电影中文网址| 成在线人永久免费视频| 久久精品国产综合久久久| 国产精品.久久久| 啦啦啦中文免费视频观看日本| 天堂动漫精品| 久久青草综合色| 午夜两性在线视频| 99riav亚洲国产免费| 又紧又爽又黄一区二区| 嫁个100分男人电影在线观看| 黑人巨大精品欧美一区二区mp4| 日韩人妻精品一区2区三区| 9热在线视频观看99| 欧美在线一区亚洲| 久久国产精品影院| 桃红色精品国产亚洲av| 亚洲精品中文字幕在线视频| 精品国产乱码久久久久久小说| 女人被躁到高潮嗷嗷叫费观| 国产一区二区三区综合在线观看| 国产精品电影一区二区三区 | 69精品国产乱码久久久| 999久久久国产精品视频| 欧美日韩福利视频一区二区| 日韩欧美国产一区二区入口| 亚洲成a人片在线一区二区| 极品少妇高潮喷水抽搐| 大码成人一级视频| h视频一区二区三区| www.精华液| 国产主播在线观看一区二区| 国产高清国产精品国产三级| www.999成人在线观看| 国产精品一区二区免费欧美| 欧美日本中文国产一区发布| 精品少妇内射三级| 肉色欧美久久久久久久蜜桃| 国产精品国产高清国产av | av一本久久久久| 国产不卡av网站在线观看| 国产高清国产精品国产三级| 91精品三级在线观看| 国产精品电影一区二区三区 | 久久这里只有精品19| 亚洲 国产 在线| 亚洲国产av影院在线观看| 日韩欧美国产一区二区入口| 国产成人免费观看mmmm| 国产成人系列免费观看| 亚洲国产中文字幕在线视频| 宅男免费午夜| 久久99热这里只频精品6学生| 亚洲精品粉嫩美女一区| 精品卡一卡二卡四卡免费| 国产av精品麻豆| 一本大道久久a久久精品| 一夜夜www| 美女国产高潮福利片在线看| 汤姆久久久久久久影院中文字幕| 飞空精品影院首页| 国产麻豆69| 丁香六月天网| 熟女少妇亚洲综合色aaa.| avwww免费| 久久久久精品国产欧美久久久| 欧美老熟妇乱子伦牲交| 免费在线观看日本一区| 日韩视频一区二区在线观看| 757午夜福利合集在线观看| 天天操日日干夜夜撸| 少妇 在线观看| 91国产中文字幕| 每晚都被弄得嗷嗷叫到高潮| 菩萨蛮人人尽说江南好唐韦庄| 亚洲美女黄片视频| 久久久国产一区二区| 80岁老熟妇乱子伦牲交| 精品国产乱子伦一区二区三区| 啦啦啦 在线观看视频| 国产成人精品久久二区二区免费| 国产免费福利视频在线观看| 一级黄色大片毛片| 麻豆国产av国片精品| 伊人久久大香线蕉亚洲五| 国产成人免费观看mmmm| 精品一区二区三卡| 搡老乐熟女国产| 日本黄色日本黄色录像| 欧美乱码精品一区二区三区| 国产不卡av网站在线观看| 侵犯人妻中文字幕一二三四区| 人人妻人人添人人爽欧美一区卜| 亚洲 国产 在线| 高清视频免费观看一区二区| av一本久久久久| 亚洲少妇的诱惑av| 亚洲精品乱久久久久久| 午夜福利视频在线观看免费| av又黄又爽大尺度在线免费看| 涩涩av久久男人的天堂| 国产欧美日韩综合在线一区二区| 国产野战对白在线观看| 亚洲综合色网址| 精品视频人人做人人爽| 久久人人爽av亚洲精品天堂| 成年人免费黄色播放视频| 精品国产乱子伦一区二区三区| 国产精品麻豆人妻色哟哟久久| 亚洲一区二区三区欧美精品| 久久99热这里只频精品6学生| 精品亚洲成a人片在线观看| 亚洲av欧美aⅴ国产| 日日爽夜夜爽网站| h视频一区二区三区| 女警被强在线播放| av免费在线观看网站| 午夜福利免费观看在线| 美女扒开内裤让男人捅视频| 丝瓜视频免费看黄片| 久久香蕉激情| 水蜜桃什么品种好| 国产在线视频一区二区| 老司机午夜十八禁免费视频| 欧美国产精品va在线观看不卡| 国产91精品成人一区二区三区 | 国产片内射在线| 日韩欧美国产一区二区入口| 久久99一区二区三区| 一级毛片精品| 亚洲成人国产一区在线观看| 国产精品秋霞免费鲁丝片| 国产亚洲精品一区二区www | 午夜福利欧美成人| 免费人妻精品一区二区三区视频| 高清欧美精品videossex| 18禁国产床啪视频网站| 