• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Intelligent Transmission Control for Efficient Operations in SDN

    2022-08-24 03:27:58ReemAlkanhelAbidAliFaisalJamilMuzammilNawazFaisalMehmoodandAmmarMuthanna
    Computers Materials&Continua 2022年5期

    Reem Alkanhel,Abid Ali,F(xiàn)aisal Jamil,Muzammil Nawaz,F(xiàn)aisal Mehmood and Ammar Muthanna

    1Department of Information Technology,College of Computer and Information Sciences,Princess Nourah Bint Abdulrahman University,Riyadh,Saudi Arabia

    2Department of Computer Science,University of Engineering and Technology,Taxila,47080,Pakistan

    3Department of Computer Science,Govt.Akhtar Nawaz Khan(Shaheed)Degree College KTS,Haripur,22620,Pakistan

    4Department of Computer Engineering,Jeju National University,Jeju-si,Jeju Special Self-Governing Province,63243,Korea

    5School of Information and Communication Engineering,Zhengzhou University,China

    6Department of Telecommunication Networks and Data Transmission,The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,193232,Saint Petersburg,Russia

    7Peoples Friendship University of Russia(RUDN University)6 Miklukho-Maklaya St,Moscow,117198,Russian Federation

    Abstract:Although the Software-Defined Network(SDN)is a well-controlled and efficient network but the complexity of open flow switches in SDN causes multiple issues.Many solutions have been proposed so far for the prevention of errors and mistakes in it but yet, there is still no smooth transmission of pockets from source to destination specifically when irregular movements follow the destination host in SDN, the errors include packet loss, data compromise etc.The accuracy of packets received at their desired destination is possible if networks for pockets and hosts are monitored instead of analysis of network snapshot statistically for the state,as these approaches with open flow switches, discover bugs after their occurrence.This article proposes a design to achieve the said objective by defining the Intelligent Transmission Control Layer (ITCL) layer.It monitors all the connections of end hosts at their specific locations and performs necessary settlements when the connection state changes for one or multiple hosts.The layer informs the controller regarding any state change at one period and controller collects information of end nodes reported via ITCL.Then, updates flow tables accordingly to accommodate a location-change scenario with a routechange policy.ICTL is organized on prototype-based implementation using the popular POX platform.In this paper, it has been discovered that ITCL produces efficient performance in the trafficking of packets and controlling different states of SDN for errors and packet loss.

    Keywords: Software-defined network;ITCL;POX;open flow

    1 Introduction

    The development in Information and Communication Technology, the advanced requirements,and enhancements for existing computing systems led the network style towards a new software-based networking system called software-defined networking(SDN)[1]which is a controller-based network with OpenFlow switches(OF-switches).The controller uses the OpenFlow application,which contains programmed modules and code,the communication medium between the controller and OpenFlow switches while SDN provides open-source platforms to run and modify the controller’s functionality according to the necessity of the network.It has offered several innovations in networking with more efficiency than the traditional network,such as load balancing,network security,network intelligence,etc.while network measurements are more straightforward because of centralized controller[2].

    1.1 Infrastructure of SDN

    Being a part of expanding the system of the telecommunication world, most of us are well acquainted with traditional network construction which includes switches, routers, hubs, modems,or network adapters interconnected either wired or wirelessly.The Intercommunication among these network peripherals is attained by implementing several guidelines called Communication Protocols[3].In this network,the main tasks of the network rely on dedicated devices like routers,switches,and controllers,unlike SDN(Software Defined Network)in which Control aircraft,Management planes,and Data planes are accessible on the same instruments in a standard network.This means that the packet maintained all three information about data,control,and management airplane.Configuration of the kind of network is fixed and merchant-specific[4].

    1.2 The New Paradigm Shift SDN

    SDN is a new paradigm shift which is capable of overcoming the security issues and other limitations of traditional networking.Unlike the conventional network,two device planes,i.e.,control and data planes, have been decoupled in SDN, instead, the control plane is moved to the software layer and behaves like a centralized control layer that manages the network policies[5].This structure provides more secure and flexible network configurations than manual configurations of network devices in a traditional network[6].

    SDN devices,such as switches and routers,have turned into simple forwarding devices,which only implement data-plane logic[7]while the control of the whole network is handed over to a centralized unit called the controller,which makes all decisions regarding the flow of packets from one location to another location and sets the primary behaviors of the network.Moreover,the controller defines the policies which are further used to run the whole network flow[8–10].By using forwarding paths one or more hosts send packets is also determined by the controller.In addition,a path-defining process controller defines a specified rule for a specific host when the host is about to start a packet flow to another host[11].

    1.3 SDN Performance

    There are many reasons which cause traffic-related issues, i.e., packet loss during data communication between hosts, in a traditional network, such a scenario may occur due to traffic or link congestion,bad performance of a network device(switch,router,etc.),bugs on the device,or faulty hardware used in the network [12].For a smooth network process the links should be well active; if somewhere a link’s capacity is full,all the packets must wait for its workable state into a queue which cause congestion and maximizes packet loss chances.A low-performance device can only handle the traffic according to its capacity compared to the performance of a programmed controller [13–15].Suppose,A significant bits of traffic are to be passed through such a device, in that case, the device can only give the number of bits according to its internal storage, which will cause communication delay and congestion in the network while bugs on devices is another factor causing traffic issues as most of the available devices in the market are not free of bugs and faults[16].Moreover,damaging of hardware equipment also causes link failure and disconnections between network links.

