• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Joint Algorithm of Message Fragmentation and No-Wait Scheduling for Time-Sensitive Networks

    2021-04-22 03:53:58XiJinMemberIEEEChangqingXiaMemberIEEENanGuanandPengZeng
    IEEE/CAA Journal of Automatica Sinica 2021年2期

    Xi Jin, Member, IEEE, Changqing Xia, Member, IEEE, Nan Guan, and Peng Zeng

    Abstract—Time-sensitive networks (TSNs) support not only traditional best-effort communications but also deterministic communications, which send each packet at a deterministic time so that the data transmissions of networked control systems can be precisely scheduled to guarantee hard real-time constraints.No-wait scheduling is suitable for such TSNs and generates the schedules of deterministic communications with the minimal network resources so that all of the remaining resources can be used to improve the throughput of best-effort communications.However, due to inappropriate message fragmentation, the realtime performance of no-wait scheduling algorithms is reduced.Therefore, in this paper, joint algorithms of message fragmentation and no-wait scheduling are proposed. First, a specification for the joint problem based on optimization modulo theories is proposed so that off-the-shelf solvers can be used to find optimal solutions. Second, to improve the scalability of our algorithm, the worst-case delay of messages is analyzed, and then,based on the analysis, a heuristic algorithm is proposed to construct low-delay schedules. Finally, we conduct extensive test cases to evaluate our proposed algorithms. The evaluation results indicate that, compared to existing algorithms, the proposed joint algorithm improves schedulability by up to 50%.

    I. INTRODUCTION

    TIME-SENSITIVE networks (TSNs) are an emerging industrial network technology based on Ethernet networks and extend a set of IEEE standards to improve the controllability of industrial networks. Thus, in addition to best-effort communications supported by Ethernet networks,TSNs also support deterministic communications that have been widely considered as an effective solution to guarantee end-to-end delay constraints in hard real-time industrial systems.

    In networked control systems, TSNs have been adopted [1]–[3]. Deterministic communications contain control commands and critical sensing data, and the other data adopts best-effort communications [4]. Deterministic communications and besteffort communications have different objectives. The real-time performance of deterministic communications is the most important. Before they start to transmit, their deterministic schedules must be generated so that the transmission process can be controlled to guarantee hard real-time constraints. For best-effort communications, there is no strict constraint. Their schedules do not need to be generated in advance, and networks just try to transmit them as soon as possible. In a TSN switch,the two kinds of communications share a fixed number of output queues. Deterministic communications must be assigned dedicated queues, while best-effort communications require more queues to improve network throughput [5]. Therefore,determining how to assign and utilize the queues are the key to improving network performance.

    This paper focuses on store-and-forward switching, because compared to cut-through switching, store-and-forward switching is supported by more off-the-shelf TSN products.For example, CISCO IE 4000 [6] and NXP SJA1105 [7]support only store-and-forward switching, while no off-theshelf TSN product supports only cut-through switching. In store-and-forward networks, no-wait scheduling is an effective method to make a performance trade-off between deterministic communications and best-effort communications[8]. Under no-wait scheduling, once a network switch receives a packet, it sends the packet immediately, i.e., only one queue is needed to cache the scheduled packets. Thus, when a nowait scheduling algorithm is used to generate schedules for deterministic communications, except the occupied queue, all of the other queues can be used by best-effort communications. Therefore, no-wait scheduling algorithms not only generate schedules for deterministic communications on the dedicated queue, but also improve the performance of best-effort communications.

    However, when no-wait scheduling algorithms are adopted,the following issue should be considered. On the IP layer, a large message from the TCP layer must be fragmented into several smaller pieces. Each piece and its added packet header constitute a complete packet. These packets are then transmitted separately and reassembled at destination devices.In this process, fragmentation algorithms will affect the transmission delay because smaller packets have higher parallelism. For example, in Fig.1, a message of 1620 bytes must be fragmented into two pieces. In traditional Ethernet fragmentation, the length of the first packet is equal to the maximum segment size (MSS) plus a packet header, and the remaining part is contained in the second packet. Since nowait scheduling algorithms do not allow a time interval between two consecutive hops of a packet, the second packet is postponed by the first packet and cannot be transmitted earlier. In another fragmentation, to reduce the long delay, the message can be fragmented into two pieces of 810 bytes each.Although the number of packets is unchanged, the delay is reduced by approximately one-third. Message fragmentation exists in TSNs [5]. However, there is currently no work that considers message fragmentation algorithms and no-wait scheduling algorithms together. This has led to some optimizable solution spaces being ignored.

    Fig.1. Effect of message fragmentation on no-wait scheduling.

    Therefore, in this paper, a joint algorithm is proposed that fragments deterministic messages into packets of optimized sizes and schedules the packets under hard real-time constraints based on a no-wait strategy to improve the realtime performance of TSNs. When designing the joint algorithm, the following challenge is present. In the interest of saving resources, large packets should be used to reduce the overhead of fragmenting and reassembling. However, in the interest of temporality, a message should be fragmented into small packets, because small packets have higher parallelism and are easy to schedule. Thus, to address the above challenge, our proposed algorithms make a trade-off between these two aspects. The specific contributions are as follows.

    First, a specification for the joint problem based on optimization modulo theories (OMT) is proposed. Since the joint problem is non-deterministic polynomial-time hard (NPhard), there is no polynomial time algorithm for finding optimal solutions. Thus, we formulate the problem as an OMT specification with real-time constraints to minimize the number of fragmented packets, and then invoke off-the-shelf solvers, e.g., Microsoft Z3, to solve it. Our evaluations indicate that, in an acceptable time, the OMT-based method can find optimal solutions for small networks.

    Second, to improve the real-time performance of large networks, we calculate the worst-case delays of messages based on the recursive function shown in Theorem 2. Then,two corollaries are proposed on how to construct low-delay transmissions.

    Third, based on the two corollaries, a joint algorithm is proposed that uses packets from large to small to construct schedules under hard real-time constraints. Thus, the proposed joint algorithm strikes a balance between saving resources and temporality. Extensive test cases were run to evaluate the joint algorithm. The evaluation results demonstrate that, compared to existing algorithms, the proposed joint algorithm improves schedulability by up to 50% and increases a small number of packets.

    The rest of this paper is organized as follows: Section II reviews two categories of related work, including message fragmentation and real-time scheduling algorithms. Section III details the system model and problem. Section IV formulates the problem as an OMT specification. Section V proposes a heuristic algorithm to improve scalability of our algorithms.Section VI evaluates the proposed algorithms based on extensive test cases. Section VII concludes the paper.

