国产精品人人爱一区二区白浆_国产我不卡午夜伦理_免费电影亚洲一级黄片_国产午夜福利久久_51视频在线观看免费国产_天堂AV网手机版_国产精品毛片一区二_印度女人性液_日韩大片91免费观看视频播放_日本欧美国产精品第一页久久

手機版
1 2 3 4
首頁 > 新聞中心 > 行業(yè)新聞 >
行業(yè)新聞

上海翻譯公司完成通信設(shè)備英文翻譯

發(fā)布時間:2018-08-10 10:59  點擊:

上海翻譯公司完成通信設(shè)備英文翻譯
2.1    AUTOMATED COMMUNUNICATIONS SYSTEMS - GENERAL
Using the Defense Information Infrastructure (DII) as a backbone, the Navy has designed automated systems ashore and afloat to process message traffic with minimal intervention by communications personnel. Figure 2-1 depicts the system flow. This chapter describes these systems, providing information to the communicator to assist in effective management of these systems.
The Navy's automated software based communications systems are dynamic. To keep these systems current users can propose improvements or report defects in the software systems used by the Navy.
 
2.2              MESSAGING SYSTEMS
One of the most important concepts of operating in an organization that is spread across the globe is not just the ability to communicate, but to communicate quickly, effectively, securely, and with full accountability. With the development, fielding, and proliferation of Internet Protocol (IP) based communications (i.e. E-mail and Internet Relay Chat), the desire is to quickly share information by any means available and people do.
With that in mind, the average user would think that with all of the e-mail and chat going on in the Navy that record message traffic would soon be replaced. To the contrary, Navy personnel have not only continued to use record message traffic, but have exceeded the capabilities of messaging systems and their associated communications paths.
With constantly stressed low data rate (LDR) communications networks such as the Common User Digital Information exchange Subsystem (CUDIXS), the need to maximize use of the “new” IP paths has become a driving force in the future of Naval Messaging. Even with existing systems (i.e. pre-DMS) we find the need to adapt to our available resources.
2.2.1          DMS OVERVIEW
The DMS employs the messaging and directory services using internationally recognized cOTS-based X.400 and X.500 messaging and directory products. The DMS COTS baseline, which includes DoD military messaging, directory, and security enhancements, provides the messaging infrastructure for DoD electronic organizational messaging support. The DMS messaging and directory components are managed and protected by specialized systems management and security support mechanisms and components. The DMS management system uses system management tools and message tracing applications to isolate and identify problems and to report on the health and welfare of the DMS infrastructure.
Protocols and components of the Multi-level Information Security Service Initiative (MISSI) provide DMS security services. The MISSI Message Security Protocol (MSP) and the Fortezza encryption card provide encryption and digital signature services. Each Fortezza card contains encryption keys that are based on the organization or command's authorized level of clearance and digital certificates that are unique to the card's assigned organization. A designated Certification Authority (CA) uses a CA Workstation (CAW) to generate and post the encryption keys and digital certificates to the organization's Fortezza card and to the DMS X.500 directory. The MSP and the Fortezza card generate and exchange security tokens that support the exchange of digitally signed and encrypted messages between DMS users.
DMS network transport services are provided by the Defense Information Systems Network (DISN) and secure dial-up connections. DoN users receive DMS services or enabling capabilities through the allocation of various levels of messaging, directory and network management services, and DISN network or dial-up connectivity.
2.2.1.1           TACTICAL MESSAGE GATEWAY (TMG)
The MFI is an infrastructure-level component that provides protocol conversion between the DMS MTS and the DTH legacy- messaging environment. The MFI is the primary means of providing interoperability with DTH users that have not migrated to DMS, including the Allied and tactical users. MFI'S are typically located in DISA managed DMS Transition Hubs (DTH), which include legacy switching centers, or Navy LNOSC locations. The DMS automatically routes messages through an MFI whenever the recipient's DMS X.500 directory address contains a legacy preferred delivery attribute.
2.2.1.2       CERTIFICATION AUTHORITY WORKSTATION (CAW)
The CAW is a National Security Agency (NSA) certified and approved workstation that provides enabling technology that supports messaging security services of confidentiality, integrity, authentication, and non-repudiation. Organizations use the CAW for programming identities onto Fortezza Cards, generating public-key certificates, and posting security information to the DMS X.500 directory. An appointed CA is responsible for operating the CAW, programming Fortezza cards, and using the CAW along with an ADUA to post certificates and security information to the DMS directory.
2.2.1.3       MESSAGE CONVERSION SYSTEM (MCS)
Currently, the Defense Message System-Message Conversion System (DMS-MCS) is operational at the DISA DTH located at Fort Detrick MD. As fielded, the DMS-MCS is comprised of the Message Conversion System Message Processor (MCSMP), the MCS Directory Component (MDC), the Central Directory Component (CDC), and the Update Authority Component (UAC). The UAC portion of the DMS-MCS is located at NCTAMS LANT and NCTAMSPAC. The Navy has fielded Regional MCS' at the two NCTAMS. The Regional MCS configuration consists of the MCSMP and the MDC. Changes were made to provide supportable, removable hard drive capability and to provide a Mode I interface to the NOVA System. Although the UAC and CDC are not considered part of the Regional MCS configuration, the Regional MCS receives Plain Language Address (PLA) updates from the CDC via the SIPRNET.
The primary purpose of the Regional MCS is to provide PLA-to- Routing Indicator (RI) look up and assignment. After receiving a message from the host NOVA System, the Regional MCS will validate the message, assign the appropriate RI(s) and return the message to the NOVA for delivery. If invalid PLAs are found by MCS, the MCS will automatically generate a service message to the originator. Each invalid PLA will receive a RI of RUBDPLA side routed on the original message. The MCS provides a means of inserting Routing Indicator(s) (RI'S) in an ACP128 formatted message based on the PLAs contained in that message. Currently, any U.S. General Service (GENSER) subscriber employing ACP128 format and sending narrative pattern traffic may, upon approval, use the DMS-MCS for PLA-to-RI conversion. Both the Navy Regional MCS and DMS-MCS are transitional systems to aid customers in the migration from AUTODIN to DMS. Even though these systems are transitional, both are designed to remain viable until the phase­out of the AUTODIN system is completed.
2.2.1.4   DMS AND TACTICAL DMS PROXY AFLOAT SYSTEM
The Tactical Messaging DMS proxy system at TMG sites provides the ability to interface and translate DMS messages to and from tactical units, using approved DMS infrastructure components. The NCTAMS sites have a direct interface to legacy systems and have the Tactical Messaging DMS proxy capability which is supported by the Integrated Shipboard Network System (ISNS) hardware with software provided by the Common PC Operating System Environment (COMPOSE).
2.2.1.5       DEFENSE MESSAGE DISSEMINATION SYSTEM (DMDS)
DMDS is an end user message profiling application that automatically profiles and disseminates a command or organization's incoming message traffic. The organization can configure DMDS to distribute the profiled messages in either encrypted or unencrypted form. If DMDS distributes encrypted messages, all recipients will need Fortezza security services. Organizations must protect local networks that distribute unencrypted DMS messages in accordance with guidelines set forth in OPNAVINST 523 9.1.
2.2.1.6     MAIL LIST AGENT (MLA)
The MLA provides a collective addressing capability for DMS. The MLA receives messages addressed to a collective address called a Mail List and redistributes them to those recipients who are members of the Mail List. The Mail List in DMS is similar to the Address Indicator Groups (AIG), Collective Address Designators (CAD), and task force designators (TF) used in the DTH legacy system. The MLA accepts delivery of a message addressed to a Mail List only from the user(s) authorized to submit messages to that Mail List. The MLA adds each member of the Mail List as a recipient to the message. If it is an encrypted message, the MLA generates a token for each recipient so recipients can decrypt the message.
DIRECTORY SYSTEMS AGENT (DSA)
The DSA serves as a repository for the DMS directory information. This information, known as the Directory Information Base (DIB), contains organizational user attribute information such as the organization's directory name, digital certificates, network address information, and administrative information such as telephone numbers and mailing addresses. The DIB is distributed throughout the directory system in multiple DSA'S. Users access the DSA through the IDUA, a directory browser application.
2.2.1.8       BACKBONE MESSAGE TRANSFER AGENT (BMTA)
BMTA'S function as high-level message store-and-forward switches within the DMS MTS. BMTA'S are installed at DMS infrastructure level sites (i.e., Defense Information Systems Agency (DISA) Regional Network Operations and Security Centers (RNOSC) and Regional Nodes (RN)). BMTA'S serve as independent store-and- forward message switches between LNOSC'S, USMC LCC'S, major claimant sites, and DISA operated DMS infrastructure sites.
BMTA'S are generally downward connected to one or more LMTA'S or primary GWS'S and either laterally or upwardly connected to other BMTA'S. The BMTA receives messages from other BMTA'S located throughout the global DMS infrastructure and routes them according to specific routing algorithms.
2.2.1.9       LOCAL MESSAGE TRANSFER AGENT (LMTA)
The LMTA functions as an intermediate-level message switch that stores and forwards messages across a fully interconnected switch fabric called the MTS. LMTA's typically reside at LNOSC sites and store and forward message traffic destined to and from DMS specialty products (i.e., PUA, Mail List Agent (MLA), MultiFunction Interpreter (MFI)). LMTA'S are bound to a local DMS Directory System Agent (DSA) and make routing decisions based on specific information stored in the X.500 directory.
2.2.1.10       HIGH ASSURANCE GUARD (HAG)
The DMS HAG is a secure "gateway" component installed in the DMS secret messaging domain that selectively allows or denies message exchange between DMS NIPRNET and SIPRNET messaging domains. The HAG examines each message to ensure that:
1.  The organization has digitally signed and encrypted messages exchanged between NIPRNET and SIPRNET domains.
2.  Message originators and recipients are authorized to exchange messages between the DMS NIPRNET and SIPRNET messaging domains.
3.  All exchanged messages via the HAG are appropriately marked as unclassified.
4.  Messages exchanged between the two messaging domains may include file attachment(s) if the rules listed below are followed:
a.  Attachment types must be limited to specific file extension types authorized by the organization as being crucial to mission accomplishment.
b.  All messages must be signed and encrypted with hard- token Class IV Fortezza to provide authentication and non-repudiation.
c.  The DMS HAG must be capable of decrypting messages to ensure attachments are of the appropriate types and to perform a dirty word search.
d.  The organization must define the HAG Access Control List (ACL) to limit the users who can send attachments from low to high.
The HAG also passes directory information between specific directory servers in the two messaging domains. Unclassified directory information for message recipients in both messaging domains is accessible to users on the NIPRNET. Changes and updates to the unclassified directory information are passed through the HAG to the SIPRNET domain through a process known as directory shadowing.
2.2.1.11         SERVICE MANAGEMENT SYSTEM (SMS)
The SMS supports monitoring and control of DMS components at various management levels. The SMS is comprised of a data base system as well as specialized message trace applications, directory administration tools, and fault management applications for collecting data and reporting on the status of DMS components. The SMS message trace and fault management applications run on a DMS component called the Management Workstation (MWS). Directory administration is performed using a DMS component called the Administrative Directory User Agent (ADUA). The MWS also incorporates a trouble ticket system for tracking and managing system problems and outages. The SMS applications and its MWS and ADUA hardware component systems are typically installed at Navy LNOSC locations and USMC Control Centers.
2.2.1.12       GROUPWARE SERVER (GWS)
The GWS is a component that stores and forwards messages from the DMS client to Primary Groupware Servers (PGWS) or Local Message Transfer Agents (LMTA). The GWS, PGWS, and LMTA all serve as store-and-forward message switching devices within the DMS architecture. The GWS operates at the lowest level in the DMS Message Transfer System (MTS). The GWS provides direct message store-and-forward support to DMS clients. The PGWS and LMTA provide second echelon message store-and-forward support to local or remote GWS'S. The GWS, PGWS, and LMTA components are frequently co-located at sites with large concentrations of DMS clients. Typically, these components will be centrally located at Navy LNOSC'S. The USMC typically will deploy GWS'S down to the major command level. DmS clients must use dial-up connections whenever DISN network connectivity is not available and the GWS is remotely located.
Message Store (MS)
The MS serves as an intermediary between the DMS client and a GWS. The MS resides on the GWS and serves as an electronic mailbox for the DMS client. The MS or GWS mailbox accepts and stores messages on behalf of the organization until recipients download and delete the messages.
DMS Client or User Agent
The client, sometimes referred to as the User Agent (UA), is a software application installed on a DMS-compliant hardware platform. The DMS client enables the preparation, review, release, submission, delivery, storage, archiving, display, and printing of DMS messages. A single hardware platform and a single DMS client application may support multiple users. The DMS client also contains an Integrated Directory User Agent (IDUA). The IDUA function allows the user to search the directory for addressing information that can be added directly to drafted messages or cached in the user's Personal Address Book (PAB) for later use.
2.2.2           TROUBLE MANAGEMENT SYSTEM (TMS)
To support the goal of increased reliability, Enterprise Network Management System (ENMS) has been fielded with a Trouble Management System (TMS) as an integral part of the network management tool set. TMS is based on the commercial “Remedy” product that is used extensively in the private sector to provide relevant data on network performance. TMS will be used by the shore establishment to track, from inception to completion, all events impacting service to individual or multiple units. ENMS will build databases that identify trends and provide hard data on performance that our current infrastructure is incapable of doing. That will aid in decision making about where to expend our precious fiscal and manpower resources to improve C4 service to the warfighter.
As with any automated system, the manner in which data is entered is critical to its success. TMS has the capability to automatically extract data from COMSPOT reports and fleet service advisories when presented in specific formats. To realize the capabilities that TMA offers, message drafters must take great care to ensure that data fields relevant to the incident at hand are formatted as directed herein. Messages not properly formatted
will result in delayed action due to unnecessary human intervention.
For COMSPOT reporting format and further guidance refer to Appendix B.
2.2.3   AUTOMATED MESSAGE STORE AND FORWARD (NOVA)
NOVA is a UNIX based, base-level Mode 1 store and forward terminal (Figure 2-2) dependent on the worldwide switching functions of the DTH to relay messages to other commands outside the immediate area of responsibility, services and agencies.
NOVA is a store and forward switching system that provides automated readdressal and quote functions for authorized users. For message accountability purposes, the system assigns a unique Processing Sequence Number (PSN) to each message received. This PSN provides a means of message recall and is used as part of an automated readdressal or quote request. NOVA provides duplicate checking and First-In First-Out (FIFO) by precedence processing. Received messages are sorted by routing indicator and delivered to the DTH and backside terminals, using Mode 1 protocol. NOVA performs validation of format lines 2 through 4, 12a, 12b, 15 and 16 of ACP 128 messages. Messages found to be in error are diverted to a Service Intercept Position (SIP) for manual intervention. If the message cannot be corrected at the SIP the message will be serviced by the NOVA operator. Installation of the nOva Virtual Circuit Protocol (VCP) brings a Local/Wide Area Network interface into the NOVA application in addition to the AUTODIN Mode One interface. Use of this interface reduces the number of connections to the DTH.
 
2.2.4           PERSONAL COMPUTER MESSAGE TERMINAL (PCMT)
PCMT is a microcomputer-based message processing system designed for low-volume telecommunications facilities. This store-and- forward processing system is operated by message center or fleet center personnel. PCMT provides exchange of messages between the telecommunications facility and user organizations using diskette media, Secure Telephone Units (STU) III or dedicated connectivity.
2.2.5           GATEGUARD
GateGuard serves as the primary legacy system interface point for DoN Organizations. It provides a gateway communication link from the AUTODIN Subscriber Terminal (AST) (e.g., Nova, MDT or PCMT) to an organization's Automated Information System (AIS) or Office Automation System (OAS). GateGuard was the first DoN messaging system to fulfill the "idea" of extending messaging services to the user level. Traffic received by the Nova, MDT or PCMT can be transferred electronically to GateGuard, which will ensure only

traffic of a classification level not exceeding that of the OAS communications line is transferred. GateGuard is capable of processing Unclassified to Top Secret SPECAT A type messages.
GateGuard can function as either a dedicated delivery device (paper or diskette) or as a gateway. The GateGuard system is composed of three elements: A Guard Device (for use on dedicated links), an AUTODIN Gateway Terminal (AGT), and a Gateway Communication Link to an arbitrary AIS. The AST communication link uses Local Digital Message Exchange-Remote Information Exchange Terminal (LDMX-RIXT) communication protocol. To the AST, GateGuard appears to be an attached RIXT and is also capable of providing a Mode I interface to suitably equipped hosts. The AGT is designed for operation by an organization's administrative personnel. The AGT can provide paper or diskette media for message dissemination within the organization. GateGuard exchanges data with the supporting AST using the communications link or diskette media. Unless a DMS-approved automated message release capability is available on the AIS, messages cross the communication link from the GateGuard to the AIS in one direction. The GateGuard performs the following functions:
1.  Audit Trail.
2.  User Identification.
3.  Message Storage and Retrieval.
4.   Format Checking.
5.  Security Checking.
6.  Precedence Notification.
7.  Message Routing.
8.  AST Mode I Interface.
If the communications link between GateGuard and the AST is not contained entirely within controlled spaces, it must be covered by approved communication security (COMSEC) equipment. The circuit must be covered even if only UNCLASSIFIED messages are exchanged. A KG-84 may be used to cover a circuit that will carry messages of any classification. STU III may be used to cover circuits that pass messages classified up to and including TOP SECRET.
2.2.6   FLEET MESSAGE EXCHANGE (FMX)
Fleet Message Exchange (FMX) replaced the Naval Computer Processing and Automatic Routing System (NAVCOMPARS). Whereas NAVCOMPARS consisted of five, loosely joined sites using similar
applications, FMX implemented a tightly integrated system of two sites running identical, interacting applications and using a worldwide tactical network to share data and resources. The FMX application rides on a layer of trusted, advanced commercial off- the-shelf (COTS) software: two UNIX operating systems, a Relational Database Management System (RDBMS), TCP/IP based LAN software, and an X Windows Graphical User Interface (GUI). The application operates on a platform of advanced computers connected locally by an Ethernet LAN and worldwide by the Defense Information Systems Network (DISN). Figure 2-3 depicts the in­line system configuration.
Two operating sites have been established for FMX; one at NCTAMS PAC Honolulu, HI and NCTAMS LANT Norfolk, VA. FMX consists of three separate components. One of these is a new system that is responsible for keying the fleet broadcast (BCST) and providing the necessary functionality to support the fleet broadcast requirements. This component is the Fleet Broadcast Keying System (FBKS). To reduce development time and need for operator interaction, FBKS was developed as a simple store and forward system. It runs on the same hardware platform as DUSC. Although FBKS and DUSC are functionally separate systems, they share the same database and use the same message parsing and validation software.
FBKS is connected on the backside of the NOVA system. In addition to providing the interface to FBKS, NOVA system provides the interface to the existing Common User Digital Information Exchange System (CUDIXS) and provides routing and alternate routing between circuits for FBKS and CUDIXS.
DIRECTORY UPDATE SERVICE CENTER (DUSC)
The Directory Update and Service Center (DUSC) is a multi-purpose system that will produce directory updates for the Defense Message System (DMS) Update Authority Component (UAC) and database updates for the FMX. The updates will be automatically produced from communications guard shift messages and collective update messages. DUSC will also process communications guard list request messages and allow operators to service fleet messages with errors found by the DMS Message Conversion System (MCS). DUSC performs the following functions:
1.  Provides for operation of the service message center.
2.  Produces directory updates for the DMS UAC from Communications Guard Shift (COMMSHIFT) messages and Collective update messages.
3.  Produces database update messages for FMS and FMX systems.
4.  Processes Communications Guard List (COMMGRDLST) request messages.

5.  Provides access to the CDC for query purposes.
6.  Two operating sites have been established, one at NCTAMS PAC, Honolulu, HI, and the other at NCTAMS LANT, Norfolk,
VA. NCTAMS PAC will be designated as the Master DUSC (MDUSC) and NCTAMS LANT will be the Alternate DUSC (ADUSC). The MDUSC is the only site that will be allowed to provide update transactions for the UAC. The ADUSC will have the capability of assuming full DUSC responsibilities of the MDUSC for contingency purposes.
Commshifts are processed at the DUSC system. The DUSC system sends updates to the UAC (Update Authority Component). The UAC then updates the CDC (Central Directory Component). The CDC then updates/replicates information to all MSC's (Message Conversion System). The DUSC also sends commshift updates to the FSM and FMX sites.

NEWSDEALER Message Switching System, much like the NOVA system, acts as the AUTODIN by-pass. NEWSDEALER MSS performs message switching, message safe storage, and message origination, creating a record communications infrastructure supporting the entire Intelligence Community. Both Defense Special Security Communications System (DSSCS) and General Service (GENSER) messages are exchanged. This system provides record communications for selected United States SIGINT System (USSS) field sites. Fielded systems have the capability to communicate with each other via the National Security Agency's wide area network (NSANet). Message routed outside of the USSS community are routed over the Defense Messaging Transition Hubs (DTH) or one of the NEWSDEALER Bridge Sites connecting NSANet and the Joint Worldwide Intelligence Communications System (JWICS).
Each NEWSDEALER is capable handling the ACP-128, DOI-103, DOI-103 Special format and Abbreviated Message Format (AMF). These systems may interface with computers, Automatic Message Handling System (AMHS), Message Correction System, Mode I and II circuits, STUIII Dial-up, and Virtual Circuit Protocol (VCP).
NEWSDEALER AMHS has simplified the task of drafting ACP, DOI 103, and DOI 103 Special formatted messages where as the actual message format is transparent to the user. AMHS provides simplified message drafting, coordination, and release of outgoing messages and a message internal distribution and delivery function for incoming messages.
A Virtual Circuit Protocol (VCP) has been defined to encapsulate record messages and transmit them using TCP/IP. As an added measure of security, a short header attached to the front of each VCP message transmitted contains a transaction ID indicating that it is a record message and the message size.
2.2.10   NAVAL MODULAR AUTOMATED COMMUNICATIONS SUBSYSTEM (NAVMACS)
NAVMACS is designed to increase the speed, efficiency and capacity of naval afloat and ashore communications operations.
The NAVMACS modular concept allows the system to be configured according to the particular afloat platforms' requirements.
Current versions of NAVMACS are:
1.  NAVMACS (V)2 provides up to four channels of fleet broadcast input; subscriber satellite interface to CUDIXS; and, the capability for on-line messaging. The (V)2 installation includes: computer (AN/UYK-20), teleprinter, printers, magnetic tape unit, paper tape unit and computer/satellite interface unit.
2.  NAVMACS (V)3 offers more automated features for fleet users. The V3 program provides four channels of fleet broadcast input, four channels of Full Period Termination directly on­line with the system and a subscriber satellite interface to CUDIXS. NAVMACS V3 will support 2.4kbps NON-DAMA or DAMA operations via the CUDIXS link. The (V)3 installation includes: two computers (AN/UYK-20), video display units, printers, magnetic tape units, paper tape unit and computer/satellite interface unit.
3.  NAVMACS (V)5 enhances automated communications with the addition of remote terminals for message input. The system also provides a subscriber satellite interface to CUDIXS.
To allow drafters at remote locations as well as message center personnel the opportunity to edit and retrieve messages, storage is on disk in addition to magnetic tape. The (V)5 suite includes: three computers (AN/UYK-2 0A or AN/UYK-44), video display units, RD-433 disks, magnetic tape units, paper tape units, computer/satellite interface unit and printers.
(a) This system provides the operator with 24 flexible- purpose serial input/output (i/o) channels which can be configured as any of the following:
1.      75, 300, 600, 1200 baud circuits.
2.    "Daisy-chained" remote displays and printers.
3.      Remote systems, e.g., CVIC.
4.     High speed tape readers.
5.     High speed tape punches.
6.      Compatible remote systems, e.g., Naval Intelligence Processing System (NIPS), and Personal Computer Remote System and (PCRS).
4.    NAVMACS (V)5A like NAVMACS (V)5 also enhances automated communications with the addition of remote terminals for message input. This system was developed primarily for the AEGIS equipped ships. The system also provides a subscriber satellite interface to CUDIXS. To allow drafters at remote locations as well as message center personnel the opportunity to edit and retrieve messages, storage is on disk in addition to magnetic tape. The (V)5A installation includes two AN/UYK-2 0A or AN/UYK- 44 computers; three AN/USQ-69 video display units in the main communications space and up to eight more for remote message input/output; two RD-433 disks, for program loading and short term message storage; two AN/USH-2 6 cartridge magnetic tape units (CMTUs) for backup program loading and long term message storage; two RD-3 97/UG Paper tape units for message input/output; an ON- 143(V) interconnecting box for interface between the computer and the satellite RF equipment; and three TT-624 high-speed printers located in main communications. It provides the operator with 14 flexible-purpose serial input/output (i/o) channels which can be configured as any of the following:
a.  75 baud circuits.
b.  "Daisy-chained" remote displays and printers.
c.  External systems, e.g., CVIC.
d.  High or low speed tape readers.
e.  High or low speed tape punch
f.  Compatible remote systems, e.g., Naval Intelligence Processing System (NIPS), Personal Computer Remote System (PCRS)
5.   NAVMACS II is a communications processor that provides message services to end users as well as command, control, and communications (C3) systems and will ultimately replace older versions of NAVMACS. It can be configured as either an afloat platform or as an ashore site. NAVMACS II replaces various communications systems previously employed by the U.S. Navy and all outdated versions of NAVMACS (V1 through V5/V5A). The purpose of NAVMACS II is to receive process, store, distribute, and transmit internal and external messages automatically.
NAVMACS II provides interfaces to multiple external systems of the DMS, including land lines and radio frequency (RF) circuits. It also provides interfaces to local systems within the NAVMACS II network. NAVMACS II is supported by software that performs the communications processing required by all connected systems, including a user interface. It allows end users to perform a variety of tasks, based on their security clearance level, authorization, and need. Basic tasks include reading and sending messages to other users on site. Advanced tasks include configuring system databases and performing system administration (Figure 2-4).
NAVMACS II is configurable on a site-by-site basis for the unique requirements of its users. The system (designated AN/SYQ-7A(V))
architecture is based on the Tactical Advanced Computer-3 (TAC- 3), a Hewlett-Packard™ 700 series computer. The minimum requirement for NAVMACS II is one TAC-3 computer (with the UNIX- based HP-UX™ operating system) configured as a “main communications” processor. The NAVMACS II main communications processor handles the processing and storage of all incoming and outgoing messages at a site, and is normally located in a site's primary communications area. Another type of processor may also be required in the main communications area to provide interfaces to external communication systems. This processor is the NAVMACS II Communications Controller (NCC). At sites with multiple users requiring access to NAVMACS II, additional TAC-3 computers may be configured as severs and clients on local area networks (LANs). Personal computers (PCs) may also be configured as clients.

