• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Deployment Strategy for Multiple Controllers Based on the Aviation On-Board Software-Defined Data Link Network

    2024-01-12 03:48:14YutingZhuYanfangFuYangCePanDengJianpengZhuandHuankunSu
    Computers Materials&Continua 2023年12期

    Yuting Zhu ,Yanfang Fu ,Yang Ce ,Pan Deng ,Jianpeng Zhu and Huankun Su

    1China Electronics Technology Group Corporation 20th Research Institute,Xi’an,710068,China

    2School of Computer Science and Engineering,Xi’an Technological University,Xi’an,710021,China

    3Department of Statistics and Actuarial Science,University of Waterloo,Waterloo,ON N2L 3G1,Canada

    ABSTRACT In light of the escalating demand and intricacy of services in contemporary terrestrial,maritime,and aerial combat operations,there is a compelling need for enhanced service quality and efficiency in airborne cluster communication networks.Software-Defined Networking (SDN) proffers a viable solution for the multifaceted task of cooperative communication transmission and management across different operational domains within complex combat contexts,due to its intrinsic ability to flexibly allocate and centrally administer network resources.This study pivots around the optimization of SDN controller deployment within airborne data link clusters.A collaborative multi-controller architecture predicated on airborne data link clusters is thus proposed.Within this architectural framework,the controller deployment issue is reframed as a two-fold problem:subdomain partitioning and central interaction node selection.We advocate a subdomain segmentation approach grounded in node value ranking(NDVR)and a central interaction node selection methodology predicated on an enhanced Artificial Fish Swarm Algorithm(AFSA).The advanced NDVR-AFSA(Node value ranking-Improved artificial fish swarm algorithm)algorithm makes use of a chaos algorithm for population initialization,boosting population diversity and circumventing premature algorithm convergence.By the integration of adaptive strategies and incorporation of the genetic algorithm’s crossover and mutation operations,the algorithm’s search range adaptability is enhanced,thereby increasing the possibility of obtaining globally optimal solutions,while concurrently augmenting cluster reliability.The simulation results verify the advantages of the NDVR-IAFSA algorithm,achieve a better load balancing effect,improve the reliability of aviation data link cluster,and significantly reduce the average propagation delay and disconnection rate,respectively,by 12.8% and 11.7%.This shows that the optimization scheme has important significance in practical application,and can meet the high requirements of modern sea,land,and air operations to aviation airborne communication networks.

    KEYWORDS Aviation cluster;software defined network;controller deployment;Airborne network;data link

    1 Introduction

    With the development of aviation technology,the avionics system has gone through many stages of development.However,due to the increasing complexity and diversity of combat tasks,the singleplatform avionics system cannot meet the increasing demands of combat.To achieve tactical coordination and complementary capability among different platforms,a multi-data link network becomes an important means of flexible networking among aviation combat platforms.However,the complexity of multi-data link networks is increasing,and the challenge of airborne networks to integrate multidata link and node resources is becoming more and more severe.In this case,the rational management and configuration of the airborne network,the effective integration of various data links and network node resources,will become the basic guarantee of future aviation multi-platform flexible network joint operations.Fig.1 elucidates the comprehensive use of diverse communication links in modern warfare,spanning across the terrains of air,land,and sea.These communication links—among which include Link 11,Link 16,and U/V link—each showcase unique network topologies,architectures,and protocols.To assure coordinated operations,there is an implicit necessity for these diverse links to be interconnected and their resources collectively utilized.Complex combat scenarios necessitate a communication network capable of providing high-speed,high-precision,and high-reliability data transmission and management.However,traditional communication networks fall short of satisfying these requisites,prompting a shift towards more intelligent,flexible,and efficient communication technology.Software-Defined Networking (SDN) emerges as a significant trend in the trajectory of future networks,offering enhancements in network management flexibility,deployment speed,and scalability.Such attributes make it an apt solution for addressing the efficiency and optimization demands of communication networks[1,2].

    The main challenge that arises with airborne combat networks,housing multiple coexisting data links,is the diminution of the independent management mode for each data link.The transformation allows for enhanced collaboration and operation among different data links,bolstering compatibility and fostering inter-link communication and cooperation.This not only fortifies the security of the data links but also guarantees the safety and seamless execution of airborne operations.

    In light of this situation,a proposition has been made for an airborne multi-data link control cluster grounded on SDN.This proposition primarily attends to the escalating control and management needs,which traditional communication networks find challenging to meet in an exponentially growing multi-data link network environment.Moreover,it augments the real-time performance,efficiency,and reliability of tactical communication networks within multi-controller environments[3].As the complexity of multi-data link networks elevates,the relationships between network nodes become increasingly intricate,inducing network bloating and subsequently diminishing internode communication efficiency.Hence,research into the amalgamation of multiple data links and software-defined network technology has been instigated,to fortify the performance and efficiency of communication technology for intricate operational requirements,bolster the intelligence and adaptability of communication networks,and enhance the flexibility of network deployment and management[4–6].

    In a multi-data link cluster environment,controllers grapple with challenges in effectuating efficient interaction with network nodes,primarily due to the inherent mobility and unreliability characteristics of data link nodes.Contrary to ground networks,controllers are unable to access the precise location and status information of nodes readily.Consequently,they cannot sense and react to network changes as swiftly as ground networks,impacting the robustness and scalability of the multi-data link communication platform.

    To bolster the scalability of software-defined networks in expansive and dynamic environments,it becomes imperative to construct a flexible control plane,which can adapt to network needs.A controller must embody the following attributes:

    (1) The capability to dynamically generate control messages and policies by varying network conditions and node states,rendering it suitable for multi-data link networks.

    (2)The capacity for real-time management and control in response to changes in node position or connection interruptions.

    (3) High adaptability and scalability,enabling the controller to manage large-scale nodes and complex network topologies.

    The realization of these characteristics allows for the effective resolution of the lower scalability of software-defined networks in large-scale and dynamic environments,enabling the creation of a flexible control plane tailored to network requirements.

    The development of a control plane adaptable to network needs within a multi-data link cluster environment is a crucial challenge faced by SDN.It is paramount to consider node mobility and unreliable characteristics and to design controller architecture and algorithms that are suitable for multi-data link networks to realize practical use and promote applications.The resolution of these key issues carries significant importance for the implementation of multi-data link networks.The processing capability of a solitary SDN controller is inherently constrained within data link networks.

    The voluminous traffic and multitude of requests may exceed its handling capacity,engendering sluggish speeds,management challenges,and an overall degradation in network performance.Such conditions foster delayed information processing and uneven load distribution.

    In recent years,the study of Controller Placement Problem (CPP) is rising,and researchers have found that the number and location of controllers have a direct impact on the performance of the control level.In the airborne network,the deployment location of the controller may cause delays in new stream establishment,problems of network configuration and management efficiency,and affect the reliability of the network.Early CPP studies focused on fixed topologies of WIRED SDN,with a focus on performance metrics and search algorithms.Later,researchers proposed CPP considering reliability optimization and explored greedy algorithm and simulated annealing algorithm.In addition to latency and reliability,load balancing,network resilience,and fault tolerance are also important performance indicators for CPP problems.At present,the research of CPP focuses on the flat controller architecture without considering the need for hierarchical deployment.Because of the significant difference between airborne networks and terrestrial networks,the previous research on CPP cannot meet the needs of aviation cluster scenarios in the aspects of controller architecture design,performance measurement,and search algorithm.Therefore,in the research of CPP of aviation clusters,we should design the appropriate controller architecture,and select the appropriate performance index and algorithm.Due to the lack of these considerations in the current research,its guiding role in practical application is limited.Therefore,under the background of a tactical multidata link network,it is the key to improve the network performance to establish the corresponding optimization model and algorithm for the CPP problem.This research can effectively solve the problem of limited controller performance and improve the reliability and stability of multi-data link networks.

    Current research focuses on three sub-questions:

    (1)with the development of aviation technology,the complexity and diversity of combat missions are increasing day by day,and the processing capacity of single-platform avionics systems is limited,which cannot meet the real-time service requirements of various operations.

    (2)to meet the actual needs of a multi-platform data link cluster network,and with the increasing complexity of multi-data link network,this may result in reduced or paralyzed performance of the airborne network for multi-datalink cluster and node resource management.

    (3)how to improve the reliability of airborne data link clusters and reduce the average propagation delay and average disconnection rate of clusters based on the load balance of multi-controllers.

    The principal contributions of this study can be encapsulated as follows:

    Foremost,in response to the conventional network performance inadequately accommodating the rapidly escalating service demands of various data links within an airborne cluster,this paper devises a system architecture for an airborne data link network and introduces a controller node deployment scheme.The deployment of controller nodes transpires across two phases:subdivision of domains and selection of central interactive nodes,thereby addressing current needs.

