• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Intelligent Transmission Control for Efficient Operations in SDN

    2022-08-24 03:27:58ReemAlkanhelAbidAliFaisalJamilMuzammilNawazFaisalMehmoodandAmmarMuthanna
    Computers Materials&Continua 2022年5期

    Reem Alkanhel,Abid Ali,F(xiàn)aisal Jamil,Muzammil Nawaz,F(xiàn)aisal Mehmood and Ammar Muthanna

    1Department of Information Technology,College of Computer and Information Sciences,Princess Nourah Bint Abdulrahman University,Riyadh,Saudi Arabia

    2Department of Computer Science,University of Engineering and Technology,Taxila,47080,Pakistan

    3Department of Computer Science,Govt.Akhtar Nawaz Khan(Shaheed)Degree College KTS,Haripur,22620,Pakistan

    4Department of Computer Engineering,Jeju National University,Jeju-si,Jeju Special Self-Governing Province,63243,Korea

    5School of Information and Communication Engineering,Zhengzhou University,China

    6Department of Telecommunication Networks and Data Transmission,The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,193232,Saint Petersburg,Russia

    7Peoples Friendship University of Russia(RUDN University)6 Miklukho-Maklaya St,Moscow,117198,Russian Federation

    Abstract:Although the Software-Defined Network(SDN)is a well-controlled and efficient network but the complexity of open flow switches in SDN causes multiple issues.Many solutions have been proposed so far for the prevention of errors and mistakes in it but yet, there is still no smooth transmission of pockets from source to destination specifically when irregular movements follow the destination host in SDN, the errors include packet loss, data compromise etc.The accuracy of packets received at their desired destination is possible if networks for pockets and hosts are monitored instead of analysis of network snapshot statistically for the state,as these approaches with open flow switches, discover bugs after their occurrence.This article proposes a design to achieve the said objective by defining the Intelligent Transmission Control Layer (ITCL) layer.It monitors all the connections of end hosts at their specific locations and performs necessary settlements when the connection state changes for one or multiple hosts.The layer informs the controller regarding any state change at one period and controller collects information of end nodes reported via ITCL.Then, updates flow tables accordingly to accommodate a location-change scenario with a routechange policy.ICTL is organized on prototype-based implementation using the popular POX platform.In this paper, it has been discovered that ITCL produces efficient performance in the trafficking of packets and controlling different states of SDN for errors and packet loss.

    Keywords: Software-defined network;ITCL;POX;open flow

    1 Introduction

    The development in Information and Communication Technology, the advanced requirements,and enhancements for existing computing systems led the network style towards a new software-based networking system called software-defined networking(SDN)[1]which is a controller-based network with OpenFlow switches(OF-switches).The controller uses the OpenFlow application,which contains programmed modules and code,the communication medium between the controller and OpenFlow switches while SDN provides open-source platforms to run and modify the controller’s functionality according to the necessity of the network.It has offered several innovations in networking with more efficiency than the traditional network,such as load balancing,network security,network intelligence,etc.while network measurements are more straightforward because of centralized controller[2].

    1.1 Infrastructure of SDN

    Being a part of expanding the system of the telecommunication world, most of us are well acquainted with traditional network construction which includes switches, routers, hubs, modems,or network adapters interconnected either wired or wirelessly.The Intercommunication among these network peripherals is attained by implementing several guidelines called Communication Protocols[3].In this network,the main tasks of the network rely on dedicated devices like routers,switches,and controllers,unlike SDN(Software Defined Network)in which Control aircraft,Management planes,and Data planes are accessible on the same instruments in a standard network.This means that the packet maintained all three information about data,control,and management airplane.Configuration of the kind of network is fixed and merchant-specific[4].

    1.2 The New Paradigm Shift SDN

    SDN is a new paradigm shift which is capable of overcoming the security issues and other limitations of traditional networking.Unlike the conventional network,two device planes,i.e.,control and data planes, have been decoupled in SDN, instead, the control plane is moved to the software layer and behaves like a centralized control layer that manages the network policies[5].This structure provides more secure and flexible network configurations than manual configurations of network devices in a traditional network[6].

    SDN devices,such as switches and routers,have turned into simple forwarding devices,which only implement data-plane logic[7]while the control of the whole network is handed over to a centralized unit called the controller,which makes all decisions regarding the flow of packets from one location to another location and sets the primary behaviors of the network.Moreover,the controller defines the policies which are further used to run the whole network flow[8–10].By using forwarding paths one or more hosts send packets is also determined by the controller.In addition,a path-defining process controller defines a specified rule for a specific host when the host is about to start a packet flow to another host[11].

    1.3 SDN Performance

    There are many reasons which cause traffic-related issues, i.e., packet loss during data communication between hosts, in a traditional network, such a scenario may occur due to traffic or link congestion,bad performance of a network device(switch,router,etc.),bugs on the device,or faulty hardware used in the network [12].For a smooth network process the links should be well active; if somewhere a link’s capacity is full,all the packets must wait for its workable state into a queue which cause congestion and maximizes packet loss chances.A low-performance device can only handle the traffic according to its capacity compared to the performance of a programmed controller [13–15].Suppose,A significant bits of traffic are to be passed through such a device, in that case, the device can only give the number of bits according to its internal storage, which will cause communication delay and congestion in the network while bugs on devices is another factor causing traffic issues as most of the available devices in the market are not free of bugs and faults[16].Moreover,damaging of hardware equipment also causes link failure and disconnections between network links.