 
Figure 2-5 CUDIXS Capabilities
2.2.12   SUBMARINE SATELLITE INFORMATION EXCHANGE SUBSYSTEM (SSIXS)
The SSIXS provides the SSN/SSBN Commanding Officer with an optional satellite path to complement existing VLF/LF/HF broadcasts. When the position of the submarine permits visibility of a satellite, and where the tactical situation permits exposure of a submarine mast-mounted antenna, the sub­system provides rapid exchange of digital information between SSN/SSBN submarines and shore stations. It also provides access to the satellite path through a programmable mixture of query-

response and broadcast without query so as to provide maximum operational flexibility to the submarine commander. All transmissions provide automatic, reliable, long range, and cryptographically secure UHF communications between submarines and shore stations and submarines themselves.
SSIXS has the same equipment configuration as CUDIXS, except SSIXS uses magnetic tape for message storage. Additionally, the shipboard version of SSIXS has an ON-143(V)6 microprocessor for interface via satellite with the shore SSIXS.
.13 BATTLE GROUP INFORMATION EXCHANGE SUBSYSTEM (BGIXS)
Battle Group Information Exchange Subsystem (BGIXS) provides the BG Commander on a properly equipped CVN or LHA/LHD dedicated battle group additional SATCOM support.
The BGIXS provides capability for direct, two-way, tactical communication between deployed battle group units and submarines at 4800 or 9600 bps.
2.2.14 NAVY REGIONAL ENTERPRISE MESSAGE SYSTEM (NREMS)
NREMS is the initiative to reduce the number of Navy DSP sites from five to two, eliminating the need for client-server DMS architecture and eliminating need for FORTEZZA cards / readers at the command desktop. NREMS provides web-based messaging capability that allows users (with accounts) to send and receive DMS messages using a web browser or via SMTP. The benefits are that it replaces current client-server DMS architecture and FORTEZZA at the command desktop and enables customers to use a personal computer web-browser to generate/receive messages and eliminate desktop software patches required by DMS.
NREMS provides DMS message service through the use of a web browser or SMTP e-mail client. Automated Message Handling System (AMHS) implements on-site redundancy and full Continuity of Operations Planning (COOP) capability between NCTAMS LANT and NCTAMS PAC. NREMS is scheduled to be complete in 2008.
FLEET BROADCASTS
GENERAL INFORMATION
With certain exceptions all ships, either individually or through guard ship arrangements will copy the Fleet Broadcast.
2.3.2           CONTROL OF THE FLEET BROADCASTS
Control of the Fleet Broadcasts is the responsibility of the FLTCOM's and/or numbered Fleet Commanders and is accomplished by four distinctive components of the Fleet Broadcast Communications System. These four components consist of:
1.  Broadcast Control Authority (BCA). The BCA implements an approved Fleet Broadcast, e.g., MULCAST, OPINTEL, RATT, for a specific communications area and provides direction and guidance to govern its assigned broadcast employment, configuration, and content. The responsibilities of a BCA may be self-assumed or delegated to a designated alternate.
2.  Broadcast Control Station (BCS). The BCS provides all the technical aspects of affecting a Fleet Broadcast, which include assembling key streams received from the various Broadcast Keying Stations (BKS) into specific broadcast channels and delivering a composite key stream to the Broadcast Radiating Station (BRS) for transmission. BCS and BRS are normally integral parts of a NCTAMS. Stations that possess a TD-1150 and have connectivity to a particular BKS and BRS have the ability to perform BCS functions.
3.  Broadcast Keying Station (BKS). The BKS introduces message or facsimile traffic into the Fleet Broadcast Network by generating a key stream of broadcast-bound information to the BCS for specific channel allocation before being forwarded to the BRS for broadcast transmission. Because of the diversity of broadcast-bound information, various BKS'S within the NAVCOMMAREA may key individual channels of multi­channel broadcast.
4.  Broadcast Radiating Station (BRS). The BRS radiates the broadcast signal to the Fleet via Satellite, Super High Frequency (SHF), and/or Low Frequency (LF). Both area NCTAMS have the ability to rekey/radiate individual broadcast channels via 75BPS Guard Numbers on all DAMA networks upon approval from the numbered fleet commander controlling the broadcast. Additionally, those units that possess SHF terminations can receive individual broadcast channel support or receive the entire aggregate from area BCS via FCC-100 connectivity.
2.3.3           COMMUNICATIONS GUARD REQUIREMENTS
Cognizant FLTCOM's require all commissioned ships and commands afloat to guard their assigned broadcast(s). Commands can meet this requirement by actively copying the broadcast or having the assigned broadcast screen ship in company supply the type channel of required broadcast. Only the vessels listed below are exempt from the above communications guard requirement:
1.  Foreign manned MSC Ships (USNS).
2.  Contract operated/tankers manned by civilians (USNS).
3.  Time chartered ships under the operational control of MSC (SS).
4.  Voyage chartered ships not under the operational control of the MSC, and cargo carrying ships at Berth (traffic rates).
With the advent of Automated Systems such as Fleet SIPRNET Messaging (FSM), SHF Gateguard units do not routinely submit COMSHIFTs when entering port. Units that do not resubmit COMMSHIFTs and lose primary delivery paths are cautioned that if primary path and secondary (ZOV path) are lost, Category I and II messages can and will be sent to tertiary paths listed in the latest COMMSHIFT on file at the Master Update Authority. For those units listing Fleet Broadcast channel (usually common channel) as an authorized ZOV route will have message traffic transmitted to it. Subsequently for those units not guarding the Fleet Broadcast while in port could possibly encounter numerous non-deliveries since the Fleet Broadcast does not require operator acknowledgement after the message is generated from the Fleet Message Exchange System (FMX). It is highly recommended that units that do not intend to monitor the Fleet Broadcast or CUDIXS termination while inport, have those ZOV routes removed from their COMSHIFT and replaced by a shore messaging system such as dial-in Gateguard or over the counter service to area NCTAMS.
2.3.4           BROADCAST IDENTIFICATION
Unique four-letter designators identify broadcasts. The first letter indicates the naval communication area (L-Atlantic and Mediterranean, P-Pacific). The second and subsequent letters identify whether it is a single or multiple channel broadcast and the broadcast type. NCTAMS LANT has assumed broadcast functions for the Atlantic and Mediterranean regions thusly removing the “M” designator that most communicators became familiar with. Additionally, NCTAMS PAC has conducted the same type merger for IMUL (Indian Ocean) Broadcast.
2.3.5     FREQUENCIES
Each NCTAMS generates Daily Communications Status Report Messages (often referred to as the 2301Z) that provide current down-link frequencies for UHF broadcast along with individual guard numbers for single channel DAMA support. In the rare event High Frequency (HF) support is required, submit Immediate precedence COMSPOT to the area NCTAMS to determine if single channel support is available in that area. HF, Multi-channel support is no longer offered to fleet units.
CIRCUIT CONFIGURATION
The source documents for block diagrams, equipment descriptions and quality control monitoring procedures for circuits are the Communications Quality Monitoring System documents (SPAWARSYSCOMINST 2 700.1 and SPAWARSYSCOMINST C2700.2) dated 27 January 1989. Commands may order these documents from the ASO Naval Publications and Forms Center, 5801 Tabor Ave., Philadelphia, PA 19120-5099 using NSN 0913-LD-054-7770 and NSN 0691-LD-319-9600 respectively.
2.3.7           CRYPTOGRAPHIC COVERAGE
Key list requirements and restart times for covered broadcast circuits are located in the appropriate CIBs; The EKMS Manager can provide the effective edition of the keying material.
Restart procedures are per applicable CIBs and KAO'S. EKMS 1 (SERIES) contains information on cryptographic systems.
2.3.8           BROADCAST MESSAGE NUMBERING
Each broadcast message is assigned a nine (9) position alphanumeric Broadcast Channel Sequence Number (BCSN) to ensure traffic continuity. The BCSN consists of a four-letter broadcast channel designator and a five digit sequence number, which indicates the number of cumulative transmissions that occurred for the particular channel. This number runs from 00001-99999 and is reset monthly at 010001Z. Should the sequence number exceed 99999 within a given month, the counter will reset to 00001 until the end of the month, and then reset again to 00001 to begin a new month. The BCSN is preceded by the message transmission identification (TI) indicator VZCZC (see paragraph below).
BCSN numbering continuity for overload channels is maintained the same way as above. In a situation where an overload channel is deactivated and then reactivated in the same month, the BCSN will run consecutively from the last number used. The overload channel activation message will indicate the first overload BCSN to be transmitted.
2.3.9           BROADCAST MESSAGE FORMAT
Each message originally transmitted over a broadcast channel that is keyed by FBKS will be formatted as follows.
EXAMPLE
VZCZCPMAA01013
R 220933Z FEB 00 PSN 000207H09
FM JCS WASHINGTON DC
TO USS CHOSIN
INFO USS HUE CITY
USS GETTYSBURG
BT
UNCLAS //N02300//
MSGID/GENADMIN/JCS//
SUBJ/EXAMPLE OF A BROADCAST MESSAGE// REF/A/GENADMIN/CHOSIN/101213ZFEB00//
RMKS/(40 MORE LINES OF TEXT)
PAGE 02 PMAA01013 UNCLAS (REMAINING TEXT) //
BT

#01013
NNNN
Each original broadcast transmission of a message, over either the single or multi-channel broadcast will begin with the Transmission Identification (TI) indicator and BCSN. The TI indicator consists of the characters "VZCZC". The V's purpose is to clear the circuit path of any extraneous characters and the ZCZC is to signal the start of a message indicated by the beginning of format line 2 of the message. Retransmissions will commence with the operating signal ZFG repeated three times.
EXAMPLE
ZFG ZFG ZFG VZCZCPMAA01014
O 220514Z FEB 00 PSN 000472H13 ZNZ1 FM USS SAN JOSE TO USS CALIFORNIA BT
TEXT
BT
#01014
NNNN
Before a message queues to a broadcast channel, FBKS validates delivery requirements specified in format lines 2, 4, 7 and 8.
The system rejects misrouted messages to the DUSC for service action.
To save transmission time FBKS edits each message. Because format lines 2 and 4 are validated by Nova they are not transmitted.
Side routes on format lines 7 and 8 are also validated and removed. Original page lines are removed and F/L 15 is replaced with the BCSN.
Lengthy messages are paged into blocks of 50 lines. Each page block will begin with a page number, BCSN, and the message classification. This is done to enhance a message's readability and ease of reproduction.
Nova assigns every message received an accountability number, called a Processing Sequence Number (PSN). This 6-digit number is included on F/L 5. It is followed by the site's letter identifier and a checksum of the PSN. The first letter of the BCSN and the F/L 5 site identifier will normally be the same. A difference between the two indicates that the screen action should be to the site identified on F/L 5.
Messages retransmitted over a single or multi-channel broadcast in reply to a Broadcast Screen Request (BSR) will begin with the operating signal ZDK repeated three times, followed by the TI indicator and the BCSN. The remainder of the transmission is the actual message beginning with F/L 5.

EXAMPLE
ZDK ZDK ZDK VZCZC PMAA00036
R 162038Z FEB 00 PSN 017677H28 FM COMSPAWARSYSCOM WASHINGTON DC//PMW151//
TO USS ENTERPRISE BT
UNCLAS //N02300//
MSGID/GENADMIN/CSWSC//
SUBJ/BROADCAST MESSAGE FORMAT//
RMKS/THIS IS AN EXAMPLE OF BROADCAST MESSAGE FORMAT//
BT
#00036
NNNN
2.3.10         BROADCAST RECAPS
Every 30 minutes a message summary (RECAP) is transmitted for each active first-run and overload broadcast channel. The RECAP provides a summary of the traffic that was transmitted the previous half hour. RECAP'S are assigned immediate precedence and are queued at the top of the immediate message queue.
A RECAP message for a first-run channel will show the associated overload or rerun channel. Likewise, a RECAP for an overload channel will show the associated first-run channel. Shipboard personnel should note this information each time a RECAP is received. This will help insure all appropriate broadcast channels are being copied.
The text of the RECAP reflects the BCSN, precedence, date—time- group, originator and broadcast addressees for each message transmitted on that broadcast channel. RECAP DTGs are always assigned on the half hour. Part one identifies the message transmitted including precedence, DTG, Originator, and any pertinent Q and Z signals. Part two identifies the specific CSNS that were sent to specific commands. The following depicts the format of a RECAP for the Pacific Overload Broadcast.
EXAMPLE
VZCZCIOCC01019 O 230200Z FEB 00 ZNZ FM FMX PAC HONOLULU HI TO POCC BCST BT
UNCLAS SVC //N00000//

SUBJ: BROADCAST RECAO 230130 FEB 07 — POCC OVERLOAD 一 PMCC FIRST RUN PART ONE
1013      R 220933Z JCS WASHINGTON DC/USS

1014      0 220514Z USS SAN JOSE/USS CALIFORNIA/ZNZ
1015      P 201514Z COMNAVNETOPSCOM WASHINGTON DC/CTF
1016      P 230005Z FLEWEACEN GUAM/ZPW 240001Z FEB00
1017      R 230105Z USS SAN FRANCISCO/COMTHIRDFLT/
1018      CANTRAN PART 2
PMCC BCST
1013       01015 01016 USS CHOSIN
01014
CTF FOUR TWO
01017
BT
#01019
NNNN
BROADCAST SERVICE MESSAGES

 

Broadcast Screen Request (BSR)
BSR is a PROFORMA message designed for fleet broadcast subscribers to request the transmission (ZDK) of messages missed or received garbled on any fleet broadcast. PROFORMA messages should be prepared using the approved message preparation software program. Every message sent over a broadcast channel is retransmitted over the associated rerun channel after a two-hour delay, if the rerun channel is not being used for some other purpose. Broadcast Keying Stations (BKS) generate summary messages every half-hour identifying intended recipients of a particular broadcast number. This helps recipients identify missing broadcast numbers/messages. Prior to sending a BSR to the broadcast station, every attempt must be made to obtain the missed messages from rerun channels, ships in company while underway, or shore communications facilities when in port. Subscribers will ensure each BSR cancels previous outstanding requests and lists all outstanding numbers on the broadcast channel concerned. Ships will send BSR's to the BKS unless otherwise directed.
If a recipient misses 50 or more broadcast numbers, the numbered fleet commander shall be included as an information addressee and a reason for outage should be identified by adding a remarks set to the BSR PROFORMA message. If the request is in excess of 100 total broadcast numbers, separate BSR'S in increments of 50 numbers must be generated. BSR's received with more than 100 Broadcast Screen Numbers (BCSN) will be rejected.
Each BSR will be complete in itself and will include all numbers missing at the time of submission, less missed numbers known not to be addressed to ship's or embarked commander's guard list.
This information is available on hourly FMX generated RECAP summary messages.
Embarked commanders who are assigned a routing indicator (RI) different from the RI assigned to the host ship must be included

when submitting a BSR. Embarked commanders, squadrons, detachments, etc., which share the host ship's or embarked commander's RI will not be included.
If a Broadcast Screen Ship (BSS) is designated prior to an exercise or operation, the BSS is responsible for gathering missed message input for ships in company and submitting a consolidated BSR.
The following format is currently used for submission of BSR'S. Detailed information for drafting BSR'S is available in NTP 4 Supp-2.
Retransmissions in response to BSR'S are only provided to those ships which are addressees (or have embarked commands) addressed in the missing numbers (messages) requested. Retransmissions are transmitted under the original broadcast numbers prefixed with a ZDK pilot.
In the event of an FMX failure which causes the BKS functions to be shifted, instructions will be provided to fleet units concerning BSR submission procedures.
EXAMPLE
RTTUNJSR RUEOMID3463 1191000-UUUU--RHMCSUU.
ZNR UUUUU
R 281000Z APR 00 ZYB FM USS JOHN C STENNIS TO FMX PAC HONOLULU HI BT
UNCLAS //N02790//
MSGID/BSR/STENNIS//
SCRN/USS JOHN C STENNIS /COMCARGRU THREE//
CHAN/PMAA/BSN:00012/BSN:00023/BSN:00050/BSN:00053//
CHAN/PMCC/BSN:00056/BSN:00087//
SCRN/ATKRON FIVE FOUR TWO//
CHAN/PMDD/BSN:000 90/BSN:000 92/BAND:00100-00103/BSN:00113// SCRN/USS JOHN C STENNIS //
CHAN/PMCC/BSN:00075//
PERIOD/2 00001ZJAN2 001/24235 9ZJAN2 001//
BT
#3463
NNNN
Broadcast Screen Summary (BSS)
The FBKS in response to a BSR generates the Broadcast Screen Summary (BSS). The BSR response will originate from the servicing FMX site and will bear the appropriate PLA for the site, i.e. FMX PAC HONOLULU HI. Examples of BSS responses are listed below:
1.  NO MESSAGES FOUND. (MASTER UPDATE AUTHORITY has screened originator BSR and missing messages are of no concern to

  originator.)  
2. FOL NRS CANTRAN.
3. FOL NRS ZFK 1/2.
4. FOL NRS ZDK AT TIMES INDICATED.
5. FOL NRS ZDK ASAP.
6. FOL NRS ZOV ASAP.
7. FOL NRS TO BE TRANS WITH NEW NRS.
8. FOL NRS TRANS AT TIMES INDICATED.
9. ERROR. (BSR contains error(s), Unable
  and resubmit.)
Broadcast Screen Summary Reply Example
 
 
OTTUZYUW RHOENPM00 9 9 0311030-UUUU--RHMCSUU.
ZNR UUUUU
O 311030Z JAN 00 ZYB FM FMX PAC HONOLULU HI TO USS NIMITZ BT
UNCLAS
MSGID/GENADMIN/FMX PAC//
SUBJ/BROADCAST SCREEN SUMMARY// REF/A/BSR/NIMITZ/311000ZJAN2 001/-/N〇TAL//
RMKS/
1.   ATKRON FOUR TWO
A. NO MESSAGES FOUND.
2.   USS NIMITZ
A.    FOL NRS CANTRAN: PMAA00023.
B.    FOL NRS ZFK 1/2 : NONE.
C.   FOL NRS ZDK AT TIMES INDICATED: PMAA00012/0310930
D.    FOL NRS ZDK ASAP: PMAA00050, PMAA00053, PMCC00053,
3.         USS JOHN C STENNIS
A. FOL NRS ZOV/ASAP:PMCC00075
4.   ERROR/USS NIMITZ/CHAN/PMDD/FIELD 5 INVALID, 99003 PROCESS/CORRECT AND RESUBMIT//
 
Figure 3-3 is the check-off sheet used for keeping a record of broadcast numbers received or transmitted. This form provides for the number received, the classification of the message, and also provides a record of destruction for classified traffic. These forms may be reproduced locally. A similar form is available through supply channels (Stock number 0196-LF-301- 8350).

2.3.12         BROADCAST OFF THE AIR MONITORING (OTAM)
OTAM is a computer-based monitoring system for up to 16 circuits. The fleet centers located at the NCTAMS and selected NAVCOMTELSTA'S monitor the fleet broadcast by receiving the same broadcast copied by fleet units. The monitor copy ensures channel continuity, crypto synchronization, and provides an analytical source for identifying and solving problems.
All broadcast channels transmitting live traffic (including those uncovered) will be monitored off the air to ensure proper operation. Area NCTAMS may assign OTAM responsibilities for individual broadcast channels to stations other than the originating station provided the designated stations can meet the tasking within existing manpower and equipment resources. No more than one station is required to monitor the same broadcast channel except when unusual conditions dictate. Keep NETWARCOM advised of situations involving unusual conditions. Support and residual stations which rekey broadcasts are required to conduct normal quality control of broadcast circuits and where equipment allows, should spot check with OTAM as part of the quality control effort.
Include the term OTAM in the remarks column of the broadcast line item in the station TELCOR Section I summary. Broadcast originating stations and those commands assigned OTAM functions are to include the broadcast monitoring and broadcast transmit equipment in the appropriate sections of the communications operating facility report.
2.4     TYPES OF BROADCASTS
2.4.1           FLEET MULTICHANNEL BROADCAST SYSTEM
The Fleet Multi-channel Broadcast System (MULCAST), provides the means of delivering message traffic to the Fleet. The MULCAST System is a highly flexible system providing global broadcast service to the Fleet via four major communications areas. FBKS keys the MULCAST. The paragraphs below describe the characteristics of MULCAST in terms of its broadcast area, FLTCOMS, operating frequencies, channelization and general operating procedures.
BROADCAST AREA FLTCOM
 
Operating frequencies: MULCAST may be operated on Satellite, Low Frequency (LF), Medium Frequency (MF), High Frequency (HF) and

