<address id="fjh72"></address>

<dfn id="fjh72"><button id="fjh72"></button></dfn>

        <dfn id="fjh72"></dfn>

        Previous Page TOC Next Page



        — 1 —
        Open Systems, Standards, and Protocols


        Today I start looking at the subject of TCP/IP by covering some background information you will need to put TCP/IP in perspective, and to understand why the TCP/IP protocols were designed the way they are. This chapter covers some important information, including the following:

        You might be eager to get started with the nitty-gritty of the TCP/IP protocols, or to find out how to use the better-known services like FTP and Telnet. If you have a specific requirement to satisfy (such as how to transfer a file from one system to another), by all means use the Table of Contents to find the section you want. But if you want to really understand TCP/IP, you will need to wade through the material in this chapter. It's not complicated, although there are quite a few subjects to be covered. Luckily, none of it requires memorization; more often than not it is a matter of setting the stage for something else I discuss in the next week or so. So don't get too overwhelmed by this chapter!

        Open Systems


        This is a book about a family of protocols called TCP/IP, so why bother looking at open systems and standards at all? Primarily because TCP/IP grew out of the need to develop a standardized communications procedure that would inevitably be used on a variety of platforms. The need for a standard, and one that was readily available to anyone (hence open), was vitally important to TCP/IP's success. Therefore, a little background helps put the design of TCP/IP into perspective.

        More importantly, open systems have become de rigueur in the current competitive market. The term open system is bandied around by many people as a solution for all problems (to be replaced occasionally by the term client/server), but neither term is usually properly used or understood by the people spouting them. Understanding what an open system really is and what it implies leads to a better awareness of TCP/IP's role on a network and across large internetworks like the Internet.

        In a similar vein, the use of standards ensures that a protocol such as TCP/IP is the same on each system. This means that your PC can talk to a minicomputer running TCP/IP without special translation or conversion routines. It means that an entire network of different hardware and operating systems can work with the same network protocols. Developing a standard is not a trivial process. Often a single standard involves more than a single document describing a software system. A standard often involves the interrelationship of many different protocols, as does TCP/IP. Knowing the interactions between TCP/IP and the other components of a communications system is important for proper configuration and optimization, and to ensure that all the services you need are available and interworking properly.

        What Is an Open System?


        There are many definitions of open systems, and a single, concise definition that everyone is happy with is far from being accepted. For most people, an open system is best loosely defined as one for which the architecture is not a secret. The description of the architecture has been published or is readily available to anyone who wants to build products for a hardware or software platform. This definition of an open system applies equally well to hardware and software.

        When more than a single vendor begins producing products for a platform, customers have a choice. You don't particularly like Nocrash Software's network monitoring software? No problem, because FaultFree Software's product runs on the Nocrash hardware, and you like its fancy interface much better. You need a more colorful graphical front-end to your Whizbang PC than the one Whizbang provides? Download one from Super Software through the Internet, and it works perfectly. The primary idea, of course, is a move away from proprietary platforms to one that is multivendor.

        A decade ago, open systems were virtually nonexistent. Each hardware manufacturer had a product line, and you were practically bound to that manufacturer for all your software and hardware needs. Some companies took advantage of the captive market, charging outrageous prices or forcing unwanted configurations on their customers. The groundswell of resentment grew to the point that customers began forcing the issue. The lack of choice in software and hardware purchases is why several dedicated minicomputer and mainframe companies either went bankrupt or had to accept open system principles: their customers got fed up with relying on a single vendor. A good example of a company that made the adaptation is Digital Equipment Corporation (DEC). They moved from a proprietary operating system on their VMS minicomputers to a UNIX-standard open operating system. By doing that, they kept their customers happy, and they sold more machines. That's one of the primary reasons DEC is still in business today.

        UNIX is a classic example of an open software platform. UNIX has been around for 30 years. The source code for the UNIX operating system was made available to anyone who wanted it, almost from the start. UNIX's source code is well understood and easy to work with, the result of 30 years of development and improvement. UNIX can be ported to run on practically any hardware platform, eliminating all proprietary dependencies. The attraction of UNIX is not the operating system's features themselves but simply that a UNIX user can run software from other UNIX platforms, that files are compatible from one UNIX system to another (except for disk formats), and that a wide variety of vendors sell products for UNIX.

        The growth of UNIX pushed the large hardware manufacturers to the open systems principle, resulting in most manufacturers licensing the right to produce a UNIX version for their own hardware. This step let customers combine different hardware systems into larger networks, all running UNIX and working together. Users could move between machines almost transparently, ignorant of the actual hardware platform they were on. Open systems, originally of prime importance only to the largest corporations and governments, is now a key element in even the smallest company's computer strategy.



        Although UNIX is a copyrighted work now owned by X/Open, the details of the operating system have been published and are readily available to any developer who wants to produce applications or hardware that work with the operating system. UNIX is unique in this respect.

        The term open system networking means many things, depending on whom you ask. In its broadest definition, open system networking refers to a network based on a well-known and understood protocol (such as TCP/IP) that has its standards published and readily available to anyone who wants to use them. Open system networking also refers to the process of networking open systems (machaine-specific hardware and software) using a network protocol. It is easy to see why people want open systems networking, though. Three services are widely used and account for the highest percentage of network traffic: file transfer, electronic mail, and remote login. Without open systems networking, setting up any of these three services would be a nightmare.

        File transfers enable users to share files quickly and efficiently, without excessive duplication or concerns about the transport method. Network file transfers are much faster than an overnight courier crossing the country, and usually faster than copying a file on a disk and carrying it across the room. File transfer is also extremely convenient, which not only pleases users but also eliminates time delays while waiting for material. A common open system governing file transfers means that any incompatibilities between the two machines transferring files can be overcome easily.

        Electronic mail has mushroomed to a phenomenally large service, not just within a single business but worldwide. The Internet carries millions of messages from people in government, private industry, educational institutions, and private interests. Electronic mail is cheap (no paper, envelope, or stamp) and fast (around the world in 60 seconds or so). It is also an obvious extension of the computer-based world we work in. Without an open mail system, you wouldn't have anywhere near the capabilities you now enjoy.

        Finally, remote logins enable a user who is based on one system to connect through a network to any other system that accepts him as a user. This can be in the next workgroup, the next state, or in another country. Remote logins enable users to take advantage of particular hardware and software in another location, as well as to run applications on another machine. Once again, without an open standard, this would be almost impossible.

        Network Architectures


        To understand networking protocols, it is useful to know a little about networks. A quick look at the most common network architectures will help later in this book when you read about network operations and routing. The term network usually means a set of computers and peripherals (printers, modems, plotters, scanners, and so on) that are connected together by some medium. The connection can be direct (through a cable) or indirect (through a modem). The different devices on the network communicate with each other through a predefined set of rules (the protocol).

        The devices on a network can be in the same room or scattered through a building. They can be separated by many miles through the use of dedicated telephone lines, microwave, or a similar system. They can even be scattered around the world, again connected by a long-distance communications medium. The layout of the network (the actual devices and the manner in which they are connected to each other) is called the network topology.

        Usually, if the devices on a network are in a single location such as a building or a group of rooms, they are called a local area network, or LAN. LANs usually have all the devices on the network connected by a single type of network cable. If the devices are scattered widely, such as in different buildings or different cities, they are usually set up into several LANs that are joined together into a larger structure called a wide area network, or WAN. A WAN is composed of two or more LANs. Each LAN has its own network cable connecting all the devices in that LAN. The LANs are joined together by another connection method, often high-speed telephone lines or very fast dedicated network cables called backbones, which I discuss in a moment.

        One last point about WANs: they are often treated as a single entity for organizational purposes. For example, the ABC Software company might have branches in four different cities, with a LAN in each city. All four LANs are joined together by high-speed telephone lines. However, as far as the Internet and anyone outside the ABC Software company are concerned, the ABC Software WAN is a single entity. (It has a single domain name for the Internet. Don’t worry if you don’t known what a domain is at this point in time; it refers to a single entity for organizational purposes on the Internet, as you will see later.)

        Local Area Networks


        TCP/IP works across LANs and WANs, and there are several important aspects of LAN and WAN topologies you should know about. You can start with LANs and look at their topologies. Although there are many topologies for LANs, three topologies are dominant: bus, ring, and hub.

        The Bus Network

        The bus network is the simplest, comprising a single main communications pathway with each device attached to the main cable (bus) through a device called a transceiver or junction box. The bus is also called a backbone because it resembles a human spine with ribs emanating from it. From each transceiver on the bus, another cable (often very short) runs to the device's network adapter. An example of a bus network is shown in Figure 1.1.

        Figure 1.1. A schematic of a bus network showing the backbone with transceivers leading to network devices.

        The primary advantage of a bus network is that it allows for a high-speed bus. Another advantage of the bus network is that it is usually immune to problems with any single network card within a device on the network. This is because the transceiver allows traffic through the backbone whether a device is attached to the junction box or not. Each end of the bus is terminated with a block of resistors or a similar electrical device to mark the end of the cable electrically. Each device on the pathway has a special identifying number, or address, that lets the device know that incoming information is for that device.

        A bus network is seldom a straight cable. Instead, it is usually twisted around walls and buildings as needed. It does have a single pathway from one end to the other, with each end terminated in some way (usually with a resistor). Figure 1.1 shows a logical representation of the network, meaning it has simplified the actual physical appearance of the network into a schematic with straight lines and no real scale to the connections. A physical representation of the network would show how it goes through walls, around desks, and so on. Most devices on the bus network can send or receive data along the bus by packaging a message with the intended recipient's address.