    1.4 Traffic/Packets Loss Issues in SDN Network

    In software-defined networking,all process of traffic flow is controlled by a centralized controller.As in SDN switches are OpenFlow that take instructions from the controller.When hosts start communication, the routing path for the flow of packets between hosts is defined by the controller by installing rules[17].For example,when‘host A’sends packets to another‘host B’,the information packet first travels towards the controller to take direction for its packet’s flow and according to the defined SDN policy,the controller then assigns the shortest or suitable forwarding path[18].The rest of the packages follow the rule and start flow according to the controller’s defined control.Though,there exist some traffic-related issues in SDN on its level which may cause a forwarding loop and traffic congestion, packets drop may also occur due to the said reasons or by facing an unexpected link failure in the network[19].

    1.5 The Considerable Packets Loss in SDN

    SDN is based on a centralized operating controller, the handling of activity and state-change events of the network are also based on how smartly the controller monitors the complexity of network states.In each newly starting communication,the first packet goes to the controller where the controller finds its destination and then its location on the network[20].Then,the controller sets a switch-byswitch forwarding path to flow all packets of its sequence to the destination host [21].After taking the rule from the controller,the rest of the packets only follow the controller’s defined path to reach the destination host.Meanwhile,if the host moves from its original location and appears to another site,the OpenFlow switch of the last location of the destination host gets confused.This time packets reach their destination switch,but there is no host available on the OF-Switch to receive these packets,which causes silent drop of packets[22].

    SND plays a vital role in the operation of OpenFlow traffic enhancement.The complexity of Networks leads towards facing bugs.The proposed solutions,so far,cannot prevent it entirely crowd and errors as the variety of mistakes are also arising with the growing worth of OpenFlow.The SDN network traffic may cause errors and bugs while using the OpenFlow information.The congestion and other such problems may arise,and these problems motivate us to define a new solution through a control transmission layer to deliver the traffic flow efficiently.The primary motivation is absence of effective material that monitors all the connections of end hosts at their specific locations and performs necessary settlements when the connection state changes for one or multiple hosts while the layer informs the controller regarding any state change at one period.

    The rest of the paper is generally organized as;in Section 2,we presented the related work based on Load balancing in SDN,Section 3 presented the framework of the proposed solution and model diagram, in Section 4, we simulate our techniques.Finally, in Section 5, we have shown results and graphs,and at last,conclusion and future directions are discussed.

    2 Related Work

    SDN consists of three main stacks SDN applications, SDN controller, and SDN networking devices.The data plane and control plane are decoupled in SDN architecture and distributed as the application, control, and infrastructure layers into the layered structure.Some of the existing techniques are used to monitor and control SDN networks to manage network performance.A CharryPick[23]technique is used to trace packet trajectories and minimize two data plane resources.One is Reduces Switch flow rules,and the other Minimizes packet header space.Each network link is assigned a unique identifier in this technique,and all switches embed this identifier into each packet header during the forwarding process.This minimizes the switch flow rules, with this process, the packet header goes with a high packet header space, especially the line of packet transverse in the forwarding loop due to the failure of short paths.To reduce packet header space, only minimum number of essential links are picked.For a 48-port switch, CherryPick requires (log (48) = 6 bits)to represent each link.Simultaneously, the path tracer, the previous technique, required log(p) bits for packet header space where P represents the number of absolute paths between the source host and destination host.After evaluation, the cherrypick technique used minimal header space and reduced switch flow rules compared to other approaches (Pathlettracer, Pathquery).On the other hand,many switch-flow rules are required in the Pathlet-tracer technique which is used to reduce the packet headers.Controller floods a packet to learning switch to find about an unknown destination host[24,25].

    One of the flooded packets responds to the controller about its host destination’s location and learns its location.Here the remaining packets in flood can cause additional, unnecessary rules installed in the network,which might occur a packet storm.In the said situation,such bugs can cause serious consequences.For example,a forwarding loop is considered the first bug that would stay until it is related to the rule expires.Writing of additional rules(excess restrictions may decrease the network performance[26].12_multi,a POX platform component,involves maintaining the mapping of hosts at a switch and port for every control in the network.According to the controller’s code,it is located for the destination host when a packet is sent to it because the host’s destination is unknown[27].

    The controller floods the packets to switches to find an unknown destination.When flooded packets reach their adjacent switches,the controller instructs to continue flooding of packets,then it sees reply packets and learns the host’s destination.The remaining flood stays there in the network,and by forwarding these packets,the switch to switch reaches them for OpenFlow switches[28].These duplicate packets are again sent to the controller by OpenFlow switches as the destination’s location is unknown.The controller resultantly installs additional rules for duplicate packets,which may cause inefficiency in network performance.Query language has been introduced called path query [29]through regular expressions, which also includes SQL-like group-by construct to take information from the network.The path query monitors network traffic by transmitting packet trajectories at any network level on the data plane.It is also possible to specify different queries at a time that are independent.Tab.1 depicts more in-depth literature after comparing the related works of flow table entries reduction mechanism.