    1.4 Traffic/Packets Loss Issues in SDN Network

    In software-defined networking,all process of traffic flow is controlled by a centralized controller.As in SDN switches are OpenFlow that take instructions from the controller.When hosts start communication, the routing path for the flow of packets between hosts is defined by the controller by installing rules[17].For example,when‘host A’sends packets to another‘host B’,the information packet first travels towards the controller to take direction for its packet’s flow and according to the defined SDN policy,the controller then assigns the shortest or suitable forwarding path[18].The rest of the packages follow the rule and start flow according to the controller’s defined control.Though,there exist some traffic-related issues in SDN on its level which may cause a forwarding loop and traffic congestion, packets drop may also occur due to the said reasons or by facing an unexpected link failure in the network[19].

    1.5 The Considerable Packets Loss in SDN

    SDN is based on a centralized operating controller, the handling of activity and state-change events of the network are also based on how smartly the controller monitors the complexity of network states.In each newly starting communication,the first packet goes to the controller where the controller finds its destination and then its location on the network[20].Then,the controller sets a switch-byswitch forwarding path to flow all packets of its sequence to the destination host [21].After taking the rule from the controller,the rest of the packets only follow the controller’s defined path to reach the destination host.Meanwhile,if the host moves from its original location and appears to another site,the OpenFlow switch of the last location of the destination host gets confused.This time packets reach their destination switch,but there is no host available on the OF-Switch to receive these packets,which causes silent drop of packets[22].

    SND plays a vital role in the operation of OpenFlow traffic enhancement.The complexity of Networks leads towards facing bugs.The proposed solutions,so far,cannot prevent it entirely crowd and errors as the variety of mistakes are also arising with the growing worth of OpenFlow.The SDN network traffic may cause errors and bugs while using the OpenFlow information.The congestion and other such problems may arise,and these problems motivate us to define a new solution through a control transmission layer to deliver the traffic flow efficiently.The primary motivation is absence of effective material that monitors all the connections of end hosts at their specific locations and performs necessary settlements when the connection state changes for one or multiple hosts while the layer informs the controller regarding any state change at one period.

    The rest of the paper is generally organized as;in Section 2,we presented the related work based on Load balancing in SDN,Section 3 presented the framework of the proposed solution and model diagram, in Section 4, we simulate our techniques.Finally, in Section 5, we have shown results and graphs,and at last,conclusion and future directions are discussed.

    2 Related Work

    SDN consists of three main stacks SDN applications, SDN controller, and SDN networking devices.The data plane and control plane are decoupled in SDN architecture and distributed as the application, control, and infrastructure layers into the layered structure.Some of the existing techniques are used to monitor and control SDN networks to manage network performance.A CharryPick[23]technique is used to trace packet trajectories and minimize two data plane resources.One is Reduces Switch flow rules,and the other Minimizes packet header space.Each network link is assigned a unique identifier in this technique,and all switches embed this identifier into each packet header during the forwarding process.This minimizes the switch flow rules, with this process, the packet header goes with a high packet header space, especially the line of packet transverse in the forwarding loop due to the failure of short paths.To reduce packet header space, only minimum number of essential links are picked.For a 48-port switch, CherryPick requires (log (48) = 6 bits)to represent each link.Simultaneously, the path tracer, the previous technique, required log(p) bits for packet header space where P represents the number of absolute paths between the source host and destination host.After evaluation, the cherrypick technique used minimal header space and reduced switch flow rules compared to other approaches (Pathlettracer, Pathquery).On the other hand,many switch-flow rules are required in the Pathlet-tracer technique which is used to reduce the packet headers.Controller floods a packet to learning switch to find about an unknown destination host[24,25].

    One of the flooded packets responds to the controller about its host destination’s location and learns its location.Here the remaining packets in flood can cause additional, unnecessary rules installed in the network,which might occur a packet storm.In the said situation,such bugs can cause serious consequences.For example,a forwarding loop is considered the first bug that would stay until it is related to the rule expires.Writing of additional rules(excess restrictions may decrease the network performance[26].12_multi,a POX platform component,involves maintaining the mapping of hosts at a switch and port for every control in the network.According to the controller’s code,it is located for the destination host when a packet is sent to it because the host’s destination is unknown[27].

    The controller floods the packets to switches to find an unknown destination.When flooded packets reach their adjacent switches,the controller instructs to continue flooding of packets,then it sees reply packets and learns the host’s destination.The remaining flood stays there in the network,and by forwarding these packets,the switch to switch reaches them for OpenFlow switches[28].These duplicate packets are again sent to the controller by OpenFlow switches as the destination’s location is unknown.The controller resultantly installs additional rules for duplicate packets,which may cause inefficiency in network performance.Query language has been introduced called path query [29]through regular expressions, which also includes SQL-like group-by construct to take information from the network.The path query monitors network traffic by transmitting packet trajectories at any network level on the data plane.It is also possible to specify different queries at a time that are independent.Tab.1 depicts more in-depth literature after comparing the related works of flow table entries reduction mechanism.