        A variation of the bus network topology is found in many small LANs that use Thin Ethernet cable (which looks like television coaxial cable) or twisted-pair cable (which resembles telephone cables). This type of network consists of a length of coaxial cable that snakes from machine to machine. Unlike the bus network in Figure 1.1, there are no transceivers on the bus. Instead, each device is connected into the bus directly using a T-shaped connector on the network interface card, often using a connector called a BNC. The connector connects the machine to the two neighbors through two cables, one to each neighbor. At the ends of the network, a simple resistor is added to one side of the T-connector to terminate the network electrically.

        A schematic of this type of network is shown in Figure 1.2. Each network device has a T-connector attached to the network interface card, leading to its two neighbors. The two ends of the bus are terminated with resistors.

        Figure 1.2. A schematic of a machine-to-machine bus network.

        This machine-to-machine (also called peer-to-peer) network is not capable of sustaining the higher speeds of the backbone-based bus network, primarily because of the medium of the network cable. A backbone network can use very high-speed cables such as fiber optics, with smaller (and slower) cables from each transceiver to the device. A machine-to-machine network is usually built using twisted-pair or coaxial cable because these cables are much cheaper and easier to work with. Until recently, machine-to-machine networks were limited to a throughput of about 10 Mbps (megabits per second), although recent developments called 100VG AnyLAN and Fast Ethernet allow 100 Mbps on this type of network.

        The advantage of this machine-to-machine bus network is its simplicity. Adding new machines to the network means installing a network card and connecting the new machine into a logical place on the backbone. One major advantage of the machine-to-machine bus network is also its cost: it is probably the lowest cost LAN topology available. The problem with this type of bus network is that if one machine is taken off the network cable, or the network interface card malfunctions, the backbone is broken and must be tied together again with a jumper of some sort or the network might cease to function properly.

        The Ring Network

        A ring network topology is often drawn as its name suggests, shaped like a ring. A typical ring network schematic is shown in Figure 1.3. You might have heard of a token ring network before, which is a ring topology network. You might be disappointed to find no physical ring architecture in a ring network, though.

        Figure 1.3. A schematic of a ring network.



        Despite the almost automatic assumption that a ring network has a backbone with the ends of the cable joined to form a loop, there is no real cabling ring at all. The ring name derives from the construction of the central control unit.

        The term ring is a misnomer because ring networks don't have an unending cable like a bus network with the two terminators joined together. Instead, the ring refers to the design of the central unit that handles the network's message passing. In a token ring network, the central control unit is called a Media Access Unit, or MAU. The MAU has a ring circuit inside it (for which the network topology is named). The ring inside the MAU serves as the bus for devices to obtain messages.

        The Hub Network

        A hub network uses a main cable much like the bus network, which is called the backplane. The hub topology is shown in Figure 1.4. From the backplane, a set of cables leads to a hub, which is a box containing several ports into which devices are plugged. The cables to a connection point are often called drops, because they drop from the backplane to the ports.

        Figure 1.4. A schematic of a hub network.

        Hub networks can be very large, using a high-speed fiber optic backplane and slightly slower Ethernet drops to hubs from which a workgroup can be supported. The hub network can also be small, with a couple of hubs supporting a few devices connected together by standard Ethernet cables. The hub network is scaleable (meaning you can start small and expand as you need to), which is part of its attraction.

        Hub networks have become popular for large installations, in part because they are easy to set up and maintain. They also can be the least expensive system in many larger installations, which adds to their attraction. The backplane can extend across a considerable distance just like a bus network, whereas the ports, or connection points, are usually grouped in a set placed in a box or panel. There can be many panels or connection boxes attached to the backplane.

        Wide Area Networks


        As I mentioned earlier, LANs can be combined into a large entity called a WAN. WANs are usually composed of LANs joined together by a high-speed link (such as a telephone line or dedicated cable). At the entrance to each LAN, one or more machines act as the link between the LAN and WAN: these are called gateways. I talk about gateways and the types of gateways used in a WAN in more detail on many of the following days, but for now you need to know only that a gateway is the interface between a LAN and a WAN. The same applies for any LAN that accesses the Internet: one machine usually acts as the gateway from the LAN to the Internet (which is really just a very large WAN).

        Many terms other than gateway are also used. You will hear terms like router and bridge. They are all gateways, but they perform slightly different tasks. To understand their roles (which I mention many times in the next week's material), you need to take a quick look at how WANs are laid out.

        LANs can be tied to a WAN through a gateway that handles the passage of data between the LAN and WAN backbone. In a simple layout, a router is used to perform this function. This is shown in Figure 1.5.

        Figure 1.5. A router connects a LAN to the backbone.

        Another gateway device, called a bridge, is used to connect LANs using the same network protocol. Bridges are used only when the same network protocol (such as TCP/IP) is on both LANs. The bridge does not care which physical media is used. Bridges can connect twisted-pair LANs to coaxial LANs, for example, or act as an interface to a fiber optic network. As long as the network protocol is the same, the bridge functions properly.

        If two or more LANs are involved in one organization and there is the possibility of a lot of traffic between them, it is better to connect the two LANs directly with a bridge instead of loading the backbone with the cross-traffic. This is shown in Figure 1.6.

        Figure 1.6. Using a bridge to connect two LANs.

        In a configuration using bridges between LANs, traffic from one LAN to another can be sent through the bridge instead of onto the backbone, providing better performance. For services such as Telnet and FTP, the speed difference between using a bridge and going through a router onto a heavily used backbone can be significant.

        WANs are an important subject, and I look at them again in more detail on Day 13, "Managing and Troubleshooting TCP/IP."

        Layers


        Suppose you have to write a program that provides networking functions to every machine on your LAN. Writing a single software package that accomplishes every task required for communications between different computers would be a nightmarish task. Apart from having to cope with the different hardware architectures, simply writing the code for all the applications you desire would result in a program that was far too large to execute or maintain.

        Dividing all the requirements into similar-purpose groups is a sensible approach, much as a programmer breaks code into logical chunks. With open systems communications, groups are quite obvious. One group deals with the transport of data, another with the packaging of messages, another with end-user applications, and so on. Each group of related tasks is called a layer.



        The layers of an architecture are meant to be stand-alone, independent entities. They usually cannot perform any observable task without interacting with other layers, but from a programming point of view they are self-contained.

        Of course, some crossover of functionality is to be expected, and several different approaches to the same division of layers for a network protocol were proposed. One that became adopted as a standard is the Open Systems Interconnection Reference Model (which is discussed in more detail in the next section). The OSI Reference Model (OSI-RM) uses seven layers, as shown in Figure 1.7. The TCP/IP architecture is similar but involves only five layers, because it combines some of the OSI functionality in two layers into one. For now, though, consider the seven-layer OSI model.

        Figure 1.7. The OSI Reference Model showing all seven layers.

        The application, presentation, and session layers are all application-oriented in that they are responsible for presenting the application interface to the user. All three are independent of the layers below them and are totally oblivious to the means by which data gets to the application. These three layers are called the upper layers.

        The lower four layers deal with the transmission of data, covering the packaging, routing, verification, and transmission of each data group. The lower layers don't worry about the type of data they receive or send to the application, but deal simply with the task of sending it. They don't differentiate between the different applications in any way.

        The following sections explain each layer to help you understand the architecture of the OSI-RM (and later contrast it with the architecture of TCP/IP).

        The Application Layer


        The application layer is the end-user interface to the OSI system. It is where the applications, such as electronic mail, USENET news readers, or database display modules, reside. The application layer's task is to display received information and send the user's new data to the lower layers.

        In distributed applications, such as client/server systems, the application layer is where the client application resides. It communicates through the lower layers to the server.

        The Presentation Layer


        The presentation layer's task is to isolate the lower layers from the application's data format. It converts the data from the application into a common format, often called the canonical representation. The presentation layer processes machine-dependent data from the application layer into a machine-independent format for the lower layers.

        The presentation layer is where file formats and even character formats (ASCII and EBCDIC, for example) are lost. The conversion from the application data format takes place through a "common network programming language" (as it is called in the OSI Reference Model documents) that has a structured format.

        The presentation layer does the reverse for incoming data. It is converted from the common format into application-specific formats, based on the type of application the machine has instructions for. If the data comes in without reformatting instructions, the information might not be assembled in the correct manner for the user's application.

        The Session Layer


        The session layer organizes and synchronizes the exchange of data between application processes. It works with the application layer to provide simple data sets called synchronization points that let an application know how the transmission and reception of data are progressing. In simplified terms, the session layer can be thought of as a timing and flow control layer.

        The session layer is involved in coordinating communications between different applications, letting each know the status of the other. An error in one application (whether on the same machine or across the country) is handled by the session layer to let the receiving application know that the error has occurred. The session layer can resynchronize applications that are currently connected to each other. This can be necessary when communications are temporarily interrupted, or when an error has occurred that results in loss of data.

        The Transport Layer


        The transport layer, as its name suggests, is designed to provide the "transparent transfer of data from a source end open system to a destination end open system," according to the OSI Reference Model. The transport layer establishes, maintains, and terminates communications between two machines.

        The transport layer is responsible for ensuring that data sent matches the data received. This verification role is important in ensuring that data is correctly sent, with a resend if an error was detected. The transport layer manages the sending of data, determining its order and its priority.

        The Network Layer


        The network layer provides the physical routing of the data, determining the path between the machines. The network layer handles all these routing issues, relieving the higher layers from this issue.

        The network layer examines the network topology to determine the best route to send a message, as well as figuring out relay systems. It is the only network layer that sends a message from source to target machine, managing other chunks of data that pass through the system on their way to another machine.

        The Data Link Layer


        The data link layer, according to the OSI reference paper, "provides for the control of the physical layer, and detects and possibly corrects errors that can occur." In practicality, the data link layer is responsible for correcting transmission errors induced during transmission (as opposed to errors in the application data itself, which are handled in the transport layer).

        The data link layer is usually concerned with signal interference on the physical transmission media, whether through copper wire, fiber optic cable, or microwave. Interference is common, resulting from many sources, including cosmic rays and stray magnetic interference from other sources.

