免费国产一级毛卡片视频app

    1. <form id=HNqrReUUs><nobr id=HNqrReUUs></nobr></form>
      <address id=HNqrReUUs><nobr id=HNqrReUUs><nobr id=HNqrReUUs></nobr></nobr></address>

      Personal tools

      atm_tutorial_ebrahim.txt

      A Brief Tutorial on ATM (DRAFT)
      -----------------------

      Zahir Ebrahim

      March 5, 1992




      0.0 Preamble
      ------------

      This tutorial is an attempt to qualitatively present the ATM concepts,
      and to introduce it gently to readers unfamiliar with the subject.
      The purpose of this writeup is to bring interested readers up to speed
      on what the heck is this "ATM". There are also some "opinions" presented
      in this writeup. Please feel to disagree. And if I may have mis-stated
      some fact or something is in error, I would be happy to learn about it.

      If the reader is interested in knowing the exact bit locations
      in the ATM header, or how to design and implement an ATM interface card,
      or other facts and figures about interconnect speeds etc, he/she is
      directed towards the copious ATM standards committees documents where
      the latest and greatest information is available in the most
      excruciating detail.


      1.0 What is this acronym ATM ?
      -----------------------------

      ATM stands for (no not automated teller machines) "Asynchronous Transfer
      Mode". It is primarily driven by telecommunications companies and is a
      proposed telecommunications standard for Broadband ISDN.


      2.0 Motivation for ATM
      ----------------------

      In order to understand what ATM is all about, a brief introduction
      to STM is in order. ATM is the complement of STM which stands for
      "Synchronous Transfer Mode". STM is used by telecommunication backbone
      networks to transfer packetized voice and data across long distances. It
      is a circuit switched networking mechanism, where a connection is
      established between two end points before data transfer commences, and
      torn down when the two end points are done. Thus the end points allocate
      and reserve the connection bandwidth for the entire duration, even when
      they may not actually be transmitting the data. The way data is
      transported across an STM network is to divide the bandwidth of the STM
      links (familiar to most people as T1 and T3 links) into a fundamental
      unit of transmission called time-slots or buckets. These buckets are
      organized into a train containing a fixed number of buckets and are
      labeled from 1 to N. The train repeats periodically every T timeperiod,
      with the buckets in the train always in the same position with the same
      label. There can be up to M different trains labeled from 1 to M, all
      repeating with the time period T, and all arriving within the time
      period T. The parameters N, T, and M are determined by standards
      committees, and are different for Europe and America. For the trivia
      enthusiasts, the timeperiod T is a historic legacy of the classic
      Nyquist sampling criteria for information recovery. It is derived from
      sampling the traditional 4Khz bandwidth of analog voice signals over
      phone lines at twice its frequency or 8Khz, which translates to a
      timeperiod of 125 usec. This is the most fundamental unit in almost all
      of telecommunications today, and is likely to remain with us for a long
      time.

      On a given STM link, a connection between two end points is assigned a
      fixed bucket number between 1 and N, on a fixed train between 1 and M,
      and data from that connection is always carried in that bucket number on
      the assigned train. If there are intermediate nodes, it is possible that
      a different bucket number on a different train is assigned on each STM
      link in the route for that connection. However, there is always one
      known bucket reserved a priori on each link throughout the route. In
      other words, once a time-slot is assigned to a connection, it generally
      remains allocated for that connections sole use throughout the life time
      of that connection.

      To better understand this, imagine the same train arriving at a station
      every T timeperiod. Then if a connection has any data to transmit, it
      drops its data into its assigned bucket(time-slot) and the train
      departs. And if the connection does not have any data to transmit, that
      bucket in that train goes empty. No passengers waiting in line can get
      on that empty bucket. If there are a large number of trains, and a large
      number of total buckets are going empty most of the time (although
      during rush hours the trains may get quite full), this is a significant
      wastage of bandwidth, and limits the number of connections that can be
      supported simultaneously. Furthermore, the number of connections can
      never exceed the total number of buckets on all the different trains
      (N*M). And this is the raison-d'etre for ATM.


      3.0 Advent of ATM
      -----------------

      The telecommunications companies are investigating fiber optic cross
      country and cross oceanic links with Gigabit/sec speeds, and would like
      to carry in an integrated way, both real time traffic such as voice and
      hi-res video which can tolerate some loss but not delay, as well as non
      real time traffic such as computer data and file transfer which may
      tolerate some delay but not loss. The problem with carrying these
      different characteristics of traffic on the same medium in an integrated
      fashion is that the peak bandwidth requirement of these traffic sources
      may be quite high as in high-res full motion video, but the duration for
      which the data is actually transmitted may be quite small. In other
      words, the data comes in bursts and must be transmitted at the peak rate
      of the burst, but the average arrival time between bursts may be quite
      large and randomly distributed. For such bursty connections, it would be
      a considerable waste of bandwidth to reserve them a bucket at their peak
      bandwidth rate for all times, when on the average only 1 in 10 bucket
      may actually carry the data. It would be nice if that bucket could be
      reused for another pending connection. And thus using STM mode of
      transfer becomes inefficient as the peak bandwidth of the link, peak
      transfer rate of the traffic, and overall burstiness of the traffic
      expressed as a ratio of peak/average, all go up. In the judgement of the
      industry pundits, this is definitely the indicated trend for multimedia
      integrated telecommunications and data communications demands of global
      economies in the late 90's and early 21st century.

      Hence ATM is conceived. It was independently proposed by Bellcore, the
      research arm of AT&T in the US, and several giant telecommunications
      companies in Europe, which is why there may be two possible standards in
      the future. The main idea here was to say, instead of always identifying
      a connection by the bucket number, just carry the connection identifier
      along with the data in any bucket, and keep the size of the bucket small
      so that if any one bucket got dropped enroute due to congestion, not too
      much data would get lost, and in some cases could easily be recovered.
      And this sounded very much like packet switching, so they called it
      "Fast packet switching with short fixed length packets." And the fixed
      size of the packets arose out of hidden motivation from the
      telecommunications companies to sustain the same transmitted voice
      quality as in STM networks, but in the presence of some lost packets on
      ATM networks.

      Thus two end points in an ATM network are associated with each other via
      an identifier called the "Virtual Circuit Identifier" (VCI label)
      instead of by a time-slot or bucket number as in a STM network. The VCI
      is carried in the header portion of the fast packet. The fast packet
      itself is carried in the same type of bucket as before, but there is no
      label or designation for the bucket anymore. The terms fast packet,
      cell, and bucket are used interchangeably in ATM literature and refer to
      the same thing.


      4.0 Statistical Multiplexing
      ----------------------------

      Fast packet switching is attempting to solve the unused bucket problem
      of STM by statistically multiplexing several connections on the same
      link based on their traffic characteristics. In other words, if a large
      number of connections are very bursty (i.e. their peak/average ratio is
      10:1 or higher), then all of them may be assigned to the same link in
      the hope that statistically they will not all burst at the same time.
      And if some of them do burst simultaneously, that that there is
      sufficient elasticity that the burst can be buffered up and put in
      subsequently available free buckets. This is called statistical
      multiplexing, and it allows the sum of the peak bandwidth requirement of
      all connections on a link to even exceed the aggregate available
      bandwidth of the link under certain conditions of discipline. This was
      impossible on an STM network, and it is the main distinction of an ATM
      network.