Ultra High Frequency (UHF) ranges. Consult current CIB'S for operating frequencies.
Due to inherent limitations of HF propagation, the HF component of the MULCAST (when activated) is transmitted simultaneously on several frequencies to permit diversity reception. In some cases, diversity reception overcomes the anomalies of HF propagation and reduces the probability of broadcast interruption. Recipients of the MULCAST can use one of two methods for diversity reception which are:
Frequency of RF diversity in which the information signal is transmitted/received on two separate frequencies simultaneously. Shipboard use of frequency diversity permits uninterrupted circuit operation since fading over two different frequencies will seldom occur at the same time. Polarity diversity uses a vertically and horizontally polarized antenna to copy a single frequency.
A maximum of sixteen channels of information are combined to form the multi-channel broadcast. The multi-channel broadcast transmitted via satellite carries 15 channels of information (channel 16 contains system frame/sync data). Most ships maintaining their own guard are required to copy at least the common channel. If traffic tempo dictates, overload channels are activated to clear first run traffic. When required, overload channels are also used to rekey allied broadcasts in support of U.S. units participating in combined operations. Area CIB's reflect the current assignment of broadcast channels. These broadcasts are normally keyed continuously but require restarts at the beginning of each new CRYPTO day.
Normally all first-run traffic is retransmitted two hours later over the associated rerun channel, i.e., PMAA first-run traffic sent between 1400Z-1500Z will be transmitted over the rerun channel PRAA at 1600-1700Z. Because this procedure allows communications personnel the opportunity to copy broadcast numbers missed during the first transmission, submitting Broadcast Screen Requests (BSR) to obtain lower precedence missed numbers should be delayed until after the rerun transmission (see paragraph 419). If a RECAP message indicates that the missed number (message) is addressed to your ship/unit and the precedence is immediate or higher, BSR action may be necessary sooner.
Once a queue has been depleted on a first-run channel, it and its associated overload channel (if assigned) will commence rerunning messages. The last message transmitted will be the first message rerun. For example, if LMAA01016 was the last message transmitted it would be the first message rerun, followed by LMAA01015, LMAA01014, etc. A channel will revert to a first-run status whenever a new message is received.
2.4.2          WORLD-WIDE TACAMO (WTAC)
TACAMO (Take Charge And Move Out) is a survivable communications link during trans-attack and post-attack phases of conflict. It enables the President and the Secretary of Defense to directly contact submarines, bombers and missile platforms protecting our national security through strategic nuclear deterrence.
2.4.3           USW PATROL (VP) BROADCAST
The nature of USW patrol (VP) aircraft operations requires dedicated transmission of all ground-to-air traffic using the broadcast method. The VP broadcast operating in the HF mode serves as the primary vehicle for delivery of operational messages to aircraft regardless of the aircraft's mission, emission mode or supplemental means for delivery. COMPATWINGSPACINST C2330.1 and the Consolidated Maritime Brief Book provide broadcast operating instructions for the Pacific and Atlantic Ocean areas respectively.
2.4.4           SCI FLEET BROADCASTS
SCI communications utilizes three broadcasts, LMFF, IMNN and PMFF for the sole purpose of providing Over the Air Transfers (OTATs) of COMSEC keying material. These broadcasts are included in each particular fleet area, SSR-1 provided broadcast. Weekly OTATs are issued by UARNOC on the 7th, 14th, 21st, 2 8th and last day of the month. OTAT messages are sent the day prior to transmission of the OTAT. The OTAT message will contain the listing of the keying material that will be transmitted and the time of transmission.
2.5              MANAGEMENT AND CONTROL SYSTEMS
2.5.1          AUTOMATED DIGITAL NETWORKING SYSTEM (ADNS)
The primary function of the ADNS is to connect Navy shipboard networks to other ship and shore networks for transferring Internet Protocol (IP) data of various classification levels. The shipboard user can connect to the external networks of other Navy platforms and facilities and the Wide Area Networks (WANs) provided by the Defense Information Systems Agency (DISA).
The ADNS system is designed to allow network enclaves to route (IP) data over multiple RF mediums. The RF services include, but are not limited to, Super High Frequency Defense Satellite Communications System (SHF DSCS), Extremely High Frequency/Medium Data Rate (EHF/MDR), Extremely High Frequency/Time Division Multiple Access (EHF/TDMA) Interface Processor (EHF/TIP), International Marine/Maritime Satellite (INMARSAT B), SHF Commercial Wideband SATCOM program (CWSP) (which will be replaced by the Commercial Broadband Satellite Program (CBSP) beginning in 2008) and pier connections. The ADNS system provides Wide Area Network (WAN) connectivity to the shore by passing IP data over available RF mediums using Point-to-Point Protocol (PPP) for link establishment and maintenance. By dynamically routing IP data using Open Shortest Path First (OSPF), the ADNS system can choose which RF link to use to reach the shore.
RADIO COMMUNICATIONS SYSTEM (RCS)
The Radio Communications System (RCS) consists of several exterior communications subsystems which, in combination, provide all exterior communications requirements for the ship with the exception of the Special Intelligence Communications requirements. The RCS subsystems are turnkey installations and consist of the following subsystems: High Frequency Communications System, Very High Frequency Communications System, Ultra High Frequency Line-of-Sight Communications System, Ultra High Frequency Satellite Communications System, Extremely High Frequency Satellite Communications System, Super High Frequency Satellite Communications System, Communications Support Segment, Naval Modular Automate Communications System II, and the Bridge to Bridge Communications System.
NAVY ORDERWIRE TERMINAL (NOW)
NOW is A PC-based system that supports up to four full duplex circuits using Navy Orderwire software in conjunction with two Frontier Communications boards. The system replaces Teletype equipment formerly used on four orderwires and has message storage and retrieval capabilities as well as an editor for message preparation. Circuit logs may also be stored and retrieved. An optional printer may be attached for message copies and logs. This circuit is not certified and will not be used to pass traffic except as a last resort.
2.5.4          AUTOMATED NETWORK CONTROL CENTER / AUTOMATED TECHNICAL CONTROL (ANCC/ATC)
The ANCC and ATC are functionally identical except for size. ANCC/ATC replaces manual patch and test facilities ashore with a fully redundant computer-controlled switching and circuit monitoring system. This system provides the ability to reconfigure equipment interconnectivity and perform circuit monitoring for out-of-tolerance conditions in advance of circuit outages. At deployed locations, this system supplies 98 percent of voice, video, and data connectivity. Failures result in major C4I disruption of services to and from the operating forces in an entire communications area.
2.5.5           MULTI-CIRCUIT PATCH PANEL (MCPP)
The multi-circuit patch module provides for equipment interfaces requiring a database (DB)-type interface. It contains two non­powered (without LEDs) multi-circuit patch panels and a quick connect panel QCP. Two of the patch panels contain 17 patch modules while the others contain 16 patch modules. The two containing 17 patch modules have a test module with a DB 25-pin connector and standard modular patch jack. The two containing 16 patch modules have a test breakout module for connecting individual signals. Each patch module has line, equipment, and monitor appearances. The common signal interface to a patch module will be electronic industry association (EIA) standard RS- 232 for unbalanced and RS-53 0 for balanced. However, the following common interfaces RS-232/-423/-422/-530 or MIL-STD-188- 114 can be accommodated. Up to eight RS-423/-422 37-pin interfaces and twelve RS-232/-530 25-pin interfaces can be selectively pinned out using the QCP, thus eliminating a need to fabricate special cables when deployed. Interfaces from the multi-circuit module may also be routed through the high-speed COMSEC case for encryption/decryption. Two multi-circuit modules are provided with each TCTC package.
All Transit Case Technical Control (TCTC) modules may be interconnected using one-for-one standard DB 25- or 37-pin connector cables available from most telecommunications companies. Depending on the TCTC module, a number of female connectors on a rear signal entrance panel (SEP) are available for interfacing between modules. This allows interfacing with equipment using one-for-one cables to facilitate rapid set-up and interface. Connectors on the module SEPs are identified by the signal interface convention to which they conform; i.e., rS- 232/423/422/530 and MIL-STD-188-114. To accommodate equipment- specific pin-outs, signal conversions are accomplished in the TCTC module using quick connect/disconnect panels, thus eliminating the need to fabricate special cables when deployed. CJCSM 6231.01B defines the joint communications network model that the TCTC supports. A deployed JTF in a bare-base environment provides the basis for this model. The model can be changed to meet specific operational requirements. Internodal communications provides connectivity among DISN, JTF headquarters, and service component headquarters and their forces, along with supporting elements such as the JSOTF and its subordinate forces. The Air Force, Army, Navy, and Marines have component headquarters and forces. This network links the deployed locations by satellite and microwave troposcatter/line of sight. This transmission media supports the extension of common-user transports consisting of JWICS, NIPRNET, SIPRNET, record communications (AUTODIN and DMS), VTC, and other special- purpose circuits. The TCTC is capable of extending all of these transports or communication services.
SA2112(V) (SAS)
The heart of the radio transmitter and receiver distribution system is the SA-2112 single audio system (SAS). The SA-2112 secure switching unit, commonly referred to as the SVS or "coke machine", is the key element in the SAS. The SAS provides the ship with an integrated secure (cipher)/nonsecure (plain) R/T voice system. SAS features allow remote operating positions to select either cipher or plain voice operations without reconfiguring the existing system. It also provides automatic switching between remote operating positions and radio sets or
crypto equipment, centralized control and monitoring of the system, and a built-in-test (BIT) capability.
2.5.7           TIMEPLEX LINK 2+
The LINK/2+ has become the primary full or half-duplex, first level multiplexer for Navy tactical SHF communications. LINK/2+ is an intelligent transmission resource manager (TRM) currently supporting Navy SHF and commercial operations, providing high- performance networking capabilities for facilities with large I/O requirements. It is a multi-system high-capacity networking device for voice, data, and imagery communications transmissions over T-1/2.048 Mbps data rate (European)(E1) or lower speed facilities. It provides smart multiplexing, bandwidth efficient management and full network management capabilities.
The LINK/2+ incorporates a modular design for enhanced flexibility, reliability, and improved network performance. Navy SHF uses a basic 18-slot chassis, with the capability of an 18- slot-expansion chassis (two-nested) system. It is capable of processing digital data, voice (voice compression), and video synchronous, asynchronous, isochronous, asymmetrical (different transmit and receive speeds on the same channel), and simplex signal processing.
The LINK/2+ is capable of operating 12 trunks at aggregate data rates of 4.8 Kbps to 2.048 Mbps each (not to exceed 7 T-1's, each at 1.544 Mbps).
NETWORK SERVICES AND ARCHITECTURE
ROUTING ARCHITECTURE
Routing involves the forwarding of IP packets across a network to the intended destination IP address. Routing occurs at Layer 3 (the network layer) of the OSI reference model. To determine the optimal path for a packet to travel, routing protocols use metrics. To assist the process of determining the path a packet will travel, routing algorithms create and maintain routing tables (list of associations used to decide the next router a packet should be sent to reach ultimate its destination).
2.6.2       DISN TRANSPORT SERVICES
The Defense Information System Network (DISN) provides a variety of voice, video and data transport services for classified and unclassified users in the continental United States (CONUS) and overseas (OCONUS). DISN supports customer requirements from 2.4 Kbps to 155 Mbps (OCONUS) and 2.5 Gbps (CONUS). Its best-value network solutions include inherent joint interoperability, assured security, redundancy, high reliability/availability, 24/7 in-band and out-of-band network management, engineering support and customer service.
DISN transport services are available to all Department of Defense (DoD) agencies and military services, as well as other federal government agencies. Services can be ordered through the telecommunications control officer (TCO), who will validate requirements and verify funding authorization.
DoD Teleport System
The Defense Information Systems Agency (DISA) is implementing the Department of Defense (DoD) Teleport System. The system will integrate, manage, and control a variety of communications interfaces between the Defense Information System Network (DISN) terrestrial and tactical satellite communications (SATCOM) assets at a single point of presence.
The system is a telecommunications collection and distribution point, providing deployed warfighters with multiband, multimedia, and worldwide reach-back capabilities to DISN that far exceed current capabilities. Teleport is an extension of the Standardized Tactical Entry Point (STEP) program, which currently provides reach-back for deployed warfighters via the Defense Satellite Communications System (DSCS) X-band satellites.
This new system provides additional connectivity via multiple military and commercial SATCOM systems, and it provides a seamless interface into the DISN. The system provides inter- and intra-theater communications through a variety of SATCOM choices and increased DISN access capabilities.
The system will be implemented in three phases:
1.   Generation One - Currently being implemented. Generation One (FY02-08) architecture adds capabilities to a subset of existing STEP sites. It will provide satellite connectivity for deployed tactical communications systems operating in X-band (DSCS and follow-on X-band satellites), commercial C- and Ku- bands, Ultra High Frequency (UHF), Extremely High Frequency (EHF) SATCOM and initial Ka-band capabilities.
2.   Generation Two - This generation (FY 06-08) consists of implementing additional Ka-band terminals and a NETCENTRIC capability. The Ka-band terminals will provide interfaces to the Wideband Global System (WGS) program, which will provide Ka-band and X-band coverage with throughput far exceeding the current DSCS satellite constellation.
3.   Generation Three - This Generation is currently undefined and funding has not been identified. A capabilities development document is in development and a funding approach will be sought by the Joint Capabilities Board. For more information Email: 
GIG Enterprise Services
The Defense Information Systems Agency's (DISA) Global Information Grid Enterprise Services Engineering (GE) directorate plans, engineers, acquires and integrates joint, interoperable, secure global net-centric solutions satisfying the needs of the warfighter and develops and maintains a first-class engineering workforce to support the needs of DISA's programs. GE's core competencies include disciplined IT end-to-end systems engineering, security expertise for the Global Information Grid, leveraging commercial-off-the shelf products and services to solve joint and coalition needs and provide value added, trustworthy global net-centric solutions. Contact: GES Project Office at
Global Combat Support System (GCSS) Combatant Commanders/ Joint Task Force (CC/JTF)
GCSS (CC/JTF) is an initiative that provides end-to-end visibility of retail and unit level Combat Support (CS) capability up through National Strategic Level, facilitating information interoperability across and between CS and Command and Control functions. In conjunction with other Global Information Grid elements including Global Command and Control System-Joint, Defense Information Systems Network, Defense Message System, Computing Services, and Combatant Commands/Services/Agencies information architectures, GCSS (CC/JTF) will provide the information technology capabilities required to move and sustain joint forces throughout the spectrum of military operations.
GCSS (CC/JTF) supports the Combatant Commanders and their assigned Joint Task Forces by providing access to comprehensive logistics information from authoritative data sources. This access provides the warfighter with a single, end-to-end capability to manage and monitor units, personnel and equipment through all stages of the mobilization process. By providing access to high-level integrated information, GCSS (CC/JTF) enhances the ability of Combatant Command and JTF Commanders to make timely, informed decisions based on the near real-time or predicted status of his resources.
Mission
Provide end-to-end information interoperability across combat support and command and control functions to support the Combatant Command & Joint Task Force Commanders.
GCSS (CC/JTF) Warfighting Capabilities
1.  Provides dynamic access to command & control, intelligence, and logistics data via a single gateway.
2.  Provides browser-based, PKI-enabled capabilities on the SIPRNet and CAC-enabled capabilities on the NIPRNet.
3.  Provides joint logistics applications via a single sign on.
4.  Single, Mobility System, Global Transportation, Network, Intelligent Rail/Road Information Server, Asset Visibility, In-transit Visibility, Integrated Data Environment.
5.  Consuming web services from NGA's mapping capability (Adopt before you buy, Buy before you Create).
6.  Provides access to NCES' E-Collab from GCSS (CC/JTF).
7.  Provides permission-based, knowledge management system (KMS) for file-sharing within and across combatant commands.
8.  Provides ability for end-users to run reports and export to other formats, e.g., briefing, spreadsheet, .pdf.
9.  Provides a Watch Board to monitor critical items.
10. Provides a modular, net-centric, service oriented
environment for agile, flexible, rapid development and
delivery of critical capability.
11. Provides a Civil Engineers Modeling tool: Joint
Engineering Planning and Execution System (JEPES).
2.6.3         COMMUNICATIONS WITHIN DISN DATA SERVICES NETWORKS
CONNECTIONS TO THE INTERNET
1.  All bureaus and posts having access to OpenNet are required to establish Internet connectivity through OpenNet Plus. If OpenNet service is available to the bureau/post, the Department will no longer fund or approve Dedicated Internet Network (DIN) service unless the bureau or post has a valid waiver to implement a DIN.
2.  A post may have a contract with an Internet Service Provider (ISP) to provide bandwidth for contingency and VNet (also know as Virtual Private Network (VPN)) provided and managed by IRM/OPS/ENM/ND. This is to provide the post with an alternate route for connectivity back to the Open Net infrastructure and does not require a waiver.
3.  Information Resource Center (IRC) public access terminals have been granted a waiver from this policy; i.e., ODI (Overseas Dedicated Internet) LANs may continue to provide Internet access and other Public Diplomacy services to the public. Local networks used as test, development, web hosting, and research environments may also connect locally to the Internet, but can only do so after receiving a waiver. These Local Area Networks (LANs) are not to be linked to
OpenNet Plus or used by employees to carry out Department business transactions. Bureau/post must terminate all unauthorized use of ODI LANs no later than 90 days after OpenNet Plus is implemented at the bureau/post.
4.  The Department realizes that there may be exceptions to the requirement for accessing the Internet via the OpenNet.
Posts and bureaus may request a waiver to this policy. The IT Change Control Board (CCB) will review such requests on a case-by-case basis.
REQUESTING A WAIVER TO THE INTERNET CONNECTION POLICY
A Bureau/post requesting authorized continued use of a Dedicated Internet Network (DIN) connection must submit the DIN access waiver request. All DIN solutions must comply with the Department's standards and FAM guidance. Provide the following information when submitting the waiver request:
1.  Post or bureau name.
2.  Post or bureau point of contact, e-mail address, and telephone number.
3.  Location serviced by DIN.
4.  Type of Internet access service (DSL, dial-up, other).
5.  Configuration details (number of connections, users, rooms to be served).
6.  Purpose of the service.
7.  Reason requirement cannot be satisfied through OpenNet Plus (for example: Protocol is not available through OpenNet Plus—website not accessible).
8.  What post/bureau is doing to reduce risks (i.e. firewalls, virus protection).
9.  Projected costs.
10.    Timeframe of exception.
Submit DIN Access Waiver Requests by e-mail to “IT CCB Management” or by telegram or memorandum to the IT CCB Change Manager, IRM/OPS/ENM/NLM/ECM. The IT CCB Change Manager will conduct an abbreviated review with relevant IT CCB primary review authorities and will ensure the request appears on the next IT CCB meeting agenda for consideration and decision.
If a request for a waiver is denied, the bureau/post may send an appeal to the Chief Information Officer for final decision. If a bureau/post's network is connected to the Internet outside of OpenNet Plus and without the signed DIN waiver, the bureau/post is in conflict with security guidelines. If unauthorized Internet connections are detected, the responsible office will be instructed to disconnect them.
SWITCHES AND ROUTERS
A network switch is a computer networking device that connects network segments. Low-end network switches appear nearly identical to network hubs, but a switch contains more “intelligence” (and a slightly higher price tag) than a network hub. Network switches are capable of inspecting data packets as they are received, determining the source and destination device of that packer, and forwarding it appropriately by delivering each message only to the connected device it was intended for, a network switch conserves network bandwidth and offers generally better performance than a hub.
A router is a device that extracts the destination of a packet it receives, selects the best path to that destination, and forwards data packets to the next device along this path. They connect networks together; a LAN or WAN for example, to access the Internet. Some routers are available in both wired and wireless models.
2.6.5          UNCLASSIFIED BUT SENSITIVE INTERNET PROTOCOL NETWORK
(NIPRNET)
NIPRNET is a global long-haul IP based network to support unclassified IP data communications services for combat support applications to the Department of Defense (DoD), Joint Chiefs of Staff (JS), Military Departments (MILDEPS), and Combatant Commands (COCOM). Provide seamless interoperability IP services to customers with access data rates ranging from 56Kbps to 1.0Gbps via direct connections to a NIPRNET router, remote dial­up services (56Kbps), services to the Tactical community via ITSDN/STEP sites, and access to the Internet.
2.6.6         SECRET INTERNET PROTOCOL NETWORK (SIPRNET)
SIPRNET is the DoD's largest interoperable command and control data network, supporting the Global Command and Control System (GCCS), the Defense Message System (DMS), collaborative planning and numerous other classified warfighter applications. Direct connection data rates range from 56Kbps to 155Mbps. Remote dial­up services are available to 19.2Kbps.
AUTHORIZED SERVICE INTERRUPTION (ASI)
DISA policy requires that the best possible communications service be provided to warfighters and users of the Global Information Grid (GIG). This correlates to the availability of communications equipment and facilities. Periodic maintenance varies from the removal of equipment to a complete shutdown of a
DISN facility. These scheduled interruptions are generally known in advance and every effort must be initiated to provide continuity of service to the users during the scheduled interruptions. The DISA CONUS ASI Manager is the approval authority for routine service interruption requests on DISN stations, nodes, links, trunks, and circuits. The DISA CONUS Commander is the sole authority for approving/canceling ASIs with the CONUS Theatre. Cancellations and rescheduling will be accomplished by the DISA CONUS ASI Manager in conjunction with the guidance provided by the DISA CONUS Commander in coordination with the Global NetOps Center (GNC).
Types of ASIs:
Emergency Service Interruption (Real time operational impact only): Service interruptions to correct hazardous or degraded conditions where loss of life/property could occur through lack of immediate action. No prior coordination or user release is required (reference DISA Circular 310-70-1, c7.3.4.7). The facilities involved must notify users when time permits and report the circumstances to the NOC Controller or SCO/Watch Officer as soon as possible. These situations must also be reported to the appropriate DISA and O&M elements as time permits.
Urgent Service Interruptions:
Service interruptions that do not qualify as an emergency but are requested inside the 21-day prior notice period. A justification to waive the 21-day prior notice requirement must accompany the initial request. The DISA CONUS ASI Manager will stringently review the request and justification. The only exception to the 21-day notice policy is for the P4035 Optical contractor.
NOTE: Lack of coordination or resources is not a valid justification. It is important to note that urgent requests that do not have a valid 21-day justification will be handled as routine requests. The Commander, DISA CONUS has sole authority to approve urgent ASIs once customer concurrence is received.
Routine Request:
A service interruption in which the request is received no later than 21 days prior to the requested scheduled interruption. The requesting O&M elements must notify the DISA CONUS ASI manager no later than 21 days in advance of the requirement and request tentative approval. The only exception to the 21-day notice policy is for the P4035 Optical contractor. Facilities must submit times/dates avoiding peak traffic hours (1100z - 1800z) during the weekday. However, if a CONUS ASI will affect a real time mission in another AOR, the ASI will be scheduled to accommodate that mission.
Upon completion of the ASI, the appropriate maintenance activity will notify the NOC Controller or SCO/Watch Officer. The GNSC SCO will provide verbal notification to the GNC SCO of the ASI status.
Extension of an Ongoing Approved ASI - The GNC has sole authority to approve/disapprove ASI extensions for inter-theater systems supporting Europe, Pacific, and CENTCOM arenas. The GNSC SCO has authority to approve/disapprove extensions on the recommendation of the NOC Controller or SCO/Watch Officer of up to 1 hour to complete ongoing scheduled ASIs within CONUS. The GNSC SCO will notify the GnC SCO that an extension was granted. Extensions beyond 1 hour require DISA CONUS Commander approval and will be coordinated with the GNC SCO after mission impact has been jointly assessed by the GNSC and GNC SCO.
If an ASI has to be cancelled, the Node Site Coordinator or NOC Controller or SCO/Watch Officer will notify the DISA CONUS ASI Manager immediately or the GNSC SCO (after hours). The ASI Manager will notify the users by sending a cancellation message and the reason for cancellation to the field. If the cancellation comes immediately prior to the maintenance, then telephonic notification between the applicable NOC and users is authorized. An official cancellation/reschedule message will be sent as soon as possible.
CARRIER RATES (T1, E1, OC3, OC12, ETC)
A carrier signal is a frequency in a communications channel modulated to carry analog or digital signal information. For example, an FM radio transmitter modulates the frequency of a carrier signal and the receiver processes the carrier signal to extract the analog information. An AM radio transmitter modulates the amplitude of a carrier signal.
-T1: A dedicated connection supporting data rates of 1.544Mbps. A T-1 line actually consists of 24 individual channels, each of which supports 64Kbps. Each 64Kbps channel can be configured to carry voice or data traffic. T-1 lines are a popular option because they allow for Internet connectivity. The Internet backbone itself consists of faster T-3 connections.
-E1: Ten years following the success of the T1, Europe decided they wanted their own digital transmission technology and subsequently developed the E1. An E1 connection supports 2.048Mbps. The E1 and T1 can be interconnected for international use. Europe has E carrier ratings from E1 to E5 with E5 supporting 565.148Mbps.
-T3: A dedicated connection supporting data rates of about 43Mbps. A T-3 line actually consists of 672 individual channels, each of which supports 64Kbps. T-3 lines are used mainly by Internet Service Providers (ISP) connecting to the Internet backbone and for the backbone itself.
-OC: Is short for Optical Carrier, used to specify the speed of fiber optic networks conforming to the SONET standard. Below are the speeds for common OC levels:
OC = speed

OC-1 = 51.85 Mbps OC-3 = 155.52 Mbps OC-12 = 622.08 Mbps OC-24 = 1.244 Gbps OC-48 = 2.488 Gbps OC-192 = 9.952 Gbps OC-255 = 13.21 Gbps
IT-21
IT-21 is an information transfer strategy that provides Network Connectivity capable of Voice, Data and Video for afloat units. It provides access to NIPRNET, SIPRNET and JWICS, and supports all tactical and non-tactical mission areas. IT-21 uses Commercial Off the Shelf (COTS) Technology to keep ships updated with the most modern equipment. The goal of IT-21 is to provide an integrated, coordinated, end-to-end warfighting capability.
INTEGRATED SHIPBOARD NETWORKING SYSTEM (ISNS)
ISNS is a collection of workstations, servers, switches and routers, both at the Unclas and Secret levels that connect numerous systems like GCCS-M, NTCSS, SAMS, OPINS etc., to external routers like ADNS. It provides Navy ships with reliable, high-speed SECRET and UNCLASSIFIED Local Area Network (LAN)s; Network infrastructure (switches routers, and drops to the PC); Basic Network Information Distribution Services (BNIDS); Access to the DISN Wide Area Network (WAN); Secure and Non-secure Internet Protocol Router Network -SIPRNET and NIPRNET, used by other hosted applications (i.e. NTCSS, GCCS-M, DMS, NSIPS,
NAVMPS, TBMCS, and TTWCS) and enables real-time information exchange within the ship and between afloat units, Component Commanders, and Fleet Commanders. Figure 2-6 depicts a generic ISNS architecture.

Generic ISNS Architecture
(ATM/GigE/Fast Ethernet)
 
2.6.9.2           NAVAL TACTICAL COMMAND SUPPORT SYSTEM (NTCSS)
NTCSS' goal is to provide tactical automated support for maintenance, supply, financial, material and personnel administrative matters. Using IT-21, the Navy-Marine Corps Intranet (NMCI) communication links, and COTS software, NTCSS hopes to achieve bi-directional database replications. Replicating administrative information will reduce the warfighter's workload.
FLEET NETWORK OPERATIONS CENTERS (FLTNOC)
Naval shore communications has evolved from a series of shore based radio stations to a highly sophisticated communications infrastructure. The requirement to support
isolated

integrated voice, video, and data has increased the complexity of a typical communications shore station. Consequently, The Naval Computer and Telecommunications Area Master Stations (NCTAMS) were developed to provide operational direction and management oversight to all subordinate telecommunications system users.
The IT-21 FLTNOCs provide a number of critical Internet Protocol (IP) services to the Fleet (both deployed and pier side) and act as regional gateways to the Defense Information Systems Network (DISN) IP networks in each of their respective Areas of Responsibility (AOR). This is accomplished through the use of a flexible network architecture that can meet unique needs of the different regional forces. The FLTNOCs were originally established as independent data communication systems that only serviced units within specific coverage areas.
The nomenclature for FLTNOCs is AN/FSQ-2 06. The Navy currently has four sites designated as IT-21 FLTNOCs': European Central Region Network Operations Center (ECRNOC) NCTS Naples Italy, Indian Ocean Region Network Operations Center (IORNOC) NCTS Bahrain, Pacific Region Network Operations Center (PRNOC) NCTAMS PAC and Unified Atlantic Region (UARNOC) NCTAMS LANT. The four IT-21 FLTNOCs are geographically dispersed around the world to service deployed users, provide the entry points for Navy Tactical Satellite Systems and also operate and maintain one or more Defense Satellite Communications Systems (DSCS) terminals. Each IT-21 FLTNOC is typically responsible for providing services to Fleet users located in their corresponding AOR. Current technology provides the ability for a unit to be terminated via satellite RF and terrestrial paths at almost any FLTNOC, regardless of geographical location. FLTNOCs are designed to provide IP services to Fleet IT-21/Integrated Shipboard Network System (ISNS) and deployed ground forces. All are capable of flexibly providing IP services based on unit's satellite RF capabilities including multiple simultaneous RF paths using Automated Digital Network System (ADNS), Automated Digital Multiplexing System (ADMS) or legacy.
The current IT-21 FLTNOC network architecture operates as individual ingress and egress points for Forward Deployed Naval Forces (FDNF) within their specific AOR to provide connectivity to the DISN. Connectivity to the IT-21 FLTNOC from the FDNF afloat platforms is primarily done via the ADNS, which uses available satellite communications systems to enable ship-to- shore data connectivity. Exceptions to this configuration exist, dependant upon the individual mission of the FDNF unit or IT-21 FLTNOC, and are handled on a case-by-case basis. Each IT-21 FLTNOC provides local back-up and restore services via the Network Attached Storage (NAS) and the Out of Band Network, but does not provide for off-site backup and restore services. Figure 2-7 provides a list of baseline equipment for the IT-21 FLTNOC per enclave.
NOC Equipment Description/Use
Premise Router Connection point for each NOC to the DISN network.
Outer Security Screening Router (OSSR) Security filtering for outside the firewalls. Provides load balancing for the Bastion Hosts via VLAN with ISSR.
Firewalls Bastion hosts. Provides packet filtering, application and layer 4- proxy services.
Inner Security Screening router (ISSR) Security filtering inside the firewalls. Provides load balancing for the Bastion Hosts via VLAN with OSSR.
Service Switch Load balances internal DNS, Email, virus scan and web services.
Virus Scanners Scans inbound and outbound Email and attachments for viruses.
DNSMail Servers DNS and Email (SMTP) store and forwarding services.
Fleet Router Serial and IP connectivity to the ADNS network and IT-21 FLTNOC RF (legacy serial) connectivity.
Tunnel Router Generic Routing Encapsulation (GRE) tunneling services to the Fleet in order to establish NIPRNet Open Shortest Path First (OSPF) adjacencies across the ADNS network.
Network Encryption System (NES)
Inline Network Encryptor (INE)
Tactical Local Area Network Encryptor (TACLANE)
Encryption devices.
Dial-in switch Provides in-line connectivity to the Fleet Router
POTS and Integrated Services Digital Network (ISDN) dial-in Routers Provides dial-in services over telephone or ISDN lines.
Management Switch Provides connectivity for management devices
 
Figure 2-7
NOC Core Equipment
 

 
Figure 2-8 depicts a simplified topology of the current IT-21 FLTNOC architecture and displays only the core equipment for a single enclave (from the Premise Router to the Fleet Router). For the sake of brevity, server subsystems are indicated as Service Suites and do not display the correct number of servers. For example, each IT-21 FLTNOC has at least five DNS Mail servers but is displayed as a single Mail/DNS Suite. Other suites that make up the IT-21 FLTNOC are the Firewall, Virtual Private Network (VPN), Intrusion Detection, Virus Scan, and Web Cache suites. The Premise Router is the ingress and egress Point of Presence (POP) for the IT-21 FLTNOC to the DISN and is considered an untrusted interface. The Fleet Router is the ingress and degree POP to the ADNS network, and is considered a trusted network. This trusted network is the user side of the network system. Also note the External DNS Suite in the below diagram. Fleet NOCs use a feature called Split Horizon DNS. This is used to provide different DNS query answers to requests initiated outside the enclave. If the DNS zone is active internally (inside a FLTNOC enclave), the DNS/Mail Suite provides the actual answers to a DNS query that can associate an IP address to a ship if the query is initiated from inside the enclave. To minimize configuration changes when ships traverse from one AIR to another, the IT-21 FLTNOCs utilize secondary IP addresses called Virtual IPs (VIP), which are duplicated between each IT-21 FLTNOC. Using VIP addresses helps to simplify configuration management and obviates configuration changes to the ship networks or servers for INCHOP/OUTCHOP. VIPs are used for DNS forwarding, Simple Mail transfer Protocol (SMTP) relay and Network Time Protocol (NTP).
All unclassified voice and IP data traversing the classified enclave for ship and shore commands is encrypted using a NES 4001A, INE KG-235 or a TACLANE KG-175.