        The Physical Layer


        The physical layer is the lowest layer of the OSI model and deals with the "mechanical, electrical, functional, and procedural means" required for transmission of data, according to the OSI definition. This is really the wiring or other transmission form.

        When the OSI model was being developed, a lot of concern dealt with the lower two layers, because they are, in most cases, inseparable. The real world treats the data link layer and the physical layer as one combined layer, but the formal OSI definition stipulates different purposes for each. (TCP/IP includes the data link and physical layers as one layer, recognizing that the division is more academic than practical.)

        Terminology and Notations


        Both OSI and TCP/IP are rooted in formal descriptions, presented as a series of complex documents that define all aspects of the protocols. To define OSI and TCP/IP, several new terms were developed and introduced into use; some (mostly OSI terms) are rather unusual. You might find the term OSI-speak used to refer to some of these rather grotesque definitions, much as legalese refers to legal terms.

        To better understand the details of TCP/IP, it is necessary to deal with these terms now. You won't see all these terms in this book, but you might encounter them when reading manuals or online documentation. Therefore, all the major terms are covered here.



        Many of the terms used by both OSI and TCP/IP might seem to have multiple meanings, but there is a definite attempt to provide a single, consistent definition for each word. Unfortunately, the user community is slow to adopt new terminology, so there is a considerable amount of confusion.


        Packets


        To transfer data effectively, many experiments have shown that creating a uniform chunk of data is better than sending characters singly or in widely varying sized groups. Usually these chunks of data have some information ahead of them (the header) and sometimes an indicator at the end (the trailer). These chunks of data are called packets in most synchronous communications systems.

        The amount of data in a packet and the composition of the header can change depending on the communications protocol as well as some system limitations, but the concept of a packet always refers to the entire set (including header and trailer). The term packet is used often in the computer industry, sometimes when it shouldn't be.

        You often see the word packet used as a generic reference to any group of data packaged for transmission. As an application's data passes through the layers of the architecture, each adds more information. The term packet is frequently used at each stage. Treat the term packet as a generalization for any data with additional information, instead of the specific result of only one layer's addition of header and trailer. This goes against the efforts of both OSI and the TCP governing bodies, but it helps keep your sanity intact!

        Subsystems


        A subsystem is the collective of a particular layer across a network. For example, if 10 machines are connected together, each running the seven-layer OSI model, all 10 application layers are the application subsystem, all 10 data link layers are the data link subsystem, and so on. As you might have already deduced, with the OSI Reference Model there are seven subsystems.

        It is entirely possible (and even likely) that all the individual components in a subsystem will not be active at one time. Using the 10-machine example again, only three might have the data link layer actually active at any moment in time, but the cumulative of all the machines makes up the subsystem.

        Entities


        A layer can have more than one part to it. For example, the transport layer can have routines that verify checksums as well as routines that handle resending packets that didn't transfer correctly. Not all these routines are active at once, because they might not be required at any moment. The active routines, though, are called entities. The word entity was adopted in order to find a single term that could not be confused with another computer term such as module, process, or task.

        N Notation


        The notations N, N+1, N+2, and so on are used to identify a layer and the layers that are related to it. Referring to Figure 1.7, if the transport layer is layer N, the physical layer is N–3 and the presentation layer is N+2. With OSI, N always has a value of 1 through 7 inclusive.

        One reason this notation was adopted was to enable writers to refer to other layers without having to write out their names every time. It also makes flow charts and diagrams of interactions a little easier to draw. The terms N+1 and N–1 are commonly used in both OSI and TCP for the layers above and below the current layer, respectively, as you will see.

        To make things even more confusing, many OSI standards refer to a layer by the first letter of its name. This can lead to a real mess for the casual reader, because "S-entity," "5-entity," and "layer 5" all refer to the session layer.

        N-Functions


        Each layer performs N-functions. The functions are the different things the layer does. Therefore, the functions of the transport layer are the different tasks that the layer provides. For most purposes in this book, functions and entities mean the same thing.

        N-Facilities


        This uses the hierarchical layer structure to express the idea that one layer provides a set of facilities to the next higher layer. This is sensible, because the application layer expects the presentation layer to provide a robust, well-defined set of facilities to it. In OSI-speak, the (N+1)-entities assume a defined set of N-facilities from the N-entity.

        Services


        The entire set of N-facilities provided to the (N+1)-entities is called the N-service. In other words, the service is the entire set of N-functions provided to the next higher layer. Services might seem like functions, but there is a formal difference between the two. The OSI documents go to great lengths to provide detailed descriptions of services, with a "service definition standard" for each layer. This was necessary during the development of the OSI standard so that the different tasks involved in the communications protocol could be assigned to different layers, and so that the functions of each layer are both well-defined and isolated from other layers.

        The service definitions are formally developed from the bottom layer (physical) upward to the top layer. The advantage of this approach is that the design of the N+1 layer can be based on the functions performed in the N layer, avoiding two functions that accomplish the same task in two adjacent layers.

        An entire set of variations on the service name has been developed to apply these definitions, some of which are in regular use:

        An N-service user is a user of a service provided by the N layer to the next higher (N+1) layer.

        An N-service provider is the set of N-entities that are involved in providing the N layer service.

        An N-service access point (often abbreviated to N-SAP) is where an N-service is provided to an (N+1)-entity by the N-service provider.

        N-service data is the packet of data exchanged at an N-SAP.

        N-service data units (N-SDUs) are the individual units of data exchanged at an N-SAP (so that N-service data is made up of N-SDUs).

        These terms are shown in Figure 1.8. Another common term is encapsulation, which is the addition of control information to a packet of data. The control data contains addressing details, checksums for error detection, and protocol control functions.

        Figure 1.8. Service providers and service users communicate through service access points.

        Making Sense of the Jargon


        It is important to remember that all these terms are used in a formal description, because a formal language is usually the only method to adequately describe something as complex as a communications protocol. It is possible, though, to fit these terms together so that they make a little more sense when you encounter them. An example should help.

        The session layer has a set of session functions. It provides a set of session facilities to the layer above it, the presentation layer. The session layer is made up of session entities. The presentation layer is a user of the services provided by the session layer (layer 5). A presentation entity is a user of the services provided by the session layer and is called a presentation service user.

        The session service provider is the collection of session entities that are actively involved in providing the presentation layer with the session's services. The point at which the session service is provided to the presentation layer is the session service access point, where the session service data is sent. The individual bits of data in the session service data are called session service data units.

        Confusing? Believe it or not, after a while you will begin to feel more comfortable with these terms. The important ones to know now are that a layer provides a set of entities through a service access point to the next higher layer, which is called the service user. The data is sent in chunks called service data, made up of service data units.

        Queues and Connections


        Communication between two parties (whether over a telephone, between layers of an architecture, or between applications themselves) takes place in three distinct stages: establishment of the connection, data transfer, and connection termination.

        Communication between two OSI applications in the same layer is through queues to the layer beneath them. Each application (more properly called a service user) has two queues, one for each direction to the service provider of the layer beneath (which controls the whole layer). In OSI-speak, the two queues provide for simultaneous (or atomic) interactions between two N-service action points.

        Data, called service primitives, is put into and retrieved from the queue by the applications (service users). A service primitive can be a block of data, an indicator that something is required or received, or a status indicator. As with most aspects of OSI, a lexicon has been developed to describe the actions in these queues:

        A request primitive is when one service submits a service primitive to the queue (through the N-SAP) requesting permission to communicate with another service in the same layer.

        An indication primitive is what the service provider in the layer beneath the sending application sends to the intended receiving application to let it know that communication is desired.

        A response primitive is sent by the receiving application to the layer beneath's service provider to acknowledge the granting of communications between the two service users.

        A confirmation primitive is sent from the service provider to the final application to indicate that both applications on the layer above can now communicate.

        An example might help clarify the process. Assume that two applications in the presentation layer want to communicate with each other. They can't do so directly (according to the OSI model), so they must go through the layer below them. These steps are shown in Figure 1.9.

        Figure 1.9. Two applications communicate through SAPs using primitives.

        The first application sends a request primitive to the service provider of the session layer and waits. The session layer's service provider removes the request primitive from the inbound queue from the first application and sends an indication primitive to the second application's inbound queue.

        The second application takes the indication primitive from its queue to the session service provider and decides to accept the request for connection by sending a positive response primitive back through its queue to the session layer. This is received by the session layer service provider, and a confirmation primitive is sent to the first application in the presentation layer. This is a process called confirmed service because the applications wait for confirmation that communications are established and ready.

        OSI also provides for unconfirmed service, in which a request primitive is sent to the service provider, sending the indication primitive to the second application. The response and confirmation primitives are not sent. This is a sort of "get ready, because here it comes whether you want it or not" communication, often referred to as send and pray.

        When two service users are using confirmed service to communicate, they are considered connected. Two applications are talking to each other, aware of what the other is doing with the service data. OSI refers to the establishment and maintenance of state information between the two, or the fact that each knows when the other is sending or receiving. OSI calls this connection-oriented or connection-mode communications.

        Connectionless communication is when service data is sent independently, as with unconfirmed service. The service data is self-contained, possessing everything a receiving service user needs to know. These service data packets are often called datagrams. The application that sends the datagram has no idea who receives the datagram and how it is handled, and the receiving service users have no idea who sent it (other than information that might be contained within the datagram itself). OSI calls this connectionless-mode.

        OSI (and TCP/IP) use both connected and connectionless systems between layers of their architecture. Each has its benefits and ideal implementations. All these communications are between applications (service users) in each layer, using the layer beneath to communicate. There are many service users, and this process is going on all the time. It's quite amazing when you think about it.

