• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Research on Software Structure Analysis Technology and Reliability Evaluation Method of Warship Equipment

    2018-11-15 08:07:58YANRanHANXinyuLIUBojiangTANGLongli

    YAN Ran( ), HAN Xinyu(), LIU Bojiang(), TANG Longli()

    China Shipbuilding Software Quality&Reliability Testing Center,Beijing100081,China

    Abstract:In view of the current reliability evaluation requirements of warship equipment based on component,this paper comprehensively considered the characteristics of components,and the component identification method,structural decomposition method,component architecture modeling method were studied for warship equipment software.Based on the characteristics of warship equipment component,this paper proposed a formal modeling language based on Petri nets to realize the modeling of component software architecture and laid a foundation for the reliability evaluation method research of warship equipment component.

    Key words:warship equipment component software;software architecture;component identification;component modeling;reliability evaluation

    Introduction

    The system of newly-developed type of warship weapons and equipment is highly complex. Its system functions are flexibly reorganized, the human-machine interface is highly unified, resources are reconfigured on-demand, information is acquired on demand, application functions are plug-and-play, and the system is flexibly reconfigured[1]. Obviously traditional software development methods do not meet the above requirements. Component-based application integration frameworks and SOA technologies mainly deal with network-based on distributed system computing and supporting network multimedia information sharing, and have become a new generation of ship equipment. The development trend and the key technology are widely used. At present, the integration platform, naval combat system integration framework (Fig. 1), shipboard aviation command and the fleet command system of complex software system, developed by component technology, have been applied on the version under development.

    Ship equipment component software is the system that assembled by components according to the principle of component software engineering[2]. In the software system composed of component software, each component performs a task relatively independently. Its internal structure is transparent to users. And finally the entire systems work together through various interfaces. When a part is no longer meets user’s needs, the relevant components without modifying other components can be upgraded and replaced.

    1 Component Identification Methods

    The component software, in short, is a system that is assembled from components according to the principle of component software engineering. In the software system, composed of components, each component performs a task independently. Its internal structure is transparent to users, and finally the various systems work together through various interfaces. Component can operate on different platforms, and are update conveniently, reuse frequently[3].

    The linker implements data transferring and control transferring functions, such as sequence, selection, loop, parallel, between components. Assembling system based on connecting linker method realizes separating the function of components and their interactions, and increase the configuration of component assembly. The method is currently one of the effective technical approaches to realize dynamic assembly of components. The components that can perform controlling and data transmission, interface adaptation and data conversion, access coordination and synchronization, and dynamic component connection, all be considered as a linker.

    Linker play an important role in architecture modeling. Since linker can function as a component to a certain degree,it can be divided into components in the modeling process.

    According to different information sources and different target components, component identification can be divided into forward identification and reverse identification. The former refers to starting from the demand model and identifying components from the software system, and then implementing the software components and constructing the software system. The latter refers to the reverse recovery from the software source code of the legacy system when the software system already exists, and identifies the source code level software components.

    According to the characteristics of the software system, the development technology and existing technical documents, the following 4 methods: functional decomposition division method,interface analysis division method, input domain division method and module encapsulation division method, will be used as rules for the division of the software system to identify component.

    1.1 Functional decomposition division method

    From the perspective of the application and realization of the ship information system, components can be divided into large-grained functional components and software components for implementation. Usually, the functional component can be divided according to the functional structure of the information system or the business process[4].

    Functional decomposition method can be used to identify components. The goal of this method is each function and the relationship between each major functional module.

    There are two ways to decompose components to identify components: identification strategy. The specific choice of which way, the need to analyze the software string, parallel structure. If the parallel structure of software dominance, consider the first method; if the serial structure dominated, consider the second method.

    The first method is to iteratively separate functional modules to divide components based on the software specifications and software requirements specification. The divided functional module can be considered as a linker only if it meets the definition of a linker or acts as a linker.

    The second method is to identify components based on business processes. Business processes are essentially functional processes.For example, a simple functional process is to issue, audit and process commands.

    The process of function decomposition method identifying the components is shown in Fig. 2.

    Step 1 According to the design document and requirement document, the software system can be divided into several main function modules.

    Step 2 According to the specific function of the main module description and process, the functional structure figure is summed. Functional diagram is the function of the system to decompose, according to the function of subordinate relationship expressed as a chart. System of the subsystem can be seen as the system under the target of the function, which can continue to break down each of the third layer, the fourth layer, even more features. As shown in Fig. 3, the end of the process is broken down to the bottom of the function. A compact module can be seen as a component. The functional module after decomposition, which acts as a linker, can be considered a linker.

    Step 3 The decomposed functions (including the main functions and sub-functions) have separate interfaces and protocols, can be used independently, can be seen as components. The linker is also a component.

    Step 4 According to the above recognition strategy, the logical relationship between components can be determined. The above method lays the foundation for the study of the reliability evaluation method of the subsequent component.

    Fig. 2 Functional decomposition method to identify components

    Fig. 3 Simple function chart

    1.2 Interface analysis division method

    According to the requirement design of software interface of ship electromechanical products and the technology of interface testing in software testing process, the software components are divided according to the interface types, the complexity of interfaces and the intensity of the mutual information between interfaces. According to the interface divided module, its own independence, separability, this method can be used as one of the main component identification methods.

    The interface between the ship’s mechanical and electrical product software is mainly divided into Ethernet interface, serial interface, CAN interface and IO interface,etc., which are classified according to the communication mode. Interface analysis is the process of breaking up the system into a series of components divided by interface types. This method can comprehensively consider the internal interface diagram and external interface diagram in the “Software Interface Requirements Specification” document.

    The main points of interface analysis division method include identification targets, identification strategies, and identification processes.

    The process of interface analysis identifies method is shown in Fig. 4.

