• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Joint Algorithm of Message Fragmentation and No-Wait Scheduling for Time-Sensitive Networks

    2021-04-22 03:53:58XiJinMemberIEEEChangqingXiaMemberIEEENanGuanandPengZeng
    IEEE/CAA Journal of Automatica Sinica 2021年2期

    Xi Jin, Member, IEEE, Changqing Xia, Member, IEEE, Nan Guan, and Peng Zeng

    Abstract—Time-sensitive networks (TSNs) support not only traditional best-effort communications but also deterministic communications, which send each packet at a deterministic time so that the data transmissions of networked control systems can be precisely scheduled to guarantee hard real-time constraints.No-wait scheduling is suitable for such TSNs and generates the schedules of deterministic communications with the minimal network resources so that all of the remaining resources can be used to improve the throughput of best-effort communications.However, due to inappropriate message fragmentation, the realtime performance of no-wait scheduling algorithms is reduced.Therefore, in this paper, joint algorithms of message fragmentation and no-wait scheduling are proposed. First, a specification for the joint problem based on optimization modulo theories is proposed so that off-the-shelf solvers can be used to find optimal solutions. Second, to improve the scalability of our algorithm, the worst-case delay of messages is analyzed, and then,based on the analysis, a heuristic algorithm is proposed to construct low-delay schedules. Finally, we conduct extensive test cases to evaluate our proposed algorithms. The evaluation results indicate that, compared to existing algorithms, the proposed joint algorithm improves schedulability by up to 50%.

    I. INTRODUCTION

    TIME-SENSITIVE networks (TSNs) are an emerging industrial network technology based on Ethernet networks and extend a set of IEEE standards to improve the controllability of industrial networks. Thus, in addition to best-effort communications supported by Ethernet networks,TSNs also support deterministic communications that have been widely considered as an effective solution to guarantee end-to-end delay constraints in hard real-time industrial systems.

    In networked control systems, TSNs have been adopted [1]–[3]. Deterministic communications contain control commands and critical sensing data, and the other data adopts best-effort communications [4]. Deterministic communications and besteffort communications have different objectives. The real-time performance of deterministic communications is the most important. Before they start to transmit, their deterministic schedules must be generated so that the transmission process can be controlled to guarantee hard real-time constraints. For best-effort communications, there is no strict constraint. Their schedules do not need to be generated in advance, and networks just try to transmit them as soon as possible. In a TSN switch,the two kinds of communications share a fixed number of output queues. Deterministic communications must be assigned dedicated queues, while best-effort communications require more queues to improve network throughput [5]. Therefore,determining how to assign and utilize the queues are the key to improving network performance.

    This paper focuses on store-and-forward switching, because compared to cut-through switching, store-and-forward switching is supported by more off-the-shelf TSN products.For example, CISCO IE 4000 [6] and NXP SJA1105 [7]support only store-and-forward switching, while no off-theshelf TSN product supports only cut-through switching. In store-and-forward networks, no-wait scheduling is an effective method to make a performance trade-off between deterministic communications and best-effort communications[8]. Under no-wait scheduling, once a network switch receives a packet, it sends the packet immediately, i.e., only one queue is needed to cache the scheduled packets. Thus, when a nowait scheduling algorithm is used to generate schedules for deterministic communications, except the occupied queue, all of the other queues can be used by best-effort communications. Therefore, no-wait scheduling algorithms not only generate schedules for deterministic communications on the dedicated queue, but also improve the performance of best-effort communications.

    However, when no-wait scheduling algorithms are adopted,the following issue should be considered. On the IP layer, a large message from the TCP layer must be fragmented into several smaller pieces. Each piece and its added packet header constitute a complete packet. These packets are then transmitted separately and reassembled at destination devices.In this process, fragmentation algorithms will affect the transmission delay because smaller packets have higher parallelism. For example, in Fig.1, a message of 1620 bytes must be fragmented into two pieces. In traditional Ethernet fragmentation, the length of the first packet is equal to the maximum segment size (MSS) plus a packet header, and the remaining part is contained in the second packet. Since nowait scheduling algorithms do not allow a time interval between two consecutive hops of a packet, the second packet is postponed by the first packet and cannot be transmitted earlier. In another fragmentation, to reduce the long delay, the message can be fragmented into two pieces of 810 bytes each.Although the number of packets is unchanged, the delay is reduced by approximately one-third. Message fragmentation exists in TSNs [5]. However, there is currently no work that considers message fragmentation algorithms and no-wait scheduling algorithms together. This has led to some optimizable solution spaces being ignored.

    Fig.1. Effect of message fragmentation on no-wait scheduling.

    Therefore, in this paper, a joint algorithm is proposed that fragments deterministic messages into packets of optimized sizes and schedules the packets under hard real-time constraints based on a no-wait strategy to improve the realtime performance of TSNs. When designing the joint algorithm, the following challenge is present. In the interest of saving resources, large packets should be used to reduce the overhead of fragmenting and reassembling. However, in the interest of temporality, a message should be fragmented into small packets, because small packets have higher parallelism and are easy to schedule. Thus, to address the above challenge, our proposed algorithms make a trade-off between these two aspects. The specific contributions are as follows.

    First, a specification for the joint problem based on optimization modulo theories (OMT) is proposed. Since the joint problem is non-deterministic polynomial-time hard (NPhard), there is no polynomial time algorithm for finding optimal solutions. Thus, we formulate the problem as an OMT specification with real-time constraints to minimize the number of fragmented packets, and then invoke off-the-shelf solvers, e.g., Microsoft Z3, to solve it. Our evaluations indicate that, in an acceptable time, the OMT-based method can find optimal solutions for small networks.

    Second, to improve the real-time performance of large networks, we calculate the worst-case delays of messages based on the recursive function shown in Theorem 2. Then,two corollaries are proposed on how to construct low-delay transmissions.

    Third, based on the two corollaries, a joint algorithm is proposed that uses packets from large to small to construct schedules under hard real-time constraints. Thus, the proposed joint algorithm strikes a balance between saving resources and temporality. Extensive test cases were run to evaluate the joint algorithm. The evaluation results demonstrate that, compared to existing algorithms, the proposed joint algorithm improves schedulability by up to 50% and increases a small number of packets.

    The rest of this paper is organized as follows: Section II reviews two categories of related work, including message fragmentation and real-time scheduling algorithms. Section III details the system model and problem. Section IV formulates the problem as an OMT specification. Section V proposes a heuristic algorithm to improve scalability of our algorithms.Section VI evaluates the proposed algorithms based on extensive test cases. Section VII concludes the paper.