      5.0 The ATM discipline and future challenges
      --------------------------------------------

      The discipline conditions under which statistical multiplexing can work
      efficiently in an ATM network are an active area of research and
      experimentation in both academia and industry. It has also been a
      prodigious source of technical publications and considerable
      speculations. Telecommunications companies in the US, Europe, and Japan
      as well as several research organizations and standards committees are
      actively investigating how BEST to do statistical multiplexing in such a
      way that the link bandwidth in an ATM network is utilized efficiently,
      and the quality of service requirements of delay and loss for different
      types of real time and non real time as well as bursty and continuous
      traffics are also satisfied during periods of congestion. The reason why
      this problem is so challenging is that if peak bandwidth requirement of
      every connection is allocated to it, then ATM just degenerates into STM
      and no statistical advantage is gained from the anticipated bursty
      nature of many of the future broadband integrated traffic profiles.

      Thus the past few years publications in "IEEE Journal of Selected Areas
      in Communications" and the "IEEE Network and Communications Magazines"
      are filled with topics of resource allocation in broadband networks,
      policing metering and shaping misbehaving traffic and congestion
      avoidance and control in ATM networks, and last but not least,
      multitudinous mathematical models and classifications speculating what
      the broadband integrated traffic of the future might actually look like,
      and how it might be managed effectively in a statistics based
      nondeterministic traffic transportation system such as an ATM network.
      The more adventurous readers desirous of learning more about ATM
      networks are encouraged to seek out these and the standards committees
      publications.
      Fortunately however, these are problems that the service providers and
      ATM vendors like the telecommunications companies have to solve, and not
      the users. The users basically get access to the ATM network through
      well defined and well controlled interfaces called "User Network
      Interface" (UNI), and basically pump data into the network based on
      certain agreed upon requirements that they specify to the network at
      connection setup time. The network will then try to ensure that the
      connection stays within those requirements and that the quality of
      service parameters for that connection remain satisfied for the entire
      duration of the connection.


      6.0 Who are the standards bodies investigating ATM ?
      --------------------------------------------------

      In the US, ATM is being supported and investigated by T1S1 subcommittee
      (ANSI sponsored). In Europe, it is being supported and investigated by
      ETSI. There are minor differences between the two proposed standards,
      but may converge into one common standard, unless telecommunications
      companies in Europe and America insist on having two standards so that
      they can have the pleasure of supporting both to inter-operate. The
      differences however are minor and do not impact the concepts discussed
      here. The international standards organization CCITT has also dedicated
      a study group XVIII to Broadband ISDN with the objective of merging
      differences and coming up with a single global worldwide standard for
      user interfaces to Broadband networks. No conclusions yet.


      7.0 Types of User Network Interfaces (UNI) for ATM
      --------------------------------------------------

      It is envisioned that the ATM network service providers may offer
      several types of interfaces to their networks. One interface that is
      likely to be popular with companies that build routers and bridges for
      local area networks is a Frame based interface. One or more of the IEEE
      802.X or FDDI frames may be supported at the UNI, with frame to ATM cell
      conversion and reassembly being done inside the UNI at the source and
      destination end points respectively. Thus a gateway host on a local area
      network might directly connect its ethernet, token ring, fddi, or other
      LAN/MAN interface to the UNI, and thus bridge two widely separated LANs
      with an ATM backbone network. This will preserve the existing investment
      in these standards and equipments, and enable a gradual transition of
      the ATM networks into the market place.

      An alternate interface likely to be more popular in the longer run, and
      for which the concept of Broadband-ISDN really makes sense, is direct
      interface at the UNI with standard ATM cells. Such a streaming interface
      can hook subscriber telecom, datacom, and computer equipment directly to
      the network, and allow orders of magnitude greater performance and
      bandwidth utilization for integrated multimedia traffic of the future.
      Thus it is by no accident that the IEEE 802.6 packet for the MAC layer
      of the Metropolitan Area Network (MAN) DQDB protocol (Distributed Queue
      Dual Bus) looks very much like an ATM cell.

      It is quite likely that companies may crop up (if they have not already
      done so) to design ATM multiplexers for interface to the UNI of a larger
      ATM backbone network. Especially if the CCITT succeeds in standardizing
      an interface definition for UNI, it will be an additional boon to this
      market. The multiplexers with multiple taps on the user side can connect
      to one fat ATM pipe at the network side. Such a multiplexer would hide
      the details of ATM network interface from the user, and provide simple,
      easy to use, low cost ATM cell taps to hook the user equipment into.

      Companies with investment in existing STM networks such as T1 and T3
      backbones, are likely to want a direct T3 interface to the UNI, thus
      allowing them to slowly integrate the newer ATM technology into their
      existing one. Thus it is possible to see a flurry of small startups in
      the future rushing to make large T3 multiplexers for connecting several
      T3 pipes into one large ATM pipe at the UNI.

      Typically, an ATM network will require a network management agent or
      proxy to be running at every UNI which can communicate and exchange
      administrative messages with the user attachments at the UNI for
      connection setup, tear down, and flow control of the payload using some
      standard signalling protocol. A direct user attachment at the UNI is
      likely to cost more and be more complex, then a user attachment to
      something which in turns interfaces to the UNI.


      8.0 What does an ATM packet look like
      ------------------------------------

      An ATM cell or packet as specified by T1S1 sub-committee is 53 bytes. 5
      bytes comprise the header, and 48 bytes are payload. The header and
      payload are specified as follows:

      <------------- 5 bytes ---------------->|<---------- 48 bytes --------- >|
      -------------------------------------------------------------------------
      | VCI Label | control | header checksum | optional adaptation | payload |
      | 24 bits | 8 bits | 8 bits | layer 4 bytes |44 or 48 |
      -------------------------------------------------------------------------

      The 48 bytes of payload may optionally contain a 4 byte ATM adaptation
      layer and 44 bytes of actual data, or all 48 bytes may be data, based on
      a bit in the control field of the header. This enables fragmentation and
      reassembly of cells into larger packets at the source and destination
      respectively. (Since the header definition may still be in flux, it is
      possible that presense or absence of an adaptation layer information may
      not be explicitly indicated with a bit in the header, but rather
      implicitly derived from the VCI label). The control field may also
      contain a bit to specify whether this is a flow control cell or an
      ordinary cell, an advisory bit to indicate whether this cell is dropable
      in the face of congestion in the network or not, etc.

      The ETSI definition of an ATM cell is similar, 53 bytes cell size, 5
      byte header, 48 bytes data. However the difference is in number of bits
      for the VCI field, number of bits in the header checksum, and semantics
      and number of some of the control bits.

      For a more detailed specification of the ATM header, see the appropriate
      standards committees documents.


      9.0 Connections on an ATM network
      ---------------------------------

      As in STM networks, where a datum may undergo a time-slot-interchange
      between two intermediate nodes in a route, the VCI label in an ATM cell
      may also undergo a VCI label interchange at intermediate nodes in the
      route. Otherwise, the connections in the ATM network look remarkably
      similar to STM networks.

      An Example:

      Assume an ATM network with nodes in NY, ATLANTA, DALLAS, and SF. Say
      that Chuck while vacationing in NY decides to play Aviator with his
      buddies in Mtn view who are still grinding away on MPsniff. Also assume
      that we have ATM cell interfaces at UNI's in both NY and SF. This is
      what can happens: Chuck's portable $3K laptop makes a connection request
      to the UNI in NY. After an exchange of connection parameters between his
      laptop and the UNI (such as destination, traffic type, peak and average
      bandwidth requirement, delay and cell loss requirement, how much money
      he has got left to spend, etc}, the UNI forwards the request to the
      network. The software running on the network computes a route based on
      the cost function specified by Chuck, and figures out which links on
      each leg of the route can best support the requested quality of service
      and bandwidth. Then it sends a connection setup request to all the nodes
      in the path enroute to the destination node in SF.