    The SDN is convenient, flexible in its structure, and economical by providing programmable controlled strategies as OpenFlow layered architecture[41].The OpenFlow is programmed for better performance and mature network architecture utilizing error-free communication.But there are several issues and problems faced,when nodes want to communicate with each other.An SDN Switch processpacket_inandpacket_outmessages and generates a possible reply to the controller.But a completely processedPacket_outmessage does not assure the guarantee for the actual existence of its included packet in the switch,which may be dropped due to switch failure,congestion,or by facing invalid ports.In authors [42] propose a hierarchical SDN control plane approach to guarantee the E2E QoS among multiple domains with various QoS classes on the E2E path.We propose a controller module for selecting the most suitable QoS class for each domain in the E2E path, based on multicriteria decision-making by using the technique for order of preference by similarity to ideal solution(TOPSIS).A new approach is proposed with a controller with an optimum feature set that must be available for SDN.Furthermore,a cluster of optimum feature set controllers will overcome a SPOF and improve the QoS in SDN.Herein,leveraging an analytical network process(ANP),we rank SDN controllers regarding their supporting features and create a hierarchical control plane-based cluster(HCPC)of the highly ranked controller computed using the ANP,evaluating their performance for the OS3E topology.In[43],a two-step approach is proposed for SDN controller selection.First,the controllers are ranked with analytical network process(ANP)according to their qualitative features,which influence the performance of these controllers,then,a performance comparison is performed to check for the QoS improvement.

    Fig.1 describes the scenario.The rest of the packets should be forwarded to the new location of Host B, which is accommodated in our proposed solution.In the SDN environment, the packet loss problem always occurred with a simple SDN environment where all the hosts are connected and provide packet flow rates.The SDN network traffic may cause errors and bugs while using the OpenFlow information.The congestion and other such problems may arise,and these problems motivate us to define a new solution through a control transmission layer to deliver the traffic flow efficiently.The Transmission Control Layer provides efficient packet transmission and packet delivery control using OpenFlow switches in VANET.

    Figure 1:Packets discarded on all switches as per controller’s rule

    3 Proposed System

    To handle the packet loss problems discussed in our problem statement,we proposed an efficient working mechanism capable of monitoring end nodes and informing the controller regarding any state of change within a specific time.It detects a movable host and informs the controller.Then the controller updates the switch to move the rest of the packets towards the new destination of the portable host instead of discarding these packets.Figs.2a and 2b present that the packets are being forwarded towards the changed location of the destination host.These packets were discarded in the existing solution.

    Figure 2:Packet forwarding techniques through destination host in proposed work (a) ITCL Layer instructing controller about movable host(b)all packets forwarded to changed location of destination host

    3.1 Preparation and Implementation of Rules

    By getting information on topology from the network,we need to install flow tables for switches.First,we maintain I.P.and MAC tables for all active hosts on the network.Second,we implement a MAC-matching policy for end nodes of switches that match the destination host’s MAC address while delivering packets to destination end nodes.Finally, we instruct the SDN controller to install flow rules to all available switches on the network.

    3.2 Activation of ITCL

    We keep active a transmission control layer named “Intelligent Transmission Control Layer,”pronounced as ITCL.The said layer intelligently monitors the network,especially the movement of hosts during communication.For example,suppose a host moves from its location to another location during communication within a specific timeout period.In that case, ITCL informs the controller about its new location and instructs to update the flow table of all switches according to the location change state.Updating of flow table forwards the packets of the movable host towards its changed location.

    3.3 Workflow of Proposed Solution

    When the network starts,ITCL also starts functioning.First,it starts getting information of hosts with I.P.&MAC,then,it instructs the controller to implement an IP-MAC-Matching policy for the packets while delivering them to their end nodes.By implementing the said policy,the packages are tagged with I.P.,and the MAC address of the destination host also matches with the I.P.address and MAC address of the destination host before delivering it to the end node.

    If I.P.and MAC tagged in packet header matches with the I.P.and MAC of the destination host,the packet delivers to the end node, otherwise, ITCL keeps its I.P.and MAC Address reserve if the host moves to another location until Idle Timeout/Hard Timeout is nonzero.In this state,when I.P.and MAC do not match, the packet also does not get deliver to the end host.Packet waits for new instructions initiated by ITCL to the controller,and controller assigns forwarding path and updates flow table in switches.When the destination host appears on another location within the timeout period,the ITCL identifies it by its MAC.The controller assigns the reserved I.P.,which is retained with the same MAC address instructed by ITCL.As a result, the rest of the packets start travelling towards the changed location of the destination host and gets delivered there.The proposed solution prevents packet loss(packet discard and packet drop)due to the movable host.As the flow diagram in Fig.7 presents step by step flow of the system.

    3.4 Table of Notation

    Table 1:Comparison of the related works of flow table entries reduction mechanism

    Table 1:Continued

    Table 2:Table of notations

    Table 3:Packets used

    Table 4:Retrieved information from Wireshark during states change

    Table 5:Bandwidth Usage

    Tab.2 summarizes the symbols and notations used in this paper and in algorithm one and explains the corresponding meanings.

    Fig.3 contains the flow diagram;it describes how the controller is updated for a host changing its location,and the rest of the packets travel towards the host’s changed location.

    Algorithm 1:Installation of Flow Rules Input:Network Packets Output:(Forwardpath)+( IP Procedure:Start Ptrans()←Dpacket()MAC matching on end node)+ActiveITCL(Continued)

    if((pkt.DistIP ←EndNode.IP)&&(pkt.DistMAC ←EndNode.MAC)Pktpuched→endNode()else while(Tout →i0NonZero)Store()pkt ←ITCLroute_change()if(RouteChange()←router)pkt ←newNode()End loop end if else pkt ←send(C,R,pkt)Packet_discard()end

    Figure 3:Data flow inside the implemented technique

    4 Results and Discussion

    We measured various parameters for evaluating our proposed solution as packet loss rate,congestion,measurement of latency,load on CPU,and throughput of proposed algorithms.We also tested multi-state change scenarios and measured the packet loss ratio with other aspects.Mininet is simply a network emulator that virtually provides a complete network environment like switches,links,and controllers.The hosts in Mininet run a standard Linux-based network software and create a real-like virtual network environment.Mininet is based on a single Linux kernel capable of running Mininet offers learning,research and development,prototyping,testing and debugging,and a whole experimental network on a single machine.