        Standards


        People don't question the need for rules in a board game. If you didn't have rules, each player could be happily playing as it suits them, regardless of whether their play was consistent with that of other players. The existence of rules ensures that each player plays the game in the same way, which might not be as much fun as a free-for-all. However, when a fight over a player's actions arises, the written rules clearly indicate who is right. The rules are a set of standards by which a game is played.

        Standards prevent a situation arising where two seemingly compatible systems really are not. For example, 10 years ago when CP/M was the dominant operating system, the 5.25-inch floppy was used by most systems. But the floppy from a Kaypro II couldn't be read by an Osbourne I because the tracks were laid out in a different manner. A utility program could convert between the two, but that extra step was a major annoyance for machine users.

        When the IBM PC became the platform of choice, the 5.25-inch format used by the IBM PC was adopted by other companies to ensure disk compatibility. The IBM format became a de facto standard, one adopted because of market pressures and customer demand.

        Setting Standards


        Creating a standard in today's world is not a simple matter. Several organizations are dedicated to developing the standards in a complete, unambiguous manner. The most important of these is the International Organization for Standardization, or ISO (often called the International Standardization Organization to fit their acronym, although this is incorrect). ISO consists of standards organizations from many countries who try to agree on international criterion. The American National Standards Institute (ANSI), British Standards Institute (BSI), Deutsches Institut fur Normung (DIN), and Association Francaise du Normalization (AFNOR) are all member groups. The ISO developed the Open Systems Interconnection (OSI) standard that is discussed throughout this book.

        Each nation's standards organization can create a standard for that country, of course. The goal of ISO, however, is to agree on worldwide standards. Otherwise, incompatibilities could exist that wouldn't allow one country's system to be used in another. (An example of this is with television signals: the US relies on NTSC, whereas Europe uses PAL—systems that are incompatible with each other.)

        Curiously, the language used for most international standards is English, even though the majority of participants in a standards committee are not from English-speaking countries. This can cause quite a bit of confusion, especially because most standards are worded awkwardly to begin with.

        The reason most standards involve awkward language is that to describe something unambiguously can be very difficult, sometimes necessitating the creation of new terms that the standard defines. Not only must the concepts be clearly defined, but the absolute behavior is necessary too. With most things that standards apply to, this means using numbers and physical terms to provide a concrete definition. Defining a 2x4 piece of lumber necessitates the use of a measurement of some sort, and similarly defining computer terms requires mathematics.

        Simply defining a method of communications, such as TCP/IP, would be fairly straightforward if it weren't for the complication of defining it for open systems. The use of an open system adds another difficulty because all aspects of the standard must be machine-independent. Imagine trying to define a 2x4 without using a measurement you are familiar with, such as inches, or if inches are adopted, it would be difficult to define inches in an unambiguous way (which indeed is what happens, because most units of length are defined with respect to the wavelength of a particular kind of coherent light).

        Computers communicate through bits of data, but those bits can represent characters, numbers, or something else. Numbers could be integers, fractions, or octal representations. Again, you must define the units. You can see that the complications mount, one on top of the other.

        To help define a standard, an abstract approach is usually used. In the case of OSI, the meaning (called the semantics) of the data transferred (the abstract syntax) is first dealt with, and the exact representation of the data in the machine (the concrete syntax) and the means by which it is transferred (transfer syntax) are handled separately. The separation of the abstract lets the data be represented as an entity, without concern for what it really means. It's a little like treating your car as a unit instead of an engine, transmission, steering wheel, and so on. The abstraction of the details to a simpler whole makes it easier to convey information. ("My car is broken" is abstract, whereas "the power steering fluid has all leaked out" is concrete.)

        To describe systems abstractly, it is necessary to have a language that meets the purpose. Most standards bodies have developed such a system. The most commonly used is ISO's Abstract Syntax Notation One, frequently shortened to ASN.1. It is suited especially for describing open systems networking. Thus, it's not surprising to find it used extensively in the OSI and TCP descriptions. Indeed, ASN.1 was developed concurrently with the OSI standards when it became necessary to describe upper-layer functions.

        The primary concept of ASN.1 is that all types of data, regardless of type, size, origin, or purpose, can be represented by an object that is independent of the hardware, operating system software, or application. The ASN.1 system defines the contents of a datagram protocol header—the chunk of information at the beginning of an object that describes the contents to the system. (Headers are discussed in more detail in the section titled "Protocol Headers" later in this chapter.)

        Part of ASN.1 describes the language used to describe objects and data types (such as a data description language in database terminology). Another part defines the basic encoding rules that deal with moving the data objects between systems. ASN.1 defines data types that are used in the construction of data packets (datagrams). It provides for both structured and unstructured data types, with a list of 28 supported types.



        Don't be too worried about learning ASN.1 in this book. I refer to it in passing in only a couple of places. It is useful, though, to know that the language is provided for the formal definition of all the aspects of TCP/IP.


        Internet Standards


        When the Defense Advanced Research Projects Agency (DARPA) was established in 1980, a group was formed to develop a set of standards for the Internet. The group, called the Internet Configuration Control Board (ICCB) was reorganized into the Internet Activities Board (IAB) in 1983, whose task was to design, engineer, and manage the Internet.

        In 1986, the IAB turned over the task of developing the Internet standards to the Internet Engineering Task Force (IETF), and the long-term research was assigned to the Internet Research Task Force (IRTF). The IAB retained final authorization over anything proposed by the two task forces.

        The last step in this saga was the formation of the Internet Society in 1992, when the IAB was renamed the Internet Architecture Board. This group is still responsible for existing and future standards, reporting to the board of the Internet Society.

        After all that, what happened during the shuffling? Almost from the beginning, the Internet was defined as "a loosely organized international collaboration of autonomous, interconnected networks," which supported host-to-host communications "through voluntary adherence to open protocols and procedures" defined in a technical paper called the Internet Standards, RFC 1310,2. That definition is still used today.

        The IETF continues to work on refining the standards used for communications over the Internet through a number of working groups, each one dedicated to a specific aspect of the overall Internet protocol suite. There are working groups dedicated to network management, security, user services, routing, and many more things. It is interesting that the IETF's groups are considerably more flexible and efficient than those of, say, the ISO, whose working groups can take years to agree on a standard. In many cases, the IETF's groups can form, create a recommendation, and disband within a year or so. This helps continuously refine the Internet standards to reflect changing hardware and software capabilities.

        Creating a new Internet standard (which happened with TCP/IP) follows a well-defined process, shown schematically in Figure 1.10. It begins with a request for comment (RFC). This is usually a document containing a specific proposal, sometimes new and sometimes a modification of an existing standard. RFCs are widely distributed, both on the network itself and to interested parties as printed documents. Important RFCs and instructions for retrieving them are included in the appendixes at the end of this book.

        Figure 1.10. The process for adopting a new Internet standard.

        The RFC is usually discussed for a while on the network itself, where anyone can express their opinion, as well as in formal IETF working group meetings. After a suitable amount of revision and continued discussion, an Internet draft is created and distributed. This draft is close to final form, providing a consolidation of all the comments the RFC generated.

        The next step is usually a proposed standard, which remains as such for at least six months. During this time, the Internet Society requires at least two independent and interoperable implementations to be written and tested. Any problems arising from the actual tests can then be addressed. (In practice, it is usual for many implementations to be written and given a thorough testing.)

        After that testing and refinement process is completed, a draft standard is written, which remains for at least four months, during which time many more implementations are developed and tested. The last step—after many months—is the adoption of the standard, at which point it is implemented by all sites that require it.

        Protocols


        Diplomats follow rules when they conduct business between nations, which you see referred to in the media as protocol. Diplomatic protocol requires that you don't insult your hosts and that you do respect local customs (even if that means you have to eat some unappetizing dinners!). Most embassies and commissions have specialists in protocol, whose function is to ensure that everything proceeds smoothly when communications are taking place. The protocol is a set of rules that must be followed in order to "play the game," as career diplomats are fond of saying. Without the protocols, one side of the conversation might not really understand what the other is saying.

        Similarly, computer protocols define the manner in which communications take place. If one computer is sending information to another and they both follow the protocol properly, the message gets through, regardless of what types of machines they are and what operating systems they run (the basis for open systems). As long as the machines have software that can manage the protocol, communications are possible. Essentially, a computer protocol is a set of rules that coordinates the exchange of information.

        Protocols have developed from very simple processes ("I'll send you one character, you send it back, and I'll make sure the two match") to elaborate, complex mechanisms that cover all possible problems and transfer conditions. A task such as sending a message from one coast to another can be very complex when you consider the manner in which it moves. A single protocol to cover all aspects of the transfer would be too large, unwieldy, and overly specialized. Therefore, several protocols have been developed, each handling a specific task.

        Combining several protocols, each with their own dedicated purposes, would be a nightmare if the interactions between the protocols were not clearly defined. The concept of a layered structure was developed to help keep each protocol in its place and to define the manner of interaction between each protocol (essentially, a protocol for communications between protocols!).

        As you saw earlier, the ISO has developed a layered protocol system called OSI. OSI defines a protocol as "a set of rules and formats (semantic and syntactic), which determines the communication behavior of N-entities in the performance of N-functions." You might remember that N represents a layer, and an entity is a service component of a layer.

        When machines communicate, the rules are formally defined and account for possible interruptions or faults in the flow of information, especially when the flow is connectionless (no formal connection between the two machines exists). In such a system, the ability to properly route and verify each packet of data (datagram) is vitally important. As discussed earlier, the data sent between layers is called a service data unit (SDU), so OSI defines the analogous data between two machines as a protocol data unit (PDU).

        The flow of information is controlled by a set of actions that define the state machine for the protocol. OSI defines these actions as protocol control information (PCI).