    II. RELATED WORK

    Much research has been proposed to improve the real-time performance of industrial networks, e.g., real-time scheduling[9], resource allocation [10] and data recovery [11]. In this paper, we only focus on the real-time scheduling problem of industrial TSNs. The work in [5] formulates the basic scheduling problem of TSNs as a specification, and then uses an off-the-shelf solver to calculate schedules. Then, the work in [12] introduces the capacity limitation of TSN switches into the basic problem so that the proposed scheduling algorithms can be adopted in actual systems. Based on the above work,the work in [13] proposes a loose scheduling algorithm to transmit massive data packets using limited switch resources.In addition to the classical scheduling problem, some extended problems have been considered. The work in [14]proposes an incremental scheduling algorithm to handle dynamic data flows. The work in [15] focuses on the runtime reconfiguration of TSNs and designs a heuristic algorithm to minimize the impact of reconfiguring switches on existing data flows. The work in [16] proposes a joint routing and scheduling algorithm to guarantee the real-time performance of time-triggered communications and reduce the end-to-end delays of audio-video-bridging (AVB) communications. The work in [17] also focuses on the joint problem of routing and scheduling and evaluates extensive test cases to explore the practical limitations of the integer linear programming for TSNs. The work in [18] evaluates asynchronous scheduling algorithms in TSNs and demonstrates that asynchronous scheduling algorithms are suitable for sporadic communications. The work in [19] analyzes the worst-case delays of AVB communications based on network calculus,and then the real-time performance of AVB communications can be precisely assessed. No-wait scheduling can significantly improve system efficiency and has been widely researched in many industrial systems, e.g., energy-efficient production planning systems [20], metal-processing systems[21] and flexible manufacturing systems [22]. In [8], no-wait scheduling is introduced into TSNs. However, the objective of the above work is to minimize the total length of generated schedules. In this paper, communications have different realtime requirements, and the above work cannot be adopted.

    Message fragmentation is a widely used network technology. In Ethernet networks, to reduce the message response time, the work in [23], [24] optimizes and reconfigures the maximum transmission unit size. The work in[25] designs a middleware for Ethernet networks to fragment large objects so that the worst-case delay of object-oriented transmissions can be reduced. The work in [26] evaluates four fragmentation methods based on Ethernet networks. In wireless local area networks, the work in [27], [28] designs novel fragmentation algorithms to improve the throughput of streaming videos. In the 6LoWPAN protocol, the work in[29], [30] demonstrates that packet fragmentation is beneficial to energy consumption, throughput, and end-to-end delay. In delay tolerant networks, the work in [31] fragments large data items to multiple routing paths such that routing performance can be improved. In community antenna television networks,the work in [32] considers fragmentation and scheduling together. It first schedules real-time packets and then fragments best-effort packets to make them suitable for the free slots between successive real-time packets. In timetriggered Ethernet (TTEthernet) networks, a similar method is proposed to fragment event-triggered messages to make them schedulable in idle time intervals [33]. However, the above work cannot be applied to the multi-hop no-wait scheduling problem that is addressed in this paper, and there is no work to consider the effect of message fragmentation on no-wait scheduling. Therefore, in this paper, this effect will be analyzed, and joint algorithms will be proposed to improve network performance.

    III. SYSTEM MODEL AND PROBLEM STATEMENT

    In this section, we will detail our system model and problem. The symbols used in this paper are summarized in Appendix.

    A TSN is characterized by a two-tuple . The node set N={n1,n2,...} includes TSN switches with multiple ports and end systems with only one port. The element li,jin the link set L denotes a cable between nodes niand nj. TSN switches form a mesh topology, and then end systems are connected to the TSN switches, as shown in Fig.2. All ports and cables are full-duplex.

    Fig.2. A time sensitive network.

    In TSN switches, each egress port connects multiple queues,and each queue has a gate that can accurately control the sending of packets. Each TSN switch has a schedule table that records the precise times to open and close the gates. For example, as shown in Fig.3, at time 1, the table entry that controls port A: queue 0 is opened, and the other queues are closed. The queue with a smaller ID has lower priority. When more than one gate is opening, the packet buffered in the higher-priority queue can occupy the egress port. As described in the IEEE 802.1bQu standard, the packet in the higherpriority queue is allowed to interrupt the process of sending the packet in the lower-priority queue, and the interrupted packet will be re-assembled in the next switch. In no-wait scheduling, deterministic packets are assigned to the highestpriority queue, and the queue is always opened such that the packets will not be blocked. Although blocking packets may reduce conflicts and improve schedulability, our work still adopts no-wait scheduling for two reasons. First, no-wait scheduling is not limited by the size of the schedule table. In switch chips, the size of the schedule table is limited and fixed. Thus, switches support a limited number of gate operations. Since no-wait scheduling algorithms do not operate gates, they do not use the schedule table and do not need to consider the table size constraint. Second, under nowait scheduling, there is no schedule dissemination overhead.In a traditional network, a centralized scheduler disseminates the generated schedules to the corresponding network devices.However, under no-wait scheduling, switches forward the received packets immediately and do not need schedule information, so there is no schedule dissemination overhead.We ignore the other details of TSN switches since they have nothing to do with our proposed algorithms. Earlier works[13], [34] can help readers understand TSN switches in details.

    Fig.3. Architecture of a TSN switch.

    Transmitting methods are designed herein only for deterministic flows. Best-effort flows are delivered by the classical best-effort services. In the following, if no specific description is given, flows refer to deterministic flows. A flow in the flow set F is characterized by a four-tuple, which denotes the period, relative deadline,message size, and routing path, respectively. Flow figenerates a message of sibytes periodically with a period pi, and its relative deadline diis not greater than its period pi. It is assumed that all flows generate their first messages at time 0.The j -th message of flow fi, called message mi,j, is generated at time j×pi, and its absolute deadline is j×pi+di. The time interval [j×pi,j×pi+di) is called its active interval. Only determining how to transmit data in a hyperperiod H that is defined as the least common multiple of all periods, i.e.,H=LCM{p1,p2,...}, is considered here, after the first hyperperiod, the subsequent hyperperiods are periodically repeated. The transmission time of a packet with x bytes is equal to x/v, where v denotes the transmission speed. The routing path Πiis a link set, and Πi?L. A path is from an end system to another end system. Hence, the number of hops,denoted riand ri=|Πi|, is not less than 2. Since routing is already well-studied, in the proposed model all routing paths are the shortest and generated based on existing algorithms,e.g., [35], [36].

    From Fig.1, it can be seen that message fragmentation based on the fixed MSS is not suitable for improving real-time performance. To address this problem, first, the sizes of deterministic packets are changed based on the requirements of no-wait scheduling, and then the packets are injected at a specified time that is determined by the proposed real-time scheduling algorithm. However, the number of deterministic packets significantly affects network performance because the fragmented deterministic packets not only introduce extra packet headers but also interrupt best-effort packets.Therefore, given a network and a flow set, our proposed joint algorithm of message fragmentation and scheduling is to minimize the number of packets such that the following two requirements can be satisfied.

    1) Real-Time Requirement: All messages must be delivered to destinations before their absolute deadlines.

    2) No-Conflict Requirement: A unidirectional link cannot serve more than one packet at the same time.