    Wireshark is an analyzing tool for analysis of network packets and generates detail as captured as possible.Wireshark can be used by network administrators,network security engineers,or network developers for network troubleshooting to examine network security issues or debug while protocol implementation [44–46].Furthermore, different parameters are used like bandwidth usage, packet delivery/loss rate,and throughput to evaluate our proposed solution’s performance.We passed 1000 packets from the source host to the destination host for each scenario and repeated our scenario ten times.The bandwidth information is saved in Tab.3.

    4.1 Movable Host Detection Time and New Host Registration Time

    We evaluate the parameters as in our proposed solution,total time used in detecting a moveable host on the network rather than sending the rest of the packets to it.In the existing solution, the registration time of a host on the network.The time interval for both is measured by delivering N number of packets to a movable host.To understand the scenario’s algorithm,we generated a Tab.5 as follows.There are N numbers of packets to be sent from host to destination.In our discussed network,there are 02 hops between source and destination.We calculated packets reaching a time in a constant state as:

    packetsreached destination() ←N Packets

    hopecount(source,destination) ←H Hope

    perHopetime() ←T Time

    timereached(destination) ←T x H x N

    Fig.4 presents the number of packets that reach the destination with constant v.The said scenario is before moving a destination host.After state change, when a destination host moves to another location,the existing solution re-registers it and sends zero packets.But in the proposed solution,we safe the packets already received by the destination host and the packets in a transit state and discarded in the existing solution as shown in Tab.4.Hence,the number of packets to be processed after movable host in the current and proposed solution.So,we saved time as following:

    Figure 4:Reach time calculation for packets

    4.2 Existing Solution

    Totalpacket←1000

    packetsreacheddestination()←321

    packetdiscard←53

    packetdropped←6

    After host movable total packets to be processed←1000

    4.3 Proposed Solution

    Totalpacket←1000

    packetsreached destination()←321

    packetdiscard←53

    packetdropped←6

    Fig.5 presents the ratio of the packets to be processed after the host movement.Because processing fewer packets in the proposed solution saves the network’s bandwidth, which maximizes network performance.As in Tab.4, the packets are less processed in the proposed solution; the bandwidth according to the number of packets is measured.Fig.6 shows the packet ratio to get processed when hosts move.The results demonstrate that the proposed technique has fewer packets to be processed as security after the host move.

    4.4 Network Throughput

    Another parameter of network performance is throughput.Throughput is defined as‘the maximum performance of the network’.Our described problem network works more after the movable host state because it sends packets from the start after the host changes its location.But in our proposed solution, the packets that have already been received and will be discarded due to movable host are saved.These packets start traveling from their respective switches towards the destination,instead of traveling again from the source host(Fig.8).Throughput can be measured by dividing“TCP window size(data packets)”with communication data packets.We can calculate the throughput of the existing solution as following:

    Figure 5:Graph showing ratio of packets to be processed after host movable

    Figure 6:Bandwidth availability in both solutions(8MBs)

    Figure 7:Bandwidth availability in both solutions(10MB)

    As the TCP window size is 65535 bytes(or 524280 bits)predefined in IETF RFC 1323,the round value of the average of 10 packets calculated from the host terminal is 0.054 s.

    Figure 8:Bandwidth availability in both solutions(15 MB)

    So Throughput of existing solution:

    The saved discarded packets of the existing solution will not take a full round from source host to destination.These packets get forward from their respective switches on which these exist,when the destination host changes its location.So,the number of hops for saved packages is reduced,time to reach the changed destination will also be reduced for these packets.Fig.9 shows the throughput for 500 s,and Fig.10 shows the throughput for 1000 s.

    Figure 9:Throughput comparison between existing solution and proposed solution

    Here we take the average time of minimum hops of saved packets + time of maximum hops of packets and divide by total hops in the path as:

    So through of proposed solution:

    Hence it is:

    Figure 10:Throughput comparison between existing solution and proposed solution

    5 Conclusion

    In this paper, we examined the loosing of packets due to moveable hosts in two forms:One is examined as dropped packets when a destination host changes its location while the other is due to discard of the packets in transit state or midway between source and destination.We conclude that our proposed solution has well rectified this issue and produced better evaluation results.We have achieved more network efficiency,saved the bandwidth,protected packets from loss,and our proposed solution has achieved better throughput.In future work,one can utilize the proposed technique for large data centers and wireless SDN network setup as this technique can be utilized in SDN-based cellular networks,as it is cost-effective and a programmed network technique for efficiently monitored networks.The chances of data lost during communication are reduced,and the time-saving approach will lead nicely to the organizational networks through such a programmatically controlled network.Our results show that the bandwidth,packet delivery ratio,and Hop Count are better from the existing technique by 28%.Furthermore,the results show that the packet does not lose and improved 60%from the existing technique,on 8Mb,10Mb,and 15Mb,the bandwidth is effectively utilized for all values.The network throughput is checked and measured for 500 sec and 1000 sec.The effectiveness of the results show that the proposed technique outperformed the existing approaches in network bandwidth and throughput.

