<address id="fjh72"></address>

<dfn id="fjh72"><button id="fjh72"></button></dfn>

        <dfn id="fjh72"></dfn>

        Previous Page TOC Next Page



        — 2 —
        TCP/IP and the Internet


        Before proceeding into a considerable amount of detail about TCP/IP, the Internet, and the Internet Protocol (IP), it is worthwhile to try to complete a quick outline of TCP/IP. Then, as the details of each protocol are discussed individually, they can be placed in the broader outline more easily, thereby leading to a more complete understanding in the next two chapters.

        Just what is TCP/IP? As you saw on Day 1, it is a software-based communications protocol used in networking. Although the name TCP/IP implies that the entire scope of the product is a combination of two protocols—Transmission Control Protocol and Internet Protocol—the term TCP/IP refers not to a single entity combining two protocols, but a larger set of software programs that provides network services such as remote logins, remote file transfers, and electronic mail. TCP/IP provides a method for transferring information from one machine to another. A communications protocol should handle errors in transmission, manage the routing and delivery of data, and control the actual transmission by the use of predetermined status signals. TCP/IP accomplishes all of this.



        TCP/IP is not a single product. It is a catch-all name for a family of protocols that use a similar behavior. Using the term TCP/IP usually refers to one or more protocols within the family, not just TCP and IP.

        In the first chapter, you saw that the OSI Reference Model is composed of seven layers. TCP/IP was designed with layers as well, although they do not correspond one-to-one with the OSI-RM layers. You can overlay the TCP/IP programs on this model to give you a rough idea of where all the TCP/IP layers reside. I do that in a little more detail later in this chapter. Before that, I take a quick look at the TCP/IP protocols and how they relate to each other, and show a rough mapping to the OSI layers.

        Figure 2.1 shows the basic elements of the TCP/IP family of protocols. You can see that TCP/IP is not involved in the bottom two layers of the OSI model (data link and physical) but begins in the network layer, where the Internet Protocol (IP) resides. In the transport layer, the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are involved. Above this, the utilities and protocols that make up the rest of the TCP/IP suite are built using the TCP or UDP and IP layers for their communications system.

        Figure 2.1. TCP/IP suite and OSI layers.

        Figure 2.1 shows that some of the upper-layer protocols depend on TCP (such as Telnet and FTP), whereas some depend on UDP (such as TFTP and RPC). Most upper-layer TCP/IP protocols use only one of the two transport protocols (TCP or UDP), although a few, including DNS (Domain Name System) can use both.

        A note of caution about TCP/IP: Despite the fact that TCP/IP is an open protocol, many companies have modified it for their own networking system. There can be incompatibilities because of these modifications, which, even though they might adhere to the official standards, might have other aspects that cause problems. Luckily, these types of changes are not rampant, but you should be careful when choosing a TCP/IP product to ensure its compatibility with existing software and hardware.

        TCP/IP is dependent on the concept of clients and servers. This has nothing to do with a file server being accessed by a diskless workstation or PC. The term client/server has a simple meaning in TCP/IP: any device that initiates communications is the client, and the device that answers is the server. The server is responding to (serving) the client's requests.

        A Quick Overview of TCP/IP Components


        To understand the roles of the many components of the TCP/IP protocol family, it is useful to know what you can do over a TCP/IP network. Then, once the applications are understood, the protocols that make it possible are a little easier to comprehend. The following list is not exhaustive but mentions the primary user applications that TCP/IP provides.

        Telnet


        The Telnet program provides a remote login capability. This lets a user on one machine log onto another machine and act as though he or she were directly in front of the second machine. The connection can be anywhere on the local network or on another network anywhere in the world, as long as the user has permission to log onto the remote system.

        You can use Telnet when you need to perform actions on a machine across the country. This isn't often done except in a LAN or WAN context, but a few systems accessible through the Internet allow Telnet sessions while users play around with a new application or operating system.

        File Transfer Protocol


        File Transfer Protocol (FTP) enables a file on one system to be copied to another system. The user doesn't actually log in as a full user to the machine he or she wants to access, as with Telnet, but instead uses the FTP program to enable access. Again, the correct permissions are necessary to provide access to the files.

        Once the connection to a remote machine has been established, FTP enables you to copy one or more files to your machine. (The term transfer implies that the file is moved from one system to another but the original is not affected. Files are copied.) FTP is a widely used service on the Internet, as well as on many large LANs and WANs.

        Simple Mail Transfer Protocol


        Simple Mail Transfer Protocol (SMTP) is used for transferring electronic mail. SMTP is completely transparent to the user. Behind the scenes, SMTP connects to remote machines and transfers mail messages much like FTP transfers files. Users are almost never aware of SMTP working, and few system administrators have to bother with it. SMTP is a mostly trouble-free protocol and is in very wide use.

        Kerberos


        Kerberos is a widely supported security protocol. Kerberos uses a special application called an authentication server to validate passwords and encryption schemes. Kerberos is one of the more secure encryption systems used in communications and is quite common in UNIX.

        Domain Name System


        Domain Name System (DNS) enables a computer with a common name to be converted to a special network address. For example, a PC called Darkstar cannot be accessed by another machine on the same network (or any other connected network) unless some method of checking the local machine name and replacing the name with the machine's hardware address is available. DNS provides a conversion from the common local name to the unique physical address of the device's network connection.

        Simple Network Management Protocol


        Simple Network Management Protocol (SNMP) provides status messages and problem reports across a network to an administrator. SNMP uses User Datagram Protocol (UDP) as a transport mechanism. SNMP employs slightly different terms from TCP/IP, working with managers and agents instead of clients and servers (although they mean essentially the same thing). An agent provides information about a device, whereas a manager communicates across a network with agents.

        Network File System


        Network File System (NFS) is a set of protocols developed by Sun Microsystems to enable multiple machines to access each other's directories transparently. They accomplish this by using a distributed file system scheme. NFS systems are common in large corporate environments, especially those that use UNIX workstations.

        Remote Procedure Call


        The Remote Procedure Call (RPC) protocol is a set of functions that enable an application to communicate with another machine (the server). It provides for programming functions, return codes, and predefined variables to support distributed computing.

        Trivial File Transfer Protocol


        Trivial File Transfer Protocol (TFTP) is a very simple, unsophisticated file transfer protocol that lacks security. It uses UDP as a transport. TFTP performs the same task as FTP, but uses a different transport protocol.

        Transmission Control Protocol


        Transmission Control Protocol (the TCP part of TCP/IP) is a communications protocol that provides reliable transfer of data. It is responsible for assembling data passed from higher-layer applications into standard packets and ensuring that the data is transferred correctly.

        User Datagram Protocol


        User Datagram Protocol (UDP) is a connectionless-oriented protocol, meaning that it does not provide for the retransmission of datagrams (unlike TCP, which is connection-oriented). UDP is not very reliable, but it does have specialized purposes. If the applications that use UDP have reliability checking built into them, the shortcomings of UDP are overcome.

        Internet Protocol


        Internet Protocol (IP) is responsible for moving the packets of data assembled by either TCP or UDP across networks. It uses a set of unique addresses for every device on the network to determine routing and destinations.

        Internet Control Message Protocol


        Internet Control Message Protocol (ICMP) is responsible for checking and generating messages on the status of devices on a network. It can be used to inform other devices of a failure in one particular machine. ICMP and IP usually work together.

        TCP/IP History


        The architecture of TCP/IP is often called the Internet architecture because TCP/IP and the Internet as so closely interwoven. In the last chapter, you saw how the Internet standards were developed by the Defense Advanced Research Projects Agency (DARPA) and eventually passed on to the Internet Society.

        The Internet was originally proposed by the precursor of DARPA, called the Advanced Research Projects Agency (ARPA), as a method of testing the viability of packet-switching networks. (When ARPA's focus became military in nature, the name was changed.) During its tenure with the project, ARPA foresaw a network of leased lines connected by switching nodes. The network was called ARPANET, and the switching nodes were called Internet Message Processors, or IMPs.

        The ARPANET was initially to be comprised of four IMPs located at the University of California at Los Angeles, the University of California at Santa Barbara, the Stanford Research Institute, and the University of Utah. The original IMPs were to be Honeywell 316 minicomputers.

        The contract for the installation of the network was won by Bolt, Beranek, and Newman (BBN), a company that had a strong influence on the development of the network in the following years. The contract was awarded in late 1968, followed by testing and refinement over the next five years.



        Bolt, Beranek, and Newman (BBN) made many suggestions for the improvement of the Internet and the development of TCP/IP, for which their names are often associated with the protocol.

        In 1971, ARPANET entered into regular service. Machines used the ARPANET by connecting to an IMP using the "1822" protocol—so called because that was the number of the technical paper describing the system. During the early years, the purpose and utility of the network was widely (and sometimes heatedly) discussed, leading to refinements and modifications as users requested more functionality from the system.

        A commonly recognized need was the capability to transfer files from one machine to another, as well as the capability to support remote logins. Remote logins would enable a user in Santa Barbara to connect to a machine in Los Angeles over the network and function as though he or she were in front of the UCLA machine. The protocol then in use on the network wasn't capable of handling these new functionality requests, so new protocols were continually developed, refined, and tested.

        Remote login and remote file transfer were finally implemented in a protocol called the Network Control Program (NCP). Later, electronic mail was added through File Transfer Protocol (FTP). Together with NCP's remote logins and file transfer, this formed the basic services for ARPANET.

        By 1973, it was clear that NCP was unable to handle the volume of traffic and proposed new functionality. A project was begun to develop a new protocol. The TCP/IP and gateway architectures were first proposed in 1974. The published article by Cerf and Kahn described a system that provided a standardized application protocol that also used end-to-end acknowledgments.

        Neither of these concepts were really novel at the time, but more importantly (and with considerable vision), Cerf and Kahn suggested that the new protocol be independent of the underlying network and computer hardware. Also, they proposed universal connectivity throughout the network. These two ideas were radical in a world of proprietary hardware and software, because they would enable any kind of platform to participate in the network. The protocol was developed and became known as TCP/IP.