    Secondly,in terms of the subdivision of domains in the SDN multi-controller milieu,this study propounds an algorithm for subdomain division predicated on a synthesis of node value and reliability.By assessing node value and reliability,this algorithm generates subdomain divisions congruent with contemporary requirements,thereby augmenting network reliability and performance.

    Lastly,concerning the central interactive node selection conundrum,this study postulates a scheme that refines the Artificial Fish Swarm Algorithm(AFSA).Chaos algorithm is an optimization algorithm based on chaos theory.By introducing a chaos map,initial seed,and iteration number to search solution space,it has global search ability and convergence.To improve the search efficiency of the algorithm,chaos algorithm,and adaptive mechanism are introduced to improve the diversity and flexibility of fish initialization and avoid falling into local optimal solution.Simultaneously,the incorporation of crossover and mutation procedures from genetic algorithms amplifies the optimization capacity and search precision of the algorithm.This scheme,by evaluating the average propagation delay and average disconnection rate of the control path,facilitates optimal controller node placement.

    The subsequent sections of this paper will unravel as follows:Initially,Section 2 will introduce the extant related works.Following this,in Section 3,we will dissect and model the pertinent problems.Subsequently,and elucidate in detail the specific implementation methodologies of the enhanced algorithm.Section 4 will introduce the simulation experiments we have undertaken,accompanied by an analysis of comparative results.Lastly,in Section 5,we will encapsulate our research conclusions and contemplate prospective research trajectories.

    2 Related Work

    2.1 SDN Technology

    SDN technology enhances network centralization,programmability,and automation by SDN technology bolsters network centralization,programmability,and automation by disassociating network control and data forwarding.However,in large-scale networks,the capabilities of a single controller fall short of the requisite needs,thus prompting the suggestion of SDN multi-controller solutions to ameliorate network reliability and scalability.

    The prevailing SDN multi-controller architectures predominantly bifurcate into vertical and horizontal structures.The vertical configuration imposes an upper control layer on multiple controllers to coordinate intercommunication among them,but it grapples with predicaments such as substantial top-node loads and potential paralysis in case of failure[6,7].Conversely,the horizontal configuration aligns controllers at a similar level with uniform qualifications and roles,enhancing the scalability of the controllers and diminishing the performance prerequisites of individual controllers[8].Nonetheless,the quandary of load balancing in SDN multi-controller architecture remains unresolved.To address this issue,the following countermeasures may be considered.

    (1) The Port-Sharing scheme can divide physical ports into different logical ports.The primary controller occupies all physical ports,and the auxiliary controller balances the load only when the primary controller fails.This scheme enhances the disaster recovery capability of the primary controller but may affect the performance and load-balancing efficiency of the auxiliary controllers[9–12].

    (2)The Partition-based scheme can divide the SDN topology into different regions,each managed by a controller,and prevents multiple controllers from controlling the same switch.This scheme can improve load balancing efficiency but needs to consider load balance in partitions and changes in topology[13–15].

    (3) The Dynamic Load Balancing scheme uses dynamic load balancing technology to allocate controllers based on the real-time load of the SDN network.It can enhance the load balancing efficiency and fault tolerance of the controller,but it also needs to consider the real-time scheduling of controllers and the impact on network performance during actual deployment[16–18].

    (4) The Controller Pooling scheme allows multiple controllers to simultaneously access the same group of switches using a controller pool and enhances network reliability and scalability by automatically balancing the load.This scheme can improve load balancing efficiency while reducing the number of controllers,but it needs to consider the management and maintenance of the controller pool[19–21].

    2.2 Controller Deployment Techniques

    The CPP technology of the SDN multi-controller deployment algorithm is used to address the issue of multi-controller deployment in the SDN controller architecture [22].Its key solutions include static division algorithm,dynamic division algorithm,controller cooperation algorithm,and controller dynamic scheduling algorithm.

    (1) The static division algorithm primarily divides the network topology graph into multiple subdomains according to certain rules,with each subdomain managed by one controller[23].

    (2)The dynamic division algorithm adjusts the division of controller domains dynamically based on the real-time load of the SDN network,ensuring a more balanced load distribution[24].

    (3) The controller cooperation algorithm achieves load balance and stability among various controllers through data synchronization and cooperation[25].

    (4) The controller dynamic scheduling algorithm adaptively adjusts the load among different controllers,attaining optimal load balance and network performance[26].

    Depending on the specific features and practical needs of different SDN networks,an appropriate algorithm must be selected to solve the multi-controller deployment issue.In recent years,various major manufacturers have also offered corresponding solutions,further promoting the development and application of the CPP technology for the SDN multi-controller deployment algorithm.

    2.3 Optimization Approaches for Deployment Challenges

    The exhaustive algorithm can find the optimal solution of CPP,but it takes too much computing time for large-scale networks,so it is necessary to use a heuristic algorithm to find the approximate optimal solution in a short time.To address the problem that the exponential growth of Internet applications requires expensive computing costs,Malik et al.[27] proposed a new software-defined network Deep learning model that can accurately identify various traffic applications in a short period,called deep-SDN.The optimal solution is obtained in terms of accuracy,precision,and recall rate.Li et al.[28] proposed SDN networks based on deep learning to solve the problem that networks cannot adapt to the rapidly changing traffic behavior and limit their play.Adaptive deep Q-learning(ADQN)is used to make a deep reinforcement learning routing plan,which improves load stability and network performance.Ibrahim et al.[29] proposed the Controller Placement Problem(CPP)framework for dynamic mapping between controllers and switch migration in SDN distributed network architecture to improve the reliability and scalability of SDN systems.The GA is then integrated with the distribution component to improve the controller position.Luong et al.[30]proposed the AHP-SA algorithm,which combined the analytic Hierarchy Process (AHP) with the simulated annealing (SA) method.In this algorithm,AHP is applied to determine the weight of network attributes,and then the SA algorithm is applied to determine the allocation of requests to the network to obtain the best link.Tahmasebi et al.[31] described the controller placement problem as a multi-objective optimization problem.In this regard,several constraints are considered,including reliability,fault tolerance,performance in terms of latency,synchronization overhead,and deployment costs.In addition,we utilize the Cuckoo optimization algorithm,a nature-inspired crowdbased meta-heuristic algorithm,to solve the optimization problem.Although many new mechanisms have been proposed,such as Ma et al.’s Fuzzy logic algorithm[32]and Zhu et al.’s Stochastic systems[33] to solve optimization problems in different scenarios,genetic algorithms (GA) and PSO are evolutionary algorithms that can theoretically solve any general purpose single or multi-objective CPP.Sanner et al.[34]used a Genetic Algorithm(GA)to search for the optimal controller position,but only optimized the delay between the controller and the switch,and Lin et al.proposed an optimization algorithm for SDN controller placement based on multi-objective genetic algorithm[35].Xie et al.[36]proposed an improved PSO algorithm to solve the SDN controller placement,which regulates particle acceleration and velocity and considers optimization factor changes.Zhang et al.[37]also used particle swarm optimization to solve CPP and proposed an SDN-based method(PSOCB).A meta-heuristic method is used to allocate and optimize the existing cluster switches in the network between the source end and the destination end,which improves throughput and reduces latency.In the reference [38],Sharma et al.proposed a Bayesian framework to build an intelligent optimization framework for SDN resource management by using deep meta-reinforcement learning.Adaptive adjustment of controller parameter weights helps to deal with congestion caused by heavy loads.The algorithm determines the best action based on the prediction of reinforcement learning.In reference[39],Zheng et al.proposed an SDN load balancing algorithm based on Improved ant Colony Optimization load Balancing(ICOLB).To prevent the algorithm from falling into local optimality,based on the improvement of the basic ant colony algorithm,the Kent chaos model is used to disrupt the migration probability of ant colonies.After experiments,it is found that the algorithm can dynamically adjust the routing scheme according to the changes of network link traffic and servers,to improve the utilization rate.

    3 Modeling the Problem Domain

    Within the context of multi-platform aviation warfare scenarios,an array of aircraft and equipment,encompassing drones,early-warning aircraft,attack aircraft,helicopters,ground control stations,and more,communicate through designated data links to execute coordinated operations.These platforms establish communication links between airborne or ground-based data link devices,facilitating the exchange of data and instructions,consequently achieving a wide spectrum of combat tasks throughout the operations,including but not limited to,information acquisition and analysis,target positioning and engagement,and data transmission and sharing.