    Fig. 4 Interface analysis identification component process

    The identification goal of the interface analysis method is to use the relationship among the module interfaces to divide the components. The identification strategy is, firstly, considering the clarity between the modules. If the modules are coupled closely, they can be considered to view as a whole component, which called component-level software. Secondly, considering whether the interactions between modules are explicit, such as requests, receivers, or information-passers. The information transfer module is a linker.

    According to the requirements specification of the software, the interface relationship between the modules is clarified. Through the interface analysis, the software system is divided into several modules. The module divided by the interface can be regarded as a component. If two or more functional modules with multiple interaction information and complicated logical interfaces can be divided into one component.

    1.3 Input domain division method

    One of the areas that must be considered during software testing is the input field. Dividing components by input fields can be considered from 2 aspects. Firstly, it can be divided according to the set of software input, such as interface input and message input when performing black box testing. Secondly, when performing a white-box test, the input types can be analyzed by software program analysis.

    When performing a black box test on the software, input fields include numeric input, text input, button input, message input (such as user datagram protocl message, serial port message), and graphic input[6]from the test type and test item. Based on the program analysis method to determine the input field, the input is to extract information from the source code, analyze variables and modules, and then determine the value range of the input variables of the program. The black box test considered from the entire software system is more in line with the idea of reverse analysis software system structure in this paper. Therefore, the input field division method is adopted in this paper to determine the input field from the software black box test perspective.

    Different types of input fields have some impact on the software reliability[7-8]. According to the different input fields, the module is divided into different components. Based on the theory of different types of input fields that having an influence on software reliability, the same input field modules are divided into a component. In this way, according to the different input fields, the software module can be divided into several components.

    The process of input domain division method is shown in Fig. 5.

    Fig. 5 Steps of component division according to the input field

    Step 1 According to the software system design documents, technical specification documents, requirements and design documents,etc., combine the software interface, message input and other aspects, the input fields of the system are classified and divided.

    Step 2 According to the software work-flow, each function module input and output space are analyzed.

    Step 3 Analyze the attributes and characteristics of each input field, divide the same input module into one component.

    It is important to note that testers often need to determine what exactly all possible inputs contain. To determine all possible inputs, the first is to check the software requirements. If the requirements are complete and unambiguous, it is possible to identify all input sets.

    1.4 Module encapsulation division method

    Most of the software on warship is developed by C++, and encapsulation is one of its features. In C++, objects are defined by classes, which are the tools for encapsulation and data hiding and the basic logical unit for wrapping data and methods.

    Encapsulation offers reusability for developing software in an object-oriented approach that greatly increases the efficiency, quality, and reliability of software development.

    In addition, the main thing is that the encapsulation of the module can also be a package of multiple sub-software systems, and only the rules and interface definitions are explicitly used to the outside world. Module encapsulation here is mainly for such cases. For a software system with a large number of module packages, the method according to module encapsulation is shown in Fig 6.

    Fig. 6 Steps of component division basing module encapsulation

    Depending on the encapsulation of the software, module of software has a clear internal scope, a clear external boundary, and a clear interface.

    Components with good encapsulation can be considered as one component. However, the module after divided by this method is large. Therefore, when using this method, the function decomposition and interface analysis method must be comprehensively considered. This paper considers from the following 2 aspects. Firstly, after using function decomposition division method, if a larger sub-function module contains an encapsulation module, the sub-function module can be decomposed by the module encapsulation method. Secondly, the module encapsulation property of the software system is relatively obvious, systems can use module encapsulation division method, and then use functional decomposition or interface division method to divide components.

    1.5 Comparison and application of 4 methods

    Comparison and application of 4 methods is shown in Table 1.

    Table 1 Comparison and application of 4 kinds of component recognition methods

    2 Component Architecture Modeling and Reliability Calculation Method

    The software architecture is generally a complex system and includes a variety of basic structural relationships such as order and parallelism. There is a very close relationship between the reliability of the basic software structure style and the reliability of the entire software system.

    By the characteristics of the software architecture and the relationships among the components, the entire software architecture can be seen as being embedded by 5 basic structures: sequential structure, and & combine structure, or & combine structure, branch structure, or & branch structure[5]. In the following part, the six basic structures are further explained, and basing on the reliability definition[6], the corresponding reliability calculation formulas are given.

    2.1 Sequential structure

    The structure consists ofncomponents. A function must be continuous processing throughncomponents to complete. In other words, if and only if thencomponents and linker work normally, the system can work properly. Failure of any component or linker will result in failure of the entire system, as shown in Fig. 7.

    Assuming that the life time of the componentsCi(round shape) and linersL(i→j) (Square shape) areXiandY(i→j).The reliability of them, which operating time ist, areRCi(t)=P{Xi>t},Ci(t)=P{Y(i>j)>t}.

    Fig. 7 Reliability model of sequential structure

    C1,C2, …,Cn,L(1→2), …,L(n-1→n)are independent of each other, the system life time isZs, the system working time ists, so the system reliability is

    Rs(ts) =P{Zs>ts}=

    P{min(X1,X2, …,Xn;Y1→2,Y2→3, …,
    Y(n-1)→n>ts)}=

    P(X1>ts,X2>ts, …,Xn>ts;Y1→2>ts,
    Y2→3>ts, …,Y(n-1)→n>ts)=

    (1)

    2.2 And&combine structure

    And&CombineStructure is a structure which refers to a function can only be composed of n components together with a component to complete. If all then+1 components and linker work properly, the system can run normally, any one part failure will lead to the failure of the entire system. Its corresponding structure is shown in Fig 8. WhereC1, 2, …,ndenotes a set ofC1,C2, …,Cncomponents, andL1, 2, …,n→(n+1)denotes a set of connectorsL(1→(n+1),L2→(n+1), …,L(n→(n+1).