 
INCHOP/OUTCHOP
To obtain IP services from a FLTNOC the following criterion must be met:
1.  Must have a valid Interim Authority to Operate (IATO) or Authority to Operate (ATO) obtained from NETWARCOM Designated Approving Authority (DAA). The unit Information Assurance Manager (IAM) can provide guidance on validating or obtaining an (I)ATO.
2.  Submit an IP services request message in accordance with Global Communications Information Bulletin (GCIB) 3A.
3.  If service will be provided via satellite communications link, a valid Satellite Access Authorization (SAA) for the intended satellite RF path is required.
The current system allows Fleet units to transit between AORs without making configuration changes to their ISNS equipment.
This is facilitated by default configurations in the ADNS and the ISNS that utilize the IT-21 FLTOCs VIP address scheme. With the exception of physical path connectivity, the gaining FLTNOC drives the Change of Operational Control (CHOP) process. Once the satellite communications link has been terminated at the gaining Technical Control Facility (TCF, the IT-21 FLTNOC will enable the Fleet unit(s) DNS zone on the internal DNSMail servers. All zone
changes through the entire INCHOP/OUTCHOP process are accomplished by using either the NOC management web interface of the DNSMail servers command line. The Fleet unit(s) IP addresses are then added to the “trusted networks” table on the Navy Firewall Security System (NFSS). The Fleet unit(s) homeport IT-21 FLTNOC, which is authoritative for their DNS zone resolution, will be notified by the gaining IT-21 FLTNOC to direct the Fleet unit(s) external Mail Exchanger (MX) record to the gaining IT-21 FLTNOC. After the gaining IT-21 FLTNOC has verified IP connectivity for the fleet unit(s), their losing IT-21 FLTNOC is notified to deactivate the Fleet unit's DNS zone(s) on their DNSMail servers. Service verification is accomplished by a test email from the IT-21 FLTNOCs domain to the Fleet unit(s) domain (i.e., a successful email transfer between ior.navy.mil and Washington.navy.mil). The only exceptions are for embarked units that must have a CHOP in and out of the Navy IT-21 FLTNOCs (e.g. Marine Expeditionary Units (MEUs) that move from Navy and Marine NOCs)). Additionally, the gaining IT-21 FLTNOC is also responsible for ensuring the unit's IP address Classes Inter­Domain Routing (CIDR) block is being advertised via the IT-21 FLTNOC connection to DISN.
2.6.9.3.2           IT21 FLTNOC SECURITY
The security posture for each IT-21 FLTNOC is independently administered but centrally governed by the Chief of Naval Operations (CNO)/NETWARCOM Unclassified Trusted Network Protect (UTN Protect) firewall policy. Use and enforcement of this policy is mandated by CNO and NETWARCOM security policies. IT-21 FLTNOCs are also tasked with implementing IP block lists and DNS black hole lists as promulgated by Navy Cyber Defense Operations Center (NCDOC).
2.6.9.3.3           CUSTOMERS AND SUPPORT
The following section details the personnel who are currently involved in the day-to-day operations of an IT-21 FLTNOC. There are several types of customers in the IT-21 FLTNOC environment. The customers utilizing satellite or pier connectivity for IT-21 FLTNOC access represent the Fleet users. Additionally, there are embarked units such as air wings and command staff who also utilize the ship and IT-21 FLTNOCs assets for services. It is also important to note that the NCTAMS and/or NCTS may be serving local customers that do not fall within the IT-21 FLTNOC Program, but require service.
The IT-21 FLTNOCs utilize a multi-layered support concept. Each support tier is discussed in further detail below:
1.  Tier One - Provided 24/7 by the active duty Watch
section. This support includes troubleshooting ship-to- shore and intra-NOC communications and acts as the primary resource for IT-21 FLTNOC operations. Daily
configuration changes and maintenance of the system are also performed.
2.  Tier Two 一 System Administrators are responsible for the providing the highest state of operational readiness and availability of the IT-21 FLTNOC to the Fleet.
3.  Tier Three - Provided by the Fleet Systems Engineering Team (FSET) engineers which provide specialized system technical support, engineering assistance, and on site training for all NCTAMS/NCTS personnel.
4.  Tier Four - SPAWARSYSCEN Charleston acts as the primary engineering activity for IT-21 FLTNOC development and provides In-Service Engineering Activity (ISEA) support for the FSETs, NCTAMS, NCTS and other Fleet services. The ISEA also provides logistics for equipment replacement, testing, and training, and as well as hardware and software upgrades for all IT-21 FLTNOCs. The ISEA contacts and interfaces with commercial off-the-shelf (COTS) and government off-the-shelf (GOTS) vendors as necessary for technical support.
2.6.9.3.4       NAVY REGIONAL NETWORK OPERATIONS AND SECURITY CENTER (NAVRNOSC)
The ultimate goal is to migrate from the current four Fleet NOCs concept into expanded roles within NAVRNOSCs. ECRNOC and IORNOC will eventually be collapsed and UARNOC and PRNOC will remain essential elements within RNOSC East and RNOSC West respectively. While they will continue to support the service provider functions of the NCTAMS in addition to managing their portion of the Navy Enterprise Network (NEN), they will also provide virtual views of the enterprise at the strategic, operational and tactical levels. The NAVRNOSCs serve as the technical arm for the Navy in aggregating the elements of Network Operations (NetOps) including Enterprise Management (EM), Network Defense (ND), and Content Management (CM), which supplements Situational Awareness (SA) and Command and Control (C2), employed to operate and defend their portions of the NEN. The NAVRNOSC provides network and system status, performance and ND events from outlaying CONUS and OCONUS elements including the OCONUS Navy Enterprise Network (ONE-NET), IT-21, Network Operations Centers and other systems.
The NAVRNOSC will monitor and control faults, configuration accounting, performance and security of the NEN elements for which they have operational responsibility. The NAVRNOSC will coordinate closely with, and provide users and higher echelons with network status reports and access to real-time data. Additionally, the NAVRNOSC will maintain records pertaining to customer information, local tier control center and site coordinator contact information, network resources, faults and
outages. NAVRNOSC operators will have the capability to remotely manage and control lower echelon systems through the Enterprise Network Management System (ENMS). ENMS has a suite of EM, ND, CM, C2 and SA tools that can be leveraged to provide a common NAVRNOSC operational picture to the Navy Global Network Operations and Security Center (NAVGNOSC).
2.6.9.3.5       PROGRAM EXECUTIVE OFFICE, COMMAND, CONTROL, COMMUNICATIONS, COMPUTERS AND INTELLIGENCE (PEO C4I)
INTELLIGENCE (PEO C4I)
PEO C4I is the program manager for the NOC system and as such is responsible for its life cycle management. As the acquisition agent, PEO C4I is accountable for cost, schedule, and performance. Two program offices within PEO C4I have responsibility for different subsystems. PMW 160 has program management responsibility for the Information Assurance (IA) product suite and PMW 790 has responsibility for the rest of the equipment. Once deployed and fielded, the architecture is supported and maintained with NCTAMS/NCTS personnel. SPAWARSYSCEN Charleston provides technical oversight and engineering support as directed by the PMWs.
2.6.10       NAVY MARINE CORPS INTRANET (NMCI)
The Navy/Marine Corps Intranet (NMCI) was developed to procure and manage information technologies (IT) for the Navy at the enterprise level. NMCI is a partnership between the Navy and industry whereby industry provides IT services purchased by individual Navy commands. The key point is that the Navy does not own or manage the hardware, software, or communications infrastructure. Rather, a command purchases the IT services it requires from a catalog of standard services, and industry will then provide the necessary hardware and infrastructure to deliver those services. Performance requirements for each service are governed by standard Service-Level Agreements (SLAs) to ensure that the command's operational requirements are met.
The NMCI contract was designed to support all basic networking needs of shore users to include:
Network access:
1.   NIPRNET
2.   SIPRNET
3.   Fleet NOC/USN ships
4.    Internet (via NIPRNET)
5.   Ships via piers
6.   Legacy USN networks (Non-NMCI standard).
End-user services:
1.  Standard office suites
2.   Web hosting and browsing
3.   E-mail.
Key concepts that contribute to the full operational capabilities of NMCI include:
1.  Standardizing DON (Navy and Marine Corps) polices, architectures, and products.
2.  Providing basic protection across the DON via the Regional Network Operations Centers (RNOCs) to include piers, bases, commands, posts, and stations.
3.  Maximizing use of commercial off-the-shelf (COTS) internet technology security components (i.e., firewalls, intrusion detection, virtual private network (VPN), virus scanning, etc.).
4.  Hardening infrastructure and diverse connections (i.e., protect against denial of service and/or respond to existing vulnerabilities).
NMCI physical infrastructure consists of numerous LANs connected by base area networks (BANs) for each base or region. Base and regional server and data farms with associated support staffs provide data services. The BANs are connected by two separate WANs to form the Navy enterprise network. Network management and monitoring is provided by four NOCs located at Norfolk, VA; San Diego, CA; Pearl Harbor, HI, and Quantico, VA.
NMCI is designed to provide end-to-end communications within the Navy, seamlessly integrating with afloat naval forces.
2.6.11         OVERSEAS NAVY ENTERPRISE NETWORK (ONENET)
Commands in each region operate and maintain their own IT infrastructure. The Navy is presently extending its enterprise network OCONUS under the ONE-Net modernization program at 16 major fleet concentration areas:
1.  Europe — Naples, London, Rota, Souda Bay, Sigonella, and La Maddalena.
2.  Pacific Far East — Yokosuka, Sasebo, Misawa, Atsugi, Okinawa, Korea, Guam, Singapore, and Diego Garcia.
3.  Middle East — Bahrain.
ONE-Net is intended to replace legacy Navy IT networks and will serve an OCONUS population of 26,000 users. ONE-Net will implement a gigabit Ethernet backbone network on Navy and Marine Corps bases located OCONUS. The ONE-Net architecture is modeled
after the NMCI design in order to insure compatibility and connects to NMCI and afloat networks via the DISN.
In addition to shore networks, ONE-Net has installed network connectivity at CONUS and OCONUS piers at Pearl Harbor, Japan, and Guam. There are validated additional requirements for OCONUS pier side connectivity at Italy, Spain, and Greece.
Operation of ONE-Nets is envisioned to be taken over by NMCI; however, host-nation agreement (HNA) and status-of-forces agreement (SOFA) issues need to be resolved beforehand. Therefore, the Navy Network OCONUS will continue to operate as a Government- Owned/Government-Operated (GOGO) network until transition to a Contractor-Owned/Contractor-Operated (COCO) environment occurs under NMCI.
2.6.12       CONSOLIDATED AFLOAT NETWORKS AND ENTERPRISE SERVICES (CANES)
BACKGROUND:
Over the last two decades, the explosion of networking capability has created unintended consequences aboard afloat platforms. For each type of network requirement the navy identified (e.g., tactical, administrative, classified, coalition, etc.), a separate, distinct network was developed and installed. As a result, the navy's program office for Networks, Information Assurance and Enterprise Services manages a portfolio of multiple, unique networks with various classification levels, operating systems, and protocols. These individual networks are difficult to certify and defend from attacks; they bring their own racks and servers; and they are unable to share server and storage resources. As a result, the space, weight and power required have reached capacity on many platforms.
In order to address these challenges, the program office developed a phased plan to migrate its primary network programs into a single overarching program called Consolidated Afloat Networks and Enterprise Services (CANES). CANES will have at its roots primarily the Integrated Shipboard Network System (ISNS), but will also incorporate the capabilities of other networks such as Combined Enterprise Regional Information Exchange System (CENTRIXS); the Sensitive Compartmented Intelligence Local Area Network (SCI-LAN); and the Submarine LAN.
The basic concept of CANES is to take hardware requirements and create a single consolidated computing environment using standard network infrastructure and a common rack architecture. Enterprise services will support hosting of both warfighting and administrative application programs. This evolution requires detailed technical exchanges between the programs' engineers and a significant amount of resource reprogramming.
CANES is a CNO-directed approach to reduce infrastructure and
provide increased capability across the afloat enclaves. It provides technical and programmatic realignment of afloat infrastructure and services, utilizing Open Architectures. CANES will replace ISNS.
CAPABILITIES:
Voice Services
a.   IP Telephony
b.  Mobile and Stationary
c.  Secure and Un-Secure Video Services
a.   Video Teleconferencing
b.   Video/Graphics Distribution Data Services
a.   Network Support
b.    Information Management
c.   Core Infrastructure Services
d.   Network Access (IPv4/IPv6 Capable)
e.   Information Delivery Systems Management
a.   Performance, Availability, & Service Level Mgmt
b.    Fault, Problem, Incident, & Service Desk Mgmt
c.   Configuration, Change, & Release Mgmt
d.   Security Mgmt, IA, CND
e.   Capacity Mgmt

CANES GLOBAL INFORMATION GRID - BANDWIDTH EXPANSION (GIG-BE)
The Global Information Grid (GIG) bandwidth Expansion (GIG-BE) is key to realizing the Department's enterprise information environment. It is providing a worldwide, ground-based fiber­optic network that will expand Internet-Protocol (IP)-based connectivity and at the same time effectively and efficiently accommodate older, legacy command, control and communications (C3) systems. This enables an exponential leap in ground-based voice, video and data exchange capabilities for the Department of Defense and the intelligence community.
GIG-BE created a ubiquitous “bandwidth-available” environment to improve national security intelligence, surveillance and reconnaissance, and command and control information sharing. To implement GIG-BE, DISA is aggressively enhanced the existing end- to-end information transport system, the Defense Information System Network (DISN), by significantly expanding bandwidth and physical diversity to selected locations worldwide. The program provides increased bandwidth and diverse physical access to approximately 100 critical sites in the continental United States (CONUS) and in the Pacific and European theaters. These locations are interconnected via an expanded GIG core. Specifically, GIG-BE connects key intelligence, command and operational locations with high bandwidth capability over physically diverse routes, and the vast majority of these locations will be connected by a state-of- the-art optical mesh network design.

2.6.14     HIGH SPEED GLOBAL RING (HSRG)
The AN/USQ-169B(V)1 High Speed Global Ring (HSGR) provides increased capacity and connectivity in the transport communications links between major Naval ashore claimants. The HSGR transforms the legacy AN/USQ-169A(V)1 Automated Digital Multiplexing System (ADMS) shore connectivity architecture into an integrated network of transport services that provides the warfighter with a dynamic, reliable, flexible and restorable transport service capability. The HSGR enables implementation of new and improved capabilities. These include Fleet Network Operation Center (FLTNOC)-to-FLTNOC connectivity and Joint Service Imagery Processing System-Navy Concentrator Architecture (JCA) connectivity.
The primary purpose of the HSGR is to provide an increased transport link between NCTAMS PAC, NCTS San Diego, NCTAMS LANT, NCTS Naples, Italy and NCTS Bahrain. The HSGR network utilizes ATM, which provides transport services for high speed classified and unclassified IP networks as well as existing Legacy to major shore sites. All IT-21 IP traffic bound for another IT-21 resource will remain on Navy controlled networks utilizing the HSGR. The HSGR uses Marconi TNX-1100 and Lucent PSAX 23 00 Asynchronous Transfer Mode (ATM) switches interconnected via DISN ATM services or commercial leased lines to interconnect the two NCTAMS, NCTS San Diego, NCTS Naples, Italy and NCTS Bahrain. The HSGR is depicted in Figure 2-10 and 2-11.

 
Figure 2-11 High Speed Global Ring mesh topology
1  HSGR ADVANTAGES
backbone enables reconfigurable class and Quality of (QoS) parameters for data transport supporting tactical ATM is a dedicated connection switching technology that es digital data into 53-byte cell units and transmits them physical medium using digital signal technology. ually, a cell is processed asynchronously relative to elated cells and is queued before being multiplexed over nsmission path. ATM transmission rates operate at either 55 Mbps) or OC-12 (655 Mbps), though speeds on ATM s can reach up to OC-192 (10 Gbps). Operationally, the chitecture supports the following critical warfighting ments:
Increased bandwidth capacity between major shore facilities to support the requirements of the warfighter, to include:
a.  Near-real-time access to information and network services.
b.  Support shipboard terminations above 2 Mbps.

2.  Automated Digital Network System (ADNS) Increment (INC) II/III load distribution, to include:
a.  Provide primary path for Unclassified (UNCLAS) traffic with Commercial Wideband Satellite Program (CWSP) capable ships terminated in NCTS Naples, Italy or NCTS Bahrain.
b.  Provide failover path for all classes of traffic over CWSP when Defense Satellite Communications System (DSCS) is unavailable.
c.  Provide failover path for JCA traffic when CWSP path is unavailable.
3.  Provide for FLTNOC-to-FLTNOC (N2N) and other inter­theater network services restoral.
4.  Super High Frequency (SHF) connectivity restoral.
5.  Consolidation of other program of record terrestrial leases, to include transition of existing ADMS trunks across the HSGR backbone.
6.  Interface with Department of Defense (DoD)
Transformational programs (e.g. DoD Telecommunications Portal (TELEPORT), Global Information Grid (GIG)- Bandwidth Expansion (BE) and Transformational Communications Architecture [TCA]).
The ADNS to HSGR interface bandwidth is currently rated at OC-3 (155 Mbps) with future growth to OC-12 (655 Mbps). However, the current provision for ADNS traffic across the ring is 18 Mbps.
The HSGR as the Navy shore ground transport architecture creates an infrastructure to provide new Fleet services, improve performance and reliability for Fleet services and creates a flexible infrastructure that scales for the consolidation or expansion of FLTNOC services. Additionally, it also provides the infrastructure to deploy enterprise collaboration tools and applications that were previously blocked by the Fleet boundary firewalls.
2.6.14.2     HSGR NETWORK MANAGEMENT
Network Management refers to the broad subject of managing computer networks, using a variety of tools, applications and devices. HSGR Network Management is accomplished through:
1.  Direct connect (console)
2.  Remote (IP, SNMP)
3.  Distributed Local Area Network (LAN) Emulation (DLE)
The following tools are used in support of network management of the HSGR:
Service On Data (SOD) is a Marconi product that was implemented to provide management capabilities for the HSGR

 

core ATM switches.
2.  Lucent AQueView is a Simple (SNMP) based software suite capabilities for the Lucent
3.  Solarwinds software package
2.6.15                  N2N - NOC TO NOC
Network Management Protocol that provides management PSAX edge ATM switches. to analyze bandwidth throughput.

 
There are four IT-21 FLTNOCs geographically dispersed around the world to service deployed users. Each IT-21 FLTNOC is typically responsible for providing services to Fleet users located in their corresponding AOR. The four independent FLTNOCs have their own separate connectivity centers and do not exchange data directly with other FLTNOCs. The IT-21 FLTNOCs are located at the following locations:
1.  European Central Region (ECRNOC)- NCTS Naples, Naples, Italy
2.  Indian Ocean Region (IORNOC)- NCTS Bahrain, Manama, Bahrain
3.  Pacific Region (PRNOC)- NCTAMS PAC, Wahiawa, Hawaii
4.  Unified Atlantic Region (UARNOC)- NCTAMS LANT, Norfolk, Virginia
As the Navy migrates towards a two Regional Network Operations and Security Center (RNOSC) and one Global Network Operations and Security Center (GNOSC), the evolution of IP services will become more simplified. The IT-21 FLTNOCs provide a number of critical Internet Protocol (IP) services to the deployed Fleet in each of their respective Areas of Responsibility (AORs). This is accomplished through the use of a flexible network architecture that can meet unique needs of the different regional forces.
These FLTNOCs were originally established as independent data communications systems that only serviced units within specific coverage areas.
N2N leverages the connectivity and capabilities of the High Speed Global Ring as a transport. Access points to the HSGR terminate within each FLTNOC, allowing the ability to route Internet Protocol (IP) data to each other without having to traverse through Defense Information Systems Network (DISN), and subsequently, the destination FLTNOCs Boundary 1 (DISN facing) firewall architecture. Figure 2-12 provides an overview of the HSGR and its entry points into each FLTNOC:

 
The upshot of implementing N2N is FLTNOC interconnectivity and restoral capability should a FLTNOC lose connectivity on their DISN path. If a FLTNOC is unable to utilize their DISN connection, their outbound network traffic will automatically be diverted across the HSGR to another FLTNOC to utilize their DISN path.
The establishment of N2N allows the following capabilities that were previously unavailable:
1.  Transform four independently operated FLTNOCs into a single unified IT-21 FLTNOC Enterprise, providing transparent redundant services and security to the Fleet.
2.  Provides the infrastructure to deploy Enterprise collaboration tools and applications that were previously blocked by the Fleet Boundary 1 firewall.
3.  Enhanced security by keeping Fleet traffic on Navy controlled networks.
4.  Enhanced security by providing an Enterprise wide view of security management and monitoring devices.
5.   Improved ability to withstand denial-of-service attacks.
6.  Enhanced network monitoring by providing an Enterprise view of all IT-21 FLTNOC circuits, servers, and equipment.
7.  Improve configuration management by providing the infrastructure for a central repository for system configurations (server/router/switch configurations).
8.  Eventually, with the exception of embarked units (e.g. CVW or CCSG), the need for IT-21 FLTNOC system configuration changes when ships move between AORs will be eliminated.
9.  Provide continuity of service for the Fleet in the event of IT-21 FLTNOC outages.
2.6.15.1     N2N REMOTE RESTORATION
The N2N Enterprise Network provides the framework for connectivity to a central repository, which maintains configuration management and off-site backups of FLTNOC assets.
A FLTNOC can retrieve device configurations from the central repository if necessary.
2.6.15.2     N2N SECURITY
Security in the N2N Enterprise Network architecture is addressed on multiple levels to include global policies, procedures and configuration management, and, inter and intra-IT-21 FLTNOC network device security. The routing architecture will be authenticated and encrypted where applicable which reduces the possibility of a false route being injected into the N2N architecture. At each physical ingress and egress of the HSGR's ATM interface will be an Edge suite that consists of a firewall, Intrusion Protection System (IPS) and Edge Router.
2.6.15.3     FAILURE OF THE DISN SERVICE AT THE IT-21 FLTNOC (FAILOVER)
In the event of a DISN failure, or major service outage, all services will be redirected to the failed IT-21 FLTNOC Fleet Router, through the HSGR, to the backup IT-21 FLTNOC Fleet Router. As an example, UAR IT-21 FLTNOC ships will appear as if
they are a PR IT-21 FLTNOC ship and will continue to receive all
via the PR IT-21 FLTNOC. The failover process is
to the Fleet customers and the users.

 

Figure 2-13 shows an example of a DISN failure at UARNOC.