    As illustrated in Fig.2,the current study employs a cooperative,multi-controller architecture predicated on data links and accommodates the unique application scenarios of airborne clusters.We partition the control plane into a layered structure of controller cooperative architecture.The superior layer comprises the Top Controllers (TCs),accountable for cross-regional network communication and resource management.TCs are typically stationed on platforms such as early warning and command aircraft,integrating data across diverse platforms to gain a comprehensive understanding of the network and task status within the aviation cluster.This overarching perspective enables a swift response and effective management of the entire network,thus bolstering the combat capability and operational efficacy of the aviation cluster while ensuring information transmission efficiency and reliability.

    Figure 2:Schematic diagram of multi-controller cooperative architecture for airborne data link based on SDN

    The underlying multi-controller architecture is populated by Local Controllers (LCs),each maintaining the network view solely within its domain of control and collaborating with the Toplevel Controller(TC)to sustain a global network perspective.Each LC is charged with managing local devices and traffic and conducting downstream management.To accommodate node scale,network traffic,and other factors,LCs are deployed as needed,with the capability to be elastically activated or deactivated.This process creates a pool of local controller resources,forging a control plane with the top-level controller.This paper primarily delves into the deployment issues of LCs under this architecture.

    In deploying a multi-controller cluster,distinct controller nodes can be stationed across various subnets,each corresponding to a collection of switches and terminal devices.The cluster can use the shortest path algorithm to ascertain the controller node within the corresponding subnet,calculating the controller node in closest proximity to each switch within the subnet and transmitting this controller node’s location information to each device.Devices can pinpoint the controller nodes along the path through communication with neighboring switches and relay their event and status information to their respective controller nodes.To boost the overall efficiency of the cluster,multiple controller nodes can be stationed and coordinated across different subnets.Should a controller node within a subnet fail,an automatic transition can be performed through other nodes in the cluster,thereby circumventing the repercussions of single-point failures.

    This study embarks on an investigation of the determination process of a Local Controller(LC)deployment scheme that accommodates the exigencies of network management performance within a multi-layered controller architecture grounded in data link principles.This is undertaken under the predetermined conditions of the quantity and geographic distribution of network nodes as well as top-tier controllers.The ultimate objective of this exploration is to introduce an efficacious method to attain superior network management performance via the strategic deployment of LC controllers.

    By delving into the locational data of network nodes and global controllers,this study endeavors to identify the collection of network nodes apt for LC controllers.Subsequently,contingent on the size and dispersal of this node conglomerate,a pertinent algorithm will be employed to derive the LC controller deployment scheme that satisfies performance prerequisites.The endgame of this process is to facilitate meticulous regulation of network devices and traffic,thereby constructing an efficient network control plane and boosting the holistic performance and managerial efficacy of the network.

    Every platform within the operational network serves as a transmission node.The transmission linkage connecting the controller with the central interaction node is referred to as an out-of-band link.The network center converts the network,laden with multiple concurrent data links,into an undirected graph,denoted asG=(V,E,Tc,Lc).In this graph,Vstands for the compilation of network nodes;E signifies the collection of inter-nodal links;Tcrepresents the array of local controllers;andLcdesignates the assortment of local controllers,incorporating both elementsTc?VandLc?V.Detailed network parameters along with their descriptions are comprehensively illustrated in Table 1.

    Table 1:Network parameters and explanations

    3.1 Algorithm Description

    Amid the execution process of airborne data link cluster tasks,changes in combat tasks may induce alterations in the network topology.Leveraging all network topology information,the Top-level Controller(TC)can generate the deployment scheme by the LC deployment algorithm.Broadcasting this LC deployment scheme across the entire network,this method fosters efficiency and convenience in the LC deployment procedure.Simultaneously,it can adeptly manage changes in the data link network structure,thereby facilitating intelligent management of network devices.

    This study is predicated on the design of a multi-layer controller architecture based on data links,with the capability to effectively govern the network plane while fully leveraging data link resources.We introduce a sub-domain partitioning algorithm predicated on node importance ranking(NDVR),alongside an improved Artificial Fish Swarm Algorithm(IAFSA).Utilizing the positional information of network nodes and top-level controllers,the proposed algorithms can swiftly resolve an LC controller deployment scheme that meets network management performance requirements.The algorithms outlined in this paper possess practical implications and value in enhancing overall network performance and management efficiency.

    3.2 Subdomain Division Algorithm Based on Node Importance Ranking

    K-shell decomposition is a coarse-grained node importance classification method,which divides the network layer by layer from edge to core according to node location information.The K-shell value reflects the global position of the node in the network,and the larger the K-shell value,the more central the node’s position,and the more important the node.The steps of the K-shell decomposition method are as follows:

    (1)Calculate the degree of all nodes in the network,and take the smallest degree value as K;

    (2) Delete all nodes whose degree is K in the network,update the network,and recalculate the degree value.Recursively delete nodes whose degree is less than or equal to K until the degree of nodes in the network is greater than K,and mark the deleted nodes as k-shell;

    (3)Repeat steps(1)(2)until all nodes in the network have been stripped and marked with K-shell values.The ranking algorithm based on node importance in this paper uses the K-shell algorithm to calculate the importance of each node.

    In alignment with the design of the subdomain division algorithm based on node importance ranking,this section initially establishes the definition of node degree value,node reliability,and node importance as follows:

    Definition 1.The degree value of a node is defined as

    In Eqs.(1)and(2),Ijrepresents the network efficiency of nodej,Nis the total number of nodes,dijis the shortest distance from nodeito nodej,andksjis theksvalue of nodej.

    Definition 2.Node reliability is defined as

    In Eq.(3),the average value of the sum of the reciprocals of the distances from node i to other nodes.Here,Nis the total number of nodes,andxijrepresents the connectivity from nodeito nodej,with 1 for connected,and 0 for unconnected.

    Definition 3.Node importance

    In Eq.(4),Viis the value degree,and Riis the reliability.

    The algorithm for subdomain partitioning,anchored on the principle of node value ranking,bifurcates into two integral components: NDVRI: This component harnesses an advanced K-shell algorithm,with a focal point on node value,to ascertain the value degree of individual nodes.NDVRII:Drawing upon the value degrees procured,this segment computes the importance degrees,hierarchically orchestrates them,and consequently delineates the subdomains predicated on the derived outcomes.In the incipient phase,the NDVRI algorithm discerns nodes characterized by the most diminutive degree within the contemporaneous network,subsequently attributing to them an iteration factor termed IT.Predicated on a stipulated definition,the value degree of these nodes is represented asVi,is calculated(Lines 1–2).Thereafter,nodes bearing the least degree are excised from the network.Upon the scenario where the total nodes in the network diminish to nil,a juxtaposition ensues to ascertain whether IT(max) aligns with the antecedent iteration factor,IT.In instances of congruence,the node exuding the zenith value degree within the set congruent to the present iteration factor,IT,is methodically amalgamated into the paramount value degree node ranking assembly(Lines 3–10).In the absence of such congruence,the metric of IT is augmented by a unit(Lines 11–14).

    Conclusively,the algorithm unveils a node ranking ensemble,fundamentally rooted in their respective value degrees(Line 15).

    After this,the results obtained from NDVRI function as the input for NDVRII.Initially,it configures the preliminary network node matrix using the distance matrix and the greedy algorithm,calculates the value degreeViand reliabilityRifor each node under the formula,leading to the derivation of the importanceWi(Lines 1–3).Next,it orders the node setVin ascending order based on theWivalues,which produces the node setVCon,and selects the firstknodes to form the regional vertexS-con.If there is a presence of nodes sharing the sameWivalue,one is chosen at random from these(Lines 4–8).It then embarks on traversing the entire topology,measuring the distance from each node to the regional vertex.Following the principle of minimal distance to the regional vertex,the network is divided intoksubdomainsN={N1,N2,...,Nk}.The algorithm finally concludes the loop and delivers the partitioned subdomain setN(Lines 9–13).

    3.3 Optimization of Central Interaction Node Selection

    3.3.1 Optimization of Performance Indices

    This study elegantly reframes the problem of determining the optimal deployment sites for LCs within each subdomain.This is accomplished by reducing a multi-objective optimization problem to a single-objective one,with the express goal of curtailing the average propagation delay and the average disconnection rate in the control path.

    Definition 4.Average Propagation Delay of the Control Path

    Within the context of a sprawling airborne data link cluster,the average propagation delay of the control path is the aggregate of the average transmission lags from the transmission nodes to the LCs and from the LCs to the TCs.This metric is pivotal in ensuring effective control and swift response in the control plane.