      Lets say that the route selected was NY--AT--DA--SF. Each of the four
      nodes might pick an unused VCI label on their respective nodes and
      reserve it for the connection in the connection lookup tables inside
      their respective switches. Say, NY picks VC1. It will send it to AT. AT
      in turn picks VC2, associates it with VC1 in its connection table, and
      forwards VC2 to DA. DA picks VC3 and associates it with VC2 in its
      connection tables and forwards VC3 to SF. SF picks VC4 and associates it
      with VC3 in its connection tables, and pings the addressed UNI to see if
      it would accept this connection request. Fortunately, the UNI finds
      Chuck's buddies and returns affirmative. So SF hands the UNI and Chuck's
      friends VC4 as a connection identifier for this connection. SF then acks
      back to DA. DA acks back to AT and sends it VC3. AT puts VC3 in its
      connection tables to identify the path going in the reverse direction,
      and acks to NY sending it VC2. NY associates VC2 in its connection
      tables with VC1, and acks the originating UNI with VC1. The UNI hands
      chuck's laptop VC1 and connection is established.

      Chuck identifies the connection with VCI label VC1, and his buddies
      identify the connection with VCI label VC4. The labels get translated
      at each node to the next outgoing label like so:

      NY AT DA SF
      Chuck -> VC1 -> VC2 -> VC3 -> VC4 -> buddies
      Chuck <- VC1 <- VC2 <- VC3 <- VC4 <- buddies

      Other scenarios are also possible and would depend on a vendor's
      implementation of the ATM network.

      When Chuck has had enough playing Aviator and wants to get back to some
      serious scuba diving off the Atlantic coast, the connection is torn
      down, and the VCI labels are resued for other connections.


      10.0 What Assumptions can a user attachment make for a VCI label ?
      ----------------------------------------------------------------

      As is probably obvious from the above example, none. The VCI labels are
      owned by network nodes, and get randomized quite quickly as connections
      come and go. A VCI label is handed to a user attachment only as an
      opaque cookie, and not much can be assumed about its spatial
      distribution other than quite random.

      It may be possible to have certain reserved VCI labels similar in
      concept to "well known port definitions of UDP and TCP", as identifiers
      for special well known services that may be provided by the network.
      However very little can be assumed about the dynamically assigned VCI
      labels for most user related connections.

      A service provider is unlikely to accede to any special request by any
      one service requester to allocate it a chunk of VCI labels, unless the
      network itself is owned by the service requester. Furthermore, the
      address space of the VCI labels is limited to 24 bits and only designed
      to identify the connections between two points on a single link. The
      address space would disappear rather quickly if customers started to
      requisition portions of the VCI label for their own semantics.

      If there is a specific need to assume semantics for the VCI label
      outside of the ATM network, i.e. require it to be within a certain range
      on the user attachments at the UNI, it is probably best to provide a
      lookup table in hardware inside the user attachments which can map the
      pretty much randomized VCI label assigned by the network to n bits of a
      new label to which the user attachment can assign its own semantics to
      its silicon's content.


      11.0 What Protocol layer is ATM ?
      -------------------------------

      As is probably evident by now, ATM is designed for switching short fixed
      length packets in hardware over Gigabit/sec links across very large
      distances. Thus its place in the protocol stack concept is somewhere
      around the data link layer. However it does not cleanly fit in to the
      abstract layered model, because within the ATM network itself, end-to-
      end connection, flow control, and routing are all done at the ATM cell
      level. So there are a few aspects of traditional higher layer functions
      present in it. In the OSI reference model, it would be considered layer
      2 (where layer 1 is the physical layer and layer 2 is the datalink layer
      in the internet protocol stack). But it is not very important to assign
      a clean layer name to ATM, so long as it is recognized that it is a
      hardware implemented packet switched protocol using 53 byte fixed length
      packets.

      What is perhaps more relevant is how will all this interact with current
      TCP/IP and IP networks in general, and with applications which want to
      talk ATM directly in particular. A convenient model for an ATM interface
      is to consider it another communications port in the system. Thus from a
      system software point of view, it can be treated like any other data
      link layer port. Thus for instance, in IP networks connected via
      gateways to ATM backbones, the model would be no different then it
      presently is for a virtual circuit connection carried over an STM link
      except that an IP packet over an ATM network would get fragmented into
      cells at the transmitting UNI, and reassembled into the IP packet at the
      destination UNI. Thus a typical protocol stack might look like this:

      --------------------
      Data
      --------------------
      TCP
      --------------------
      IP
      --------------------
      ATM Adaptation Layer
      --------------------
      ATM Datalink layer
      --------------------
      Physical Layer (SONET STS-3c STS-12 STS-48)
      --------------------

      Thus just like an ethernet port on a host is assigned an IP address, the
      ATM port may also be assigned an IP address. Thus the IP software in a
      router decides which port to send a packet to based on the IP address,
      and hands the packet to the port. The port then does the right thing
      with it. For an ethernet port, the ethernet header is tacked on and the
      Frame transmitted in ethernet style. Similarly, for an ATM port, the IP
      datagram is fragmented into cells for which an ATM adaptation layer is
      specified in the standards. The fragmentation and reassembly is done in
      hardware on the sending and receiving sides. A VCI label acquired via an
      initial one time connection establishment phase, is placed in the header
      of each cell, and the cells are drained down the fat ATM datalink layer
      pipe. On the receiving side, the cells are reassembled in hardware using
      the ATM adaptation layer, and the original IP packet is reformulated and
      handed to the receiving host on the UNI. The adaptation layer is not a
      separate header, but is actually carried in the payload section of the
      ATM cell as discussed earlier.

      For direct interface to an ATM cell stream from an application, new
      interfaces have to be designed in the software that can provide the
      application with nice and fast mechanisms for connection establishment,
      data transfer, keep alive, tear down, and even application level flow
      control. In this case the software processing steps may look like this:

      ---------------------------
      Application Streaming Data
      ---------------------------
      OS interface to application
      ---------------------------
      ATM virtual circuit management/signalling
      ---------------------------
      Driver interface to ATM
      ---------------------------
      ATM
      ---------------------------

      where the ATM virtual circuit management represents software which
      understands the ATM header specifics, sets up and tears down
      connections, does demultiplexing of the payload to appropriate
      connections, and responds to whatever standard signalling protocol is
      employed by the ATM interface at the UNI for connection management.


      12.0 The Physical Layer
      -----------------------

      The physical layer specification is not explicitly a part of the ATM
      definition, but is being considered by the same subcommittees. T1S1 has
      standardized on SONET as the preferred physical layer, and the STS
      classifications refer to the speeds of the SONET link. STS-3c is 155.5
      Mbit/sec. STS-12 is 622 Mbit/sec, and STS-48 is 2.4 Gbit/sec. The SONET
      physical layer specifications chalk out a world wide digital
      telecommunications network hierarchy which is internationally known as
      the Synchronous Digital Hierarchy (SDH). It standardizes transmission
      around the bit rate of 51.84 Mbit/sec which is also called STS-1, and
      multiples of this bit rate comprise higher bit rate streams. Thus STS-3
      is 3 times STS-1, STS-12 is 12 times STS-1, and so on. STS-3c is of
      particular interest as this is the lowest bit rate expected to carry the
      ATM traffic, and is also referred to as STM-1 (Synchronous Transport
      Module-Level 1). The term SONET stands for Synchronous Optical Network
      and is the US terminology for SDH (since they had to differ in
      something). So much for the acronym soup.

      The SDH specifies how payload data is framed and transported
      synchronously across fiber optic transmission links without requiring
      all the links and nodes to have the same synchronized clock for data
      transmission and recovery (i.e. both the clock frequency and phase are
      allowed to have variations, or be plesiochronous). The intention being
      that products from multiple vendors across geographical and
      administrative boundaries should be able to plug and play in a standard
      way and the Broadband ISDN network be a true international network. And
      guess what the fundamental clock frequency is around which the SDH or
      SONET framing is done ? You guessed it, 8Khz or 125 usec.