    The SDN is convenient, flexible in its structure, and economical by providing programmable controlled strategies as OpenFlow layered architecture[41].The OpenFlow is programmed for better performance and mature network architecture utilizing error-free communication.But there are several issues and problems faced,when nodes want to communicate with each other.An SDN Switch processpacket_inandpacket_outmessages and generates a possible reply to the controller.But a completely processedPacket_outmessage does not assure the guarantee for the actual existence of its included packet in the switch,which may be dropped due to switch failure,congestion,or by facing invalid ports.In authors [42] propose a hierarchical SDN control plane approach to guarantee the E2E QoS among multiple domains with various QoS classes on the E2E path.We propose a controller module for selecting the most suitable QoS class for each domain in the E2E path, based on multicriteria decision-making by using the technique for order of preference by similarity to ideal solution(TOPSIS).A new approach is proposed with a controller with an optimum feature set that must be available for SDN.Furthermore,a cluster of optimum feature set controllers will overcome a SPOF and improve the QoS in SDN.Herein,leveraging an analytical network process(ANP),we rank SDN controllers regarding their supporting features and create a hierarchical control plane-based cluster(HCPC)of the highly ranked controller computed using the ANP,evaluating their performance for the OS3E topology.In[43],a two-step approach is proposed for SDN controller selection.First,the controllers are ranked with analytical network process(ANP)according to their qualitative features,which influence the performance of these controllers,then,a performance comparison is performed to check for the QoS improvement.

    Fig.1 describes the scenario.The rest of the packets should be forwarded to the new location of Host B, which is accommodated in our proposed solution.In the SDN environment, the packet loss problem always occurred with a simple SDN environment where all the hosts are connected and provide packet flow rates.The SDN network traffic may cause errors and bugs while using the OpenFlow information.The congestion and other such problems may arise,and these problems motivate us to define a new solution through a control transmission layer to deliver the traffic flow efficiently.The Transmission Control Layer provides efficient packet transmission and packet delivery control using OpenFlow switches in VANET.

    Figure 1:Packets discarded on all switches as per controller’s rule

    3 Proposed System

    To handle the packet loss problems discussed in our problem statement,we proposed an efficient working mechanism capable of monitoring end nodes and informing the controller regarding any state of change within a specific time.It detects a movable host and informs the controller.Then the controller updates the switch to move the rest of the packets towards the new destination of the portable host instead of discarding these packets.Figs.2a and 2b present that the packets are being forwarded towards the changed location of the destination host.These packets were discarded in the existing solution.

    Figure 2:Packet forwarding techniques through destination host in proposed work (a) ITCL Layer instructing controller about movable host(b)all packets forwarded to changed location of destination host

    3.1 Preparation and Implementation of Rules

    By getting information on topology from the network,we need to install flow tables for switches.First,we maintain I.P.and MAC tables for all active hosts on the network.Second,we implement a MAC-matching policy for end nodes of switches that match the destination host’s MAC address while delivering packets to destination end nodes.Finally, we instruct the SDN controller to install flow rules to all available switches on the network.

    3.2 Activation of ITCL

    We keep active a transmission control layer named “Intelligent Transmission Control Layer,”pronounced as ITCL.The said layer intelligently monitors the network,especially the movement of hosts during communication.For example,suppose a host moves from its location to another location during communication within a specific timeout period.In that case, ITCL informs the controller about its new location and instructs to update the flow table of all switches according to the location change state.Updating of flow table forwards the packets of the movable host towards its changed location.

    3.3 Workflow of Proposed Solution

    When the network starts,ITCL also starts functioning.First,it starts getting information of hosts with I.P.&MAC,then,it instructs the controller to implement an IP-MAC-Matching policy for the packets while delivering them to their end nodes.By implementing the said policy,the packages are tagged with I.P.,and the MAC address of the destination host also matches with the I.P.address and MAC address of the destination host before delivering it to the end node.

    If I.P.and MAC tagged in packet header matches with the I.P.and MAC of the destination host,the packet delivers to the end node, otherwise, ITCL keeps its I.P.and MAC Address reserve if the host moves to another location until Idle Timeout/Hard Timeout is nonzero.In this state,when I.P.and MAC do not match, the packet also does not get deliver to the end host.Packet waits for new instructions initiated by ITCL to the controller,and controller assigns forwarding path and updates flow table in switches.When the destination host appears on another location within the timeout period,the ITCL identifies it by its MAC.The controller assigns the reserved I.P.,which is retained with the same MAC address instructed by ITCL.As a result, the rest of the packets start travelling towards the changed location of the destination host and gets delivered there.The proposed solution prevents packet loss(packet discard and packet drop)due to the movable host.As the flow diagram in Fig.7 presents step by step flow of the system.

    3.4 Table of Notation

    Table 1:Comparison of the related works of flow table entries reduction mechanism

    Table 1:Continued

    Table 2:Table of notations

    Table 3:Packets used

    Table 4:Retrieved information from Wireshark during states change

    Table 5:Bandwidth Usage

    Tab.2 summarizes the symbols and notations used in this paper and in algorithm one and explains the corresponding meanings.

    Fig.3 contains the flow diagram;it describes how the controller is updated for a host changing its location,and the rest of the packets travel towards the host’s changed location.

    Algorithm 1:Installation of Flow Rules Input:Network Packets Output:(Forwardpath)+( IP Procedure:Start Ptrans()←Dpacket()MAC matching on end node)+ActiveITCL(Continued)

    if((pkt.DistIP ←EndNode.IP)&&(pkt.DistMAC ←EndNode.MAC)Pktpuched→endNode()else while(Tout →i0NonZero)Store()pkt ←ITCLroute_change()if(RouteChange()←router)pkt ←newNode()End loop end if else pkt ←send(C,R,pkt)Packet_discard()end

    Figure 3:Data flow inside the implemented technique

    4 Results and Discussion

    We measured various parameters for evaluating our proposed solution as packet loss rate,congestion,measurement of latency,load on CPU,and throughput of proposed algorithms.We also tested multi-state change scenarios and measured the packet loss ratio with other aspects.Mininet is simply a network emulator that virtually provides a complete network environment like switches,links,and controllers.The hosts in Mininet run a standard Linux-based network software and create a real-like virtual network environment.Mininet is based on a single Linux kernel capable of running Mininet offers learning,research and development,prototyping,testing and debugging,and a whole experimental network on a single machine.