    II. RELATED WORK

    Much research has been proposed to improve the real-time performance of industrial networks, e.g., real-time scheduling[9], resource allocation [10] and data recovery [11]. In this paper, we only focus on the real-time scheduling problem of industrial TSNs. The work in [5] formulates the basic scheduling problem of TSNs as a specification, and then uses an off-the-shelf solver to calculate schedules. Then, the work in [12] introduces the capacity limitation of TSN switches into the basic problem so that the proposed scheduling algorithms can be adopted in actual systems. Based on the above work,the work in [13] proposes a loose scheduling algorithm to transmit massive data packets using limited switch resources.In addition to the classical scheduling problem, some extended problems have been considered. The work in [14]proposes an incremental scheduling algorithm to handle dynamic data flows. The work in [15] focuses on the runtime reconfiguration of TSNs and designs a heuristic algorithm to minimize the impact of reconfiguring switches on existing data flows. The work in [16] proposes a joint routing and scheduling algorithm to guarantee the real-time performance of time-triggered communications and reduce the end-to-end delays of audio-video-bridging (AVB) communications. The work in [17] also focuses on the joint problem of routing and scheduling and evaluates extensive test cases to explore the practical limitations of the integer linear programming for TSNs. The work in [18] evaluates asynchronous scheduling algorithms in TSNs and demonstrates that asynchronous scheduling algorithms are suitable for sporadic communications. The work in [19] analyzes the worst-case delays of AVB communications based on network calculus,and then the real-time performance of AVB communications can be precisely assessed. No-wait scheduling can significantly improve system efficiency and has been widely researched in many industrial systems, e.g., energy-efficient production planning systems [20], metal-processing systems[21] and flexible manufacturing systems [22]. In [8], no-wait scheduling is introduced into TSNs. However, the objective of the above work is to minimize the total length of generated schedules. In this paper, communications have different realtime requirements, and the above work cannot be adopted.

    Message fragmentation is a widely used network technology. In Ethernet networks, to reduce the message response time, the work in [23], [24] optimizes and reconfigures the maximum transmission unit size. The work in[25] designs a middleware for Ethernet networks to fragment large objects so that the worst-case delay of object-oriented transmissions can be reduced. The work in [26] evaluates four fragmentation methods based on Ethernet networks. In wireless local area networks, the work in [27], [28] designs novel fragmentation algorithms to improve the throughput of streaming videos. In the 6LoWPAN protocol, the work in[29], [30] demonstrates that packet fragmentation is beneficial to energy consumption, throughput, and end-to-end delay. In delay tolerant networks, the work in [31] fragments large data items to multiple routing paths such that routing performance can be improved. In community antenna television networks,the work in [32] considers fragmentation and scheduling together. It first schedules real-time packets and then fragments best-effort packets to make them suitable for the free slots between successive real-time packets. In timetriggered Ethernet (TTEthernet) networks, a similar method is proposed to fragment event-triggered messages to make them schedulable in idle time intervals [33]. However, the above work cannot be applied to the multi-hop no-wait scheduling problem that is addressed in this paper, and there is no work to consider the effect of message fragmentation on no-wait scheduling. Therefore, in this paper, this effect will be analyzed, and joint algorithms will be proposed to improve network performance.

    III. SYSTEM MODEL AND PROBLEM STATEMENT

    In this section, we will detail our system model and problem. The symbols used in this paper are summarized in Appendix.

    A TSN is characterized by a two-tuple . The node set N={n1,n2,...} includes TSN switches with multiple ports and end systems with only one port. The element li,jin the link set L denotes a cable between nodes niand nj. TSN switches form a mesh topology, and then end systems are connected to the TSN switches, as shown in Fig.2. All ports and cables are full-duplex.

    Fig.2. A time sensitive network.

    In TSN switches, each egress port connects multiple queues,and each queue has a gate that can accurately control the sending of packets. Each TSN switch has a schedule table that records the precise times to open and close the gates. For example, as shown in Fig.3, at time 1, the table entry that controls port A: queue 0 is opened, and the other queues are closed. The queue with a smaller ID has lower priority. When more than one gate is opening, the packet buffered in the higher-priority queue can occupy the egress port. As described in the IEEE 802.1bQu standard, the packet in the higherpriority queue is allowed to interrupt the process of sending the packet in the lower-priority queue, and the interrupted packet will be re-assembled in the next switch. In no-wait scheduling, deterministic packets are assigned to the highestpriority queue, and the queue is always opened such that the packets will not be blocked. Although blocking packets may reduce conflicts and improve schedulability, our work still adopts no-wait scheduling for two reasons. First, no-wait scheduling is not limited by the size of the schedule table. In switch chips, the size of the schedule table is limited and fixed. Thus, switches support a limited number of gate operations. Since no-wait scheduling algorithms do not operate gates, they do not use the schedule table and do not need to consider the table size constraint. Second, under nowait scheduling, there is no schedule dissemination overhead.In a traditional network, a centralized scheduler disseminates the generated schedules to the corresponding network devices.However, under no-wait scheduling, switches forward the received packets immediately and do not need schedule information, so there is no schedule dissemination overhead.We ignore the other details of TSN switches since they have nothing to do with our proposed algorithms. Earlier works[13], [34] can help readers understand TSN switches in details.

    Fig.3. Architecture of a TSN switch.

    Transmitting methods are designed herein only for deterministic flows. Best-effort flows are delivered by the classical best-effort services. In the following, if no specific description is given, flows refer to deterministic flows. A flow in the flow set F is characterized by a four-tuple, which denotes the period, relative deadline,message size, and routing path, respectively. Flow figenerates a message of sibytes periodically with a period pi, and its relative deadline diis not greater than its period pi. It is assumed that all flows generate their first messages at time 0.The j -th message of flow fi, called message mi,j, is generated at time j×pi, and its absolute deadline is j×pi+di. The time interval [j×pi,j×pi+di) is called its active interval. Only determining how to transmit data in a hyperperiod H that is defined as the least common multiple of all periods, i.e.,H=LCM{p1,p2,...}, is considered here, after the first hyperperiod, the subsequent hyperperiods are periodically repeated. The transmission time of a packet with x bytes is equal to x/v, where v denotes the transmission speed. The routing path Πiis a link set, and Πi?L. A path is from an end system to another end system. Hence, the number of hops,denoted riand ri=|Πi|, is not less than 2. Since routing is already well-studied, in the proposed model all routing paths are the shortest and generated based on existing algorithms,e.g., [35], [36].

    From Fig.1, it can be seen that message fragmentation based on the fixed MSS is not suitable for improving real-time performance. To address this problem, first, the sizes of deterministic packets are changed based on the requirements of no-wait scheduling, and then the packets are injected at a specified time that is determined by the proposed real-time scheduling algorithm. However, the number of deterministic packets significantly affects network performance because the fragmented deterministic packets not only introduce extra packet headers but also interrupt best-effort packets.Therefore, given a network and a flow set, our proposed joint algorithm of message fragmentation and scheduling is to minimize the number of packets such that the following two requirements can be satisfied.

    1) Real-Time Requirement: All messages must be delivered to destinations before their absolute deadlines.

    2) No-Conflict Requirement: A unidirectional link cannot serve more than one packet at the same time.

