• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Functional safety verification and performance measurement of train-train communication link

    2021-12-21 13:34:36LINJuntingXUQianCHENYong

    LIN Junting, XU Qian, CHEN Yong

    (1. School of Automation and Electrical Engineering, Lanzhou Jiaotong University, Lanzhou 730070, China;2. School of Electronic and Information Engineering, Lanzhou Jiaotong University, Lanzhou 730070, China)

    Abstract: The short-range wireless communication technology has advanced considerably and provides the feasibility of train-train (T2T) communication link in the communication-based train control system. The introduction of the T2T link would reduce the headway and improve operational efficiency. Formal methods are system design techniques that use rigorously specified mathematical models to ensure all behaviors work as expected. And it is exactly the functional safety verification needed. Therefore, to deal with the functional safety verification of the T2T link, an untimed colored petri net model is first constructed. Secondly, the verification process is performed. Conclusions can be drawn from the state space report and the computation tree logic queries. Lastly, the model is parameterized, and then data log files are obtained for further performance measurement. Results show that the proposed criteria are satisfied and there are no defects in the basic design requirements. The transmission delay has considered the reconnection, transmission errors and the interruption. The probability of the delay lower than 150 ms accounts for 98.106%, which meets the specification and the previous field test.

    Key words: functional safety; formal methods; colored Petri net (CPN); state space analysis; performance measurement

    0 Introduction

    Communication-based train control (CBTC) system is the mainstream signaling system in metro lines. The traditional CBTC system is ground-centric. Movement authority is transferred from the zone controller to trains. There was no direct train-train (T2T) communication link. Studies on the addition of T2T represent a growing field. T2T was initially designed for the train collision-avoidance system only for emergency scenarios[1-2]. In recent years, the train-centric CBTC system[3-4]is proposed and under development. T2T has brought more concerns. Urbalis Fluence[5]offered by Alstom was the first solution. It regards the T2T link as the main access that simplifies the wayside facilities.

    A high performance, safe and stable T2T link is urgent to be verified. Device-device (D2D) technique provides the technical support for the T2T link. Ref.[6] modeled the long term evolution-for metro (LTE-M) with deterministic and stochastic Petri nets to evaluate the system reliability. Ref.[7] utilized the stochastic network calculus method to evaluate the D2D performance for high-speed railway.

    Along with the software-intensive systems become popular, the traditional fail-safe concept is transformed into a generalized safety concept with probabilistic characteristics, and the safety goal is altered into functional safety. Functional safety is defined as part of the overall safety and depends on the functional physical units operating correctly in response to their inputs. Essentially, it is reflected by the functional control logic of the system design. Ref.[8] reviewed the formal method in the trustworthy construction of CBTC. Formal methods have rigorous mathematical specifications that allow getting rid of ambiguities, and the mathematical proof covers the possible behaviors exhaustively whereas tests are only samples.

    Colored Petri net (CPN) is a discrete-event formal modeling language, which integrates the classic Petri nets with the functional programming language[9]. CPN has been applied in the field of reliability and safety engineering. Ref.[10] performed the scenario modeling of a satellite-based train control system by CPN. So did the safety communication protocol in Ref.[11], the reliability of the train-ground data communication system in Ref.[12], and the hazard identification of temporary speed restriction scenarios in Ref.[13]. Inspired by the former literatures, this paper intend to implement the functional safety verification and performance measurement of the T2T link by CPN and CPN-Tools.

    In this paper, firsly, whether D2D is feasible for providing the T2T link is analyzed, and a brief introduction of CPN is gived. Secondly, a non-timed CPN model of the T2T link is constructed. Interaction simulation is used to check the syntactic and semantic errors. Thirdly, to perform the functional safety verification, we verify the standard properties shared by all CPN models and the specific properties proposed for our subject. Finally, to perform performance measurement, the corresponding monitors are available for collecting data.

    1 Feasibility analysis of T2T implemented by D2D technique

    D2D makes the adjacent terminals directly communicate without base stations. D2D supports the internet of things. One of the typical scenarios is vehicle-to-vehicle (V2V) communication in the intelligent transportation field.As the increasing application of LTE-M, D2D offers the potential technical support for the T2T link in metro lines. The metro operation pursuits to shorten the headway at relatively low speed (80 km/h-120 km/h). According to Ref.[14], for a train with a weight of 330 t at the initial speed of 80 km/h, the braking distance is 400 m. The detection range of D2D is from 10 m-1 000 m, which meets the regular braking distance. Additionally, D2D can achieve a maximum data rate of 1 Gb/s that can satisfy the information load demands.

    In the train-centric CBTC, the establishment of the T2T link is based on the front train recognition. So the process of front train recognition here is assumed to have already taken place. Besides, the allocation of channel resources and power control is critical and generally researched by other simulation methods, so they are not taken into account in the model construction. As can be seen from Fig.1, the message sequence chart of the T2T link achieved by D2D is proposed as a modeling basis. The local train sends the detecting request. Once there are trains in front of the local train and the front train recognition has taken place, the local train would keep real-time communication with the front train.