    Funding Statement:This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program.

    Conflicts of Interest:“The authors declare that they have no conflicts of interest to report regarding the present study.”

    亚洲av免费高清在线观看| 日韩一区二区视频免费看| h日本视频在线播放| 国产三级中文精品| 99久久中文字幕三级久久日本| 亚洲七黄色美女视频| 亚洲人成伊人成综合网2020| 国产av麻豆久久久久久久| 国产亚洲精品久久久久久毛片| 国产精品福利在线免费观看| 国产一区二区亚洲精品在线观看| 久久九九热精品免费| 特大巨黑吊av在线直播| 成人高潮视频无遮挡免费网站| 日日啪夜夜撸| 国产精品女同一区二区软件 | 欧美+日韩+精品| 1000部很黄的大片| 国产精品三级大全| 午夜激情福利司机影院| 国产精品不卡视频一区二区| 成人国产一区最新在线观看| 久久精品综合一区二区三区| 国产精品嫩草影院av在线观看 | 日韩欧美精品v在线| 亚洲中文字幕一区二区三区有码在线看| 久久99热这里只有精品18| 久久6这里有精品| 女人被狂操c到高潮| 亚洲国产日韩欧美精品在线观看| 97碰自拍视频| 俄罗斯特黄特色一大片| 国产精品久久久久久久久免| 国产伦在线观看视频一区| 国产高潮美女av| 天堂动漫精品| 一进一出抽搐动态| 国产午夜精品论理片| 日本五十路高清| 中文字幕熟女人妻在线| 99热6这里只有精品| 日日摸夜夜添夜夜添小说| 午夜福利在线观看免费完整高清在 | 麻豆一二三区av精品| 国产高清视频在线播放一区| 国产av不卡久久| 久久久色成人| 精品久久久久久久人妻蜜臀av| 一进一出抽搐gif免费好疼| 波多野结衣高清作品| 给我免费播放毛片高清在线观看| 十八禁国产超污无遮挡网站| 国产高清不卡午夜福利| 五月玫瑰六月丁香| 亚洲国产色片| 成人精品一区二区免费| 国产精品无大码| 午夜亚洲福利在线播放| 女的被弄到高潮叫床怎么办 | 午夜免费激情av| 中文字幕人妻熟人妻熟丝袜美| 亚洲精品一卡2卡三卡4卡5卡| 一区福利在线观看| 春色校园在线视频观看| 99精品在免费线老司机午夜| 大型黄色视频在线免费观看| 久久久久久国产a免费观看| 午夜爱爱视频在线播放| 日韩欧美在线乱码| 五月伊人婷婷丁香| 99国产精品一区二区蜜桃av| 久久精品国产鲁丝片午夜精品 | 三级毛片av免费| 麻豆一二三区av精品| 此物有八面人人有两片| а√天堂www在线а√下载| 99久国产av精品| 黄色一级大片看看| 精品乱码久久久久久99久播| 毛片女人毛片| 麻豆一二三区av精品| 久久欧美精品欧美久久欧美| 欧美性猛交╳xxx乱大交人| 日本黄色片子视频| h日本视频在线播放| 九九久久精品国产亚洲av麻豆| 午夜福利在线观看吧| 老师上课跳d突然被开到最大视频| 欧美区成人在线视频| 亚州av有码| 日韩亚洲欧美综合| 日日摸夜夜添夜夜添av毛片 | 老女人水多毛片| 日韩中文字幕欧美一区二区| 免费高清视频大片| 亚洲成人久久爱视频| 成人精品一区二区免费| 国产 一区精品| 亚洲av熟女| 日韩欧美在线二视频| 变态另类成人亚洲欧美熟女| 五月玫瑰六月丁香| 国产69精品久久久久777片| 亚洲,欧美,日韩| 搡老岳熟女国产| 啪啪无遮挡十八禁网站| 99热精品在线国产| 美女免费视频网站| 中国美女看黄片| 真实男女啪啪啪动态图| 久久久午夜欧美精品| 99九九线精品视频在线观看视频| 亚洲avbb在线观看| 精品一区二区三区人妻视频| or卡值多少钱| 久久精品国产亚洲av天美| 一级黄色大片毛片| 久久精品影院6| 精品一区二区三区视频在线| 波多野结衣巨乳人妻| 午夜福利18| 免费搜索国产男女视频| 精品久久久久久久久久免费视频| 又粗又爽又猛毛片免费看| 欧美一区二区亚洲| 亚洲久久久久久中文字幕| 国产老妇女一区| 欧美精品国产亚洲| 特大巨黑吊av在线直播| 亚洲电影在线观看av| 国产一区二区激情短视频| 国产日本99.免费观看| 看免费成人av毛片| 美女黄网站色视频| 一级黄片播放器| 天天一区二区日本电影三级| 国产私拍福利视频在线观看| 99精品久久久久人妻精品| 亚洲午夜理论影院| 日日撸夜夜添| 精品一区二区三区视频在线| 伦精品一区二区三区| avwww免费| 免费观看的影片在线观看| 国产av麻豆久久久久久久| 欧美日本亚洲视频在线播放| 亚洲黑人精品在线| 亚洲av中文字字幕乱码综合| 亚洲精品日韩av片在线观看| 久久久久九九精品影院| 欧美+日韩+精品| www.