        Breaking Data Apart


        It is necessary to introduce a few more terms commonly used in OSI and TCP/IP, but luckily they are readily understood because of their real-world connotations. These terms are necessary because data doesn't usually exist in manageable chunks. The data might have to be broken down into smaller sections, or several small sections can be combined into a large section for more efficient transfer. The basic terms are as follows:

        Segmentation is the process of breaking an N-service data unit (N-SDU) into several N-protocol data units (N-PDUs).

        Reassembly is the process of combining several N-PDUs into an N-SDU (the reverse of segmentation).

        Blocking is the combination of several SDUs (which might be from different services) into a larger PDU within the layer in which the SDUs originated.

        Unblocking is the breaking up of a PDU into several SDUs in the same layer.

        Concatenation is the process of one layer combining several N-PDUs from the next higher layer into one SDU (like blocking except occurring across a layer boundary).

        Separation is the reverse of concatenation, so that a layer breaks a single SDU into several PDUs for the next layer higher (like unblocking except across a layer boundary).

        These six processes are shown in Figure 1.11.

        Figure 1.11. Segmentation, reassembly, blocking, unblocking, concatenation, and separation.

        Finally, here is one last set of definitions that deal with connections:

        Multiplexing is when several connections are supported by a single connection in the next lower layer (so three presentation service connections could be multiplexed into a single session connection).

        Demultiplexing is the reverse of multiplexing, in which one connection is split into several connections for the layer above it.

        Splitting is when a single connection is supported by several connections in the layer below (so the data link layer might have three connections to support one network layer connection).

        Recombining is the reverse of splitting, so that several connections are combined into a single one for the layer above.

        Multiplexing and splitting (and their reverses, demultiplexing and recombining) are different in the manner in which the lines are split. With multiplexing, several connections combine into one in the layer below. With splitting, however, one connection can be split into several in the layer below. As you might expect, each has its importance within TCP and OSI.

        Protocol Headers


        Protocol control information is information about the datagram to which it is attached. This information is usually assembled into a block that is attached to the front of the data it accompanies and is called a header or protocol header. Protocol headers are used for transferring information between layers as well as between machines. As mentioned earlier, the protocol headers are developed according to rules laid down in the ISO's ASN.1 document set.

        When a protocol header is passed to the layer beneath, the datagram including the layer's header is treated as the entire datagram for that receiving layer, which adds its own protocol header to the front. Thus, if a datagram started at the application layer, by the time it reached the physical layer, it would have seven sets of protocol headers on it. These layer protocol headers are used when moving back up the layer structure; they are stripped off as the datagram moves up. An illustration of this is shown in Figure 1.12.

        Figure 1.12. Adding each layer's protocol header to user data.

        It is easier to think of this process as layers on an onion. The inside is the data that is to be sent. As it passes through each layer of the OSI model, another layer of onion skin is added. When it is finished moving through the layers, several protocol headers are enclosing the data. When the datagram is passed back up the layers (probably on another machine), each layer peels off the protocol header that corresponds to the layer. When it reaches the destination layer, only the data is left.

        This process makes sense, because each layer of the OSI model requires different information from the datagram. By using a dedicated protocol header for each layer of the datagram, it is a relatively simple task to remove the protocol header, decode its instructions, and pass the rest of the message on. The alternative would be to have a single large header that contained all the information, but this would take longer to process. The exact contents of the protocol header are not important right now, but I examine them later when looking at the TCP protocol.

        As usual, OSI has a formal description for all this, which states that the N-user data to be transferred is prepended with N-protocol control information (N-PCI) to form an N-protocol data unit (N-PDU). The N-PDUs are passed across an N-service access point (N-SAP) as one of a set of service parameters comprising an N-service data unit (N-SDU). The service parameters comprising the N-SDU are called N-service user data (N-SUD), which is prepended to the (N–1)PCI to form another (N–1)PDU.

        For every service in a layer, there is a protocol for it to communicate to the layer below it (remember that applications communicate through the layer below, not directly). The protocol exchanges for each service are defined by the system, and to a lesser extent by the application developer, who should be following the rules of the system.

        Protocols and headers might sound a little complex or overly complicated for the task that must be accomplished, but considering the original goals of the OSI model, it is generally acknowledged that this is the best way to go. (Many a sarcastic comment has been made about OSI and TCP that claim the header information is much more important than the data contents. In some ways this is true, because without the header the data would never get to its destination.)

        Summary


        Today's text has thrown a lot of terminology at you, most of which you will see frequently in the following chapters. In most cases, a gentle reminder of the definition accompanies the first occurrence of the term. To understand the relationships between the different terms, though, you might have to refer back to today's material.

        You now have the basic knowledge to relate TCP/IP to the OSI's layered model, which will help you understand what TCP/IP does (and how it goes about doing it). The next chapter looks at the history of TCP/IP and the growth of the Internet.

        Q&A


        What are the three main types of LAN architecture? What are their primary characteristics?

        The three network architectures are bus, ring, and hub. There are others, but these three describe the vast majority of all LANs.

        A bus network is a length of cable that has a connector for each device directly attached to it. Both ends of the network cable are terminated. A ring network has a central control unit called a Media Access Unit to which all devices are attached by cables. A hub network has a backplane with connectors leading through another cable to the devices.

        What are the seven OSI layers and their responsibilities?

        The OSI layers (from the bottom up) are as follows:

        Physical: Transmits data

        Data Link: Corrects transmission errors

        Network: Provides the physical routing information

        Transport: Verifies that data is correctly transmitted

        Session: Synchronizes data exchange between upper and lower layers

        Presentation: Converts network data to application-specific formats

        Application: End-user interface

        What is the difference between segmentation and reassembly, and concatenation and separation?

        Segmentation is the breaking apart of a large N-service data unit (N-SDU) into several smaller N-protocol data units (N-PDUs), whereas reassembly is the reverse.

        Concatenation is the combination of several N-PDUs from the next higher layer into one SDU. Separation is the reverse.

        Define multiplexing and demultiplexing. How are they useful?

        Multiplexing is when several connections are supported by a single connection. According to the formal definition, this applies to layers (so that three presentation service connections could be multiplexed into a single session connection). However, it is a term generally used for all kinds of connections, such as putting four modem calls down a single modem line. Demultiplexing is the reverse of multiplexing, in which one connection is split into several connections.

        Multiplexing is a key to supporting many connections at once with limited resources. A typical example is a remote office with twenty terminals, each of which is connected to the main office by a telephone line. Instead of requiring twenty lines, they can all be multiplexed into three or four. The amount of multiplexing possible depends on the maximum capacity of each physical line.

        How many protocol headers are added by the time an OSI-based e-mail application (in the application layer) has sent a message to the physical layer for transmission?

        Seven, one for each OSI layer. More protocol headers can be added by the actual physical network system. As a general rule, each layer adds its own protocol information.