    A flow set is called schedulable if it has a feasible schedule that meets all the requirements. A solution is called optimal if there are no other solutions with better objective values. When only linear networks are considered, and messages are too small to be fragmented, our problem is the same as the scheduling problem studied in [37]. Since the problem in [37]is NP-hard, our problem is also NP-hard. Therefore, to solve the problem, we propose two methods as shown in Fig.4.First, the problem is formulated as an OMT specification [38](in Section IV). Thus, if there exists a feasible solution, OMT solvers can find it. However, for some complex networks, the solvers cannot find any feasible solution in an acceptable time.Then, to improve the scalability of our algorithms, a heuristic algorithm is proposed (in Section V).

    Fig.4. Overview.

    IV. OMT SPECIFICATION

    Satisfiability modulo theories (SMT) have been widely used to determine whether a specification is satisfiable or not [39].An OMT is an extension of a SMT and allows finding an optimal objective based on a SMT specification.

    The inputs of the problem are network N and flow set F. To formulate the problem, we assume that a message is fragmented into, at most, U packets, which are denoted as{τi,j,1,τi,j,2,...,τi,j,U}. U is given by users. Three decision variables wi,j,g, si,j,gand ui,j,gare introduced. wi,j,gdenotes the injection time of packet τi,j,g. The size of packet τi,j,gis si,j,gbytes. If si,j,g=0 , τi,j,gis defined as invalid; otherwise, it is valid. The objective of this work is to minimize the number of valid packets. To calculate the number of valid packets, we use ui,j,gto denote whether a packet is valid or not. If τi,j,gis valid, i.e., si,j,g>0, then ui,j,g=1; otherwise, ui,j,g=0. Thus,the objective function is

    The minimizing problem respects the following constraints.

    1) Range Constraint: The ranges of the variables used in the proposed model are the following:

    If the size of a packet is greater than MS S, the packet has to be fragmented again on the IP layer. Thus, the upper bound of the packet size is MS S. The injection time of a packet must be between its generation time and deadline. To reduce the search space, we specify the order of packets: the packets are injected in increasing order of ID, and valid packets have smaller IDs than invalid packets.

    2) Size Constraint: A message is fragmented into several packets, and the sum of the size of these packets is equal to the size of the message. For each packet, based on the definition of ui,j,g, if the size of the packet is 0, the corresponding ui,j,gis also 0; otherwise, it is 1. The size constraints are as follows:

    3) Real-Time Constraint: If a packet is invalid, i.e., ?ui,j,gis true, its real-time constraints do not need to be considered;otherwise, its arrival time cannot be later than its deadline.The arrival time of a packet is equal to the injection time plus the transmission time ((si,j,g+e)/v×ri), where e is the size of a packet header. Thus, the real-time constraints are as follows:

    4) No-Conflict Constraint: For any two packets, under the following three conditions, we do not need to consider the conflict between them. First, the two packets are the same packet, i.e., for τi,j,gand τx,y,z, (i=x)∧(j=y)∧(g=z) is true.Second, not both packets are valid, i.e., ?ui,j,g∨?ux,y,zis true.Third, the two packets do not pass through the same directed link, i.e., (la,b?Πi)∨(la,b?Πx) is true. If the two packets do not satisfy any of the above conditions, the time intervals when they occupy the same link cannot overlap; otherwise,they conflict with each other. The constraints are as follows:

    where Ai,j,g(la,b) denotes the time of starting to transmit the packet on link la,b, i.e.,

    where qi,a,bdenotes that la,bis the qi,a,b-th hop in path Πi.Then, Ai,j,g(la,b)+(si,j,g+e)/v is the finish time of the packet on link la,b.

    OMT solvers can find the solution of the above specification. However, for complex problems, the execution time of off-the-shelf solvers is unacceptable. Therefore, in the next section, a fast algorithm is proposed to solve the problem.

    V. PROPOSED ALGORITHM

    Our algorithms schedule messages based on fixed priority scheduling [40], which is effective and has been widely used in real-time systems. Under fixed-priority scheduling, each message has an unique priority, and all the messages are scheduled in decreasing order of their priorities. For easy understanding, first, in Section V-A, we assume that priorities and message fragmentation have been determined. Based on the precondition, a basic fixed-priority scheduling algorithm(Algorithm 1) can calculate the injection times for all packets.Then, in Section V-B, based on the basic scheduling algorithm, the worst-case delays of messages are analyzed in order to determine what strategy can improve the real-time performance. Finally, in Section V-C, based on the analysis,our joint algorithm to fragment messages and schedule packets is proposed (as shown in Algorithm 3).

    A. Basic Scheduling

    To find the main factors that affect transmission delay, how packets are scheduled is presented in this section.

    Algorithm 1 is used to calculate the injection time for each packet. Each message mi,jhas a priority ρi,j. If ρi,j<ρx,y, then the scheduling algorithm calculates the injection time wi,j,gof the packets belonging to message mi,jfirst. Note that in Algorithm 1 it is assumed that all priorities ρi,jand message fragmentation {τi,j,1,τi,j,2,...} have been obtained. The method of obtaining these is introduced in Section V-C.

    Algorithm 1 Initial scheduling algorithm Input: , F, , , ?wi,j,g?ρi,j?si,j,g?ui,j,g Output: ?fi ∈F, ?j ∈[0, H 1: ;Γ ≠?pi), Γ=Γ+{mi,j}2: while do mi,jρi,jΓ 3: with the smallest is the highest-priority message in ;Γ=Γ ?{mi,j}4: ;5: for each do t=(j×pi) (j×pi+di ?si,j,g+e τi,j,g ∈Mi,j 6: for to do NoCon flict(t,τi,j,g)7: if then wi,j,g=t v×ri)8: ; break;9: if is not scheduled then 10: return FAIL;?wi,j,g τi,j,g 11: return ;

    Γ contains all of the unscheduled messages (Lines 1 and 4).In each iteration (Lines 2–10), Algorithm 1 calculates the injection time of the highest-priority message in Γ until there are no unscheduled messages. For message mi,j, the set Mi,jincludes all of its valid packets. The packets in Mi,jare assigned injection times (Lines 5–8) separately. If at time t a packet can be scheduled without conflict (the function NoCon flict() in Line 7), its injection time is t (Line 8). The function NoCon flict(t,τi,j,g) returns true if, when τi,j,gis injected into the network at time t, there is no conflict between τi,j,gand the other scheduled packets.

    B. Delay Analysis

    The end-to-end delay of a message is defined as the time duration between its generation time and its received time. In the following, analyzing the end-to-end delay of the message mi,jis considered. Based on Algorithm 1, it is known that the messages in the conflict set ?(mi,j) (Definition 1) determine the delay of mi,j. When all the messages of ?(mi,j) are transmitted in the active interval of mi,jand before the transmissions of mi,j, the worst-case delay of mi,joccurs.S(mi,j) is used to denote the packets that belong to the messages of ?(mi,j), and S(mi,j)={τa,b,g|?τa,b,g∈Ma,b,?ma,b∈?(mi,j)}.

    Definition 1: ?(mi,j) includes all of the messages ma,bthat satisfy the following conditions:

    1) ma,bhas a higher priority than mi,j, i.e., ρa(bǔ),b<ρi,j.

    2) ma,band mi,juse the same links, i.e., Πa∩Πi≠?.