    Fig. 8 Reliability model of and & combine structure

    The reliability of components and linkers is defined in the same way as the reliability of sequential structure. The reliability of the system is

    Rs(ts) =P{Zs>ts}=

    P{min(X1,X2, …,Xn+1,Y1→(n+1),Y2→(n+1), …,
    Yn→(n+1)>ts)}=

    P(X1>ts,X2>ts, …,Xn+1>ts,Y1→(n+1)>ts,
    Y2→(n+1)>ts, …,Yn→(n+1)>ts)=

    (2)

    2.3 Or&combine structure

    Or & combine Structure is a structure which refers to a function the collaboration of one ofnth components and the (n+1) th component can be completed. As long as the componentCi, linkerL(i→(n+1)andCn+1work properly, the system can work properly. Its corresponding structure is shown in Fig. 9. WhereC1, 2, …,ndenotes a set ofC1,C2, …,Cncomponents.

    Fig. 9 Reliability model of or & combine structure

    The system reliability is

    Rs(ts) =P{Zs>ts}=

    P(max(min(X1,Y1→(n+1),Xn+1),min(X2,Y2→(n+1),

    Xn+1), …, min(Xn,Yn→(n+1),Xn+1))>ts)=

    1-P(max(min(X1,Y1→(n+1),Xn+1),min(X2,Y2→(n+1),

    Xn+1), …, min(Xn,Yn→(n+1),Xn+1))≤ts)=

    1-P(min(X1,Y1→(n+1),Xn+1)≤ts,min(X2,Y2→(n+1),

    Xn+1)≤ts, …, min(Xn,Yn→(n+1),Xn+1))≤ts)=

    P(Xn+1>ts))=

    (3)

    2.4 Branch structure

    Assuming that the software architecture is consists ofn+1 components, through a component andncomponents together to complete a function. The system can operate normally only if all then+1 components andnconnectors are working properly. Its corresponding structure is shown in Fig. 10. WhereC1, 2, …,ndenotes a set ofC1,C2, …,Cncomponents, andL0→1, 2, …,ndenotes a set of connectorsL0→1,L0→2, …,L0→n.

    Fig. 10 Reliability model of branch structure

    The system reliability is

    Rs(ts) =P{Zs>ts}=

    P{min(X0,X1,X2, …Xn,Y0→1,Y0→2, …,

    Y0→n)>ts}=

    P(X0>ts,X1>ts,Xn>ts,Y0→1>ts,

    Y0→2>ts, …,Y0→n>ts)=

    (4)

    2.5 Or&branch structure

    Assuming that the software architecture is consists ofn+1 components. A function is completed by selecting the componentCiaccording to the componentC0. This structure is shown in Fig. 11, whereC1, 2, …,ndenotes a set ofC1,C2, …,Cncomponents, andL0→1, 2, …,ndenotes a set of connectorsL0→1,L0→2, …,L0→n.

    Fig. 11 Reliability model of or & branch structure

    The system reliability is

    Rs(ts) =P{Zs>ts}=

    min(P(Xi,Y0→i)>ts,i=1, 2, …,n)×

    P(X0>ts)=

    min(P(Xi>ts)×P(Y0→i>ts))×P(X0>ts)=

    min(RC i(ts)×RL 0→i(ts))×RC 0(ts).

    (5)

    3 Modeling of Component Software Architecture Based on Petri Nets

    Petri nets are one of the many mathematical methods used to describe distribution systems. As a formal language, it uses a graphical approach to describe a distributed system structure as a labelled directed bilateral graph. The core of Petri nets concept of asynchronous concurrency solves many of the non-formal language or semi-formal language that can not solve the model description problem. This paper uses Petri net to formally model the component software architecture.

    The definition of the classic Petri net is a collection of quadsΣ=(S,T;F,M0), where

    S={s1,s2, …,sn} is a set of finite positions.

    T={t1,t2, …,tm} is a finite transition set.

    F∈(P×T)∪(T×P) is the flow relationship,P∪T≠φ,P∩T=φ.

    M0is the initial identifier of the network. The logo of the Petri net is a multiple set on the position set. When the system is in the initial state,M0represents the distribution of tokens in various locations.

    Petri nets can be represented by a directed bipartite graph, which contains two types of nodes and is connected using directed arcs. The 2 types of nodes are positions and transitions, where the positions are generally represented by circles and transitions are generally represented by rectangles. Dynamic features are represented by allowing tokens (black dots) to be included in the location. In the Petri net with token, according to the enable condition of the migration, the enabled transition ignition (Fire) and the ignition of the transition will implement the movement of the token according to the ignition rule. The ever-changing token redistribution describes the dynamic changes of the system. A typical Petri net is shown in Fig. 12.

    Fig. 12 A typical Petri net

    Petri net can realize real-time embedded software modeling and verification, especially in the field of security-critical software verification, it has been successfully applied[5, 9].

    3.1 Sequential structure based on petri net

    The order structure consists ofncomponents, a function must be processed continuously throughncomponents to complete. A formal graph based on Petri nets is depicted in Fig. 13.

    Fig. 13 Sequential structure based on Petri net

    In this sequential structure, Petri netN=(S,T;F). among them

    S={s1,s2, …,sn},

    (6)

    (7)

    (8)

    (9)

    For transitionti, its front setotiand rear settioare

    (10)

    Thus the structure of the correlation matrixΣis

    (11)

    3.2 And&combine structure based on Petri net

    And & combine structure means that a function can only be completed in collaboration with a component by onlyncomponents. A formal graph based on Petri net is described in Fig. 14.

    Fig. 14 And & combine structure based on Petri net

    In this structure, Petri netN=(S,T;F).