    Fig.1 Message sequence chart of T2T link

    2 Model of T2T link with CPN

    2.1 Colored Petri net

    The formal definition of the non-hierarchical CPN introduced in Ref.[9] is presented in Eq.(1).

    CPN=(P,T,A,∑,V,C,G,E,I).

    (1)

    1) Tuples related to the places

    Pis a finite set of places. Places drawn as ellipses are used to represent the state of the system to be analyzed. Places are marked with some tokens (shown in a small green circle) and each token is attached with a data value called the token color. The tokens on a specific place constitute the marking of that place.

    ∑ is a finite set of non-empty color sets. The finite set of token colors depends on the types of places called color set.

    C:P→∑ is a color set function that assigns a color set to each place;

    I:P→EXPRφis an initialization function that assigns an initialization expression to each placep.

    2) Tuples related to the transitions

    Tis a finite set of transitions. Transitions drawn as rectangular boxes represent the occurring events. The inscriptions of the transition are used to manipulate and select the tokens that can be move around. When a transition is enabled, it removes the tokens from its input places and adds them to its output places.

    G:A→EXPRVis a guard function that assigns a guard to each transitiont;

    3) Tuples related to the arcs

    Arepresents a finite set of directed arcs.A∈P∩T=P∩A=φ;

    E:A→EXPRVis an arc expression function that assigns an arc expression to each arcasuch thatType[E(a)] =C(p)MS, wherepis the place connected to the arca;

    Vis a finite set of typed variables thatType[v] ∈∑ for all variablesv∈V.

    2.2 Non-timed CPN models for T2T link

    CPN Tools is a software for editing, simulating and analyzing CPN models. Color sets and variables are declared as depicted in Fig.2. The color sets are of enumerate type with the keyword “with”. Status is used to describe the four states, i.e., IDLE (the initial state where the local train is not connected), WAIT (the local train is waiting to connect with the front train), SR (the local train sends the link request), FR (feedback response). PACK is used to specify the three states of the T2T link. “FULL” represents that the packets are transmitted completely. “PART” represents that the packet is lost partially or disordered. “NULL” represents all packet is lost. The result would reflect whether the link is established or not. Variables belong to the specified color set.

    Fig.2 Declarations of color sets and variables

    The CPN model of the T2T link is demonstrated in Fig.3. Tokens can flow within the net structures to model dynamic behaviors. Via the simulator in CPN tools, accuracy can be checked.

    Fig.3 CPN model of T2T communication link

    1) The left part of the model is to detect whether the front trains are ahead of the planned route. The tokens are transmitted from the place SystemStatus to the transition Start to detect. Detecting results are reflected by the place Detecting Results. The arc expression of the one branch is“1`SUCCESS”, indicating there are probably trains ahead of the route. The other branch is “1`FAIL”, indicating there is no front train. Given the transition Detected is enabled, the tokens would be transferred into the place Connect Reliable. Arc expression is “1`SUCCESS” by default.

    2) The middle part is to model the status of the on-board wireless communication system. The output and input arc expressions of the transition Online are both “1`SUCCESS”, which indicates that the tokens can flow to the place Connected. Consequently, the place SystemStatus changes from “WAIT” to “SR”. The transition Send Request is fired, and the local train sends a link request to its front train.

    3) The right part is to model the data transmission. The local train’s transmitter (represented by the place Transmitter 1) transmits the “MSG” to the front train’s receiver (represented by the place Receiver 2). Furthermore, the state of the link is set to be full (represented by the transition Full_trans). Then the front train confirms (represented by the transition Acknowledge). The link state of the front train to the local train is set to be random. The front train’s transmitter (represented by the Transmitter 2) sends the response to the local train. In general, there is a 3-way handshake key agreement protocol with message authentication and a period key-updating protocol in the data transmission procedure.

    4) Thenormal transmission (represented by transition Full_trans_1), the completely lost (by Data_full_loss) and the partially lost (by Data_part_loss&Error) are separately connected with the transitions Distance Updated, Feedback Results and Link Reconnect after Interruption. Taken the condition that the data is partially lost as an example, the token on the place Receiver1 is “1`PART”, and then it is transferred into the transition Feedback Results. One branch is to reflect its state to place Connected. The other branch is to place SystemStatus. Then the results are transferred to the transition Feedback Results.

    Both the simulation and testing of a CPN model are implemented by model execution. It is found that the token flow accurately in the net structure. Simulation is suitable for detecting errors and obtaining increased confidence in the correctness of a system. However, since it cannot be guaranteed that the simulations cover all possible executions, so it cannot be used to ensure this with 100% certainty. Therefore, the state-space analysis, one of the formal analysis methods, is performed in the following section.

    3 Functional safety verification

    3.1 Verification of standard properties

    State space covers all possible executions of the system under consideration. It can be used to verify, i.e., prove in the mathematical sense that the system possesses a certain formally specified property.

    Through the state space calculator from CPN-Tools, the standard state-space report is generated. Statistics are shown in Fig.4.

    Fig.4 Statistics of CPN model

    Status “Full” manifests that all available states in the state space are calculated. There are 16 nodes and 19 arcs, where the nodes correspond to the set of reachable markings while the arcs correspond to occurring binding elements. A strongly-connected-components graph (SCC graph) is derived from the graph structure of the state space. The nodes in the SCC graph are subgraphs, called strongly connected components (SCCs), and are obtained by making a disjoint division of the nodes in the state space such that two nodes are in the same SCC if and only if they are mutually reachable. The model has one node in terms of SCC Graph.