        A series of RFCs (Requests for Comment, part of the process for adopting new Internet Standards) was issued in 1981, standardizing TCP/IP version 4 for the ARPANET. In 1982, TCP/IP supplanted NCP as the dominant protocol of the growing network, which was now connecting machines across the continent. It is estimated that a new computer was connected to ARPANET every 20 days during its first decade. (That might not seem like much compared to the current estimate of the Internet's size doubling every year, but in the early 1980s it was a phenomenal growth rate.)

        During the development of ARPANET, it became obvious that nonmilitary researchers could use the network to their advantage, enabling faster communication of ideas as well as faster physical data transfer. A proposal to the National Science Foundation lead to funding for the Computer Science Network in 1981, joining the military with educational and research institutes to refine the network. This led to the splitting of the network into two different networks in 1984. MILNET was dedicated to unclassified military traffic, whereas ARPANET was left for research and other nonmilitary purposes.

        ARPANET's growth and subsequent demise came with the approval for the Office of Advanced Scientific Computing to develop wide access to supercomputers. They created NSFNET to connect six supercomputers spread across the country through T-1 lines (which operated at 1.544 Mbps). The Department of Defense finally declared ARPANET obsolete in 1990, when it was officially dismantled.

        Berkeley UNIX Implementations and TCP/IP


        TCP/IP became important when the Department of Defense started including the protocols as military standards, which were required for many contracts. TCP/IP became popular primarily because of the work done at UCB (Berkeley). UCB had been a center of UNIX development for years, but in 1983 they released a new version that incorporated TCP/IP as an integral element. That version—4.2BSD (Berkeley System Distribution)—was made available to the world as public domain software.

        The popularity of 4.2BSD spurred the popularity of TCP/IP, especially as more sites connected to the growing ARPANET. Berkeley released an enhanced version (which included the so-called Berkeley Utilities) in 1986 as 4.3BSD. An optimized TCP implementation followed in 1988 (4.3BSD/Tahoe). Practically every version of TCP/IP available today has its roots (and much of its code) in the Berkeley versions.



        Despite the demise of Berkeley Software Distribution's UNIX version in 1993, the BSD and UCB developments are integral parts of TCP/IP and continue to be used as part of the protocol family's naming system.


        OSI and TCP/IP


        The adoption of TCP/IP didn't conflict with the OSI standards because the two developed concurrently. In some ways, TCP/IP contributed to OSI, and vice-versa. Several important differences do exist, though, which arise from the basic requirements of TCP/IP which are:

        The differences between the OSI architecture and that of TCP/IP relate to the layers above the transport level and those at the network level. OSI has both the session layer and the presentation layer, whereas TCP/IP combines both into an application layer. The requirement for a connectionless protocol also required TCP/IP to combine OSI's physical layer and data link layer into a network level. TCP/IP also includes the session and presentation layers of the OSI model into TCP/IP’s application layer. A schematic view of TCP/IP's layered structure compared with OSI's seven-layer model is shown in Figure 2.2. TCP/IP calls the different network level elements subnetworks.

        Figure 2.2. The OSI and TCP/IP layered structures.



        OSI and TCP/IP are not incompatible, but neither are they perfectly compatible. They both have a layered architecture, but the OSI architecture is much more rigorously defined, and the layers are more independent than TCP/IP's.

        Some fuss was made about the network level combination, although it soon became obvious that the argument was academic, as most implementations of the OSI model combined the physical and link levels on an intelligent controller (such as a network card). The combination of the two layers into a single layer had one major benefit: it enabled a subnetwork to be designed that was independent of any network protocols, because TCP/IP was oblivious to the details. This enabled proprietary, self-contained networks to implement the TCP/IP protocols for connectivity outside their closed systems.

        The layered approach gave rise to the name TCP/IP. The transport layer uses the Transmission Control Protocol (TCP) or one of several variants, such as the User Datagram Protocol (UDP). (There are other protocols in use, but TCP and UDP are the most common.) There is, however, only one protocol for the network level—the Internet Protocol (IP). This is what assures the system of universal connectivity, one of the primary design goals.

        There is a considerable amount of pressure from the user community to abandon the OSI model (and any future communications protocols developed that conform to it) in favor of TCP/IP. The argument hinges on some obvious reasons:

        Arguing rather strenuously against TCP/IP, surprisingly enough, is the US government—the very body that sponsored it in the first place. Their primary argument is that TCP/IP is not an internationally adopted standard, whereas OSI has that recognition. The Department of Defense has even begun to move its systems away from the TCP/IP protocol set. A compromise will probably result, with some aspects of OSI adopted into the still-evolving TCP/IP protocol suite.

        TCP/IP and Ethernet


        For many people the terms TCP/IP and Ethernet go together almost automatically, primarily for historical reasons, as well as the simple fact that there are more Ethernet-based TCP/IP networks than any other type. Ethernet was originally developed at Xerox's Palo Alto Research Center as a step toward an electronic office communications system, and it has since grown in capability and popularity.

        Ethernet is a hardware system providing for the data link and physical layers of the OSI model. As part of the Ethernet standards, issues such as cable type and broadcast speeds are established. There are several different versions of Ethernet, each with a different data transfer rate. The most common is Ethernet version 2, also called 10Base5, Thick Ethernet, and IEEE 802.3 (after the number of the standard that defines the system adopted by the Institute of Electrical and Electronic Engineers). This system has a 10 Mbps rate.

        There are several commonly used variants of Ethernet, such as Thin Ethernet (called 10Base2), which can operate over thinner cable (such as the coaxial cable used in cable television systems), and Twisted-Pair Ethernet (10BaseT), which uses simple twisted-pair wires similar to telephone cable. The latter variant is popular for small companies because it is inexpensive, easy to wire, and has no strict requirements for distance between machines.



        It is usually easy to tell which type of Ethernet network is being used by checking the connector to a network card. If it has a telephone-style plug, it is 10BaseT. The cable for 10BaseT looks the same as telephone cable. If the network has a D-shaped connector with many pins in it, it is 10Base5. A 10Base2 network has a connector similar to a cable TV coaxial connector, except it locks into place. The 10Base2 connector is always circular.

        The size of a network is also a good indicator. 10Base5 is used in large networks with many devices and long transmission runs. 10Base2 is used in smaller networks, usually with all the network devices in fairly close proximity. Twisted-pair (10BaseT) networks are often used for very small networks with a maximum of a few dozen devices in close proximity.


        Ethernet and TCP/IP work well together, with Ethernet providing the physical cabling (layers one and two) and TCP/IP the communications protocol (layers three and four) that is broadcast over the cable. The two have their own processes for packaging information: TCP/IP uses 32-bit addresses, whereas Ethernet uses a 48-bit scheme. The two work together, however, because of one component of TCP/IP called the Address Resolution Protocol (ARP), which converts between the two schemes. (I discuss ARP in more detail later, in the section titled "Address Resolution Protocol.")

        Ethernet relies on a protocol called Carrier Sense Multiple Access with Collision Detect (CSMA/CD). To simplify the process, a device checks the network cable to see if anything is currently being sent. If it is clear, the device sends its data. If the cable is busy (carrier detect), the device waits for it to clear. If two devices transmit at the same time (a collision), the devices know because of their constant comparison of the cable traffic to the data in the sending buffer. If a collision occurs, the devices wait a random amount of time before trying again.

        The Internet


        As ARPANET grew out of a military-only network to add subnetworks in universities, corporations, and user communities, it became known as the Internet. There is no single network called the Internet, however. The term refers to the collective network of subnetworks. The one thing they all have in common is TCP/IP as a communications protocol.

        As described in the first chapter, the organization of the Internet and adoption of new standards is controlled by the Internet Advisory Board (IAB). Among other things, the IAB coordinates several task forces, including the Internet Engineering Task Force (IETF) and Internet Research Task Force (IRTF). In a nutshell, the IRTF is concerned with ongoing research, whereas the IETF handles the implementation and engineering aspects associated with the Internet.

        A body that has some bearing on the IAB is the Federal Networking Council (FNC), which serves as an intermediary between the IAB and the government. The FNC has an advisory capacity to the IAB and its task forces, as well as the responsibility for managing the government's use of the Internet and other networks. Because the government was responsible for funding the development of the Internet, it retains a considerable amount of control, as well as sponsoring some research and expansion of the Internet.

        The Structure of the Internet


        As mentioned earlier, the Internet is not a single network but a collection of networks that communicate with each other through gateways. For the purposes of this chapter, a gateway (sometimes called a router) is defined as a system that performs relay functions between networks, as shown in Figure 2.3. The different networks connected to each other through gateways are often called subnetworks, because they are a smaller part of the larger overall network. This does not imply that a subnetwork is small or dependent on the larger network. Subnetworks are complete networks, but they are connected through a gateway as a part of a larger internetwork, or in this case the Internet.

        Figure 2.3. Gateways act as relays between subnetworks.

        With TCP/IP, all interconnections between physical networks are through gateways. An important point to remember for use later is that gateways route information packets based on their destination network name, not the destination machine. Gateways are supposed to be completely transparent to the user, which alleviates the gateway from handling user applications (unless the machine that is acting as a gateway is also someone's work machine or a local network server, as is often the case with small networks). Put simply, the gateway's sole task is to receive a Protocol Data Unit (PDU) from either the internetwork or the local network and either route it on to the next gateway or pass it into the local network for routing to the proper user.

        Gateways work with any kind of hardware and operating system, as long as they are designed to communicate with the other gateways they are attached to (which in this case means that it uses TCP/IP). Whether the gateway is leading to a Macintosh network, a set of IBM PCs, or mainframes from a dozen different companies doesn't matter to the gateway or the PDUs it handles.



        There are actually several types of gateways, each performing a difference type of task. I look at the different gateways in more detail on Day 5, "Gateway and Routing Protocols."

