• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Distributed Application Addressing in 6G Network

    2024-04-28 11:59:44LiuJieChenSiboLiuYuqinMoZhiweiLinYilinZhuHongmeiHeYufeng
    China Communications 2024年4期

    Liu Jie,Chen Sibo,Liu Yuqin,Mo Zhiwei,Lin Yilin,Zhu Hongmei,He Yufeng

    China Telecom Research Institute,Guangzhou 510632,China

    Abstract: To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verifciation.

    Keywords: application addressing;CNC(Computing&Network Convergence);DNS(Domain Name System);ICN(Information-Centric Network);6G

    I.INTRODUCTION

    The contradiction between “network” and “application”is the internal driving force to promote the continuous evolution of network architecture,while application addressing is the key factor that connects“network”and“application”.Applications are usually addressed by DNS(Domain Name System)in the Internet architecture [1].For centralized deployed applications,there is no need to consider the access location of UE (User Equipment) when processing DNS requests,while for distributed deployed applications,such as CDN,the address of the nearest server among the many distributed servers should be responded to the UE in the DNS response[2].Although traditional CDN is a distributed deployment,server locations are relatively high level.Usually,the approximate location of the UE estimated by the network address is suffciient to determine the nearest service point.In mobile network,UE address usually does not change because of mobility,and with the development of mobile edge computing,the trend of marginalized application deployment is more and more obvious,so the traditional addressing method is no longer applicable.

    6G has attracted widespread interest from academia and industry,and research has been carried out on the 6G vision,use cases,architecture,key capabilities,key technologies,etc [3-8].In 2030 and beyond,diversifeid applications such as holographic communication,immersive XR,machine intelligence,integrated communications and sensing,and multidimensional perception will emerge [9,10],all of which put forward extreme and widely varying performance requirements.The introduction of touch and mind,the realization of immersive experiences,and the closed-loop control of factory automation have all increased the requirement for latency to less than 1ms [11].Huge amounts of data such as spatial data for holographic services,and sensory information for sensing services,need to be collected,transmitted or updated in real time,with extremely high peak rate requirements,which will reach 1Tbit/s or even 10Tbit/s[12],and the traffci density requirements will be 10~100 times higher than 5G,reaching 1Gps/m2[13].For services related to human beings or public infrastructure,such as mobile machine motion control,complete reliability should be guaranteed,which should be higher than 99.99999%,otherwise human life,social order and even the safety of human life may be affected [10,14].Further,industry,energy,Internet of Vehicles,telemedicine and other feilds put forward deterministic requirements for network transmission indicators(such as bandwidth,delay,jitter,packet loss),requiring timely and accurate transmission of information for precise machine control.

    In order to meet capabilities requirements of 6G network,support extreme performances and traffci offloading,overcome the complexities and security risks of centralized network,and obtain flexibilities of customized networks,6G network will adopt a decentralized hierarchical network architecture based on distributed computing power with centralized and distributed collaboration [13,15].Many researches on 6G distributed solutions are in full swing,e,g.literature[16]constructs a multiagent system(MAS)-based Energy-Effciient resource allocation method in Massive IoT for Industrial 6G Applications.Distributed autonomous edge subnetworks are main components of 6G network.Edge subnetworks,as well as applications can be orchestrated on demand,and applications/contents be collocated with or cached in edge subnetworks[17,18].In the vision of 6G distributed network architecture with application deep-marginalizeddeployed,distributed application addressing will be an even bigger challenge.In other words,addressing has been considered as a problem of capital construction for building next generation mobile Internet ecology,so it is necessary to determine a 3rd-party-friendly application addressing method under the new architecture,as to promote network-application coordination.

    When we observe the research on public Internet,we fnid that there have been many researches on distributed application addressing,typically including ICN (Information-Centric Network) and CNC (Computing&Network Convergence).

    ICN puts forward a new architecture,where the routing mechanism is based on interested contents/applications rather than position,so no rely on plug-in DNS process and solves distributed application addressing endogenously.

    CNC sets addressing logic with the perspective of network and computing collaboration through mapping application requirements into abstract and quantifaible resource requirements,accordingly implements unifeid scheduling of computing,storage resources and network resources,aiming at realizes optimal adaption between service requirements and resources.The predecessor of CNC was put forward in 2019 by IETF (Internet Engineering Task Force as CFN(Computing First Networking).The subsequent concepts such as INC (In-Network Computing) in IETF which is different from ICN of the same abbreviation,CPN (Computing Power Network) and CAN(Computing-aware Networking) in ITU-T (International Telecommunication Union-Telecommunication Standardization Sector)are similar.These similar concepts have been unifeid in the relevant research of China’s CCSA(China Communications Standards Association) as CNC,of which researches include resource allocation,scheduling,routing and can be taken as addressing related implementation.Still,other standardization organizations may use their previous def-i nitions.

    Great progress have been made in this feild in the past two years.Literature [19] proposes a distributed technology,i.e.CFN-dyncast,which can dispatch clients’ requests to an optimal site according to the load of each computing site and the network status.Literature[20]integrates computing capability to NDN and proposes a new network framework to realize the access control optimization of computing service.Literature [21] proposes a centralized fault detection protocol,i.e.CFN-Watchdog,which achieves intelligent allocation of computing resources for edge computing according to computing load and network status.Literature [22] proposes Cyber-CFN,a technology that uses CFN for unifeid sampling in cloud native data centers.Literature [23] proposes a technical scheme of deterministic communication to realize real-time transmission and real-time computing of computing tasks.

    Unfortunately,ICN and CNC cannot be used directly under the mobile network architecture.Therefore,we explore and propose an endogenous scheme based on the 6G architecture.The contributions of this paper is as follows:

    1) Analyzes the distributed application addressing challenges in the evolution of mobile network,especially in 6G distributed network,and the latest researches for 5G.

    2) Illustrates new progress in distributed application addressing,i.e.analyzes the mechanisms of ICN and CNC.

    3) Compares ICN,CNC and those in 5G mobile network to show that they cannot adapt to the 6G network architecture.

    4) Puts forward a 6G endogenous addressing scheme basing on 6G characteristic features and by converging the essence of CNC method into 6G new architecture.

    5) Explains the preliminary experimental verifciation results for the 6G scheme.

    The rest of this paper is organized as follows.Addressing problems and the latest research in mobile network as well as 6G addressing challenge are described Section II.Two newly mechanisms related to application addressing in carrier network are described in Section III.In Section IV,comparison between upto-date schemes is carried out.Then in Section V,a 6G endogenous addressing scheme is put forward and described in detail.Finally,Section VI concludes this paper.