    Fig.5 is a complete reachability graph of the model in Fig.3. A node descriptor in the rectangle shows the nodes’ markings, whose format is “PageName `PlaceName 1:token”. Similarly, an arc descriptor describes the binding element associated with the arc, whose format is “ArcNumber: NodeName-> NodeName PageName `TransitionName 1:{ }”.

    Fig.5 Reachability graph of overall model

    A home marking can be reached from any reachable marking. Home properties show that all markings are home markings. The results are desirable because there is one node in SCCs graph that all nodes (represent the marking) are mutually reachable.

    Liveness properties express that there are none dead markings and one dead transition instance (transition Offline). The rest of the transitions are “l(fā)ive”. Dead markings reflect the termination of the system operation and the unavailability of further subsequent actions. Dead transitions refer to the transitions that do not appear in any of the binding elements. As seen from Fig.7, there are none dead markings, which means that the model would not be terminated in the finite number of simulation steps. It also means the D2D radio set would not be offline that explains why the transition Offline is dead.

    Fig.6 Home properties and liveness properties

    Fig.7 Liveness properties

    The fairness properties give information about how often transitions occur in infinite occurrence sequences. As shown in Fig.7, the impartial transition instance is none. A transition is impartial if it occurs infinitely often in all infinite occurrence sequences. Therefore, the results show there are no infinite occurrence sequences, which is desirable as expected.

    3.2 Verification of specific properties

    Common design flaws can be excluded by those standard properties, such as no deadlock, live-lock. Other properties also need to be investigated aimed at the target problems of the specific application.

    Criterion 1: The system to be analyzed is required to work in a particular state. The criterion reflected in the CPN model is that there is always only one token in the place SystemStatus.

    It is verified by the boundedness shown in Fig.8. The best upper integer bound of a place specifies the maximal number of tokens that can reside on that place in any reachable marking. The best upper bound integer indicates that the maximum number of tokens in the place SystemStatus is one. So is the best lower bound integer. Therefore, it can be summarized that the model’s operation meets the expected behavior.

    Fig.8 Best integer bounds

    Criterion 2: After the connection link is established, the distance information shall be updated timely, i.e., verify whether a certain state of the system can turn into a required state and find which of transitions can trigger it. It is a fundamental feature of functional safety verification. The criterion reflected in the CPN model is that the relevant nodes containing token “1`SR” are found.

    SearchNodes is the primary function traversing the state space. PredNodes and EvalNodes are the abbreviations of SearchNodes functions. Analogously, SearchArcs, PredArcs and EvalArcs traverse the arcs of the state space. Computation tree logic (CTL) queries are written as Fig.9.

    Fig.9 Queries for criterion 2

    “Operation (SR)” returns to all the nodes with token “1`SR”. Parallel arcs that can be transferred from other nodes to that node also need to be enumerated.

    The “Evaluate ML” tool is used to evaluate the queries and the results are shown in Fig.10. It is found that node 6 contains the required “1`SR” (sends the communication request). Three parallel arcs, i.e., arc 18, arc 17, arc 6, are connected to node 6.

    Fig.10 Queries results of criterion 2

    As Fig.11 depicted, details of the nodes and marking can be further obtained. By “display a partial SS” tool, node 6 is first obtained and then its predecessors and successors. Node 6 has the form as 3∶1, i.e., the number of predecessors and successors. Consequently, its predecessors (node 15, node 14, node 5) and its successor (node 7) are obtained. From Fig.11, the token “1 `SR” can be sent from the transition Feedback Results (node 15), Distance Updated (node 14) and Online (node 5).

    Fig.11 Fragment of reachability graph for criterion 2

    Criterion 3: Once the disconnection occurs, the system should attempt to re-establish the connection and continue to detect the front train. The criterion reflected in the CPN model is that judge whether a particular state can be transferred to another. More specifically, after the Receiver1 obtains the token “1`NULL” (meaning that the link breaks down), it should be judged whether the place SystemStatus turns into “1`SR” (Send the request).

    The CTL queries achieve the above purpose shown in Fig.12. We defined the function “Dataloss” for the place Receiver1 and the function “Operating” for the place SystemStatus. “List.nth(Dataloss(NULL),0)” is the function for the variable Source (represents the source node), which will return to the node where place Receiver1 has the token “1`NULL”. Meanwhile, the variable Target (represents the target node) node returns to the node where the SystemStatus has “1`SR”.

    Fig.12 Queries for criterion 3

    The results are shown in Fig.13.

    Fig.13 Queries results for criterion 3

    The path from the source node 16 to the target node 6 is [16,1,3,5,6]. Besides, as depicted in Fig.14, node 16 has the marking “Receiver1∶1`NULL” and node 1 has the markings “Connected 1∶1`FAIL” and “SystemStatus 1∶1`IDLE”. Therefore, we verify the occasion where the Receiver1 receives no more data causing the link to break down and the system return to idle. Node 3 has themarkings “Detecting_Results:1`SUCCESS” and “Connected 1∶1`FAIL”. Similarly, node 1 has the markings “Connect_Reliable: 1`SUCCESS” and “Connected 1∶1`FAIL”. Node 6 has “SystemStatus 1∶1`SR” and “Connected:1`SUCCESS”. The above information proves that after re-establish the connection by the transition Reconnect, the communication link is available.