        In the United States, the Internet has the NFSNET as its backbone, as shown in Figure 2.4. Among the primary networks connected to the NFSNET are NASA's Space Physics Analysis Network (SPAN), the Computer Science Network (CSNET), and several other networks such as WESTNET and the San Diego Supercomputer Network (SDSCNET), not shown in Figure 2.4. There are also other smaller user-oriented networks such as the Because It's Time Network (BITNET) and UUNET, which provide connectivity through gateways for smaller sites that can't or don't want to establish a direct gateway to the Internet.

        Figure 2.4. The US Internet network.

        The NFSNET backbone is comprised of approximately 3,000 research sites, connected by T-3 leased lines running at 44.736 Megabits per second. Tests are currently underway to increase the operational speed of the backbone to enable more throughput and accommodate the rapidly increasing number of users. Several technologies are being field-tested, including Synchronous Optical Network (SONET), Asynchronous Transfer Mode (ATM), and ANSI's proposed High-Performance Parallel Interface (HPPI). These new systems can produce speeds approaching 1 Gigabit per second.

        The Internet Layers


        Most internetworks, including the Internet, can be thought of as a layered architecture (yes, even more layers!) to simplify understanding. The layer concept helps in the task of developing applications for internetworks. The layering also shows how the different parts of TCP/IP work together. The more logical structure brought about by using a layering process has already been seen in the first chapter for the OSI model, so applying it to the Internet makes sense. Be careful to think of these layers as conceptual only; they are not really physical or software layers as such (unlike the OSI or TCP/IP layers).

        It is convenient to think of the Internet as having four layers. This layered Internet architecture is shown in Figure 2.5. These layers should not be confused with the architecture of each machine, as described in the OSI seven-layer model. Instead, they are a method of seeing how the internetwork, network, TCP/IP, and the individual machines work together. Independent machines reside in the subnetwork layer at the bottom of the architecture, connected together in a local area network (LAN) and referred to as the subnetwork, a term you saw in the last section.

        Figure 2.5. The Internet architecture.

        On top of the subnetwork layer is the internetwork layer, which provides the functionality for communications between networks through gateways. Each subnetwork uses gateways to connect to the other subnetworks in the internetwork. The internetwork layer is where data gets transferred from gateway to gateway until it reaches its destination and then passes into the subnetwork layer. The internetwork layer runs the Internet Protocol (IP).

        The service provider protocol layer is responsible for the overall end-to-end communications of the network. This is the layer that runs the Transmission Control Protocol (TCP) and other protocols. It handles the data traffic flow itself and ensures reliability for the message transfer.

        The top layer is the application services layer, which supports the interfaces to the user applications. This layer interfaces to electronic mail, remote file transfers, and remote access. Several protocols are used in this layer, many of which you will read about later.

        To see how the Internet architecture model works, a simple example is useful. Assume that an application on one machine wants to transfer a datagram to an application on another machine in a different subnetwork. Without all the signals between layers, and simplifying the architecture a little, the process is shown in Figure 2.6. The layers in the sending and receiving machines are the OSI layers, with the equivalent Internet architecture layers indicated.

        Figure 2.6. Transfer of a datagram over an internetwork.

        The data is sent down the layers of the sending machine, assembling the datagram with the Protocol Control Information (PCI) as it goes. From the physical layer, the datagram (which is sometimes called a frame after the data link layer has added its header and trailing information) is sent out to the local area network. The LAN routes the information to the gateway out to the internetwork. During this process, the LAN has no concern about the message contained in the datagram. Some networks, however, alter the header information to show, among other things, the machines it has passed through.

        From the gateway, the frame passes from gateway to gateway along the internetwork until it arrives at the destination subnetwork. At each step, the gateway analyzes the datagram's header to determine if it is for the subnetwork the gateway leads to. If not, it routes the datagram back out over the internetwork. This analysis is performed in the physical layer, eliminating the need to pass the frame up and down through different layers on each gateway. The header can be altered at each gateway to reflect its routing path.

        When the datagram is finally received at the destination subnetwork's gateway, the gateway recognizes that the datagram is at its correct subnetwork and routes it into the LAN and eventually to the target machine. The routing is accomplished by reading the header information. When the datagram reaches the destination machine, it passes up through the layers, with each layer stripping off its PCI header and then passing the result on up. At long last, the application layer on the destination machine processes the final header and passes the message to the correct application.

        If the datagram was not data to be processed but a request for a service, such as a remote file transfer, the correct layer on the destination machine would decode the request and route the file back over the internetwork to the original machine. Quite a process!

        Internetwork Problems


        Not everything goes smoothly when transferring data from one subnetwork to another. All manner of problems can occur, despite the fact that the entire network is using one protocol. A typical problem is a limitation on the size of the datagram. The sending network might support datagrams of 1,024 bytes, but the receiving network might use only 512-byte datagrams (because of a different hardware protocol, for example). This is where the processes of segmentation, separation, reassembly, and concatenation (explained in the last chapter) become important.

        The actual addressing methods used by the different subnetworks can cause conflicts when routing datagrams. Because communicating subnetworks might not have the same network control software, the network-based header information might differ, despite the fact that the communications methods are based on TCP/IP. An associated problem occurs when dealing with the differences between physical and logical machine names. In the same manner, a network that requires encryption instead of clear-text datagrams can affect the decoding of header information. Therefore, differences in the security implemented on the subnetworks can affect datagram traffic. These differences can all be resolved with software, but the problems associated with addressing methods can become considerable.

        Another common problem is the different networks' tolerance for timing problems. Time-out and retry values might differ, so when two subnetworks are trying to establish communication, one might have given up and moved on to another task while the second is still waiting patiently for an acknowledgment signal. Also, if two subnetworks are communicating properly and one gets busy and has to pause the communications process for a short while, the amount of time before the other network assumes a disconnection and gives up might be important. Coordinating the timing over the internetwork can become very complicated.

        Routing methods and the speed of the machines on the network can also affect the internetwork's performance. If a gateway is managed by a particularly slow machine, the traffic coming through the gateway can back up, causing delays and incomplete transmissions for the entire internetwork. Developing an internetwork system that can dynamically adapt to loads and reroute datagrams when a bottleneck occurs is very important.

        There are other factors to consider, such as network management and troubleshooting information, but you should begin to see that simply connecting networks together without due thought does not work. The many different network operating systems and hardware platforms require a logical, well-developed approach to the internetwork. This is outside the scope of TCP/IP, which is simply concerned with the transmission of the datagrams. The TCP/IP implementations on each platform, however, must be able to handle the problems mentioned.

        Internet Addresses


        Network addresses are analogous to mailing addresses in that they tell a system where to deliver a datagram. Three terms commonly used in the Internet relate to addressing: name, address, and route.



        The term address is often generically used with communications protocols to refer to many different things. It can mean the destination, a port of a machine, a memory location, an application, and more. Take care when you encounter the term to make sure you know what it is really referring to.

        A name is a specific identification of a machine, a user, or an application. It is usually unique and provides an absolute target for the datagram. An address typically identifies where the target is located, usually its physical or logical location in a network. A route tells the system how to get a datagram to the address.

        You use the recipient's name often, either specifying a user name or a machine name, and an application does the same thing transparently to you. From the name, a network software package called the name server tries to resolve the address and the route, making that aspect unimportant to you. When you send electronic mail, you simply indicate the recipient's name, relying on the name server to figure out how to get the mail message to them.

        Using a name server has one other primary advantage besides making the addressing and routing unimportant to the end user: It gives the system or network administrator a lot of freedom to change the network as required, without having to tell each user's machine about any changes. As long as an application can access the name server, any routing changes can be ignored by the application and users.

        Naming conventions differ depending on the platform, the network, and the software release, but following is a typical Ethernet-based Internet subnetwork as an example. There are several types of addressing you need to look at, including the LAN system, as well as the wider internetwork addressing conventions.

        Subnetwork Addressing


        On a single network, several pieces of information are necessary to ensure the correct delivery of data. The primary components are the physical address and the data link address.

        The Physical Address

        Each device on a network that communicates with others has a unique physical address, sometimes called the hardware address. On any given network, there is only one occurrence of each address; otherwise, the name server has no way of identifying the target device unambiguously. For hardware, the addresses are usually encoded into a network interface card, set either by switches or by software. With respect to the OSI model, the address is located in the physical layer.

        In the physical layer, the analysis of each incoming datagram (or protocol data unit) is performed. If the recipient's address matches the physical address of the device, the datagram can be passed up the layers. If the addresses don't match, the datagram is ignored. Keeping this analysis in the bottom layer of the OSI model prevents unnecessary delays, because otherwise the datagram would have to be passed up to other layers for analysis.

        The length of the physical address varies depending on the networking system, but Ethernet and several others use 48 bits in each address. For communication to occur, two addresses are required: one each for the sending and receiving devices.

        The IEEE is now handling the task of assigning universal physical addresses for subnetworks (a task previously performed by Xerox, as they developed Ethernet). For each subnetwork, the IEEE assigns an organization unique identifier (OUI) that is 24 bits long, enabling the organization to assign the other 24 bits however it wants. (Actually, two of the 24 bits assigned as an OUI are control bits, so only 22 bits identify the subnetwork. Because this provides 222 combinations, it is possible to run out of OUIs in the future if the current rate of growth is sustained.)

        The format of the OUI is shown in Figure 2.7. The least significant bit of the address (the lowest bit number) is the individual or group address bit. If the bit is set to 0, the address refers to an individual address; a setting of 1 means that the rest of the address field identifies a group address that needs further resolution. If the entire OUI is set to 1s, the address has a special meaning which is that all stations on the network are assumed to be the destination.

        Figure 2.7. Layout of the organization unique identifier.

        The second bit is the local or universal bit. If set to zero, it has been set by the universal administration body. This is the setting for IEEE-assigned OUIs. If it has a value of 1, the OUI has been locally assigned and would cause addressing problems if decoded as an IEEE-assigned address.