    A flow set is called schedulable if it has a feasible schedule that meets all the requirements. A solution is called optimal if there are no other solutions with better objective values. When only linear networks are considered, and messages are too small to be fragmented, our problem is the same as the scheduling problem studied in [37]. Since the problem in [37]is NP-hard, our problem is also NP-hard. Therefore, to solve the problem, we propose two methods as shown in Fig.4.First, the problem is formulated as an OMT specification [38](in Section IV). Thus, if there exists a feasible solution, OMT solvers can find it. However, for some complex networks, the solvers cannot find any feasible solution in an acceptable time.Then, to improve the scalability of our algorithms, a heuristic algorithm is proposed (in Section V).

    Fig.4. Overview.

    IV. OMT SPECIFICATION

    Satisfiability modulo theories (SMT) have been widely used to determine whether a specification is satisfiable or not [39].An OMT is an extension of a SMT and allows finding an optimal objective based on a SMT specification.

    The inputs of the problem are network N and flow set F. To formulate the problem, we assume that a message is fragmented into, at most, U packets, which are denoted as{τi,j,1,τi,j,2,...,τi,j,U}. U is given by users. Three decision variables wi,j,g, si,j,gand ui,j,gare introduced. wi,j,gdenotes the injection time of packet τi,j,g. The size of packet τi,j,gis si,j,gbytes. If si,j,g=0 , τi,j,gis defined as invalid; otherwise, it is valid. The objective of this work is to minimize the number of valid packets. To calculate the number of valid packets, we use ui,j,gto denote whether a packet is valid or not. If τi,j,gis valid, i.e., si,j,g>0, then ui,j,g=1; otherwise, ui,j,g=0. Thus,the objective function is

    The minimizing problem respects the following constraints.

    1) Range Constraint: The ranges of the variables used in the proposed model are the following:

    If the size of a packet is greater than MS S, the packet has to be fragmented again on the IP layer. Thus, the upper bound of the packet size is MS S. The injection time of a packet must be between its generation time and deadline. To reduce the search space, we specify the order of packets: the packets are injected in increasing order of ID, and valid packets have smaller IDs than invalid packets.

    2) Size Constraint: A message is fragmented into several packets, and the sum of the size of these packets is equal to the size of the message. For each packet, based on the definition of ui,j,g, if the size of the packet is 0, the corresponding ui,j,gis also 0; otherwise, it is 1. The size constraints are as follows:

    3) Real-Time Constraint: If a packet is invalid, i.e., ?ui,j,gis true, its real-time constraints do not need to be considered;otherwise, its arrival time cannot be later than its deadline.The arrival time of a packet is equal to the injection time plus the transmission time ((si,j,g+e)/v×ri), where e is the size of a packet header. Thus, the real-time constraints are as follows:

    4) No-Conflict Constraint: For any two packets, under the following three conditions, we do not need to consider the conflict between them. First, the two packets are the same packet, i.e., for τi,j,gand τx,y,z, (i=x)∧(j=y)∧(g=z) is true.Second, not both packets are valid, i.e., ?ui,j,g∨?ux,y,zis true.Third, the two packets do not pass through the same directed link, i.e., (la,b?Πi)∨(la,b?Πx) is true. If the two packets do not satisfy any of the above conditions, the time intervals when they occupy the same link cannot overlap; otherwise,they conflict with each other. The constraints are as follows:

    where Ai,j,g(la,b) denotes the time of starting to transmit the packet on link la,b, i.e.,

    where qi,a,bdenotes that la,bis the qi,a,b-th hop in path Πi.Then, Ai,j,g(la,b)+(si,j,g+e)/v is the finish time of the packet on link la,b.

    OMT solvers can find the solution of the above specification. However, for complex problems, the execution time of off-the-shelf solvers is unacceptable. Therefore, in the next section, a fast algorithm is proposed to solve the problem.

    V. PROPOSED ALGORITHM

    Our algorithms schedule messages based on fixed priority scheduling [40], which is effective and has been widely used in real-time systems. Under fixed-priority scheduling, each message has an unique priority, and all the messages are scheduled in decreasing order of their priorities. For easy understanding, first, in Section V-A, we assume that priorities and message fragmentation have been determined. Based on the precondition, a basic fixed-priority scheduling algorithm(Algorithm 1) can calculate the injection times for all packets.Then, in Section V-B, based on the basic scheduling algorithm, the worst-case delays of messages are analyzed in order to determine what strategy can improve the real-time performance. Finally, in Section V-C, based on the analysis,our joint algorithm to fragment messages and schedule packets is proposed (as shown in Algorithm 3).

    A. Basic Scheduling

    To find the main factors that affect transmission delay, how packets are scheduled is presented in this section.

    Algorithm 1 is used to calculate the injection time for each packet. Each message mi,jhas a priority ρi,j. If ρi,j<ρx,y, then the scheduling algorithm calculates the injection time wi,j,gof the packets belonging to message mi,jfirst. Note that in Algorithm 1 it is assumed that all priorities ρi,jand message fragmentation {τi,j,1,τi,j,2,...} have been obtained. The method of obtaining these is introduced in Section V-C.

    Algorithm 1 Initial scheduling algorithm Input: , F, , , ?wi,j,g?ρi,j?si,j,g?ui,j,g Output: ?fi ∈F, ?j ∈[0, H 1: ;Γ ≠?pi), Γ=Γ+{mi,j}2: while do mi,jρi,jΓ 3: with the smallest is the highest-priority message in ;Γ=Γ ?{mi,j}4: ;5: for each do t=(j×pi) (j×pi+di ?si,j,g+e τi,j,g ∈Mi,j 6: for to do NoCon flict(t,τi,j,g)7: if then wi,j,g=t v×ri)8: ; break;9: if is not scheduled then 10: return FAIL;?wi,j,g τi,j,g 11: return ;

    Γ contains all of the unscheduled messages (Lines 1 and 4).In each iteration (Lines 2–10), Algorithm 1 calculates the injection time of the highest-priority message in Γ until there are no unscheduled messages. For message mi,j, the set Mi,jincludes all of its valid packets. The packets in Mi,jare assigned injection times (Lines 5–8) separately. If at time t a packet can be scheduled without conflict (the function NoCon flict() in Line 7), its injection time is t (Line 8). The function NoCon flict(t,τi,j,g) returns true if, when τi,j,gis injected into the network at time t, there is no conflict between τi,j,gand the other scheduled packets.

    B. Delay Analysis

    The end-to-end delay of a message is defined as the time duration between its generation time and its received time. In the following, analyzing the end-to-end delay of the message mi,jis considered. Based on Algorithm 1, it is known that the messages in the conflict set ?(mi,j) (Definition 1) determine the delay of mi,j. When all the messages of ?(mi,j) are transmitted in the active interval of mi,jand before the transmissions of mi,j, the worst-case delay of mi,joccurs.S(mi,j) is used to denote the packets that belong to the messages of ?(mi,j), and S(mi,j)={τa,b,g|?τa,b,g∈Ma,b,?ma,b∈?(mi,j)}.

    Definition 1: ?(mi,j) includes all of the messages ma,bthat satisfy the following conditions:

    1) ma,bhas a higher priority than mi,j, i.e., ρa(bǔ),b<ρi,j.