    Wireshark is an analyzing tool for analysis of network packets and generates detail as captured as possible.Wireshark can be used by network administrators,network security engineers,or network developers for network troubleshooting to examine network security issues or debug while protocol implementation [44–46].Furthermore, different parameters are used like bandwidth usage, packet delivery/loss rate,and throughput to evaluate our proposed solution’s performance.We passed 1000 packets from the source host to the destination host for each scenario and repeated our scenario ten times.The bandwidth information is saved in Tab.3.

    4.1 Movable Host Detection Time and New Host Registration Time

    We evaluate the parameters as in our proposed solution,total time used in detecting a moveable host on the network rather than sending the rest of the packets to it.In the existing solution, the registration time of a host on the network.The time interval for both is measured by delivering N number of packets to a movable host.To understand the scenario’s algorithm,we generated a Tab.5 as follows.There are N numbers of packets to be sent from host to destination.In our discussed network,there are 02 hops between source and destination.We calculated packets reaching a time in a constant state as:

    packetsreached destination() ←N Packets

    hopecount(source,destination) ←H Hope

    perHopetime() ←T Time

    timereached(destination) ←T x H x N

    Fig.4 presents the number of packets that reach the destination with constant v.The said scenario is before moving a destination host.After state change, when a destination host moves to another location,the existing solution re-registers it and sends zero packets.But in the proposed solution,we safe the packets already received by the destination host and the packets in a transit state and discarded in the existing solution as shown in Tab.4.Hence,the number of packets to be processed after movable host in the current and proposed solution.So,we saved time as following:

    Figure 4:Reach time calculation for packets

    4.2 Existing Solution

    Totalpacket←1000

    packetsreacheddestination()←321

    packetdiscard←53

    packetdropped←6

    After host movable total packets to be processed←1000

    4.3 Proposed Solution

    Totalpacket←1000

    packetsreached destination()←321

    packetdiscard←53

    packetdropped←6

    Fig.5 presents the ratio of the packets to be processed after the host movement.Because processing fewer packets in the proposed solution saves the network’s bandwidth, which maximizes network performance.As in Tab.4, the packets are less processed in the proposed solution; the bandwidth according to the number of packets is measured.Fig.6 shows the packet ratio to get processed when hosts move.The results demonstrate that the proposed technique has fewer packets to be processed as security after the host move.

    4.4 Network Throughput

    Another parameter of network performance is throughput.Throughput is defined as‘the maximum performance of the network’.Our described problem network works more after the movable host state because it sends packets from the start after the host changes its location.But in our proposed solution, the packets that have already been received and will be discarded due to movable host are saved.These packets start traveling from their respective switches towards the destination,instead of traveling again from the source host(Fig.8).Throughput can be measured by dividing“TCP window size(data packets)”with communication data packets.We can calculate the throughput of the existing solution as following:

    Figure 5:Graph showing ratio of packets to be processed after host movable

    Figure 6:Bandwidth availability in both solutions(8MBs)

    Figure 7:Bandwidth availability in both solutions(10MB)

    As the TCP window size is 65535 bytes(or 524280 bits)predefined in IETF RFC 1323,the round value of the average of 10 packets calculated from the host terminal is 0.054 s.

    Figure 8:Bandwidth availability in both solutions(15 MB)

    So Throughput of existing solution:

    The saved discarded packets of the existing solution will not take a full round from source host to destination.These packets get forward from their respective switches on which these exist,when the destination host changes its location.So,the number of hops for saved packages is reduced,time to reach the changed destination will also be reduced for these packets.Fig.9 shows the throughput for 500 s,and Fig.10 shows the throughput for 1000 s.

    Figure 9:Throughput comparison between existing solution and proposed solution

    Here we take the average time of minimum hops of saved packets + time of maximum hops of packets and divide by total hops in the path as:

    So through of proposed solution:

    Hence it is:

    Figure 10:Throughput comparison between existing solution and proposed solution

    5 Conclusion

    In this paper, we examined the loosing of packets due to moveable hosts in two forms:One is examined as dropped packets when a destination host changes its location while the other is due to discard of the packets in transit state or midway between source and destination.We conclude that our proposed solution has well rectified this issue and produced better evaluation results.We have achieved more network efficiency,saved the bandwidth,protected packets from loss,and our proposed solution has achieved better throughput.In future work,one can utilize the proposed technique for large data centers and wireless SDN network setup as this technique can be utilized in SDN-based cellular networks,as it is cost-effective and a programmed network technique for efficiently monitored networks.The chances of data lost during communication are reduced,and the time-saving approach will lead nicely to the organizational networks through such a programmatically controlled network.Our results show that the bandwidth,packet delivery ratio,and Hop Count are better from the existing technique by 28%.Furthermore,the results show that the packet does not lose and improved 60%from the existing technique,on 8Mb,10Mb,and 15Mb,the bandwidth is effectively utilized for all values.The network throughput is checked and measured for 500 sec and 1000 sec.The effectiveness of the results show that the proposed technique outperformed the existing approaches in network bandwidth and throughput.