        The remaining 22 bits make up the physical address of the subnetwork, as assigned by the IEEE. The second set of 24 bits identifies local network addresses and is administered locally. If an organization runs out of physical addresses (there are about 16 million addresses possible from 24 bits), the IEEE has the capacity to assign a second subnetwork address.

        The combination of 24 bits from the OUI and 24 locally assigned bits is called a media access control (MAC) address. When a packet of data is assembled for transfer across an internetwork, there are two sets of MACs: one from the sending machine and one for the receiving machine.

        The Data Link Address

        The IEEE Ethernet standards (and several other allied standards) use another address called the link layer address (abbreviated as LSAP for link service access point). The LSAP identifies the type of link protocol used in the data link layer. As with the physical address, a datagram carries both sending and receiving LSAPs. The IEEE also enables a code that identifies the EtherType assignment, which identifies the upper layer protocol (ULP) running on the network (almost always a LAN).

        Ethernet Frames

        The layout of information in each transmitted packet of data differs depending on the protocol, but it is helpful to examine one to see how the addresses and related information are prepended to the data. This section uses the Ethernet system as an example because of its wide use with TCP/IP. It is quite similar to other systems as well.

        A typical Ethernet frame (remember that a frame is the term for a network-ready datagram) is shown in Figure 2.8. The preamble is a set of bits that are used primarily to synchronize the communication process and account for any random noise in the first few bits that are sent. At the end of the preamble is a sequence of bits that are the start frame delimiter (SFD), which indicates that the frame follows immediately.

        Figure 2.8. The Ethernet frame.

        The recipient and sender addresses follow in IEEE 48-bit format, followed by a 16-bit type indicator that is used to identify the protocol. The data follows the type indicator. The Data field is between 46 and 1,500 bytes in length. If the data is less than 46 bytes, it is padded with 0s until it is 46 bytes long. Any padding is not counted in the calculations of the data field's total length, which is used in one part of the IP header. The next chapter covers IP headers.

        At the end of the frame is the cyclic redundancy check (CRC) count, which is used to ensure that the frame's contents have not been modified during the transmission process. Each gateway along the transmission route calculates a CRC value for the frame and compares it to the value at the end of the frame. If the two match, the frame can be sent farther along the network or into the subnetwork. If they differ, a modification to the frame must have occurred, and the frame is discarded (to be later retransmitted by the sending machine when a timer expires).

        In some protocols, such as the IEEE 802.3, the overall layout of the frame is the same, with slight variations in the contents. With 802.3, the 16 bits used by Ethernet to identify the protocol type are replaced with a 16-bit value for the length of the data block. Also, the data area itself is prepended by a new field.

        IP Addresses


        TCP/IP uses a 32-bit address to identify a machine on a network and the network to which it is attached. IP addresses identify a machine's connection to the network, not the machine itself—an important distinction. Whenever a machine's location on the network changes, the IP address must be changed, too. The IP address is the set of numbers many people see on their workstations or terminals, such as 127.40.8.72, which uniquely identifies the device.

        IP (or Internet) addresses are assigned only by the Network Information Center (NIC), although if a network is not connected to the Internet, that network can determine its own numbering. For all Internet accesses, the IP address must be registered with the NIC.

        There are four formats for the IP address, with each used depending on the size of the network. The four formats, called Class A through Class D, are shown in Figure 2.9. The class is identified by the first few bit sequences, shown in the figure as one bit for Class A and up to four bits for Class D. The class can be determined from the first three (high-order) bits. In fact, in most cases, the first two bits are enough, because there are few Class D networks.

        Figure 2.9. The four IP address class structures.

        Class A addresses are for large networks that have many machines. The 24 bits for the local address (also frequently called the host address) are needed in these cases. The network address is kept to 7 bits, which limits the number of networks that can be identified. Class B addresses are for intermediate networks, with 16-bit local or host addresses and 14-bit network addresses. Class C networks have only 8 bits for the local or host address, limiting the number of devices to 256. There are 21 bits for the network address. Finally, Class D networks are used for multicasting purposes, when a general broadcast to more than one device is required. The lengths of each section of the IP address have been carefully chosen to provide maximum flexibility in assigning both network and local addresses.

        IP addresses are four sets of 8 bits, for a total 32 bits. You often represent these bits as separated by a period for convenience, so the IP address format can be thought of as network.local.local.local for Class A or network.network.network.local for Class C. The IP addresses are usually written out in their decimal equivalents, instead of the long binary strings. This is the familiar host address number that network users are used to seeing, such as 147.10.13.28, which would indicate that the network address is 147.10 and the local or host address is 13.28. Of course, the actual address is a set of 1s and 0s. The decimal notation used for IP addresses is properly called dotted quad notation—a bit of trivia for your next dinner party.

        The IP addresses can be translated to common names and letters. This can pose a problem, though, because there must be some method of unambiguously relating the physical address, the network address, and a language-based name (such a tpci_ws_4 or bobs_machine). The section later in this chapter titled "The Domain Name System" looks at this aspect of address naming.

        From the IP address, a network can determine if the data is to be sent out through a gateway. If the network address is the same as the current address (routing to a local network device, called a direct host), the gateway is avoided, but all other network addresses are routed to a gateway to leave the local network (indirect host). The gateway receiving data to be transmitted to another network must then determine the routing from the data's IP address and an internal table that provides routing information.

        As mentioned, if an address is set to all 1s, the address applies to all addresses on the network. (See the previous section titled "Physical Addresses.") The same rule applies to IP addresses, so that an IP address of 32 1s is considered a broadcast message to all networks and all devices. It is possible to broadcast to all machines in a network by altering the local or host address to all 1s, so that the address 147.10.255.255 for a Class B network (identified as network 147.10) would be received by all devices on that network (255.255 being the local addresses composed of all 1s), but the data would not leave the network.

        There are two contradictory ways to indicate broadcasts. The later versions of TCP/IP use 1s, but earlier BSD systems use 0s. This causes a lot of confusion. All the devices on a network must know which broadcast convention is used; otherwise, datagrams can be stuck on the network forever!

        A slight twist is coding the network address as all 0s, which means the originating network or the local address being set to 0s, which refers to the originating device only (usually used only when a device is trying to determine its IP address). The all-zero network address format is used when the network IP address is not known but other devices on the network can still interpret the local address. If this were transmitted to another network, it could cause confusion! By convention, no local device is given a physical address of 0.

        It is possible for a device to have more than one IP address if it is connected to more than one network, as is the case with gateways. These devices are called multihomed, because they have a unique address for each network they are connected to. In practice, it is best to have a dedicate machine for a multihomed gateway; otherwise, the applications on that machine can get confused as to which address they should use when building datagrams.

        Two networks can have the same network address if they are connected by a gateway. This can cause problems for addressing, because the gateway must be able to differentiate which network the physical address is on. This problem is looked at again in the next section, showing how it can be solved.

        Address Resolution Protocol


        Determining addresses can be difficult because every machine on the network might not have a list of all the addresses of the other machines or devices. Sending data from one machine to another if the recipient machine's physical address is not known can cause a problem if there is no resolution system for determining the addresses. Having to constantly update a table of addresses on each machine would be a network administration nightmare. The problem is not restricted to machine addresses within a small network, because if the remote destination network addresses are unknown, routing and delivery problems will also occur.

        The Address Resolution Protocol (ARP) helps solve these problems. ARP's job is to convert IP addresses to physical addresses (network and local) and in doing so, eliminate the need for applications to know about the physical addresses. Essentially, ARP is a table with a list of the IP addresses and their corresponding physical addresses. The table is called an ARP cache. The layout of an ARP cache is shown in Figure 2.10. Each row corresponds to one device, with four pieces of information for each device:

        Figure 2.10. The ARP cache address translation table layout.


        Mapping Types


        The mapping type is one of four possible values indicating the status of the entry in the ARP cache. A value of 2 means the entry is invalid; a value of 3 means the mapping is dynamic (the entry can change); a value of 4 means static (the entry doesn't change); and a value of 1 means none of the above.

        When the ARP receives a recipient device's IP address, it searches the ARP cache for a match. If it finds one, it returns the physical address. If the ARP cache doesn't find a match for an IP address, it sends a message out on the network. The message, called an ARP request, is a broadcast that is received by all devices on the local network. (You might remember that a broadcast has all 1s in the address.) The ARP request contains the IP address of the intended recipient device. If a device recognizes the IP address as belonging to it, the device sends a reply message containing its physical address back to the machine that generated the ARP request, which places the information into its ARP cache for future use. In this manner, the ARP cache can determine the physical address for any machine based on its IP address.

        Whenever an ARP request is received by an ARP cache, it uses the information in the request to update its own table. Thus, the system can accommodate changing physical addresses and new additions to the network dynamically without having to generate an ARP request of its own. Without the use of an ARP cache, all the ARP requests and replies would generate a lot of network traffic, which can have a serious impact on network performance. Some simpler network schemes abandon the cache and simply use broadcast messages each time. This is feasible only when the number of devices is low enough to avoid network traffic problems.

        The layout of the ARP request is shown in Figure 2.11. When an ARP request is sent, all fields in the layout are used except the Recipient Hardware Address (which the request is trying to identify). In an ARP reply, all the fields are used.

        Figure 2.11. The ARP request and ARP reply layout.

        This layout, which is combined with the network system's protocols into a protocol data unit (PDU), has several fields. The fields and their purposes are as follows:

        Some of these fields need a little more explanation to show their legal values and field usage. The following sections describe these fields in more detail.