色视频.com| 国产精品嫩草影院av在线观看 | 免费高清视频大片| 一卡2卡三卡四卡精品乱码亚洲| 在线a可以看的网站| 国产男人的电影天堂91| 男人狂女人下面高潮的视频| 亚洲人成网站在线播放欧美日韩| 国产精品日韩av在线免费观看| 色视频www国产| 白带黄色成豆腐渣| 日韩欧美一区二区三区在线观看| 久久午夜亚洲精品久久| 熟妇人妻久久中文字幕3abv| 久久久久久久久大av| 在线免费十八禁| 色5月婷婷丁香| 久久婷婷人人爽人人干人人爱| 欧美色视频一区免费| 国产精品不卡视频一区二区| 日本 av在线| 亚洲四区av| 亚洲精华国产精华液的使用体验 | 最好的美女福利视频网| 一本久久中文字幕| 两性午夜刺激爽爽歪歪视频在线观看| 国产精品免费一区二区三区在线| 热99re8久久精品国产| 成人高潮视频无遮挡免费网站| 97超视频在线观看视频| 如何舔出高潮| 又粗又爽又猛毛片免费看| 99国产精品一区二区蜜桃av| 免费人成在线观看视频色| 国产真实伦视频高清在线观看 | av中文乱码字幕在线| 男女视频在线观看网站免费| 精品国内亚洲2022精品成人| 美女大奶头视频| 男人的好看免费观看在线视频| 小蜜桃在线观看免费完整版高清| 草草在线视频免费看| 精品一区二区三区视频在线| 黄色一级大片看看| 久久久精品欧美日韩精品| 99热这里只有精品一区| 男女啪啪激烈高潮av片| 高清毛片免费观看视频网站| 91狼人影院| 91麻豆精品激情在线观看国产| 亚洲人成伊人成综合网2020| 中文亚洲av片在线观看爽| 中文字幕熟女人妻在线| 国内精品久久久久精免费| 午夜影院日韩av| 久久天躁狠狠躁夜夜2o2o| 亚洲av中文字字幕乱码综合| 亚洲综合色惰| 亚洲欧美精品综合久久99| 日本-黄色视频高清免费观看| 亚洲性夜色夜夜综合| 黄色丝袜av网址大全| 国产精品久久久久久亚洲av鲁大| 久久午夜福利片| 在线国产一区二区在线| 国产成年人精品一区二区| 国产视频内射| 成人av一区二区三区在线看| 免费人成视频x8x8入口观看| 国产在线男女| 亚洲国产欧洲综合997久久,| 中文字幕免费在线视频6| 国产女主播在线喷水免费视频网站 | 国模一区二区三区四区视频| 亚洲精华国产精华液的使用体验 | 精品久久久久久久久亚洲 | 少妇人妻一区二区三区视频| av女优亚洲男人天堂| 国内精品一区二区在线观看| 国产一区二区激情短视频| 久久精品国产亚洲av天美| 午夜福利在线在线| 精品一区二区三区视频在线| av天堂中文字幕网| 久久6这里有精品| 看片在线看免费视频| 亚洲美女视频黄频| x7x7x7水蜜桃| 一区二区三区高清视频在线| а√天堂www在线а√下载| 日日夜夜操网爽| 午夜a级毛片| 99热6这里只有精品| 国产熟女欧美一区二区| 国产精品久久久久久av不卡| 国产精品不卡视频一区二区| 免费高清视频大片| 九色国产91popny在线| 国产 一区精品| 简卡轻食公司| 亚洲一区二区三区色噜噜| 欧美zozozo另类| a级一级毛片免费在线观看| 男女做爰动态图高潮gif福利片| 很黄的视频免费| 国产午夜福利久久久久久| 日本a在线网址| 窝窝影院91人妻| 一进一出好大好爽视频| 女人被狂操c到高潮| 国产女主播在线喷水免费视频网站 | 久久久国产成人免费| 成年版毛片免费区| av在线天堂中文字幕| 淫妇啪啪啪对白视频| 村上凉子中文字幕在线| 少妇人妻精品综合一区二区 | 欧美一级a爱片免费观看看| eeuss影院久久| 欧美xxxx性猛交bbbb| 在线观看免费视频日本深夜| 亚洲七黄色美女视频| 看黄色毛片网站| 亚洲av美国av| 一本精品99久久精品77| 久久亚洲精品不卡| 国产v大片淫在线免费观看| 欧美+亚洲+日韩+国产| 禁无遮挡网站| 国产老妇女一区| 两个人视频免费观看高清| 亚洲精华国产精华液的使用体验 | 免费av毛片视频| 男人狂女人下面高潮的视频| 婷婷精品国产亚洲av在线| 国产亚洲精品久久久com| 国产精品国产高清国产av| 亚洲性夜色夜夜综合| 成人一区二区视频在线观看| 在线免费观看的www视频| 一卡2卡三卡四卡精品乱码亚洲| 午夜免费成人在线视频| 精品无人区乱码1区二区| 日本黄大片高清| 午夜福利在线观看吧| 天天一区二区日本电影三级| 日韩欧美免费精品| 91狼人影院| 久久精品综合一区二区三区| 啦啦啦韩国在线观看视频| 