    2) ma,band mi,juse the same links, i.e., Πa∩Πi≠?.

    3) the active intervals of ma,band mi,joverlap each other,i.e., [b×pa,b×pa+da)∩[j×pi,j×pi+di)≠?.

    Based on Definition 1, it is known that the higher-priority messages in ?(mi,j) pass through the links of Πi, but maybe not all of them. However, as long as one of the hops of mi,jis delayed by the higher-priority messages, the entire mi,jis delayed. This is the same as transmitting higher-priority messages over the entire path. Hence, to bound the worst case,all of the higher-priority messages are extended to the entire path Πi, i.e., when the delay of mi,jis considered, the routing path of a higher-priority message ma,bis also Πi. This path extension does not result in an overestimation of the worst case or an underestimation of the conflicts from the higherpriority messages (as shown in Theorem 1). Intuitively,changing the path will cause more delay, or some conflicts may be neglected. However, in Theorem 1, we proved that the above situations do not exist.

    Theorem 1: In the proposed model, the path extension for the messages in set ?(mi,j) does not exacerbate the worst-case delay and does not lose the conflicts from the higher-priority messages.

    Proof: First, the worst case is discussed. The path extension does not allow messages to be transmitted in parallel since all of them occupy the same links. Owing to the conflicts introduced by other messages, when the delay of mi,jis analyzed, the start times of the higher-priority messages in?(mi,j) are unknown and can be any time. Thus, even though the paths are not extended, it is possible that the transmission times of the messages in ?(mi,j) do not overlap each other,i.e., they are serial. Therefore, the path extension does not exacerbate the worst case.

    Fig.5. Illustration of higher-priority message ma,b.

    Theorem 2: The generation time of mi,jis set to time 0, and the worst-case delay of mi,jis equal to the relative finish time of the last packet τσ+?bounded by a recursive function

    where

    and

    Proof: The finish time of a packet is equal to the finish time of its previous packet plus its own delay δ.

    First, the calculation in the subset {τ1,...,τσ} is explained.For the first packet τ1, its finish time is equal to its transmission time (see (8)). Then, for packet τk(2 ≤k ≤σ),the following two conditions correspond to the first two lines of δ(τk).

    Condition 1: k ≤σ and sk≤sk?1. If there is no other conflict outside Πi, τkshould be transmitted after τk?1in succession (as shown in Fig.6(a)). However, some external factors, such as the path outside Πiand the unknown relationship between the generation time of τkand transmission time of τk?1, may make τkmore delayed. This additional delay is called a gap (as shown in Fig.6(b)). When the gap length is less than (sk+e)/v, the time duration of τkoccupying l2overlaps the time duration of τk?1occupying l3.Thus, between τkand τk?1, no packet can be transmitted continuously on l2and l3. The gap can only be idle. In the worst case, the gap length is ((sk+e)/v)?ε, where ε approaches 0. If the gap length is greater ((sk+e)/v)?ε, then l2and l3can be used continuously, and a subsequent packet can be inserted. Although it is possible that due to the delays introduced by external factors the subsequent packets in S→(mi,j) cannot be inserted, the packets of mi,jcan be inserted because they do not have the path outside Πi. Therefore, the delay of δ(τk) is its transmission delay plus the worst-case gap.

    Fig.6. Illustration of Condition 1.

    Condition 2: k ≤σ and sk>sk?1. If the two packets can be transmitted in succession, the finish time of τkshould be Finish(τk?1)+ri×(sk+e)/v?(ri?1)×(sk?1+e)/v (as shown in Fig.7(a)). However, due to unknown conflict, there may be a gap (sk?1+e)/v?ε between the two packets (as shown in Fig.7(b)). Hence, the finish time of τkis

    Fig.7. Illustration of Condition 2.

    In Theorem 2, the impact of fragmentation and scheduling on the worst-case delay is formulated. Based on the theorem,we can prove Corollary 1 and Corollary 2. Then, the worstcase delay can be reduced by constructing a proper solution based on the two corollaries.

    Proof: First, we discuss S(mi,j) and Mi,j, respectively, and then consider the relationship between them.

    Algorithm 3 Joint algorithm Input: F, ?Mi,j?wi,j,g?Output: , →?=PriorityAssignment(F)1: ;2: = MSS; ;ˉsk=1 k ≤|→?|3: while do 4: fragment the -th message, denoted , into multiple packets of bytes;mi,jˉs k 5: for each do t=(j×pi) (j×pi+di ?si,j,g+e τi,j,g ∈Mi,j 6: for to do NoConflict(t,τi,j,g)v ×ri)7: if then wi,j,g=t 8: ; break;?τi,j,g ∈Mi,j 9: if is not scheduled then k?(mi,j)10: = the smallest ID in ;?g ∈[k,|→?|]g 11: , clear the injection times of the -th message; //*schedules roll back*//ˉs?=?12: ;ˉs<λ 13: if then 14: return FAIL;15: else k++16: ;?Mi,j?wi,j,g 17: return , ;

    VI. EVALUATION

    In this section, we evaluate the proposed algorithms based on extensive test cases. Three metrics are used in our evaluation: 1) schedulable ratio is the percentage of test cases for which an algorithm can find a feasible solution; 2) the number of packets is our objective as shown in 1); and 3)execution time is the time required to generate a feasible solution.

    The proposed joint algorithm (JA) and OMT-based method are compared with the following five methods: ME, ME+AD,ME+EN, JA-EN and BL.

    1) ME adopts the traditional Ethernet fragmentation and the earliest deadline first (EDF) scheduling algorithm [40].

    2) ME+AD is an extension of ME. If ME cannot schedule a test case under the initial MSS, ME+AD decreases the MSS by the same parameter ? as JA and re-schedules the test case.Repeat this process until the test case can be scheduled.

    3) ME+EN is also an extension of ME. The only difference between ME+EN and ME is that ME+EN enlarges the last packets of messages, while ME does not.

    4) JA-EN is the same as JA except that it does not enlarge the last packets.

    5) BL is a baseline for comparisons. To illustrate the efficiency of JA, an optimal result is needed. However, in an acceptable time, off-the-shelf solvers can only find optimal results for simple problems. Thus, when optimal results cannot be found, an approximately optimal result is needed,which is BL in our evaluations. When a schedulable ratio is considered, BL is defined as the percentage of test cases that satisfy the following necessary condition: if all port utilizations are not larger than 100%, the test case is schedulable. When the comparison metric is the number of packets, BL is the sum of packets that are fragmented by the traditional Ethernet fragmentation. Thus, BL is better than or equal to the optimal result. If the proposed algorithm is close to BL, it must be close to the optimal results.

    All algorithms are written in C and run on a Windows machine with a 2.5 GHz CPU and 8 GB of memory.