        The Hardware Type Field


        The hardware type identifies the type of hardware interface. Legal values are as follows:

        Type

        Description

        1

        Ethernet

        2

        Experimental Ethernet

        3

        X.25

        4

        Proteon ProNET (Token Ring)

        5

        Chaos

        6

        IEEE 802.X

        7

        ARCnet



        The Protocol Type Field


        The protocol type identifies the type of protocol the sending device is using. With TCP/IP, these protocols are usually an EtherType, for which the legal values are as follows:

        Decimal

        Description

        512

        XEROX PUP

        513

        PUP Address Translation

        1536

        XEROX NS IDP

        2048

        Internet Protocol (IP)

        2049

        X.75

        2050

        NBS

        2051

        ECMA

        2052

        Chaosnet

        2053

        X.25 Level 3

        2054

        Address Resolution Protocol (ARP)

        2055

        XNS

        4096

        Berkeley Trailer

        21000

        BBN Simnet

        24577

        DEC MOP Dump/Load

        24578

        DEC MOP Remote Console

        24579

        DEC DECnet Phase IV

        24580

        DEC LAT

        24582

        DEC

        24583

        DEC

        32773

        HP Probe

        32784

        Excelan

        32821

        Reverse ARP

        32824

        DEC LANBridge

        32823

        AppleTalk


        If the protocol is not EtherType, other values are allowed.

        ARP and IP Addresses


        Two (or more) networks connected by a gateway can have the same network address. The gateway has to determine which network the physical address or IP address corresponds with. The gateway can do this with a modified ARP, called the Proxy ARP (sometimes called Promiscuous ARP). A proxy ARP creates an ARP cache consisting of entries from both networks, with the gateway able to transfer datagrams from one network to the other. The gateway has to manage the ARP requests and replies that cross the two networks.

        An obvious flaw with the ARP system is that if a device doesn't know its own IP address, there is no way to generate requests and replies. This can happen when a new device (typically a diskless workstation) is added to the network. The only address the device is aware of is the physical address set either by switches on the network interface or by software. A simple solution is the Reverse Address Resolution Protocol (RARP), which works the reverse of ARP, sending out the physical address and expecting back an IP address. The reply containing the IP address is sent by an RARP server, a machine that can supply the information. Although the originating device sends the message as a broadcast, RARP rules stipulate that only the RARP server can generate a reply. (Many networks assign more than one RARP server, both to spread the processing load and to act as a backup in case of problems.)

        The Domain Name System


        Instead of using the full 32-bit IP address, many systems adopt more meaningful names for their devices and networks. Network names usually reflect the organization's name (such as tpci.com and bobs_cement). Individual device names within a network can range from descriptive names on small networks (such as tims_machine and laser_1) to more complex naming conventions on larger networks (such as hpws_23 and tpci704). Translating between these names and the IP addresses would be practically impossible on an Internet-wide scale.

        To solve the problem of network names, the Network Information Center (NIC) maintains a list of network names and the corresponding network gateway addresses. This system grew from a simple flat-file list (which was searched for matches) to a more complicated system called the Domain Name System (DNS) when the networks became too numerous for the flat-file system to function efficiently.

        DNS uses a hierarchical architecture, much like the UNIX filesystem. The first level of naming divides networks into the category of subnetworks, such as com for commercial, mil for military, edu for education, and so on. Below each of these is another division that identifies the individual subnetwork, usually one for each organization. This is called the domain name and is unique. The organization's system manager can further divide the company's subnetworks as desired, with each network called a subdomain. For example, the system merlin.abc_corp.com has the domain name abc_corp.com, whereas the network merlin.abc_corp is a subdomain of merlin.abc_corp.com. A network can be identified with an absolute name (such as merlin.abc_corp.com) or a relative name (such as merlin) that uses part of the complete domain name.

        Seven first-level domain names have been established by the NIC so far. These are as follows:

        .arpa

        An ARPANET-Internet identification

        .com

        Commercial company

        .edu

        Educational institution

        .gov

        Any governmental body

        .mil

        Military

        .net

        Networks used by Internet Service Providers

        .org

        Anything that doesn't fall into one of the other categories


        The NIC also allows for a country designator to be appended. There are designators for all countries in the world, such as .ca for Canada and .uk for the United Kingdom.

        DNS uses two systems to establish and track domain names. A name resolver on each network examines information in a domain name. If it can't find the full IP address, it queries a name server, which has the full NIC information available. The name resolver tries to complete the addressing information using its own database, which it updates in much the same manner as the ARP system (discussed earlier) when it must query a name server. If a queried name server cannot resolve the address, it can query another name server, and so on, across the entire internetwork.

        There is a considerable amount of information stored in the name resolver and name server, as well as a whole set of protocols for querying between the two. The details, luckily, are not important to an understanding of TCP/IP, although the overall concept of the address resolution is important when understanding how the Internet translates between domain names and IP addresses.

        Summary


        In this chapter you have seen the relationship of OSI and TCP/IP layered architectures, a history of TCP/IP and the Internet, the structure of the Internet, Internet and IP addresses, and the Address Resolution Protocol. Using these concepts, you can now move on to look at the TCP/IP family of protocols in more detail.

        The next chapter begins with the Internet Protocol (IP), showing how it is used and the format of its header information. The rest of the chapter covers gateway information necessary to piece together the rest of the protocols. Gateways are also revisited on Day 5.

        Q&A


        Explain the role of gateways in internetworks.

        Gateways act as a relay between networks, passing datagrams from network to network searching for a destination address. Networks talk to each other through gateways.

        Expand the following TCP/IP protocol acronyms: DNS, SNMP, NFS, RPC, TFTP.

        DNS is the Domain Name Server, which allows a common name to be used instead of an IP address. SNMP is the Simple Network Management Protocol, used to provide information about devices. NFS is the Network File System, a protocol that allows machines to access other file systems as if they were part of their own. RPC is the Remote Procedure Call protocol that allows applications to communicate. TFTP is the Trivial File Transfer Protocol, a simple file transfer system with no security.

        Name the Internet's advisory bodies.

        The Internet Advisory Board (IAB) controls the Internet. The Internet Engineering Task Force (IETF) handles implementations of protocols on the Internet, and the Internet Research Task Force (IRTF) handles research.

        What does ARP do?

        The Address Resolution Protocol converts IP addresses to physical device addresses.

        What are the four IP address class structures and their structure?

        Class A for large networks: Network address is 7 bits, local address is 24 bits. Class B for midsize networks: Network address is 14 bits, local address is 16 bits. Class C for small networks: Network address is 21 bits, local address is 8 bits. Class D for multicast addresses, using 28 bits. Class D networks are seldom encountered.

        Quiz


        1. Draw the layered architectures of both the OSI Reference Model and TCP/IP. Show how the layers correspond in each diagram.

        2. Show the layered Internet architecture, explaining each layer's purpose.

        3. Show how a datagram is transferred from one network, through one or more gateways, to the destination network. In each device, show the layered architecture and how high up the layered structure the datagrams goes.

        4. Draw the IP header and an Ethernet frame, showing the number of bits used for each component. Explain each component's role.