    II.ADDRESSING PROBLEMS AND CHALLENGES IN MOBILE NETWORK

    2.1 Traditional Distributed Application Addressing Schemes

    Traditional distributed application addressing,typically the requirement of CDN (Content Delivery Network) services in Internet,is resolved by DNS(Domain Name System) service scheduling system.There are two main scheduling mechanisms,namely,HttpDNS scheduling scheme and DNS redirection scheduling scheme.

    A.HttpDNS scheduling

    This scheme is mainly used in the scenario where CDN service provider deploys HttpDNS server to execute scheduling task.As shown in Figure 1,where the serving system includes a CDN central node and multiple CDN edge nodes,and the DNS server is confgiured in the UE.The process is described as follows:

    Figure 1.Schematic diagram of the CDN HttpDNS scheduling method.

    1) UE initiates a DNS request to the confgiured DNS system,the confgiured DNS system resolves the FQDN and returns the IP address of HttpDNS server of the CDN service provider.

    2) UE initiates a CDN service request to the HttpDNS of the CDN service provider with the IP address got in step 1.

    3) The HttpDNS server determines the nearest CDN node by matching the scheduling rules,considering the UE location according to the network address of the UE where the UE location can be roughly determined,then responses a redirect message guiding the UE to redirect to the edge service node.

    4) UE redirects to the edge service node.

    5) The hit content on the edge service node is returned to the UE.

    B.DNS redirection scheduling

    This scheme is mainly used in the scenario where DNS recursive system is used to execute DNS requests,as shown in Figure 2 where the serving system includes a CDN central node and multiple CDN edge nodes,and the confgiured DNS server and the authoritative DNS form part of the DNS recursive system.The process is described as follows:

    Figure 2.Schematic diagram of the CDN DNS redirection scheduling method.

    1) UE initiates a DNS request to a confgiured DNS server.

    2) The confgiured DNS server forwards the DNS request to the authoritative DNS server through recursive handling,the authoritative DNS server do matches with scheduling rules,and determines an edge service node according to the UE location roughly determined by the IP address of the confgiured DNS server.

    3) Local DNS server acts as a proxy and returns the Edge service node IP address.

    4) UE accesses to the edge service node.

    5) The hit content on the edge service node is returned to the UE.

    2.2 Addressing Problem in 5G

    Mobile edge computing is fristly introduced in 5G network.It enables operator’s and 3rd-party’s services to be hosted close to the UE’s access point of attachment,so as to achieve an effciient service delivery through the reduced end-to-end latency and load on the transport network[24].Supporting user plane(re)selection,local routing and traffci steering,session and service continuity,etc.,are characteristic features of 5G networks.However,5G did not consider network collaboration with the application layer addressing mechanism in its initial edge computing design.Addressing,which from the view of 5G network,can be taken as resource discovery(RD),is one of the main challenges in edge computing [25],and the challenge is essentially because of deep marginalized deployment of application,as well as mobility of UE.Further,when UE moves,in order to maintain the characteristics of the nearest serving,the address of both UE and edge applications may change,the network should always maintain the connection between UE and the nearest service node,while ensuring that all the changes caused by network address changing are synchronized to the application and application changes are unperceived to the user,which is the ultimate objective of distributed application addressing.

    In the scenario of 5G mobile edge computing,UE location cannot be directly judged from its network address or the IP address of local DNS,therefore,the key to solve the addressing problem lies in how the network helps the 3rd party HttpDNS systems or the authoritative DNS servers to obtain suffciiently fnie UE position.

    Edge computing has been widely used in 5G,but it is mainly used in edge private networks for nomadic UEs.This situation is not because general Internet UEs have no need for distributed application services,but that addressing problem is an obstacle to provide such services.Nowadays,there is no effective method to solve distributed addressing problem in 5G existing network.

    2.3 Two Potential 5G Addressing Schemes

    2.3.1 Mobile Core Network Enhancement Scheme From the perspective of the network,the mobile core network enhancement scheme,based on the principle of retaining existing DNS procedure for traditional distributed applications with no change on client,no modifciation on application logics,introduce a new network function called EASDF(EAS Discovery Function)to assist localized service discovery.EASDF can obtain the UE location from other network function.Utilizing DNS enhancement mechanism,EASDF adds EDNS Client Subnet (ECS) enhancement information into the DNS request messages for specifci FQDN (Fully Qualifeid Domain Name) before forwarding them,where ECS carries UE location related information,thus the 3rd party scheduling systems or the authoritative DNS servers can obtain relative fnie UE location.

    Session Breakout is the most used connectivity model for Internet UEs where a PDU (Protocal Data Unit) session has a PSA (PDU Session Anchor) UPF(User Plane Function) in a central site (C-PSA UPF)and one or more PSA UPF in the local site (LPSA UPF) [26].As a typical example,a discovery procedure for session breakout connectivity model is illustrated in Figure 3 where gNB (next generation NodeB),AMF (Access and Mobility Management Function),SMF (Session Management Function),EASDF are all network functions of 5G system.When UE establishes a PDU session,SMF selects an EASDF and includes the IP address of the EASDF as DNS server/resolver for the UE in the PDU Session Establishment Accept message.

    Figure 3.Illustration of mobile core network enhancement scheme.

    The relevant steps are described below:

    1) The UE sends a DNS Query message to the EASDF in order to access some edge application.

    2) The EASDF is provisioned with the DNS message handling rule(s),before the DNS Query message is received at the EASDF or as a consequence of the DNS Query reporting.

    3) The EASDF handles the DNS Query message received from the UE according to DNS message handling rule as the following:

    ? The EASDF adds the EDNS Client Subnet option into the DNS Query message and sends it to central DNS server,or

    ? The EASDF sends the DNS Query message to the Local DNS server.

    4) If the DNS query message is forwarded to the authoritative DNS server or 3rd party HttpDNS,the authoritative DNS server or HttpDNS selects a proximity edge service node and returns its address based on UE location information in the eDNS packet,or,if the DNS query message is forwarded to the local DNS server,the local DNS server might probably resolve it directly.In the situation where the local DNS server have no matching items for this DNS message,it will further forward it,just as the central DNS do,and UE location information can be judged by the address of local DNS server.

    5) EASDF receives DNS response and sends the DNS response to UE.

    6) The UE can then access to edge application node according to the IP address in the DNS response.

    2.3.2 Edge Application Layer Enabling Architecture Scheme

    Edge application layer enabling architecture scheme is an application layer solution.It defnies an application layer architecture for enabling edge computing,which includes the following functional entities[27]:

    ? Edge Enabler Client (EEC): EEC provides supporting functions needed for AC(Application Client)(s),including those of discovery of EAS(Edge Application Server)(s),i.e.distributed application addressing.