    S={s1,s2, …,sn,s1+n},

    (12)

    (13)

    (14)

    (15)

    For transitionti, its front setotiand rear settioare

    (16)

    The structure’s correlation matrix is

    (17)

    3.3 Or&combine structure based on petri net

    The structure means that a function simply selects n components to work together with a component. A graphical description based on Petri nets is shown in Fig. 15.

    Fig. 15 Formal or & combine structure based on Petri net

    In this or & combine structure, the Petri net

    N=(S,T;F),

    (18)

    F= {(s1,t1),(s2,t2), …, (sn-1,tn-1),(t1,s1+n),

    (t2,s1+n), …, (tn,s1+n), (sn+1, end)}.

    (19)

    F= {(s1,t1),(s2,t2), …, (sn-1,tn-1), (t1,s1+n),

    (t2,s1+n), …, (tn,s1+n), (sn+1, end)}.

    (20)

    F= {(s1,t1),(s2,t2), …, (sn-1,tn-1),(t1,s1+n),

    (t2,s1+n), …, (tn,s1+n), (sn+1, end)}.

    (21)

    (22)

    For transitionti, its front set°tiand rear settioare

    .

    (23)

    The structure’s correlation matrix is

    (24)

    3.4 Branch structure based on petri net

    The structure means that the software architecture is composed ofn+1 components, and a certain function needs to be completed by one component andncomponents. The graphical representation based on Petri nets is depicted in Fig. 16.

    Fig. 16 Branch structure based on Petri net

    In the branching structure, the Petri net N=(S,T;F). among them

    F= {(s1,t1), (s2,t2), …, (sn,t1), (t1,s1+n),

    (sn+1,end)},

    (25)

    F= {(s1,t1),(s2,t2), …, (sn,t1),(t1,s1+n),

    (sn+1,end)},

    (26)

    F= {(s1,t1),(s2,t2), …, (sn,t1),(t1,s1+n),

    (sn+1,end)}.

    (27)

    .

    (28)

    For transitionti, its front setotiand rear settioare

    S={s1,s2, …,sn,s0}

    .

    (29)

    The structure’s correlation matrix is

    Σ=[-1 -1 -1 -1 … -1 1]1×(n+1)

    .

    (30)

    3.5 Petri net-based or&branch structure

    Or & branch structure means that the software architecture is composed ofn+1 components. A function means that the software architecture is composed ofn+1 components. A function is to select a component according to the componentS0.Si. A graphical description based on Petri net is shown in Fig. 17.

    Fig. 17 Or & branch structure based on Petri net

    In this or & branch structure, Petri netsN=(S,T;F). Among them

    S={s1,s2, …,sn,s0},

    (31)

    F= {(s0,t1),(s0,t3), …, (s0,t2n+1),(t1,s1),

    (t3,s2), …,(t2n-1,sn),(s0,t2),(s2,t4), …,

    (sn,t2n),(t2,s0),(t4,s0)…(t2n,s0)}.

    (32)

    F= {(s0,t1),(s0,t3), …, (s0,t2n+1); (t1,s1), (t3,s2), …,

    (t2n-1,sn); (s0,t2),(s2,t4), …, (sn,t2n);(t2,s0),

    (t4,s0)…,(t2n,s0)}

    (33)

    (34)

    For transitionti, its front setotiand rear settioare

    (35)

    The structure’s correlation matrix is

    (36)

    4 Example Applications

    Taking a data stream interaction architecture of a accusation system component software system as an example, the component software architecture modeling method based on Petri net is introduced. In the component software architecture, according to the hierarchical architecture style, a component software can be divided into 3 levels: core layer, functional layer, and application layer. The core layer is the basis of the entire system. The bottom layer functions are implemented by the core layer. The functional layer is the middle layer of the entire system. It is between the bottom layer and the top layer. It not only accesses the services provided by the core layer to execute, but also provides the functions used by the highest level. The highest level is an excuse to the external environment for the entire system. Users can visit the highest level to access the functions provided by the entire system.

    The basic connection between the application layer and the functional layer is called between the components of the functional module, as shown in Fig. 18.

    Fig. 18 Calling relation between components

    Open the 2 components package in Fig. 19, we can get a more detailed informal component calling relationship, as shown in Fig. 19.

    Fig. 19 Detailed calling relationships between components

    Using the methods mentioned in thispaper, the above diagram is converted into a formal modeling language based on Petri net, and the component software architecture model is shown in Fig. 20.

    Fig. 20 Formal description of the complete call relationship between components

    S1means that there is an independent component module in component package 1 that has the function of sending data streams.

    S2means that there is an independent component module in component package 1 that has the function of waiting for feedback from sub-component.

    S3means that there is an independent component module in component package 1 that has the function of analyzing and using data flow.

    S4means that the component package 2 has an independent component module that accepts the data flow function.

    S5means that there is an independent component module in component package 2 that has the function of sending data after processing.

    S6means that there is an independent component module in component package 2 that has the function of processing data flow.

    t1means that the execution of the next transition, after the componentS3completes the analysis and uses the data flow function, its time identifier is [1, 2].

    t2represents the next step of execution, after the componentS1completes the data flow function, its time identifier is [1, 5].

    t3represents the transition of the next step, after the componentS2finishes the function of waiting for the feedback of the sub-component, its time is identified as [3, 5].

    t4represents the transition of the next step, after the componentS4finishes accepting the data flow function, its delay identifier is 5.

    t5indicates the execution of the next step of transition, after the componentS5completes the data flow function after sending the processing, its time identifier is [5-6].

    t6means to perform the next step of transition, after the componentS6processing data flow function is completed, its time identifier is [2-4].