    All test cases are generated based on the parameters shown in Table I. Each test case includes n/2 switches and n/2 end systems. Each switch has 4 ports, one of which is connected to an end system, and the remaining ports can be connected to other switches. The switch-end system pairs are randomly located on a two-dimensional coordinate system. Then, the switches are traversed in increasing order of ID. For each switch, the free ports are connected to the nearest switches that still have free ports. To illustrate the universality of our algorithms, we do not limit the network topology. There are f flows. The flows randomly select their source and destination end systems. Routing paths are generated using the Dijkstra algorithm. To restrict the length of the hyperperiod, we adopt harmonic periods. Each period is a random number that is in the period range p and conforms to the expression 400 μs×2n,where n is a non-negative integer. Message sizes are random numbers in the message size range s. The deadline of a flow is also a random number in the range [pi/2,pi]. The transmission speed v=31 bytes/μs is measured in our simple prototype network such that the logical time of test cases can be mapped to the physical time. In the following comparisons, these parameters are changed and extensive test cases are generated to evaluate the efficiency and universality of the proposedalgorithm. In Section VI-A, we compare OMT with JA, ME and BL. Then, due to the long execution time of the OMT solver, in Section VI-B, except OMT, the other algorithms are fully evaluated.

    TABLE I PARAMETERS

    A. Evaluations With OMT

    The Microsoft solver Z3 [43] is invoked to solve the OMT specification. The time limit of Z3 is set as 600 s. To make test cases solvable, n=4 , f =4, and p={400 μs,800 μs} are set. The other parameters are shown in Fig.9 . For each parameter setting, 200 test cases are generated. Figs. 9 (a) and 9(b) show schedulable ratios and the number of packets normalized with BL, respectively. Since ME adopts traditional fragmentation, it does not introduce extra packets. However,the traditional algorithm has the worst schedulable ratio. OMT is not better than JA because Z3 cannot find optimal results for some test cases within the time limit. The schedulable ratio of JA is close to BL. This illustrates that JA can significantly improve the schedulability. Other than OMT, the other algorithms can finish execution within 10 ms. The execution time of OMT is shown in Fig.10. Most of the test cases can be solved by Z3 in 300 s. Once the execution time exceeds 300 s, it is difficult to solve these test cases in 600 s. The test cases in Fig.10 (b) have short execution times because they include the minimum number of packets, i.e., the minimum number of variables. Therefore, if a problem includes a small number of variables, OMT can be adopted to find optimal results; otherwise, JA is the best choice.

    Fig.10. Execution time of OMT.

    B. Evaluations Without OMT

    To fully evaluate the proposed algorithm, in the following,each parameter is changed over a larger range to generate test cases. The basic setting is shown in the caption of Fig.11.Then, Figs. 12–15 change the period parameter, size parameter, step value, and number of flows, respectively, to illustrate the efficiency and universality of JA. For each parameter setting, 2000 test cases are generated.

    Fig.11. Comparisons under varying n, p=[800 μs,6.4 ms] , s=[1461,5480],?=146, and f =n.

    Fig.12. Comparisons under varying n, p=[800 μs,12.8 ms], s=[1461,5480], ?=146, and f =n.

    Fig.13. Comparisons under varying n, p=[800 μss,6.4 ms], s=[1461,8760], ?=146, and f =n.

    Fig.14. Comparisons under varying n, p=[800 μs,6.4 ms], s=[1461,5480], ?=438, and f =n.

    Fig.15. Comparison under varying , p=[800 μs,6.4 ms], s=[1461,5480], ?=146, and n=20.

    Fig.11 shows the comparison with a varying the number of network nodes. The schedulable ratio decreases as the number of nodes increases. This is because the greater the number of nodes, the more difficult the scheduling becomes. ME+EN is better than ME. This is because ME makes more resource fragmentations unusable and cannot provide a long enough time duration to transmit no-wait packets. Fig.11 (b) shows the number of packets normalized with BL. ME and ME+EN are not shown since they both adopt the traditional fragmentation and have the same number of packets with BL.The larger the network, the longer the routing path. Thus,when n=60, to make flows schedulable, smaller packets are needed to improve the parallelism such that the delay introduced by the long path can be reduced. Therefore, the number of packets increases as n increases. Compared to ME,although JA introduces more packets, it still can find feasible solutions. This is because, in ME, different packet sizes cause excessive resource fragmentations. ME+AD uses many small packets to improve the parallelism. Thus, the schedulable ratio of ME+AD is slightly better than JA, but the number of packets of ME+AD is more than double that of JA. Therefore,in a network, if there are sufficient resources, the smaller MSS should be adopted to improve the real-time performance.Compared to JA, JA-EN causes more resource fragmentations. Hence, even though part of messages are fragmented into smaller packets to improve the parallelism,the schedulable ratio of JA-EN is still less than that of JA.

    The period range is extended to illustrate its effect on schedulable ratios and the number of packets, as shown in Fig.12. Compared to Fig.11(a), Fig.12(a) shows higher schedulable ratios because more time resources can be utilized to make flows satisfy real-time constraints. Then, since the real-time constraints are easily satisfied, messages do not need to be fragmented into small packets to reduce the delay. Thus,in Fig.12(b), the number of packets of JA is less than that in Fig.11(b). ME+AD makes full use of the time resources to improve the schedulability but results in too many packets.Compared to ME+AD, JA not only guarantees the requirements of deterministic communications but also reserves more resources for best-effort communications.

    In Fig.13, the message size is larger than that of other figures. Since large messages are difficult to schedule, the schedulable ratios in Fig.13(a) are low. Compared to JA,although ME+AD improves the schedulable ratio by 3%, it consumes more than twice the resources. JA-EN is close to JA because large messages can be fragmented into more packets so that JA-EN searchs fesabile solutions in a larger solution space. When n ≥50, no algorithm can schedule test cases, not even BL. Therefore, in real applications, the periods and deadlines of large messages must be extended to make them schedulable, as illustrated in Fig.12.

    In Fig.14, ? is increased. Messages cannot be fragmented into small pieces. Both the schedulable ratio and the number of packets are reduced. Other than ?, if the other parameters are changed, test cases are changed accordingly. Only ? is independent of test cases. Therefore, when given a real network, we can adjust ? to trade off between the schedulable ratio and the number of packets.

    Fig.15 shows the comparison under varying f. As f increases, the increased packets make more test cases unschedulable, and thus the schedulable ratio decreases. The number of packets increases slowly, because the test cases that contain more packets are unschedulable, and these unschedulable test cases are not included in the figure. When there are not many flows, the schedulable ratio of ME+EN is significantly higher than that of ME. Therefore, ME+EN is an efficient method for low-load test cases.

    VII. CONCLUSIONS

    In this paper, to improve the real-time performance of networked control systems, the joint problem of message fragmentation and no-wait scheduling is explored. First, an OMT specification is proposed and then an off-the-shelf solver utilized to find its optimal solution. However, the OMT-based algorithm is limited by the execution time of the off-the-shelf solver. Then, to improve the scalability of our algorithm, a heuristic algorithm is proposed. The algorithm constructs low-delay fragmentation and schedules based on the message delay analysis. Finally, extensive test cases are conducted to evaluate the proposed algorithms. The results indicate that the proposed joint algorithm outperforms existing ones. In the future, we will implement a TSN switch based on FPGA and evaluate our algorithms in a real TSN.