    Definition 5.Average Disconnection Rate of the Control Path Given the prevalence of unstable link quality and high node disconnection rates within airborne data link clusters,the control path is often susceptible to interruptions.As such,the average disconnection rate of the control path serves as a crucial gauge of its reliability.This index offers an insightful view of the likelihood of control path interruptions within the network.

    In Eq.(6),l∈(V,S)symbolizes the ensemble of control paths extending from the transmission nodes to the LC nodes;l∈(S,M)refers to the collection of control paths from the LC nodes to the TC nodes;d1embodies the interruption rate of the control link;andp1pertains to the failure rate of the transmission nodes.

    Definition 6.Optimization Objective Function

    In Eq.(7),Tavgcorresponds to the summation of average transmission delays,σavgsignifies the average disconnection rate of the control path,and bothαandβhold a value of 0.5.

    3.3.2 Algorithm for Selecting Central Interactive

    Nodes as compared to the traditional CPP calculation methods,the optimization scheme proposed in this paper requires a comprehensive analysis of the controller link’s global attributes.This necessitates a system-wide viewpoint for deciding the placement of controllers in each subnetwork,escalating the complexity of the algorithm.To achieve the highest accuracy within a constrained time-frame,the research adopts the Improved Artificial Fish Swarm Algorithm (IAFSA).This heuristic search algorithm is optimally designed for resolving optimization challenges in a distributed environment,with key strengths including global search capabilities,simplicity of implementation,distributed optimization,ease of parameter tuning,and superior flexibility.

    Chaotic Operator-Based Improved Fish Swarm Initialization Strategy

    To amplify the global convergence capacity of the algorithm,the traditional Artificial Fish Swarm Algorithm is advanced by incorporating chaos mapping as an initialization approach for the fish swarm.The chaotic sequence,characterized by randomness,ergodicity,and regularity,assures the randomness and diversity of individual fish swarms,thereby ensuring an equitable distribution of the initial fish swarm across the solution space[40].

    Empirical findings indicate that the application of Logistic chaos mapping for fish swarm initialization surpasses the standard difference algorithm’s random distribution approach.The chaos mapping technique optimally disperses the population across the solution domain,thereby enhancing diversity and effectively curbing the algorithm’s premature convergence issue.The fundamental Logistic chaos mapping equation is as stated below:

    Xi+1is the chaos variable generated fromitoj.

    In Eq.(8),logistic chaos mapping,a frequently employed chaotic sequence,utilizes 0 ≤Xi≤1 andμas control parameters encompassed within the range of 0<μ≤4.A salient characteristic of the Logistic chaos mapping sequence manifests when the scope of control parameterμresides between 0 and 1.Irrespective of the system’s initial point or the selected value forμ,the chaotic sequence invariably gravitates towards zero as the iteration count escalates.

    In Eqs.(9) and (10),the operative range for Logistic chaos mapping is bracketed between(0,1).Upon setting the control parameterμto 4,it becomes feasible to engender chaotic variables.Conventionally,region [0,1] is partitioned into several subdivisions,facilitating the distribution of chaotic variables therein.For instance,region(0,1) is segmented into ten intervals,represented by(0,0.1],(0.1,0.2],...,(0.9,1].

    Nonetheless,owing to the disproportionate allocation of chaotic variables within intervals[0,0.1)and [0.9,1),the algorithm’s efficacy potentially suffers.In light of this,an enhancement has been implemented in the Logistic chaos mapping,with the revised equation as follows:

    In Eq.(11),the refined Logistic chaos mapping harmoniously reassigns the chaotic variables from regions 1 and 10 across other areas,exhibiting enhanced traversability.Consequently,utilizing the refined Logistic chaos mapping,the initialization of the population is executed according to the ensuing formula:

    Within this context,Xj-minstands for the minimum boundary value of the j-th dimensional gene,whereasXj-maxsignifies the maximum boundary value of the same dimensional gene.

    Adaptive Visual Field and Step Length Algorithm

    In a bid to amplify the algorithm’s global search capacity,this research introduces a piecewise adaptive function to modulate the visual field and the step size coefficient of the artificial fish.During the preliminary stages of the algorithm,the artificial fish possess an expanded visual field and step size,enabling a rapid evasion from local optima towards global search optimization.As the algorithm progresses,there is a gradual reduction in the visual field and step size,which refines the solution’s precision.This design enables the visual field and step size of artificial fish to be adaptively fine-tuned to match the unique traits of the problem space.In the early stages,an enlarged visual field and step size facilitate the global search for artificial fish,aiding in the discovery of the global optimal solution.Conversely,in the later stages,the visual field and step size are progressively reduced,narrowing the search range and improving the precision of the solution.By employing this piecewise adaptive function,an appropriate equilibrium between global search and solution precision is established.This dynamic adjustment method bolsters the algorithm’s global search potential,satisfying the optimization demands of varied problems.

    To accomplish this objective,we opted for an exponential function-based piecewise adaptive function to modulate the artificial fish’s visual field and step size coefficient.The exponential decay coefficient in the function type undergoes rapid decay at the algorithm’s outset,thereby ensuring robust global search capacity.Meanwhile,the decay rate slightly slows down in the algorithm’s later stages,reinforcing the search for local solutions.Broadly,this adaptive function behaves as a decreasing function,with the decay rate modulated by parameters in the function,detailed as follows:

    In Eqs.(12)and(13),fV(i)andfS(i)respectively represent the adaptive functions for the field of view and step length,whereidenotes the number of iterations.

    In Eqs.(14)–(17),regarding the function coefficientKV=KS,its value domain is [ymin,ymax],starting from the maximum valueymaxand ultimately reaching the minimum valueyminin the final iteration.The maximum number of iterations is denoted bygenmax.Its exponential form is as follows:

    Bulletin Board Update Strategy Predicated on Genetic Algorithms

    The Artificial Fish Swarm Algorithm (AFSA),a pioneering evolutionary algorithm proffered by Li[41],is distinguished by its capacity to tackle function optimization predicaments.The core of function optimization involves the mathematical modeling of actual scenarios,transmuted into an optimization problem in the function domain.The AFSA furnishes a comprehensive architecture for the resolution of such optimization conundrums.

    The basic idea of the artificial fish swarm algorithm is to simulate the behavior of a fish swarm and find the optimal solution of the function through the interaction within the fish swarm.Artificial fish is built according to this characteristic,imitating the behavior of fish,including foraging,clustering,rear-end pursuit,etc.Each artificial fish corresponds to an optimization solution,which is optimized by the artificial fish swimming in the virtual waters,and the objective function value is expressed by the food concentration.The four behavior patterns of artificial fish are the core of the artificial fish swarm algorithm.

    a)Foraging behavior

    If the artificial fish is given two states,and the current state isXn,Xm,which is a randomly selected state within its field of view:

    In Eq.(18),Rand()produces a random number from 0 to 1,and V is the field of view.

    If the food concentration isYn>Ym,go one step in that direction.

    In Eq.(19),Sis the step size andkis the number of iterations.IfYm>Yn,thenXis chosen randomly again,and repeated attempts are made.If the maximum foraging times are reached,but the forward condition is not reached,the random behavior is performed.

    b)Clustering behavior

    In the Eq.(20),the average stateXcof the artificial fish in the neighborhood can be obtained when the stateXmis known and the number of the artificial fish in the neighborhood isnf.

    In Eq.(22),ifnf/N<δis true(Nis the number of artificial fish,δis the degree of crowding,0<δ<1),andYc>Ym,it shows that the food concentration atXcis high and not crowded,the artificial fish can go toXc,or continue foraging.

    c)Rear-end behavior

    In Eq.(22),the current state of the artificial fish isXm,and its neighborhoodXbestis the optimal state.Ifnf/N<δ,it indicates that the food concentration atXbestis not only high but not crowded,and the artificial fish moves toXbest,otherwise it will continue foraging.

    d)Random behavior

    After reaching the maximum number of foraging behaviors,the artificial fish performs random behaviors when the fitness is still not improved,that is,the artificial fish randomly swims to a certain state within its field of vision and takes this state as its next state,as shown in Eq.(20).Random behavior can make artificial fish jump out of the local optimal state and turn to the global optimal solution.In the behavior selection,artificial fish will evaluate the current environment,and then choose the appropriate behavior to carry out,and the default behavior is foraging.The bulletin board is used to record the optimal state of artificial fish in the optimization process.

    However,the AFSA might encounter certain quandaries in problem-solving,such as the erratic motion of artificial fish or their congregation around local optima,consequently impairing convergence velocity and search precision.Incorporation of the crossover and mutation operations from genetic algorithms can counteract these issues,thereby refining the algorithm’s performance.