    3) the active intervals of ma,band mi,joverlap each other,i.e., [b×pa,b×pa+da)∩[j×pi,j×pi+di)≠?.

    Based on Definition 1, it is known that the higher-priority messages in ?(mi,j) pass through the links of Πi, but maybe not all of them. However, as long as one of the hops of mi,jis delayed by the higher-priority messages, the entire mi,jis delayed. This is the same as transmitting higher-priority messages over the entire path. Hence, to bound the worst case,all of the higher-priority messages are extended to the entire path Πi, i.e., when the delay of mi,jis considered, the routing path of a higher-priority message ma,bis also Πi. This path extension does not result in an overestimation of the worst case or an underestimation of the conflicts from the higherpriority messages (as shown in Theorem 1). Intuitively,changing the path will cause more delay, or some conflicts may be neglected. However, in Theorem 1, we proved that the above situations do not exist.

    Theorem 1: In the proposed model, the path extension for the messages in set ?(mi,j) does not exacerbate the worst-case delay and does not lose the conflicts from the higher-priority messages.

    Proof: First, the worst case is discussed. The path extension does not allow messages to be transmitted in parallel since all of them occupy the same links. Owing to the conflicts introduced by other messages, when the delay of mi,jis analyzed, the start times of the higher-priority messages in?(mi,j) are unknown and can be any time. Thus, even though the paths are not extended, it is possible that the transmission times of the messages in ?(mi,j) do not overlap each other,i.e., they are serial. Therefore, the path extension does not exacerbate the worst case.

    Fig.5. Illustration of higher-priority message ma,b.

    Theorem 2: The generation time of mi,jis set to time 0, and the worst-case delay of mi,jis equal to the relative finish time of the last packet τσ+?bounded by a recursive function

    where

    and

    Proof: The finish time of a packet is equal to the finish time of its previous packet plus its own delay δ.

    First, the calculation in the subset {τ1,...,τσ} is explained.For the first packet τ1, its finish time is equal to its transmission time (see (8)). Then, for packet τk(2 ≤k ≤σ),the following two conditions correspond to the first two lines of δ(τk).

    Condition 1: k ≤σ and sk≤sk?1. If there is no other conflict outside Πi, τkshould be transmitted after τk?1in succession (as shown in Fig.6(a)). However, some external factors, such as the path outside Πiand the unknown relationship between the generation time of τkand transmission time of τk?1, may make τkmore delayed. This additional delay is called a gap (as shown in Fig.6(b)). When the gap length is less than (sk+e)/v, the time duration of τkoccupying l2overlaps the time duration of τk?1occupying l3.Thus, between τkand τk?1, no packet can be transmitted continuously on l2and l3. The gap can only be idle. In the worst case, the gap length is ((sk+e)/v)?ε, where ε approaches 0. If the gap length is greater ((sk+e)/v)?ε, then l2and l3can be used continuously, and a subsequent packet can be inserted. Although it is possible that due to the delays introduced by external factors the subsequent packets in S→(mi,j) cannot be inserted, the packets of mi,jcan be inserted because they do not have the path outside Πi. Therefore, the delay of δ(τk) is its transmission delay plus the worst-case gap.

    Fig.6. Illustration of Condition 1.

    Condition 2: k ≤σ and sk>sk?1. If the two packets can be transmitted in succession, the finish time of τkshould be Finish(τk?1)+ri×(sk+e)/v?(ri?1)×(sk?1+e)/v (as shown in Fig.7(a)). However, due to unknown conflict, there may be a gap (sk?1+e)/v?ε between the two packets (as shown in Fig.7(b)). Hence, the finish time of τkis

    Fig.7. Illustration of Condition 2.

    In Theorem 2, the impact of fragmentation and scheduling on the worst-case delay is formulated. Based on the theorem,we can prove Corollary 1 and Corollary 2. Then, the worstcase delay can be reduced by constructing a proper solution based on the two corollaries.

    Proof: First, we discuss S(mi,j) and Mi,j, respectively, and then consider the relationship between them.

    Algorithm 3 Joint algorithm Input: F, ?Mi,j?wi,j,g?Output: , →?=PriorityAssignment(F)1: ;2: = MSS; ;ˉsk=1 k ≤|→?|3: while do 4: fragment the -th message, denoted , into multiple packets of bytes;mi,jˉs k 5: for each do t=(j×pi) (j×pi+di ?si,j,g+e τi,j,g ∈Mi,j 6: for to do NoConflict(t,τi,j,g)v ×ri)7: if then wi,j,g=t 8: ; break;?τi,j,g ∈Mi,j 9: if is not scheduled then k?(mi,j)10: = the smallest ID in ;?g ∈[k,|→?|]g 11: , clear the injection times of the -th message; //*schedules roll back*//ˉs?=?12: ;ˉs<λ 13: if then 14: return FAIL;15: else k++16: ;?Mi,j?wi,j,g 17: return , ;

    VI. EVALUATION

    In this section, we evaluate the proposed algorithms based on extensive test cases. Three metrics are used in our evaluation: 1) schedulable ratio is the percentage of test cases for which an algorithm can find a feasible solution; 2) the number of packets is our objective as shown in 1); and 3)execution time is the time required to generate a feasible solution.

    The proposed joint algorithm (JA) and OMT-based method are compared with the following five methods: ME, ME+AD,ME+EN, JA-EN and BL.

    1) ME adopts the traditional Ethernet fragmentation and the earliest deadline first (EDF) scheduling algorithm [40].

    2) ME+AD is an extension of ME. If ME cannot schedule a test case under the initial MSS, ME+AD decreases the MSS by the same parameter ? as JA and re-schedules the test case.Repeat this process until the test case can be scheduled.

    3) ME+EN is also an extension of ME. The only difference between ME+EN and ME is that ME+EN enlarges the last packets of messages, while ME does not.

    4) JA-EN is the same as JA except that it does not enlarge the last packets.

    5) BL is a baseline for comparisons. To illustrate the efficiency of JA, an optimal result is needed. However, in an acceptable time, off-the-shelf solvers can only find optimal results for simple problems. Thus, when optimal results cannot be found, an approximately optimal result is needed,which is BL in our evaluations. When a schedulable ratio is considered, BL is defined as the percentage of test cases that satisfy the following necessary condition: if all port utilizations are not larger than 100%, the test case is schedulable. When the comparison metric is the number of packets, BL is the sum of packets that are fragmented by the traditional Ethernet fragmentation. Thus, BL is better than or equal to the optimal result. If the proposed algorithm is close to BL, it must be close to the optimal results.

    All algorithms are written in C and run on a Windows machine with a 2.5 GHz CPU and 8 GB of memory.