日日撸夜夜添| 中文在线观看免费www的网站| 婷婷色综合大香蕉| 久久精品国产99精品国产亚洲性色| 亚洲专区中文字幕在线| 国产人妻一区二区三区在| 欧美日韩综合久久久久久 | 91在线观看av| 成人特级av手机在线观看| 午夜久久久久精精品| eeuss影院久久| 欧美3d第一页| 精品人妻1区二区| 能在线免费观看的黄片| 老熟妇仑乱视频hdxx| 日韩欧美一区二区三区在线观看| 国产精品久久久久久久久免| 国产精品无大码| aaaaa片日本免费| 精品人妻偷拍中文字幕| 久99久视频精品免费| 亚洲第一区二区三区不卡| 在线观看午夜福利视频| 在线观看66精品国产| 少妇猛男粗大的猛烈进出视频 | 亚洲av中文字字幕乱码综合| 十八禁网站免费在线| 高清在线国产一区| 一区福利在线观看| 日韩欧美在线二视频| 日韩中字成人| 人妻久久中文字幕网| 国产午夜精品久久久久久一区二区三区 | 性色avwww在线观看| 精品福利观看| 最近最新免费中文字幕在线| 国产白丝娇喘喷水9色精品| 午夜亚洲福利在线播放| 日韩,欧美,国产一区二区三区 | 在线观看免费视频日本深夜| 亚洲精品久久国产高清桃花| 国产黄片美女视频| 一区二区三区四区激情视频 | 国产在线男女| 狂野欧美激情性xxxx在线观看| 可以在线观看毛片的网站| 深夜精品福利| 亚洲欧美日韩高清在线视频| 精品午夜福利在线看| 久久久久久久亚洲中文字幕| 欧美黑人欧美精品刺激| 99精品在免费线老司机午夜| 亚洲国产欧美人成| 真人做人爱边吃奶动态| 亚洲狠狠婷婷综合久久图片| 日韩欧美在线乱码| 日韩欧美免费精品| 成人高潮视频无遮挡免费网站| 嫩草影院新地址| 国产伦一二天堂av在线观看| 一个人免费在线观看电影| 日日摸夜夜添夜夜添av毛片 | 在线观看66精品国产| 亚洲精品影视一区二区三区av| 成人国产综合亚洲| 亚洲精品影视一区二区三区av| 亚洲经典国产精华液单| 亚洲精品久久国产高清桃花| 夜夜看夜夜爽夜夜摸| 久久久久九九精品影院| av在线蜜桃| 久久久色成人| 在线观看av片永久免费下载| 无人区码免费观看不卡| 亚洲美女黄片视频| 亚洲av电影不卡..在线观看| 国内揄拍国产精品人妻在线| 精品人妻一区二区三区麻豆 | 嫩草影院精品99| 中文字幕av在线有码专区| 国产一区二区亚洲精品在线观看| 日韩在线高清观看一区二区三区 | 国产探花在线观看一区二区| 男女边吃奶边做爰视频| 午夜免费男女啪啪视频观看 | 桃色一区二区三区在线观看| 深夜a级毛片| 性欧美人与动物交配| 日本色播在线视频| 国产精品久久电影中文字幕| 日韩欧美一区二区三区在线观看| 又黄又爽又刺激的免费视频.| 丰满人妻一区二区三区视频av| 国产大屁股一区二区在线视频| 91麻豆精品激情在线观看国产| 最近最新中文字幕大全电影3| 亚洲av美国av| 国产伦精品一区二区三区四那| 国产一区二区激情短视频| 久久久久久久久中文| a级毛片a级免费在线| 18+在线观看网站| 亚洲精品国产成人久久av| 91在线观看av| 午夜亚洲福利在线播放| 黄色日韩在线| 亚洲欧美日韩高清专用| 亚洲av中文av极速乱 | 国产蜜桃级精品一区二区三区| 精品久久久久久久久久久久久| 91麻豆精品激情在线观看国产| 国产在线精品亚洲第一网站| 琪琪午夜伦伦电影理论片6080| 波多野结衣巨乳人妻| 极品教师在线免费播放| 亚洲国产精品合色在线| 成人无遮挡网站| 国产熟女欧美一区二区| 精品人妻熟女av久视频| 国产午夜精品久久久久久一区二区三区 | 熟女人妻精品中文字幕| 2021天堂中文幕一二区在线观| 亚洲一区高清亚洲精品| 久久这里只有精品中国| 国产色爽女视频免费观看| 99在线人妻在线中文字幕| 啦啦啦观看免费观看视频高清| 有码 亚洲区| netflix在线观看网站| 嫩草影院新地址| 一个人看的www免费观看视频| www.www免费av| 亚洲一区二区三区色噜噜| 狂野欧美白嫩少妇大欣赏| 日本黄色视频三级网站网址| 色精品久久人妻99蜜桃| 99视频精品全部免费 在线| 春色校园在线视频观看| 日本成人三级电影网站| 亚洲五月天丁香| 欧美区成人在线视频| 最近在线观看免费完整版| 欧美+亚洲+日韩+国产| 又爽又黄无遮挡网站| 热99在线观看视频| 成人综合一区亚洲| 久久久精品欧美日韩精品| 欧美精品啪啪一区二区三区| 亚洲va在线va天堂va国产| 1000部很黄的大片| 亚洲一区高清亚洲精品| 国产精品久久久久久精品电影| 国内精品久久久久精免费| 露出奶头的视频| 国产精品99久久久久久久久| 一进一出抽搐动态| 