    Fig.14 Fragment of reachability graph for criterion 3

    4 Performance measurement

    Timed CPN is used for simulation-based performance analysis, whose basic idea is to conduct lengthy simulations of a CPN model, during which data is collected from the occurring binding elements and the markings reached in order to calculate estimates of performance measures of the system. Monitors implement the above features.

    As shown in Fig.15, the four functions of the monitors are to define how monitors operate. Here we use the“DataPacketDelay” whose type is data collection. The “Predicate” function determines when to collect data. If the predicate function evaluates to be true, the “Observer” function determines which data to collect. The “Start” function aims at collecting data from the initial identification. “Stop” function is used for collecting data from the final marking.

    Fig.15 Four functions of the monitors

    According to Ref.[15], the transitions’ delay obeys the exponential distribution. The probability density functionf(x) and the cumulative distribution functionF(x) are exponential distribution and calculated by

    f(x)=λe-λx,

    (2)

    F(x)=1-λe-λx.

    (3)

    Time constraints of the transitions are calculated, considering the following circumstances:

    1) Delay caused by reconnection: when the place SystemStatus holds the token 1 `IDLE again, the system attempts to re-establish the T2T link. It is assumed that if there is no response within 3 seconds before detection, i.e., the timestamp of transition No Response is“@+300”, the connection is re-established that transition Reconnect is enabled. It is important to note that the model’s unit is milliseconds, and we should transfer the seconds into milliseconds.

    According to the QoS requirement from Ref.[15], the probability of end-to-end transmission delay lower than 150 ms accounts for more than 98%. The value ofλreconnectis determined as

    p=1-e-λrx,

    (4)

    (5)

    2) Delay caused by transmission errors means that no data is available to update the distance during transmission error until the data packets are completely received.

    It is stipulated that the periods of transmission interference areT<0.8 s (95%) andT<1 s (99%) from Ref.[15]. The period should be as short as possible to improve the simulations’ accuracy. So theT<0.8 s (95%) is chosen andλerroris valued by

    (6)

    3) The probability of the interruption time no more than 2 s accounts for lower than 99.92% in the LTE-M single network communication.

    Therefore,

    (7)

    The timed CPN model is shown in Fig.16, where “@+round(1 000*exponential(3.565 4)” means that the transition Data_part_loss&Error is enabled and the delay obeys the parameter 3.565 4 of the exponential distribution.

    Fig.16 Timed CPN model of T2T communication link

    Through the parameters valued by the transitions, the 200 000 ms simulation is carried out. Data logs files of the Receiver1 data collection monitor are obtained. Part content is captured shown in Fig.17, which has four columns. The “data” and “time” columns are abstracted and drawn shown in Fig.18 in Table 1, statistics reveal that the delay less than 150 ms is accounted for 98.106%, which meets the specification in Ref.[15] that point out the end-to-end delay lower than 150 ms accounts for≥98%. Statistics also meet the results from theoretical derivation in Ref.[16] and field test in Ref.[17].

    Fig.17 Screenshot of data log file

    Fig.18 Diagram of delay results

    Table 1 Statistic results

    5 Conclusions

    The main idea of formal methods is to represent the system’s behavior and its desired properties in appropriate logical frameworks and develop a relationship between these two by mathematical reasoning or rigorous state exploration techniques. Our work intends to deal with the T2T link from the perspective of functional safety verification and performance measurement.

    1) In terms of the communication medium, the T2T link’s feasibility implemented by the D2D technique is analyzed. Factors are taken into consideration, such as braking distance, D2D detecting range and information load capacity. The establishment procedure is given in the message sequence chart.

    2) A non-timed CPN model of the T2T link is constructed. The syntactic and semantic errors have been checked. The model is available for further analysis.

    3) The standard properties and the specific properties are checked for functional safety verification. On the one hand, the standard properties are desirable, such as the statistic, home properties, liveness properties and fairness properties. On the other hand, the three criteria are satisfied, i.e., ensuring all reachable states, markings and sequences satisfy the given prediction. The fragments of the state space inspect the individual states and events.

    4) Simulation-based performance analysis is performed by the model parameterization. Three circumstances are taken into consideration, i.e., the reconnection, transmission errors and interruption. After analyzing the statistic, it is proven that the statistics meet requirements from specification and field tests.