    ? Edge Confgiuration Server (ECS): ECS provides supporting functions needed for the EEC to connect with an EES such as provisioning edge confgiuration information for the EEC to distinguish amongst the EESs.

    ? Edge Enabler Server (EES): EES provides supporting functions needed for EASs and EEC,including registration functionalities for EAS which enable getting EAS deployment information,EEC context transferring between EESs,exposing events related to ACT (Application Context Transfer),etc.

    The architecture is illustrated in Figure 4,where the EDN (Edge Data Network) is a local data network,EAS(Edge Application Server)and the EES are contained within the EDN.Confgiurations related to the EES provided by ECS includes details of the EDN hosting the EES.The UE contains AC (Application Client)(s)and the EEC.The EAS(s),the EES and the ECS can interact with the 3GPP Core Network.

    Figure 4.Illustration of edge application layer enabling architecture scheme.

    The application layer architecture provides mechanisms for an EEC to discover available EASs.EAS discovery procedures enable the UE to obtain information about suitable EASs of interest (specifeid as discovery fliters)in the EDN.EES is confgiured with ECSP(Edge Cloud Service Provider)’s policy for EAS discovery.Enabler entities interact with each other to transfer UE location,capability,application deployment information,service strategy,etc.or,obtain network information,user information,as well as request network to implement network QoS policy through network exposure.EES might triggering the EAS instantiation on demand and execute ACR(Application Context Relocation)related operations.

    A typical implementation process is illustrated in Figure 4 and described as follows:

    1) EES registers to ECS,EAS and EEC register to EES.EEC obtains the EES address for its location and relative application from ECS.

    2) EEC sends an EAS discovery request to the EES,including security credentials,EAS discovery fliters and may also including UE location.

    3) When the EEC is authorized,the EES checks if UE’s location information is available,and obtains the UE location by utilizing the capabilities of the 3GPP core network if not available,then the EES identifeis the EAS based on the provided EAS discovery fliters and the UE location.

    4) Upon receiving the EAS discovery response,the EEC uses the endpoint information for routing of the outgoing application data traffci to EAS(s),as needed.

    III.NEW PROGRESS IN DISTRIBUTED APPLICATION ADDRESSING

    Although there are some potential solutions for 5G application addressing,they are either coupled with the 5G network architecture,which is based on the network architecture of logically centralized control plane and supposed to be different from the 6G network composed of edge autonomous subnets,or relied on great changes in application layer.Therefore,even if the 5G scheme is introduced to the 6G scheme,it cannot be used as a universal scheme.

    After reviewing the latest research,we found that the goals and ideas of application addressing and computing/application&network convergence control are consistent.Below,two typical up-to-date methods in carrier network based on convergence control are described,namely ICN distributed addressing scheme and CNC addressing scheme.

    3.1 ICN Distributed Addressing Scheme

    There are two ICN construction types,one is to completely change Internet’s IP-based architecture and addressing pattern,by defniing a totally new set of routing mechanism,another is aimed at graceful evolution and reuses the existing IP infrastructure,operates on top of IP protocol stack[28].Because ICN routes by contents,stripping the relationship between contents and UE locations,it can easily solve mobility problems[29].Besides,ICN uses publishing/subscription interactive pattern,with ICP publishing content flies and user subscribing to content with content name,enables decentralized networking,and thus improves transmission effciiency.

    NDN(Named Data Networking)is one of the mainstream implementations of ICN.NDN data pieces are identifeid by application-defnied names [30].NDN router maintains three modules,namely,Content Store(CS),Pending Interest Table (PIT),and Forwarding Information Base(FIB).

    The application/content addressing process is illustrated in Figure 5 and briefly described below:

    Figure 5.Illustration of NDN distributed addressing scheme.

    1) ①to ④: When NDN router receives the interest packet,it checks if the corresponding content is cached in the CS

    a) Yes: Directly replies with the Data packet;

    b) Not: Checks PIT for matching entries;

    i.Matched: Records the ingress interface receiving the Interest packet without forwarding

    ii.No matched: Forwards interest packet according to FIB and forwarding policies,adds the corresponding PIT entries,or discard the interest packet based on relevant information.

    2) ⑤to ⑧: As long as receives corresponding Data packet,the NDN router forwards the packet according to corresponding PIT entry,removes the corresponding PIT entry,and decides whether to update the content stored in the CS according to caching policy and replacement mechanism.

    3) ⑨t(yī)o ⑩: If the content is newly cached in step 2,next time,it will be directly return to the requester.

    3.2 CNC Addressing Scheme

    As described in literature [31],the computing network architecture system is logically divided into four functional modules: Computing Service Layer,Computing-aware Routing Layer,Computing &Network Orchestration and Management Layer,and Computing &Network Infrastructure Layer,as shown in Figure 6 and described below:

    Figure 6.General architecture of CNC.

    ? Computing Service Layer: This layer is composed of applications and capabilities of resolving service SLA,and transfers resolved SLA to the Computing-aware Routing Layer.

    ? Computing-aware Routing Layer: Based on the perception of computing node status and service requirements,this layer dispatches different computing nodes for the service,and feeds back the results to the Computing Service Layer.

    ? Computing &Network Orchestration and Management Layer: This layer realizes operation,orchestration and management of computing services,and manages computing-aware routing strategies,computing resources and network resources.

    ? Computing&Network Infrastructure Layer:This layer is composed of computing and network resources,and provides ubiquitous and heterogeneous computing resources,such as CPU,GPU,etc.and network transmission.

    CNC perceives all available computing and services requirement with no need for users to understand deployment states or locations of application services.For it,addressing to the optimal existing service nodes can be dynamically scheduled,new service nodes can be deployed or the existing network and computing resources be adjusted dynamically if the existing service nodes cannot meet the service SLA.

    The Computing-aware Routing Layer supports two basic implementation mode,namely centralized control mode and distributed control mode.

    In the centralized mode,the centralized platform(also known as the controller)collects the resource information and implements dispatching strategies,selects the appropriate computing resources and establishes the network connection according to the service requirements.It collects status of each computing node and network resources,constructs a unifeid view of entire resources,and further produces traffci strategies and establishes forwarding path among computing nodes.

    In the distributed mode,resource information is announced as routing indexes among network nodes by the extended routing protocol,addressing and routing are achieved synchronously when routing convergences.

    An example of the distributed control mode is illustrated in Figure 7 where R1~R6 are network nodes executing computing-aware routing,wherein computing gateway receives resource registrations and user service requests.The basic steps are described as follows:

    Figure 7.Illustration of CPN addressing scheme.