      However all of this sits below the ATM layer and the ATM cells are
      transported across the physical layer as opaque payload, also called the
      SONET payload or the Synchronous Payload Envelope (SPE). The physical
      layer is independent of the payload type, and can just as easily carry
      STM cells as ATM cells. Refer to the standards documents for more
      details.

      13.0 Flow control in ATM
      ------------------------

      Unlike the reactive end to end flow control mechanisms of TCP in
      internetworking, the gigabits/sec capacity of ATM network generates a
      different set of requirements for flow control. If flow control was left
      on end to end feedback, then by the time the flow control message was
      received at the source, the source would have already transmitted over
      several Mbytes of data into the ATM pipe exacerbating the congestion.
      And by the time the source reacted to the flow control message, the
      congestion condition might have disappeared altogether unnecessarily
      quenching the source. The time constant of end to end feedback in ATM
      networks (actually feedback_delay * link_bandwidth product) may be so
      large that solely relying on the user attachments to keep up with the
      dynamic network is impractical. The congestion conditions in ATM
      networks are expected to be extremely dynamic requiring fast hardware
      mechanisms for relaxing the network to steady state, and necessitating
      the network itself to be actively involved in quickly achieving this
      steady state. Thus a simplistic approach of end to end closed loop
      reactive control to congestion conditions is not considered sufficient
      for ATM networks.

      The present consensus among the researchers in this field is to use a
      holistic approach to flow control. They recommend employing a
      collection of flow control schemes along with proper resource allocation
      and dimensioning of the networks to altogether try and avoid congestion,
      to try and detect congestion build up early by closely monitoring the
      internal queues inside the ATM switches and reacting gradually as the
      queues reach different high watermarks, and to try and control the
      injection of the connection data into the network at the UNI such that
      its rate of injection is modulated and metered there first before having
      to go to the user attachement for a more drastic source quenching. The
      concept is to exercise flow control in hardware very quickly, gradually,
      and in anticipation rather than in desperation. Rate based schemes which
      inject a controlled amount of data at a specified rate that is agreed
      upon at connection setup time, and automatically modulate the rate based
      on the past history of the connection as well as the present congestion
      state of the network have seen much press lately. The network state may
      be communicated to the UNI by the network very quickly by generating a
      flow control cell whenever a cell is to be dropped on some node due to
      congestion (i.e. the queues are getting full). The UNI may then police
      the connection by changing its injection rate, or notify the user
      attachment for source quenching depending on the severity level of the
      congestion condition.

      The major challenge during flow control is to try and only affect those
      connection streams which are responsible for causing the congestion, and
      not affect other streams which are well behaved. And at the same time,
      allow a connection stream to utilize as much bandwidth as it needs if
      there is no congestion. This topic is still an area of active research,
      experimentation, and prolific publications including several PhD thesis.


      14.0 Does an ATM network provide inorder delivery ?
      --------------------------------------------------

      Yes. An ATM cell may encounter congestion and suffer variable delay due
      to bufferring within the ATM switches, and may even be dropped either
      due to congestion control or due to header checksum error. However an
      ATM connection always obeys causality, the cells in a connection (i.e.
      cells with the same VCI label) arrive inorder at the destination. This
      is so because there is no store and forwarding in the network, cells
      travel over a single virtual circuit path, the ATM switches do not
      switch the cells in the same VCI out of order, and no retransmissions is
      done at any point in the ATM network. Connectionless services are also
      supported on ATM networks, but these are implemented as a higher layer
      service layered over the ATM datalink layer. Thus cells in a
      connectionless service may arrive out-of-order because there might be
      multiple VCIs over multiple paths setup to deliver the connectionless
      datagrams and cells may arrive over different paths in different order.
      Thus the fragmentation reassembly engine which implements the
      connectionless datagrams, and which is layered on top of the basic
      connection oriented service of the ATM layer, must carry sequence
      numbers in the adaptation layer in each cell and correct any reordering
      of the cells at reassembly time. This is what the IEEE 802.6 protocol
      for MAN does to support its connectionless service class.


      15.0 Does an ATM network provide reliable delivery ?
      ---------------------------------------------------

      No. There is no end-to-end reliable delivery service at the ATM layer.
      The ATM layer does not do any retransmissions and there are no end-to-
      end acknowledgements for what has been received. Reliable delivery
      service can be implemented as a layer on top of the basic connection
      oriented ATM layer, where acknowledgement of received data and
      retransmission of missing data can be done for connections requiring
      reliable delivery. Thus a TCP type transport layer protocol (layer 4 in
      the OSI model) layered on top of the ATM layer is required for
      guaranteed delivery.

      16.0 Performance of an ATM interface
      ------------------------------------

      Unlike STM networks, ATM networks must rely on considerable user
      supplied information for the traffic profile in order to provide the
      connection with the desired service quality. There are some sources of
      traffic which are easier to describe than others, and herein lies the
      cost/performance challenge for best bandwidth utilization in an ATM
      interface.

      An ATM network can support many types of services. Connection oriented
      as well as connection less. It can support services which may fall in
      any of the four categories (loss sensitive, delay sensitive), (loss
      insensitive, delay sensitive), (loss sensitive, delay insensitive), and
      (loss insensitive, delay insensitive). It can further reserve and
      allocate a fixed bandwidth for a connection carrying a continuous bit
      stream for isochronous traffic (repeating in time such as 8khz voice
      samples), allocate a bandwidth range for a variable bit stream for
      plesiochronous traffic (variable frequency such as interactive
      compressed video), as well as allocate no specific amount of bandwidth
      and rely on statistical sharing among bursty sources. It may also
      provide multiple priorities in any of the above categories. The services
      can span the entire gamut from interactive such as telephony and on-line
      data retrieval, to distributed such as video and stereo Hi-Fi broadcasts
      and multicasts for conferencing and database updates.

      Thus the performance that one might get from ones ATM connection is very
      much dependent on the parameters that are specified at connection setup
      time. Just because the link bandwidth may be an STS-12, does not
      necessarily imply that the end to end payload bandwidth that the ATM
      interface can sustain will also be STS-12. It will in fact be
      considerably lower based on connection setup parameters and the quality
      of service request, and whether bandwidth was reserved or statistically
      multiplexed, and the load on the ATM network.

      Typically, the ATM network may not permit 100% loading of any link
      bandwidth, and in fact user available bandwidth may not be allowed to
      exceed more than 80% of the peak bandwidth of the link. The UNI may
      start policing and/or denying new connection requests on the link if
      utilization exceeds this amount. Add the approx 10% overhead of the 5
      byte header in the 53 byte cell, and the max sustainable payload
      throughput on an ATM cell stream interface may peak at 72% of the peak
      link bandwidth. And this does not include any adaptation layer overhead
      if present, signalling overhead, or physical layer overheads of SDH
      SONET framing and inter-cell spacing gaps.

      And of course, application to application bandwidth may be even less,
      unless the software datapath from the interface driver through the OS to
      the application (and vice versa) is very carefully optimized. It would
      hardly be received very well if the end-to-end throughput from
      application to application would turn out to be no better for an ATM
      port than for an ethernet or fddi port due to software overheads.

      How many cells might be realistically received or transmitted at a
      sustained rate on an ATM cell interface in a processor ? Hard to say for
      sure as there is no existence proof as yet.

      However, what can be stated is that the transmitter and receiver
      performance is independent of each other. The transmitter side is
      constrained by the flow control of the simultaneous connection streams
      by pacing the injection rate according to the respective negotiated
      class of service and bandwidth requirements. The receiver side is
      constrained by asynchronous reception of cells at a variable rate, and
      with bufferring capacity for a large number of simultaneous connections
      each of which can be receiving data simultaneously. And if an adaptation
      layer is used, then the reassembly of these cells into a higher layer
      protocol data unit (PDU) must also be done in hardware by the receiver
      side. Thus a lot of thought is required in designing an ATM interface to
      a host system, poor design of which can cripple the system performance.