        5. Explain what an ARP cache is. What is its structure and why is it used?

        Previous Page Page Top TOC Next Page

        <address id="fjh72"></address>

        <dfn id="fjh72"><button id="fjh72"></button></dfn>

              <dfn id="fjh72"></dfn>
              天堂AV√| 美女免费黄片 | 丰滿人妻一区二区三区 | 91高潮视频 | 日批网站视频 | 无码一区二区四区 | 欧美成人18禁 | 国产一级a毛一级a做… | 97人人做| 五月激情婷婷丁香 | 一区二区三区激情在线 | 一级a一级a爰免费免免高潮 | 欧美三级试看视频 | 色婷婷久久综合中文久久蜜桃Av | av大全在线观看 av电影在线一区 | 久久一级精品视频 | 天天操天天天 | 亚洲男女视频免费看 | 亚洲天堂影院 | 日本一级婬一A一A | 999国产精品视频 | 天天碰天天操 | 日韩无码一二三区 | 国产麻豆网 | 豆花无码成人无码视频 | 麻豆成人入口 | 国产精品爆乳露双乳呻吟 | 国产精品三级在线观看 | 免费操网站 | 精品多人P群无码专区 | 亚洲av小电影 | 国产黄色片在线观看 | 18禁网站在线看 | 天天射天天噜 | 中文字幕第一区 | 黄色的A片 | 波多野结衣一级 | 日翰欧美三级片在线播放 | 在线看片欧美 | 色婷婷无码在线 | 日韩在线视频观看 | 黄色一级视频在线播放 | 欧美精品久久 | 麻豆回家一区二区 | 成人欧美精品 | 青草娱乐视频在线观看 | 日日无码视频 | 亚洲黄色a v | 免费操逼 | 又黄又爽又粗又大又长又硬视屏 | 欧美熟妇激情一区二区三区 | 国产影音先锋 | 厂里宿舍少妇愉情视频 | 一级黄色视频在线播放 | 超碰大香蕉| 好逼天天有 | 青青色导航 | 日本三级久久 | 黄色大片在线免费观看 | 天天射天天搞天天干 | 国产精品粉嫩在线播放 | 看欧美操逼视频 | 免费看一区二区三区四区 | 国产资源影音先锋 | 美女激晴一级播放在线观看 | 丝袜足交一区二区三区 | 国产女人水真多18精品 | 无码一区二区三区四区五区在线看 | 欧美视频一区 | 国产高清成人无码视频网址 | 蜜桃视频网站免费观看 | 五月六月婷婷 | 欧美日韩操逼视频 | 亚洲A V网络 | 色香蕉视频 | 欧美操逼视频网站 | 欧洲成人在线免费观看 | 天天操2018| 日韩成人中文字幕 | 丁香五月婷婷香 | 国产麻豆精品成人免费视频 | 色777| 艾儿秀拉粑粑原版视频 | 日韩黄色视频毛片 | 人人操大香蕉 | 黄视频在线最新 | 日韩在线大香蕉 | 日韩国产免费一区二区 | 日日撸色丁香五月 | 最大看逼网 | 国产精品久久久久久久久久乐趣播 | 日韩乱伦网站 | 99精品免费视频在线观看 | 亚洲国产日韩欧美在线a乱码日本中文字幕 欧美三级韩国三级日本三斤在线观看en | 亚洲AV无码成人精品涩涩麻豆 | 爱爱免费不卡视频 | 91网国产 | 精品国产成人 | 影音先锋成人片 | 免费a在线观看 | 精品久久久久中文 | 精品人妻一区二区三区奶水 | 动态图日韩 | 影音先锋久久久久AV综合网成人 | 在线免费观看国产黄色片 | 夜夜撸天天日 | 妖精视频一区二区 | 亚洲视频二区 | 国产欧美大屌 | 无码一区二区三区久久网站 | 人人艹在线 | 中文字幕不卡+婷婷五月 | 天天撸天天色 | 521大香蕉网站。大香蕉综合伊人 91成人视频一区二区三区在线观看 | 九九九视频 | 天天爽天天干 | 一级毛片久久久久久久女人18 | 麻豆三级片在线播放 | 成人做爰黄 片免费 | 色婷婷在线观看视频 | 国产熟妇毛多 久久久久一区 | 免费无码无遮挡在线V软件 | 天天僺天天日 | 俺来也俺就去www色情网 | 国产精品熟妇一区二区三区四区 | 女人高潮特黄AAAAA片 | 日韩国产无码1区2区3区4区 | 内射大香蕉| 天堂俺去俺来也WWW | 尹人大香蕉手机网 | 韩国三级HD中文久久精品车子 | 97干在线视频 | 成人做爰69片免费观看 | 日韩精品在线观看视频 | 天堂视频中文在线 | 九九精品在线观看 | 操逼动漫视频 | 91乱伦| 伊人无码在线视频 | 国产精品内射视频 | 亚洲爽爆av| 亚洲丰满少妇XXXXⅩ高潮 | 人人鲁人人操 | 欧美日韩手机看片免费 | 国产福利精品在线播放 | 欧洲三级片网站 | 嫩草 www天堂资源在线观看 | 青娱乐导航 | 欧美日韩a级大全免费高清在线播放 | xxx国产在线免费观看 | 欧美国产日韩视频 | 爽灬爽灬无码无遮挡在线看 | 看欧美黄片 | 天天日天天操天天色 | 一道本一区二区三区 | 国产欧美中文字幕 | 就是操视频官网 | 青青草男人的天堂黄上网站免费在线观看 | 欧美A片免费 | 日韩精品一区二区三区在线观看 | 色天使亚洲 | 精品久久人人爽天天玩人人妻 | 欧美日韩成人在线 | 亚洲成人电影导航 | 我要看一级特黄色电影 | 天天日Av成人电影。 | 黄色成人网站视频在线观看 | 婷婷五月天97干 | 精品国产a∨一区天美传媒 | 波多野结衣中文字幕乱码 | 欧日无码一区二区三区在线 | 欧美性爱骚逼大吊 | 在线视频久热 | 欧洲精品在线观看 | 麻豆91一区二区 | 看亚洲A级一级毛片 | 在线欧美日 | 黄色三级在线观看 | 青青草超踫 | 日本三级片电影中文字幕在线观看 | 囯产精品久久久久久久久久久 | 另类TS人妖一区二区三区 | 热久久高清免费视频 | 先锋成人电影 | 精品无码一区二区三区无毛 | 日本中文字幕中文翻译歌词 | 欧美淫色视频免费观看 | 日本高清AⅤ在线播放 | 天天干天天操天天谢谢 | 操逼视频免费播放 | 三级片91久久精品欧美亚洲三级片 | 一本大道HEYZO无码专区 一道本一区二区三区免费视频 | 丁香五月色婷中文 | 亚洲第一免费播放区 | 国产精品久久久久久久久久久久久久久久久 | 黄色视频电影 | 丁香婷婷综合久久 | 免费人成网 | 新亚洲天堂 | 又大又粗又硬免费视频 | 三级黄色国产高清电影 | 黄片大全在线观看 | 波多野结衣精品视频 | 亚洲中文视频免费 | 天天综合网~91网站永久入口 | 青春草无码视频 | 色老板最新凹凸视频 | 大吊操色逼 | 五月性爱激情 | 欧美日韩亚洲性爱 | 无码激情| 99精品偷拍 | 婷婷丁香激情五月 | 91无码内射 | 爆操人妻| 国产欧美草莓视频 | 国产三级精品三级在线 | 黄色免费网站 | 免费观看成人毛片A片直播千姿 | 婷婷黄色伊人 | 日本A V在线视频 | A日本免费 | 99这里只有精品视频 | 黄色视频网站在线观看 | 国产aaaaaa | 国产生活片三级片免费看 | 三级草逼 | 天堂中文最新版在线官网8 | 波多野结衣被干 | 亚洲网在线观看 | 五月激情四射网 | 大香蕉精品伊人 | 日本婬片A片免费免费的 | 久久大伊人 | 日本高清成人片在线免费 | 午夜天堂精品久久久久 | 天天综合逼 | 天堂最新 | 色哟哟――国产精品 | 日韩 欧美 亚洲 | 四虎大香蕉 | 小电影毛片 | 在线中文字幕网站 | 大香蕉视频色 | 久草性爱| 国产伦精品一区二区三区免费下载 | 欧美小说视频 | 中文字幕在线观看网站 | 一级-区二区AU | 毛片基地操逼视频 | 日韩无码毛片 | 天堂青草福利视频 | a在线中文字幕 | 国产无码中文字幕在线 | 大香蕉伊人视频网站 | 国产操逼精品 | 亚洲内射视频 | 影音先锋av色偷偷 | 91网国产 | 骚逼国产 | 天堂免费在线视频 | 顶级欧美熟妇高潮喷水 | 麻豆精品国产 | 色哟哟网址 | www.色色撸 | 大香蕉天天干 | 一区二区三区久久 | 国产精品禁久久久精品 | 超哥约草大二91国产最新 | 亚洲AV无码成人精品区欧洲 | 一区二区三区韩国av夜夜骚 | 黄色小电影免费在线观看网站 | 日韩国产欧美 | 亚洲殴洲国产黄片 | 久久福利国产视频 | 永久免费的黄色电影 | 亚洲成人性爱影院 | 日韩黄色免费电影 | 世界二级毛片国语 | 成人黄色电影免费在线观看 | 理论毛片| 欧美日韩国产性爱 | 特西西人体门四WW高清 | 中文字字幕在线中文乱码更新时间 | 俺也去五月婷婷 | 成人午夜人妻一区二区三区视频 | 草逼网页91 | 91精品人妻无码 | 久久久夜色精品亚洲在线播放 | 男人天堂无码视频 | 亚洲日韩免费在线观看 | a毛一级a一级a免费观看视频 | 久久噜噜噜久久熟女-久久久噜噜噜 | 淫淫色色| 日韩精品福利网站 | 成人网站污污 | 亚洲精品娱乐 | 国产精品xxx | 欧美 日韩 中文 | 男女操逼在线免费观看 | 一区二区无码高清 | 精品婷婷| 色婷婷欧美亚洲激情综合另类在线 | 变态骚逼人妻3p露脸合集 | 久伊人狠狠干 | 久久性爱免费视频 | 青青草青娱乐在线 | 国语对白免费AV | 视频二区在线 | 国产精品久久久久久久久绿色 | 国产精品高潮久久久久久无码 | 成人免费观看视频亚洲 | 操逼操逼操逼操逼操逼 | 成人免费视频夜夜撸 | 成人18禁免费网站 | 国产成人欧美一区二区三区91 | 