    1) Each computing gateway node constantly perceives and collects the status of network resources and computing resources in real time.These measurements,as well as application/content IDs,will be announced among the network nodes[32].Each node runs computing-aware routing protocol until routing tables for application/content have been set up.

    2) When UE initiates a request for an application service,application requirements such as bandwidth,delay,packet loss,application ID computing power requirements etc.,are resolved to routing indexes.When network nodes receive the request,they will forward it by matching their routing tables or executing other routing rules,eventually,the request will be forwarded to the optimal application service node.

    The advantage of distributed control is that the control logic is decentralized,and the effects of errors is relatively small.However,given computing status is an unstable factor,it is easy to cause route oscillation.Centralized mode can achieve more flexible and effective overall optimization through unifeid control,but it is necessary to prevent the concentration point from becoming a bottleneck.

    IV.COMPARATIVE ANALYSIS OF UP-TODATE SCHEMES

    This section compares the four schemes described in Section 2.3 and Section III on the additional requirements on existing UE,server side functions,network functions,and conformity of evolution,as well as maturity,as shown in Table 1.

    Table 1.Forwarding and control delay under different number of application instance.

    Core network enhancement scheme is based on 5G network architecture and existing mobility and session management control mechanisms.It is a plug-in scheme,low threshold for use,but it’s designed based on 5G network architecture with centralized control plane thus suitable to be used as a recent solutions or transition solution.The general conditions of relatively centralized deployment will be broken in 6G era,leaving limited room for this scheme to be applied.

    Edge application enabling architecture scheme introduces enabling functions at the application layer to convey application confgiuration and service strategy information.It can cooperate with mobile network by utilizing network exposure and simplify network implementation,simultaneously solve the application continuity problem in a single procedure,i.e.ACR procedure.However,it requires the application ecology be enhanced to support enabling entities.As ecological transformation is concerned,it depends on upstream and downstream industrial ecology to cooperate.

    ICN addressing scheme is in line with the developing trends of network distribution,and is a distributed addressing implementation in nature.However,it puts too many transformations on existing networks and mechanisms and still needs many verifciations.ICN has different technology branches,the overlap method implemented on IP protocol stack seems more mature,but the superimposed protocol stack somewhat affects its application performance.In short,from the current research perspective,ICN is unable to fundamentally change the Internet protocol system either in fxied Internet or mobile Internet,and is more suitable for a limited range deployment.

    CPN addressing scheme is in line with the developing trends of computing&network convergence.Besides solving distributed addressing problem,it solves other problems concerning flexible resource orchestration and dispatching.Although CNC scheme is still to be improved technically,it can reuse SRv6 routing mechanism or SDN implementation and it is more favored by operators and in academic circles.CNC is regarded as an important feature of 6G networks and gets much focus.Industrial supports greatly accelerate the maturity of the technology,it can be used directly in next generation fxied network,but still cannot be introduced into 6G network without any reform.

    In general,from the perspective of 6G network,distributed application addressing solution should not be a plug-in one,and it’s not suitable to use an application layer solution as a basic one.The essence of CNC can be absorbed,but the key is to consider how to integrate relative ideas designed for carrier network into the 6G network architecture.

    V.A ENDOGENOUS 6G APPLICATION ADDRESSING SCHEME

    5.1 Methodologies

    Below are some methodologies for constructing a 6G scheme:

    ? As application addressing is critical for application service performance,it should be a capital construction rather than a plug-in.

    ? When the physical address and content are separated due to the deep distribution,it is better to consider the computing and application characteristics in the addressing design,rather than the target IP address.

    ? Based on the characteristics of 6G computing&network convergence and dynamic orchestration,considering the coordination with the requirements of on-demand application deployment of applications and end-to-end performance guarantee,the CNC addressing mechanism is selected as the reference benchmark.

    ? Thinking about 6G scenarios,the demands of applications on computing and the network can be very different.The resource status of computing nodes may change frequently.As described in 3.2,under the CNC distributed control mode,continuous state changes are likely to cause route oscillations,resulting in network performance andreliability degradation,while the centralized control mode is compatible with the anchoring based session management mechanism of mobile networks,and it is easy to integrate with the programmable SRv6 protocol that is recognized as the 6G carrier network technology,therefore,the application addressing infrastructure of the 6G network is supposed to be built on the CNC centralized control mechanism.

    ? When considering how to integrate the CNC mechanism into the 6G network,combines the Computing-aware Routing Control Function of the Computing-aware Routing Layer with the 6G Network Control Layer,combines the Computing-aware Routing &Forwarding functions with the 6G Network Resource Layer.The 6G Network Control Layer collects not only network information,but also computing resource information,and achieves unifeid scheduling through a unifeid view.

    5.2 6G Application Addressing Architecture

    A 6G application addressing architecture based on the methodologies described in Section 5.1 is proposed below.

    As showed in Figure 8,6G application addressing architecture emphasizes the design and deployment of addressing related functions in the 6G basic architecture.That is,the architecture in Figure 8 is actually the 6G architecture,includes four layers and a management body running through all layers.The details are as follows:

    Figure 8.Illustration of 6G scheme based on 6G application addressing architecture.

    ? Network Resource Layer: Besides computing,storage resources,this is the executive layer of routing and forwarding.Compared to the architecture of Computing and Network Convergence,it is composed of Computing &Network Infrastructure Layer and those functions of computingaware routing &forwarding in the Computingaware Routing Layer,executing addressing routing rules issued from the upper layer.

    ? Network Control Layer: This is an organic fusion of computing-aware routing control functions and the know mobile network control plane functions,which receives interpreted information from applications,or by notifciations,network inspections or analyses,constructs control strategies by programmable technology and delivers them to Network Resource Layer to establish forwarding paths.Functions in this layer are supposed to be distributed deployed but cooperate organically.The application servers,i.e.the serving computing nodes,are usually determined by the policy control function in this layer when addressing is concerned.

    ? Application Enabling Layer: It undertakes some functions of the Computing Service Layer.It is composed of enabling components which assist the collaboration between application and network,such as network exposure function and application requirement interpretation functions,of which functionalities are built to enable UE capability negotiation,application policy confgiuration,etc.Distributed addressing enabler function,is one of the enabler components that maps application requirements to specifci network KPIs and policy parameters or providing registration service for applications so to obtain the application deployment topology and application KPIs.These parameters are passed to the Network Control Layer for setting up policies related to distributed application addressing.The enabler function can determine the serving application node on behalf of the Network Control Layer when suffciient information is obtained,and further trigger state synchronization between application instances,i.e.ACR to achieve service continuity in application layer along with that on network side.

    ? Application Layer: Comparatively,it also undertakes specifci functions exists in the Computing Service Layer,composed of various applications,i.e.consumers of network and computing services,such as XR,V2X,etc.Applications are usually distributed or marginalized and may be cached in network functions.