      17.0 When can I have my own connection to an ATM network ?
      ---------------------------------------------------------

      The Broadband ISDN with ATM is an enabling technology. It will enable
      new kinds of applications and new types of usage which are only in
      peoples imagination today. It is a complete overhaul of the copper based
      low bandwidth telecommunications technology that has existed until now,
      and represents a massive investment both in research and development, as
      well as deployment and integration. The software investment required to
      make the ATM network work is tremendous, and many of the algorithms and
      theories about how to manage the ATM network are still in their infancy
      and mostly on paper. Considerable work is also required in developing
      new network management paradigms and protocols to effectively control
      and manage the vasts quantities of bandwidths and services that the
      revolution in communication technology is promising to offer.

      At the present time, there are no commercially available ATM networks in
      the US (to my knowledge), though there are several ATM prototype
      switches and experiments in existence. The earliest anticipated roll out
      of commercial ATM switches is expected no sooner than 1995 time frame.
      And full fledged deployment of ATM networks with "COST EFFECTIVE" multi-
      media integrated services to end-users is still a lot farther away,
      probably closer to the end of this decade. But its coming...hang on.

      Archived CPSR Information
      Created before October 2004
      Announcements

      Sign up for CPSR announcements emails

      Member login
      Not a member yet?
      Ongoing Projects
      > Elections Project
      > Public Sphere Project
      > Liberating Voices! Pattern Language Project
      Chapters

      International Chapters -

      > Canada
      > Japan
      > Peru
      > Spain
                more...

      USA Chapters -

      > Chicago, IL
      > Pittsburgh, PA
      > San Francisco Bay Area
      > Seattle, WA
      more...
      Why did you join CPSR?

      The growing importance of civil liberties in a paranoid world: we need organizations like CPSR.

       
       