    Funding Statement:This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program.

    Conflicts of Interest:“The authors declare that they have no conflicts of interest to report regarding the present study.”

    高清黄色对白视频在线免费看| 黄片大片在线免费观看| a级片在线免费高清观看视频| 欧美日韩精品网址| 天堂8中文在线网| 欧美一级毛片孕妇| 这个男人来自地球电影免费观看| 国产精品九九99| 久久久欧美国产精品| 国产日韩欧美在线精品| 国产亚洲一区二区精品| 国产免费视频播放在线视频| 国产亚洲欧美精品永久| 欧美精品一区二区免费开放| 精品免费久久久久久久清纯 | 成年美女黄网站色视频大全免费| 日韩三级视频一区二区三区| 欧美午夜高清在线| 日本欧美视频一区| 亚洲国产成人一精品久久久| 侵犯人妻中文字幕一二三四区| 亚洲精品av麻豆狂野| 丰满人妻熟妇乱又伦精品不卡| 成人国语在线视频| 视频区图区小说| 后天国语完整版免费观看| 久久性视频一级片| 亚洲av国产av综合av卡| 69av精品久久久久久 | 亚洲成av片中文字幕在线观看| 午夜免费观看性视频| 国产又爽黄色视频| 悠悠久久av| 亚洲精品国产区一区二| 欧美精品亚洲一区二区| 日日爽夜夜爽网站| 黄色毛片三级朝国网站| 精品一区在线观看国产| 极品人妻少妇av视频| 精品高清国产在线一区| 精品国产一区二区三区四区第35| 伊人久久大香线蕉亚洲五| 成人免费观看视频高清| 国产精品一区二区在线观看99| 在线精品无人区一区二区三| 国产三级黄色录像| 亚洲人成电影观看| 亚洲国产av影院在线观看| √禁漫天堂资源中文www| 操美女的视频在线观看| 成人手机av| 色94色欧美一区二区| 美女高潮到喷水免费观看| 美女高潮到喷水免费观看| 午夜福利在线免费观看网站| 国产欧美日韩精品亚洲av| 热99久久久久精品小说推荐| 国产又色又爽无遮挡免| 亚洲成人国产一区在线观看| 99国产精品免费福利视频| 免费在线观看完整版高清| 国产免费av片在线观看野外av| 十八禁高潮呻吟视频| 欧美+亚洲+日韩+国产| 一级黄色大片毛片| 男人爽女人下面视频在线观看| av又黄又爽大尺度在线免费看| 精品久久久久久电影网| 男女免费视频国产| 国产精品av久久久久免费| 国产福利在线免费观看视频| 女性生殖器流出的白浆| 亚洲成av片中文字幕在线观看| 少妇被粗大的猛进出69影院| h视频一区二区三区| 日韩 欧美 亚洲 中文字幕| 精品亚洲成a人片在线观看| av在线app专区| 久久精品aⅴ一区二区三区四区| 老汉色av国产亚洲站长工具| 成在线人永久免费视频| 黄色视频不卡| 精品人妻在线不人妻| 久久久国产欧美日韩av| 国产日韩欧美在线精品| 免费少妇av软件| 男女无遮挡免费网站观看| av欧美777| 日韩视频在线欧美| 欧美在线黄色| 另类亚洲欧美激情| kizo精华| 国产欧美日韩一区二区三 | 成人免费观看视频高清| 免费高清在线观看日韩| 亚洲九九香蕉| 亚洲av电影在线进入| 99精国产麻豆久久婷婷| 国产男女超爽视频在线观看| 最近中文字幕2019免费版| 叶爱在线成人免费视频播放| 黄频高清免费视频| 最近最新免费中文字幕在线| 18在线观看网站| 国产欧美日韩一区二区精品| 777米奇影视久久| 欧美国产精品一级二级三级| 免费av中文字幕在线| 久久热在线av| 精品一区二区三区av网在线观看 | 国产免费福利视频在线观看| 亚洲一码二码三码区别大吗| 纵有疾风起免费观看全集完整版| 免费高清在线观看视频在线观看| 最新的欧美精品一区二区| 欧美成狂野欧美在线观看| 91国产中文字幕| 国产麻豆69| 一区二区av电影网| 最新在线观看一区二区三区| 国产精品亚洲av一区麻豆| 国产一区二区三区在线臀色熟女 | 性高湖久久久久久久久免费观看| 亚洲av日韩精品久久久久久密| 国产伦人伦偷精品视频| 少妇裸体淫交视频免费看高清 | av一本久久久久| 两个人看的免费小视频| 窝窝影院91人妻| 美国免费a级毛片| 欧美日韩精品网址| 亚洲国产欧美日韩在线播放| 涩涩av久久男人的天堂| av在线老鸭窝| 欧美黑人精品巨大| 80岁老熟妇乱子伦牲交| 精品人妻在线不人妻| 18禁国产床啪视频网站| 亚洲成av片中文字幕在线观看| 精品少妇黑人巨大在线播放| 日本精品一区二区三区蜜桃| 