IP Traffic Flow
IT-21 over HSGR
External over NMCI/DISN
Re-routed UARNOC IP Traffic >r----------------------
Figure 2-13 DISN failure at UARNOC

2.6.16             CLASSIFIED TRUSTED NETWORK PROTECTION POLICY (CTNPP)
/ UNCLASSIFIED TRUSTED NETWORK PROTECTION POLICY (UTNPP)
The Navy Classified Trusted Network Protection Policy (CTNPP) and the Unclassified Trusted Network Protection Policy (UTNPP) provide Navy enclave protection to reflect a defense-in-depth measure and the minimum standards for interconnection between Navy trusted networks (networks which comply with UTNPP/CTNPP) and untrusted networks. NTD 09-07 refers.
2.6.17         IP VERSION (IPV6)
Internet Protocol Version 6 (IPv6) is the next generation network layer protocol of the Internet as well as the GIG, including networks such as NIPRNET, SIPRNET, JWICS, and emerging DoD space and tactical communications systems. Implementation of IPv6 is necessary due to the fundamental limitations of the current Internet Protocol, Version 4 (IPv4) protocol, including a maximum of only 4,294,967,296 possible IP addresses (of which, almost 300 million are reserved for special purposes). An IP address is a unique address that computers, routers and switches use to communicate on a network. In its present form, IPv4 cannot support the long-term requirements of both the DoD and the commercial community. IPv6 overcomes these limitations by expanding the available IP address space to accommodate the worldwide explosion in Internet usage. This improves end-to-end security, facilitates mobile communications, provides new enhancements to Quality of Service (QoS), and eases management system burdens. Additionally, IPv6 is designed to run well on most modern high-speed networks (e.g. Gigabit Ethernet, OC-12, ATM, etc.) without experiencing significant decreases on low bandwidth systems. IPv6 also greatly expands the number of available unique IP addresses available for use and eliminates the need for complex address conservation methods such as Classless Inter-domain Routing (CIDR).
2.6.18         GLOBAL COMMAND AND CONTROL SYSTEM - MARITIME (GCCS-M)
GCCS-M is the maritime implementation of the joint services GCCS providing a single, integrated, scalable C4I system. The system supplies information that aids Navy commanders in a full range of tactical decisions. In functional terms, GCCS-M fuses, correlates, filters, and maintains raw data and displays image-building information as a tactical picture. Specifically, the system displays the location of air, sea, and land units anywhere in the world and identifies whether those units represent friendly, neutral, or enemy forces. It operates in NRT and constantly updates unit positions and other SA data. GCCS-M also records the data in appropriate databases and maintains a history of the changes to those records. The user can then use the data individually or in concert with other data to construct relevant tactical pictures, using maps, charts, map overlays, topography, oceanographic, meteorological, imagery, and all-source intelligence information all coordinated into what is known as a CTP that can be shared. Supplied with this information, Navy commanders can review and evaluate the general tactical situation, determine and plan actions and operations, direct forces, synchronize tactical operations, and integrate force maneuver with firepower. The system operates in a variety of environments and supports joint, coalition, and allied forces.
The GCCS-M architecture is composed of three variants: GCCS-M afloat, GCCS-M ashore, and GCCS-M tactical/mobile that includes TSCs, mobile operations control center (MOCC), and Joint Mobile Ashore Support Terminal (JMAST).
2.7 VOICE AND VIDEO SERVICES
2.7.1   VOICE OVER IP (VOIP)
The mission of the Satellite Management Branch (Standardized Tactical Entry Point) and the Teleport Program Office (TPO), and Readiness Contingency and Exercise Support Branch is to extend Defense Information System Network (DISN) services to Joint Forces worldwide using both terrestrial and satellite communications (SATCOM). DISA's goal is to put a net-centric Internet Protocol (IP) architecture in place to better support the Warfighter. An individual DoD Gateway site is intended to be the interface between the deployed users and the Defense Information Systems Networks (DISN). IP based solutions are intended to enhance the DoD Gateways capabilities not replace legacy DISN services. To meet today's IP based solution shift, initial IP based solution suites have been installed at Landstuhl, Germany, Camp Roberts, California, and Fort Monmouth, New Jersey. The IP based solution suite supports SIPRNET (Secret Internet Protocol Router Network, NIPRNET (Unclassified but Sensitive Internet Protocol Router Network), Voice over IP (VoIP), JWICS, DRSN, Commercial ISP, and Commercial Voice applications. These emerging IP based solution exploit both traditional FDMA SATCOM modems and IP SATCOM Modems (current force and Joint Internet Protocol Modem (JIPM)) for long haul transport. The individual requirements are numbered to aid in tracking and for cross-referencing between the segment specifications, the system specification, and the Teleport Operational Requirements Document. The numbering system uses a designator in the following format: BXXXX, in which B is a letter defining the system or segment and the Xs represent numerals. The current conceptual the Teleport IP based solution equipment is annotated. The design incorporates three main new elements into the existing baseband architecture and new equipment to the encryption element: a convergence element (also known as the convergence router), a VoIP functionality (also known as the VoIP
gateway), a performance enhancing proxy (PEP) element, and a High Assurance Internet Protocol Encryption (HAIPE). HAIPE devices provide traffic separation and COMSEC functionality.
The convergence router will bring together NIPRNET, SIPRNET, and DSN VoIP traffic into a packet stream. The aggregate of the convergence router can be sent to either to the Multiplex Integration and Digital Communications Satellite Subsystem Automation System (MIDAS) or the IP SATCOM Modem. MIDAS will then transmit the Convergence Router traffic to the STEP/Teleport System's transmission security (TRANSEC) element. From the TRANSEC element, the MIDAS connects to the FDMA modem for transmission via satellite. The IP SATCOM Modem will support IP over Transponded SATCOM as well. The TRANSEC solution for IP SATCOM Modem employment is still not defined. The deployed warfighters' suite of equipment will reverse the convergence process, using similar equipment, by means of interoperable routing protocols and encryption keys for TRANSEC and communications security (COMSEC). The Encryption Element provides the TRANSEC and COMSEC required by the Gateway Systems. All satellite transmissions require TRANSEC in accordance with CJCSI 6510.01D, Information Assurance (IA) and Computer Network Defense (CND). COMSEC will be applied to all tactical circuits requiring COMSEC. The DoD Gateway System does not support unencrypted data above the Secret level; for example, JWICS and DRSN data passes through the systems encrypted. The interconnection element provides the electrical and physical interface between most elements of the DoD Gateway. It supports connectivity to either serial interface from the convergence router to the encryption element for TRANSEC or Ethernet connection into a IP SATCOM Modem. The modem element provides both FDMA modems and IP SATCOM Modems (TDMA) interfacing with the DoD Gateway terminal equipment for transmission over the satellite to the warfighter. The modems provide the needed modulation and demodulation for the SATCOM link. The VoIP gateway will be used to interface with the DSN and to convert legacy DSN voice to VoIP. The VoIP traffic will be sent to the convergence router to be merged with the NIPRNET and SIPRNET traffic.
B1190—The VoIP gateway shall support IPv4.
B12 00—The VoIP gateway shall support IPv6 or have a migration plan to implement IPv6 in future releases.
B1210—The VoIP gateway shall support QoS and CoS. All DoD Gateways will adhere to defined DISN CORE CoS and QoS standards and policies.
B1220—If no DoD policy with respect to QoS and CoS has been established, the VoIP gateway QoS and CoS shall comply with tactical user configurations.
2.7.2     DOD VIDEO TELECONFERENCING SERVICE (VTC)
VTC is an extension of traditional telephony technologies with the added feature of being able to see the person or persons with

whom one is talking. Another way to consider VTC technology is an extension or combination of television, which provides the audio and video communication aspect, and telephony or
telecommunications which provides the addressable, bi-directional connectivity. The results of which are a bi-directional, “closed circuit”, dial-able, TV system. The television portion of the technology uses video display screens (televisions/video monitors/projectors), video cameras, microphones, and speakers at each location connected to a Coder-Decoder (CODEC). The CODEC is the interface between the analog voice/video devices in the system and the addressable connectivity or transmission portion of the system. The CODEC converts the analog signals to digital format that is compatible with the transmission media. The CODEC also interfaces and converts presentation and whiteboard information. The combined digital signal is then transmitted to the remote location via a telecommunications network which is either TDM or IP based. Quality VTC communications requires much higher bandwidth than voice or traditional data communications. The actual bandwidth required is dependent upon the CODEC and compression algorithm used. The typical minimum bandwidth requires is 128Kbps with 384Kbps being typical and required for quality video. Some CODECs require as much as 2Mbps in support of high definition video.
The telecommunications network used for VTC connectivity is a traditional circuit switched telephony network such as the Defense Switched Network (DSN) and/or Public Switched Telephone Network (PSTN). The DSN is the preferred network for DoD VTC connectivity. Both of these networks are based in TDM technologies and typically provide Integrated Services Digital Network (ISDN) lines for access to the network. Both Basic Rate interface (BRI) and Primary Rate interface (PRI) ISDN lines are used. Addressability is handled as with any other telephone instrument, the address is the phone number associated with the line from the circuit switch to the instrument.
.3 DEFENSE SWITCHED NETWORK (DSN)
The Defense Information System Network (DISN) provides global voice services through the Defense Switched Network (DSN), a worldwide private-line telephone network. Multilevel precedence and preemption (MLPP) capabilities on the DSN utilized by command and control users ensure that the highest-priority calls achieve connection quickly, especially during a crisis situation. The DSN also provides global data and video services using dial-up switched 56Kbps or 64Kbps Integrated Services Digital Network (ISDN) services. Secure voice services are provided by the Secure Telephone Unit, Third Generation/Secure Terminal Equipment (STUIII/STE) family of equipment that provides end-to-end encryption over non-secure DSN circuits. Interfaces are provided between strategic and tactical forces, allied military and Enhanced Mobile Satellite Services (EMSS).
DEFENSE RED SWITCH NETWORK (DRSN)
The Defense Information System Network (DISN) provides global secure voice services using the Joint Staff Defense Red Switch Network (DRSN). The Joint Staff grants approval to access the network. The mission of the DRSN is to provide the President, Secretary of Defense, National Command Authority (NCA), the National Military Command Center (NMCC), Combatant Command Centers, Warfighters, and other critical Department of Defense and federal government agencies with reliable, secure, interoperable C2 and crisis management capabilities.
2.7.5     INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
ISDN is a circuit-switched telephone network system, designed to allow digital transmission of voice and data over ordinary telephone copper wires, resulting in better quality and higher data speeds than are available with analog. More broadly, ISDN is a set of protocols for establishing and breaking circuit switched connections and for advanced call features for the user.
2.7.6     PLAIN OLD TELEPHONE SYSTEM (POTS)
POTS refers to an un-enhanced telephone service with the ability to send and receive phone calls. In POTS, once a dedicated circuit connects the call, your voice is transmitted by a 4kHz analog wave form via a process known as a frequency division multiplexing. 4kHz band is used because it provides enough bandwidth to reproduce a recognizable human voice. Further, each channel supports a range of single amplitude (strength) that relates to a volume level. The amplitude level is limited, so no matter how loud you scream over the network it won't exceed a certain volume on the other end of the line. Together this combination of bandwidth and amplitude is not quite enough for perfect voice transmission, but is good enough so you can make out the words and recognize familiar voices.
.7 AFLOAT PERSONAL TELECOMMUNICATIONS SYSTEMS (APTS)
Providing personal telecommunications service to shipboard crewmembers at sea is a highly visible quality of life issue that positively affects the life of the sailor at sea. To maintain clear separation of appropriated and non-appropriated activities, SPAWAR and Navy Exchange Command (NEXCOM) work collaboratively to insure that the definition of technical and procedural requirements do not conflict in planning for future commercial services. This clear separation of functionality and funding is
known as the APTS system. With a fully complemented CV/CVN, costs per minute have driven down phone call charges into the $1.00 per minute range. A commercial smart debit card now provides telephone services for personnel on most ships equipped with the APTS “Sailor Phones".
2.7.8     KY68 DIGITAL SUBSCRIBER VOICE TERMINAL (FDVT)
KY68 is a ruggedized field terminal containing the audio processing, signaling and Communications Security (COMSEC) functions necessary to provide secure and non-secure voice and secure data access to circuit switched digital networks, and to provide secure access to a variety of non-switched, point-to- point (sole user) digital networks. The TSEC/KY-68 DSVT digitizes voice information using Continuously Variable Slope Delta (CVSD) modulation at a 16 or 32Kbps rate. The KY-7 8 is the strategic version.
2.7.9     VIDEO INFORMATION EXCHANGE SYSTEM (VIXS)
The video information exchange system (VIXS) provides a secure, GENSER SECRET and SCI, multipoint, interactive video teleconference (VTC) capability that facilitates efficient communications among CNO, fleet commanders, commanders at sea, Navy and Marine Corps fleet command authorities, and other users. It was originated in 1992 as CNO VTC and expanded to the fleet flagships in 1993. In 1994 the name was changed to VIXS and it expanded to include CVs, CVNs, and large deck amphibious ships, LHAs and LHDs. VIXS was implemented with COTS VTC systems and multipoint control units (MCUs) (bridging units) and utilizes Navy-standard cryptographic equipment. This integrated system supports global tactical C2 requirements to conduct distributed, collaborative planning.
Through the use of compressed digital transmission, the system provides a cost-effective means of producing high-quality video images using reduced bandwidth. VIXS conferences are normally held at 128-256Kbps. This reduced bandwidth requirement minimizes the expense of long distance service to Europe and allows SATCOM connectivity to Navy ships at sea. Normal shipboard bandwidth is 12 8 kbps, but CWSP gives equipped ships the bandwidth required to conference at 256 or 384Kbps. Live motion video, camera auto queue on speaker, computer graphics, videotape, document images, white boarding, and file sharing can currently be transmitted over the system. Support can be provided for up to 16 conferencing sites, enabling 8 simultaneous point-to-point conferences, or a series of mixed point-to-point and multipoint conferences. Gateways located at MCU sites provide access to other networks.
VIXS hubs are located at:
1.   NCTAMS LANT Norfolk, VA
2.   NCTS NAPLES, ITALY Naples, Italy
3.   NCTAMS PAC Makalapa, HI
4.   NCTS Bahrain.
VIXS shore access is provided to COMPACFLT, USPACOM, CFFC, United States Joint Forces Command (USJFCOM), COMUSNAVEUR London and Naples, NAVCENT Bahrain, and CNO. An additional 30 plus sites have been certified as VIXS network users via ISDN dial-up. A support hub at Space and Naval Warfare (SPAWAR) Systems Center (SSC) Charleston provides testing and diagnostics support in addition to providing backup multipoint conference support.
The VIXS shipboard configuration consists of one suite of VTC hardware and two separate encryption paths. One path is classified (GENSER) and the other is JWICS SCI. Both paths are encrypted via a KG-194 or KG-194A.
In FY02, upgrades included incorporation of a second MCU at VIXS hub sites to support simultaneous local unclassified and/or NATO multipoint conferences. Future hub upgrade requirements will include support of IP based systems such as adding an H.323 MCU and H.320/H.323 Gateway to accommodate NMCI user sites as well as adding additional port capacity to the Madge and Montage units to accommodate additional afloat and ashore VIXS users. Additional afloat platforms are expected to include CG and DDG utilizing SHF.
2.7.10       DISN VIDEO SERVICE GLOBAL (DVSG)
DVS-G capabilities include global connectivity, 24/7 availability, multiple security levels (Unclassified, U.S. Secret, and TS), and VTC services via STEP sites. VTC services are provided using multiple configurations (point-to-point, multi-point, switched, or dedicated), speed matching, and bridging services. If C2 capabilities are required, DVS-G must be configured to meet C2 performance measures.
DISA is planning to transition DVS-G to DVS II, a new IP-based network that includes C2 VTC operations. DISA is developing the follow-on DVS II contract; however, implementation dates are not presently available. The follow-on contract requirements include many new technologies, the merging of existing networks, and advanced connectivity to the warfighter. DVS II will build on the DVS-G platform.
The DISN Video Services (VS) provides global DOD VTC users a bridging service using industry standard technology for interoperability and multi-point VTC requirements for both classified and unclassified users. Increased flexibility was added to the system by providing subscribers a way to access VTC users on tactical networks such as the DSCS and DSN, as well as non-DOD networks. Through a cascade of Multipoint Control Units (MCU), DISN VS allows subscribers to access customer MCUs such as the Navy's tactical Video Information Exchange System (VIXS).

DISN VS supports Top Secret bridging requirements, providing VTC services to all U.S. Forces deployed worldwide. Additionally, through a processing procedure DISN VS supports Allied conferencing up to and including Top Secret. Existing DISN VS capabilities include global connectivity, multiple levels of security, reservation scheduling, directory assistance, multi­point conferencing, speed matching, access via STEP, and 24/7 help desk accessibility. Use of DISN VS is available through either dedicated service or dial-up (switched) service.
2.7.11     STE / STU (SECURE TELEPHONE)
Secure Telephone Unit - Third Generation (STU-III) is a low-cost, user-friendly, secure telephone device. The terminals are designed to operate reliably, with high voice quality, as both ordinary telephones and secure instruments over the dial-up public switch telephone network. STU-III operates in full-duplex over a single telephone circuit using echo canceling modem technology. STU-IIIs come equipped with 2.4 and 4.8Kbps code­excited linear prediction (CELP) secure voice. Secure data can be transmitted at speeds of 2.4, 4.8, and 9.6Kbps. There are many manufacturers each having different maximum throughput rates. The data throughput between two STU-IIIs can only be as great as the slowest STU-III connected.
The STU-III Family consists of some of the following devices (see figure 2-14):
 

 
1.  The STU-III/Low Cost Terminal (LCT) was designed for use in the office environment among a broad spectrum of military, civil, government, and selected private sector users. It is compatible with standard modular or multi-line (key system) connectors and operates full-duplex over a single telephone circuit.
2.  The STU-III/Cellular Telephone is interoperable with all other versions of the STU-III Family. It combines cellular mobile radiotelephone technology with advanced secure voice/data communications. The unit includes a message center that is integrated with the standard cellular handset; it can be conveniently mounted inside a vehicle and provides all STU-III functions, including authentication/classification display.
3.  The STU-III/Allied (A) is a specialized version of the STU- III/LCT that is compatible with the STU-II. It retains all basic STU-III functions and capabilities and incorporates STU-II BELLFIELD Key Distribution Center (KDC), STU-II net, and STU-II multipoint modes of operation.
4.  The STU-III/Remote Control Interface (RCU) provides RED enclave subscribers with STU-III compatible secure communications in a rack-mounted remotely controlled line encrypting unit. When used in conjunction with a RED switch or conferencing director, the STU-III/R allows STU-III users to confer with multiple STU-III users or others who have secure functions. It is capable of encrypting/decrypting voice or data over two-wire or four-wire telephone systems and incorporating a 2.4Kbps BLACK digital (external modem) interface.
5.  The Multi-Media Terminal (MMT) 1500 is a diversified STU-III capable of clear or secure voice and data communications over both analog and digital mediums. The MMT interfaces to the commercial telephone system via a standard RJ-11 telephone jack and to digital systems through a Black Digital Interface (BDI). The BDI port will support both half-and full-duplex communications, precedence dialing, black digital network signaling, and multiple satellite hops. When unattended the MMT can automatically answer an inbound call without operator intervention and establish a secure link with any user on a preprogrammed Access Control List (ACL).
6.  The Inter Working Function (IWF) is the shore gateway device that provides the digital to analog conversion between the MMT and the analog STU-III. The IWF supports half and full duplex voice and data communications with rates of 2.4, 4.8, and 9.6Kbps. The IWF improves secure voice and data synchronization over multiple satellite hops with programmable extended time-outs and pre-staging of STU-III call information. The IWF supports all necessary network- signaling functions to enable call setup and status messages including canned voice messaging to the analog user.
7.  The STU-III Secure Data Device (SDD) is designed with the same capabilities as other members of the STU-III family including Secure Access Control System (SACS), remote authentication (RA), remote control, auto-answer secure data, and capable of operating in both attended and unattended environments. The SDD provides protection for facsimiles, e-mail, and computer communications.
8.  The Motorola CipherTAC 2000 (CTAC), (see figure 2-15) STU- III family compatible secure voice communications via cellular phone. CTAC without an inserted CipherTAC 2000 security module is unclassified and functions as a non- secure commercial off the shelf (COTS) telephone product. The CTAC CiphterTAC security module is certified for all levels of classified discussions up to and including SECRET in an adequate operating/security environment.
 
The Secure Terminal Equipment (STE)
The Secure Terminal Equipment (STE)/Office is the evolutionary successor to the STU-III. The STE program will improve shore secure voice communications as well as shipboard communications by changing out the analog STU-III products with digital-based STE products. The STE cryptographic engine is on a removable Fortezza Plus KRYPTON ™ Personal Computer Memory Card International Association (PCMCIA) Card, which is provided separately. The STE Data Terminal provides a reliable, secure, high rate digital data modem for applications where only data transfer (FAX, PC files, Video Teleconferencing, etc.) is required. All STE products will be STU-III secure mode compatible with the following enhanced capabilities:
1.  Voice-recognition quality secure voice communication.
2.  High-speed secure data transfers (up to 38.4Kbps for asynchronous or 128Kbps for synchronous).
STE terminal products can use Integrated Services Digital Network (ISDN), analog PSTN, TRI-TAC, or direct connection to Radio Frequency (RF) assets via RS-530A/232E ports. Maximum STE performance may be attained only by those commands employing ISDN service with two Bearer Channels (2B+D ISDN Service). When connected to a PSTN (Analog Telephone) service, the STE/Office units will only support current STU-III voice and data capabilities.
A tactical version, STE/Tactical is a replacement for MMT 1500
with a Digital Non-secure Voice Terminal (DNVT) adapter. Though not a direct replacement for the KY-68, the STE/Tactical can serve as a DNVT replacement with secure voice communication capabilities in STU-III modes over TRI-TAC/Mobile Subscriber Equipment (MSE). STE/Tactical is not secure mode compatible with the Digital Secure Voice Terminal DSVT KY-68.
A STE Direct Dial capability comprised of the STE/C2 Tactical terminal and/or associated STE/Interworking Function(s) will improve on the existing Navy "Direct Dial" secure voice ship to shore dial-up operations. STE Direct Dial improves secure mode connectivity, provides operational flexibility support for both plain text and cipher text voice modes, and provides a standardized secure ship digital telephone system solution and Joint CINC interoperability with forces at sea and ashore.
Individual STE Product Capabilities:
1.  STE/Office provides enhanced STE capabilities over digital ISDN and STU-III over analog PSTN.
2.  STE/Data provides STE and STU-III data capabilities only.
3.  STE/Tactical with Wedge supports STU-III Black Digital Interface (BDI) over TRI-TAC/MSE or RF asset.
4.  STE Direct Dial:
a.  STE/C2 Tactical with Wedge supports STU-III BDI over ISDN or RF asset.
b.   STE/IWF provides interface with PSTN (Analog) and ISDN (Digital).
STE products without an inserted Fortezza Plus KRYPTON ™ Card are unclassified and function as non-secure COTS telephone products. The Fortezza Plus KRYPTON ™ Card is currently designated as an Accounting Legend Code 1 (ALC-1) item by the NSA. Even though STEs are unclassified items, they should still be treated as high-value Government property (e.g., such as an office computer). Certification of STE will provide security for all levels of traffic, up to and including TOP SECRET Special Compartmented Information (TS-SCI). When a Fortezza Plus KRYPTON Card is inserted into a STE, secure storage must be provided to the extent required by SECNAV M5510.36 (series) for the maximum classification level of the key used. Fortezza Plus KRYPTON ™
Card is considered classified to the maximum level of key classification until it is associated with a STE terminal. Once associated with a STE terminal, the card is considered unclassified when not inserted in the associated STE terminal.
2.7.12     ADVANCED NARROWBAND DIGITAL VOICE TERMINAL (ANDVT)
The Advanced Narrowband Digital Voice Terminal (ANDVT) Family comprises the AN/USC-43 Tactical Terminal (TACTERM), the KY-99A Miniaturized Terminal (MINTERM), and the KY-100 Airborne Terminal (AIRTERM). These terminals are handled as UNCLASSIFIED controlled cryptographic items (CCIs) when unkeyed; when keyed they assume the classification of the key. The ANDVT family provides joint interoperability between Service components of US command elements and North Atlantic Treaty Organization (NATO) allies.
ANDVT Family units are primarily used to satisfy tactical secure voice requirements on high frequency (HF), very high frequency (VHF), and ultra high frequency (UHF) satellite and line-of-sight (LOS) communications; UHF Non-Demand Assigned Multiple Access (Non-DAMA) and DAMA; super high frequency (SHF) and extremely high frequency (EHF) satellite communications (SATCOM) including Milstar; UHF Follow-on (UFO)/EHF; and Fleet Satellite EHF Package (FEP). All ANDVTs must have engineering change proposal-060 (ECP- 060)/field change -1 (FC-1) incorporated in order to operate over UHF SATCOM.
TACTERM: The TACTERM normal configuration consists of the Basic Terminal Unit (BTU) (CV-35 91) and a communications security module (KYV-5), providing half-duplex, secure transmission of voice or data communications in either point-to-point or netted mode. The peripherals include the split remote control units (SRCUs) Z-ANG and Z-ANH, which replaced the existing PARKHILL type IIIA and IIIB. A "Y" cable will allow remote loading of cryptographic variables from the SRCU Z-ANG. The Navy developed the TACTERM in association with the National Security Agency (NSA). See table 2-1 for a listing of some TACTERM Equipment.
MINTERM: The functions of the MINTERM are similar to those of the TACTERM; however, its updated design includes an improved modular architecture, and it has been reduced in size. The MINTERM is a low-cost, lightweight, low-power single channel, half-duplex, narrowband/wideband/wireline terminal providing secure voice and data communications with full key distribution and remote rekey capabilities. The MINTERM is certified to secure traffic up to TOP SECRET.
The MINTERM improvements include the following:
a.  Concurrent voice and data modes enable the users to connect both data equipment and voice handsets.
b.  VINSON (KY-57/58) mode of operation allows interoperability between the MINTERM and the VINSON wideband COMSEC equipment.
c.   Improved SATCOM performance incorporates the enhancements included in ECP-060/FC-1 to the ANDVT.
This includes an extended preamble for improved synchronization, selectable receive (RX) or transmit (TX) priority to prevent transmission conflicts,
Milstar mode requirements, push-to-talk (PTT) inhibit, and a bridge for signal fades.
The latest DOD LPC-10 algorithm (V58) has been enhanced to provide high-quality secure narrowband voice for military handsets and to maintain that quality and intelligibility in noisy acoustical environments.
AIRTERM: NSA is developing AIRTERM. Although originally designed for airborne applications, the Navy has also identified submarine, shipboard, Marine Corps communication vans, and landing craft air cushion (LCAC) requirements. AIRTERM incorporates MINTERM and VINSON operational modes. It is a wideband/narrowband terminal that interoperates with the TACTERM, MINTERM, VINSON, and Single Channel Ground and Airborne Radio System (SINCGARS). The AIRTERM is a lightweight, self-contained secure voice and data terminal that provides secure half-duplex voice, digital data, analog data, and remote-keying capabilities for transmission over radio circuits or wire line media. AIRTERM accepts classified analog voice information and uses advanced speech processing algorithms: LPC-10 at 2.4Kbps in narrowband voice modes and continuously variable slope delta (CVSD) modulation at 12Kbps and 16Kbps in wideband voice modes. The AIRTERM provides the same connectors, with similar functional pin outs, as the VINSON for the wideband operational modes. The AIRTERM is also available with a remote control unit (RCU), Z-AVH, which is functionally equivalent to the Main Terminal Unit (MTU) with regard to external controls.
Characteristics:
 
Equipment Height
(in)
Width
(in)
Depth
(in)
Weight
(lb)
CV-3591 7.63 4 . 91 13 .30 21.80
KYV-5 6 .25 4.88 3 .00 3 .60
Z-ANG (SRCU) 2 .25 5.72 4.13 3.30
Z-ANH (SRCU) 6.20 6 . 91 2 . 97 3.30
KY-9 9A 3 .00 5 .50 6.73 4 .50
KY-100 4 . 96 5.73 5.14 5.70
Z-AVH 2 .61 5.73 3 .14 1.80
 