      “Certainly. That seemed to be the purpose, in the London hotel. A person as clever as that must have planned this entire affair and has undoubtedly accomplished his wish and vanished long ago—or else he can never be caught because we have no way to discover him.” But she only answered that that was unlikely and slipped her arm around his neck, as she added that if anything were to happen to him, she would not have one real friend in the world. There was something pathetic in the quiet realization of her loneliness. "You're a liar," said Shorty hotly. "You didn't git out o' the regiment because it stole niggers. That's only a pretend. The rear is full o' fellers like you who pretend to be sore on the nigger question, as an excuse for not going to the front. You sneaked out o' every fight the regiment went into. You got out of the regiment because it was too fond of doin' its duty." His volubility excited that of the "Captain," who related how he had been doing a prosperous business running a bar on a Lower Mississippi River boat, until Abolition fanaticism brought on the war; that he had then started a "grocery" in Jeffersonville, which the Provost-Marshal had wickedly suppressed, and now he was joining with others of his oppressed and patriotic fellow-citizens to stop the cruel and unnatural struggle against their brethren of the South. As he reached the top of the bank a yell and a volley came from the other side of the creek. Shorty joined him at once, bringing the two boys on the engine with him. "I'll look out for that." "That is," Dr. Haenlingen said, "fools like you." Rogier opened his mouth, but the old woman gave him no chance. "People who think psychology is a game, or at any rate a study that applies only to other people, never to them. People who want to subject others to the disciplines of psychology, but not themselves." "There are spots the steel's never covered," he said. "You can tunnel through if you're lucky." A pause. "I—" "No—it's just something one enjoys, same as cakes and bull's-eyes. I've kissed dozens of people in my time and meant nothing by it, nor they either. It's because you've no experience of these things that you think such a lot of 'em. They're quite unimportant really, and it's silly to make a fuss." "I ?un't that. I'm just a poor labouring man, wot loves you, and wot you love." HoME免费国产一级毛卡片视频app ENTER NUMBET 0017
      shibaila.com.cn
      www.yula5.com.cn
      daren2.net.cn
      quela5.com.cn
      zecun5.net.cn
      www.hezhe2.net.cn
      www.nijia8.net.cn
      www.alkylsil.com.cn
      www.arpuzi.org.cn
      sinaweb12.com.cn
      大胆胖女人体艺术 性爱333哥哥干哥哥干嘛哥哥讨厌 乳交写真 h女同电视剧 华人在线伦理电影 人妻系列成人动漫 日本美女露b高清图片 美女黑木耳处照 WWW.GAN860.COM WWW.LED6918.COM WWW.HQ-ZSW.COM WWW.OPP999.COM WWW.BJBJ100.COM WWW.HHH307.COM WWW.JAVCHAN.COM WWW.TCBGC.COM WWW.BJZJQF.COM WWW.02MK.COM WWW.987BB.COM WWW.XMBJGS.COM WWW.VERISIGN.COM WWW.HHH437.COM WWW.AOFEINI.COM WWW.BBB549.COM WWW.NENNENLU.COM WWW.HHH018.COM ABU.OMAR WWW.BBB598.COM 大肉棒丝袜裤性奴 欧美丰满美女图 半夜成人影院 晚上电影网址 东京热制服群交www51gannet 高清播放成年网站 在线成人国产打飞机 台湾综合网首页 第九月激情网yuyongniancom 制服丝袜AV无码专区 色色资源站色色资源站影院色色资源站在线影院 狠插猛干舅妈 爸爸日我逼逼 玛雅maya十八岁 nass系列合集 东方AV在西安 蝌蚪窝kedou2www980022com 亚洲丝袜偷拍论坛 迷人av 90色吧影院 μs浏览器成年影院 毛片人兽性交的视 www操酷狗com caopporn超碰 小明看看首页看www1234zacom UC色片 大唐淫乱 美剧排行榜 97yy成人 米奇第四色做爱 我想看鸡巴插小逼免费片 青青草视频观 狠狠干迅雷 少妇诱惑舞蹈 全家乱淫交换 玩弄阴道 www484ppcom lululuAV 母女交换啊啊啊啊 爱幼幼社区 丝袜3av网 九色撸撸 最新三级片电影 日韩AV-撸波波影院 susu62avav www7s 色色色999曰韩国拍 大黑鸡巴性交 有个黄色网站的网址是wwwkou多少 迅雷下载自拍偷拍 苹果手机在线看片网址 av闲人吧av在线看 云播欧美 五月五婷婷AV 成人校园乱伦密史 推女郎色图 涩人阁第四影院 无毛萝莉在线观看 香蕉一淫 wwwavtt98com 啊啊啊老公不要图片 邪恶漫画之嫂嫂受孕 京东人妻50 韩国黄色的三级片 淫荡妻成人3p小说 黄色片毛wwwjlnqkaqbwocn 社旗黑社会老大王燕 肉棒被淫穴亲亲快播 女同无码先锋 冯仰妍16分钟在线视频 丁香五月婷婷人与兽 www789cgcom mmtt44校园春色 欧女性生殖真人图片 丝袜旗袍露脸 主播身材诱惑国产 国产露脸母子 在线播放成人网 www色色www44tutucom 性感欧美第二十期成人网 屄一样的花 色交录像 av天堂网2016 幼女逼被插 成熟俄罗斯女人与性 村上凉子演过的近亲黄色电影 熟女自慰影片看快播 青毛极品画眉鸟图片 网业的黄se电影2014 大妈三人性交 强奸乱伦制服诱惑亚洲bt迅雷下载 熟女网微博 俄罗斯幼网站 冰漪图片欣赏 干妈的肥穴真好玩 乳罩口交 90后模特色图 欧美浪屄图 大胆人体美女私处艺术图片 幼女做爱种子下载 60老女床上视频激情 绫香是a片的 新娘 小穴 高清裸体炮图 人和动物片片 av台湾无码 欧美大屁股熟女俱乐部 打炮超碰在线视频 小色迷ge av资源网ye123 