    Genetic algorithms can be integrated into the AFSA operation via a bulletin board,utilized to catalog historical optimal individual states.If an individual retains its state or manifests minimal alterations after a series of successive iterations,this suggests that the individual has been consistently demonstrating superior states.At this juncture,crossover and mutation operations can be deployed to preserve the historically optimal state of the individual and to carry out crossover and mutation on other individuals with a certain probability.The inclusion of these operations amplifies the algorithm’s diversity,enhances its global search capacity,and precludes individuals from descending into local optima.

    This enhanced technique can bolster the performance of the AFSA,thereby rendering it more fitting for the resolution of intricate problems.By amalgamating genetic algorithm operations,the algorithm’s convergence rate is quickened,search accuracy is bolstered,and the issue of succumbing to local optima is circumvented.Consequently,the AFSA will exhibit augmented robustness and optimization competency in problem-solving.The workflow of this improved AFSA(IAFSA)algorithm is illustrated in Fig.3.

    The IAFSA commences by instigating an artificial fish swarm within the viable domain of control variables,leveraging a chaotic algorithm.The initial count of iterations,wherein the optimal artificial fish state on the notice board either remains static or undergoes minuscule alterations,is designated as Beststep=0,while the initial iteration count is denoted as Num=0 (Line 1).The algorithm then computes the current objective function value Y for each individual within the nascent swarm,recording the maximum value on the notice board.Each artificial fish adaptively modulates its field of view and step size predicated on the iteration cycle,emulating behaviors like trailing and swarming.The behavior engendering a larger objective function value is subsequently implemented(Lines 2–8).

    Figure 3:Flowchart of the IAFSA algorithm

    Upon each artificial fish executing an action,its function value is juxtaposed against the one on the notice board.If superior,it supplants the board value,resetting Beststep to zero (Lines 9–15).The algorithm checks if Beststep has attained the maximum threshold value Beststepmaxfor minuscule or zero alterations.In the event of reaching the threshold,all artificial fish in the swarm (excluding the optimal individual on the notice board) undergo the following operations: Two individuals are selected at random with a crossover probability of C1to effectuate a crossover operation.After this,the objective function values of the two novel individuals are calculated,and if larger than the optimum value on the notice board,it will be replaced.With a mutation probability M2,an individual is selected at random and initialized randomly.The algorithm then calculates the objective function value for each individual in the swarm,and if it surpasses the board value,it supplants the optimal value.In the absence of such an occurrence,the algorithm verifies if the termination condition has been met.If so,it exports the optimal solution,else,it advances to the subsequent iteration(Lines 16–34).

    4 Experimental Simulation and Analytical Evaluation

    4.1 Simulation Environment and Parameter Description

    The experimental simulation was conducted on a Personal Computer equipped with a hexa-core processor operating at a clock speed of 2.59 GHz,complemented by a memory of 16 GiB.The platform of choice for the implementation and execution of the proposed algorithm was Matlab.

    The principal objective was to illustrate the dynamic orchestration of various aerial combat units within the cluster,as well as the unpredictable alterations in the characteristics of the network topology.To carry out the experiments,we incorporated the following parameter configurations:

    Generation of Network Topology: We randomly dispersed multiple nodes within a predefined geographical extent of 800 ?800 km.The generation of nodes within this spatial domain adhered to the specific density requirements outlined in the experimental design.

    Calculation of the Shortest Path: We employed the Dijkstra algorithm to compute the shortest path between any two given points.This facilitated the emulation of communication and pathway selection between nodes,thereby ensuring effective relay communication among the combat units.

    Definition of Node Communication Radius: The communication radius (R) of the nodes was configured at 120 km.Consequently,only those nodes that resided within this radius could establish a communication connection.

    Configuration of Failure Rate: The failure rate associated with an individual node or link was defined by a random number within the range of [0,0.05].The generation of a random failure probability for each node and link allowed the simulation of potential malfunctioning of nodes and links under real-world conditions.

    By adjusting these parameters,we were able to replicate more accurately the dynamic orchestration of various combat units within the aerial cluster and the unpredictable alterations in network topology.This enhanced level of realism allows the experiment to provide more relevant insights into realworld scenarios,thereby aiding in the research and optimization of communication and organizational mechanisms within aerial clusters.

    4.2 NDVR Sub-Domain Partition Algorithm Simulation

    Addressing the issue of network nodes’sub-domain partitioning,we executed a series of simulation experiments to ascertain the effectiveness of the Node Degree-based Virtual Router (NDVR)algorithm.These empirical explorations were predicated on the network environment inherent to airborne clusters,spanning across varying scales of node quantities(including 60,100,140,and 180).In an attempt to evaluate the NDVR algorithm’s performance,we compared load balance indices across different node scales.We implemented an averaging strategy entailing multiple simulations to yield a more accurate performance measure.To extend our understanding of the relationship between the number of controllers and the load balance index across different node scales,we juxtaposed our algorithm with the Partitioning Over Clustering (POCO) algorithm,Label Propagation Algorithm(LPA),and the K-means algorithm via comparative experiments.

    The experimental simulation results are shown in Fig.4 and Table 2.It can be seen from the figure that the load balancing index is used to compare the three algorithms.As the number of nodes increases,the load index also increases,basically meeting the expectation.Comparing the load index of the three algorithms under different nodes,the NDVR algorithm decreases by 66.8% and 45.36%on average compared with the LPA and K-means algorithms,respectively.In this paper,the three subdomain partitioning algorithms do not consider the limitation of controller capacity.After comparison,it is found that the LPA and K-means algorithms use the node random network to propagate to convergence and partition according to the minimum delay,resulting in poor algorithm effect.NDVR algorithm uses node importance information to divide network nodes into subdomains,which can effectively divide molecular domains according to node information,effectively reduce the load index,and improve the load balance of the controller.However,with the continuous increase of the partition area,the load balance index of the LPA and K-means algorithm fluctuates greatly and is significantly higher than that of the NDVR algorithm.Compared with LPA,K-means,and NDVR algorithm,the standard variance results are as follows: 1.671,1.903,0.411.The comparison shows that the average load index of NDVR is not only lower than the other two algorithms but also more balanced,which can provide reliable network service quality for the whole cluster.

    Table 2:Average load coefficients of different nodes

    Figure 4:Diagram of the relationship between load balance index and number of subdomains under different network scales

    4.3 Performance Analysis of the IAFSA Algorithm

    To rigorously assess the efficacy of the IAFSA algorithm in terms of performance optimization,we meticulously established a variety of scenarios and configured the algorithm parameters accordingly,as delineated in the accompanying Table 3.We employed a sub-domain division strategy,wherein the aggregate outcome of the average propagation delay and the average fault rate,duly weighted,serve as the objective function value.This value then guided the optimization of the LC deployment.Our experimental framework harnessed the potential of both the IAFSA and AFSA algorithms to tackle the problem at hand.

    Table 3:Experimental scenario parameter table

    As illustrated in the Fig.5 and Table 4,we subjected the IAFSA algorithm to a comprehensive reliability analysis,running a series of 100 experiments and diligently recording the corresponding values obtained for the optimized objective function W.The empirical data decisively underscored the superiority of the IAFSA algorithm over its AFSA counterpart,with the former consistently yielding superior outcomes.On the whole,we observed an average enhancement of 41.3% in the optimization value of the objective function W,thereby signifying a substantial optimization of the network performance objective.

    Table 4:Experimental results of the IAFSA algorithm 100 times

    Table 5:Results of the relationship between the average propagation delay and the number

    Table 6:Results of average disconnection rate with the number of LC

    Figure 5:Fluctuation schematic of the IAFSA algorithm experimental results over 100 trials

    4.4 Performance Simulation of the NDVR-IAFSA Algorithm

    This section presents an empirical validation of controller deployment optimization performance,employing algorithms such as LPA [42],K-means [43],POCO [44],and NDVR-IAFSA.Our simulation experiments,conducted on a network consisting of 100 airborne nodes,facilitate a comprehensive evaluation of the average propagation delayTavgand average disconnection rateσavgunder varying controller numbers.Figs.6,7 and Tables 5,6 depict the average results derived from multiple computational iterations for each algorithm.