    APPENDIX SYMBOL

    色视频www国产| 波野结衣二区三区在线| 国产白丝娇喘喷水9色精品| 欧美日韩一区二区视频在线观看视频在线 | 亚洲第一电影网av| 亚洲,欧美,日韩| 在线观看av片永久免费下载| 十八禁网站免费在线| av视频在线观看入口| 麻豆乱淫一区二区| 97超碰精品成人国产| 国产精品综合久久久久久久免费| 我的女老师完整版在线观看| 色播亚洲综合网| 女人被狂操c到高潮| 亚洲中文日韩欧美视频| 日日啪夜夜撸| 一级毛片久久久久久久久女| 欧美中文日本在线观看视频| 国产成人freesex在线 | 久久人妻av系列| h日本视频在线播放| 91av网一区二区| 黄色视频,在线免费观看| 久99久视频精品免费| 国产成人a区在线观看| 亚洲专区国产一区二区| 99久久精品热视频| 欧美成人a在线观看| 欧美成人免费av一区二区三区| 欧美+日韩+精品| 神马国产精品三级电影在线观看| 亚洲无线在线观看| 麻豆精品久久久久久蜜桃| 国产在线男女| 日本与韩国留学比较| 十八禁网站免费在线| 午夜精品在线福利| av专区在线播放| 日本黄大片高清| 亚洲一级一片aⅴ在线观看| 精品久久久久久久末码| 老女人水多毛片| 亚洲av二区三区四区| 深夜a级毛片| 欧美性猛交╳xxx乱大交人| 可以在线观看的亚洲视频| 啦啦啦观看免费观看视频高清| 在线天堂最新版资源| 3wmmmm亚洲av在线观看| 国产av不卡久久| a级毛片免费高清观看在线播放| 深夜精品福利| 亚洲美女视频黄频| 五月伊人婷婷丁香| 日韩欧美一区二区三区在线观看| 日韩欧美一区二区三区在线观看| 长腿黑丝高跟| 欧美一区二区国产精品久久精品| or卡值多少钱| 69人妻影院| 日日摸夜夜添夜夜爱| 18禁在线无遮挡免费观看视频 | 你懂的网址亚洲精品在线观看 | 午夜精品国产一区二区电影 | 蜜臀久久99精品久久宅男| 97碰自拍视频| 少妇人妻一区二区三区视频| 国产 一区精品| 丰满的人妻完整版| 国产精品一区二区三区四区久久| 九九热线精品视视频播放| 日韩成人av中文字幕在线观看 | 黄色一级大片看看| 九九在线视频观看精品| 国产精品久久久久久亚洲av鲁大| 久久这里只有精品中国| 久久九九热精品免费| 精品一区二区三区av网在线观看| 亚洲电影在线观看av| 97超视频在线观看视频| 最近的中文字幕免费完整| 看片在线看免费视频| 国产乱人视频| 校园人妻丝袜中文字幕| 99久久成人亚洲精品观看| 高清午夜精品一区二区三区 | 男人和女人高潮做爰伦理| 亚洲在线观看片| 亚洲一区二区三区色噜噜| 麻豆国产97在线/欧美| 熟女人妻精品中文字幕| 赤兔流量卡办理| 人人妻人人澡欧美一区二区| 俄罗斯特黄特色一大片| 亚洲久久久久久中文字幕| 国产黄片美女视频| 国产精品一区二区三区四区久久| 成年免费大片在线观看| 国产精品国产高清国产av| 在线观看一区二区三区| 毛片女人毛片| 日日摸夜夜添夜夜添小说| 亚洲激情五月婷婷啪啪| 亚洲av熟女| 九九爱精品视频在线观看| 全区人妻精品视频| 91久久精品国产一区二区三区| 99热6这里只有精品| 尾随美女入室| 菩萨蛮人人尽说江南好唐韦庄 | 波多野结衣高清作品| av女优亚洲男人天堂| 在线国产一区二区在线| 国产三级在线视频| 69人妻影院| 国内久久婷婷六月综合欲色啪| 日本黄色视频三级网站网址| 嫩草影院精品99| 女人被狂操c到高潮| 成年版毛片免费区| 高清日韩中文字幕在线| 中文字幕精品亚洲无线码一区| 成人精品一区二区免费| 男女下面进入的视频免费午夜| 18禁在线无遮挡免费观看视频 | 俄罗斯特黄特色一大片| 国产大屁股一区二区在线视频| 亚洲欧美精品自产自拍| 久久综合国产亚洲精品| 老师上课跳d突然被开到最大视频| 成年女人看的毛片在线观看| 美女xxoo啪啪120秒动态图| 欧美成人精品欧美一级黄| 亚洲av二区三区四区| 国产精品人妻久久久影院| 精品人妻熟女av久视频| 日韩,欧美,国产一区二区三区 | 国产一区二区三区av在线 | 久久久久久久久久久丰满| 久久精品91蜜桃| 国产成人福利小说| 午夜福利成人在线免费观看| 亚洲欧美精品自产自拍| 听说在线观看完整版免费高清| 国产v大片淫在线免费观看| 婷婷精品国产亚洲av| 亚洲av美国av| 又爽又黄无遮挡网站| 白带黄色成豆腐渣| 精品久久国产蜜桃| 亚洲图色成人| 成人av一区二区三区在线看| 91在线精品国自产拍蜜月| 直男gayav资源| 国产一级毛片七仙女欲春2| 国产精品三级大全| 蜜桃亚洲精品一区二区三区| 寂寞人妻少妇视频99o| 久久久久久大精品| 精品久久久久久久久久久久久| 国产熟女欧美一区二区| 观看美女的网站| 99热这里只有精品一区| 国产女主播在线喷水免费视频网站 | 天堂影院成人在线观看| 亚洲自拍偷在线| 嫩草影院入口| 国产精品人妻久久久久久| 男人舔女人下体高潮全视频| 少妇人妻精品综合一区二区 | 亚洲电影在线观看av| or卡值多少钱| 午夜福利成人在线免费观看| 男人舔奶头视频| 成人午夜高清在线视频| 成人欧美大片| 搡女人真爽免费视频火全软件 | 欧美+日韩+精品| 免费av毛片视频| 成人性生交大片免费视频hd| 伦精品一区二区三区| 九九久久精品国产亚洲av麻豆| 简卡轻食公司| 在线观看免费视频日本深夜| 成人漫画全彩无遮挡| 欧洲精品卡2卡3卡4卡5卡区| 男女啪啪激烈高潮av片| 国模一区二区三区四区视频| 成人永久免费在线观看视频| 亚洲自偷自拍三级| 亚洲国产精品久久男人天堂| 久久欧美精品欧美久久欧美| 插阴视频在线观看视频| 大又大粗又爽又黄少妇毛片口| 午夜福利高清视频| 国产精品久久久久久av不卡| av在线亚洲专区| 久久99热这里只有精品18| 亚洲国产色片| 欧美区成人在线视频| 日本精品一区二区三区蜜桃| 色视频www国产| 99视频精品全部免费 