少女的b上没长毛的b 最人体大胆女艺术 日美女阴道 迅雷看看菅野亚梨沙 东北成人网论坛 自慰门mp4 通辽市信息港 小学生心理测试题 肏女大学生的经历 930影院手机版 30p亚洲性交 色色区 116田255田163田176把田字换城 黑人体艺 我和妈妈的激情性爱故事 上午鲁下午鲁 本多快播下载 丝袜足交视频晚上碰99 xxx4tubetv 大逼tu 淫荡小妞被插15p 成人网玉环网狗奴舔脚视频 nanrenaikandirenti 视频裸聊裸性爱裸肏屄裸口交 青涩基地 入屄爽鸡巴 屄肏文章 美国操逼片视频 淫荡日本小说 丰满人妖的性爱 日本人兽片番号 美女午夜爱爱网 国语干老太太逼快播 大胆人体艺术电影 WWWSEWGPCOM 清狗人体艺术 kkbokk自拍图片 秘密爱中的做爱是真的吗 大奶裸体人体艺术图片 屄草垮 东京热手机版 佐佐木希作品快播播放 色姐姐自拍 gogo人体高清人体孙俪 ppp邪恶动态成人图 韩国sheyiye 日本幼女破处网 午夜伦理av男人的天堂wwww6080com 看8o后操B射 国产自拍热99www99kk5com WWW淫民色色色 96插妹妹sexsex88com 激烈抽插漂亮大奶妹 欧美黄人成人视频 湖南妹子艳照门 一条莉音肛交 91色妹妹AV hulisecow 我和淫荡美女操逼的故事 欧美人妻被迫 日日拍嗷嗷拍 波多野结衣操老师 偷拍自拍泳衣 黄女人京东干 韩国美女捰体mm照片 国产国语偷拍在线视频 中国av教育 wwwxingqingzhongrencn 山毛人体艺术 丰臀骚妇 操 俄 快播 遮天 有声小说 春色满员 日本minato h网 你懂得 有没有动漫h网 给我一个h网 谁给个无毒的h网 东京热真做 手机看黄片怎么看 5252黄色小说 大色鸟 色界论坛 生殖器官 我去摸逼 成人文章网 models视频 哥去射中文网 色撸橹 日日 撸友网 撸射网 撸飘飘少女 喜爱se在线播放 亚洲 另类 春色 3d漫画 白洁 链接 深爱开心五月图片区 av12电影手机版无码 2019午夜AV yitunhuo最新链接 avbus 最新地址 免费剧情漫画 snis-937在线 少女潘金莲一老司机看电影 大爱撸免费在线影院 中口韩特级大黄片 特区爱奴无剪辑 免费视频在线观看国产情侣自拍 性奴小说视频 小泽玛利亚bd视频 日本学生妹自慰视频 日本淫a片在线观看 日本熟女人妻视频 荡女婬春神马影院 情艺中心在线紧急 JJJ347 古侠武典小说天堂 色喇叭国产自拍 amt005磁力链接 迷奸美女伦理片 成人avav 射射射日日视频 国产群交在线观看 厕所女人偷拍到的手淫视频 大香蕉本色成人视频 翘臀少妇内射50p 女人鸡吧 国产牛牛热线视频 你懂百度资源 白嫩寡妇巨乳伦理电影 国产自拍小视视频 秋月小町av 迅雷下载 小视频胸大的 萝莉无圣光小鸟酱百合 老炮儿琪琪看片 我要黄片儿强奸的黄片三级黄片 人人操 视频 4422n xvideos中国人双飞 播放s片韩国毛片一级 Chinahomevoid 一本道高清AV电影网 窝窝电影之大香蕉 超屌爽 caoporn91视频在线 av在线直播 ssni-261在线 300mium-086 超碰首页 vr格式 色久悠悠青草 福利上瘾怎么播不了 福利视频优衣库完整版 xxoo又黄又色 111番漫画 亚洲黄片在线 av电影中文字幕 小依天堂 色999色屌丝 1769hz在线 蝌蝌窝2018地址蚪蝌窝 大香蕉色影 VVTcc秋霞影院 亚洲成交毛片 日本高清无码高评分 舔少妇屄屄 草莓慕斯塔的全套magnet 十八禁资源群 七月丁香网水野朝阳 三级黄线下载 旅游时看到蜜桃臀想操 爱色影激情在线002 日本无吗无卡高清在线观看 76zy 老司机午夜Ⅹ0 2588影院 校园激情自拍偷拍 汤姆影视avtom 扩阴无码 mp4 美女逼逼视频 强奸女大学生 下载magnet 深喉口爆群交在线视频 曰b镜头给你看看 玲木波多 gav免费播放成人大片 亚洲破除系列 百变女神魅心户外大马路 wwwxy14app 开放90后在四虎线观看 91性交视频 香蕉网络电视 校园春色激情 爱视频 校服白丝污视频 波野结多依 magnet 周晓琳视频下载 mkck-194 show网站公路黄色网站干她舒服 国产直播小嫰女直喷自摸阴蒂 94福利社区会员 www559955com 视频 国产 大胸 在线 日本伦理影院 秋霞一级毛片 www5y95con 久久人人97 狂燥空姐小穴 怪兽AV动漫 国产偷啪棚户区站街女在线观看 被同事扣出水视频 爆乳啪啪啪视频网站在线观看 藏精阁第一福利宅男搬运工 jjkkrrrr 大香蕉人伊在线这是我的网站 800AV最新地址 av网址站 91x视频成人教育a v 联合中英美 成人娱乐av男人的天堂 光棍影院2017鬼父 u15 天堂图片区 成人福利影院免赞网站 陈慧二字图片 二级艳舞黄色视频 3成人视屏在哪看? 自慰视频福利在线看 快播成人电影五福影院 夫妻房事做爱动作大片一级黄色 - 资讯搜索 老男人和胖女人做爱视频卜 在线福利gv 写真av全裸影院 日韩无码180 最近网上怎么看不到小视频 XXx在线视频 影音先锋成人伦理无码 藤井蕾娜迅雷种子 福利片优播看看 在线看 操逼视频啊啊好舒服 采精的小蝴蝶在线观看 国产偷拍自拍91 噢门毛片 啪啪叫床视频 亚洲av在线播放人妻 maomi8686 咪咪网 国产自拍 母乳新人协和 chengrendianyingzipai 国家福利是什么狗屁 女日本女日直播视频 迅雷下载地址 混血哥双飞高颜值的上海177制服 空姐办公室乱欲 3d动漫在线播放 色姑娘棕色姑娘综合站 极品清纯大奶90后妹纸自慰视频 曰b黄色视 狂操空姐骚穴 成年人大片网站 日韩女优无码性交视频 淫妻小说 同性视频网站 黄色网站大全 欧美4p番号 黄片网站啪啪视频 啪啪游戏视频 男女上床尻屄视频 淫shipin 汤姆影院AVt0n rd845影音先锋 都市凌香录在线有声 9191偷拍在线播放 黄色一号视 CLUB-162可以搞的人妻回春按摩3中出交渉偷拍 自拍图片专区12p 亚洲图片欧美图片天堂网 影音先锋av资源tokyo 6seavcom 香蕉丁香网 后入极品美女自拍 好屌色在线精品网站 艺校女生贴身衣物 女人B脱毛视频 大棒棒塞进洞洞的视频 爱福利视频cc 4438成人黄色视频 艾迪av无码 三级片视频图片 色狼群免费小视频 欧美性受群交视频1在线播放 爱看影院视频伦理 国产自拍HHHHH 人体手机壁纸 草杨幂的小说 至爱色色图 艳欲迷墙 新色猫咪导航网站 欧美性爱黄色淫淫网 张筱雨的淫荡 顶级姑娘大胆人体摄影 宫崎葵寄生木下载 口述6p a片在线看 中欧人体美鲍艺术 日本被老公的领导调戏 各种犬的性能力 huang片网 成人激情乱伦大集合 日本成人漫画网站 欧美性交电影先锋播放人与动物 普通话淫荡对白山东94年的大奶小姑娘和男友 看裸体漏阴道 日本女人的阴性毛 操人体模特 欧美裸模大胆露阴图 乱伦家庭母子小说 筱原凉子av先锋影音 每晚小姨骗我上床 风骚淫荡妈妈做小姐 WWW_280_COM � 做爱嫩穴 草裙 女人大奶子撸撸色图 偷偷拍影院 性感美女性器 操尿图片 美阴图 xxxsexeurpe 冠希哥亚洲视频 母子115网盘 苍井空护士水蓝色裤袜全集 妈妈的肥乳 丝袜做爱少妇 非州大炮干亚州少 美女性感视频网站有哪些 日韩考屄视频 李静仪 西湖是哪个省的 钢铁侠1国语 朴唛妮28部全集 波多野结衣是哪个公司的 幼女插进 国产女主调教视频在线 骚逼美女网 罗李芳身份证 父亲顶入亲生女儿小说 自拍偷拍欧美论坛 成人偷拍自拍自拍 美女三级黄色美图 欧美色图漂亮的女主持人 百度日本强奸电影 腾讯联合藤下梨花 欧美黄色电影怎摸进 丁香五月中字欧美三级 俄罗斯美眉的逼 姑娘人体摄影 男用壮阳喷剂 西西人艺网极品粉嫩美鲍70p中国人体 美女爱鸡巴快播 日本女优吉吉 国内成人露脸 搞女儿 外国男人操中国骚逼 94草b 日韩炮图图片 大鸡巴哥哥草骚屁眼 小学生幼女av 西西学生人体 东热操屄图 女王性侵小说 色八阁 欧州毛片5 ccm99oinet 人体艺体阴部插图片 处女做爱av视频 se色撸撸 非洲黑人日本女人 姐妹乱伦专辑下载 老妇的性事小说 自拍偷拍先锋视屏 www45hucom 13骇人游戏美国版在线视频 日本妓女被操的电影 三级片免费在线网站 完美动态艺术 姐姐和弟弟操逼 人妻小黎19p WWW233SIHUCOM 2017男人天堂在线77bbs787com 美女人阴口毛 52草逼 艳照门肛交 爷爷操幼幼书 mm365小说 成人处女被操视频 综合承认在线 美艳国模裸体完美展示 新视觉影院ios 白虎的嫩穴 操白虎屄视频 琪琪影院经典片 日韩av综合网magnet 自拍偷拍动漫视频手机播放 japhd日本55 熟妇漫画合集 日本av淫乱小穴 tube8xxxfree 自拍偷拍校园春色撸一撸 干空姐的小穴 哥哥干妹妹wwwggwmmcom 狠狠草狠狠干青青草 想老公的大肉棒了 亚洲荡 儿童爱爱网站 啊不要人家小穴都湿了 啦啦队宝贝av资源 奇色手机影视 夜夜撸勾引骚女亚洲 涩站网 永久束缚少女小说 塞尔维亚人体艺术 在线免费观看动物敲门 谷露英语 tube幼子 1069gv同影网 色人www46ltcom 超碰淫淫网 性爱影片名称 秋霞福利小说书 我要看一丝不挂女人的逼逼和大奶子图片 黄色网站偷拍自拍亚洲熟女乱伦丝袜 韩国x档案全文 我的娇艳淫荡妻子 母子姐姐做爱图 人妻淫淫网 2017年夫妻群 李梅大屁股 酒店后入在线视频 极品美腿人妻系列 