    All test cases are generated based on the parameters shown in Table I. Each test case includes n/2 switches and n/2 end systems. Each switch has 4 ports, one of which is connected to an end system, and the remaining ports can be connected to other switches. The switch-end system pairs are randomly located on a two-dimensional coordinate system. Then, the switches are traversed in increasing order of ID. For each switch, the free ports are connected to the nearest switches that still have free ports. To illustrate the universality of our algorithms, we do not limit the network topology. There are f flows. The flows randomly select their source and destination end systems. Routing paths are generated using the Dijkstra algorithm. To restrict the length of the hyperperiod, we adopt harmonic periods. Each period is a random number that is in the period range p and conforms to the expression 400 μs×2n,where n is a non-negative integer. Message sizes are random numbers in the message size range s. The deadline of a flow is also a random number in the range [pi/2,pi]. The transmission speed v=31 bytes/μs is measured in our simple prototype network such that the logical time of test cases can be mapped to the physical time. In the following comparisons, these parameters are changed and extensive test cases are generated to evaluate the efficiency and universality of the proposedalgorithm. In Section VI-A, we compare OMT with JA, ME and BL. Then, due to the long execution time of the OMT solver, in Section VI-B, except OMT, the other algorithms are fully evaluated.

    TABLE I PARAMETERS

    A. Evaluations With OMT

    The Microsoft solver Z3 [43] is invoked to solve the OMT specification. The time limit of Z3 is set as 600 s. To make test cases solvable, n=4 , f =4, and p={400 μs,800 μs} are set. The other parameters are shown in Fig.9 . For each parameter setting, 200 test cases are generated. Figs. 9 (a) and 9(b) show schedulable ratios and the number of packets normalized with BL, respectively. Since ME adopts traditional fragmentation, it does not introduce extra packets. However,the traditional algorithm has the worst schedulable ratio. OMT is not better than JA because Z3 cannot find optimal results for some test cases within the time limit. The schedulable ratio of JA is close to BL. This illustrates that JA can significantly improve the schedulability. Other than OMT, the other algorithms can finish execution within 10 ms. The execution time of OMT is shown in Fig.10. Most of the test cases can be solved by Z3 in 300 s. Once the execution time exceeds 300 s, it is difficult to solve these test cases in 600 s. The test cases in Fig.10 (b) have short execution times because they include the minimum number of packets, i.e., the minimum number of variables. Therefore, if a problem includes a small number of variables, OMT can be adopted to find optimal results; otherwise, JA is the best choice.

    Fig.10. Execution time of OMT.

    B. Evaluations Without OMT

    To fully evaluate the proposed algorithm, in the following,each parameter is changed over a larger range to generate test cases. The basic setting is shown in the caption of Fig.11.Then, Figs. 12–15 change the period parameter, size parameter, step value, and number of flows, respectively, to illustrate the efficiency and universality of JA. For each parameter setting, 2000 test cases are generated.

    Fig.11. Comparisons under varying n, p=[800 μs,6.4 ms] , s=[1461,5480],?=146, and f =n.

    Fig.12. Comparisons under varying n, p=[800 μs,12.8 ms], s=[1461,5480], ?=146, and f =n.

    Fig.13. Comparisons under varying n, p=[800 μss,6.4 ms], s=[1461,8760], ?=146, and f =n.

    Fig.14. Comparisons under varying n, p=[800 μs,6.4 ms], s=[1461,5480], ?=438, and f =n.

    Fig.15. Comparison under varying , p=[800 μs,6.4 ms], s=[1461,5480], ?=146, and n=20.

    Fig.11 shows the comparison with a varying the number of network nodes. The schedulable ratio decreases as the number of nodes increases. This is because the greater the number of nodes, the more difficult the scheduling becomes. ME+EN is better than ME. This is because ME makes more resource fragmentations unusable and cannot provide a long enough time duration to transmit no-wait packets. Fig.11 (b) shows the number of packets normalized with BL. ME and ME+EN are not shown since they both adopt the traditional fragmentation and have the same number of packets with BL.The larger the network, the longer the routing path. Thus,when n=60, to make flows schedulable, smaller packets are needed to improve the parallelism such that the delay introduced by the long path can be reduced. Therefore, the number of packets increases as n increases. Compared to ME,although JA introduces more packets, it still can find feasible solutions. This is because, in ME, different packet sizes cause excessive resource fragmentations. ME+AD uses many small packets to improve the parallelism. Thus, the schedulable ratio of ME+AD is slightly better than JA, but the number of packets of ME+AD is more than double that of JA. Therefore,in a network, if there are sufficient resources, the smaller MSS should be adopted to improve the real-time performance.Compared to JA, JA-EN causes more resource fragmentations. Hence, even though part of messages are fragmented into smaller packets to improve the parallelism,the schedulable ratio of JA-EN is still less than that of JA.

    The period range is extended to illustrate its effect on schedulable ratios and the number of packets, as shown in Fig.12. Compared to Fig.11(a), Fig.12(a) shows higher schedulable ratios because more time resources can be utilized to make flows satisfy real-time constraints. Then, since the real-time constraints are easily satisfied, messages do not need to be fragmented into small packets to reduce the delay. Thus,in Fig.12(b), the number of packets of JA is less than that in Fig.11(b). ME+AD makes full use of the time resources to improve the schedulability but results in too many packets.Compared to ME+AD, JA not only guarantees the requirements of deterministic communications but also reserves more resources for best-effort communications.

    In Fig.13, the message size is larger than that of other figures. Since large messages are difficult to schedule, the schedulable ratios in Fig.13(a) are low. Compared to JA,although ME+AD improves the schedulable ratio by 3%, it consumes more than twice the resources. JA-EN is close to JA because large messages can be fragmented into more packets so that JA-EN searchs fesabile solutions in a larger solution space. When n ≥50, no algorithm can schedule test cases, not even BL. Therefore, in real applications, the periods and deadlines of large messages must be extended to make them schedulable, as illustrated in Fig.12.

    In Fig.14, ? is increased. Messages cannot be fragmented into small pieces. Both the schedulable ratio and the number of packets are reduced. Other than ?, if the other parameters are changed, test cases are changed accordingly. Only ? is independent of test cases. Therefore, when given a real network, we can adjust ? to trade off between the schedulable ratio and the number of packets.

    Fig.15 shows the comparison under varying f. As f increases, the increased packets make more test cases unschedulable, and thus the schedulable ratio decreases. The number of packets increases slowly, because the test cases that contain more packets are unschedulable, and these unschedulable test cases are not included in the figure. When there are not many flows, the schedulable ratio of ME+EN is significantly higher than that of ME. Therefore, ME+EN is an efficient method for low-load test cases.

    VII. CONCLUSIONS

    In this paper, to improve the real-time performance of networked control systems, the joint problem of message fragmentation and no-wait scheduling is explored. First, an OMT specification is proposed and then an off-the-shelf solver utilized to find its optimal solution. However, the OMT-based algorithm is limited by the execution time of the off-the-shelf solver. Then, to improve the scalability of our algorithm, a heuristic algorithm is proposed. The algorithm constructs low-delay fragmentation and schedules based on the message delay analysis. Finally, extensive test cases are conducted to evaluate the proposed algorithms. The results indicate that the proposed joint algorithm outperforms existing ones. In the future, we will implement a TSN switch based on FPGA and evaluate our algorithms in a real TSN.