    It can be clearly seen from this Fig. 20 when the componentS1analyzes and uses the data stream, it sends the data stream to the sub-components, triggering the waiting sub-componentS2feedback information and the sub-componentS4confirming that the data stream has been received. Then, in the functional layer, after the data flow is processed according to the requirements through the componentS4, the componentS5and the componentS6, the transitiont3is triggered to return to the initial componentS3. In this way, the task of data stream processing is realized, though the application layer component calling the functional layer component.

    In this call relationship formal structure, Petri net indicatesN=(S,T;F,M,I,DI). (S,T;F,M) is a prototype Petri net,Iis the time interval function defined on the transition set,T->R0×(R0∪{∞}).

    DIis the time interval function defined on the transition setT:

    DI:T→R0

    os1={t1}, ……os2={t2}, ……os3={t3},

    os4={t2,t6},os5={t4}, ……os6={t5},

    (37)

    os1={t1}, ……os2={t2}, ……os3={t3},

    os4={t2,t6},os5={t4}, ……os6={t5},

    (38)

    os1={t1}, ……os2={t2}, ……os3={t3},

    os4={t2,t6},os5={t4}, ……os6={t5},

    (39)

    os1={t1}, ……os2={t2}, ……os3={t3},

    os4={t2,t6},os5={t4}, ……os6={t5},

    (40)

    os1={t1}, ……os2={t2}, ……os3={t3},

    os4={t2,t6},os5={t4}, ……os6={t5},

    (41)

    Thus the structure of the correlation matrixΣis

    (42)

    According to the Petri net’s correlation matrix, as well as extended time and time-series representations, the component software architecture can be easily translated into a computer language, which greatly assists researchers in analyzing the component software architecture.

    5 Conclusions

    Component software architecture analysis is the basic technology for the reliability assessment of system and individual components. Firstly, this paper analyzes the functional requirements of software, determines the basis of component division, and summarizes the component dividing rules. Secondly, identify the components, composite components and linker according to the corresponding rules and specific system characteristics. On this basis, the basic structure of software is analyzed, includingsequencestructure,and&combinestructure,or&combinestructure,branchstructure,or&branchstructure. Structural model is established using Petri net. Finally, the warship equipment software system that has been implemented is used for example applications. This paper provides the basis for the reliability analysis of warship equipment developed by component software.