    Figure 6:Diagram of the relationship between average propagation delay and LC number

    As revealed in Figs.6 and 7,an increase in the number of LC nodes within the network area generally incurs an inversely proportional effect on the average propagation delayTavgand average disconnection rateσang.It is thus inferred that the aviation data link network control link’s parametersTavgandσangcan be effectively diminished by augmenting the LC nodes.Comparatively,the NDVRIAFSA optimization performance supersedes the three other algorithms,resulting in reductions of 18%,11.8%,8.7%,and 17.2%,6%,12%,respectively.This superior performance can be attributed to our proposed algorithm,which judiciously incorporates sub-domain division based on node significance and leverages the IAFSA algorithm to select more suitable interaction center nodes.This approach imbues the algorithm with greater flexibility and improved effectiveness,particularly under circumstances with a high count of LC nodes.

    To assess the efficiency of the NDVR-IAFSA algorithm,we devised an airborne cluster environment with varying LC and network nodes.We explored the correlation between distinct algorithms and time consumption,as demonstrated in the appended figure.

    Figure 7:Diagram of the relationship between average disconnection rate and LC number

    As depicted in Fig.8 and Table 7,there exists a direct proportional relationship between the computation time of the four assessed algorithms and the escalating number of LCs.In particular,the POCO algorithm manifests a greater rate of change,whereas the remaining three algorithms generally exhibit steady growth with a more gradual increase rate.Of paramount importance is the fact that the algorithm proposed in this paper holds the shortest computation time.This favorable outcome is attributable to the efficient performance of the data chain network node deployment planning as the number of LCs rises when our proposed algorithm is applied.Fig.9 and Table 8 elucidate that while maintaining a constant number of LCs and contrasting the algorithm’s efficiency under various node quantities,a direct proportional association between the number of nodes and the computation time is discernable across all four algorithms.Remarkably,the computational time of the POCO algorithm is,on average,approximately quadruple that of the NDVR-IAFSA algorithm.This deviation stems from the method of subdividing sub-domains for controller deployment within the domain,which,in comparison to the heuristic POCO algorithm,substantially mitigates the time complexity of extensive SDN controller deployment.

    Table 7:Results of calculation time with LC quantity

    Table 8:The calculation time varies with the number of nodes

    Figure 8:Diagram of the relationship between calculation time and LC number

    Figure 9:Diagram of the relationship between calculation time and number of nodes

    5 Structure Conclusions

    In this paper,we introduce a pioneering resolution for the Airborne Data Link Cluster(ADLC)controller deployment issue (ADLC-Cpp) in the multi-controller setting of Software-Defined Networking(SDN).This innovative combination of the airborne data link cluster network and SDN technology involves a multi-controller collaborative architecture founded on the airborne data link cluster,converting the ADLC-Cpp into a sub-domain partitioning challenge and a central interaction node selection conundrum.Within this schema,we advance a sub-domain partitioning strategy built on node importance ranking and a central interaction node selection strategy premised on an augmented Artificial Fish Swarm Algorithm(AFSA).This enhanced stratagem assists in circumventing individual aggregation at local optima,consequently magnifying global search capabilities.The effectiveness and feasibility of the proposed enhancement strategy were assessed by juxtaposing it with other algorithms.Experimental evidence validated the successful amalgamation of the airborne data link cluster network scenario and SDN technology.Through the application of the proposed multi-controller collaborative deployment scheme,alongside the sub-domain partitioning strategy built on node importance ranking and the central interaction node selection strategy premised on the refined AFSA,the dependability,and availability of the airborne data link cluster network are amplified.This advancement furnishes technical support for bolstering the defensive capacity of the airborne data link cluster network platform.Existing research primarily concentrates on circumstances where resources are abundant for the SDN controller cluster,neglecting the fault analysis and resource deficiency necessary to meet cluster requirements.Therefore,future inquiries will be directed towards situation awareness and security assessment technologies within the airborne data link cluster networks’context.This endeavor will facilitate a comprehensive understanding of network fault analysis and security risks and enhance the self-healing capability and safety of the airborne data link cluster network.This section is not mandatory but can be added to the manuscript if the discussion is unusually long or complex.

    Acknowledgement:We would like to thank Professor Fu Yanfang and all the members involved in the collaborative project for their valuable advice and continued support.The author is very grateful to the reviewers for their valuable comments,which improved the presentation of the paper.

    Funding Statement:This article was supported by the following funds:Defense Industrial Technology Development Program Grant: G20 210513;Shaanxi Provincal Department of Science and Technology Grant: 2021KW-07;Shaanxi Provincal Department of Science and Technology Grant: 2022 QFY01-14.

    Author Contributions:Conceptualization,Y.Z.and Y.F.;project administration,Y.Z.,C.Y.and Y.F.;investigation,Y.Z.and Y.F.;methodology,Y.Z.;resources,Y.F.,C.Y.and D.P;software,Y.Z.;validation,Y.Z.,H.S.and Y.F.;writing—original draft,Y.Z.,J.Z.;writing—review and editing,D.P.,Y.F.All authors reviewed the results and approved the final version of the manuscript.