村上凉子中文字幕在线| 国内久久婷婷六月综合欲色啪| 波多野结衣高清作品| 亚洲精华国产精华液的使用体验 | 舔av片在线| 黄色一级大片看看| 日本欧美国产在线视频| 日本五十路高清| 午夜福利成人在线免费观看| 亚州av有码| 日韩欧美在线乱码| 欧美zozozo另类| 亚洲电影在线观看av| 热99re8久久精品国产| 五月伊人婷婷丁香| 亚洲av成人精品一区久久| 日韩强制内射视频| 婷婷亚洲欧美| 久久久国产成人免费| 久久人人精品亚洲av| 亚洲人成网站在线播| 99热只有精品国产| 亚洲成av人片在线播放无| 最近中文字幕高清免费大全6 | 丝袜美腿在线中文| 我的老师免费观看完整版| 久久精品国产亚洲网站| 国内揄拍国产精品人妻在线| 啦啦啦韩国在线观看视频| 我要搜黄色片| 久久香蕉精品热| 亚洲成人久久爱视频| 亚洲精品成人久久久久久| 观看免费一级毛片| 欧美性猛交╳xxx乱大交人| 亚洲经典国产精华液单| 熟女人妻精品中文字幕| 少妇被粗大猛烈的视频| 免费在线观看日本一区| а√天堂www在线а√下载| 一区二区三区激情视频| aaaaa片日本免费| 有码 亚洲区| 国产探花极品一区二区| 午夜免费激情av| 日日啪夜夜撸| 久久久久精品国产欧美久久久| 国国产精品蜜臀av免费| 亚洲av五月六月丁香网| 国产亚洲精品久久久com| 欧美+亚洲+日韩+国产| 亚洲avbb在线观看| 亚洲内射少妇av| 亚洲欧美日韩东京热| 桃红色精品国产亚洲av| 亚洲国产高清在线一区二区三| 给我免费播放毛片高清在线观看| 久久精品91蜜桃| 亚洲欧美日韩高清专用| 国产女主播在线喷水免费视频网站 | 老司机福利观看| 国产高清视频在线观看网站| 18+在线观看网站| 狠狠狠狠99中文字幕| 午夜福利在线观看免费完整高清在 | 极品教师在线免费播放| 国产亚洲精品久久久久久毛片| 一级黄片播放器| 日韩欧美一区二区三区在线观看| 午夜日韩欧美国产| 一区二区三区免费毛片| 99国产极品粉嫩在线观看| 99久久成人亚洲精品观看| 露出奶头的视频| 变态另类成人亚洲欧美熟女| 亚洲欧美激情综合另类| 久久婷婷人人爽人人干人人爱| 中文字幕久久专区| 最近中文字幕高清免费大全6 | 综合色av麻豆| 国产白丝娇喘喷水9色精品| 麻豆成人午夜福利视频| 美女免费视频网站| 国产成人a区在线观看| 18禁在线播放成人免费| 99视频精品全部免费 在线| 中文字幕精品亚洲无线码一区| 久久精品久久久久久噜噜老黄 | 精品久久久久久久久亚洲 | 久久久久久国产a免费观看| 人妻制服诱惑在线中文字幕| 男插女下体视频免费在线播放| 97碰自拍视频| 尤物成人国产欧美一区二区三区| 亚洲无线在线观看| 黄色日韩在线| 亚洲成人久久爱视频| 久久精品久久久久久噜噜老黄 | 日韩欧美精品v在线| 久久人妻av系列| 国产精品爽爽va在线观看网站| 网址你懂的国产日韩在线| 亚洲人与动物交配视频| 草草在线视频免费看| 精品久久久久久久人妻蜜臀av| 啪啪无遮挡十八禁网站| 国产高潮美女av| 极品教师在线视频| 亚洲av美国av| 一个人看视频在线观看www免费| 免费观看的影片在线观看| 村上凉子中文字幕在线| av在线老鸭窝| 超碰av人人做人人爽久久| 在线观看免费视频日本深夜| 久久久久性生活片| 国产91精品成人一区二区三区| 中文资源天堂在线| 男插女下体视频免费在线播放| 精品人妻1区二区| 男女那种视频在线观看| 美女xxoo啪啪120秒动态图| 国产精品久久久久久久电影| 欧美3d第一页| 亚洲av免费在线观看| 欧美激情国产日韩精品一区| 禁无遮挡网站| 美女免费视频网站| 人妻丰满熟妇av一区二区三区| 91在线精品国自产拍蜜月| 日韩欧美 国产精品| 精品99又大又爽又粗少妇毛片 | 少妇的逼水好多| 欧美xxxx黑人xx丫x性爽| 婷婷精品国产亚洲av在线| 国产大屁股一区二区在线视频| 午夜亚洲福利在线播放| 国内精品美女久久久久久| 婷婷丁香在线五月| 亚洲av日韩精品久久久久久密| 在线天堂最新版资源| 国产精品久久久久久久久免| 琪琪午夜伦伦电影理论片6080| 国产熟女欧美一区二区| 欧美成人免费av一区二区三区| 亚洲av日韩精品久久久久久密| 夜夜看夜夜爽夜夜摸| 成人亚洲精品av一区二区| 亚洲狠狠婷婷综合久久图片| 身体一侧抽搐| 直男gayav资源| 一个人免费在线观看电影| 日本免费一区二区三区高清不卡| 国内久久婷婷六月综合欲色啪| 制服丝袜大香蕉在线| 成人av一区二区三区在线看| 尤物成人国产欧美一区二区三区| 国产黄色小视频在线观看|