    国产高清视频在线观看网站| 日本爱情动作片www.在线观看 | 中出人妻视频一区二区| 黄色欧美视频在线观看| 亚洲成人免费电影在线观看| 国产一区二区在线观看日韩| 极品教师在线免费播放| 非洲黑人性xxxx精品又粗又长| 亚洲精品乱码久久久v下载方式| 色5月婷婷丁香| 不卡一级毛片| 久久人人爽人人爽人人片va| 免费观看的影片在线观看| 亚洲国产精品久久男人天堂| 黄色配什么色好看| 热99在线观看视频| 中国美女看黄片| 老司机福利观看| 国产亚洲精品av在线| 麻豆久久精品国产亚洲av| 午夜福利欧美成人| 99国产精品一区二区蜜桃av| 亚洲久久久久久中文字幕| 99精品在免费线老司机午夜| 熟女电影av网| 日本免费一区二区三区高清不卡| 国产乱人视频| 亚洲无线在线观看| 午夜激情欧美在线| 看黄色毛片网站| 国产高清视频在线播放一区| 日韩欧美国产一区二区入口| 自拍偷自拍亚洲精品老妇| 免费无遮挡裸体视频| 又紧又爽又黄一区二区| 草草在线视频免费看| 亚洲av第一区精品v没综合| 99热这里只有是精品在线观看| 日日夜夜操网爽| 全区人妻精品视频| 99热网站在线观看| 久久国内精品自在自线图片| 黄色欧美视频在线观看| 97碰自拍视频| 亚洲最大成人av| 日韩亚洲欧美综合| 欧美3d第一页| 如何舔出高潮| 在线观看一区二区三区| 久久精品久久久久久噜噜老黄 | 国产蜜桃级精品一区二区三区| 精品久久久久久久久亚洲 | 欧美丝袜亚洲另类 | 一区二区三区高清视频在线| 国产爱豆传媒在线观看| 美女免费视频网站| 99久久精品热视频| 亚洲性夜色夜夜综合| 啪啪无遮挡十八禁网站| 欧美成人a在线观看| 嫩草影院精品99| 日日撸夜夜添| 亚洲性夜色夜夜综合| 久久精品国产清高在天天线| 99久久中文字幕三级久久日本| 久久精品综合一区二区三区| 欧美激情在线99| 国产欧美日韩一区二区精品| 干丝袜人妻中文字幕| 99热这里只有是精品50| 亚洲中文日韩欧美视频| 在线a可以看的网站| 我的老师免费观看完整版| 精品久久久久久,| 国产私拍福利视频在线观看| a级毛片a级免费在线| 99riav亚洲国产免费| 日本撒尿小便嘘嘘汇集6| 久久久久久久久中文| 男人舔奶头视频| 亚洲精品国产成人久久av| 简卡轻食公司| 欧美日韩国产亚洲二区| 免费av毛片视频| 99riav亚洲国产免费| 亚洲人成网站高清观看| 日韩欧美国产一区二区入口| 亚洲欧美日韩卡通动漫| 国产成人a区在线观看| 国产一级毛片七仙女欲春2| 天堂动漫精品| 欧美3d第一页| 九九在线视频观看精品| АⅤ资源中文在线天堂| 国产亚洲欧美98| 内射极品少妇av片p| 精华霜和精华液先用哪个| 成人午夜高清在线视频| 国产大屁股一区二区在线视频| 九九在线视频观看精品| 国产男人的电影天堂91| 久久精品国产亚洲网站| 两性午夜刺激爽爽歪歪视频在线观看| 久久这里只有精品中国| 18禁裸乳无遮挡免费网站照片| 国产综合懂色| 色哟哟哟哟哟哟| 麻豆国产97在线/欧美| 最近中文字幕高清免费大全6 | 亚洲国产精品成人综合色| 久久久久久久精品吃奶| 国产三级中文精品| 99久久中文字幕三级久久日本| 狠狠狠狠99中文字幕| 一进一出抽搐动态| av黄色大香蕉| 国产亚洲精品av在线| 不卡一级毛片| 99久久精品热视频| 观看美女的网站| 干丝袜人妻中文字幕| 成人美女网站在线观看视频| av天堂中文字幕网| 又粗又爽又猛毛片免费看| 久久精品国产亚洲av香蕉五月| 婷婷六月久久综合丁香| 成人午夜高清在线视频| 一进一出抽搐动态| 窝窝影院91人妻| av在线蜜桃| 免费不卡的大黄色大毛片视频在线观看 | 国产精品乱码一区二三区的特点| 在线观看av片永久免费下载| 国产av不卡久久| 在线免费十八禁| 精品一区二区三区av网在线观看| 九九在线视频观看精品| 国产蜜桃级精品一区二区三区| 我要搜黄色片| 久久久国产成人精品二区| 日日摸夜夜添夜夜添av毛片 | 麻豆av噜噜一区二区三区| 久久精品国产鲁丝片午夜精品 | 免费av毛片视频| 97超视频在线观看视频| 69av精品久久久久久| 免费在线观看成人毛片| 久久久久性生活片| 中文字幕免费在线视频6| 成人综合一区亚洲| 免费一级毛片在线播放高清视频| 91在线观看av| 一区二区三区激情视频| 999久久久精品免费观看国产| 日韩一本色道免费dvd| 91av网一区二区| 