    APPENDIX SYMBOL

    99热网站在线观看| 丝瓜视频免费看黄片| 午夜免费鲁丝| 国精品久久久久久国模美| 一区二区三区精品91| 视频区图区小说| 免费人妻精品一区二区三区视频| 国产精品一区二区在线观看99| 99热6这里只有精品| 毛片女人毛片| 女性被躁到高潮视频| 好男人视频免费观看在线| 视频中文字幕在线观看| 久久99热这里只频精品6学生| 中文精品一卡2卡3卡4更新| 日韩制服骚丝袜av| 日韩欧美 国产精品| 亚洲经典国产精华液单| 久久久久久久久久久免费av| 欧美日本视频| 免费黄网站久久成人精品| 少妇人妻精品综合一区二区| 亚洲高清免费不卡视频| 日韩欧美精品免费久久| 美女福利国产在线 | 亚洲精品日韩av片在线观看| 女人久久www免费人成看片| 观看免费一级毛片| 国产精品蜜桃在线观看| 韩国av在线不卡| 国产一级毛片在线| 五月天丁香电影| 免费观看的影片在线观看| 麻豆精品久久久久久蜜桃| 91精品国产九色| 建设人人有责人人尽责人人享有的 | 高清在线视频一区二区三区| 联通29元200g的流量卡| 男女无遮挡免费网站观看| 国产成人a∨麻豆精品| 丰满迷人的少妇在线观看| 免费观看性生交大片5| 啦啦啦中文免费视频观看日本| 久久韩国三级中文字幕| 综合色丁香网| 久久久久久伊人网av| 日韩不卡一区二区三区视频在线| 久久女婷五月综合色啪小说| 国产色婷婷99| 国产无遮挡羞羞视频在线观看| 下体分泌物呈黄色| 日本爱情动作片www.在线观看| 亚洲av男天堂| 丰满乱子伦码专区| av在线蜜桃| 国产一级毛片在线| 国产乱人偷精品视频| 中文字幕亚洲精品专区| 直男gayav资源| 99热这里只有精品一区| 久久精品国产a三级三级三级| 高清欧美精品videossex| 简卡轻食公司| 男人爽女人下面视频在线观看| 久久久色成人| 高清av免费在线| 国产伦精品一区二区三区视频9| 3wmmmm亚洲av在线观看| 国产伦精品一区二区三区视频9| 在线观看国产h片| 精品久久久久久久久亚洲| 欧美亚洲 丝袜 人妻 在线| av国产免费在线观看| 国产熟女欧美一区二区| av专区在线播放| 综合色丁香网| 久久青草综合色| 日日摸夜夜添夜夜爱| 国产亚洲91精品色在线| 精品国产露脸久久av麻豆| 欧美精品人与动牲交sv欧美| 日韩av不卡免费在线播放| 午夜免费男女啪啪视频观看| 少妇高潮的动态图| 大话2 男鬼变身卡| 精品久久久噜噜| 欧美老熟妇乱子伦牲交| 亚洲性久久影院| 久久av网站| 高清在线视频一区二区三区| 国产色爽女视频免费观看| 久久国产精品男人的天堂亚洲 | 亚洲精品456在线播放app| 成人二区视频| 国产在视频线精品| 欧美成人一区二区免费高清观看| 黄色视频在线播放观看不卡| 国产精品99久久99久久久不卡 | 欧美高清成人免费视频www| 亚洲三级黄色毛片| 国产黄片美女视频| 亚洲性久久影院| 人体艺术视频欧美日本| 伦理电影大哥的女人| 天天躁夜夜躁狠狠久久av| 久久人人爽av亚洲精品天堂 | 老熟女久久久| 精品99又大又爽又粗少妇毛片| 成年人午夜在线观看视频| 国产69精品久久久久777片| 狂野欧美白嫩少妇大欣赏| 亚洲国产成人一精品久久久| 亚洲欧美一区二区三区国产| 久久久久人妻精品一区果冻| 国产免费福利视频在线观看| 欧美日韩综合久久久久久| 日韩,欧美,国产一区二区三区| 人妻一区二区av| 成年美女黄网站色视频大全免费 | 亚洲精品乱码久久久久久按摩| 欧美97在线视频| 亚洲性久久影院| 国产亚洲5aaaaa淫片| 国产午夜精品久久久久久一区二区三区| 十八禁网站网址无遮挡 | 老女人水多毛片| 国产淫片久久久久久久久| 特大巨黑吊av在线直播| 美女视频免费永久观看网站| 最近的中文字幕免费完整| 亚洲成人中文字幕在线播放| 99久久精品热视频| 99久久人妻综合| 亚洲国产精品成人久久小说| 亚洲av中文av极速乱| 亚洲国产精品国产精品| 欧美日韩视频高清一区二区三区二| 哪个播放器可以免费观看大片| 熟女电影av网| 熟女人妻精品中文字幕| 成人免费观看视频高清| 涩涩av久久男人的天堂| 国产美女午夜福利| 啦啦啦中文免费视频观看日本| 国产成人精品婷婷| 汤姆久久久久久久影院中文字幕| .国产精品久久| 亚洲精华国产精华液的使用体验| 又黄又爽又刺激的免费视频.| 欧美日韩亚洲高清精品| 黄色视频在线播放观看不卡| 午夜福利视频精品| 噜噜噜噜噜久久久久久91| 国产精品秋霞免费鲁丝片| 人人妻人人澡人人爽人人夜夜| 精品久久久噜噜| 特大巨黑吊av在线直播| 女性被躁到高潮视频| 久久人人爽人人爽人人片va| 26uuu在线亚洲综合色| 成人午夜精彩视频在线观看| 国产精品蜜桃在线观看| 日本黄色片子视频| 免费久久久久久久精品成人欧美视频 | 久久精品人妻少妇| 色综合色国产| 亚洲av成人精品一区久久| 欧美成人精品欧美一级黄| 欧美xxxx黑人xx丫x性爽| 能在线免费看毛片的网站| 一二三四中文在线观看免费高清| 一本—道久久a久久精品蜜桃钙片| 国产 一区精品| 汤姆久久久久久久影院中文字幕| 日本黄大片高清| 久久久久久久久久人人人人人人| 在线精品无人区一区二区三 | 亚洲激情五月婷婷啪啪| 一级毛片黄色毛片免费观看视频| 高清视频免费观看一区二区| 国产淫语在线视频| 久久国产精品男人的天堂亚洲 | 久久99热这里只频精品6学生| 少妇裸体淫交视频免费看高清| 啦啦啦在线观看免费高清www| a级毛色黄片| 久久影院123| 日韩av免费高清视频| 免费播放大片免费观看视频在线观看| 中文欧美无线码| 日本av免费视频播放| 国产无遮挡羞羞视频在线观看| 少妇猛男粗大的猛烈进出视频| 美女脱内裤让男人舔精品视频| 一级黄片播放器| 最近最新中文字幕免费大全7| 中国美白少妇内射xxxbb| 男女国产视频网站| 免费看不卡的av| 久久综合国产亚洲精品| 