亚洲精品粉嫩美女一区| 视频区欧美日本亚洲| 久久人妻福利社区极品人妻图片| 国产福利在线免费观看视频| 最新的欧美精品一区二区| 老司机午夜十八禁免费视频| 一本色道久久久久久精品综合| 各种免费的搞黄视频| svipshipincom国产片| 国产高清国产精品国产三级| 亚洲精品久久午夜乱码| 欧美日韩国产mv在线观看视频| 一区二区三区乱码不卡18| 一二三四在线观看免费中文在| 99热全是精品| 久久久久久人人人人人| 亚洲精品国产区一区二| 无遮挡黄片免费观看| 亚洲欧美色中文字幕在线| 久久久精品免费免费高清| 久久av网站| 叶爱在线成人免费视频播放| 丝袜人妻中文字幕| 欧美日韩视频精品一区| 亚洲国产av新网站| 大片电影免费在线观看免费| 日本av手机在线免费观看| 女性被躁到高潮视频| 999精品在线视频| 欧美+亚洲+日韩+国产| tube8黄色片| 欧美激情 高清一区二区三区| 大陆偷拍与自拍| 国产亚洲精品久久久久5区| 亚洲一区二区三区欧美精品| 午夜精品久久久久久毛片777| 久久这里只有精品19| 国产片内射在线| xxxhd国产人妻xxx| 不卡av一区二区三区| 欧美成人午夜精品| 国产野战对白在线观看| 在线永久观看黄色视频| 国产在线免费精品| 久久精品人人爽人人爽视色| 色精品久久人妻99蜜桃| 国产精品成人在线| av片东京热男人的天堂| 两个人看的免费小视频| 热99国产精品久久久久久7| 亚洲熟女毛片儿| 十八禁高潮呻吟视频| 国产91精品成人一区二区三区 | 宅男免费午夜| 日韩视频一区二区在线观看| 国产精品成人在线| 中文精品一卡2卡3卡4更新| 欧美大码av| netflix在线观看网站| 久久国产精品影院| 久久精品国产a三级三级三级| 天天影视国产精品| 一个人免费看片子| 精品少妇黑人巨大在线播放| 老司机影院毛片| 亚洲av国产av综合av卡| 日韩一卡2卡3卡4卡2021年| svipshipincom国产片| 我要看黄色一级片免费的| 免费在线观看影片大全网站| 日韩电影二区| 欧美日韩中文字幕国产精品一区二区三区 | 建设人人有责人人尽责人人享有的| 在线观看www视频免费| 国产精品久久久av美女十八| 性高湖久久久久久久久免费观看| 男女边摸边吃奶| 精品少妇久久久久久888优播| 99国产精品一区二区三区| 12—13女人毛片做爰片一| 日韩精品免费视频一区二区三区| 国产在线视频一区二区| 国产福利在线免费观看视频| bbb黄色大片| 亚洲欧洲精品一区二区精品久久久| 在线观看免费高清a一片| 9热在线视频观看99| 人人妻,人人澡人人爽秒播| 久久久精品免费免费高清| 最近中文字幕2019免费版| 亚洲人成电影观看| 午夜激情久久久久久久| 99久久99久久久精品蜜桃| 亚洲国产欧美日韩在线播放| 亚洲,欧美精品.| 国产成人精品久久二区二区91| 欧美日韩福利视频一区二区| 欧美中文综合在线视频| 亚洲va日本ⅴa欧美va伊人久久 | 国产精品二区激情视频| 男女免费视频国产| 精品国产乱码久久久久久小说| 国产激情久久老熟女| 国产免费一区二区三区四区乱码| 777久久人妻少妇嫩草av网站| av在线app专区| 亚洲久久久国产精品| 久久免费观看电影| 中文精品一卡2卡3卡4更新| 男女国产视频网站| 国产一区二区 视频在线| 国产免费一区二区三区四区乱码| 国产免费一区二区三区四区乱码| 妹子高潮喷水视频| 一区二区日韩欧美中文字幕| 中文字幕另类日韩欧美亚洲嫩草| 99热国产这里只有精品6| 中文字幕最新亚洲高清| 亚洲va日本ⅴa欧美va伊人久久 | 99国产精品免费福利视频| 交换朋友夫妻互换小说| 久9热在线精品视频| av一本久久久久| 一本综合久久免费| 嫩草影视91久久| 国产一卡二卡三卡精品| 性色av乱码一区二区三区2| 午夜老司机福利片| 国产高清国产精品国产三级| 免费在线观看视频国产中文字幕亚洲 | 无遮挡黄片免费观看| 十八禁网站网址无遮挡| 久久久久久久久久久久大奶| 最新在线观看一区二区三区| 国产av国产精品国产| 亚洲精品中文字幕在线视频| 久久精品aⅴ一区二区三区四区| 国产免费福利视频在线观看| 中文字幕色久视频| 9191精品国产免费久久| 99久久人妻综合| 国产在线视频一区二区| 国产黄色免费在线视频| 可以免费在线观看a视频的电影网站| 制服人妻中文乱码| 热99国产精品久久久久久7| 亚洲专区中文字幕在线| 国产一区二区三区综合在线观看| 伊人亚洲综合成人网| 桃花免费在线播放| 午夜91福利影院| 99久久人妻综合| 国产成人精品在线电影| 99热国产这里只有精品6| 久久久久久久精品精品| 