    亚洲av成人av| 热99re8久久精品国产| 免费av毛片视频| 免费一级毛片在线播放高清视频| 在线看三级毛片| 亚洲婷婷狠狠爱综合网| 日日啪夜夜撸| 亚洲国产精品久久男人天堂| 久久精品综合一区二区三区| 午夜影院日韩av| 成年女人看的毛片在线观看| 内射极品少妇av片p| 国产色爽女视频免费观看| 可以在线观看的亚洲视频| 最近2019中文字幕mv第一页| aaaaa片日本免费| 久久草成人影院| 中文字幕免费在线视频6| 欧美国产日韩亚洲一区| 亚洲国产精品国产精品| 观看免费一级毛片| 大又大粗又爽又黄少妇毛片口| 99久久精品一区二区三区| 国产精品人妻久久久久久| 免费一级毛片在线播放高清视频| 日韩大尺度精品在线看网址| 在线播放国产精品三级| 午夜久久久久精精品| 99热精品在线国产| 久久久久久久久中文| 内射极品少妇av片p| 亚洲人成网站在线播放欧美日韩| 成人av一区二区三区在线看| 精品人妻视频免费看| 无遮挡黄片免费观看| 亚洲国产精品sss在线观看| 少妇丰满av| 黑人高潮一二区| 有码 亚洲区| 最近中文字幕高清免费大全6| 日本爱情动作片www.在线观看 | 黄色欧美视频在线观看| 看片在线看免费视频| 看片在线看免费视频| 国产成人freesex在线 | 免费搜索国产男女视频| 俺也久久电影网| 亚洲va在线va天堂va国产| 在线免费十八禁| 日本黄色片子视频| 免费看日本二区| 直男gayav资源| 联通29元200g的流量卡| 成人一区二区视频在线观看| 搡老熟女国产l中国老女人| 国产探花极品一区二区| h日本视频在线播放| 国产精品一区二区性色av| 国产男靠女视频免费网站| 少妇丰满av| 男女边吃奶边做爰视频| 日本爱情动作片www.在线观看 | 欧美绝顶高潮抽搐喷水| av天堂中文字幕网| 国内少妇人妻偷人精品xxx网站| 午夜福利在线在线| 美女大奶头视频| 国产私拍福利视频在线观看| 亚洲无线在线观看| 男女视频在线观看网站免费| 亚洲av免费高清在线观看| 秋霞在线观看毛片| 色尼玛亚洲综合影院| 成人综合一区亚洲| 国产伦一二天堂av在线观看| 小说图片视频综合网站| 婷婷精品国产亚洲av在线| 亚洲成人中文字幕在线播放| 美女黄网站色视频| 欧美性猛交╳xxx乱大交人| videossex国产| 国产成人aa在线观看| 亚洲欧美日韩高清在线视频| av专区在线播放| 天天一区二区日本电影三级| 亚洲第一区二区三区不卡| 日产精品乱码卡一卡2卡三| 色综合亚洲欧美另类图片| 亚洲最大成人av| 久久天躁狠狠躁夜夜2o2o| 在现免费观看毛片| 啦啦啦啦在线视频资源| 久久久a久久爽久久v久久| 国产成人一区二区在线| 国语自产精品视频在线第100页| 寂寞人妻少妇视频99o| 亚洲成人精品中文字幕电影| 色吧在线观看| 综合色丁香网| 97热精品久久久久久| 国产人妻一区二区三区在| 男人狂女人下面高潮的视频| 观看免费一级毛片| 成人永久免费在线观看视频| 欧美日韩综合久久久久久| 91午夜精品亚洲一区二区三区| 日韩欧美一区二区三区在线观看| or卡值多少钱| 一边摸一边抽搐一进一小说| 人妻久久中文字幕网| 97超碰精品成人国产| 亚洲第一区二区三区不卡| 亚洲成人中文字幕在线播放| 亚洲精品粉嫩美女一区| 最近中文字幕高清免费大全6| 禁无遮挡网站| 99热这里只有精品一区| 欧美最黄视频在线播放免费| 少妇熟女aⅴ在线视频| 精品一区二区三区视频在线观看免费| 日韩欧美精品v在线| 国产国拍精品亚洲av在线观看| 嫩草影院新地址| 在现免费观看毛片| 国产精品久久久久久久久免| 亚洲在线观看片| 日本熟妇午夜| 日韩人妻高清精品专区| 亚洲综合色惰| 美女xxoo啪啪120秒动态图| 久久九九热精品免费| 99久国产av精品| 免费一级毛片在线播放高清视频| 亚洲av二区三区四区| 国产精品久久久久久亚洲av鲁大| 国产av在哪里看| 97超视频在线观看视频| 午夜亚洲福利在线播放| 日韩亚洲欧美综合| 成熟少妇高潮喷水视频| 国产激情偷乱视频一区二区| 在线a可以看的网站| 国产精品无大码| 亚洲18禁久久av| 欧美激情在线99| 三级毛片av免费| 成人美女网站在线观看视频| 国产精品国产高清国产av| 久久欧美精品欧美久久欧美| 精品乱码久久久久久99久播| av视频在线观看入口| 精品无人区乱码1区二区| 国产精品久久久久久久久免| 亚洲精华国产精华液的使用体验 | 黄色日韩在线| 午夜福利18| 久久久久久久午夜电影| 久久九九热精品免费| 蜜桃久久精品国产亚洲av| 97超碰精品成人国产| 国产午夜福利久久久久久| 黄片wwwwww| 噜噜噜噜噜久久久久久91| 国内精品宾馆在线| 午夜精品国产一区二区电影 | 有码 亚洲区| 美女内射精品一级片tv| 中出人妻视频一区二区| 看片在线看免费视频| 欧美日韩一区二区视频在线观看视频在线 | 国产伦一二天堂av在线观看| 三级经典国产精品| 婷婷精品国产亚洲av在线| 久久人人爽人人爽人人片va| 毛片一级片免费看久久久久| 欧美色欧美亚洲另类二区| 欧美一级a爱片免费观看看| av在线亚洲专区| 欧美+亚洲+日韩+国产| 欧美精品国产亚洲| 性色avwww在线观看| 免费看av在线观看网站| 哪里可以看免费的av片| 一区二区三区四区激情视频 | 99热全是精品| 精品久久久久久久久久免费视频| 波野结衣二区三区在线| 国产男靠女视频免费网站| 国产成人福利小说| 18禁在线无遮挡免费观看视频 | 深夜a级毛片| 嫩草影院精品99| 国产精品一区www在线观看| 国产av一区在线观看免费| 久久久久久久久久成人| 久久久久久九九精品二区国产| 高清日韩中文字幕在线| 欧美zozozo另类| 欧美中文日本在线观看视频| 99久久精品一区二区三区| 亚洲一区二区三区色噜噜| 丰满人妻一区二区三区视频av| 欧美日韩乱码在线| 欧美色欧美亚洲另类二区| 