        Quiz


        1. Provide definitions for each of the following terms:

          packet

          subsystem

          entity

          service

          layer

          ISO

          ASN.1

        2. What does each of the following primitives do?

          service primitive

          request primitive

          indication primitive

          response primitive

          confirmation primitive

        3. What is a Service Access Point? How many are there per layer?

        4. Explain the process followed in adopting a new Internet Standard for TCP/IP.

        5. Use diagrams to show the differences between segmentation, separation, and blocking.

        Previous Page Page Top TOC Next Page

        <address id="fjh72"></address>

        <dfn id="fjh72"><button id="fjh72"></button></dfn>

              <dfn id="fjh72"></dfn>
              成人自拍视频在线观看 | 国产欧美综合一区二区三区 | 看黄在线网站 | 丁香婷婷激情网 | 成人免费污污污视频 | 丰满人妻一区=区三区在线视频53 狠狠狠狠狠狠狠狠狠狠狠狠狠狠狠狠 | 国产一级a毛一级a毛视频在线网站 | 国产精品黄片 | 伊人久久精品 | 最黄视频伦乱日本 | 足交视频网站 | 一级黄色片A | 国产乱伦毛片张雪馨 | 成人性别视频影音先锋电影 | 国产一级aaa | 国产 码在线成人网站 | 疯狂 自慰爽www看片91 国产999高清无码精品导航 | 激情婷婷五月 | 爱操成人网 | 3级片免费网站免费播放无码久久 | 黄片在线免费视频 | 一道本最新无码视频 | 伊人操操| 欧美日韩毛片 | 久久大鸡八三级片 | 超碰操逼逼 | 99久久无码一区 | 欧美黄网站在线观看 | 国产高清无码视频在线播放 | 狠狠久久免费电影 | 91嫩草久久久天美传媒 | 亚洲乱伦网站 | 有码一区二区三区四区 | 国产三级a三级三级 | 黄色一级操逼视频 | 免费操逼。 | 一级学生妹在线无码 | 青青草伊人网 | 国产午夜无码视频在线观看 | 中国人与拘一级毛片 | 免费亚洲视频在线观看 | 黄色一级看 | 撸一撸免费在线 | 亚洲黄色在线免费观看 | www久久| 青青青久| 色婷婷在线视频精品免费 | 西西www444大胆无码视频 | 一级黄色A片 | 日韩欧美中文字幕在线视频 | 国产内射视频 | 强开小嫩苞一区二区电影 | 欧美日韩国产VA在线观看免费 | 日本激情网| 婷婷色综合淫淫网 | 免费在线成人网 | 成人中文字幕在线 | 欧美亚洲国产一区导航 | www.日本特黄24小时免费 | 日韩操碰 | 无码人妻一区二区三区中文 | 亚洲天堂在线官网 | 欧美性爱网站在线观看 | 欧美操逼视频有吗? | 先锋影音男人在线资源站 | 天天综合天天添夜夜添狠狠添 | 日本一级电影在线 | 国产探花视频在线播放 | 视频一区二区三区四区久久 | 天天操69| 91综合娱乐 | 亚洲AV无码成人精品一区 | 亚洲AA| 久久久久久久久久艹 | 在线观看免费一区 | 天堂AV导航 | 亚洲视频欧洲视频 | 亚洲卡一卡二卡三在线观看 | 五月情丁香五月情婷婷 | 91在线无码精品秘 入口男同 | 无码国产精品一区二区色情男同 | 夜夜躁很很躁日日躁2021 | 樱桃码一区二区三区 | 午夜日逼免费 | 97超碰中文在线 | 偷拍综合| 国产成人久久精品77777综合 | 国内夫妻【20p】 | 国产成人无码A片免费看 | 免费在线观看视频黄 | 欧美性做爰毛片 | a√天堂资源中文8 | 欧美成人精品欧美一级乱 | 极品身材主播大秀的微博叫什么 | 艹骚逼视频 | 成人蘑菇视频 | 超碰在線超碰免費 | 特黄特色一级特黄大片 | 波多野在线 | 一级黄色电影大全 | 羞羞影院午夜男女爽爽视频 | 成人电影在线观看A | 日韩一级精品视频 | 免费AA片播放 | 亲子伦一区二区三区观看方式 | 久热精品视频在线播放 | 久久久精品成人视频 | 天天视频有没有黄色。 | 粉嫩小泬BBBB毛茸茸 | 国产精品永久无码AV毛片18禁 | 最新三级网站 | 超碰91大香蕉 | 一级A片在线观看 | 国产豆花视频在线播放 | 日韩欧美综合 | 伦中文亚洲 | 九九在线视频 | 亚洲欧美精品性爱 | 精品无人区一区二区三区聊斋艳谭 | 熟女一区二区 | 国产探花视频在线播放 | 奇米无码视频 | 国产又爽又黄在线 | 久久精品欧美一 | 操B视频在线观看 | 国产乱伦大杂烩 | 黄色在线免费一级视频 | 小穴喷白浆在线 | 成年人性爱网站 | 欧洲性爱视频在线观看 | 国产A片黄片 | 青草网在线| 少妇厨房偷情理伦 | 天天做天天爱天天高潮 | 乱伦一级视频 | 日韩黄色一级片 | 91九色蝌蚪91成人 | 九九精品视频免费 | 国产精品热久久 | 三级激情网站 | 青青草在线成人视频 | 亚洲宗合在线视频 | 成人夜间视频 | 草比免费视频 | 蜜桃秘 av无码一区二区三区 | 无码免费在线观看视频 | 性一乱一交一交一视频 | 国产一级片在线播放 | 欧美三级片网址 | 欧美日韩一级毛 | 夜丝袜噜噜亚洲精品AV | 九九九在线视 | 亚洲五月丁香婷婷 | 久久久国产精品黄毛片 | 最新中文字幕MV第三季歌词完整版 | 亲子伦视频一区二区三区 | 人妻洗澡被强公日日澡 | 毛片av大全 | 一区二区三区无码免费观看 | 人妻女大香蕉大香蕉 | 久久久视频在线观看 | 日韩无码视频网站 | 最新中文字幕av 67194国产 | 午夜狂拍偷拍伊人之大香蕉 | 污污污污污www网站免费观看 | 麻豆热门精选 | 国产亚洲在线观看 | 亚州乱伦网 | 欧美成人破处视频 | 五月丁香最新网址导航 | 熟女18p | 国产精品一二 | 色中色AV| 黑人3 P操B视频 | 人妻无码专区 | 操骚B视频 | 射了好多别动哦初恋哥vs | 国产之级淫秽 | 大鸡巴久久久久久久久久久 | 99热6在线观看 | 欧美久久一级片 | 黄色一级片大 | 操逼AV最新地址大全 | 日本一级婬片免费放 | 国产精品女人久久久 | 先锋影音av资源网 | 亚洲影音先锋 | 操美少妇母亲aV | 欧美性爱69 | 性无码一区二区三区 | 91十八禁 | 美女成人视频 | 亚洲免费在线观看视频 | 免费在线观看V片 | 九九九九在线视频 | 天天爽91 | 翔田千里中文字幕无码 | 久久视频午夜视频久久 | 中文字幕在线中文乱 | 91成人视频 | 色之综合天天综合色天天素质 | 日韩AV高清 | 婷婷综合资源网 | 欧美成人一区二区三区在线视频 | 牛牛澡牛牛爽一区二区 | 国产一区二区三区视频在线播放 | 国产精品又污又黄又爽污污 | 亚洲一区二区政府在线播放IV | 亚洲青娱乐福利在线视频 | 爱爱网官方登录网站入口 | 日逼99 | 91成人 片 | 中文字幕高清无码视频 | 黄色毛片网址 | 激情内射 | 国产免费网址 | 热久久高清免费视频 | 国产综合在线视频 | 欧美日本中文在线 | 欧美日韩三级在线 | 欧美大屌在线观看 | a片成人黄色电影 | 伊人国产在线观看 | 亚洲夜夜撸 | 久久久久久久精 | 特级大胆西西4444人体 | 天天看A片 | 国内色情一级视频 | 天天操,天天干,天天日 | 九九色影院 | 日一本一乱一纶一视一频一一区一二区 | 久久免费精品一区二区三区 | 欧美三级欧美一级 | 毛片在线观看网站 | 国产99久久成人视频 | 免费精品久久久久久中文字幕-无删减 | 18禁黄网站 | 久久夜色精品国产噜噜 | 韩国一级网站 | 黄色片免费视频 | 亚洲无码成人在线 | 日韩在线视频网站 | 国产女在线| 久久涩| 无码人妻一区二区三区精品不付款 | 欧美三级午夜理伦 | 97精品在线视频 | 亚洲AV无码成人精品国产一区 | 欧美日韩无码视频 | 欧美成人性爱诱惑 | 看美女操逼视频 | 日韩欧美一级黄色电影 | 色老板最新网址 | 黄色在线免费播放 | 天天操中文字幕 | 孕妇孕交性一级A片 | 青娱乐国产极品 | 欧美午夜操逼 | 日比小视频 | 国产女人18毛片水18精品 | 91午夜视频 | 伊人狼人在线 | 男人的天堂毛片 | 夜夜操夜夜操 | 中文色色网 | 阴茎插入阴道内的欧美视频网站 | 成人天堂AV | 想要xx视频 | 可以免费看黄片的网站 | 91人妻天天操天天干 | 骚虎最新网站 | 开心色播久久久 | 美女肏逼视频免费看黄色 | 美女插逼 | 欧美日韩国产免费观看成人片 | 在线观看的毛片网站 | 大香蕉中文在线 | 日本成人黄色 | 欧美午夜成人性爱网站 | 