国产精品一区二区性色av| 成年av动漫网址| 久久久久人妻精品一区果冻| 22中文网久久字幕| 日韩视频在线欧美| 在线 av 中文字幕| 99热网站在线观看| videos熟女内射| 日日撸夜夜添| 各种免费的搞黄视频| 国精品久久久久久国模美| 久久久色成人| 99热这里只有精品一区| 久久久久久久亚洲中文字幕| 色综合色国产| 日本av免费视频播放| 久久影院123| 少妇 在线观看| 在线观看免费视频网站a站| 国产av精品麻豆| 国产一区二区在线观看日韩| 天堂8中文在线网| 国精品久久久久久国模美| 亚洲精品中文字幕在线视频 | 麻豆乱淫一区二区| 最近最新中文字幕大全电影3| 国产在线免费精品| 日日啪夜夜撸| 久久久国产一区二区| 日韩欧美精品免费久久| 免费看av在线观看网站| 免费看不卡的av| 寂寞人妻少妇视频99o| 日韩精品有码人妻一区| 久久国产亚洲av麻豆专区| 晚上一个人看的免费电影| 久久亚洲国产成人精品v| 国产永久视频网站| 亚洲av男天堂| 国产成人a∨麻豆精品| 51国产日韩欧美| 亚洲人成网站在线观看播放| 免费观看在线日韩| 欧美日韩综合久久久久久| .国产精品久久| 黄色配什么色好看| 最近中文字幕2019免费版| 日产精品乱码卡一卡2卡三| 精品久久久久久电影网| 人人妻人人添人人爽欧美一区卜 | 国产成人精品一,二区| 国产白丝娇喘喷水9色精品| 国产真实伦视频高清在线观看| 深爱激情五月婷婷| 在线免费观看不下载黄p国产| 国产亚洲av片在线观看秒播厂| 人人妻人人澡人人爽人人夜夜| 五月伊人婷婷丁香| 欧美zozozo另类| 亚洲精品中文字幕在线视频 | 国产精品久久久久久久久免| 国产精品不卡视频一区二区| 国产乱人视频| 夫妻午夜视频| 简卡轻食公司| 中文字幕久久专区| 日本-黄色视频高清免费观看| 国产午夜精品久久久久久一区二区三区| 久久久久视频综合| 欧美zozozo另类| 极品教师在线视频| 80岁老熟妇乱子伦牲交| 成人免费观看视频高清| 国产精品av视频在线免费观看| 在线观看三级黄色| 天天躁日日操中文字幕| 午夜老司机福利剧场| 我要看黄色一级片免费的| 在现免费观看毛片| 国产精品熟女久久久久浪| 国产免费一区二区三区四区乱码| 精品少妇久久久久久888优播| 嫩草影院入口| 国产高清三级在线| 美女中出高潮动态图| 蜜桃在线观看..| 五月开心婷婷网| 欧美日韩一区二区视频在线观看视频在线| 亚洲av日韩在线播放| 欧美精品一区二区免费开放| 国产 一区精品| 日韩三级伦理在线观看| 狂野欧美激情性xxxx在线观看| 秋霞在线观看毛片| 高清视频免费观看一区二区| 欧美日韩视频精品一区| 国产成人a∨麻豆精品| 亚洲国产毛片av蜜桃av| 大话2 男鬼变身卡| 久久久久人妻精品一区果冻| 亚洲成人一二三区av| 中文字幕免费在线视频6| 欧美日韩一区二区视频在线观看视频在线| 国产国拍精品亚洲av在线观看| 一级二级三级毛片免费看| 热99国产精品久久久久久7| 夜夜爽夜夜爽视频| 亚洲精品亚洲一区二区| 久久综合国产亚洲精品| 国产精品伦人一区二区| 蜜桃在线观看..| 搡女人真爽免费视频火全软件| 国产人妻一区二区三区在| 久久精品国产亚洲av涩爱| www.色视频.com| 国产美女午夜福利| 三级经典国产精品| 国产精品人妻久久久影院| 久久人人爽人人片av| 国产亚洲av片在线观看秒播厂| 国产免费福利视频在线观看| 搡老乐熟女国产| 日日啪夜夜爽| 国产av码专区亚洲av| 亚洲国产欧美人成| 国产一级毛片在线| 你懂的网址亚洲精品在线观看| 自拍欧美九色日韩亚洲蝌蚪91 | 亚洲av综合色区一区| 色综合色国产| 日本猛色少妇xxxxx猛交久久| 丝袜脚勾引网站| 精品少妇黑人巨大在线播放| 亚洲欧洲国产日韩| 春色校园在线视频观看| 少妇精品久久久久久久| 大陆偷拍与自拍| 一本色道久久久久久精品综合| 国产精品熟女久久久久浪| 99久久精品一区二区三区| 日本与韩国留学比较| 嫩草影院入口| av专区在线播放| 亚洲国产av新网站| 色婷婷久久久亚洲欧美| 欧美日本视频| 欧美日韩精品成人综合77777| 亚洲va在线va天堂va国产| 久久av网站| 一区二区av电影网| 国产亚洲精品久久久com| 欧美老熟妇乱子伦牲交| av在线观看视频网站免费| 一本久久精品| 亚洲丝袜综合中文字幕| 日本色播在线视频| 97热精品久久久久久| 国产精品国产av在线观看| 观看av在线不卡| 国内精品宾馆在线| 国产伦精品一区二区三区四那| av网站免费在线观看视频| 在线观看美女被高潮喷水网站| 最近最新中文字幕大全电影3| 欧美精品一区二区免费开放| 18禁在线无遮挡免费观看视频| 欧美高清成人免费视频www| 国产成人91sexporn| 我要看黄色一级片免费的| 欧美变态另类bdsm刘玥| 黄片无遮挡物在线观看| 最近手机中文字幕大全| 在线播放无遮挡| 亚洲精品乱久久久久久| 少妇人妻精品综合一区二区| 99热这里只有精品一区| 中文字幕av成人在线电影| 97热精品久久久久久| 国产免费又黄又爽又色| 亚洲怡红院男人天堂| 久久精品久久久久久久性| 少妇高潮的动态图| 99久久中文字幕三级久久日本| 久久久久性生活片| 91精品一卡2卡3卡4卡| 国内揄拍国产精品人妻在线| 久久久久网色| 免费看光身美女| 黑人高潮一二区| 亚洲精品国产av蜜桃| 插逼视频在线观看| 日韩大片免费观看网站| 日韩一区二区三区影片| 国产有黄有色有爽视频| 搡老乐熟女国产| 成年av动漫网址| 欧美亚洲 丝袜 人妻 在线| 日韩欧美精品免费久久| 赤兔流量卡办理| 久久久成人免费电影| 国产精品99久久99久久久不卡 | 少妇被粗大猛烈的视频| 国产亚洲精品久久久com| 久久av网站| 国产精品国产三级国产av玫瑰| 三级国产精品片| 成年美女黄网站色视频大全免费 | av.