啦啦啦观看免费观看视频高清| 精品不卡国产一区二区三区| 日本 av在线| 欧美日韩乱码在线| 免费在线观看成人毛片| 可以在线观看毛片的网站| 国产熟女欧美一区二区| 少妇被粗大猛烈的视频| 淫秽高清视频在线观看| 精品一区二区三区视频在线| 老师上课跳d突然被开到最大视频| 老熟妇乱子伦视频在线观看| 国产真实伦视频高清在线观看| 久久久久久大精品| 国产淫片久久久久久久久| 国产色爽女视频免费观看| 欧美最新免费一区二区三区| 精品久久久久久久久亚洲| 美女xxoo啪啪120秒动态图| 最近的中文字幕免费完整| 午夜免费男女啪啪视频观看 | 精品欧美国产一区二区三| 精品久久久久久久久久久久久| 免费av观看视频| 久久久午夜欧美精品| 黄色视频,在线免费观看| 久久久久性生活片| 亚洲欧美成人精品一区二区| 97碰自拍视频| or卡值多少钱| 一进一出抽搐动态| 亚洲欧美日韩高清在线视频| 国产精品综合久久久久久久免费| 亚洲综合色惰| 一个人观看的视频www高清免费观看| 人妻久久中文字幕网| 久久鲁丝午夜福利片| 色噜噜av男人的天堂激情| 免费大片18禁| 亚洲成a人片在线一区二区| 久久久欧美国产精品| 亚洲经典国产精华液单| 午夜影院日韩av| 国产一区二区激情短视频| 国产片特级美女逼逼视频| 国产精品一区二区免费欧美| 亚洲精品一卡2卡三卡4卡5卡| 在线观看一区二区三区| av在线天堂中文字幕| 免费看av在线观看网站| 国产亚洲精品av在线| 亚洲精品日韩在线中文字幕 | 成年女人永久免费观看视频| 日本一二三区视频观看| 亚洲av成人精品一区久久| 欧美日韩一区二区视频在线观看视频在线 | 观看美女的网站| 日本黄色片子视频| 国产精品乱码一区二三区的特点| www日本黄色视频网| 性插视频无遮挡在线免费观看| av在线老鸭窝| 两个人的视频大全免费| 综合色av麻豆| 精品无人区乱码1区二区| 久久久久久久久久成人| 精华霜和精华液先用哪个| 搡老妇女老女人老熟妇| 国产精品久久久久久久久免| 日韩,欧美,国产一区二区三区 | 天堂网av新在线| 欧美日韩一区二区视频在线观看视频在线 | 久久久久九九精品影院| 国产69精品久久久久777片| 国产午夜精品论理片| 日韩中字成人| 丝袜美腿在线中文| 午夜福利成人在线免费观看| 在线a可以看的网站| 香蕉av资源在线| 久久久国产成人免费| 国产精品人妻久久久久久| 精华霜和精华液先用哪个| 亚洲aⅴ乱码一区二区在线播放| 一卡2卡三卡四卡精品乱码亚洲| 欧美最新免费一区二区三区| 国产私拍福利视频在线观看| 亚洲av免费高清在线观看| 成人欧美大片| 欧美+亚洲+日韩+国产| 久久综合国产亚洲精品| 老司机午夜福利在线观看视频| 黄色一级大片看看| 久久中文看片网| 国产真实乱freesex| 日韩精品中文字幕看吧| 亚洲欧美成人综合另类久久久 | 国产成人精品久久久久久| 国产欧美日韩精品亚洲av| 成人av在线播放网站| 国产在线男女| 日本五十路高清| 丝袜美腿在线中文| 久久精品国产鲁丝片午夜精品| 欧美三级亚洲精品| 国产成年人精品一区二区| 国产精品一区www在线观看| 成人永久免费在线观看视频| 五月伊人婷婷丁香| 亚洲五月天丁香| 久久久a久久爽久久v久久| 日本-黄色视频高清免费观看| or卡值多少钱| 成熟少妇高潮喷水视频| 免费观看在线日韩| 久久久久久大精品| 亚洲精品456在线播放app| 免费无遮挡裸体视频| 亚洲一级一片aⅴ在线观看| 成人性生交大片免费视频hd| 欧美激情国产日韩精品一区| av国产免费在线观看| 欧美激情在线99| 成人一区二区视频在线观看| av在线观看视频网站免费| 美女内射精品一级片tv| 亚洲在线自拍视频| 97碰自拍视频| 成人午夜高清在线视频| 国产在视频线在精品| 成人毛片a级毛片在线播放| a级毛片免费高清观看在线播放| 老司机福利观看| 午夜福利高清视频| 综合色丁香网| 国产综合懂色| 亚洲av中文av极速乱| 在线观看午夜福利视频| 天堂av国产一区二区熟女人妻| 国产不卡一卡二| 精品无人区乱码1区二区| av福利片在线观看| 91久久精品国产一区二区三区| 一卡2卡三卡四卡精品乱码亚洲| 国产成人精品久久久久久| 亚洲精品国产成人久久av| 精品日产1卡2卡| 成人特级黄色片久久久久久久| 18禁在线播放成人免费| 91精品国产九色| 国产亚洲精品久久久久久毛片| АⅤ资源中文在线天堂| 欧美中文日本在线观看视频| 波野结衣二区三区在线| 欧美性猛交黑人性爽| 午夜精品国产一区二区电影 | 狠狠狠狠99中文字幕| 国内久久婷婷六月综合欲色啪| 12—13女人毛片做爰片一| 亚洲av熟女| 国产精品电影一区二区三区| 午夜a级毛片| 亚洲成人久久爱视频| 日韩精品中文字幕看吧| 日本精品一区二区三区蜜桃| 色视频www国产| 亚洲人成网站在线播放欧美日韩| 日韩一本色道免费dvd| 国产精品日韩av在线免费观看| 成人二区视频| 亚洲人成网站在线播放欧美日韩| 露出奶头的视频| 色尼玛亚洲综合影院| 中文字幕av成人在线电影| 女人十人毛片免费观看3o分钟| 国产成人a区在线观看| 91午夜精品亚洲一区二区三区| 日日摸夜夜添夜夜爱| 亚洲在线观看片| 午夜福利18| 99久国产av精品国产电影| av在线亚洲专区| 国产精品,欧美在线| 成年免费大片在线观看| 成人亚洲欧美一区二区av| 久久久久久久久久黄片| 男人狂女人下面高潮的视频| 成年女人看的毛片在线观看| 免费观看人在逋| 一本精品99久久精品77| 国产三级中文精品| 国模一区二区三区四区视频| 赤兔流量卡办理| 国产精品久久久久久精品电影| 午夜爱爱视频在线播放| 精品福利观看| 国产一区二区三区在线臀色熟女| 亚洲国产精品久久男人天堂| 欧美又色又爽又黄视频| 一本久久中文字幕| 日韩国内少妇激情av| 亚洲精品色激情综合| 欧美中文日本在线观看视频| 国产高清视频在线播放一区| 