    ? 6G Operation &Management Layer: Corresponds to the Computing &Network Orchestration and Management Layer in computing&network convergence,it provides information about application lifecycle,confgiuration and OAM to the application addressing enabler function or policy control function.

    5.3 A Schematic Process of the 6G Distributed Application Addressing

    A schematic process is identifeid in Figure 8 with fgiures and one-way arrows as below:

    1) ①represents application deployment procedure.The distributed addressing enabler function obtains the deployment information and KPI information of the application through the registration of the application or the interface with the orchestration or management functions when the application is initiated by unifeid orchestration function

    2) ② represents perception and informationobtaining procedure.The perception management function collects resource status information from the perception entities in the Network Resource Layer through communication-sensing integration or from OAM system.The distributed addressing enabler function can use the network exposure function or obtain the assistance of the application requirement interpretation function or other AI entities to obtain network requirement parameters.

    3) ③represents policy generation procedure.The perception management function and the distributed addressing enabler function transfer their perception data to the policy control function for overall analyses so to construct scheduling policies.Among these policies,the forwarding policy can be pushed to the connection management function or pulled later.Policy construction function usually uses network AI to acquire more suitable index es for applications.Corresponding forwarding rules can further be issued to the Network Resource Layer.

    4) ④represents UE connection establishment procedure.When 6G Network Control Layer receives the UE’s request to access a specifci application,it frist determines a serving computing node based on UE location,resource status,UE mobility characteristics etc.and according to the scheduling polices,then indicates the Network Resource Layer to establish a connection between the UE and the selected application node.In this way,traffci forwarding can be split from computing node selection,and the control and forwarding mechanisms such as SDN can be used.

    5) ⑤represents application accessing procedure.As network connection has been set up in step 4,UE can access the expected application directly.

    It can be seen that 6G application addressing scheme proposed here makes full use of the characteristic capabilities of 6G,including computing &network convergence,endogenous network AI and communication-sensing integration capability,as well as innovative interactive methods between layers in 6G network architecture.

    5.4 Experimental Verification

    At present,6G is still in the process of exploration,and we do not have a complete 6G prototype system yet.Therefore,we verify our scheme in the aspects of forwarding policies distribution and forwarding execution,only the Network Control Layer and the Network Resource Layer are involved.It is assumed that the collection of resource status and AI analysis had been done.The experimental verifciation is conducted by open source software.Mininet [33] is used to simulate part of 6G network which includes the connection management function in the Network Control Layer and forwarding functions in the Network Resource Layer,while bind9 [34] simulates the policy control function which responds the exact application instance.We select the number of nodes(i.e.,distributed application instances) in the interval from 2 to 100,test the policy issuing (simulating session management operation because of user mobility) and data forwarding (simulating the user plane operation of mobile network) delay with 1000 tests per case,and fnially calculate the average delays.In the experiment,we assume that the network node connecting each computing node was different and connected in series,and the optimal computing node is at the end of the series.The Network Control Layer evaluates according to the addressing policy and decides the far-end computing node as the best service node and replies it to the UE.We test the forwarding delay of accessing an application and obtain control layer delay by reissuance of forwarding rules triggered by the change of computing resources.

    The experimental data is showed in Table 2 and presented in Figure 9,where in Figure 9,the primary coordinate represents the forwarding delay,the secondary coordinate represents the control delay,and the dotted lines represent average values.

    Table 2.Forwarding and control delay under different number of application instance.

    Figure 9.Forwarding and control delay under different number of application instance(in ms).

    To summarize,the average forwarding delay is 0.109ms.The more nodes the forwarding passes through,the larger the delay.It can be seemed that the average forwarding delay is already in a relatively small range compared with the processing delay of ordinary services,so it can be expected that the selection of service nodes with suffciient computing capabilitywill improve the delay more signifciantly.

    The control delay increases with the increase of network nodes.Compared with the empirical delay(100~250ms)of SMF executing user plane path handover due to UE mobility,the simulation results of the proposed 6G scheme are slightly larger in general,the number of network nodes might be an influencing factor.Considering the influence from the perception and AI learning process,the actual control delay will be larger in theory,so it is necessary to go in for how to optimize the control mechanism.Under simple conditions similar to that of our experiment,it is in the same order of magnitude as the average level of 5G and within an acceptable range.

    To emphasize,our experiment is preliminary,and we can’t draw a conclusion about the performance at this stage,rather to fnid out the problems that need to be focused on while designing 6G.

    VI.CONCLUSION

    This paper frist traces back the latest development of mobile network application addressing,then analyzes two novel addressing methods in carrier network,involved schemes include mobile core network enhancement scheme,edge application layer enabling architecture scheme,ICN distributed addressing scheme and CNC addressing scheme.The paper also compares these schemes concerning conditions of necessary enhancements,maturity and conformity of network evolution trends to show they are not suitable to be applied to 6G as a whole.Based on 6G basic architecture,an 6G endogenous application addressing architecture and corresponding scheme are proposed,integrating essence of CNC addressing schemes and making use of key capabilities of 6G,including computing &network convergence,endogenous intelligence,communication-sensing integration,etc.The methodologies,addressing architecture,a schematic process and preliminary experimental verifciation are discussed further for the proposed 6G scheme.It shows 6G application addressing enabling scheme is a 6G endogenous method and is in line with mobile network development trends.With no overall prototype,the experimental data cannot show the expected performance advantages,but it indicates the problems that we should pay attention to.More in-depth verif-i cation tests will be conducted while designing 6G.

    ACKNOWLEDGEMENT

    This work was supported by the National Key R&D Program of China (Project Number:2022YFB2902100).