Table 2-1 TACTERM EQUIPMENT
 

 
Supports the following Data Rates:
Narrowband (3kHz) 300 bps, 600 bps, 1200 bps, and 2400 bps in the HF mode
2400 bps digital secure voice in the HF mode 2400 bps digital voice and data in the LOS mode
MINTERM
Supports the following Data Rates:
Narrowband (3 kHz) 300, 600, 1200, 2400 bps in HF or BLACK digital mode (BDM)
2400 bps in LOS mode
Wideband (25 kHz) 12 and 16 kbps in the VHF/UHF/SATCOM mode AIRTERM
Supports the following Data Rates:
Narrowband (3 kHz) 300, 600, 1200, 2400 bps in HF or BDM 2400 bps in LOS mode
2400 bps digital secure data in the LOS mode
Wideband (25 kHz) 12 and 16 kbps voice or data in the baseband/diphase (BB/DP) mode
2.7.13     FUTURE NARROWBAND DATA TERMINAL (FNBDT) STANDARD
NSA achieved secure interoperability between some wired and wireless systems when it created an industry and government consortium that agreed on a common signaling protocol called the Future Narrow Band Digital Terminal (FNBDT). Despite its name, however, FNBDT is no longer just narrow band, but also includes a common voice processing capability, a crypto-algorithm base and a key-management process. It has become the primary security standard for cell phones, military radios and emerging public safety communications devices for homeland security missions and first responders around the world. FNBDT products were designed to accept—and have accepted—secure software upgrades. For example, the General Dynamics Sectera Secure GSM phone as well as the Qualcomm QSec-800 CDMA secure cell phone, have added upgrades that provide the ability to pass short messaging data.
Although the data file transfers are limited to low bandwidth, the addition of secure voice and data interoperability in FNDBT mode is a first step toward the convergence of voice and data over secure wireless networks. NSA now maintains an FNBDT interoperability test bed that verifies vendor compliance with the current version of FNBDT specifications and tests interoperability among the current versions of all wireline and wireless products to verify secure, end-to-end interoperability.
2.8     INTELLIGENCE AND CRYPROLOGIC SYSTEMS
2.8.1   JOINT SERVICES IMAGERY PROCESSING SYSTEMS (JSIPS-N) CONCENTRATOR ARCHITECTURE (JCA)
Imagery is the highest use of bandwidth for the CSG or ESG, typically on the order of 768Kbps. The JSIPS JCA was developed for the fast and efficient delivery of imagery while providing increased flexibility in bandwidth management. The JCA is a client-server based architecture, with web-like browsing features and capabilities for fleet imagery subscribers that is scalable up to 8Mbps. It provides the fleet with a SECRET, GENSER, user- friendly network-centric, imagery delivery system. The JCA has four major components, including imagery sources, concentrators, sites, and communications.
1.  Imagery sources — Sources originate imagery and imagery- related products that are required by users for various operational needs such as tactical reconnaissance, battle damage assessment (BDA), and targeting.
2.  JCA concentrator — The primary concentrator is the JCA central repository of imagery and imagery related products that are supplied to the fleet. The data comes from the source, and populates databases based on standing fleet imagery requirements as well as individual fleet-initiated requests for imagery and imagery-related products.
3.  JCA sites — Navy afloat JCA sites are command ships, carriers, and large deck amphibious ships (LHD/LHA). Each site houses an image product library (IPL) workstation that is used to coordinate delivery, ordering and acknowledging receipt of imagery products.
4.  JCA communications — Communications between the concentrator and ESG and CSG ships are via broadband (DSCS or CWSP)
SATCOM connectivity.
2.8.2   GLOBAL COMMAND CONTROL SYSTEM - INTEGRATED INTELLIGENCE AND IMAGERY
Global Command and Control System-Integrated Intelligence and Imagery (GCCS-I3) provides COP-centric imagery and intelligence- related capabilities developed by the four military services and selected agencies in response to joint warfighter requirements. Through the GCCS-I3 integration process, these tools provide intelligence support to operations seamlessly within the GCCS family of systems.
GCCS-I3 enhances the operational commander's situation awareness by providing a standard set of integrated, linked tools and
services that give ready access to imagery and intelligence directly from the operational display. GCCS-I3 gives tactical operators and intelligence analysts' direct access to the nationally produced modernized integrated database (MIDB) for order of battle (OOB) data, weapons systems characteristics and performance information, and national imagery. GCCS-I3 also gives those users the capability to integrate locally collected tactical imagery, live video stream, and other intelligence with national and theater-produced intelligence. This intelligence can be plotted directly on operational/tactical displays alongside continuously updating operational and operational-intelligence information, providing tactical operators and intelligence analysts vastly improved knowledge of the tactical battlespace. The all-source fusion capabilities of GCCS-I3 provide decision makers with a composite picture of the battlespace augmented with SCI-level intelligence, bringing together NRT track, OOB, maps and imagery, military overlays, and other forms of specialized intelligence data to produce a CIP. When combined with other enabling technologies, such as database replication and guards, GCCS-I3 supplies geographically focused, OPINTEL to the GCCS-M CTP battlespace view, aiding decision support and improved SA for the intelligence and operations elements of the commander's staff.
Included in the GCCS-I3 suite are the following applications:
1.  Joint threat analysis tools/ground template toolkit (JTAT/GTT) generates terrain suitability and other tactical decision aids based on military aspects of terrain and contributes to intelligence preparation of the battlespace (IPB) analysis. It supports the joint force and component commanders' campaign/mission planning and decision making by identifying, assessing, and estimating the adversary's battlespace center of gravity, critical vulnerabilities, capabilities, limitations, and intentions, most likely COA, and COA most dangerous to friendly forces.
2.  Joint targeting toolbox (JTT) provides a common standardized, scalable, and DII-COE compliant set of targeting tools to manage and/or produce targets, target data, and target-derived products and services in response to customer requirements in a manner consistent with targeting mission objectives and warfighter requirements.
3.  Improved many-on-many (IMOM) models electronic combat scenarios and can provide threat evaluation. It is a 2-D graphics oriented user-interactive program which aids in mission planning and IPB analysis. IMOM visually displays the complex interaction of multiple ground-based radar systems being acted upon by multiple airborne ECM aircraft. IMOM models the detection capabilities of radar effects, the effects of stand-off jamming platforms, and the effects of self-protection jamming platforms. The model adds the effects of terrain masking and ECM on any OOB, exploits the results to perform a variety of analyses, and provides hard copy post processing in a variety of formats.
2.8.3   JOINT DEPLOYABLE INTELLIGENCE SUPPORT SYSTEM (JDISS)
The Joint Deployable Intelligence Support System (JDISS) program provides a family of hardware and software capabilities that allow connectivity and interoperability with intelligence systems supporting forces, in garrison, and deployed during peace, crisis, and war. It provides the Joint Intelligence Center (JIC), Joint Task Forces (JTF) and operational commanders with on-site automation support and the connectivity necessary to execute the intelligence mission. JDISS and the Joint Worldwide Intelligence Communications System (JWICS) together comprise the joint standard and foundation for commonality among intelligence support systems. JDISS provides joint intelligence centers, joint task forces, and operational commanders with on-site automation support and the connectivity to make the best use of the Intelligence Community's resources. JDISS is also the technical baseline for DODIIS client-server environment (CSE).
JDISS provides automated support for the following:
1.  transmitting and receiving specific requests for intelligence
2.  Accessing Theater, Service and National intelligence databases
3.  Supporting digitized imagery exchange
4.  Accessing automated record message processing systems, indications and warning systems, and collection management systems
5.  Inputting intelligence data into a variety of operations/intelligence systems, and
6.  Performing multi-media functions, such as voice electronic publishing and video teleconferencing.
The core software for JDISS is:
1.  E-mail/chatter
2.  Word processing/message generator
3.  Imagery manipulation
4.  Communications interfaces/map graphics
5.  Briefing tools/utilities, and
6.  Desktop video/voice
JDISS can be utilized in any context which requires the connectivity and interoperability with the intelligence systems. This product has been accepted as part of the GCCS suite of products. This means that the experts from the GCCS Executive Agent have created and evaluated the quality and applicability of this product for use within the GCCS domain for the Department of Defense.
2.8   4 TACTICAL EXPLOITATION SYSTEM - NAVY
Tactical exploitation system—Navy (TES-N) is the Navy shipboard implementation of the Army tactical exploitation system (TES-A). TES-N is presently installed only on PAC Fleet CVNs. It is an integrated, scalable, multi-intelligence system specifically designed for rapid correlation of national and theater ISR information to support network-centric operations. TES-N provides the warfighting commander with access to NRT, multi-source, and continuously updated day/night battle space ISR information. TES- N supports strike operations using numerous ISR collection planning, data correlation, geo-location, data dissemination, and storage functions.
It is interoperable with other service derivatives of the TES system: TES-A, the Marine Corps' tactical exploitation group (TEG), and the Air Force's ISR manager.
2.8   5 INTEGRATED BROADCAST SYSTEM
IBS has integrated several existing intelligence and information dissemination systems into a single system of broadcasts that will allow for the receipt of data via a single receiver (the joint tactical terminal). IBS will disseminate threat avoidance, targeting, maneuvers, force protection, target tracking, and target/situation awareness information, and will be continuously refined by data from national, theater, and tactical sensors. The reported information will contain unique references (e.g., report or track/event number) to allow IBS producers and users to correlate IBS products. IBS will allow the tactical user to construct successively detailed intelligence pictures of the battlespace. IBS will interface with Tactical Data Links (TDLs) such as Link 16 and joint variable message formats (VMFs) networks to ensure a seamless flow of intelligence information onto those networks.
The IBS architecture will be theater-based dissemination with global connectivity through terrestrial and high capacity communications paths. IBS will take advantage of the communications paths users already have by implementing an information management scheme integrated with other DOD information management systems (e.g., GBS information dissemination manager).
The effective dissemination of NRT intelligence data requires secure, worldwide data communications with prioritized use of available bandwidth between producers and users at all echelons of command. The existing components of the IBS are:
1.  Simplex (IBS-S) — formerly known as the TRAP data dissemination system (TDDS).
2.  Interactive (IBS-I) — formerly known as the tactical information broadcast service (TIBS).
3.  Network (IBS-N) — formerly known as the NRT dissemination (NRTD) system.
4.  LOS (IBS-LOS) — formerly known as the Tactical Reconnaissance Intelligence eXchange System (TRIXS).
Additionally, TADIXS-B is currently part of the overall IBS network but will not migrate into the final IBS architecture. The legacy intelligence dissemination systems were developed to support the operational requirements of specific groups of users. They each provide a portion of the total operational requirements necessary for an effective intelligence data dissemination architecture that supports the warfighter. IBS will migrate (combine) these legacy systems into a new system that has theater-focused dissemination architecture, with global connectivity, and uses a common information transfer language (standardized message formats). For the USN, the strategy for the implementation of IBS will be known as the Maritime Integrated Broadcast System (MIBS).
2.8.6   RADIANT MERCURY
Radiant Mercury is a hardware and software application that automatically sanitizes and downgrades formatted data from SCI to GENSER. It is also used to sanitize data from U.S.-Only to Releasable for sharing with allied and coalition partners.
It only sanitizes formatted (OTG family, USMTF family, tabular, TDMIF, NITF, etc.) data. Message transliteration provides interoperability with other systems by allowing one format to come in and multiple different formats with the same data to go out (see Figure 2-16). The headers of NITF imagery files are formatted extensively, and Radiant Mercury is able to perform all of its capabilities on the header. Radiant Mercury cannot examine the image itself, so classified objects in the image pixels will pass through a Radiant Mercury screening untouched.
Radiant Mercury capabilities include:
1.   Automating sanitization and guarding from higher to lower classifications
2.   Downgrading to lower classification levels
3.   Providing message format transliteration
4.   Facilitating releasability to allies
5.   Providing communications port guard (low to high)
6.   Providing mechanism for data field integrity
7.   Providing mechanism for selected data field checking
8.   Providing a complete audit record
9.   Supporting post event reconstruction
 
7 SENSITIVE COMPARTMENTED INFORMATION NETWORKS
SCI networks (formerly SCI ADNS) provide multimedia delivery of tactical, administrative and intelligence information to ships at sea and provide ships access to shore cryptologic and intelligence resources. SCI networks are based on the integration of COTS/GOTS protocols, processors, and routers and provide network services such as secure e-mail, chat, websites, and file transfer.
The implementation of SCI networks will enable existing communications/network programs to migrate away from stove piped IXS protocols with their associated communications paths toward a single network with voice, video, and data transmission based on the TCP/IP protocol.

Depending on individual ship configuration, SCI networks use DSCS SHF, CWSP, UHF DAMA, EHF LDR/MDR, and Inmarsat-B HSD RF satellite connectivity through a single ADNS point of entry. Since the ADNS network operates at the GENSER SECRET level, SCI data is in-line encrypted to allow transport over the ADNS backbone using Motorola network encryption system (NES) devices. NES is capable of providing data confidentiality and integrity and peer identification and authentication, as well as
mandatory/discretionary access control services. IP tunneling via the SIPRNET is used by SCI networks to reduce stovepipe connectivity, simplifies NES and network administration, and provides for secure alternate routing via standard ADNS connectivity.
Compartmented traffic, other than SI, is routed by SCI-ADNS to BORDERGUARD equipment and a separate computer workstation in SSES for use by appropriately cleared personnel.
2.8.8     JOINT WORLDWIDE INTELLIGENCE COMMUNICATIONS SYSTEM (JWICS)
The JWICS is operated by the Defense Intelligence Agency (DIA) as a secure global network designed to meet the requirements for TS/SCI multimedia intelligence communications worldwide. It provides users an SCI-level high-speed multimedia network using high-capacity communications to handle data, voice, imagery, and graphics. Secure e-mail, chat rooms, point-to-point and multipoint VTCs, broadcast of the DIN, and website access are the primary uses of JWICS by afloat users. The system also provides network services for collaborative electronic publishing, the electronic distribution of finished intelligence, and tools to accommodate the transfer of reference imagery, maps, and geodetic materials, as well as other high-end graphics products.上海翻譯公司完成通信設(shè)備英文翻譯

世聯(lián)翻譯-讓世界自由溝通!專業(yè)的全球語言翻譯供應(yīng)商,上海翻譯公司專業(yè)品牌。絲路沿線56種語言一站式翻譯與技術(shù)解決方案,專業(yè)英語翻譯、日語翻譯等文檔翻譯、同傳口譯、視頻翻譯、出國外派服務(wù),加速您的全球交付。 世聯(lián)翻譯公司在北京、上海、深圳等國際交往城市設(shè)有翻譯基地,業(yè)務(wù)覆蓋全國城市。每天有近百萬字節(jié)的信息和貿(mào)易通過世聯(lián)走向全球!積累了大量政商用戶數(shù)據(jù),翻譯人才庫數(shù)據(jù),多語種語料庫大數(shù)據(jù)。世聯(lián)品牌和服務(wù)品質(zhì)已得到政務(wù)防務(wù)和國際組織、跨國公司和大中型企業(yè)等近萬用戶的認可。
  • “貴司提交的稿件專業(yè)詞匯用詞準確,語言表達流暢,排版規(guī)范, 且服務(wù)態(tài)度好。在貴司的幫助下,我司的編制周期得以縮短,稿件語言的表達質(zhì)量得到很大提升”

    華東建筑設(shè)計研究總院

  • “我單位是一家總部位于丹麥的高科技企業(yè),和世聯(lián)翻譯第一次接觸,心中仍有著一定的猶豫,貴司專業(yè)的譯員與高水準的服務(wù),得到了國外合作伙伴的認可!”

    世萬保制動器(上海)有限公司

  • “我公司是一家荷蘭駐華分公司,主要致力于行為學(xué)研究軟件、儀器和集成系統(tǒng)的開發(fā)和銷售工作,所需翻譯的英文說明書專業(yè)性強,翻譯難度較大,貴司總能提供優(yōu)質(zhì)的服務(wù)�!�

    諾達思(北京)信息技術(shù)有限責(zé)任公司

  • “為我司在東南亞地區(qū)的業(yè)務(wù)開拓提供小語種翻譯服務(wù)中,翻譯稿件格式美觀整潔,能最大程度的還原原文的樣式,同時翻譯質(zhì)量和速度也得到我司的肯定和好評!”

    上海大眾

  • “在此之前,我們公司和其他翻譯公司有過合作,但是翻譯質(zhì)量實在不敢恭維,所以當我認識劉穎潔以后,對她的專業(yè)性和貴公司翻譯的質(zhì)量非常滿意,隨即簽署了長期合作合同�!�

    銀泰資源股份有限公司

  • “我行自2017年與世聯(lián)翻譯合作,合作過程中十分愉快。特別感謝Jasmine Liu, 態(tài)度熱情親切,有耐心,對我行提出的要求落實到位,體現(xiàn)了非常高的專業(yè)性�!�

    南洋商業(yè)銀行

  • “與我公司對接的世聯(lián)翻譯客服經(jīng)理,可以及時對我們的要求進行反饋,也會盡量滿足我們臨時緊急的文件翻譯要求。熱情周到的服務(wù)給我們留下深刻印象!”

    黑龍江飛鶴乳業(yè)有限公司

  • “翻譯金融行業(yè)文件各式各樣版式復(fù)雜,試譯多家翻譯公司,后經(jīng)過比價、比服務(wù)、比質(zhì)量等流程下來,最終敲定了世聯(lián)翻譯。非常感謝你們提供的優(yōu)質(zhì)服務(wù)。”

    國金證券股份有限公司

  • “我司所需翻譯的資料專業(yè)性強,涉及面廣,翻譯難度大,貴司總能提供優(yōu)質(zhì)的服務(wù)。在一次業(yè)主單位對完工資料質(zhì)量的抽查中,我司因為俄文翻譯質(zhì)量過關(guān)而受到了好評�!�

    中辰匯通科技有限責(zé)任公司

  • “我司在2014年與貴公司建立合作關(guān)系,貴公司的翻譯服務(wù)質(zhì)量高、速度快、態(tài)度好,贏得了我司各部門的一致好評。貴司經(jīng)理工作認真踏實,特此致以誠摯的感謝!”

    新華聯(lián)國際置地(馬來西亞)有限公司

  • “我們需要的翻譯人員,不論是筆譯還是口譯,都需要具有很強的專業(yè)性,貴公司的德文翻譯稿件和現(xiàn)場的同聲傳譯都得到了我公司和合作伙伴的充分肯定。”

    西馬遠東醫(yī)療投資管理有限公司

  • “在這5年中,世聯(lián)翻譯公司人員對工作的認真、負責(zé)、熱情、周到深深的打動了我。不僅譯件質(zhì)量好,交稿時間及時,還能在我司資金周轉(zhuǎn)緊張時給予體諒�!�

    華潤萬東醫(yī)療裝備股份有限公司

  • “我公司與世聯(lián)翻譯一直保持著長期合作關(guān)系,這家公司報價合理,質(zhì)量可靠,效率又高。他們翻譯的譯文發(fā)到國外公司,對方也很認可�!�

    北京世博達科技發(fā)展有限公司

  • “貴公司翻譯的譯文質(zhì)量很高,語言表達流暢、排版格式規(guī)范、專業(yè)術(shù)語翻譯到位、翻譯的速度非常快、后期服務(wù)熱情。我司翻譯了大量的專業(yè)文件,經(jīng)過長久合作,名副其實,值得信賴�!�

    北京塞特雷特科技有限公司

  • “針對我們農(nóng)業(yè)科研論文寫作要求,盡量尋找專業(yè)對口的專家為我提供翻譯服務(wù),最后又按照學(xué)術(shù)期刊的要求,提供潤色原稿和相關(guān)的證明文件。非常感謝世聯(lián)翻譯公司!”

    中國農(nóng)科院

  • “世聯(lián)的客服經(jīng)理態(tài)度熱情親切,對我們提出的要求都落實到位,回答我們的問題也非常有耐心。譯員十分專業(yè),工作盡職盡責(zé),獲得與其共事的公司總部同事們的一致高度認可�!�

    格萊姆公司

  • “我公司與馬來西亞政府有相關(guān)業(yè)務(wù)往來,急需翻譯項目報備材料。在經(jīng)過對各個翻譯公司的服務(wù)水平和質(zhì)量的權(quán)衡下,我們選擇了世聯(lián)翻譯公司。翻譯很成功,公司領(lǐng)導(dǎo)非常滿意�!�

    北京韜盛科技發(fā)展有限公司

  • “客服經(jīng)理能一貫熱情負責(zé)的完成每一次翻譯工作的組織及溝通。為客戶與譯員之間搭起順暢的溝通橋梁。能協(xié)助我方建立專業(yè)詞庫,并向譯員準確傳達落實,準確及高效的完成統(tǒng)一風(fēng)格�!�

    HEURTEY PETROCHEM法國赫銻石化

  • “貴公司與我社對翻譯項目進行了幾次詳細的會談,期間公司負責(zé)人和廖小姐還親自來我社拜訪,對待工作熱情,專業(yè)度高,我們雙方達成了很好的共識。對貴公司的服務(wù)給予好評!”

    東華大學(xué)出版社

  • “非常感謝世聯(lián)翻譯!我們對此次緬甸語訪談翻譯項目非常滿意,世聯(lián)在充分了解我司項目的翻譯意圖情況下,即高效又保質(zhì)地完成了譯文�!�

    上海奧美廣告有限公司

  • “在合作過程中,世聯(lián)翻譯保質(zhì)、保量、及時的完成我們交給的翻譯工作�?蛻艚�(jīng)理工作積極,服務(wù)熱情、周到,能全面的了解客戶的需求,在此表示特別的感謝。”

    北京中唐電工程咨詢有限公司

  • “我們通過圖書翻譯項目與你們相識乃至建立友誼,你們報價合理、服務(wù)細致、翻譯質(zhì)量可靠。請允許我們借此機會向你們表示衷心的感謝!”

    山東教育出版社

  • “很滿意世聯(lián)的翻譯質(zhì)量,交稿準時,中英互譯都比較好,措辭和句式結(jié)構(gòu)都比較地道,譯文忠實于原文。TNC是一家國際環(huán)保組織,發(fā)給我們美國總部的同事后,他們反應(yīng)也不錯�!�

    TNC大自然保護協(xié)會

  • “原英國首相布萊爾來訪,需要非常專業(yè)的同聲傳譯服務(wù),因是第一次接觸,心中仍有著一定的猶豫,但是貴司專業(yè)的譯員與高水準的服務(wù),給我們留下了非常深刻的印象�!�

    北京師范大學(xué)壹基金公益研究院

  • “在與世聯(lián)翻譯合作期間,世聯(lián)秉承著“上善若水、厚德載物”的文化理念,以上乘的品質(zhì)和質(zhì)量,信守對客戶的承諾,出色地完成了我公司交予的翻譯工作�!�

    國科創(chuàng)新(北京)信息咨詢中心

  • “由于項目要求時間相當緊湊,所以世聯(lián)在保證質(zhì)量的前提下,盡力按照時間完成任務(wù)。使我們在世博會俄羅斯館日活動中準備充足,并受到一致好評�!�

    北京華國之窗咨詢有限公司

  • “貴公司針對客戶需要,挑選優(yōu)秀的譯員承接項目,翻譯過程客戶隨時查看中途稿,并且與客戶溝通術(shù)語方面的知識,能夠更準確的了解到客戶的需求,確保稿件高質(zhì)量�!�

    日工建機(北京)國際進出口有限公司

国产刺激一女多男一区二区| 久热这里只有国产中文精品 | 特级a毛片免费观看| 91精品国产91久久久久久无码天美 | 色夜av网午夜福利片| 6080精品人妻一区| 黑人巨大精品无码专区| 国产精品久久久久片免费又是看| 成人a一级毛片免费看视频| 天堂国产成人av在线| 欧洲亚洲成人精品| 成年无码AV片在线蜜芽| 亚洲日韩av免费在线观看| 精品人妻少妇aⅴ免费狠狠| 午夜APP在线观看| 婷婷精品国产?v麻豆不片| 国产成年男人裸j网站| 日日噜噜噜夜夜爽狠狠视频| 日本丰满护士bbw| 国产色精品vr一区区三区| 无码av高潮抽搐流白浆在线| 国产精品羞羞答答| 国产日韩男女激情视频免费播放| 妓女妓女一区二区三区在线| 焯逼国产精品| 白丝紧致爆乳自慰喷水玩具动态图| 538pro精品视频我们不只是| 91精品国产高清一区二区三密臀| 日本一区二区三区三州| 国产目拍亚洲精品二区婷婷| 国产狼友精品视频网| 国产1区2区精品自拍| 双乳被快递员揉搓玩弄在线播放| 日韩av在线在线观看| 亞洲Aⅴ无码乱码在线观看| 成人看片黄在线观看| 91影视在线观看| 欧美日韩精品区久久久| 国产亚洲欧洲日韩在线三区| 被仇人狠狠开发了by小小巴士| 亚洲av成人片无码网站动画 | 中文字幕av免费看网站| 日本人妻最新在线中| 久久九九精品视频| 动漫av观看网站不卡无码| 一级做性色α爱片久久毛片色| 欧美牲交?欧美牲交| 日韩台精品电影在线观看网站免费| 一区二区毛片视频免费看 | 国产 亚洲 欧美 另类中文| 亚洲精品肉丝袜久久| 国产黄色一级片在线观看无码高清| 草草影院欧美三级日本 | 日韩欧美偷拍精品一区| 日本一本色道高清| 午夜精品一区二区三区在线成人| 精品无码人妻遭多人侵犯Av | 973午夜伦伦电影论片| 亚洲AV乱码一区二区三区| 欧美性受XXXX黑人猛交视频| 国产午夜福利精品一区二区久久 | 农村少妇野外a片www| 久久亚洲乱码一区| 亚洲精品手机在线视频| 又黄无遮挡无码的免费视频| 亚洲日韩精品综合在线一区二区 | 亚洲欧洲AVAV天堂系列| 国产成视频在线观看| 伊人查蕉在线综合| 午夜最新电影| 亚洲一区二区麻豆AV| 日韩av中文无码人妻无码| 日本高清中文无卡| 国产精品二区三区四区| 国产原创剧情情欲放纵| 邻居少妇人妻互换| 亚洲精品综合在线导航网址| 亚洲国产精品 制服丝袜| 亚洲影视AV一二三| 另类小说图片区日本久久大视频 | 亚洲精品久久久久毛片A级牛奶| 久久久久av綜合網成人| 国产白浆在线视频网| 国产欧美AA一区二区三区视频| 高清 无码 自拍 日韩| 成人无码h肉动漫在线观看站| 看中国免费毛片视频| 国产一级毛片一区二区无码| 日韩精品 欧美 制服丝袜| 91亚洲色欲国色天香| 一区二区精品在线| 老司机无码精品A| 欧美影视一区| 精品..久久久久久| 白丝被弄羞涩娇喘动态图| 欧美一级欧美一级在线观看| 日韩毛片午夜在线观看| 无码强姦精品一区二区| 精品国产青草久久久久福利| 中文字幕久久精品有码综合网| 亚洲国产午夜精品一区二区| 国产一级婬A片AAA毛片| 網友分享国产一区精品在线心得| 欧美另类亚洲日韩精品一区二区不卡| 国产亚洲综合秋霞影院国产| 亚洲精品色无码一二三区| 欧美jizz18性欧美色天堂综合在线 | 91丨九色丨蝌蚪3p| 今日亚洲2021在线观看| 国产一级婬A片AAA毛片| 精品久久久久久无码福利片 | 午夜精品人成在线观看| 亚洲色欲或高潮影院伊人| 青草久久在线免费观看视频| 欧美亚洲色综久久精品国产91| 日本久久高清一区二区三区| 手机在线看片亚洲一区| MM131巨爆乳美女少妇动态图| 美女视频黄又黄又免费| 轻轻色国产在线视频| 中国女人内谢25xxxxx| 大屁股人妻女教师撅着屁股| 国产成人精品在线不卡| 色婷婷综合激情蜜桃tv| 精品久久无码中文字幕蜜桃| 久久免费视频观看30秒| 大地免费资源| 久久国产午夜精品免费一区二区 | 亚洲中文无码成人网| 亚洲欧美国产日日| MM131巨爆乳美女少妇动态图| 欧美牲交?欧美牲交| 五月色丁香国产精品白拍| 成在人线Aⅴ免费观看| 欧美色吧久久综合| 国内精品久久久久AV福利秒拍| 亚洲国产福利精品一区二区| 国产刺激一女多男一区二区| aⅴ色窝窝男女爽爽a片| 国产露脸无码a区久久蘑菇| 亚洲日本精品va中文字幕| 欧美日韩三级在线观看| 蜜臀久久精品国产亚洲av| 亚洲人成人一区在线观看 | 跪趴着被主人狠狠调教| 睡错闺蜜男朋友(高h)| zayou亚洲福利一区| AV无码免费1区2区3区| 熟妇人妻av中文字幕老熟妇| 野外一级爱做片免费观看| 国产精品欲AV麻豆网站| 韩国激情三级做爰观看极限| 亚洲一级午夜福利| 99久久99久久久精品| 91免费免费国产在线观看| 国产精品女A片爽爽波多洁衣| 97人人超人人超碰超国产| 在线视频精品中文无码| 丝袜美足国产一区在线| 久久99人妻精品涩爱噜噜噜蜜臀| jizz一区二区在线观看| 最新全集网电影免费在线看 | 日本一区二区三区三州| 日韩精品老熟女视频网站免费观看| 男女高潮吃奶添下面动态图| 日韩欧美精品亚洲一区二区 | 91麻豆一区二区在线观看| 日本少妇一级婬片HD69网站| 国产1区2区精品自拍| 亚洲欧美国产日日| 一级无码国产片手机版| 成人久久久一区二区| 久久婷宗和五月天网拍| 狼友看视频的网站| 日韩美女粉嫩小泬在线精品| 一级做a爰片久久毛片免费看| 激战雪姨后厨2最新版本更新内容| 久久精品99无色码中文字幕| 歐美性一交激情視頻在線| 日韩A∨无码综合久久五月| 无码中文字幕aⅴ免费费放| 欧美成人国产精品一区二区| JK白丝高中小仙女自慰| 狠狠噜天天噜日日噜视频跳一跳| 18禁美女裸体无遮挡的网站 | 無碼人妻豐滿熟婦精品區| 欧美日韩精品第一区二区| 1精品啪国产在线观看免费牛牛| 精子射入几天可以着床| 午夜福利在线免费看| 亚洲av无码不卡无码| 中国熟妇乱子hdsex粗| 国产av最新网址| 欧美极品jizzhd欧美仙踪林| 亚洲三级毛片在那看| 亚洲高清国产拍精品青青草原| 无码A∨高潮抽搐流白浆8MAV| 亚洲人成色7777在线观看不卡| 亚洲欧洲在线观看无码| 久久国产精品一国产精| 日本国产我97在线| 亚洲 自拍 色综欧美合图区| 香蕉在视频线精品视频| 国产高清A片视频一| av高清理伦片在线观看| 亚洲av日韩国产激情| 国产高清视频在线播放一区二区三区 | 惠民福利国产精品无码aV一区二区三区 | 久久久久av綜合網成人| 国产精品免费播放器大全| 亚洲MV国产MV在线MV综合试| 国产精品看片在线| 十八禁爽爽爽无遮挡在线观看网站| 图片区电影区激情区小说区| 国产又长又粗达到性高潮的视频| 色综合久久中文字幕无码色欲| 国产香蕉久久精品免费| 国产成人欧美综合在线观看| 久久精品亚洲精品五月色| 中文字幕亚州欧美专区| 国产av无码变态另类专区| 一区二区三区色网视频在线观看| a免费在线观看| 年轻的朋友3完整版在线观看| 99国产精品视频一区二区69堂| 波多野结衣迅雷下载| 极品精品伊人国产| 美女动态三级在线| 在车里被弄了4次高潮| 99久久久国产免费观看精品| 韩国电影密爱在线观看| 超级极品白嫩美女在线| 午夜免费福利av| 亚洲日本欧洲综合| 人妻丰满妇岳av无码区HD| 人成午夜日本乱码伦视频亚洲| 欧美亚洲自偷自偷图片| xxxx黄色网站在线观看| 精品久久久久免费免费自慰| 亚洲色综合亚洲?V伊人蜜桃偷偷| 国国产精品V欧美精品∨日韩| 亚洲av永久无码偷拍另类| 国产精品成人AV片免费看| 久久er热这里只有国产中文精品| 国产热无码手机版| 国产精品成人AV片免费看| 午间影院又黄又粗又大| 欧美日韩最新精品一二区热热 | 免费av中文字幕| 玩弄粉嫩少妇高潮出白浆AⅤ| 亚洲午夜AV无码成人福利| 日本三级久久| 极品人妻videos人妻| 具有黄桃视频在线观看高清免费| 夜鲁夜鲁夜鲁高清免费看| 日韩在线视频高清| 国产一区二区三区撒尿在线| 曰本女人牲交高潮視頻| 国内精品久久99人妻无码特黄| 91香蕉app下载汅api免费网站无限看| 日韩在线欧美在线一区二区三区| 亚洲中文字幕在线观看视频特物资| 日韩2022中文字幕| 色偷偷色噜噜狠狠网站野外| 91xav在线免费观看| 精品二区三区在线观看| 草草影院欧美三级日本| 少妇的丰满3中文字幕电影| 日日狠狠伊人久久| 青青草中国三级片| 国产视频精选全网| 暖暖www视频免费高清最新期| 先锋影音制服丝袜| 97一区二区在线播放| ..亚洲综合无码一区二区痴汉| 亞洲A∨精品一區二區三區下載| 午夜精品福利波多野结衣| 亚洲午夜无码毛片Av久久京东热| 日本无遮挡h肉动漫在线观看| 超碰成人免费观看在线| 一二三四在线色网视频观看社区| 一本无码人妻在中文字幕免费经典 | 性国产天堂VIDEOFREE高清| 国产超级va在线观看视频| 欧美亚洲欧美区| 国产偷人视频免费观看| 成人片在线观看亚洲欧美| 一起嗟嗟嗟免费观看短片| 538pro精品视频我们不只是| 男人把j伸进女人的p免费| 国产高清不卡免费在线观看| 亚洲男人天堂无码2024| 相泽南作品在线观看| 成人限制第一页| 国产 亚洲 欧美 另类中文| 亚洲精品国产专区在线| 久久久久久免费免费麻辣| 二次元人物桶二次元人物免费网站| 少妇系列中文字幕一区| 久久国产福利一区二区三区| 亚洲狼人制服中文字幕| 亚洲精品高清你懂的| 玩弄熟睡的小男生腐h| 日本午夜色噜噜| 日韩黄色高清视频| 亚洲黄色AV电影在线不卡| 丰腴饱满的极品熟妇| 日韩免费无码人妻波多野| 亚洲一区二区三区日本九九日韩| 27报视频十八禁| 色天堂在线观看视频 | 亚洲αv无码不卡一区二区三区 | 午夜精品影视网热门电影全集免费播放在线观看 | 欧美狠狠入鲁的视频| 欧美男人与动牲交zooz| 高清国产美女在线观看| 青青国产91久久久久| 东京热无码一区| 亚洲欧美精品国产电影| 中文字幕永久有效丝袜| 亚洲中文字幕丁香婷婷| 欧洲毛片自拍偷拍网站| 惠民福利国产AV无码专区亚洲AV毛片搜 | 人妖系列在线精品| 日日插人人插天天插| 亚洲伊人成久久综合网| 国产性夜夜春夜夜爽1a片| 亚洲日本欧洲综合| chinese熟妇老女人hd视频| 蜜桃一区二区百万视频| 18款禁用安装的漫画软件| 27报视频十八禁| 亚洲中文字幕第一页adc| 无遮挡18禁国产精品| 国产一区二区三区不卡在线| 天天爽爽夜夜爽爽视频小视频| 秋霞鲁丝片AV无码| 成人无码h肉动漫在线观看站| 18禁美女裸体无遮挡的网站| 夜夜操综合网| 99视频日韩三级电影| 中文一区二区视频成人二区| 国内精品久久久久AV福利秒拍| 欧美婷婷综合| 美女裸体视频在线无卡黄色免费网站| 性国产日韩欧美一区二区在线| 四虎影视国产免费| 国产簧片免费在线播放| 国产免费观看久久黄AV片| 五月婷婷丁香综合| JK白丝高中小仙女自慰| 贵州少妇一级毛片| 熟妇人妻av中文字幕老熟妇| 午夜精品一区二区三区在线成人| 欧美成人国产精品一区二区| 欧美性受XXXX黑人猛交视频| 亚洲日韩av一区久久精品| 国产精品喷水综合久久久| 日韩欧美一区二区精品久久asspics人体japanese | 亚洲一级午夜福利| 欧美精品日韩精品在线| 一级做性色α爱片久久毛片色| 日韩美女A∨性爽一级毛片| 欧美婷婷综合| a狠狠久久蜜臀婷色中文网| 国产高清视频在线播放一区二区三区 | 杨幂喷水高潮在线观看视频| 精品国产一区二区三区久久狼黑人| 午夜精品一区二区三区在线成人| 激战雪姨后厨2最新版本更新内容| 夜夜操天天爽| 国产污污视频在线观看| 国产激情一区二区三区成人麻豆| 中文字幕一本久久综合| 春色 都市 亚洲 小说区| 国产大尺度无遮挡在线观看| 在线观看国产一区二区三区 | 精品人妻挤奶一二三四区| 成人无码视频在线观看| 偷拍视频国内久久精品| 午夜精品影视网热门电影全集免费播放在线观看 | 黄色亚洲黄色日韩| metart精品白嫩的asspics| 羞羞视频APP下载网站| 99久久久囯产亚洲精品观看| 色欲久久国产色av免费看老司| 欧美亚洲不卡av免费一二三区| 99天天操天天做天天| 日本电影中文字幕久久| 国产精品熟女第7页| 韩国成人AV网站在线观看| 黄色一级毛片在线| 一个人免费视频在线观看高清直播| 国产精品美女久久久浪潮?v| 亚洲MV国产MV在线MV综合试| 国产精品99国产精品久久gif| 久久久一二三区精品| 97久久久人妻一区精品| 高清偷自拍亚洲精品三区| 国产激烈刺激网站免费观看| 自拍亚洲欧美另类动漫| 国产精品有码无码脛∨在线 | 日韩黄色大片在线观看| 国产中文在线精品一区| 国产色A∨在线看精品 | 91亚洲黄色在线看| 超级碰97直线国产免费公开| 四虎国产在线| 国产白浆在线视频网| 黑人巨大无码系列在线| 拔萝卜免费观看高清视频下载| 特级毛片?级毛片在线播放| 天天爽天天爽免费视频| 水蜜桃视频污在线观看| 亚洲午夜福利精品一区| 免费久久黄色毛片| 国产又粗又猛又大爽又黄的软件| 国产免费一级视频播放| 澳门精品久久国产电影| 亚洲AV日韩在线一区二区三区| 爱丫爱丫影院电视剧免费| 越南女子杂交内射BBWBBW| 99久久精品无码一区二区麻豆| 免费无码a∨片在线观看| 精品久久久久免费免费自慰| 浪潮国产精品久久久久?v浪潮 | 精品国产?Ⅴ一区二区三区 | 国产精品美女白丝自慰| 国产精品一区二区三区免费久久| a毛片免费全部播放吃 | 午夜福利男女xx00视频网站| 精品国产日韩在线观看| 亚洲综合另类色区色偷偷TXT| 少妇人妻中文字幕hd| 免费国产成人无码学生妹| 国产综合v亚洲欧美大片| 成人国产精品视频| 欧美性爱福利视频| 一区二区人人在线| 国产亚洲精品成人| 亚洲MV国产MV在线MV综合试| 污视频在线免费观看| 国产情侣实拍在线播放| 又色又爽又硬又刺激的视频 | 国产高清视频在线播放一区二区三区| 女人18一级毛片免费视频| 亚洲手机在线成人| 双乳被快递员揉搓玩弄在线播放 | 精品视频在线观自拍自拍| 久久久亚洲成人aⅴ| 18观看免费永久视频| 99RE8国产这里只有精品| 久久无码āV中文出轨人妻| 國產一區不卡視頻| 亚洲欧洲国产韩国va在线| 色综合久久中文字幕无码色欲| 国产精品sea8视频| 999免费观看四虎精品国产| 电影天堂免费在线观看| 在线观看xxxx国产| 夜鲁夜鲁夜鲁高清免费看| 做爰高潮a片视频35分钟 | 高清免费三级毛片| 国产精品无码久久AV嫩| 亚洲va欧美va人人爽老师| 永久免费毛片久久99| 久久久精品产一区二区三区日韩| √天堂中文官网8在线| 欧美性受XXXX黑人猛交视频| 欧美男女精品一区二区| 夜色www中国精品视频网站| 亚洲欧美日韩岛国色图| 久久免费视频8| 制服丝袜物喷水亚洲综合精品| 国产av自拍播放| 91xav在线免费观看| 美女视频黄a视频全免费观看蜜臀| 国产精品美女在线免费| 精品国产AⅤ一区二区三区4区| 五月天婷婷伊人久中文字幕| 日韩午夜不卡在线看| 动漫av观看网站不卡无码| 国产成人合集在线播放| 亚洲va欧美va国产va天堂影| 在线观看精品成人综合视频| 精品区一区二在线观看| 国产欧美91在线| 大腿蜜精品在线一区| 歐美性一交激情視頻在線| 伊人直播黄版APP入口| 精品人妻中文无码久热丝袜| 亚洲日韩制服另类| 久久久久久免费免费麻辣| 免费观看60秒做受视频| 综合 欧美 日韩 中文字幕| ac网站不卡免费在线观看| 91成人精品亚洲高清在线观看 | 日韩人妻久久久av一区二区| 好了AV第四综合无码久久| 欧洲成熟女人色惰片| 欧美激情诱惑在线观看| 狼人一区二区精品久久| 抖音成人版短视频| av中文字幕不卡无码| 亚洲色图中文在线| 亚洲欧美日韩a∨在线观看| 久久久久久av无码专区| 激情男女高潮射精?V免费 | 高清国产美女在线观看| 日本加勒比麻豆亚洲精品 | 日韩一区二区三区视频在线| 女人毛片免费看一分钟| 99精品又大又粗又硬少妇毛片| 日韩黄色高清视频| 亚洲精品一级在线播放| 男女高潮吃奶添下面动态图| 人妻回春按摩肏到中出| 日本欧美一区二区| 亚洲猛男男同| 好色先生日逼的视频| 国产乱人伦偷精品视频???| 精品免费一区二区爱| 榴莲APP下载汅网站进入官网| 亚洲AV无码一区二区三区在线播放| 国产视频日日操| 在线观看精品一区二区三区| 欧美日老太太久久| 亚洲男人久久综合天堂| 一区二区三区四区在线免费观看 | 在线视频日本亚洲| 97视频人人做人人爱免费体验 | 久久久久免費精品視頻| 亞洲歐美偷拍另類| 成人性做爰aaa片免费看不忠| 国产精品亚洲综合每日| 免费无码a∨片在线观看| 国产精品剧情在线蜜臀| 女性喷液过程高清免费视频| jizz狼友国产高清交流a| 日本丰满护士bbw| 欧美日本不卡一二三区| 91精品国产综合久久久亚洲日韩| 男女视频诱惑国产在线观看| 岳乳丰满一区二区三区| 日韩欧美亚洲国产精品| 玩弄粉嫩少妇高潮出白浆AⅤ| 久久精品日产第一区高清版| 免费无码AV片在线观看sm| 亚洲高清无码操逼视频| 综合 欧美 日韩 中文字幕| 国产刺激精品专区av| 精品免费在线欧美| 夜色www中国精品视频网站| 亚洲Av人片另类| 国产高潮女人在线播放| 欧美色图一区二区| 精品一区二区三区播放| 欧美A级毛片免费播敢| 美女扒开尿眼无遮挡免费视频| 黄色一级视频| 性国产日韩欧美一区二区在线| 天堂av2017男人的天堂| 久久精品国产国产精品久久| 久久夜色精品国产亚洲| 无限看片的视频大全免费下载| 国产午夜福利红色一片精品| 91久久打屁股調教網站| 国产美女裸乳无遮挡网站| 黄色视频在线观看视频网站| 日韩激情一级毛片| 久久久久久免费播放一级毛片 | 青青国产91久久久久| 91成人豆奶视频在线| 午夜亚洲亚洲精品福利| 国产精品成人免费久久久久三级无码a| 91精品国产高清自| 2022久久最新国产精品| 无遮挡18禁国产精品| 亚洲a精品无码毛片色欲av| 久久午夜福利久久网| 在线免费观看国产视频| 在线观看国产高清a| 水蜜桃视频污在线观看| 狼人一区二区精品久久| 免费精品一区二区中文字幕 | 中国精品视频在线一区二区| 最新午夜男女福利片视频| 天堂成人一区二区三区av片| 久久sese三级亚洲精彩| 中文字幕一区二区人妻本田岬 | 先锋影音制服丝袜| 日本AⅤ精品中文字幕在线| 午夜毛片精彩毛片| 亚洲一区日本在线| 午夜精品一区二区三区国产色欲| 99久久99久久久精品| 国产欧美va欧美va在线动漫| 完整版av片永久免费| 一进一出把女子干的全身抽搐 | 私人影院午夜在线观看| 亚洲午夜久久久久无码| 亚洲国产欧美日本韩中文字幕在线 | 成年人在线观看网站| 亚洲人成日本片| 日韓三級免費看| 国产偷窥熟女精品| 国产乱人伦av在线a三方| 国产小视频一区二区三区中文字幕在线播放| 国产网友自拍视频| 中文字幕有码不卡| 欧美日韩一区二区视频播放黑人粗 | 日韩台精品电影在线观看网站免费| 亚洲一级av无码中文字幕| 日韩av手机在线观看| 亚洲无码aⅴ色图| 农村少妇野外a片www| 蜜臀98精品國產免費觀看| 国产精品美女在线免费| 無碼人妻豐滿熟婦精品區| 中国激情一区二区三区成人| 亚洲一区二区三区日韩国产| 日本黄色影片在线观看| 亚洲精品成人国产| 车里要了好多次天天影院网| 手机在线观看的国产网站| 好爽快点我受不了了视频| 久久亚洲乱码一区| 国产精品青青草原免费无码中国 | 精品一区二区三区免费在线视频 | 成人在线免费观看黄片| 亚洲视频欧美在线专区| 隔壁放荡的人妻在线看中文| 成年无码AV片在线蜜芽| 亚洲中文字幕不卡无码| (愛妃視頻)无码精品人妻一区二区三区中 | 国产91对白在线播放边| 精品免费在线欧美| 欧美日韩在线二区下载| 一进一出把女子干的全身抽搐| 午夜国产精品福利影院| 久久亚洲乱码一区| 日韩激情偷拍第3页| 国产精品青草婷婷| 一区二区三区四区在线免费观看| 麻豆国产一区二区在线观看| 免费看美女无遮掩的软件| 日韩精品毛片无码一区| 久久免费视频8| 97久久久精品综合88久久| 亚洲色成人www在线观看| 永久免费毛片久久99| 国产偷窥熟女精品| 爱丫爱丫影院电视剧免费| 黄片视频A级大全| 国产又长又粗达到性高潮的视频| 色戒未删减2小时38分在线| 在线观看不卡一区二区三区 | 97一区二区在线播放| 国内精品久久99人妻无码特黄| 草草影院欧美04一区二区三区| 亚洲av午夜成人片精品电影| old老太videos老妇中国| 国产成人综合精品视频| 欧美日韩国产精品动漫精品| 日韩毛片午夜在线观看| 亚洲成人欧美在线| A欧美亚洲日韩在线观看| 国产亚洲日韩网曝欧美11| 韩国美女精品久久久久久| 午夜老司机福利日韩视频在线高清| 99久久免费只有精品国产在 | 黄色片久久美女啊啊啊内色| 日本在线视频色综合| 永久免费观看的片毛视频| 成人无码视频在线一区| 肉色丝袜超薄一区二区三区| 欧美性色aⅴ视频一区日韩精品| 欧美97人人爱人人干| 一级aa免费视频毛片| 日韩中文字幕欧美亚洲第一区| 成年无码AV片在线蜜芽| 成人午夜精品網站在線觀看| 大香蕉久久综合在| 国产三级片大全网| 日韩av三级在线免费观看| 亚洲成片观看四虎永久网站| 超碰真人在线| 免费最婬荡荡谢毛片午夜剧场 | 在线播放国产视频99| 欧美一级欧美一级在线观看| 91伊人久久大香线蕉网站| 亚洲成熟妞人婬i片在线观看| 网友分享国产亚洲精品福利片心得| 欧美中文字幕在线视频| av日韩色情三级在线看| 19禁无遮挡啪啪无码网站性色| 日韩国产欧美一区免费观看| 538pro精品视频我们不只是| 日本强伦姧人妻完视频正版| 欧美综合自拍亚洲综合网| 国产午夜视频免费观看| 久久久久久久国产精品视频| 精品国产伦一区二区三区在唱戏| 免费观看又色又刺激的视频| 一级毛片大学生九九精品视频| 国产一级内射麻豆91| 亚成人欧美在线观| 美女视频一区二区三区在线| 国产国产人精品视频69| 国语对白刺激真实精品| 操小孩污视频在线免费观看| 99热国产这里只有精品99| 亚洲日韩国产精品久久久综合网 | 性色aV一区二区三区红粉影视| 日本美国一级大片| 亚洲精品综合在线导航网址| 男女无遮挡动态图| 亞洲國產歐美在線觀看| 久久亚洲欧美精品一| 91短视频在线观看污污污| 草久在线视频在线观| 杨幂喷水高潮在线观看视频| 午夜手机影视工场全集观看免费| 亚洲福利在线视频| 欧美亚洲免费播放一区| 成人国产经典精品视频| av蓝导航精品导航| (愛妃)久久AV无码精品人妻出轨| 国产福利甜味弥漫精品tv一区| 日韩一二区无码精品一区| 91精品国产综合久久久亚洲日韩| 亚洲欧州国产综合不卡在线免费视频| 91精品在线观看免费视频| 人妻激情综合久久久久| 497799欧洲版的国产suv| 亚洲欧美日韩综合第一| 亚洲?V伊人久久综合密臀性色 | 一本久久a久久精品∨r综合 | 一区二区三区色网视频在线观看| 天天操天天曰| 久久婷婷色中文字幕免费高清| 久久人人爽人人爽av片| 香港av无码播放一级毛片免费| 少妇中文字幕久久精品无码| 国产区沙发午睡系列| 国产视频精选全网| 欧美老熟妇夜夜爽| 亚洲精品种子网站在线观看| 日韩欧美精品一区在线观看 | 国产精品久久久久片免费又是看 | 亚洲图片视频欧美日韩| 秋霞电影伦理手机版| 国产又爽又黄免费网站| 国产韩国一区二区三区| 韩国美女一级毛片| 亚洲精品影院久久久久久| 久久精品国产亚洲Vā香蕉| 欧美精品VIDEOSEX极品| 無碼人妻豐滿熟婦精品區| 车子越颠进入的更深h| 曰本大码熟中文字幕| 越猛烈欧美xx00动态图带声音 | 日本3p视频在线看高清| aⅴ色窝窝男女爽爽a片| 国产又粗又长又爽黄又硬视频| 校花高潮抽搐冒白浆| 草莓视频app下载18| 瑟瑟视频在线观看| 无套挺进少妇私下处内射| 亚洲午夜久久免费| 免费网站看v片在线毛| 欲色欲香天天影院亚洲第一香蕉狼人 | 国产真实迷奷系列在线看| 亚洲男人久久综合天堂| 四虎国产精品永久在线无码首页| 音影先锋男人在线资源网| 久久久久久久女国产乱让韩| 欧美日韩电影码国产| 国产一区二区丝袜女高跟鞋| 亚洲日本一区亚洲影院| 欧美黑人又粗又大又硬免费视频| 国产美女露底激情视频| 国产亚洲精品精品在线精品| 99热国产这里只有精品99| 91xav在线免费观看| 免费av中文字幕| 中文字幕免费日韩中文中文| 亚洲精品美女网站久久m| 女人被男人桶| 亚洲人妻久久无码| 久久成人国产精品青青| 欧美三级直播美女视频在线观看| 青青青精品大杳蕉| 成年人在线观看网站| k频道国产网红欧美在线视频| 久精品视频在线播放网站| 午夜免费福利av| 国产—久久香蕉国产线看观看| 国产高清视频在线播放一区二区三区| 久久免费视频8| 国产亚洲精品美女2020久久| 国产强上视频在线观看| 欧美一区二区免费播放| 国产激情在线91| 欧美日韩在线二区下载| 亚洲熟妇无码AV| 国产免费经典三级| 成a人片免费在线观看| 国产精品免费播放器大全| 亚洲专区日韩中文在线| 岳乳丰满一区二区三区| 日本黄线在线视频免费看 | 亚洲国产精品第一二三区| 亚洲国产自久久婷婷| 国产欧美日韩视频一区在线观看| 久久er热这里只有国产中文精品| 久久久久av綜合網成人| 日产精品一二三区| 美女乳头阴道搞鸡巴视频| 永久免费毛片久久99| 国产精品午夜不卡在线观看| 日韩色欲人妻无码精品av| 国产精品第页婷| 欧美三级电影天堂| 一区欧美激情桃花| 国产69久久精品成人必看| 国产香蕉久久精品免费| 国产91九色在线| 女人的天堂毛片AV在线| 99精品無碼人妻一區二區三區 | 欧美猛少妇色xxxx久久久久| 国产色精品vr一区区三区| xxxx欧美丰满大屁股| 精品国产一区二区三区久久狼黑人| 成人限制第一页| 欧美在线三级艳情网站亚洲成人99| 欧美一级婬片A片无码专区野结衣| 亚洲一日韩中文字暮AV| 日本一本高清在线观看视频亚洲一区二区三区 | 免费av中文字幕| 人妻丰满妇岳av无码区HD| 嘿嘿连载下载app| 国产高清色高清在线观看九在线视频 | 少妇熟女高潮流白浆| 国产麻豆精品成人毛片| 亚洲?v无码国产精品色午夜| av大片在线观看| 在线观看精品成人综合视频| 后入式肏大屁股眼免费视频| 久久精品久久观看| 国产真实迷奷系列在线看| 国产成人精品影院网站不卡| 免费精品一区二区中文字幕| 欧美日韩人成国产自产高清| 男女高潮吃奶添下面动态图| 国产一级一极性活片免费视频| 欧洲亚洲成人精品| 免费国产一区二区久久| 久久青青草原精品国产APP| app搞鸡视频在线观看黄色| 一级婬片一级视频| 67194在线观看熟妇| 日日插人人插天天插| 免费乱伦亚洲无码| 国产成 人 亚洲 综合| 欧美性爱福利视频| k频道国产网红欧美在线视频 | 韩国三级电影久久久| 国产精品综合久久| 国产欧美日本韩国高清视频一区二区三区免费在线 | 少妇人妻偷人精品毛片免费√ | 国产乱人伦偷精品视频???