99久久无色码亚洲精品果冻| 日韩一区二区视频免费看| 在线观看一区二区三区| 午夜激情欧美在线| 全区人妻精品视频| 国产黄色小视频在线观看| 99热这里只有是精品50| 亚洲精品成人久久久久久| 久99久视频精品免费| 国产老妇女一区| 国产高清有码在线观看视频| 啦啦啦韩国在线观看视频| 一a级毛片在线观看| 久久精品夜色国产| 免费观看在线日韩| 欧美在线一区亚洲| 欧美高清成人免费视频www| 久久久成人免费电影| 麻豆精品久久久久久蜜桃| av在线蜜桃| 国模一区二区三区四区视频| 亚洲,欧美,日韩| 亚洲av成人av| 国产精品久久电影中文字幕| 免费看a级黄色片| 在线免费十八禁| 精品福利观看| 我要看日韩黄色一级片| 天堂网av新在线| 久久久久久伊人网av| 欧美中文日本在线观看视频| 国产免费一级a男人的天堂| 欧美成人a在线观看| 亚洲精华国产精华液的使用体验 | 亚洲精品日韩在线中文字幕 | 一级黄片播放器| 亚洲欧美日韩东京热| 国产精品精品国产色婷婷| 午夜视频国产福利| 99九九线精品视频在线观看视频| 99热6这里只有精品| 亚洲成人av在线免费| 日韩欧美免费精品| a级一级毛片免费在线观看| 国产成人91sexporn| 精品日产1卡2卡| 久久欧美精品欧美久久欧美| 男插女下体视频免费在线播放| 欧美不卡视频在线免费观看| 嫩草影视91久久| 俺也久久电影网| 人妻制服诱惑在线中文字幕| 亚洲最大成人av| 免费人成在线观看视频色| 久久久久久伊人网av| 欧美成人免费av一区二区三区| 日韩精品青青久久久久久| 欧美色视频一区免费| 三级男女做爰猛烈吃奶摸视频| 免费观看人在逋| 少妇的逼水好多| 麻豆国产97在线/欧美| 观看免费一级毛片| 久久精品久久久久久噜噜老黄 | 无遮挡黄片免费观看| 乱系列少妇在线播放| 亚洲一区二区三区色噜噜| 国模一区二区三区四区视频| 三级经典国产精品| 最近中文字幕高清免费大全6| 国产精品人妻久久久久久| 久久人人爽人人爽人人片va| 亚洲美女搞黄在线观看 | 久久精品夜色国产| 成年女人看的毛片在线观看| 亚洲精品影视一区二区三区av| 久久精品国产亚洲av涩爱 | 亚洲最大成人av| av专区在线播放| 国产av不卡久久| 天堂网av新在线| 亚州av有码| 级片在线观看| 搡女人真爽免费视频火全软件 | 黄色日韩在线| 女人十人毛片免费观看3o分钟| 日韩在线高清观看一区二区三区| АⅤ资源中文在线天堂| 亚洲人成网站高清观看| 精品国产三级普通话版| 日本黄色片子视频| 国内少妇人妻偷人精品xxx网站| 国产成人影院久久av| 国产高清不卡午夜福利| 国产精品久久久久久av不卡| 久久久久国产精品人妻aⅴ院| 少妇裸体淫交视频免费看高清| 中文资源天堂在线| 激情 狠狠 欧美| 亚洲成av人片在线播放无| 中国国产av一级| 成人精品一区二区免费| 精品久久久久久久久av| 天堂网av新在线| 久久久久久久久久黄片| 国产高清三级在线| 亚洲精品色激情综合| 国产精品一区二区免费欧美| 99久久中文字幕三级久久日本| 日本在线视频免费播放| 一区福利在线观看| 国产69精品久久久久777片| 国产 一区精品| 欧美成人精品欧美一级黄| 久久国产乱子免费精品| 色视频www国产| 国产三级在线视频| 中文字幕精品亚洲无线码一区| 一区二区三区高清视频在线| 女人十人毛片免费观看3o分钟| 熟妇人妻久久中文字幕3abv| 国产精品女同一区二区软件| 午夜久久久久精精品| 香蕉av资源在线| 晚上一个人看的免费电影| 国产真实伦视频高清在线观看| 国产亚洲欧美98| 欧美日韩在线观看h| 桃色一区二区三区在线观看| 男人舔奶头视频| 在线看三级毛片| 亚洲自拍偷在线| 中出人妻视频一区二区| 搡老岳熟女国产| 亚洲久久久久久中文字幕| 99久久精品热视频| 久久久久精品国产欧美久久久| 香蕉av资源在线| 久久人妻av系列| 精品午夜福利在线看| 国产aⅴ精品一区二区三区波| 国产私拍福利视频在线观看| 又黄又爽又刺激的免费视频.| 日韩欧美三级三区| 亚洲av成人精品一区久久| 天堂动漫精品| 国产色婷婷99| 国产国拍精品亚洲av在线观看| 联通29元200g的流量卡| 亚洲国产欧洲综合997久久,| 成人综合一区亚洲| 精品久久久久久久久av| 亚洲成av人片在线播放无| 久久综合国产亚洲精品| 久久久久久久久久成人| 国产高清有码在线观看视频| 99久久九九国产精品国产免费| 美女内射精品一级片tv| 亚洲中文字幕日韩| 好男人在线观看高清免费视频| 人妻夜夜爽99麻豆av| 51国产日韩欧美| 男人舔奶头视频| 啦啦啦啦在线视频资源| 欧美日韩在线观看h| 国产精品伦人一区二区| 午夜a级毛片| 一本精品99久久精品77| 欧美精品国产亚洲| 国产在线男女| 综合色丁香网| 大香蕉久久网| 日日摸夜夜添夜夜爱| 中文资源天堂在线| 超碰av人人做人人爽久久| 久久久久国产精品人妻aⅴ院| 中国美女看黄片| 亚洲国产高清在线一区二区三| 久久久国产成人免费| 久久欧美精品欧美久久欧美| 久久久国产成人精品二区| 欧美日韩精品成人综合77777| 又爽又黄a免费视频| 亚洲熟妇中文字幕五十中出| 精品久久久久久久人妻蜜臀av| 黄色视频,在线免费观看| 国产精品乱码一区二三区的特点| av卡一久久| 欧美日韩一区二区视频在线观看视频在线 | 亚洲精品456在线播放app| 亚洲精品456在线播放app| 午夜a级毛片| 精品一区二区三区av网在线观看| 欧美性猛交黑人性爽| 熟妇人妻久久中文字幕3abv| 亚洲精品影视一区二区三区av| 免费观看在线日韩| 秋霞在线观看毛片| 久久精品国产自在天天线| 久久久a久久爽久久v久久| 国产一区二区激情短视频| 国产精品99久久久久久久久| 六月丁香七月| 三级国产精品欧美在线观看| 日本撒尿小便嘘嘘汇集6| 久久精品国产自在天天线| 十八禁国产超污无遮挡网站|