    a级片在线免费高清观看视频| 欧美激情高清一区二区三区 | 深夜精品福利| 高清视频免费观看一区二区| 99国产精品免费福利视频| 久久鲁丝午夜福利片| 亚洲中文av在线| av.在线天堂| av网站免费在线观看视频| 成人毛片a级毛片在线播放| 一级,二级,三级黄色视频| 亚洲熟女精品中文字幕| 国产精品 国内视频| 成人亚洲精品一区在线观看| 国产一区二区激情短视频 | 成人国产av品久久久| 精品国产一区二区三区久久久樱花| 免费观看av网站的网址| 久久免费观看电影| 美女主播在线视频| 性少妇av在线| 免费久久久久久久精品成人欧美视频| 在线观看国产h片| 国产成人免费无遮挡视频| 王馨瑶露胸无遮挡在线观看| 亚洲一区中文字幕在线| 亚洲精品中文字幕在线视频| 国产野战对白在线观看| 久久毛片免费看一区二区三区| 老汉色av国产亚洲站长工具| 老司机影院毛片| 交换朋友夫妻互换小说| 国产一区二区三区av在线| 日日撸夜夜添| 国产亚洲最大av| 久久韩国三级中文字幕| 女性被躁到高潮视频| 美女视频免费永久观看网站| 久久久a久久爽久久v久久| 国产又色又爽无遮挡免| videosex国产| 欧美精品一区二区大全| 亚洲美女黄色视频免费看| 色婷婷av一区二区三区视频| 男女高潮啪啪啪动态图| 久久韩国三级中文字幕| 欧美日韩精品网址| 中文字幕制服av| 精品一区二区三卡| 捣出白浆h1v1| 最近最新中文字幕大全免费视频 | 蜜桃在线观看..| 黄色一级大片看看| 欧美激情高清一区二区三区 | 国产一区二区在线观看av| 亚洲内射少妇av| 亚洲 欧美一区二区三区| 一本大道久久a久久精品| 三级国产精品片| 久久人人97超碰香蕉20202| h视频一区二区三区| 精品酒店卫生间| 成人毛片60女人毛片免费| 香蕉国产在线看| 爱豆传媒免费全集在线观看| 国产毛片在线视频| 成人免费观看视频高清| 男女下面插进去视频免费观看| 日本色播在线视频| 各种免费的搞黄视频| 久久综合国产亚洲精品| 9191精品国产免费久久| 国产片特级美女逼逼视频| 亚洲三区欧美一区| 久久精品国产a三级三级三级| 两个人免费观看高清视频| 黄色配什么色好看| 中文字幕人妻丝袜制服| 男女啪啪激烈高潮av片| 亚洲av成人精品一二三区| 多毛熟女@视频| 色播在线永久视频| 国产乱来视频区| 亚洲少妇的诱惑av| 黄片小视频在线播放| 美女脱内裤让男人舔精品视频| 大香蕉久久成人网| 色吧在线观看| 国产片内射在线| 美国免费a级毛片| 香蕉精品网在线| 日韩精品免费视频一区二区三区| 国产成人精品福利久久| 亚洲一区二区三区欧美精品| 日日撸夜夜添| 黄色怎么调成土黄色| 老司机影院成人| 久久久久久久大尺度免费视频| 国产xxxxx性猛交| 久久精品人人爽人人爽视色| 亚洲精品自拍成人| 国产成人91sexporn| 爱豆传媒免费全集在线观看| 亚洲,一卡二卡三卡| 九色亚洲精品在线播放| 国产乱人偷精品视频| 人人妻人人爽人人添夜夜欢视频| 久久99一区二区三区| 久久久精品国产亚洲av高清涩受| 亚洲欧洲精品一区二区精品久久久 | 久久精品人人爽人人爽视色| 亚洲人成电影观看| av网站在线播放免费| 午夜91福利影院| 成人二区视频| 成人午夜精彩视频在线观看| 人体艺术视频欧美日本| 国产熟女午夜一区二区三区| √禁漫天堂资源中文www| av电影中文网址| 国产精品蜜桃在线观看| av视频免费观看在线观看| 日本免费在线观看一区| 免费播放大片免费观看视频在线观看| 成人影院久久| 欧美精品亚洲一区二区| 天天躁狠狠躁夜夜躁狠狠躁| 中文字幕人妻丝袜一区二区 | 婷婷色综合大香蕉| 久久久精品94久久精品| 国产精品久久久久成人av| 在线亚洲精品国产二区图片欧美| 国产精品不卡视频一区二区| 亚洲精品aⅴ在线观看| 七月丁香在线播放| 国产成人a∨麻豆精品| 久久久精品区二区三区| 精品人妻在线不人妻| 你懂的网址亚洲精品在线观看| av免费观看日本| 亚洲精品国产色婷婷电影| 最近手机中文字幕大全| 在线亚洲精品国产二区图片欧美| 免费在线观看完整版高清| 母亲3免费完整高清在线观看 | 女性被躁到高潮视频| 十八禁高潮呻吟视频| 在线天堂中文资源库| 久久免费观看电影| 成年女人毛片免费观看观看9 | 国产综合精华液| 丝袜脚勾引网站| 久久久a久久爽久久v久久| 成人亚洲精品一区在线观看| 制服诱惑二区| 午夜久久久在线观看| 王馨瑶露胸无遮挡在线观看| 香蕉精品网在线| 两个人免费观看高清视频| 免费观看在线日韩| 国产麻豆69| 久久国产亚洲av麻豆专区| 日韩中文字幕欧美一区二区 | 国产精品秋霞免费鲁丝片| 男人爽女人下面视频在线观看| 精品第一国产精品| 精品人妻熟女毛片av久久网站| 精品少妇黑人巨大在线播放| 日本欧美视频一区| 18禁观看日本| 日韩免费高清中文字幕av| 中文字幕色久视频| 青草久久国产| 亚洲精品美女久久av网站| 久久久精品免费免费高清| www.自偷自拍.com| 亚洲欧美日韩另类电影网站| 少妇熟女欧美另类| 精品少妇一区二区三区视频日本电影 | av天堂久久9| 日韩一区二区三区影片| 久久国产精品大桥未久av| 18禁裸乳无遮挡动漫免费视频| 国产精品嫩草影院av在线观看| 国产不卡av网站在线观看| 国产熟女午夜一区二区三区| 2021少妇久久久久久久久久久| 青春草视频在线免费观看| 超色免费av| 男男h啪啪无遮挡| 国产一区有黄有色的免费视频| 91午夜精品亚洲一区二区三区| 天美传媒精品一区二区| 天天影视国产精品| 欧美人与性动交α欧美精品济南到 | 如何舔出高潮| 边亲边吃奶的免费视频| 久久国产亚洲av麻豆专区| 久久久a久久爽久久v久久| 日韩人妻精品一区2区三区| 我的亚洲天堂| 亚洲第一av免费看| av福利片在线| 亚洲一区中文字幕在线| 免费大片黄手机在线观看| 