在线| 国产一区二区三区在线臀色熟女| 国内精品久久久久精免费| 色在线成人网| 一进一出抽搐动态| 久久久久国产网址| 十八禁网站免费在线| 国产v大片淫在线免费观看| 色哟哟哟哟哟哟| 日韩欧美免费精品| 99热精品在线国产| 精品国产三级普通话版| 97超级碰碰碰精品色视频在线观看| 国语自产精品视频在线第100页| 国产一区二区在线av高清观看| 极品教师在线视频| 久久精品人妻少妇| 国模一区二区三区四区视频| 看免费成人av毛片| 欧美一区二区国产精品久久精品| 国产在线精品亚洲第一网站| 91av网一区二区| 国产片特级美女逼逼视频| 又黄又爽又免费观看的视频| 国产av不卡久久| 精品99又大又爽又粗少妇毛片| 国产免费一级a男人的天堂| 搡老妇女老女人老熟妇| 久久久精品大字幕| 国产高清激情床上av| 非洲黑人性xxxx精品又粗又长| 人人妻人人澡人人爽人人夜夜 | 男女那种视频在线观看| 国产 一区精品| 亚洲国产精品成人久久小说 | 搡女人真爽免费视频火全软件 | 三级国产精品欧美在线观看| 亚洲高清免费不卡视频| 国产成人freesex在线 | 三级男女做爰猛烈吃奶摸视频| 久久久精品欧美日韩精品| 久久久a久久爽久久v久久| 成人三级黄色视频| 在线免费观看不下载黄p国产| 免费av不卡在线播放| 嫩草影院精品99| 亚洲人成网站高清观看| 一进一出好大好爽视频| 99久国产av精品| 99久久久亚洲精品蜜臀av| 欧美激情在线99| 午夜日韩欧美国产| 亚洲国产欧美人成| 亚洲三级黄色毛片| av免费在线看不卡| 校园春色视频在线观看| 最好的美女福利视频网| 可以在线观看的亚洲视频| 欧美日韩综合久久久久久| 欧美日韩乱码在线| 日韩成人伦理影院| 国产一区二区亚洲精品在线观看| 99热这里只有是精品50| 精品一区二区免费观看| 亚洲av电影不卡..在线观看| 亚洲欧美日韩无卡精品| 一级黄片播放器| 不卡一级毛片| 日本一二三区视频观看| 亚洲av二区三区四区| 一级毛片久久久久久久久女| 国产精品不卡视频一区二区| 国产黄a三级三级三级人| 日韩欧美国产在线观看| 色综合亚洲欧美另类图片| 亚洲成a人片在线一区二区| 日本-黄色视频高清免费观看| 最近中文字幕高清免费大全6| 啦啦啦观看免费观看视频高清| 久久精品国产亚洲av香蕉五月| 成人鲁丝片一二三区免费| 免费在线观看影片大全网站| 一本一本综合久久| 亚洲,欧美,日韩| 美女免费视频网站| 哪里可以看免费的av片| 国产不卡一卡二| 亚洲四区av| 日日摸夜夜添夜夜添av毛片| 日韩精品有码人妻一区| 日本欧美国产在线视频| 成人永久免费在线观看视频| 亚洲av免费在线观看| 最近的中文字幕免费完整| 欧美日本视频| 97人妻精品一区二区三区麻豆| av视频在线观看入口| 国产探花在线观看一区二区| 午夜福利18| 精品欧美国产一区二区三| 亚洲无线观看免费| 久久精品国产清高在天天线| 亚洲va在线va天堂va国产| 国产精品人妻久久久久久| 日韩欧美一区二区三区在线观看| 51国产日韩欧美| 国产精品亚洲美女久久久| 亚洲18禁久久av| 男人狂女人下面高潮的视频| 夜夜看夜夜爽夜夜摸| 日本a在线网址| av在线老鸭窝| 自拍偷自拍亚洲精品老妇| 69人妻影院| 欧美潮喷喷水| 黄片wwwwww| 春色校园在线视频观看| 亚洲性久久影院| 久久人人爽人人爽人人片va| 国产精品伦人一区二区| 国产熟女欧美一区二区| 亚洲七黄色美女视频| 又黄又爽又刺激的免费视频.| 不卡一级毛片| 国产精品三级大全| 久久精品国产99精品国产亚洲性色| 老熟妇乱子伦视频在线观看| 国产成年人精品一区二区| 三级毛片av免费| 日韩精品中文字幕看吧| 国产精品人妻久久久影院| 国产精品一二三区在线看| 国产白丝娇喘喷水9色精品| 亚洲熟妇中文字幕五十中出| 国产日本99.免费观看| 国内精品一区二区在线观看| 一进一出好大好爽视频| 国产中年淑女户外野战色| 看十八女毛片水多多多| 国产高清视频在线观看网站| 精品日产1卡2卡| 国产亚洲精品久久久久久毛片| 激情 狠狠 欧美| 久久精品国产亚洲av天美| 永久网站在线| 国产欧美日韩一区二区精品| 国内精品美女久久久久久| 在线观看午夜福利视频| 在线a可以看的网站| 欧美在线一区亚洲| 亚洲最大成人中文| 欧美日韩乱码在线| 中文资源天堂在线| 嫩草影院新地址| 亚洲性久久影院| 深爱激情五月婷婷| 少妇熟女aⅴ在线视频| 超碰av人人做人人爽久久| 人人妻人人看人人澡| 精品久久久久久久久av| 久久久欧美国产精品| 亚洲精品国产成人久久av| 亚洲中文日韩欧美视频| 中文字幕熟女人妻在线| 日韩成人伦理影院| 日本爱情动作片www.在线观看 | 我要看日韩黄色一级片| 欧美人与善性xxx| 免费观看人在逋| 中文资源天堂在线| а√天堂www在线а√下载| 国产精品亚洲美女久久久| 免费大片18禁| 国产成人freesex在线 | 国产高清视频在线播放一区| 狂野欧美白嫩少妇大欣赏| 亚洲激情五月婷婷啪啪| 欧美丝袜亚洲另类| 午夜福利18| 一级av片app| av国产免费在线观看| 欧美中文日本在线观看视频| 最新中文字幕久久久久| 国产精品伦人一区二区| 色哟哟哟哟哟哟| 嫩草影院新地址| 日韩欧美国产在线观看| 婷婷精品国产亚洲av在线| 春色校园在线视频观看| 欧美+日韩+精品| 国产成年人精品一区二区| 亚洲成a人片在线一区二区| 亚洲第一区二区三区不卡| 日韩亚洲欧美综合| 久久欧美精品欧美久久欧美| 久久精品国产99精品国产亚洲性色| 亚洲国产精品sss在线观看| 亚洲成a人片在线一区二区| 成人特级黄色片久久久久久久| 日韩av在线大香蕉| 可以在线观看毛片的网站| 99热网站在线观看| 亚洲最大成人手机在线| 成人综合一区亚洲| av在线观看视频网站免费| 我要看日韩黄色一级片| 精品熟女少妇av免费看| 