一天让多个女人发黑木耳照片给我 制服诱惑丝袜美腿亚州电影 图片如题在线电影观看地址 撸色淫乱图 夜间电影a免费 野蛮部落的性生活 爱库99bt 香港三级先锋 免费在线黄色小说阅读最新yy黄id 大色逼 丝袜性奴老师 呢女同 操大美幼 三十七度二百度云 东京热制服群交www51gannet 35gao在线福利免费观看 wwwav882com 农夫激情基地 自拍亚洲中文字幕日韩欧美 武汉玩小姐 哥哥噜狠噜噜 色爷爷影院 WWW52色C0m 怡春院分站 京香juliaav视频免费观看 朋友淫荡的妈妈我可以操你妈妈吗 插女儿的小屁眼小说百度 免费黄色电影76yrcom 天天射鲁一鲁 色窝窝黄站小说 能看的在线av站 调教型a片 meiguose 欧美末成年处女图片 久草李雅 陈勤勤的所有肉偿视频 类似达酷的网站 有基zzcom 2000激情影院 先锋av资源在线 jizzjizz有jj和bb两性器宫人 五月激情夜 国产偷拍一在线观看视频 女子柔术视频裸体大全 n0015叶丽美先锋影音 波多野结衣性感写真 轮奸淫荡的妻子_ 搜索www108yucom 我用假阴茎的小说 人妻淫色删除 成人性爱视频在线观看 淫奇艺影院欧美Av 超级碰caoporm 与邻居三少妇 精品自拍美女 久草sdde wwwer37comwwwer37com 女人尿尿的器官 500资源网视频在线 在线视频无本道狂野 大咪咪乳房表妹大肥逼 sm性奴人妻母狗调教色图 gayandguy亚洲 成人丝袜视频大全集 刘可颖欢乐岛 素人啪啪啪 办公室av下载 688ttfcom 新鲜大吉鲍 亚洲制服av 金瓶梅之鸳鸯戏床小说 亚洲色之图 在线秘密AV 人妻五月天在线下载 熟妇乱伦图片区 76资源网妈妈的朋友 处女宫电影 另类在线先锋 黄色a片免费看 性交触视频 玖玖总站资源青草 japanyellowmovie 形形色色五月天 射射草 大伯影视 身穿民族服饰的中国少数民族漂亮美女大胆人体艺术7国内 www淫色色淫com奇米综合网 那里有龙珠色片 东方亚洲av东方亚洲狠撸 wwwpu628com 人与兽性毛片 nnyythunder AV天堂wqng 黄色aA片magnet 色wwwcomcn 丝袜巨乳人妻连裤袜 祼体美女露阴图 91在线最新官方地址发布页 欧美av电影幼幼片 nipingdebi 狗交的张柏芝 屄 图 p 黑 新片欧美十八岁美少 苍井空露阴道阴毛图片 肥佬影音适合的网站 福原爱谈av 老女人13p 360爸爸操死我吧舒服死了txttxt在线免费阅读 影视先锋伦理电影 夫妻交换操屄俱乐部 伦理txt 人体艺术toupian 做爱乱伦先锋电影 高树三姐妹txt小说 千草忠夫 父女性爱母子性交 147小泽玛利亚人体 好有肉感好甜美 中学女生三级小说 上原结衣哥哥射 快播韩国主播视频 婷婷快播网址是多少 岳母 奶子 熟母 电车 岳母 父女做爱的自述 苍井空白浆av 外国美女阴部写真 徐子淇面相 抗衰老产品 天通苑尾货市场 精灵的守护者 周国平散文读后感 艾灸视频 WWWBJ8080COM 天堂文学占有大姨子的身体 老奶奶勾引青年开房床上变态做爱 护士美女裸体照 多毛阴道图片 欧美性急交 当阴经插入美眉bb里的那一刻 欧美淫乱猛图 狠狠射ssdy 男人玩充气仿真娃娃 成人激情黄色乱伦电影下载 欧美性爱潮喷集锦 日本乡村义母 3圾片大全快播文件 熟女欧美亚洲 操老浪屄 露阴部人体艺术 每日更新的色站 亚州色图波多野结衣性交图片 幼幼强奸摸奶 黄色我和姐姐在公交车上 欧美裸体漏阴图 能看影院大片的软件 陈冠希qvod 卓依琳的做爱电影 大奶金发美女吃鸡巴 少妇美女做爱色图 12345678性爱 肏屄香小说 黑人对性的看发 干大屄人体 WWW827724COM 我和少女3p日记 雅玛小说网 淫荡妇女优 人体艺术开档 小说鸡巴淫城 秒播国产偷拍视频在线观看 色哥哥帝国军情 鲛岛琉生如狼 俄罗斯成人激情电影 自慰国语三级欧美 狠狠射黄色电影 小女孩阴部视频自慰视频 美国四级在线云播放 `国产自拍色 百度影音幼幼 与淫荡女医生做爱 tunfeixiaoyizitu 小人大鸡巴干熟 荒野嗯啊 少妇逼逼超嫩 草榴社区文学区 哥哥轻点好疼好大 五月停停五月天47cccccom Av激情网 自慰偷拍亚洲天堂 亚欧图片有声 wwwbbb560von 超碰痴汉空姐 撸撸鸟AV亚洲色图 老熟女内裤丝袜图片 后女QQ上买内裤 日本美女色色色 百度一下luotiyis 快播成人日本幼女系列 插插插总和我 少女插p色图 操逼性交被人操了小说 美国免播放器射吧 有声小说色 春色堂永远 h网是什么意思 www黄色录像com www访问 东京热导航 东京热401 东京热toky 为什么酒色网 酒色酒色网 酒色网 网站 黄色小说集 葵つかさ 悦来客栈 爱色就色网 高处女电影 狼人电影网 我色淫我乐 99999AV电影 百撸社区 撸踏踏20以下禁止入内 日本Av饭免费观看 人人看91视频直播 白色手机天堂网站 gav成人网站在线 女优磁力链接在线观看 ooxx老湿影院 情侣不雅激情实拍papa 日韩精彩短视频 樱木莉爱无码 MP4下载 影音先锋 av资源 日本头交视频哪里看 美脚妻连体袜在线播放 深喉吞精中国 yuputuan01 在丈夫面前福利视频 影院电影手机观看综合网 rav 无码 eee119猫咪网 live 图 无码 蓝沢润av迅雷下载 有bi吗va视频 网红做爱迅雷下载 mp4 超频在线 prisonschool里番免费看 41st福利视频 999西瓜视频 久久爱国产自拍偷拍 在线搞 午夜福利免费视频50集 红楼78电影网 韩国片神马影院 性奴电击灌肠调教视频 大爷操免费 桥本麻衣子398 艳m迅雷在线观看 艳姆秋霞影院 幼i交18girl renyidongwujiaopei 黄片狼人与岛 犬屋敷 影院 希咲彩大战黑人 福利757午夜云播 45tom影院 色王者 欧洲性x xx 铃原爱蜜莉在线无码 yuzuki柚木 国内自拍第五 草b在线免费视频 美女 youzzjj影视 a v淘宝在线观看 松坂美纪 23riri新地址 ipx072在线观看 在线视频 就是操 xo色视频 黄色干逼 视频在线观看 瓜皮影院韩国伦理片 幼女视频吗 光棍影院福利在线看 快点插我快来了视频 18v韩国主播 一本道国产在线97 免费看黄尤美 长泽梓所有无码高清在线 桃谷绘香里高清无码 西瓜 avxxxx 老是免费十分钟影院 射丝袜足 在线影院 国产名人女神学生 奉仕在线播放视频 大空美绪 手机免费视频在线观看 苍井空无码 换妻 偷拍 任你不一样的搞法搬运工 miad-812 92看看电 影网100午夜合集 黄色网站在线浏览 337p日本人 性爱vn 露脸怒草发廊高颜值小姐 小彩的屁眼 鸭子av性 性抽插视频福利 哪有松岛枫电影 亚洲人妖在线资源 看两性啪啪真人免费大黄片 哥也射综合 影音先锋2019a v源站 裸聊视频在线播放 哥去射偷拍自拍在线观看 欧美黄A片天天影院 小仙女思妍手机在线视频 黄色AV导航 偷窥盜摄在线播放 撸一炮 炮一炮在线视频 类似51abab 自拍色人阁 视频二区学生系列知名国产 一部影院b 肉蒲团之极乐净土免费观看 苍井优一本道在线 操逼视频中文字幕 变态碰碰强奸 北嵨杏 金蒲团直播艳艳 亚洲日韩激情文学 长泽梓AV在哪看 成人极速性生活视频 草帽AV ppppmmmmmm 朝桐光视频 陈冠希迅雷 全套bt种子 变态熟女在线 ssni磁力链接 成人时平在线播放免费 被轮j的校花高晓 草根艳舞团 县城全裸淫荡火爆 苏小欣磁力下载 丁香五月欧洲大香蕉 快播麻辣影院 人人操人人日视频 白鸟樱 无码 在线 琪琪色在线影院福利视频群 性感女主播0 日批又黄又色的动态视频 超高级国王游戏电影 那有小姐操逼视频 爆乳自拍偷拍 苍老师操b 果宝张筱雨 国产自拍伦理片久久热 国产私人玩物视频在线 freex性日韩免费视频 亚洲成人0887 伊人性爱 极品白嫩美女主播极尽诱惑,喜欢的不要错过16 wankz视频日本 最新制服丝袜 爱沢花梨加勒比 magnet 2018最新AV福利中国 yut2 uuu777在线观看 a4yy万利达首播影院官网 青青草i在线视频 舔阴蒂日本 伦理逼 麻条北妃 色男人福利论坛 色婷亚洲五月 饥渴的熟妇番号 青青草kjii 强奸资源网站 鸡宝 肥佬影院 精品福利影院 教室诱惑夹笔杆番号 鲍粉逼 夜用影院 91凤吟鸟唱 sigua 888com 女同性恋做激情视频 和寡妇干b 缓冲小视频厨房干 丝袜美腿品玉小说下载 sheyujie 1000部啪啪啪视频日本 短发气质美女小秘书公司聚会被领导算计喝多了带到酒店蹂躏 色福利亦航 丝袜女同性恋接吻女子磁力 卡在电梯里的av系列 韩国ck青草直播 OX做暧昧免费视频 中学老师在线视频 免费v片在线观看2320 好B网视频在线 农村夫妻生活偷拍视频 主播走光 磁力 艹小穴视频 97总站人妻在线视频 老鬼色综合 Caoii∪1024 超清:90后巨乳美女被色狼疯狂摸胸吸吮后······ 高清 福利小视频 【19禁热舞】-诱惑视频- 视频在线观看 - 爆米花视频 内射肉丝视频 三上悠亚xz av网站在线免费观看幼嫩 动漫靠逼18岁视频 虎牙高管潜规则视频 ddoox校园 新城春奈影音 美女野外艺术写真 WWW_YESEGE_NET 和美女明星做爱舒服吗 人与动物电影大全 66电影成人电影 毛篇片地址大全 亚洲美图t 百度马六人体艺术鲍 妇乱艺术穴图 男模王魅经典全见图 操骚逼妈妈中文对话 操逼涩蝴蝶 亚洲视频人妻按摩 少妇在线内射 yijidianyeng