    Availability of Data and Materials:No applicable.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    久久久久久久久中文| 亚州av有码| 国产成人精品婷婷| 日本欧美国产在线视频| 最近最新中文字幕大全电影3| 日日摸夜夜添夜夜添av毛片| 欧美不卡视频在线免费观看| 国产免费男女视频| 欧美高清成人免费视频www| 国产欧美日韩精品一区二区| 波多野结衣巨乳人妻| 国产精品一区二区在线观看99 | 精品少妇黑人巨大在线播放 | 男人狂女人下面高潮的视频| 欧美激情久久久久久爽电影| 哪个播放器可以免费观看大片| 色综合站精品国产| 精品人妻熟女av久视频| 日韩国内少妇激情av| 亚洲成人av在线免费| 久久99蜜桃精品久久| 久久久久久国产a免费观看| 一区二区三区乱码不卡18| 日本三级黄在线观看| 亚洲在久久综合| 国产精品国产三级专区第一集| 国产男人的电影天堂91| 午夜爱爱视频在线播放| 亚洲人成网站在线观看播放| 国产av在哪里看| 精品久久久久久久久av| 午夜爱爱视频在线播放| 国产午夜精品一二区理论片| 只有这里有精品99| 日韩成人av中文字幕在线观看| 国产精品美女特级片免费视频播放器| 午夜精品一区二区三区免费看| 人人妻人人澡人人爽人人夜夜 | 色综合亚洲欧美另类图片| 校园人妻丝袜中文字幕| 中文字幕免费在线视频6| 日韩国内少妇激情av| 日产精品乱码卡一卡2卡三| 日韩中字成人| 69人妻影院| 婷婷色av中文字幕| 少妇高潮的动态图| 久久久久久久久大av| 免费搜索国产男女视频| 久久精品国产亚洲av天美| www.av在线官网国产| 日本色播在线视频| 亚洲aⅴ乱码一区二区在线播放| 麻豆乱淫一区二区| 内射极品少妇av片p| av播播在线观看一区| 深爱激情五月婷婷| 精品99又大又爽又粗少妇毛片| 91狼人影院| 国产精品福利在线免费观看| 91在线精品国自产拍蜜月| 国产v大片淫在线免费观看| 人人妻人人看人人澡| 国产免费福利视频在线观看| 精品久久国产蜜桃| 国产中年淑女户外野战色| 99久久精品一区二区三区| 1000部很黄的大片| 国产精品爽爽va在线观看网站| 在现免费观看毛片| 免费观看精品视频网站| 国产女主播在线喷水免费视频网站 | 国产精品乱码一区二三区的特点| 国产不卡一卡二| 国产免费视频播放在线视频 | 免费av观看视频| 久久久亚洲精品成人影院| 丰满乱子伦码专区| 极品教师在线视频| 精品国产露脸久久av麻豆 | 又爽又黄a免费视频| av天堂中文字幕网| 国产国拍精品亚洲av在线观看| 国产精华一区二区三区| 国产欧美日韩精品一区二区| 国产精品无大码| 欧美zozozo另类| 91精品国产九色| 人妻制服诱惑在线中文字幕| 亚洲精品乱久久久久久| 最近的中文字幕免费完整| 中文字幕av在线有码专区| 男人舔奶头视频| 久久久久久国产a免费观看| 简卡轻食公司| 欧美日韩国产亚洲二区| 国产伦精品一区二区三区视频9| 国产成人a∨麻豆精品| 久久精品国产亚洲av天美| 九九在线视频观看精品| 亚洲18禁久久av| 国产精品久久久久久精品电影小说 | 国产不卡一卡二| 18禁在线无遮挡免费观看视频| 精品99又大又爽又粗少妇毛片| 国产精品一区二区三区四区免费观看| 久久这里只有精品中国| 在现免费观看毛片| 欧美人与善性xxx| 日韩精品有码人妻一区| 精品欧美国产一区二区三| 亚洲av成人精品一区久久| 91久久精品电影网| 综合色丁香网| 观看免费一级毛片| 中文天堂在线官网| 狂野欧美激情性xxxx在线观看| 午夜激情福利司机影院| 人人妻人人看人人澡| 久久久午夜欧美精品| 在线观看美女被高潮喷水网站| 美女高潮的动态| 精品酒店卫生间| 99热网站在线观看| 午夜激情欧美在线| 国产白丝娇喘喷水9色精品| 高清日韩中文字幕在线| 最近的中文字幕免费完整| 亚洲,欧美,日韩| 欧美日韩精品成人综合77777| 日韩av在线大香蕉| 欧美成人午夜免费资源| 国产熟女欧美一区二区| or卡值多少钱| 亚洲精品乱码久久久v下载方式| 免费无遮挡裸体视频| 久久这里只有精品中国| 51国产日韩欧美| 国产成人一区二区在线| 在线免费观看的www视频| 在现免费观看毛片| 免费看光身美女| 精品久久久久久电影网 | 亚洲av日韩在线播放| 久久久精品94久久精品| 内地一区二区视频在线| 精品人妻偷拍中文字幕| 亚洲国产精品成人综合色| 别揉我奶头 嗯啊视频| 日本黄色视频三级网站网址| 久久久久久大精品| 久久久久久久国产电影| 91久久精品电影网| 99久久无色码亚洲精品果冻| 精品久久久久久久久久久久久| 日本免费在线观看一区| 综合色丁香网| 免费人成在线观看视频色| av在线观看视频网站免费| 色播亚洲综合网| 国产大屁股一区二区在线视频| 天堂中文最新版在线下载 | 成人毛片a级毛片在线播放| 听说在线观看完整版免费高清| 成人鲁丝片一二三区免费| 成年版毛片免费区| 丰满乱子伦码专区| videos熟女内射| 天天躁夜夜躁狠狠久久av| 岛国在线免费视频观看| 免费一级毛片在线播放高清视频| 亚洲成人精品中文字幕电影| 亚洲va在线va天堂va国产| 国产成人精品一,二区| 三级经典国产精品| 九色成人免费人妻av| 国产精品伦人一区二区| 永久免费av网站大全| 18禁在线播放成人免费| 国产一区有黄有色的免费视频 | 少妇被粗大猛烈的视频| 午夜爱爱视频在线播放| 亚洲av二区三区四区| 少妇的逼好多水| 如何舔出高潮| 91午夜精品亚洲一区二区三区| 天美传媒精品一区二区| 啦啦啦韩国在线观看视频| 久久欧美精品欧美久久欧美| 成人午夜高清在线视频| 精品久久久久久久人妻蜜臀av| 欧美日韩在线观看h| 97热精品久久久久久| 秋霞伦理黄片| 免费电影在线观看免费观看| 狂野欧美白嫩少妇大欣赏| 国产精品乱码一区二三区的特点| 高清av免费在线| 国产单亲对白刺激| 国产精品久久久久久久电影| av视频在线观看入口| 久久人妻av系列| 自拍偷自拍亚洲精品老妇| 性色avwww在线观看| 国产成人午夜福利电影在线观看| 七月丁香在线播放| 午夜福利成人在线免费观看| 国产精品一区二区性色av| 观看美女的网站| 国产 一区 欧美 日韩| 国产极品天堂在线| 欧美xxxx黑人xx丫x性爽| 精品久久久久久久人妻蜜臀av| av免费观看日本| 亚洲最大成人手机在线| 国产精品1区2区在线观看.| 国产精品一区二区三区四区久久| 嘟嘟电影网在线观看| 亚洲第一区二区三区不卡| 在线观看美女被高潮喷水网站| 久久精品国产鲁丝片午夜精品| 男的添女的下面高潮视频| 国产高清有码在线观看视频| 日韩欧美在线乱码| 99久久中文字幕三级久久日本| 人妻少妇偷人精品九色| 欧美最新免费一区二区三区| 视频中文字幕在线观看| 国产伦精品一区二区三区四那| 精品熟女少妇av免费看| 国产 一区精品| 国产色爽女视频免费观看| 久久久久久久久中文| 日本免费一区二区三区高清不卡| 精品久久久久久电影网 | 精品国内亚洲2022精品成人| 国语自产精品视频在线第100页| www日本黄色视频网| 国产黄片视频在线免费观看| 晚上一个人看的免费电影| 成人一区二区视频在线观看| 波野结衣二区三区在线| 九九久久精品国产亚洲av麻豆| 69av精品久久久久久| 色视频www国产| 欧美人与善性xxx| 色噜噜av男人的天堂激情| 久久韩国三级中文字幕| 久久久国产成人精品二区| av在线亚洲专区| 最新中文字幕久久久久| 亚洲国产最新在线播放| 久久人妻av系列| 国产免费一级a男人的天堂| 精品久久国产蜜桃| 久久精品久久久久久久性| 九草在线视频观看| 国产成人91sexporn| a级毛色黄片| 国产一级毛片七仙女欲春2| 日韩av在线大香蕉| av在线亚洲专区| 长腿黑丝高跟| 中文字幕人妻熟人妻熟丝袜美| 自拍偷自拍亚洲精品老妇| 老司机影院成人| 三级经典国产精品| 亚洲av熟女| 联通29元200g的流量卡| 亚洲综合色惰| 日本三级黄在线观看| 久久欧美精品欧美久久欧美| 欧美色视频一区免费| 天天一区二区日本电影三级| 国产精品日韩av在线免费观看| 亚洲久久久久久中文字幕| 人人妻人人澡欧美一区二区| 国产片特级美女逼逼视频| 波野结衣二区三区在线| 91精品伊人久久大香线蕉| 91狼人影院| 男女边吃奶边做爰视频| 夜夜爽夜夜爽视频| 美女黄网站色视频| 亚洲精品一区蜜桃| 婷婷六月久久综合丁香| 久久久国产成人精品二区| 午夜福利网站1000一区二区三区| 两个人视频免费观看高清| 国产激情偷乱视频一区二区| 国产精品人妻久久久影院| 久久精品国产亚洲av天美| 成人三级黄色视频| 久久人人爽人人片av| 国内精品美女久久久久久| 性插视频无遮挡在线免费观看| 在线播放无遮挡| 又粗又硬又长又爽又黄的视频| 国产91av在线免费观看| 免费观看a级毛片全部| 三级毛片av免费| 国产午夜福利久久久久久| 91在线精品国自产拍蜜月| 亚洲成av人片在线播放无| 亚洲内射少妇av| 中文在线观看免费www的网站| 亚洲乱码一区二区免费版| 亚洲人与动物交配视频| 久久精品人妻少妇| 一本一本综合久久| 小说图片视频综合网站| 一级毛片我不卡| 女人久久www免费人成看片 | av.