黄网站色视频无遮挡免费观看| 国产淫语在线视频| 久久人妻熟女aⅴ| 日本撒尿小便嘘嘘汇集6| 一级毛片精品| 99热全是精品| 国产淫语在线视频| 满18在线观看网站| 亚洲国产欧美在线一区| 免费日韩欧美在线观看| 国产日韩欧美在线精品| 亚洲一码二码三码区别大吗| 中文精品一卡2卡3卡4更新| 亚洲va日本ⅴa欧美va伊人久久 | 久久久水蜜桃国产精品网| 汤姆久久久久久久影院中文字幕| 法律面前人人平等表现在哪些方面 | 丁香六月天网| 狠狠婷婷综合久久久久久88av| av片东京热男人的天堂| 一本大道久久a久久精品| 精品人妻1区二区| 亚洲av电影在线进入| 久久久久久亚洲精品国产蜜桃av| netflix在线观看网站| 伊人久久大香线蕉亚洲五| 岛国毛片在线播放| 久9热在线精品视频| 亚洲精品久久午夜乱码| 成年av动漫网址| 国产亚洲精品久久久久5区| 亚洲第一欧美日韩一区二区三区 | 免费观看a级毛片全部| 人人妻人人添人人爽欧美一区卜| 婷婷成人精品国产| 亚洲久久久国产精品| 国产欧美日韩综合在线一区二区| 午夜91福利影院| 99国产极品粉嫩在线观看| 交换朋友夫妻互换小说| 国产亚洲欧美精品永久| 曰老女人黄片| 精品一品国产午夜福利视频| 最近最新免费中文字幕在线| 多毛熟女@视频| 另类精品久久| 日韩,欧美,国产一区二区三区| 制服诱惑二区| 国产成人免费无遮挡视频| 国产无遮挡羞羞视频在线观看| 免费在线观看完整版高清| 国产黄频视频在线观看| 制服人妻中文乱码| 啦啦啦啦在线视频资源| 亚洲成av片中文字幕在线观看| 国产极品粉嫩免费观看在线| av电影中文网址| 搡老岳熟女国产| 久久精品成人免费网站| 精品少妇久久久久久888优播| 伊人久久大香线蕉亚洲五| 狠狠婷婷综合久久久久久88av| 亚洲精品国产一区二区精华液| av免费在线观看网站| 亚洲av美国av| av福利片在线| 亚洲精品国产av成人精品| 日韩精品免费视频一区二区三区| 视频在线观看一区二区三区| 久久综合国产亚洲精品| 狠狠精品人妻久久久久久综合| 欧美日韩中文字幕国产精品一区二区三区 | 久久香蕉激情| 国产1区2区3区精品| 一个人免费看片子| 纵有疾风起免费观看全集完整版| 中国国产av一级| 老熟妇仑乱视频hdxx| 欧美日本中文国产一区发布| 99热国产这里只有精品6| 美女福利国产在线| 亚洲少妇的诱惑av| 国产成人精品无人区| 伦理电影免费视频| 美女视频免费永久观看网站| 亚洲精品粉嫩美女一区| 少妇人妻久久综合中文| 我要看黄色一级片免费的| 久久毛片免费看一区二区三区| 亚洲人成电影观看| 啦啦啦视频在线资源免费观看| 精品人妻1区二区| 亚洲欧美一区二区三区黑人| 法律面前人人平等表现在哪些方面 | 在线亚洲精品国产二区图片欧美| 亚洲精品美女久久久久99蜜臀| 免费在线观看黄色视频的| 人妻人人澡人人爽人人| 国产主播在线观看一区二区| 亚洲人成电影观看| 黑人猛操日本美女一级片| 亚洲欧美日韩另类电影网站| 国产91精品成人一区二区三区 | 日本a在线网址| 男女国产视频网站| 亚洲欧美激情在线| 日本黄色日本黄色录像| 午夜老司机福利片| 一本大道久久a久久精品| 日韩精品免费视频一区二区三区| 丝袜人妻中文字幕| 国产成人啪精品午夜网站| 国产精品1区2区在线观看. | 中文欧美无线码| 亚洲 欧美一区二区三区| 人人妻,人人澡人人爽秒播| 大陆偷拍与自拍| 国产男女内射视频| 一边摸一边做爽爽视频免费| 大香蕉久久网| 大片电影免费在线观看免费| 妹子高潮喷水视频| 亚洲性夜色夜夜综合| 日本撒尿小便嘘嘘汇集6| 色婷婷久久久亚洲欧美| av视频免费观看在线观看| 嫁个100分男人电影在线观看| 看免费av毛片| 伦理电影免费视频| 男人舔女人的私密视频| 亚洲精品中文字幕一二三四区 | 国产成人欧美在线观看 | 国产精品久久久久久人妻精品电影 | 国产精品久久久久久人妻精品电影 | 母亲3免费完整高清在线观看| 青春草亚洲视频在线观看| 女人高潮潮喷娇喘18禁视频| 午夜福利在线观看吧| 亚洲成人手机| 91麻豆av在线| 国产精品熟女久久久久浪| 国产真人三级小视频在线观看| 国产一区二区三区av在线| 国产成+人综合+亚洲专区| 18禁国产床啪视频网站| 三级毛片av免费| a 毛片基地| 国产精品九九99| 夫妻午夜视频| 麻豆乱淫一区二区| 女性生殖器流出的白浆| 国产精品一区二区在线不卡| tube8黄色片| 两性夫妻黄色片| 两性午夜刺激爽爽歪歪视频在线观看 | 免费人妻精品一区二区三区视频| 美女福利国产在线| 国产主播在线观看一区二区| 中文字幕人妻熟女乱码| 免费日韩欧美在线观看| 久久中文看片网| 日本撒尿小便嘘嘘汇集6| a 毛片基地| 亚洲中文av在线| 男女国产视频网站| 亚洲国产看品久久| 91麻豆av在线| 国产亚洲精品第一综合不卡| 国产av又大| 少妇 在线观看| 国产男女超爽视频在线观看| www.