在线天堂| 成人18禁高潮啪啪吃奶动态图 | 国产精品一及| 欧美xxxx性猛交bbbb| 伊人久久精品亚洲午夜| 18禁裸乳无遮挡动漫免费视频| 欧美丝袜亚洲另类| 午夜免费观看性视频| 亚洲真实伦在线观看| 国内精品宾馆在线| 免费黄色在线免费观看| 一级毛片aaaaaa免费看小| 国产免费福利视频在线观看| 日本爱情动作片www.在线观看| 99久久精品一区二区三区| 18禁裸乳无遮挡动漫免费视频| 美女高潮的动态| 亚洲精品aⅴ在线观看| 亚洲精品久久午夜乱码| 久久精品熟女亚洲av麻豆精品| 日韩精品有码人妻一区| 成年免费大片在线观看| 肉色欧美久久久久久久蜜桃| 国产精品女同一区二区软件| 性色av一级| 日韩av不卡免费在线播放| 少妇猛男粗大的猛烈进出视频| 中文资源天堂在线| 美女国产视频在线观看| 男人狂女人下面高潮的视频| 永久免费av网站大全| 久久韩国三级中文字幕| 午夜免费观看性视频| 亚洲精品色激情综合| 女的被弄到高潮叫床怎么办| 国产女主播在线喷水免费视频网站| 一区二区三区乱码不卡18| 久久久久久久久久成人| a级毛片免费高清观看在线播放| 热re99久久精品国产66热6| 婷婷色麻豆天堂久久| 麻豆成人午夜福利视频| 全区人妻精品视频| av卡一久久| 亚洲av成人精品一区久久| 交换朋友夫妻互换小说| 制服丝袜香蕉在线| 好男人视频免费观看在线| 亚洲最大成人中文| 国产精品爽爽va在线观看网站| 一个人免费看片子| 国内揄拍国产精品人妻在线| 国产视频内射| 中文字幕av成人在线电影| 亚洲av免费高清在线观看| 肉色欧美久久久久久久蜜桃| 王馨瑶露胸无遮挡在线观看| 五月开心婷婷网| 免费观看性生交大片5| 伦精品一区二区三区| 狂野欧美激情性xxxx在线观看| 日韩电影二区| 99热网站在线观看| 内地一区二区视频在线| 亚洲精品,欧美精品| 国产中年淑女户外野战色| 亚洲av欧美aⅴ国产| 亚洲成人手机| 国产在线免费精品| 久久久久久久精品精品| 蜜桃在线观看..| av一本久久久久| 美女中出高潮动态图| 啦啦啦在线观看免费高清www| 国产亚洲av片在线观看秒播厂| 日韩不卡一区二区三区视频在线| 欧美日韩亚洲高清精品| 免费人妻精品一区二区三区视频| 国产成人aa在线观看| 在线看a的网站| 免费观看的影片在线观看| 欧美区成人在线视频| 欧美成人一区二区免费高清观看| 一个人看的www免费观看视频| 国产av国产精品国产| 赤兔流量卡办理| 免费久久久久久久精品成人欧美视频 | 国产女主播在线喷水免费视频网站| 欧美性感艳星| 久久毛片免费看一区二区三区| 一级片'在线观看视频| 新久久久久国产一级毛片| 视频区图区小说| 婷婷色av中文字幕| 亚洲美女黄色视频免费看| 亚洲欧美日韩另类电影网站 | 亚洲av男天堂| 国产乱人偷精品视频| 最新中文字幕久久久久| 性色av一级| 亚洲欧美精品专区久久| 韩国高清视频一区二区三区| 久久精品久久久久久噜噜老黄| 在线免费十八禁| 你懂的网址亚洲精品在线观看| 日韩免费高清中文字幕av| 免费观看在线日韩| av不卡在线播放| 成人免费观看视频高清| 91久久精品国产一区二区成人| 亚洲中文av在线| 免费观看无遮挡的男女| 国产成人午夜福利电影在线观看| 97在线视频观看| 老师上课跳d突然被开到最大视频| 七月丁香在线播放| 中文在线观看免费www的网站| 中国三级夫妇交换| 亚洲三级黄色毛片| 久久久国产一区二区| av专区在线播放| 国产精品三级大全| 久久久精品免费免费高清| 自拍欧美九色日韩亚洲蝌蚪91 | 国产精品人妻久久久久久| 成人漫画全彩无遮挡| 亚洲久久久国产精品| 18禁在线播放成人免费| 欧美高清成人免费视频www| 中国国产av一级| 日韩国内少妇激情av| 欧美zozozo另类| 人人妻人人澡人人爽人人夜夜| 欧美性感艳星| 不卡视频在线观看欧美| av网站免费在线观看视频| 亚洲欧美中文字幕日韩二区| 制服丝袜香蕉在线| 黄色视频在线播放观看不卡| 亚洲精品视频女| 国产精品久久久久久精品古装| 精华霜和精华液先用哪个| 午夜精品国产一区二区电影| 欧美日韩在线观看h| 在线亚洲精品国产二区图片欧美 | 日日摸夜夜添夜夜添av毛片| 国产黄片视频在线免费观看| 亚洲av二区三区四区| 亚洲欧美清纯卡通| 大话2 男鬼变身卡| 少妇人妻精品综合一区二区| 欧美精品一区二区免费开放| 国产欧美日韩一区二区三区在线 | 亚洲最大成人中文| 欧美一区二区亚洲| 伊人久久精品亚洲午夜| 午夜福利视频精品| 午夜福利在线观看免费完整高清在| 黄色视频在线播放观看不卡| 自拍偷自拍亚洲精品老妇| 纯流量卡能插随身wifi吗| 国产成人免费观看mmmm| tube8黄色片| 十分钟在线观看高清视频www | 麻豆精品久久久久久蜜桃| 欧美日韩视频精品一区| 国产深夜福利视频在线观看| 最近最新中文字幕免费大全7| 日韩电影二区| 久久久久人妻精品一区果冻| 久久鲁丝午夜福利片| 一区二区三区四区激情视频| 美女脱内裤让男人舔精品视频| 久久国内精品自在自线图片| 日韩一本色道免费dvd| 色视频www国产| 精品国产三级普通话版| 国产 一区 欧美 日韩| 大码成人一级视频| 午夜免费男女啪啪视频观看| 久久久久久久精品精品| 国产高清不卡午夜福利| 国产淫片久久久久久久久| 在线观看免费日韩欧美大片 | 色哟哟·www| 99re6热这里在线精品视频| videossex国产| 男的添女的下面高潮视频| 欧美3d第一页| 高清日韩中文字幕在线| 久久久精品免费免费高清| 校园人妻丝袜中文字幕| 女性生殖器流出的白浆| 热99国产精品久久久久久7| 国产黄色免费在线视频| 99热这里只有精品一区| 国产一区亚洲一区在线观看| 午夜免费观看性视频| 国产综合精华液| av福利片在线观看| 麻豆成人午夜福利视频| 日本av免费视频播放| 精品人妻一区二区三区麻豆| 亚洲国产欧美在线一区| 久久av网站| 男男h啪啪无遮挡| 亚洲成人av在线免费| 人妻少妇偷人精品九色|