十分钟在线观看高清视频www| 国产一区二区三区综合在线观看| 亚洲美女视频黄频| 久久人人爽人人片av| www.av在线官网国产| 女人精品久久久久毛片| 亚洲精品第二区| 尾随美女入室| xxx大片免费视频| 国产亚洲一区二区精品| 亚洲国产精品一区二区三区在线| 久久综合国产亚洲精品| 国产淫语在线视频| 亚洲美女视频黄频| 啦啦啦啦在线视频资源| 国产成人精品无人区| 国产成人av激情在线播放| 极品少妇高潮喷水抽搐| 亚洲色图 男人天堂 中文字幕| 欧美人与性动交α欧美软件| 国产探花极品一区二区| 永久免费av网站大全| 亚洲精品视频女| 国产精品 国内视频| 熟女电影av网| 肉色欧美久久久久久久蜜桃| 亚洲欧美一区二区三区黑人 | 免费观看性生交大片5| 99久久综合免费| 色播在线永久视频| 国产日韩一区二区三区精品不卡| 我的亚洲天堂| 狂野欧美激情性bbbbbb| 精品国产一区二区三区久久久樱花| 欧美精品av麻豆av| 精品国产一区二区三区四区第35| 国产极品粉嫩免费观看在线| 一级a爱视频在线免费观看| 捣出白浆h1v1| 久久久精品94久久精品| 久久国产精品男人的天堂亚洲| 69精品国产乱码久久久| 精品少妇一区二区三区视频日本电影 | 毛片一级片免费看久久久久| 国产亚洲欧美精品永久| 高清不卡的av网站| 男人舔女人的私密视频| 亚洲国产日韩一区二区| 街头女战士在线观看网站| 久久热在线av| 啦啦啦中文免费视频观看日本| 不卡av一区二区三区| 在现免费观看毛片| 秋霞在线观看毛片| 免费日韩欧美在线观看| 女性被躁到高潮视频| 咕卡用的链子| 亚洲精品第二区| 国产精品久久久久久精品古装| 黄网站色视频无遮挡免费观看| 一级a爱视频在线免费观看| 麻豆乱淫一区二区| 亚洲成人一二三区av| 亚洲美女搞黄在线观看| 国产乱人偷精品视频| 午夜福利乱码中文字幕| 十八禁网站网址无遮挡| 黄频高清免费视频| 国产综合精华液| 亚洲第一av免费看| 最近最新中文字幕免费大全7| 韩国高清视频一区二区三区| 午夜日本视频在线| 男人爽女人下面视频在线观看| 亚洲经典国产精华液单| 午夜免费鲁丝| 国产成人一区二区在线| 欧美另类一区| 日韩视频在线欧美| 99久久中文字幕三级久久日本| 国产无遮挡羞羞视频在线观看| 大话2 男鬼变身卡| 我要看黄色一级片免费的| 久久久久精品人妻al黑| 久久人人爽av亚洲精品天堂| 考比视频在线观看| 桃花免费在线播放| 九九爱精品视频在线观看| 91国产中文字幕| 午夜激情av网站| 欧美日韩综合久久久久久| 久久久久久久久免费视频了| a级片在线免费高清观看视频| 精品久久蜜臀av无| 在线观看人妻少妇| 国产精品亚洲av一区麻豆 | 国产淫语在线视频| av网站在线播放免费| 乱人伦中国视频| 制服诱惑二区| 999精品在线视频| 日韩av在线免费看完整版不卡| 久久国内精品自在自线图片| 日本-黄色视频高清免费观看| 午夜福利视频精品| 国产在线免费精品| 久久 成人 亚洲| 人人妻人人爽人人添夜夜欢视频| 制服人妻中文乱码| 国产又色又爽无遮挡免| 欧美精品国产亚洲| 国产精品香港三级国产av潘金莲 | 69精品国产乱码久久久| 国产精品蜜桃在线观看| 看非洲黑人一级黄片| 青春草国产在线视频| 人成视频在线观看免费观看| 老司机影院成人| 美女脱内裤让男人舔精品视频| 在线观看免费高清a一片| 国产成人一区二区在线| 色视频在线一区二区三区| 欧美激情 高清一区二区三区| 欧美另类一区| 亚洲视频免费观看视频| 国产人伦9x9x在线观看 | 日韩成人av中文字幕在线观看| 午夜福利一区二区在线看| av免费在线看不卡| 久久久久久久亚洲中文字幕| 777米奇影视久久| 国产日韩欧美亚洲二区| 国产成人免费观看mmmm| 精品亚洲乱码少妇综合久久| 精品一区二区免费观看| 亚洲伊人色综图| 看非洲黑人一级黄片| 欧美成人精品欧美一级黄| 一区二区三区精品91| 最近的中文字幕免费完整| 久久99一区二区三区| 亚洲综合精品二区| 大话2 男鬼变身卡| 亚洲四区av| 精品国产乱码久久久久久男人| 丝袜美足系列| 国产有黄有色有爽视频| 中文字幕精品免费在线观看视频| 免费观看av网站的网址| 亚洲av免费高清在线观看| 国产精品av久久久久免费| 热re99久久国产66热| 黄色一级大片看看| 国产成人免费无遮挡视频| 岛国毛片在线播放| 少妇猛男粗大的猛烈进出视频| 日韩,欧美,国产一区二区三区| 黄片播放在线免费| 九草在线视频观看| 美女福利国产在线| 午夜福利在线免费观看网站| 丰满少妇做爰视频| 在线天堂最新版资源| 亚洲欧美清纯卡通| 亚洲欧美一区二区三区黑人 | 两性夫妻黄色片| 麻豆精品久久久久久蜜桃| 日产精品乱码卡一卡2卡三| 狂野欧美激情性bbbbbb| 2022亚洲国产成人精品| 在线观看www视频免费| 久久99精品国语久久久| 韩国高清视频一区二区三区| 国产熟女午夜一区二区三区| 丝瓜视频免费看黄片| 日韩中字成人| 高清在线视频一区二区三区| 色婷婷av一区二区三区视频| 日本91视频免费播放| 桃花免费在线播放| 青春草视频在线免费观看| 国产男女内射视频| kizo精华| 亚洲色图综合在线观看| 女人久久www免费人成看片| 日日摸夜夜添夜夜爱| 黄色一级大片看看| 少妇猛男粗大的猛烈进出视频| videosex国产| 日本av手机在线免费观看| 少妇的逼水好多| 日日撸夜夜添| 水蜜桃什么品种好| 国产精品二区激情视频| 国产男人的电影天堂91| 自线自在国产av| 成年美女黄网站色视频大全免费| 成人漫画全彩无遮挡| 三级国产精品片| 精品人妻熟女毛片av久久网站| 亚洲熟女精品中文字幕| 日日摸夜夜添夜夜爱| 国产在线一区二区三区精| 精品国产露脸久久av麻豆| 成人国语在线视频| 三级国产精品片| 夫妻性生交免费视频一级片| 