777米奇影视久久| 我要看黄色一级片免费的| 日韩视频在线欧美| 丝袜人妻中文字幕| netflix在线观看网站| 久久久国产欧美日韩av| 免费女性裸体啪啪无遮挡网站| 欧美另类亚洲清纯唯美| 热re99久久精品国产66热6| 国内毛片毛片毛片毛片毛片| 色综合欧美亚洲国产小说| 水蜜桃什么品种好| 十八禁网站网址无遮挡| av又黄又爽大尺度在线免费看| 男人舔女人的私密视频| cao死你这个sao货| 色视频在线一区二区三区| 精品国产亚洲在线| 久久av网站| 久9热在线精品视频| 高潮久久久久久久久久久不卡| 日本黄色视频三级网站网址 | 欧美 亚洲 国产 日韩一| 久久久国产欧美日韩av| 国产精品二区激情视频| 一区二区av电影网| 黄色毛片三级朝国网站| 18禁观看日本| 免费高清在线观看日韩| 法律面前人人平等表现在哪些方面| 一区二区三区激情视频| 久久中文字幕人妻熟女| www.熟女人妻精品国产| 亚洲成人免费av在线播放| 国产精品偷伦视频观看了| 我要看黄色一级片免费的| 国产精品.久久久| 成人18禁高潮啪啪吃奶动态图| 亚洲成av片中文字幕在线观看| 欧美日韩国产mv在线观看视频| av网站免费在线观看视频| 国产一区二区三区视频了| 日韩大片免费观看网站| 宅男免费午夜| 久久国产亚洲av麻豆专区| 69av精品久久久久久 | 极品人妻少妇av视频| av视频免费观看在线观看| 黄色毛片三级朝国网站| 交换朋友夫妻互换小说| 午夜精品国产一区二区电影| 亚洲综合色网址| 欧美日本中文国产一区发布| 热99国产精品久久久久久7| 日本av免费视频播放| tube8黄色片| 青青草视频在线视频观看| 香蕉丝袜av| 日韩中文字幕欧美一区二区| 桃花免费在线播放| 18禁国产床啪视频网站| 国产在视频线精品| 欧美精品一区二区免费开放| 女人被躁到高潮嗷嗷叫费观| tocl精华| 老汉色∧v一级毛片| 91麻豆精品激情在线观看国产 | 精品国产乱子伦一区二区三区| 色94色欧美一区二区| 最近最新中文字幕大全电影3 | √禁漫天堂资源中文www| 久热这里只有精品99| 黑人猛操日本美女一级片| 国产精品久久久人人做人人爽| 男女高潮啪啪啪动态图| 1024香蕉在线观看| 一级毛片女人18水好多| 露出奶头的视频| 变态另类成人亚洲欧美熟女 | 成年动漫av网址| 午夜福利视频精品| 久久精品91无色码中文字幕| 国产日韩欧美亚洲二区| 国产在线精品亚洲第一网站| 国产伦人伦偷精品视频| 老汉色∧v一级毛片| 欧美另类亚洲清纯唯美| 成人亚洲精品一区在线观看| 亚洲三区欧美一区| 成人国语在线视频| 国产精品二区激情视频| 曰老女人黄片| 日本wwww免费看| 另类亚洲欧美激情| 欧美日韩国产mv在线观看视频| 久久精品亚洲av国产电影网| 在线观看一区二区三区激情| 精品国内亚洲2022精品成人 | 最黄视频免费看| 亚洲精品久久成人aⅴ小说| 王馨瑶露胸无遮挡在线观看| 18在线观看网站| 色在线成人网| 国产av国产精品国产| 1024视频免费在线观看| 亚洲美女黄片视频| 怎么达到女性高潮| 精品福利永久在线观看| 丝瓜视频免费看黄片| 久久国产精品人妻蜜桃| 51午夜福利影视在线观看| 女人被躁到高潮嗷嗷叫费观| av一本久久久久| 免费观看av网站的网址| 久久久久久人人人人人| 成人18禁在线播放| 99精国产麻豆久久婷婷| 国产一区二区三区视频了| 午夜久久久在线观看| 亚洲av电影在线进入| 丰满饥渴人妻一区二区三| 老司机午夜福利在线观看视频 | 久久人人爽av亚洲精品天堂| 国产成人精品久久二区二区91| 亚洲av成人不卡在线观看播放网| 最近最新中文字幕大全电影3 | av福利片在线| kizo精华| 一区二区三区乱码不卡18| 别揉我奶头~嗯~啊~动态视频| 国产av一区二区精品久久| 一本久久精品| 中文字幕人妻熟女乱码| 他把我摸到了高潮在线观看 | 成人手机av| 国产高清激情床上av| 久久精品亚洲精品国产色婷小说| 欧美人与性动交α欧美精品济南到|