在线天堂| 亚洲精品影视一区二区三区av| 亚洲国产日韩欧美精品在线观看| 97在线视频观看| 日韩视频在线欧美| 高清av免费在线| 国产一区有黄有色的免费视频 | 精品久久久久久久久av| 成人欧美大片| 亚洲自偷自拍三级| 夜夜爽夜夜爽视频| 日韩欧美三级三区| 一级爰片在线观看| 国产精品,欧美在线| 亚洲欧美精品综合久久99| 国产乱人视频| 亚洲精华国产精华液的使用体验| 高清av免费在线| 99热这里只有是精品50| 美女国产视频在线观看| 日韩欧美国产在线观看| 搡女人真爽免费视频火全软件| 精品人妻熟女av久视频| 国产精品一区二区三区四区免费观看| 色综合亚洲欧美另类图片| 好男人在线观看高清免费视频| 久久久久免费精品人妻一区二区| 久久亚洲精品不卡| 久久草成人影院| 男女啪啪激烈高潮av片| 51国产日韩欧美| 男的添女的下面高潮视频| 男人和女人高潮做爰伦理| 熟女电影av网| 一边摸一边抽搐一进一小说| 波野结衣二区三区在线| 性色avwww在线观看| 老司机影院毛片| 六月丁香七月| 插逼视频在线观看| 午夜免费激情av| 女人久久www免费人成看片 | 亚洲av日韩在线播放| 男人的好看免费观看在线视频| 国产精品国产高清国产av| 欧美性猛交╳xxx乱大交人| 免费一级毛片在线播放高清视频| 国产精品人妻久久久影院| 十八禁国产超污无遮挡网站| 国产成人精品婷婷| a级一级毛片免费在线观看| 国产国拍精品亚洲av在线观看| 国产大屁股一区二区在线视频| 久久亚洲精品不卡| 国产av一区在线观看免费| 男女下面进入的视频免费午夜| 干丝袜人妻中文字幕| 国产极品天堂在线| 男人狂女人下面高潮的视频| 在线观看一区二区三区| 蜜桃久久精品国产亚洲av| 亚洲欧美成人综合另类久久久 | 日韩大片免费观看网站 | 免费看a级黄色片| 桃色一区二区三区在线观看| 自拍偷自拍亚洲精品老妇| 色视频www国产| 中文欧美无线码| 麻豆av噜噜一区二区三区| 人人妻人人澡欧美一区二区| 麻豆av噜噜一区二区三区| 欧美日韩在线观看h| 久久草成人影院| 亚洲欧美日韩无卡精品| 国产v大片淫在线免费观看| 91aial.com中文字幕在线观看| 免费黄色在线免费观看| 精品熟女少妇av免费看| 成人午夜高清在线视频| 日韩欧美精品免费久久| 少妇人妻精品综合一区二区| 免费无遮挡裸体视频| 国产欧美另类精品又又久久亚洲欧美| 1024手机看黄色片| 欧美日韩国产亚洲二区| 中文精品一卡2卡3卡4更新| 成人亚洲精品av一区二区| 欧美最新免费一区二区三区| 国产精品爽爽va在线观看网站| 国产91av在线免费观看| 亚洲精品久久久久久婷婷小说 | 麻豆精品久久久久久蜜桃| 欧美三级亚洲精品| 舔av片在线| 免费观看精品视频网站| 亚洲精品成人久久久久久| 国产在视频线精品| 久久精品国产亚洲av涩爱| 97在线视频观看| 亚洲av成人精品一区久久| 男女下面进入的视频免费午夜| 能在线免费观看的黄片| 熟女电影av网| 两个人视频免费观看高清| 国产激情偷乱视频一区二区| 九九久久精品国产亚洲av麻豆| 女的被弄到高潮叫床怎么办| 日本wwww免费看| 国产av一区在线观看免费| 美女国产视频在线观看| 成人一区二区视频在线观看| 综合色av麻豆| 少妇熟女aⅴ在线视频| 天美传媒精品一区二区| 夫妻性生交免费视频一级片| 亚洲四区av| 国内少妇人妻偷人精品xxx网站| av女优亚洲男人天堂| 久久欧美精品欧美久久欧美| 欧美3d第一页| 亚洲美女视频黄频| 日本一本二区三区精品| 又粗又硬又长又爽又黄的视频| 99热精品在线国产| 免费大片18禁| 人人妻人人澡人人爽人人夜夜 | 秋霞在线观看毛片| 91av网一区二区| 久久精品国产亚洲av天美| 免费不卡的大黄色大毛片视频在线观看 | 联通29元200g的流量卡| 乱人视频在线观看| 国产精品国产高清国产av| av卡一久久| 午夜福利在线观看免费完整高清在| 精品国内亚洲2022精品成人| 亚洲精品成人久久久久久| 亚洲美女搞黄在线观看| 亚洲av免费在线观看| 赤兔流量卡办理| 免费大片18禁| 精品不卡国产一区二区三区| 精品欧美国产一区二区三| 日本免费一区二区三区高清不卡| 久久99热6这里只有精品| 亚洲精品成人久久久久久| 日韩欧美国产在线观看| 国产国拍精品亚洲av在线观看| 午夜视频国产福利| 国产高清有码在线观看视频| av.在线天堂| 热99re8久久精品国产| 亚洲成人精品中文字幕电影| 九九爱精品视频在线观看| 国产精品国产三级国产av玫瑰| 欧美97在线视频| 亚洲av电影在线观看一区二区三区 | 久久精品久久久久久久性| 国内揄拍国产精品人妻在线| 成人美女网站在线观看视频| 18禁在线播放成人免费| 国产高清不卡午夜福利| 最近2019中文字幕mv第一页| 亚洲成人中文字幕在线播放| videos熟女内射| 久久久久久久午夜电影| 国产伦在线观看视频一区| 亚洲av熟女| 精品国产一区二区三区久久久樱花 | 中文字幕精品亚洲无线码一区| 中文欧美无线码| 久久精品国产鲁丝片午夜精品| av又黄又爽大尺度在线免费看 | 久久欧美精品欧美久久欧美| 国产v大片淫在线免费观看| 亚洲怡红院男人天堂| 国产淫语在线视频| 搡老妇女老女人老熟妇| 老司机影院毛片| 精品人妻熟女av久视频| 男人舔女人下体高潮全视频| 久久久久久久亚洲中文字幕| 国产精品精品国产色婷婷| 成人高潮视频无遮挡免费网站| 精品久久久久久久末码| 纵有疾风起免费观看全集完整版 | 高清毛片免费看| 国产国拍精品亚洲av在线观看| 日韩在线高清观看一区二区三区| 久久精品综合一区二区三区| 欧美潮喷喷水| 亚洲av.av天堂| 舔av片在线| 亚洲丝袜综合中文字幕| 亚洲内射少妇av| 国产亚洲av片在线观看秒播厂 | 少妇的逼水好多| 九色成人免费人妻av| 国产探花在线观看一区二区| 高清av免费在线| 可以在线观看毛片的网站| 亚洲18禁久久av| 大又大粗又爽又黄少妇毛片口| 日韩大片免费观看网站 | 黄色日韩在线| 男女视频在线观看网站免费| 色综合色国产| 日日摸夜夜添夜夜爱| 黄色配什么色好看| 免费搜索国产男女视频| 黄色一级大片看看| 国产成人a∨麻豆精品| 在线观看66精品国产| 18禁裸乳无遮挡免费网站照片| 一级黄色大片毛片| 男插女下体视频免费在线播放| 亚洲精品亚洲一区二区| 国产乱人偷精品视频| 日韩强制内射视频| 欧美日韩综合久久久久久| 麻豆乱淫一区二区| 丰满人妻一区二区三区视频av| 午夜免费男女啪啪视频观看| 亚洲婷婷狠狠爱综合网| 汤姆久久久久久久影院中文字幕 | 免费一级毛片在线播放高清视频| av在线播放精品| 日韩欧美 国产精品| 国产精品一二三区在线看| 免费电影在线观看免费观看| 亚洲成av人片在线播放无| 最后的刺客免费高清国语| 人人妻人人澡欧美一区二区| 久久久久久久久久久丰满| 噜噜噜噜噜久久久久久91| 欧美日韩综合久久久久久| 99热这里只有是精品在线观看| 日韩制服骚丝袜av| 午夜视频国产福利| 欧美成人一区二区免费高清观看| 亚洲精品乱码久久久久久按摩| 99热这里只有精品一区| 国产精品日韩av在线免费观看| 欧美激情久久久久久爽电影| 99在线视频只有这里精品首页| 亚洲国产精品sss在线观看| 国产 一区 欧美 日韩| 综合色丁香网| 日韩欧美 国产精品| 18禁动态无遮挡网站| 国产国拍精品亚洲av在线观看| 国产探花极品一区二区| 日韩亚洲欧美综合| 久久精品夜夜夜夜夜久久蜜豆| 国产日韩欧美在线精品| 成人午夜高清在线视频| 亚洲精品亚洲一区二区| 国产 一区 欧美 日韩| 一夜夜www| 午夜福利高清视频| 欧美成人午夜免费资源| 我要看日韩黄色一级片| 永久网站在线| 亚洲久久久久久中文字幕| 国产视频首页在线观看| 欧美三级亚洲精品| 男人狂女人下面高潮的视频| 有码 亚洲区| 在线a可以看的网站| 99热这里只有是精品在线观看| 色吧在线观看| 久久久久国产网址| 最近的中文字幕免费完整| 99久久中文字幕三级久久日本| 中国美白少妇内射xxxbb| 亚洲欧美日韩高清专用| 亚洲美女视频黄频| 国产伦一二天堂av在线观看| 大香蕉97超碰在线| 日韩精品有码人妻一区| 久久亚洲国产成人精品v| 1024手机看黄色片| 国产不卡一卡二| 日韩在线高清观看一区二区三区| 插阴视频在线观看视频| av免费观看日本| 赤兔流量卡办理| 免费观看的影片在线观看| 男人舔女人下体高潮全视频| 亚洲av中文字字幕乱码综合| 国产在视频线精品| 久久精品国产自在天天线| 在线播放无遮挡| 精品一区二区三区视频在线| www.色视频.com| 高清视频免费观看一区二区 | 久久久久久久亚洲中文字幕| 一二三四中文在线观看免费高清| 亚洲精品自拍成人| 久久久a久久爽久久v久久| 91久久精品国产一区二区成人| 国产三级中文精品|