久久久久人妻精品一区果冻| 在线观看www视频免费| 日本-黄色视频高清免费观看| 亚洲,一卡二卡三卡| 在线观看免费视频网站a站| 精品一区二区三区四区五区乱码 | 成年美女黄网站色视频大全免费| 久久精品久久精品一区二区三区| 日韩视频在线欧美| 日韩制服骚丝袜av| 久热久热在线精品观看| a级毛片在线看网站| 婷婷色综合www| 欧美激情极品国产一区二区三区| 在现免费观看毛片| 成人免费观看视频高清| 综合色丁香网| 少妇被粗大的猛进出69影院| 色婷婷av一区二区三区视频| 黄网站色视频无遮挡免费观看| 国产福利在线免费观看视频| 人人澡人人妻人| 久久国产精品男人的天堂亚洲| 国产国语露脸激情在线看| 国产日韩欧美视频二区| 黄频高清免费视频| 亚洲成人手机| 在线天堂中文资源库| 久久久精品94久久精品| 久久久a久久爽久久v久久| 亚洲av中文av极速乱| 春色校园在线视频观看| 十八禁网站网址无遮挡| 在线观看三级黄色| 久久久久久免费高清国产稀缺| 欧美xxⅹ黑人| 少妇猛男粗大的猛烈进出视频| 考比视频在线观看| 久久久久视频综合| 国产欧美日韩一区二区三区在线| 亚洲欧美精品自产自拍| 亚洲精品av麻豆狂野| 亚洲,欧美精品.| 亚洲欧洲日产国产| 一个人免费看片子| 菩萨蛮人人尽说江南好唐韦庄| 女人被躁到高潮嗷嗷叫费观| 亚洲美女黄色视频免费看| 九色亚洲精品在线播放| 成年美女黄网站色视频大全免费| 午夜老司机福利剧场| 午夜福利在线免费观看网站| 精品亚洲成a人片在线观看| 欧美黄色片欧美黄色片| 大片电影免费在线观看免费| 久久精品国产a三级三级三级| 哪个播放器可以免费观看大片| 97精品久久久久久久久久精品| 永久网站在线| 精品国产国语对白av| 亚洲精品美女久久av网站| 久久人人爽av亚洲精品天堂| 18+在线观看网站| 日本猛色少妇xxxxx猛交久久| 免费少妇av软件| 爱豆传媒免费全集在线观看| 国产深夜福利视频在线观看| 久久精品国产自在天天线| 国产精品久久久久久久久免| 成人手机av| 水蜜桃什么品种好| 伊人亚洲综合成人网| 欧美人与性动交α欧美软件| 免费观看在线日韩| 热99国产精品久久久久久7| 香蕉丝袜av| 午夜91福利影院| 亚洲一码二码三码区别大吗| 麻豆精品久久久久久蜜桃| 一区二区av电影网| 一区二区日韩欧美中文字幕| 一二三四中文在线观看免费高清| 欧美xxⅹ黑人| 在线观看www视频免费| 亚洲综合色惰| 国产xxxxx性猛交| 国产片内射在线| 精品少妇黑人巨大在线播放| 99久久精品国产国产毛片| 亚洲激情五月婷婷啪啪| 久久久久久人妻| 大码成人一级视频| 18+在线观看网站| 嫩草影院入口| 亚洲精品视频女| 自线自在国产av| 午夜久久久在线观看| 成年人免费黄色播放视频| 日本欧美国产在线视频| 欧美日韩视频精品一区| 免费少妇av软件| 色视频在线一区二区三区| 中文字幕另类日韩欧美亚洲嫩草| 国产精品免费视频内射| 久久这里只有精品19| 人妻 亚洲 视频| 国产1区2区3区精品| 亚洲av电影在线进入| 成年人午夜在线观看视频| 中文欧美无线码| 极品少妇高潮喷水抽搐| 成人18禁高潮啪啪吃奶动态图| 色网站视频免费| 最近的中文字幕免费完整| 少妇人妻 视频| 久久狼人影院| 色视频在线一区二区三区| 亚洲第一区二区三区不卡| 一级黄片播放器| 亚洲av成人精品一二三区| 欧美av亚洲av综合av国产av | 老司机影院成人| 亚洲色图 男人天堂 中文字幕| 国产精品麻豆人妻色哟哟久久| 精品第一国产精品| 黄频高清免费视频| 超碰97精品在线观看| 久久久久国产一级毛片高清牌| 人人妻人人爽人人添夜夜欢视频| av不卡在线播放| 两性夫妻黄色片| 在线观看一区二区三区激情| 精品第一国产精品| 亚洲第一区二区三区不卡| 999精品在线视频| 国产一区亚洲一区在线观看| 国产一区二区三区综合在线观看| 免费日韩欧美在线观看| 99香蕉大伊视频| 在线观看一区二区三区激情| 啦啦啦中文免费视频观看日本| 欧美激情高清一区二区三区 | 久久精品国产综合久久久| 日本免费在线观看一区| 国产成人欧美| 日韩中字成人| 国产深夜福利视频在线观看| 亚洲综合色惰| 国产成人精品一,二区| 激情五月婷婷亚洲| 成人亚洲精品一区在线观看| 一级a爱视频在线免费观看| 日韩伦理黄色片| 欧美变态另类bdsm刘玥| 午夜福利视频精品| 国产极品天堂在线| www.自偷自拍.com| 久久影院123| 精品国产一区二区三区久久久樱花| 国产亚洲一区二区精品| av片东京热男人的天堂| 99国产精品免费福利视频| 国产精品嫩草影院av在线观看| 中文字幕人妻熟女乱码| 精品国产一区二区三区四区第35| 91精品伊人久久大香线蕉| 2022亚洲国产成人精品| 97在线人人人人妻| 日韩成人av中文字幕在线观看| 寂寞人妻少妇视频99o| 狠狠精品人妻久久久久久综合| 一边亲一边摸免费视频| 免费高清在线观看日韩| 精品少妇一区二区三区视频日本电影 | 男女下面插进去视频免费观看| 亚洲精品中文字幕在线视频| 99香蕉大伊视频| 精品人妻一区二区三区麻豆| 一本—道久久a久久精品蜜桃钙片| 国产精品久久久av美女十八| 极品人妻少妇av视频| 亚洲av在线观看美女高潮| 国产精品人妻久久久影院| 久久精品aⅴ一区二区三区四区 | 亚洲一区中文字幕在线| 久久免费观看电影| 青春草国产在线视频| av福利片在线| av在线app专区| av免费在线看不卡| 国产淫语在线视频| 黑人欧美特级aaaaaa片| 99re6热这里在线精品视频| 午夜老司机福利剧场| 寂寞人妻少妇视频99o| 一级黄片播放器| 26uuu在线亚洲综合色| 男女午夜视频在线观看| xxx大片免费视频| 1024香蕉在线观看| 久久韩国三级中文字幕| 肉色欧美久久久久久久蜜桃| 777久久人妻少妇嫩草av网站|