青娱乐自拍极品92 | 特级大胆西西4444人体 | 北条麻妃av中文 北条麻妃无码专区 | 人人妻人人操人人爽 | 天天色色插插综合视频 | sm调教网站 | 亲亲羞羞色色 | 久久精品国产亚洲AV无码偷窥 | 大陆成人一区 | 日韩乱伦中字 | 夜夜嗨成人 | 男女免费操逼视频 | 婷婷丁香激情五月天 | 大鸡巴久久久久久久久久久 | 91不该看的视频你懂的 | 五月天婷婷国产 | 亚洲乱伦一区二区三区 | 欧美尤物性爱 | 色五月婷婷色 | 69性爱网| 翔田千里vs黑人播放 | 欧美a一级 | 欧美视频区 | 黄色电影视频网址 | 视频站欧美日韩 | 中文字幕一色哟哟 | 亚洲综合在线激情 | 日韩精品人妻无码 | 欧美A片在线观看 | 无码精品一区二区三区四区五区六区 | 成人精品免费 | 九九婷婷| 国产精品无码白浆高潮 | 暴操美女视频网站 | 人妻斩蜜桃视频网站 | 骚婷婷在线观看 | 五月婷导航 | 第四色婷婷五月天 | 午夜激情成人网 | 加勒比在线精品视频 | 亚洲成人电影三区 | 秋霞视频网| 四虎91| 蜜芽AV久久| 久久久久99精品欧美成人 | 国产v亚洲v日韩v欧美v天堂V | 无码_免费在线视频网站入口_第1页 | 韩国不卡视频 | 欧美操逼视频免费观看 | 青青草超碰在线观看 | 91水蜜桃| 成人精品18 | 久久青青草在线视频 | 黄在线免费观看 | 国产成人精品无码 | A片免费观看在线 | 欧美中文日韩 | 青青草视频黄 | 欧美成人无码一级A片蜜芽 | 欧美精品性爱 | 青青操青青摸 | 亚洲俺去了 | 大香蕉久久久久久成人草 | 久久成人电 | 大鸡八乱伦 | 日本高清久久 | 天天爱天天射天天爽 | 日本大片免费观看18勿进 | 午夜成人一区二区三区影院在线 | 日韩少妇网 | 极品少妇被猛得白浆直流草莓视频 | 可以免费看的黄色视频网站 | 欧洲成人在线 | 操熟女91 | 校花被日视频网站 | 淫色在线观看视频 | 久久艹国产 | 秋霞无码一区二区三区 | 欧美日韩一区二区A片综合 | swagArielbb在线播放 | 免费肏逼视频 | 一级爱爱免费看 | 日曰日天天日 | 国产精品色哟哟哟 | 亚洲性天堂| 一本高清无码 | 婷婷五月天精品 | 一级二级麻豆视频 | 西西人体WW大胆无码 | 亚洲在线观看网站 | 国产一二三在线观看 | 欧美亚洲日韩中文在线 | 久久精品视频免费看 | 久久久久久AV少妇 | 欧洲一区二区在线 | www.在线看黄 | 艹艹艹视频| 嫩草乱码一区三区四区 | 亚洲色欲av | 久0久干| 国产福利视屏 | 人人摸人人操人人爱 | 国外操逼视频在现 | 成人红色三级片网站 | 久九九久频精品短视频 | 无码人妻丰满熟妇区蜜桃 | 久久r这里只有精品 | 久热国产在线观看 | 性交动态图黄色视频在线观看 | 四虎最新地址 | 日屄的视频 | 久草中文网 | 亚洲无码不卡手机免费观看 | 久久婷婷丁香五月 | 一级电影网 | 在线免费看黄片网站 | 色五月婷婷亚洲 | 日韩一级视频网站 | 国产色情在线 | 中文字幕有码无码人妻aV蜜桃 | 国产激情视频手机在线 | 美女网站全黄 | 狠狠操 五月天 | 在线国产精品免费福利 | www.jingpin | 全部免费黄色视频 | 亚洲区成人777777精品 | 水蜜桃一曲二区 | 手机青青草视频 | 中文字幕在线观看不卡 | 一二三无码 | 青青草视频分类在线 | 欧美在线www | 国产精品伦子伦露脸 | 高清国产AV | 余亚洲成人AV片 | 在线天堂中文在线资源网 | 亚洲污片 | 国产福利在线播放 | 日韩黄色一级电影 | 小早川怜子无码 | 成人久久久电影 | 欧美成人福利 | 亚洲精品视频免费看 | 日日撸色丁香五月 | 婷婷免费 | 翔田千里无码乱伦 | 色婷在线视频 | 日本内射在线 | 最新中文字幕MV第三季歌词完整版 | 好想操骚逼无码视频 | 久草中文在线视频 | 无码高清一卡二卡免费视频 | 三级啪啪视频 | 久久久成人精品视频 | 影音先锋资源av 尤物视频最新网址 | 色色男人天堂 | 大香蕉伊人综合网 | 99热高清在线观看 | 波多野结衣中文字幕一区 | 欧美性爱内射 | 青青草视频日韩视频在线 | 免费黄色视屏 | 黄色免费一级 | 亚洲AV成人精品日韩一区麻豆 | 日韩操逼黄片 | 欧美精品一区二区三区主播视频 | 中文字幕av在线 成人黄色视频网站 | 人人爱人人操人人摸 | 俺也去五月婷婷 | 国产第一页在线 | 91欧美亚洲 | 欧美性爱播放 | 亚洲一卡二卡精品 | 色天堂网站 | 亚洲无码在线直播 | 午夜精品久久99热蜜桃剧情介绍 | 免费A片网址 | 日日夜夜久久视频久久视频 | 91四虎影院在线 | 亚洲午夜视频在线观看 | 天天弄AV | 操逼逼网站 | 最新成人美女视频 | 狠狠撸狠狠操 | 水多多精品视频 | 欧美成人网站在线 | 九九九九在线视频 | 97九色| 一级黄色片。 | 三级网站在线观看视频 | 黄色一级免费片 | 哪里有免费的国产在线黄色电影 | 欧美特级aaa | 国产传媒-第1页-MM606-萌萌视频 | 欧美日韩国产在线观看 | 日韩激情在线观看 | 亚洲国产高清视频 | 精品91视频 | 成人超碰| 亚洲免费观看在线观看 | 成人日皮精品视频 | 日韩毛片在线 | 在线免费观看成人网站 | 优希麻琴无码一区二区三区 | 亚洲色图成人网站 | 婷婷色女| SWAG国产精品一区二区 | 黄色电影一级网站 | 天天天天日夜夜夜草 | 亚洲日本视频在线播放 | 日本一级免费视频 | 欧美性爱亚洲 | 久热思思| 日韩第一无码 | 一级黄在线看看 | 黄色视频网站在线 | 青草九九在线观看视频 | 日韩专区中文字幕 | 色人人。色人人综合 | 老司机午夜视频 | 又黄又爽免费网站 | aaa在线免费观看 | 福利在线观看中文字幕 | 在线播放东京热一n1154 | 人成视频在线观看 | 中文字幕黄色 | 男女高清无码 | 国产精品国产成人国产三级 | 亚洲天码33 | 黄色毛片学生妹免费看视频 | 区一区二免费视频 | 久久精品内射国产 | 亚洲视频在线免费观看 | 日韩高清无码一区 | 国产成人+综合亚洲+天堂 | 日韩欧美中文字幕视频 | 免费亚洲视频在线观看 | 黄色做爱日本动漫网站 | 大香蕉伊人网片 | 免费的成人网站在线观看 | 人人干人人看人人摸 | xxxx.亚洲成人 | 黄色成人免费网站 | 国模操逼 | 豆花无码| 国产有码视频 | 91北条麻妃二区 | 国产色婷婷综合 | av片在线观看 | 国产在线第一页 | 黄色十八禁网站 | 超碰中文字幕在线 | 久久综合se婷婷 | 欧美性猛交ⅩXXX无码视频 | 色综合视频网 | 亚洲仺aa在线 | 国产suv精品一区二区6 | 超碰中文在线字幕 | 亚洲性爱AV网站 | 成年人视频免费看 | 暴肏美女视频在线观看 | 大香操逼网 | 在线求操 | 欧美日韩男男 | 91aaa在线观看 | 99爱精品视频在线观看 | 在线视频免费播放 | 水蜜桃网站视频 | 东京热AV无码国产东京热AⅤ | 在线能看的丝袜网站 | 大香蕉99在线视频 | 久久性爰视频 | 亚洲成人网站在线看 | 国内亚洲欧美精品九九九久久免费 | 久操视频在线观看 | 超碰97免费在线 | 国产又粗又大又黄视频 | 青青欧美,青青美女视频 | 日韩黄色在线观看视频 | 99精品6| 黄色一级在线观看 | 中国黄色天堂 | 成人拍拍视频 | 免费成人黄色片 | 色丁香视频在线观看的 | 四虎成人免费毛片在线 | 久热精品在线观看视频 | 一级操逼网站 | 一区二区三区精品无码 | 免费转av的网站 免费做爱视频动漫 | 变态另类成人AV一区二区 | 天天干亚洲 | 黄色片免费播放 | 夜精品无码A片一区二区蜜桃 | 狠狠人妻久久久久久综合99浪潮 | 插逼网址 | 另类一区二区 | 久久人妻无码毛片A片麻豆 | 亚洲丁香 | 亚洲 码AV波多野 | 五月天激情成人网 | 超碰人人人 | 丁香五月激情综合婷婷 | 婷婷五月天综合久久 | 苍井空电影一区二区三区 | 国产第一页草草 | 色狂c熟妇中国日本 | 色婷婷AV在线 | 日日摸日日| 操大骚逼视频 | 天天日天天肏 | 91精品综合久久久久久五月天 | 91麻豆精品国产91久久久资源速度 | 国产av午夜福利 国产操逼免费视频 | 影音先锋成人影视 | 欧美成人网站在线观看视频 | 免费一级特黄特色黄录像 | 留学生苏琪和外国男友第二季 | 热热影院 | 一级片黄色 | 久久丝袜足交 | 九九精品视频在线播放 | 日韩99 | 亚洲天堂AV网 | 人人上人人摸 | 久久天堂网 | 欧美大吊免费看视频 | 后入美女视频 | 日韩人妻视频 | 黑人操亚洲人 | www.婷婷五月天 | 性生交大片免费看A片苹果 | 丝袜乱伦超碰 | 日韩18禁网站 | 超碰在线青娱乐 | AV2014天堂网 | 国产一区二区三区四区视频 | 大香蕉伊人电影网 | 77777亚洲和欧洲 | 俺去啦俺去也www官网 | 91精品秘 一区二区三区 | jizz中国成熟丰满女人 | 欧美成人影视在线 | 久久久蜜桃 | 中文日逼| 操逼操逼操逼操逼操逼操逼操逼操 | 波多野结衣亚洲一区 | 国产干逼视频 | 天天射天天射天天要 | 国产精品久久毛片A片 | 18 精品 爽 视频 | 五月丁香在线 | 人妻夜夜爽天天爽麻豆三区视频 | 国产原创AV在线播放 | 18成人网站在线观看 | 99精品视频99 | 免费直接观看黄色网页 | 亚洲成人网站上 | www.