99在线人妻在线中文字幕| a在线观看视频网站| 亚洲欧美精品综合久久99| 亚洲国产日韩欧美精品在线观看| 欧美三级亚洲精品| 在线观看av片永久免费下载| 日本 av在线| 综合色av麻豆| 听说在线观看完整版免费高清| 欧美黑人巨大hd| 成熟少妇高潮喷水视频| 特级一级黄色大片| 婷婷精品国产亚洲av在线| 男人舔女人下体高潮全视频| 我要看日韩黄色一级片| 日韩亚洲欧美综合| 99热6这里只有精品| 两人在一起打扑克的视频| 国产高清三级在线| 国产高清不卡午夜福利| 少妇丰满av| 99国产精品一区二区蜜桃av| 尤物成人国产欧美一区二区三区| 婷婷亚洲欧美| 亚洲精品成人久久久久久| 亚洲七黄色美女视频| 免费看av在线观看网站| 亚洲成av人片在线播放无| 午夜福利高清视频| 天堂动漫精品| 99riav亚洲国产免费| 国产在视频线在精品| 少妇高潮的动态图| 国产精品无大码| 久久久久久大精品| videossex国产| 久久人妻av系列| 一级黄色大片毛片| 日韩欧美一区二区三区在线观看| 毛片一级片免费看久久久久 | 直男gayav资源| 可以在线观看毛片的网站| 欧美三级亚洲精品| 色吧在线观看| 国模一区二区三区四区视频| 国产aⅴ精品一区二区三区波| 国产乱人伦免费视频| 精品久久久久久久久亚洲 | 又黄又爽又刺激的免费视频.| 国产精品不卡视频一区二区| 国产精品一区二区性色av| 国产高清视频在线观看网站| 国内精品宾馆在线| 黄色欧美视频在线观看| 国产高清视频在线播放一区| 久久久久久久午夜电影| 一本一本综合久久| 亚洲第一电影网av| 老司机深夜福利视频在线观看| 嫩草影视91久久| 国产一区二区激情短视频| 麻豆国产av国片精品| 午夜精品一区二区三区免费看| 亚洲国产高清在线一区二区三| 色综合亚洲欧美另类图片| 亚洲aⅴ乱码一区二区在线播放| 久久草成人影院| 又黄又爽又免费观看的视频| 精品久久久久久久久亚洲 | 久久午夜福利片| 欧美国产日韩亚洲一区| 国产精品98久久久久久宅男小说| 国产不卡一卡二| 日韩av在线大香蕉| 亚洲国产精品久久男人天堂| 亚洲成人免费电影在线观看| 色在线成人网| 十八禁网站免费在线| 99国产精品一区二区蜜桃av| 老司机午夜福利在线观看视频| 搡老熟女国产l中国老女人| 欧美一区二区精品小视频在线| 波多野结衣高清作品| 日韩欧美精品免费久久| 乱码一卡2卡4卡精品| 91久久精品电影网| 91久久精品国产一区二区三区| 男人狂女人下面高潮的视频| 亚洲av电影不卡..在线观看| 免费看光身美女| 午夜福利在线在线| 国产一区二区亚洲精品在线观看| 51国产日韩欧美| 18+在线观看网站| 人人妻,人人澡人人爽秒播| 少妇裸体淫交视频免费看高清| 一进一出抽搐动态| 真人做人爱边吃奶动态| 中文字幕av成人在线电影| 丰满乱子伦码专区| 欧美色视频一区免费| 欧美最黄视频在线播放免费| 国产极品精品免费视频能看的| 国产精品国产三级国产av玫瑰| 最近在线观看免费完整版| 99久久精品一区二区三区| 中文字幕av成人在线电影| 国产黄色小视频在线观看| 内地一区二区视频在线| 99久久九九国产精品国产免费| 国产一区二区三区av在线 | 伦精品一区二区三区| 亚洲自拍偷在线| 国产一区二区三区在线臀色熟女| 国产人妻一区二区三区在| 免费一级毛片在线播放高清视频| 亚洲精品在线观看二区| 一夜夜www| 国产精品久久电影中文字幕| 亚洲专区国产一区二区| 国产精品,欧美在线| 能在线免费观看的黄片| 国产伦一二天堂av在线观看| 女生性感内裤真人,穿戴方法视频| 久久久国产成人精品二区| ponron亚洲| 日本一二三区视频观看| av天堂中文字幕网| 性插视频无遮挡在线免费观看| 国产伦一二天堂av在线观看| 黄色视频,在线免费观看| 国产在线精品亚洲第一网站| 免费av毛片视频| 中出人妻视频一区二区| 成人三级黄色视频| 亚洲人成伊人成综合网2020| 国内少妇人妻偷人精品xxx网站| 亚洲欧美清纯卡通| 国产精品久久久久久久电影| 性插视频无遮挡在线免费观看| 欧美激情国产日韩精品一区| 在线观看美女被高潮喷水网站| 成人精品一区二区免费| 美女黄网站色视频| 最近最新中文字幕大全电影3| 成人毛片a级毛片在线播放| 超碰av人人做人人爽久久| 级片在线观看| 高清日韩中文字幕在线| 极品教师在线视频| 日韩欧美精品v在线| 亚洲欧美日韩高清专用| 