精华液| 中文字幕制服av| 色精品久久人妻99蜜桃| 久久 成人 亚洲| 两个人免费观看高清视频| 国产成人av教育| 亚洲精品第二区| 亚洲人成77777在线视频| 久久午夜综合久久蜜桃| 日本91视频免费播放| 成人手机av| 国产99久久九九免费精品| 男人舔女人的私密视频| 午夜福利在线观看吧| 一本综合久久免费| 亚洲精品美女久久久久99蜜臀| 国产欧美日韩一区二区精品| 99久久综合免费| 欧美在线黄色| 高清黄色对白视频在线免费看| 欧美久久黑人一区二区| 男人添女人高潮全过程视频| 极品人妻少妇av视频| 999久久久精品免费观看国产| 叶爱在线成人免费视频播放| 看免费av毛片| 精品一品国产午夜福利视频| 一区二区av电影网| 免费在线观看影片大全网站| 亚洲av国产av综合av卡| 女人爽到高潮嗷嗷叫在线视频| 欧美日本中文国产一区发布| 中文字幕最新亚洲高清| 亚洲成人免费av在线播放| 99热国产这里只有精品6| 韩国高清视频一区二区三区| 亚洲精品日韩在线中文字幕| 又黄又粗又硬又大视频| 亚洲视频免费观看视频| 久久久久视频综合| 91字幕亚洲| 久久香蕉激情| 国产亚洲av高清不卡| 狠狠狠狠99中文字幕| 色播在线永久视频| 欧美激情极品国产一区二区三区| 一级毛片电影观看| 欧美97在线视频| 国产精品亚洲av一区麻豆| 999久久久国产精品视频| 桃红色精品国产亚洲av| 老司机在亚洲福利影院| 51午夜福利影视在线观看| 在线观看免费高清a一片| 人妻一区二区av| 亚洲av电影在线观看一区二区三区| 日韩电影二区| 在线av久久热| 亚洲国产成人一精品久久久| 大香蕉久久成人网| 九色亚洲精品在线播放| 精品国产乱码久久久久久男人| 国精品久久久久久国模美| 亚洲国产精品999| 中国国产av一级| 精品一品国产午夜福利视频| 国产成人免费观看mmmm| 亚洲国产成人一精品久久久| 国产精品偷伦视频观看了| 亚洲三区欧美一区| 视频在线观看一区二区三区| 色老头精品视频在线观看| 免费观看av网站的网址| 亚洲中文日韩欧美视频| 欧美激情极品国产一区二区三区| 国产一区二区 视频在线| 国产av一区二区精品久久| 91麻豆av在线| 一个人免费看片子| 视频区图区小说| 中文字幕制服av| 亚洲熟女精品中文字幕| 欧美成人午夜精品| 一级,二级,三级黄色视频| 欧美激情久久久久久爽电影 | 一级毛片精品| 日韩三级视频一区二区三区| 淫妇啪啪啪对白视频 | 亚洲av欧美aⅴ国产| 在线十欧美十亚洲十日本专区| 日韩欧美免费精品| 亚洲欧美清纯卡通| 国内毛片毛片毛片毛片毛片| 亚洲成人手机| 五月开心婷婷网| 日日爽夜夜爽网站| 亚洲国产日韩一区二区| 啦啦啦中文免费视频观看日本| 一二三四社区在线视频社区8| 欧美久久黑人一区二区| 中文字幕人妻丝袜一区二区| 国产人伦9x9x在线观看| 久久精品国产亚洲av香蕉五月 | 欧美亚洲日本最大视频资源| 汤姆久久久久久久影院中文字幕| 亚洲精品一卡2卡三卡4卡5卡 | 日韩一卡2卡3卡4卡2021年| 久久精品国产a三级三级三级| 视频区图区小说| 亚洲精品国产av蜜桃| 男人操女人黄网站| 女人被躁到高潮嗷嗷叫费观| 亚洲熟女精品中文字幕| 美女视频免费永久观看网站| 久久久国产成人免费| 999久久久国产精品视频| 精品熟女少妇八av免费久了| 国产高清视频在线播放一区 | 国产亚洲av高清不卡| 免费人妻精品一区二区三区视频| 秋霞在线观看毛片| 在线观看免费日韩欧美大片| 妹子高潮喷水视频| 亚洲熟女精品中文字幕| 国产高清视频在线播放一区 | 亚洲精品一区蜜桃| 日韩一卡2卡3卡4卡2021年| 久久久国产欧美日韩av| 国产精品亚洲av一区麻豆| 国产一区有黄有色的免费视频| 成年女人毛片免费观看观看9 | 丝袜美腿诱惑在线| 欧美精品啪啪一区二区三区 | 一本—道久久a久久精品蜜桃钙片| 国产日韩欧美亚洲二区| 国产成人免费观看mmmm| 国产日韩欧美在线精品| 免费久久久久久久精品成人欧美视频| 亚洲精品久久成人aⅴ小说| 欧美另类一区| 深夜精品福利| 久久99热这里只频精品6学生| 亚洲精品美女久久av网站| 亚洲 欧美一区二区三区| 国产亚洲欧美在线一区二区| 热re99久久国产66热| 99精国产麻豆久久婷婷| 老司机深夜福利视频在线观看 |