国产精品一及| 亚洲欧美日韩高清在线视频| 亚洲精品国产成人久久av| 久久久久免费精品人妻一区二区| 黄色视频,在线免费观看| 精品少妇黑人巨大在线播放 | 久久久成人免费电影| 精品人妻一区二区三区麻豆 | 欧美极品一区二区三区四区| 日日撸夜夜添| 一级毛片aaaaaa免费看小| 狂野欧美激情性xxxx在线观看| 日韩在线高清观看一区二区三区| 两个人视频免费观看高清| 亚洲av二区三区四区| 午夜免费激情av| 国产精品一区二区性色av| 亚洲国产精品成人久久小说 | 最近视频中文字幕2019在线8| 中文资源天堂在线| 免费搜索国产男女视频| 永久网站在线| 免费在线观看成人毛片| 久久精品国产自在天天线| 国产av一区在线观看免费| 国产精品人妻久久久影院| a级一级毛片免费在线观看| a级毛片a级免费在线| 久久亚洲国产成人精品v| 狠狠狠狠99中文字幕| 亚洲专区国产一区二区| 亚洲国产精品成人久久小说 | 免费看美女性在线毛片视频| 又黄又爽又免费观看的视频| 亚洲欧美清纯卡通| 国产三级中文精品| 午夜福利成人在线免费观看| 99热只有精品国产| 午夜日韩欧美国产| 亚洲国产精品成人综合色| 在线a可以看的网站| 在现免费观看毛片| 亚洲精品一区av在线观看| 成熟少妇高潮喷水视频| 国产私拍福利视频在线观看| 真人做人爱边吃奶动态| 精品国产三级普通话版| 国产大屁股一区二区在线视频| 国产亚洲91精品色在线| 国产午夜精品论理片| 免费搜索国产男女视频| 国产午夜福利久久久久久| 成人性生交大片免费视频hd| 国产 一区精品| 亚洲第一电影网av| 亚洲国产欧美人成| 久久久久国产网址| 国内精品宾馆在线| 最好的美女福利视频网| 亚洲图色成人| 亚洲精品粉嫩美女一区| 免费看光身美女| 一级毛片我不卡| 免费在线观看影片大全网站| 欧美3d第一页| 色吧在线观看| 亚洲成av人片在线播放无| 丝袜美腿在线中文| av在线蜜桃| 美女高潮的动态| 久久久成人免费电影| 99精品在免费线老司机午夜| 精品免费久久久久久久清纯| 久久精品91蜜桃| 国产中年淑女户外野战色| 欧美bdsm另类| 精品久久久久久久久久免费视频| 俄罗斯特黄特色一大片| 日本成人三级电影网站| 久99久视频精品免费| 一级a爱片免费观看的视频| 久久精品国产鲁丝片午夜精品| 亚洲熟妇熟女久久| 欧美人与善性xxx| 在线观看午夜福利视频| 波多野结衣高清无吗| 特大巨黑吊av在线直播| 亚州av有码| 日韩成人伦理影院| 中国美女看黄片| 日韩人妻高清精品专区| 99热这里只有精品一区| 精品久久久久久久久av| 黄色一级大片看看| 麻豆成人午夜福利视频| 国产三级在线视频| 国产又黄又爽又无遮挡在线| 成人特级av手机在线观看| 色综合色国产| 最近在线观看免费完整版| 亚洲欧美日韩无卡精品| 精品久久久久久久久久免费视频| 免费大片18禁| 日本黄色视频三级网站网址| 日本黄色片子视频| 久久中文看片网| 小蜜桃在线观看免费完整版高清| 亚洲精品影视一区二区三区av| 日本免费一区二区三区高清不卡| 亚洲人成网站在线播| 99在线人妻在线中文字幕| 亚洲欧美日韩东京热| 日韩欧美精品免费久久| av中文乱码字幕在线| 精品久久久久久久久久久久久| 丰满乱子伦码专区| 白带黄色成豆腐渣| 国产黄色视频一区二区在线观看 | 日韩一本色道免费dvd| 亚洲欧美精品综合久久99| 日韩欧美三级三区| 国产免费男女视频| 老司机影院成人| 美女免费视频网站| 国产探花在线观看一区二区| 欧美zozozo另类| 国产高清视频在线播放一区| 99热这里只有精品一区| 久久精品综合一区二区三区| 亚洲精品一卡2卡三卡4卡5卡| 国产人妻一区二区三区在| 美女免费视频网站| 精品国内亚洲2022精品成人| а√天堂www在线а√下载| 三级国产精品欧美在线观看| 极品教师在线视频| 国产黄a三级三级三级人| 色综合色国产| 五月玫瑰六月丁香| 精品少妇黑人巨大在线播放 | 天天躁日日操中文字幕| ponron亚洲| 高清毛片免费看| 女生性感内裤真人,穿戴方法视频| 亚洲av五月六月丁香网| 国产人妻一区二区三区在| 国内揄拍国产精品人妻在线| 少妇的逼水好多| 国模一区二区三区四区视频| 免费看a级黄色片| 真实男女啪啪啪动态图| 精品免费久久久久久久清纯| 日韩欧美 国产精品| 色av中文字幕| 麻豆国产97在线/欧美| 人人妻人人澡人人爽人人夜夜 | 欧美日韩一区二区视频在线观看视频在线 | 一边摸一边抽搐一进一小说| 久久欧美精品欧美久久欧美| 国产aⅴ精品一区二区三区波| 黄色视频,在线免费观看| 成人特级黄色片久久久久久久| 又爽又黄无遮挡网站| 长腿黑丝高跟| 国语自产精品视频在线第100页| 精品无人区乱码1区二区| www.色视频.com| 亚洲成av人片在线播放无| 美女cb高潮喷水在线观看| 美女免费视频网站| 国产激情偷乱视频一区二区| 亚洲高清免费不卡视频| 午夜影院日韩av| 国产在线精品亚洲第一网站| 成人午夜高清在线视频| 日韩av不卡免费在线播放| 乱码一卡2卡4卡精品| 搡老妇女老女人老熟妇| 久久热精品热| 亚洲国产精品国产精品| 国产精品爽爽va在线观看网站| 欧美日韩一区二区视频在线观看视频在线 | 国产精品嫩草影院av在线观看| 一级a爱片免费观看的视频| 日日摸夜夜添夜夜添小说| 成人无遮挡网站| 久久国产乱子免费精品| 99热精品在线国产| 亚洲av电影不卡..在线观看| 亚洲18禁久久av| 国产黄片美女视频| 日本黄色片子视频| 国产黄a三级三级三级人| 国产高清不卡午夜福利| 国产单亲对白刺激| АⅤ资源中文在线天堂| 变态另类成人亚洲欧美熟女| 欧美中文日本在线观看视频| 男女边吃奶边做爰视频| 高清午夜精品一区二区三区 | 成人高潮视频无遮挡免费网站| av女优亚洲男人天堂| 久久久久久伊人网av| 伦精品一区二区三区| 午夜爱爱视频在线播放|