爽妇网888 | 123草逼网 | 国产五月丁香好好日 | 亚洲综合娱乐网 | 人人透人人摸 | 国产女生被男生操网站 | 亚洲图欧美色图另类色妞在线 | 欧美一级黄色电影版 | jzzijzzij亚洲成熟少妇在线观看 | 免费久久一级欧美特大黄 | 91丝袜足交 | 亚洲中文自拍 | 欧美性猛交XXXXXX | 五月丁香婷婷激情网 | 午夜成人精品偷拍在线 | 一区二区三区在看 | 久久影院av无码 卡一卡二在线视频 | 黄色性爱免费 | 亚洲a v| 黄色无码电影 | 成人电影无码三区 | 亚洲 欧美 乱伦 | 青青草视频免费观看 | 日本黄色高清视频 | 亚洲第一网站视频香蕉视频 | 欧美人妇做爰免费视频 | 无码爱爱网站 | 欧美狠狠撸 | 内射毛片在线免费看 | 免费一级黄色录像 | 天天做天天爱天天高潮 | 一级无码片| 中日韩精品一区二区三区四区 | 青青草A片成人网站免费看 | 日韩国产欧美在线视频 | 婷婷激情中文字幕 | 国产激情无码视频网站 | 亚洲在线无码不卡视频 百度一下 | www.99视频 | 亚洲综合网址 | 乌克兰毛片 | 飘花影院一区二区 | 黄色一及片自拍 | 正在播放熟女 | 国产激情在线视频网站 | 草在线观看免费视频 | 成人三级视频 | 逼特逼视频免费观看 | 性欧美在线观看 | 做爱视频免费在线 | 日韩A片电影 | 精品人伦一区二区三区蜜桃视频 | 2023天天干天天射 | 国产黄色片在线免费观看 | 港台靓女性啪啪天美传媒精品性88xo | 日本久久人体视频 | 丁香五月天婷婷婷 | 成人视频网站久久久精品网站久久久 | 免费毛片网站高清无码在线观看 | 日韩中文字幕在线 | 免费无码毛片一区二区A片小说 | 黑人大屌成人 | 婷婷综合久久五月天丁香 | 99热99re6国产在线播放 | 天天操天天日天天 | 亚洲色情网站 | 撸一撸操逼视频 | 国产草草影院 | 黄色A及片视频 | 日韩二级片视频 | 黄色视频在线免费播放 | 在线观看免费拍拍视频 | 白丝美女自慰网站 | 强上app在线观看一区二区三区 | 天堂在线资源网 | 日韩欧美亚洲 | 俺来也俺也去成人女优 | 91青青草视频在线 | 狼友视频 - 首页 | 日本2区在线观看 | 日皮视频免费看 | 亚洲三级片无码高清 | 欧美成人性爱精品 | 91精品国产综合久久久久久 | 婷婷丁香成人五月天 | 亚洲国产三级 | 中文字幕乱伦图 | 尻屄视频大全 | 黄片一区| 欧美性爱视频简体中文 | 影音先锋成人无码 | 成人三级电影天堂 | 亚洲伦精品 | 国产精品99久久久久久www | 国产曹逼性感美女视频 | 波多野吉衣无码HD | 人人超人人超碰国产 | 亚洲页| 日韩大鸡巴 | 在线播放亚洲天堂 | 校花一区二区三区 | 天津人妻第三次3p视频 | 人人妻人人澡人人DⅤD | 欧美操比在线视频 | 久久免费少妇做爰高潮彭水 | 好好的日视频 | 欧美日韩国产中文字幕 | a 在线| 亚洲情趣 | 俺也去www00271 | 欧美日韩亚州在线观看 | 日韩一级A片免费 | 欧美精品一区二区三区成人片在线 | 免费观看日韩a | 激情丁香五月婷婷 | 97中文字幕第二十二页 | 欧美日韩色图片 | 91av久久 | 理论片在线免费视频 | 涩久久 | 成人美女毛片 | 国产亚洲 久一区二区草榴AV | 成人在线看黄 | 天天干天天操 | 尻屄视频网站 | 久久不卡网 | 欧美乱妇高清无乱码 | 国产高清免费视频 | 97色色综合 | 亚洲欧美P | 日本欧美在线播放 | 91av影音先锋 | 国产成人精品久久 | 精品色婷婷 | 亚洲自拍偷拍15P | 樱桃视频91 | 精品无人国产偷自产在线 | 青娱乐国产精品视频网站 | 美女日逼视频网站 | 香蕉视频三区 | 天堂中文在线免费观看 | 亚洲无码在线观看视频 | 五月天婷婷激情 | 一区二区无码免费 | 大鸡巴操嫩逼视频 | 在线国产播放 | 91天天干天天日 | 成人在线免费视频观看 | 久久国产精品偷任你爽任你A足疗 | 国内操逼 | 天天添夜夜添免费视频 | 精品视频一区视频二区视频三区视频四区 | 操逼视频手机播放 | 国产操逼大全 | 人人上人人操 | 超碰资源日韩久久 | www.人人射 | 手机不卡av | 青娱乐偷拍视频 | 簧片在线观看视频 | 欧美日韩国产成人 | 色福利视频 | 韩国三级电影HD中文久久免费 | 97香蕉久久夜色精品国产 | 日韩欧美一级免费 | 亚洲一级免费毛片网 | 手机看片自拍 | 成人免费一级毛片在线播放视频 | 欧美一区二区三色欲区AA大片 | 国产亲子伦视频一区二区三区 | av爱久| 欧美在线伦理一 | 超碰人人操人人操 | 色五月婷婷基地 | 久久久久久久久久av | 国产精品麻豆三级三级视频 | 中文字幕日韩欧美在线 | 日逼视频免费观看 | 99精品欧美一区二区蜜桃免费 | 成人啪啪啪视频 | 伊人一区二区三区 | 国产一级a毛一级a看免费领取 | 苍井空在厨房被C的A片 | 人妻精品射精 | 丁香五月大香蕉 | 12一15女人片毛片 | 欧美色图一区 | 色情小电影免费网站观看网址在线播 | 韩国国产精品 | 亚洲人妻乱码 | 欧美日韩电影一区二区三区 | 很很日2012中文在线免费 | 中国东北农村乱子毛片 | 一般男女中文字幕 | 国产无遮挡又黄又爽又色视频 | 亚洲精品92内射 | 北条麻妃的69XX在线播放 | 国产无码福利在线视频 | 一级黄色视频国产 | 天天躁日日摸久久久精品 | 美女美穴大全 | 人妻 日韩 欧美 综合 晨跑 | 超碰在线免费 | 精品无人区一区二区三区聊斋艳谭 | 91看毛片 | 欧美日高清视频免费在线播放 | 99午夜影院 | 欧美精品123区分布 | 影音先锋婷婷五月天 | 91大鸡吧 | 盗摄—AV国产盗摄 | 黑人大屌与欧美成人视频 | 国产一区二区三区熟女免费 | 人人摸人人插 | 亚洲成人网站第一网站 | 国产乱伦综合导航 | 亚洲黄色性爱电影 | 无码一区二区三区四区五区六区七区八区 | 综合色图亚洲 | 成人 在线 欧美 | 亚洲一区二区三区在线 | 欧美毛片视频 | 国产片成人咸片网站片 | 可以看的黄色视频 | 一级a一级a爱片免费免会永久 | 先锋影音av资源网 | 成人黄色性生活视频 | 日韩黄色电影中文版 | 伦中文亚洲 | 青青草视频免费在线看 | 国产日韩在线视频 | 成人蜜桃网 | 免费AA片| 大香蕉伊人电影网 | 国产精品亚洲综合日韩 | 成人在线超碰 | 婷婷五月六月 | 天天日麻批| 91天天综合| 成人高清无码免费看 | 成人毛片在线精品国产 | 黄色日逼视频免费看 | 亚洲青娱乐第一区 | 国产亚洲无码免费在线观看 | 日韩欧美一级电影 | 人妻AⅤ在线 | 狠狠操人人摸 | www男人天堂 | 日本黄色操逼 | 91乱子伦国产乱子伦! | 蜜桃AV秘 无码一区二区三区 | www.99视频 | 夜夜操天天日 | 欧美成人靠逼小视频 | 美女曹逼网站 | 亚洲人成色77777在线观看 | 日本a在线观看 | 日本视频在线三区 | 国产偷窥盗摄7777777 | 色先锋AV | 五月天综合 | 亚洲熟女www一区二区三区 | 中文字幕亚洲视频在线 | 青青草大香蕉在线视频 | 成人三级视频久久 | 国产一区久久久 | 国产成人精品电影 | 亚欧自拍| 不要钱的黄视频免费看在线 | 日本黄视频网站 | 大香蕉久草 | 国产精品秘 入口免费直播大尺度 | 中文字幕在线观看网站 | 国产色亚洲 | 丝袜黄片 | 影音先锋成人无码在线观看 | 亚洲天堂男人天堂 | 特级西西444www大胆免费看 | 羞羞午夜 | 香蕉网狼人 | 免费超碰 | 青青操娱乐日韩 | 大鸡巴操黑丝 | 午夜黄色剧场 | 国产男女日bb的视频 | 中文字幕一区二区三 | 一道本一区二区三区在线视频 | 521大香蕉网站。大香蕉综合伊人 91成人视频一区二区三区在线观看 | 黄色在线视频播放 | 91人人人人人 | 亚洲无码高清黄色视频网站 | 欧美视频一 | 亚洲精品中文字幕无码 | 看毛片网址 | AV色天堂 | 美女一级内射 | 精品九九| 天堂在线aaa | 三级黄色操逼片 | 欧美成人性爱在线观看 | 九九九九九九色 | 无码一区二区三区精品 | 欧洲色网 | 九九热AV | 丝袜美腿av | 99热在线看 | 亚洲成人免费在线观看 | 中文字字幕一区二区三区四区五区 | 亚洲中文字幕免费观看 | 思瑞与土豪国产一区二区 | 日韩色中色 | 大香蕉国产伊人视频 | 一级A爱爱 | 亚洲无 码A片在线观看 | 中文字幕性爱 | 97爽无码人妻AⅤ精品牛牛 | 五月丁香黄色电影 | 操逼操逼操 | Riri成人网站下载 | 青青草视频分类在线 | 天天摸夜夜操 | 人妻喷水视频 | 看黄色操逼网 | 日本黄色美女网站 | 国产成人无码区免费视频 | 影音先锋三级片 | 国产高清免费视频 | 黄色大片免费不卡 | 大香蕉视频91 | 亚洲一级免费黄色电影 | 成人网站在线视频三级 | 一本色道综合 | 日韩口交无码 | 国产精品一区亚洲一区天堂 | 日韩一级免费的视频 | 婷婷五月精品 | 无码电影视频 | 日本三级美国三级久久 | 欧美理论三级 | 精品A片九九九九免费视频 | 伊人激情网| 美女视频黄久久 | 啪啪小视频 | 六区无码 | 国内自拍 99 | 欧美精品久久久久久久久爆乳 | 97人妻人人揉人人躁人人 | 99久久精品国产色欲 | 免费日韩在线三级黄色电影网址 | www.