久| 亚洲在线| 四季AV之日韩人妻无码 | 91中文字幕在线 | 逼逼逼逼五月情 | 中文在线字幕 | 国产成人无码A片免费看玄火 | 4438久久| 日本网站在线播放 | 亚洲无码在线免费观看视频 | 在线视频麻豆 | 国产三级理论在线观看 | 在线求操| 国产一级a毛一级a | 黄色国产片区免费 | 天天射天天操天天日 | 超碰国产97 | 人人干人人操人人摸 | 一级黄色录像带 | 亚洲综合娱乐视频播放 | 久久免费黄色视频 | 精品A片九九九九免费视频 | h片在线免费观看视频 | 婷婷美女五月天亚洲综合网 | 欧美十日本十国产 | 波多野结衣一二三区乱码 | 日韩精品首页 | 青青草在线激情视频 | 免费黄色成人视频网站在线观看 | 欧美高清无码在线观看 | 日本成人在线午夜影院 | 日本大乳高潮视频在线观看 | 99热国产| 黄色精品| 天天操屄天天日 | 在线国产中文字幕 | 亚洲一二三区电影在线 | 久久夜色精品国产噜噜 | 日本最新三级理论无码电影 | 国产精品77777 | 欧洲久久电影 | 国产无码免费在线 | 国产深喉视频 | 日韩精品久久久久 | 大香蕉大香蕉大香蕉 | 青青草先锋资源 | 成人性生活无码视频 | 欧洲一区在线观看 | 99re3 | 在线免费看黄色 | 国产精品伦理久久久久 | 亚洲成人综合在线 | 亚洲一页| 先锋影音三区四区 | 亚洲无码一级 | 日本精品视频在线播放 | 好屌日在线视频 | 99欧美精品在线观看 | 人妻黄色 | 欧美成人免费观看 | 日韩精品久久 | 三级草逼| 激情乱伦网站 | 精品久久久无码人妻中文字幕边打 | AV天堂电影网 | 久草视频2 | AV55 | 免费高清AV在线看 | 中文字幕AV在线观看 | www,俺也去婷婷官网 | 小泬BBBBBB免费看 | 日本AAAA片毛片免费观蜜桃 | www.毛片av | 亚洲中文字幕av 大香蕉性爱视频 | 日韩男女操逼视频 | 九一精品在线观看 | 天天插天天爽 | 日逼丁香 | 爱久在线视频91 | 怡红院毛片 | 亚洲天堂第一页 | 成人AV一区二区三区四区 | 五月天婷婷在线视频 | 国产中文久久大香蕉 | 中文字幕18页 | 在线高清无码观看 | av77777 | 北条麻妃日韩无码 | 熟女网址 | 亚洲成人在线播放 | 香蕉操逼网 | 日韩毛片在线视频x | 黄色片亚洲 | 竹菊视频一区二区三区 | 国产专区在线播放 | 四虎性爱网站 | 青娱视频日韩精品 | 中文字字幕在线中 | 亚洲日韩人兽在线 | 奇米影视7777狠狠狠狠视频 | 国产精品无码一区二区三区免费 | 日韩精品一区二区三区无码AV | 亚洲做爱| 免费一级无码婬片A片久久老年性 | 免费爱爱视频 | 操老女人视频在线观看 | 无码视频在线观看免费 | 日韩无码性爱黄色电影播放 | 真人一级黄色片 | 丁香五月天.激情视频 | 无码精品一区二区在线 | 国产在线蜜臀 | 亚洲色婷婷天天看 | 久久精品福利免费视频 | 中文天堂在线免费观看 | 网站一级片 | 国产一级婬乱片免费 | 偷窥丶亚洲丶熟女 | 久久视频欧美 | 红桃视频成人A片 | 亚洲啪啪网 | 国产一级a爱做片免费看 | 很很操在线观看 | 日本黄色一级 | 亚洲福利视频在线 | 日韩毛片在线播放 | 日韩欧美中文在线无线码视频在线看免费版 | 美国五月天中文网 | 五月激情偷拍网 | 大鸡巴免费视频 | 一本色道无码道dⅴd在线录音 | 香蕉视频天在家蕉视频天在家 | 一区二区三区视屏 | 激情视频久久 | 日韩无码乱伦网站 | 天天天干夜夜夜操 | 成人免费看豆花视频 | 97五月天婷婷 | 亚洲视频在线免费播放 | 国产小说一区二区三区 | 欧美黑人性爽 | 99热官网 | 日韩高清在线 | 第一狼人综合网 | 99免费热视频在线 | 先锋av资源在线 先锋影音成人在线 | 亚洲成人av在线观看 | 操逼网站在线观看 | 狠狠地操| 成人性毛片 | 欧美先锋资源 | 久久伊人在 | 久久久久无码精品国产H动漫猫咪 | 男女无遮无挡一区二区爱豆视频 | 国产精成人品麻豆 | 日本黄色电影在线观看 | 久草手机在线播放 | A级免费视频 | 亚洲精品字幕 | 五月丁香六月婷婷久久 | 欧美狂操 | 婷婷亚洲五月天 | 久久无码鲁丝片午夜精品 | 色天天色 | 操逼电影中文字幕 | 成人性别视频影音先锋电影 | 青娱乐国产盛宴 | 亚洲欧洲视频网站 | 日韩黄页| 美女av免费网站 美女被操91视频 美女被操视频91 美女被艹视频网站 | 豆花无码成人免费视频 | 麻豆视频md0117 | 天堂一区二区三区18在线观看 | 自拍偷拍15p | 韩国一级一级免费 | 天天干天天干天天操 | 逼色网站亚洲 | 超碰1234| 色综合天 | 午夜寂寞院| 亚洲日韩三级片 | 日本无码色情三级播放免费看电影 | 中文字幕无码Av在线看 | 久久精品视频在线观看 | 欧美一区二区成人电影 | 久久久久99精品成人片欧美一区 | 竹菊影视一区二区三区四区 | 欧美另类欧美另类欧美另类 | 丁香五月天狠狠操 | 骚逼影院′ | 啪啪日本视频网站 | 99精品国产麻豆99久久久久久 | 久久久一区二区三区 | 国产精品v欧美精品v日韩 | 苍井空一级婬片A片免费观看 | 超碰最新免费在线 | 在线观看麻豆免费视频 | 一本一本久久a久久精品牛牛 | 成人性爱在线直播 | 婷婷撸一撸 | 成人影视久久久无码三区 | 91无码成人视频 | 久久噜噜噜久久熟女-久久久噜噜噜 | 无码蜜桃| 黄色景苑久久久 | 人人操在线| 国产一卡二卡在线观看 | 国产精品偷拍 | 国产精品一二三级 | 91免费高清视频 | 一级视频在线观看免费 | 成人黄片免费视频 | 欧美亚洲日本韩国高清色图 | 国产XXXX少 | 亚洲日韩国产剧情自制在线观看 | igao视频在线 | 天天日狠狠操 | 国产六区色婷婷 | 大香蕉美女啪啪啪视频 | 日韩99 | 亚洲人成色777777精品音频 | 欧美V∧ | 用力艹骚逼 | 北条麻纪 无码 在线 视频 | 久久成人导航 | 久久夜色精品国产嚕嚕亚洲AV | 手机看片人妻 | 免费高清无码在线观看 | 日韩爱爱电影视频 | 国产免费黄色视频网站 | 欧美亚洲国产一区导航 | 日本在线视频一区二区三区 | 苍井空和黑人最猛一次 | 看的片a黄 | 日本欧美色| 奇米精品一区二区三区四区 | 自拍啪啪免费 | 亚洲一区二区免费 | 日韩女同性爱一区二区三区四区五区 | 青青草成人免费观看 | 国产一级a一片成人AV | 黄色AV免费观看 | 国产精品青青草原 | 豆花无码成人免费视频 | www色老板 | 草久大香蕉啪啪91视频 | 中文字幕+乱码+中文字幕17c | 神马午夜福利 | 噜噜噜久久久噜噜 国产 | 黑人借宿与人妻羽月希 | 自拍做爱视频 | 91视频久久久久久久久久久久 | 日韩性爱一区 | 欧美aaa在线 | 亚洲色无码专区观看在线观 | 秋霞午夜视频 | 久久一区 | 国产高清视频在线播放 | 大香蕉尹人在线观看 | 狼人综合久久网 | 日韩一二区 | 69成人精品视频 | 免费观看的黄色视频 | 麻豆做爱| 自拍偷拍网址 | 国产伦理成人网先锋影音 | 99无码国产成人精品视频 | 翔田千里熟妇息孑交尾 | 18禁成人h网站 | 青草视频男人的天堂 | 免费的18禁的又黄又涩的网站 | 手机看片国产 | 日韩免费黄色AⅤ电影 | 色欧美片视频在线观看专区 | 激情丁香五月 | 国产豆花视频在线 | 国产青春草在线观看 | 日韩精品18 | 成人欧美A | 婷婷五月天色色色 | 久久精品成人电影 | 熟女人妻精品 | 综合狠狠| 操高中生到高潮在线观看免费 | 高清国产一卡二卡三卡四卡免费 | 国产免费一区二区三区四区午夜视频 | 动漫摸无码视频 | 日本网站在线 | 亚洲色大成 | 欧美成人精品激情在线观看 | 亚洲精品第一页 | 欧美精品一二三区 | www黄色网址 | 一级A级片电影国产国产国产国产国产 | AV中文在线观看 | 亚洲黄色电影怎么 | 一区二区三区久久久 | 韩国在线免费观看日ccc | 无码高清18 | 国产视频1区2区 | 无码一区二区三区四区五区 | 欧美不卡视频 | 颜射电影一区网 | 老司机午夜影院 | 超碰97av人人操人人摸 | 中文字幕一区二区三区在线观看 | 在线观看黄日本免费 | 欧美黄色片在线观看 | 五月天婷婷综合网 | 国产日韩一级片 | 青青草性爱视频 | 麻豆视频观看免费 | 男人的天堂黄片 | 国产成人免费观看视频 | 色婷婷国产综合 | 成人在线2 | 大鳮巴久久久久久久久 | 久久成人大香蕉 | 国产女人高潮了视频 | 亚洲小骚逼| 六月婷婷久久 | 日皮视频在线观看免费高清网站 | 国产毛片毛片毛片操逼视频 | 蜜乳一区二区三区精品 | 一级性视频| 91影音成人网 | 99久草热 | 在线免费高清无码 | 久草久热精品视频 | 加勒比久久综合 | 大香蕉国产视频播放 | 欧美精品xxx | 国产人伦子伦一级A片下载 | 无码骚逼 | 手机免费在线观看AV网站 | 俺去啦俺去也 | 国产又粗又大视频 | 琪琪午夜成人久久电影网 | 操逼抠逼 | 亚洲成人福利 | 好屌视频一区二区三区 | 九九九九九九九九九九九精品 | 国内一级A片 | 中文字幕一区二区三区免费2023 | 欧美大香蕉中文 | 国产日在线 | 国产精品三级毛片 | 美女草逼视频 | 乱伦激情综合网 | 大香蕉性爱网 | 最新黄色成人网站 | 91天天综合 | 学生妹看毛片 | 大香蕉精品在线 | 欧美视频手机在线 | 夜夜骚av.一区二区三区 | 国产探花视频在线观看 | 亚洲视频欧美视频 | 在线观看的A片 | 在线免费av观看 在线免费精品福利 | 成人综合大香蕉 | 推荐中文字幕无码专区 | 久久久久久久久久免费 |