波野结衣二区三区在线| 久久天躁狠狠躁夜夜2o2o| 精品久久久久久久人妻蜜臀av| 国产精品一及| 亚洲久久久久久中文字幕| 国产 一区精品| 97超级碰碰碰精品色视频在线观看| 午夜福利高清视频| 欧美xxxx性猛交bbbb| 又紧又爽又黄一区二区| 久久久久国内视频| 波野结衣二区三区在线| 97热精品久久久久久| 99久久九九国产精品国产免费| 制服丝袜大香蕉在线| 精品久久久久久久人妻蜜臀av| 免费高清视频大片| 欧美潮喷喷水| 国产成人福利小说| 日日夜夜操网爽| 亚洲熟妇中文字幕五十中出| 亚洲三级黄色毛片| 麻豆国产97在线/欧美| 人妻丰满熟妇av一区二区三区| 国产精品一及| 国产色爽女视频免费观看| 国产精品久久久久久精品电影| 午夜激情欧美在线| 精品人妻1区二区| 国产精品一区www在线观看 | 日本黄色片子视频| 精品人妻视频免费看| 18禁黄网站禁片午夜丰满| 999久久久精品免费观看国产| 俺也久久电影网| 国产老妇女一区| 亚洲aⅴ乱码一区二区在线播放| 国产探花极品一区二区| 久久6这里有精品| 国产免费男女视频| 欧美日韩乱码在线| 老司机深夜福利视频在线观看| 偷拍熟女少妇极品色| 韩国av一区二区三区四区| 亚洲精品国产成人久久av| 看片在线看免费视频| 免费高清视频大片| 国产激情偷乱视频一区二区| 丰满乱子伦码专区| 搡老熟女国产l中国老女人| 最近视频中文字幕2019在线8| 色综合婷婷激情| 床上黄色一级片| 国产aⅴ精品一区二区三区波| 亚洲av.av天堂| 天堂影院成人在线观看| 亚洲美女视频黄频| 久久精品国产鲁丝片午夜精品 | 欧美最黄视频在线播放免费| 国产一区二区亚洲精品在线观看| 亚洲精华国产精华液的使用体验 | 美女高潮喷水抽搐中文字幕| 大又大粗又爽又黄少妇毛片口| 99热只有精品国产| 十八禁国产超污无遮挡网站| eeuss影院久久| 中出人妻视频一区二区| 成人国产麻豆网| 久久精品国产亚洲av天美| 久久精品国产自在天天线| 中文字幕免费在线视频6| 精品国产三级普通话版| 一卡2卡三卡四卡精品乱码亚洲| 久久精品久久久久久噜噜老黄 | 日韩欧美在线二视频| 日韩精品有码人妻一区| 中文字幕人妻熟人妻熟丝袜美| 黄色女人牲交| 国产大屁股一区二区在线视频| 免费电影在线观看免费观看| 免费在线观看日本一区| 国产一区二区亚洲精品在线观看| 中国美白少妇内射xxxbb| 免费看美女性在线毛片视频| 欧美人与善性xxx| 欧美性感艳星| 亚洲最大成人中文| 久久午夜福利片| 全区人妻精品视频| 国产人妻一区二区三区在| 国产乱人视频| 欧美3d第一页| 日本 av在线| 又爽又黄a免费视频| 免费不卡的大黄色大毛片视频在线观看 | 99久久精品一区二区三区| 色综合站精品国产| 国产免费男女视频| 亚洲精华国产精华精| 熟女电影av网| 别揉我奶头~嗯~啊~动态视频| 中文字幕av成人在线电影| x7x7x7水蜜桃| 精品久久久久久久久亚洲 | 有码 亚洲区| 色综合婷婷激情| 在线观看美女被高潮喷水网站| 欧美日韩瑟瑟在线播放| 18禁裸乳无遮挡免费网站照片| 亚洲第一区二区三区不卡| 在线免费十八禁| 神马国产精品三级电影在线观看| 91麻豆av在线| 香蕉av资源在线| 国产又黄又爽又无遮挡在线| 国产亚洲91精品色在线| 国产精品不卡视频一区二区| 欧美zozozo另类| 国语自产精品视频在线第100页| 亚洲精华国产精华精| av.在线天堂| 乱系列少妇在线播放| 国产男靠女视频免费网站| 欧美中文日本在线观看视频| 99久久精品热视频| 精品国内亚洲2022精品成人| 亚洲av日韩精品久久久久久密| 免费av观看视频| 日本a在线网址| 波野结衣二区三区在线| 久9热在线精品视频| 精品人妻偷拍中文字幕| 免费看日本二区| 一区福利在线观看| 最近最新中文字幕大全电影3| 国产av不卡久久| 在线播放无遮挡| av视频在线观看入口| 日本成人三级电影网站| 简卡轻食公司| 日韩欧美精品v在线| 国产久久久一区二区三区| 亚洲精品色激情综合| 日日夜夜操网爽| 99九九线精品视频在线观看视频| 一个人看的www免费观看视频| 国产亚洲精品久久久com| 两个人的视频大全免费| aaaaa片日本免费| 久久久午夜欧美精品| 国产精品伦人一区二区| 99久久中文字幕三级久久日本| av专区在线播放| 一级毛片久久久久久久久女| av在线老鸭窝| 国国产精品蜜臀av免费| 