伊人 | 三级片91| 日日日日日 | 网站一区二区三区 | 国内精品国产三级国产在线专 | 親子亂子倫XXXX0路舒淇 日本丰满少妇黄大片在线观看 | 亚洲一区二区免费视频 | 操逼乱轮国产 | 豆花视频成人 | 亚洲电影网站 | 五月婷婷激情综合网 | 欧美操在线观看视频 | 一本色道综合久久欧美日韩精品 | 久久国产热视频 | 色免费在线小电影 | 日本无码北条麻妃 | 美女被日视频网站 | 豆花在线视频观看 | 一级啪啪片 | 免费成人大片 | 豆花视频在线欧美亚洲自拍 | 操逼一级好看毛片 | 三级片在线网站 | 亚洲激情欧美日本国产视频小说图片电影 | 一级a黄色电影片 | 爱搞搞就要搞 | 亚洲高清毛片一区二区 | 羽月希奶水一区二区三区 | 校园春色国产 | 操巷子里的老骚货免费视频 | 亚洲操屄视频 | 色哟哟精品无码 | 黄色大片网站 | 国产精品44 | 成人三级片av | 二色国产热AV | 操屄视频欧美日韩在线 | 国产精品色| 黄片在线看。 | 免费无码一区二区三区四区 | 青青草在线视频免费播放 | 欧美网站在线看 | wwwx在线观看 | 18禁 成人黄网站免费视频 | 做爱片一黄级 | 狠狠操狠操 | 请立即播放黑人大黑吊日白人小嫩逼视频 | 午夜福利影视 | 大香蕉在线网 | 艹逼电影| 成人久久久电影 | 国产精品成人久久 | 美女交叉免费视频啪啪 | 亚欧无码线免费观看视频 | 亚洲男女免费视频 | 欧美精品国产亚洲日韩字在线观看 | 无码毛片在线观看 | 国产美女操逼 | www操逼com | 怡红院院AV | 青娱乐极品精品 | 亚洲无码高清在线视频 | 噜噜AV | 国产精品乱码69一区二区三区 | 国产一级黄片视频在线观看 | 激情五月丁香色婷婷 | 中文字幕在线视频无码 | 大奶模特惜萍 | 免费在线观看视频a | 欧美日在线观看 | 伊人18p | 国产一级片黄色视频网站 | 色播日本视频在线观看 | 男人的天堂在线视频 | 日日夜夜精品 | 99久久婷婷国产综合精品青牛牛 | 婷婷色五月激情综合网 | 乐播一区二区三区 | 五月婷婷人妻小说 | 在线精品一区豆花 | 91精选久久| 欧美午夜精品福利 | 蜜乳一区二区三区有限公司 | 久久天天躁狠狠躁夜夜爽 | 青青草免费在线视 | 噜噜影院| 亚洲天堂黄片 | 黄色AV小说在线观看 | 国产十区| 成人免费电影在线观看五月天婷婷 | 亚洲天堂在线视频观看 | 欧美极度另类 | 69免费视频网 | 视频精品一区二区三区 | 北条麻妃无码一区二区 | 国产黄色视频免费网址 | 日本A片免费在线观看 | 日韩无码人妻AV | 俺也来也去精品视频 | 中文字幕国产在线 | 亚洲一区无码视频 | 国产一卡二卡在线 | 六月婷婷综合激情无码 | 99免费视频在线观看 | 韩国三级在线视频观看 | 欧美亚洲中文日 | 激情六月婷婷 | 欧美精品成人视频 | 亚洲日、韩aⅴ | 午夜福利视频在线 | 大香蕉综合一二 | 一本色道久久综合亚洲精品小说 | 夜夜爽天天爽 | 激情在线无码色综合播放视频 | 国产 激情 视频 在线 | 丁香五月欧美激情 | 久久久久久久久久av | 三级操逼片 | 全免费一级毛片免费看无码播放 | 欧美黄色电影院 | 欧美性爱视频AAA | 国产xxx乱伦 | 涩涩99 | 激情综合五月天 | 一级a一级a爱片免费 | 91色蝌蚪 | 中文字幕永久在线视频 | 39日韩操逼视频 | 夜夜撸狠狠撸 | 国产麻豆精品人妻无码 | 国产精品久久久久久久久免费相片 | 是先锋男人的网站 | 久久国产综合 | 一级A色情大片 | 日韩免费精品一区二区三区色欲AV | 日本中文字幕手机在线 | 亚洲乱伦图区 | 亚洲性爱电影在线免费观看 | 久久国产视觉盛宴 | 国产视频色在线播放 | 中文字幕欧美日韩在线视频播放 | 69.成人免费电影 | 色逼成人综合一二三区 | 黄色在线观看有限公司jb啊啊相当到位 | 草草影院国产第一页 | 91插B精品在线 | 大香蕉伊人影院网站 | 国产这里只有精品 | 派遣素描模特儿居家作画 却假藉 | 操逼男女操逼 | 色婷婷在线视频观看 | 最新黄色免费三级av网站 | 日韩色在线 | 最新的黄色网址 | 尻屄视频在线看 | 国产精品日韩高清北条麻衣 | 三级在线观看 | 青娱乐成人网 | 久草综合在线 | aaaa免费大片 | 超碰天天操 | 在线的欧美成网站 | 99热6在线观看 | 中国一级免费黄片 | 蜜桃AV鲁一鲁 | 青娱乐极品视频盛宴 | 无码中文视频 | 91re视频 | 蜜桃av网址| 乱婬妺妺躁爽A片 | 亚洲精品国产AV婷婷在 | 高清无码视频免费版本在线观看 | 男人天堂AV久热 | 国产欧美成人 | 欧美精产国品一二三产品动漫 | 国产亚洲精品久久久 | 日本亚洲一 | 青青草原免费在线视频 | 成人A片网 | 免费一级特黄特色大片 | 欧美国产精品一二三产品在哪买 | 大香蕉在线观看视频 | 大鸡巴AV在线 | 9久热这里只有精品 | 色国产精品 | 精品无码人妻一区二区 | 国精产品久久久久久 | 大鸡巴久久久久久久久久久 | 欧洲精品成人AV在线蜜芽 | 欧美三级高清在线观看 | 国产无码一区二区 | 国产欧美黄色一级二级三级 | 国产日韩在线观看视频 | 成人综合婷婷国产精品久久 | 成人做爰黄A片免费看直播室男男 | 91欧美| www,俺也去婷婷官网 | 91在线无码精品秘 入口楼乃 | 91 国产 爽 黄 在线相亲 | 黄色视频一级 | 三级片中文字幕在线观看 | 网红操逼视频在线观看免费视频在线观看 | 91精品国产综合久久久果冻传媒 | 成人性交插入视频免费在线播放 | 国产精品无码AV无码 | 国产在线观看一区 | wwwCn一起操 | 少妇久久久久久久久久 | 俺去也俺来也在线www官网 | 中文字幕乱妇无码Av在线 | 日日夜夜费免费精品 | 天天干,天天日,天天插,人人人透 午夜久久精品嫖妓av一区二区三区 | 网站日逼 | 成人女在线观看 | 麻豆91网站| 精品成人久久久久久久 | 丁香五月天婷婷婷 | 国产骚逼被操 | 婷婷五月天AV | 爱爱视频亚洲 | 亚洲 a v 网站 | 午夜高清 | 草比免费视频 | 老司机无码视频 | 日韩一区二区三区中文高清电影 | 大香蕉熟女 | 中文字幕无码一区二区三区一本久道不卡 | 91AV在线观看2011 | 三级片麻豆91 | 操逼操| 夜夜夜操操操 | 成人毛片视频网站 | 免费看一级A沽 | 欧美A级黄片 | 大香蕉免费网站 | 国产微拍一区 | 免费直接观看黄色网页 | 黄色在线一区 | 天天爽天天狠天天干 | 日韩一级黄片免费看 | 肏逼小视频 | 91精品人妻一区二区三区蜜桃 | 天天综合天天 | 日本乱伦中文字幕 | 黄女毛片 | 波多野结衣亚洲一区 | 久久鲁欧美 | 亚洲第一大成人网站 | 国产护士在线观看 | 中文字幕-熊猫成人网 | 欧美爱爱视频免费看 | 精品久久久久99水蜜桃 | 人人操五月天 | www.夜夜撸 | 美女操网站| 亚洲欧美日韩久久精品第一区 | 午夜精品偷拍 | 午夜网久久久成人 | 免费毛片看片 | 国产免费一区二区三区四区六区在线 | 精品乱伦网站 | 超碰凹凸在线 | 日韩国产免费 | 中文字幕日韩美 | 狼人大香蕉 | 91视频 久久 | 手机看5689669AV | 国产无码性爱 | 人人射人人操人人舔 | 国产精品无码久久久久成人app | 婷婷伊人久操网 | 国产青娱乐在线视频 | 日韩性爱一区 | 人人操人人操人人操人人操人人操 | 色天天男人天堂 | 男人天堂色色网 | 久草福利在线 | 色丁香色五月偷拍一二三区 | 人人人人人人摸 | 黄色网在线视频 | 日韩欧美中文在线无线码视频在线看免费版 | 青青草免费视频日本 | 亚洲无码视频免费看 | 日本不卡免费 | 久久丁香五月天综合网 | 我要操在线 | 亚洲激情欧美日本国产视频小说图片电影 | 男人天堂网av | 婷婷AV导航 | 免费成人黄色电影网站 | 美女高潮水视频 | 青青草视频在线观看免费 | 俺也来俺也去俺也射 | 欧美一区二区三区四区五区视频 | 91九色中文 | 久久久精品影院av | 欧美成人精品 | 欧美成人18禁 | 真人一级毛毛片 | 综合一和综合二图片小说 | 中文字幕A V在线播放 | 日本精品视频在线播放 | 外国十八禁网站 | 日本一 级 黄 色 片免费 | 国产,乱伦,强奸,国产, | 亚洲国产日韩欧美在线a乱码日本中文字幕 欧美三级韩国三级日本三斤在线观看en | 亚洲无码家庭乱伦 | 国产精品一极二极 | 青草青草热视频 | 中文字幕aaa | 久久久久久亚洲 | 天堂俺去俺来也www久久婷婷 | 黄色国产在线 | 成人午夜免费毛片 | A∨视频在线免费观看 | 日韩电影一区二区三区不卡 | 国外成人在线视频老鸭窝 | 欧美大陆三级成人网站 | 五月丁香中文字幕成人网在线 | 一级婬片A片AAAA毛片A级 | aaa国产免费 | 亚洲视屏在线免费观看 | 香蕉A视频 | 亚洲丰满少妇XXXXⅩ高潮 | www.xxqepv日逼打炮 | 青娱乐在线精品 | 中日韩在线视频 | 欧美大香蕉免费 | 亚洲无码77777 | 青青草强奸视频 | 青娱乐中文字幕 | wwwjizz国产 | 国产一级A片在线免费观看 | 免费成人18禁 | 亚洲成人精品导航 |