中国美白少妇内射xxxbb| 免费搜索国产男女视频| 一区二区三区激情视频| 免费在线观看成人毛片| 少妇被粗大猛烈的视频| 天堂网av新在线| 中文字幕熟女人妻在线| 成人国产综合亚洲| av视频在线观看入口| 内射极品少妇av片p| 久久久久久国产a免费观看| av专区在线播放| 亚洲国产欧洲综合997久久,| 老师上课跳d突然被开到最大视频| 美女免费视频网站| 久久久国产成人精品二区| 最新中文字幕久久久久| 免费在线观看日本一区| 天美传媒精品一区二区| 一区二区三区激情视频| 欧美色欧美亚洲另类二区| 精品久久久久久久久亚洲 | 日韩强制内射视频| 亚洲经典国产精华液单| 久99久视频精品免费| 日本色播在线视频| 淫妇啪啪啪对白视频| 久久久久久久午夜电影| 99久久九九国产精品国产免费| 国产亚洲精品久久久com| 午夜免费成人在线视频| 久久精品国产鲁丝片午夜精品 | 亚洲国产精品合色在线| 俺也久久电影网| 男人舔奶头视频| 国产精品久久电影中文字幕| 亚洲内射少妇av| 久久久久免费精品人妻一区二区| 欧美黑人巨大hd| 成人毛片a级毛片在线播放| 久久草成人影院| 免费不卡的大黄色大毛片视频在线观看 | 黄色欧美视频在线观看| 亚洲18禁久久av| 免费观看精品视频网站| 亚洲一级一片aⅴ在线观看| 亚洲精品乱码久久久v下载方式| 久久国产乱子免费精品| 国产v大片淫在线免费观看| 99国产极品粉嫩在线观看| 少妇人妻精品综合一区二区 | 国产成人影院久久av| 日韩中文字幕欧美一区二区| 亚洲精品影视一区二区三区av| 国产黄片美女视频| 日本 欧美在线| h日本视频在线播放| 中亚洲国语对白在线视频| 欧美最新免费一区二区三区| 97热精品久久久久久| 亚洲成人免费电影在线观看| 免费观看的影片在线观看| 999久久久精品免费观看国产| 一本一本综合久久| 人妻夜夜爽99麻豆av| 99精品久久久久人妻精品| 国产爱豆传媒在线观看| 热99re8久久精品国产| 男女啪啪激烈高潮av片| 国产真实乱freesex| 久久精品人妻少妇| 国产精华一区二区三区| 99久久久亚洲精品蜜臀av| 人妻少妇偷人精品九色| 国产精品福利在线免费观看| 久久久久久久亚洲中文字幕| 深爱激情五月婷婷| 国产一级毛片七仙女欲春2| 成年女人毛片免费观看观看9| 国产精品,欧美在线| 亚洲无线观看免费| 成年人黄色毛片网站| 日本色播在线视频| 啦啦啦韩国在线观看视频| 最近中文字幕高清免费大全6 | www.www免费av| 日日啪夜夜撸| av黄色大香蕉| 亚洲av一区综合| 三级国产精品欧美在线观看| 蜜桃亚洲精品一区二区三区| 九色成人免费人妻av| 亚洲最大成人中文| 久99久视频精品免费| 婷婷六月久久综合丁香| 免费av观看视频| 俺也久久电影网| 国产 一区精品| 欧美最黄视频在线播放免费| 久久亚洲真实| av在线观看视频网站免费| 男女那种视频在线观看| 国产高清有码在线观看视频| 国内少妇人妻偷人精品xxx网站| 别揉我奶头 嗯啊视频| 亚洲无线在线观看| 夜夜看夜夜爽夜夜摸| 成年女人毛片免费观看观看9| 99在线人妻在线中文字幕| 国产黄片美女视频| xxxwww97欧美| 亚洲国产欧洲综合997久久,| 成年版毛片免费区| 久久久久性生活片| 欧美黑人欧美精品刺激| 99久久九九国产精品国产免费| 少妇人妻精品综合一区二区 | 久久精品国产亚洲av天美| 中文字幕熟女人妻在线| 亚洲第一区二区三区不卡| 女的被弄到高潮叫床怎么办 | 天天一区二区日本电影三级| 熟女人妻精品中文字幕| 久久精品国产清高在天天线| 国产探花极品一区二区| 国产精品美女特级片免费视频播放器| 久久久久久久久大av| 两性午夜刺激爽爽歪歪视频在线观看| 99精品久久久久人妻精品| 久久久成人免费电影| 韩国av一区二区三区四区| 国产精品嫩草影院av在线观看 | 国产日本99.免费观看| 99久久中文字幕三级久久日本| 亚洲最大成人中文| 在线免费观看不下载黄p国产 | 国产伦一二天堂av在线观看| 国产淫片久久久久久久久| 日韩欧美一区二区三区在线观看| 伦精品一区二区三区| 精品人妻熟女av久视频| 国产精品,欧美在线| 黄色一级大片看看| aaaaa片日本免费| 十八禁网站免费在线| 国产精品98久久久久久宅男小说| 欧美丝袜亚洲另类 | 不卡视频在线观看欧美| 简卡轻食公司| 丰满人妻一区二区三区视频av| 日韩精品中文字幕看吧|