| 国产精品熟女第7页| 秋霞久久女婷五月综合色啪| 国产一二三区 韩国女主播| 青青草中国三级片| 丁香七月婷婷| 亚洲欧美日韩另类色图 | 91香蕉app下载汅api免费网站无限看| 免费精品美女久久久久久久久久| 狼友久久国产精品| 国产黄色在线观看.| 日韩av手机在线观看| 日韩欧美自在线观看亚洲精品福利片 | 中文av旡码高清在线| 韩国激情三级做爰观看极限 | 超97视频在线免费观看| 在线不卡一区二区三区免费| dy888午夜国产精品亚洲| 懂色午夜一区二区三区| 97人人视频波多野结衣蜜月 | 国产精品sea8视频| 色就色综合偷拍区欧美| 18禁裸乳無遮擋啪啪無碼免費 | 欧美综合自拍亚洲久久| 日本一道一区二区美利坚欧美| 樱花视频网站| 国产一区二区丝袜女高跟鞋| 高清av中文字幕无码| 人妻少妇蜜桃一区二区| 国产品国语在线不卡| av中文字幕不卡无码| 无码一级午夜福利区久久浪潮av| 亚洲成人激情在线观看| 好男人社区www神马| 久久99热免费精品久久| 国产ā v中文字幕乱码| (愛妃視頻)无码精品人妻一区二区三区中| 日韓歐美一區二區三區不卡| 小说图片视频一区| 亚洲女人自熨在线视频| 久久久最近免费字幕中文大全| 欧美日韩高清不卡一区| 国产精品二区三区四区| 一本色道無碼道dvd在線觀看| 无码不卡毛片视频免费播放| 国产又长又粗达到性高潮的视频| 少妇太爽了在线观看视频| (愛妃)久久AV无码精品人妻出轨 | 曰韓無碼二三區中文字幕| 欧洲熟妇精品视频在线成视频| 国产免费经典三级| 69国产成人精品午夜在线| 亚洲精品美女网站久久m| 九九热最新国产视频| 日本不卡免费新一二三区3| 欧美亚洲不卡av免费一二三区| 日本不卡一区在线| 五月丁香婷婷免费| 国产精品综合久久| 精品国产99国产精2021| 色婷婷精品国产黑人一区二区三区 | 午夜毛片精彩毛片| 欧美一区二区在线播放免费播放 | 国产午夜福利精品理论片久久| 91香蕉视频国产免费下载| 91桃色污污污污污污污污污| 国产第一页草草影院ccyy| 日本人妻最新在线中| 国产韩国日本高清视频| 国产午夜视频免费观看| 成人亚洲色欲色一欲| 日韩欧美人妻之中文字幕| 麻豆精品一区二区综合āV| 一级a爱片国产亚洲精品| 好大好硬好深好爽视频h| 国产午夜刺激视频一区二区| 在线观看不卡一区二区三区| 日韩偷拍一区二区三区| 97视频人人做人人爱免费体验| 无套挺进少妇私下处内射| 亲亲发出吧唧吧唧的声音| 欧美在线天堂视频不卡| 黄色人成影院一级| 丝袜ol美脚秘书在线播放| 久久精品人妻中文系列| 国产羞羞视屏在线观看| 欧美群交一区二区大吊曰大逼| 中国女人内谢25xxxxx| 国产免费福利片在线视频| 国产成人a在线看片色欲av| 91无码偷拍精品一区二区三区| 柳州少妇无码一区| 中文字幕二区亚洲综合| 亚洲av成人精品日韩在线播放| 黄片软件免费下| 日本久久久久精品免费| 久久免费看少妇高潮XXX| 青春草五月天婷婷欧美日韩| 污软件在线观看软件| 欧美激情在线播放一区二区| 久久久免费丁香五月| 97人妻人人揉人人躁人人爽动漫| 在线看片免费视频国产五月天 | 97精品日韩永久性无码| 绿巨人聚合app入口| 国产精品午夜不卡在线观看| 精品国产99国产精2021| 三级在线观看mmm| 97久久一精品人妻人人玩| 一级曰本牲交视频| 国内精品视频天天在线观看| 久久久精品2019中文字幕超碰| 99久久精品无码一区二区麻豆| 久久久久久亚洲精品电影 | 色小说色网视频| 一级婬片一级视频| 综合亚洲高清国产| 妓女网一区二区| 国产福利午夜九二网免费| 91人妻午夜综合精品视频| 一本色道無碼道dvd在線觀看| 日韩国产欧美一区免费观看| 国产精品熟女第7页| 成人丝袜18秘 视频在线观看| 精品吹潮在线播放日韩| 无码人妻侵犯一区侵犯| 欧美一区二区三区福利网| 国产无遮挡无码免费视频在线抪| 久久久国产精品免费无码| 偷自拍亚洲综合在线| 久久156精品视频| 18禁美女裸体无遮挡的网站| 综合亚洲高清国产| 亚洲在AV极品无码天堂| 国产精品成人嫩草影院| 精品国产日韩在线观看| 黄片视频免费国产| 国内一区二区三免费视频| v影院一区二区三区自产不卡视频| 911精品國產91久久久久| 黄到让你下面湿的视频| 久久亚洲av成人网| 一本久草综合| 国产一区二区精品久久小说| aⅴ色窝窝男女爽爽a片| 中文字幕不卡乱偷在线| 国产激情福利| 欧美一级视频高清片| 亚洲丰满少妇色网视频网| 黑人和少妇冒白浆了 | 好大好硬好深好爽视频h| 精品久久久久久久久久香蕉| 国产精品a久久久久| 亚洲一级皇色大片蜜汁满满| 午夜福利啪爽国产片精品| 五月天日韩AV电影| 亚洲成熟妞人婬i片在线观看| 天天噜夜夜噜狠狠噜| 1024在线看片你懂的| 国产日韩欧美中文一区| 免费成人一级毛片电影| 自拍影视无码免费| 综合亚洲国产日韩欧美在线| 无码av高潮抽搐流白浆在线| 高清免费三级毛片| 色偷偷色噜噜狠狠网站野外| 欧美一区二区亚洲成人| 377p欧洲日本亚洲大胆噜噜| 国产一二三区 韩国女主播| 亚洲国产一区二区三区在线播放放| 亚洲100部在线观看| 69精品久久日日躁夜夜躁| 制服丝袜物喷水亚洲综合精品| 成年无码?v片在线无码精品| 天堂av2017男人的天堂| 亚洲中久无码永久在线观看同| 国产亚洲成AⅤ人片在线观看| 久久久久国色aV免费软件| 在线观看91精品国产2021| 国产狼友精品视频网| 午夜亚洲亚洲精品福利| 97精品日韩永久性无码| 蜜桃色欲AV久久无码精品软件| 中文字幕无码专区dvd在线 | 亲亲发出吧唧吧唧的声音| 韩国电影密爱在线观看| 极品精品伊人国产| 中文成人无码国产亚洲| 在线国产网站中文字幕av| 无人视频免费观看免费视频| 亚洲男男激情videos高清| 性高湖久久久久久久久| 亚洲人成网站18岁禁止 | 1024大香蕉手机看片| yy111111少妇影院无码光屁股| 亚洲?V伊人久久综合密臀性色| 日本一区二区三区作爱视频| 野外一级爱做片免费观看| 18勿看免费大片1000拍拍| 亚洲精品种子网站在线观看| 国产片淫乱一级毛片视频 | MM131巨爆乳美女少妇动态图| 国产精品综合久久| 中文字幕无码138页| 欧美亚洲日本色图片网| 日本乱中文字幕系列在线看| 免费黄色资源| 欧洲国产精品sss在线观看av| 99亚洲视频网站| 麻豆视频传媒APP| 欧美日韩一区二区三区一| 无码强姦精品一区二区| 男女高潮吃奶添下面动态图| 国产又长又粗达到性高潮的视频| 欧美激情在线播放一区二区| 国产精品亚洲精品91| 亚洲三区欧美一区二区在线| 精品国产伦一区二区三区在唱戏| 一级做a爰片久久毛片免费看| 午夜福利在线免费看| 老熟女亂伦一区二区| 67194在线观看熟妇| 欧美jizz18性欧美色天堂综合在线| 99精品视频免费在线观看| 人妻中文字幕一区二区不卡 | 狠狠色狠狠色綜合久久第一次 | 影音先锋国产精品天堂| 国产一区二区三区精品高清| 步兵精品手机在线观看| 国产精品亚洲精品91| 欧美黄色变态免费观看| 在线a亚洲v天堂网2018影| 久久久综合精品一区二区三区无码| 大又大粗又爽又黄少妇毛片视频 | 欧美性爱激情| 久久久久久无码精品国产小说| 欧美成人xx免费视频| 国产成人福利在线视频播放下载 | 亚洲中文字幕在线有码| 色综合久久久久综合体桃| 欧美91成人亚洲播放网站| 日本欧美一区二区| 日日夜夜摸多人换着玩| 国产精品99国产精品久久gif| 国产高清在线观看AV片| 国产精品欧美日韩视频播放一区| 老妇亚洲精品国产免费无码| 欧美亚洲色综久久精品国产91| 具有黄桃视频在线观看高清免费| 国产无遮挡无码免费视频在线抪| 国产偷窥成熟女精品视频| 成人免费a级毛片无码片在线播放| 欧美亚洲国产另类在线| 日韩2022中文字幕| 国语自产精彩视频在线视频| 国产精品视频色拍拍2021| 亚洲天堂在线观看免费更新| 欧美性爱福利视频| 2021最新在线无码视频| 久久久噜噜噜久久中文字幕色伊伊| 精品亚洲成av人在线免播网站| 免费AV一区二区三区3ATV| 成人国产欧美日本精品久久麻豆| 久久无码精品国产亚洲AV未满十八| 国产精品a久久久久| 99久久精品无码一区二区麻豆| 亚洲人妻久久无码| 日韩国产欧美一区免费观看| 久久久久国色aV免费软件| 亚洲三级视频在线播放| 国产精品国产欧美综合一区| AV网站国产大全| 国产欧美91在线| 正在精品视频第一页| 亚洲男人的天堂在线va| 成人看片黄在线观看| 亚洲性爱视频网站一级看片| 日本高清在线视频无码| 日韩精品亚洲色大成网站| 日韩一区二区在线视频| 亚洲激情午夜视频| ddd54手机免费看| 久久亚洲精品无码观看不卡| 日本欧美一区二区| 国产高清av大屁股免费看| 国产精品白丝久久久| 69式真人无码视频免费| 国产内地刺激性精品毛片 | 亚洲欧美精品免费观看| 在线亚洲資源免費看| 国产高清无码精品一区 | 日韩精品手机在线| 水蜜桃视频污在线观看| 免费啪视频在线观看视频日本| 日韩和的一区二区| 蜜臀98精品國產免費觀看| 亚洲视频在线观看免费一区| 狼友久久国产精品| 98bb国产精品视频| 欧美性爱首页| xxxx黄色网站在线观看| 国产免费女明星色视频| 欧美激情在线播放一区二区| 欧美成人午夜影院| 日韩欧美综合在线二区三区| 久久精品成人免费看| 爱情岛免费视频论坛一路线| 亚洲电影激情五月激情| 国产国产乱熟女视频网站| ac网站不卡免费在线观看| 五月天婷婷伊人久中文字幕| 午夜精品福利波多野结衣| 老师解开乳罩喂奶我脱她内| 国产小视频一区二区三区中文字幕在线播放| 久久久亚洲成人aⅴ| 中文字幕久久第13页| 无遮挡又黄又刺激在线视频| 久久毛片免费一区二区三区电影| 黄到让你下面湿的视频| 一区二区三区.在线看| 亚洲日韩成人在线| 亚洲女人视在线| 一级二区在线观看国内精品三级| 97人妻人人揉人人躁人人爽动漫| 欧美一区二区久久精品 | 免费视频成人欧美精品影院| 亚洲欧美一区电影| 日韩床上特黄一级片| 妓女妓女一区二区三区在线| 高清偷自拍亚洲精品三区| 亚洲欧美中文日韩v在线在线观看| 久久免费看少妇高潮XXX| 午夜精品人成在线观看| 麻豆精品在线免费观看| 小编在这里为大家带来看日韩黄色毛片 | xxxx欧美丰满大屁股| 国产精品亚洲欧美—级久久精品| 日韩和的一区二区| 亚洲精品美女网站久久m| 亚洲av成人片无码网站动画| 国产av亚洲v天堂av| av天堂av亚洲啪啪久久无码| 男人的天堂亚洲一区二区无码 | 国产在线播放线视频免费| 区二区三区在线观看视频| 91成人精品亚洲高清在线观看| 国产∨a在线观看免费| 变态骚女玩男人在线免费观看| 在线喷白浆在线视频| 成人黄片视频免费在线观看| 国产精品香港三级国产| 国产偷窥成熟女精品视频| 中文字幕人妻久久精品一区二区| 奖励网站正能量www正能量| 欧美激情自拍偷拍另类| 黑人巨大亚洲综合在线| 少妇的丰满3中文字幕电影| 国产一级国产一级在线观看| 久久一区二区美女视频网| 亚洲国产在人线播放午夜免费| tobu8 天堂网www中文在线| 国产免费牲交视频38禁| 91久久精品日本一区| 婷婷成人久久精品国产| 午夜精品福利91| 久久精品动漫| 日本在线视频色综合| 日韩欧美国产免费一二三区| 欧美猛少妇色xxxx久久久久| 欧美精品在线观看不卡一区| 亞洲一區在線播放| 精品人妻中文无码久热丝袜| 黄色大片一级毛片视频| 99精品视频免费在线观看| 五月婷婷丁香综合| 青娱乐精品视频在线免费观看| yw尤物久久国产综合 | 欧美中文字幕在线视频| dddd亚洲日韩欧美精油| 91在线无码精品秘九色APP| 添添躁狠狠躁| 人妻中出中文字幕資源免費看| 成人看片黄a免费看视频| 成a人片免费在线观看| 日本中文字幕视频一区欧美激情| 亚洲 欧洲 日韩 综合AV| 日本一本色道高清| 欧美日韩最新精品一二区热热 | 欧美12一13SEX性视频| 污网站免费观看污网站| 小视频播放亚洲欧美| 午夜福利精品无码福利| 国产麻豆成人传媒免费观看| 亚洲福利片欧美日韩一线相关内容首页| 在线观看午夜国产精品| 激情在线视频| 黄色亚洲黄色日韩| 91精品一二区久久无码电影| 日韩人妻内射一级| 麻豆国产AV超爽| 超碰97久久尤物| 欧洲另类综合| 国产 亚洲 欧美 另类中文 | 奇米一区二区三区四区久久| 青青青国产女精品视频| 欧美日产国产成人免费点| 最近最新中文字幕2018| 超碰97久久尤物| 久久久久无码精品国产H动漫猫咪| 国产网友自拍视频| 污视频在线免费观看| 久久精品波多野结衣中文字幕| 91视频污APP色版下载| 一区二区三区人妻免费视频| 国产网友自拍视频| 亚洲a精品无码毛片色欲av| 亚洲婷婷影院女优视频网站 | 亞洲Aⅴ无码乱码在线观看| 91香蕉视频在线观看分享的内容是很丰富的 | 亚洲欧洲国产精品香蕉网| 国产精品视频色拍拍2021| 尻屄视频免费观看软件| 国产精品女同久久久久电影院| 大乳爆乳无码一区二区三区| 日韩A∨无码综合久久五月| 五月开心中文版在线观看| 免费嗨片直播网中文字幕| 欧美激情诱惑在线观看| 中文字幕新无码国产在线视频| 天天操天天曰| 久久久人妻无码一区二区三区| 极品人妻videos人妻| 国产在线观看91精品| 部长侵犯人妻一区二区三区| 青娱乐精品视频在线免费观看| 色吧超碰97人妻| 国产成人欧美综合在线观看| 日韓歐美一區二區三區不卡| 日韩床上特黄一级片| 特级西西西4444大胆无码| 国产免费人成视频不卡顿在线播放播| 国产精品1区2区3区4级网站 | 亚洲国产激情一区在线| 中文字幕不卡乱偷在线 | 在ktv上班被客人吃奶头| 看片免费亚洲国产视频大片| 性感日韩在线视频观看| 日本大乳高潮视频在线观看亚洲欧美人成人让影院 | 国产成人av大片大片在线播放| 亚洲高清国产拍精品青青草原 | av无码免费久久久精品| 日韩午夜不卡在线看| 午夜精品一区二区三区在线成人 | 黄色一线免费高清在线视频16| 玖玖玖在线视频免费观看| 亚洲色成人www在线观看| 中文字幕乱码一区二区三区蜜桃成熟时 | 爱福利秒拍国产导航小视频| 亚洲精品一区二区三区不| 欧美日在线观看视频| 另类小说图片区日本久久大视频| 欧美在线天堂视频不卡| 国产日潮亚洲精彩视频| 久久一区二区美女视频网| 男女高潮吃奶添下面动态图| 国产一久久久久久久久| 免费+午夜+亚洲| 亚洲一卡2卡三卡4卡127.0.0.1| 有没有试过一前一后两个人| 成人网免费视频色呦呦| 国产高清视频在线播放一区二区三区| 国产精品美女久久久浪潮?v| 日本天堂影音资源在线观看 | 麻豆国产AV超爽| 啊灬啊别停灬用力啊黑人| 91香蕉视频一区二区在线观看国产b站视频 | 欧美成人在线视频在线| 久久久免费丁香五月| 善良的嫂子高清播放完整版| 久久精品动漫| 成人国产一区二区三区精品小说 | 日本一区二区三区三州| 最近在线中文字幕更新 | 国产成人福利在线视频播放下载| 国产成人福利在线观看视频| 久久久久久免费免费麻辣| 免费一级毛片在线播放放| 少妇人妻中文字幕hd| 日本又色又爽又黄的网站免费| 国产欧美精品一区二区三区-老狼| 日韩三级黄片免费观看| 日产棈品一区到六区免费| 日本大乳高潮视频在线观看亚洲欧美人成人让影院 | 中文字幕一区二区人妻本田岬| 久久高清综合免费| 欧美日产国产成人免费点| 国产91黑人在线| 青青青国产女精品视频| 国产精品久久成年人免费视频| 夜夜爽天天躁夜夜躁狠狠| 欧美精品青青久久久久久久久久久 | 激情在线视频| 亚洲日韩av免费在线观看| 国产成人麻豆免费观看| 手机看片午夜福利| av日韩色情三级在线看| 免费萌白酱国产一区二区三区| 久久午夜福利久久网| 国产精品一区二区三区免费久久| 欧美中文日韩综合在线视频| 一区三区在线免费视频观看| 欧美一级高清费一级a| 国产50部艳色禁片无码国产麻豆精品一区二区三区 | 国产一级婬A片AAA毛片| 欧美日亚洲黄色网站在线观看| 377p欧洲日本亚洲大胆噜噜| 久久99蜜桃精品久久久久| 婷婷精品国产?v麻豆不片| 在线观看国产一区二区三区| 在线观看免费的AV网址| 狠狠干经典视频在线观看| 国产精品玖玖玖玖影院| 天堂国产成人av在线| 高清偷自拍亚洲精品三区| 添添躁狠狠躁| 高清欧美久久综合| 亚洲日韩av免费在线观看| 一区二区三区国产V欧美| 欧美成人午夜影院| 天天草天天射| 亞洲A∨精品一區二區三區下載| 亚洲美女在线免费视频| 欧洲黑白配一二三四区| 日韩精品一级一区| 欧美精品久久96人妻无码| 麻豆精品国产一级| 99RE6国产精品99RE在线| 无套挺进少妇私下处内射| 天天爽天天爽免费视频| 一级理论片免费观看在线| 亚洲欧美精品日韩片| 亚洲av成人精品日韩在线播放| 国产色精品vr一区区三区| 色噜噜中文网在线| 亚洲视频在线观看污污的黄| 久久草福利视频国产| 偷拍女厕一区二区| 国产精品素人亚洲国产| 亚洲VS欧洲999在线观看视频| 日韩殴无码中文字幕| 中文日无码在线观看| 电影《色戒》未删减版| 亚洲精品私拍国产福利88 | 手机成人免费视频| 中国幻女free性zozo交体内谢| 亚洲人成日本片| 2022AV天堂高清视频在线| ..亚洲综合无码一区二区痴汉| 茄子成年app在线观看| 日韩国产精品等最新内容!| 欧美亚洲日本色图片网| 天堂av2017男人的天堂| 国产在线一区二区三区乱码 | 2022久久最新国产精品| 日本黄线在线视频免费看| 亚洲av成人在线观看| 午夜男女后插入在线免费| 激情在线日韩欧美日韩| 久精品视频在线播放网站| 女生奖励自己隐私越狠越安全好| 国产精品成人免费久久久久三级无码a| 亚洲色综合中文字幕在线| 99久久久囯产亚洲精品观看| 66j8午夜电影网| 欧美在线激情性受内射不卡在线观看| 性高湖久久久久久久久| 国产精品99国产精品久久gif| 成人亚洲欧美在线观看| 国产精品国产三级国产午| 久久久人妻无码一区二区三区| 久久免费观看一级毛片| 亚洲成AV人手机在线观看网站| 女人被添荫蒂潮喷视频| 亚洲一区二区三区aⅴ无码| 美国日本韩国精品在线| 人人色人人干人操| 国产无遮挡又黄又爽在线观看| 久久精品国产精品亚洲艾草| 377p欧洲日本亚洲大胆噜噜| 欧美激情xxxx孕妇| 日本www成人网站在线观看| 黄人成a动漫片免费网站| 亚洲成AV人手机在线观看网站| 久久久久久中文字幕人妻69| 国产精品影音先锋69| 亚洲欧美日韩另类色图| 淫荡人妻在线视频| 亚洲午夜福利精品一区| 高清国产在线观看| 亚洲人成人一区在线观看| h工口福利里番库全彩| 国产香蕉成人综合精品视频| 国产精品66婷婷伊人五月| 男女无遮挡动态图| 日韩一线二线伦理片免费观看网页| 精性国产在线视频| 黄色亚洲黄色日韩| 亚洲性爱视频网站一级看片 | 一级毛片大学生九九精品视频| 今日亚洲2021在线观看| 免费无码AV片在线观看sm| 成人综合在线视频免费观看完整版| 视频一区亚洲专区| 国产在线观看h尤| 久久久免费丁香五月| 欧美疯狂性受xxxxx另类| 插我一区二区在线观看| 免费无码a∨片在线观看 | 国产∨a在线观看免费 | 精品自拍一區| 最新欧洲日韩在线播放| 国产精品欧美久久久无广告| 国产真实迷奷系列在线看| 免费嗨片直播网中文字幕| av午夜福利精品一区| 久久图片视频小说| 岳乳丰满一区二区三区| 日韩在线视频中文一区二区视频综合| 国产成人剧情?v麻豆映画| 日本电影中文字幕久久| 欧美一区二区久久精品| 免费看美女无遮掩的软件| 人妻精品久久一区二区| 无码国产精成人午夜视频| 国产一级无码| 国产成人av国语在线| 欧美极品jizzhd欧美仙踪林| 欧美精品青青久久久久久久久久久| 中文字幕日韩亚洲视频在线| 91视频污APP色版下载| 污视频在线免费观看| 国产一级婬A片AAA毛片| 成人女人在线观看| 有没有试过一前一后两个人| 国产99视频免费精品| 国产尤物A∨尤物在线观看| 成人网免费视频色呦呦| 亚洲一卡2卡三卡4卡127.0.0.1| 国产香蕉成人综合精品视频| 国产亚洲精品成人| 99视频精品全部免费在线 | 国产刺激精品专区av| 亚洲日韩国产精品久久久综合网| 超碰成人在线91| 五月开心中文版在线观看| 少妇大胆瓣开下部自慰| 偷拍亚洲综合二区| 国产91高潮操逼视频流白浆| 中文字幕不卡乱偷在线| 狠狠干经典视频在线观看| 无码中文字幕aⅴ免费费放| 黄色AAA大片免费| 久久99国产精品精品国产同意| 久久精品国产99国产精品严洲 | 亚洲日韩精品综合在线一区二区 | 女性高爱潮免费有声视频网站| 色欲国产av一级毛片| 网址你懂得国产精品| 亚洲制服精品一区二区三区| 911精品國產91久久久久| 日韩和的一区二区| 好爽快点我受不了了视频| 撕掉英语老师的黑色蕾丝内衣| 国产精品免费久久久久影院周| 97人人超人人超碰超国产| 东热亚洲狂野欧美| 瑜伽裤透明全毛露丁字裤| 91精品国产福利久久| 天天操天天曰| 人妻日韩AV无码一区二区| 国产又黄又爽又大的免费视频| 五月开心中文版在线观看| 国产亚洲日韩网曝欧美11| 国产精品99国产精品久久gif| 久久久7777888精品| 成人久久一区精品| A级成人婬片免费看无码| 国内9l视频自拍老熟女九色| 日本丰满护士bbw| 人妻久久系列精品| 精品人妻少妇aⅴ免费狠狠| 草莓视频污污污版下载| 欧美猛少妇色xxxx久久久久| 亚洲丰满少妇色网视频网| 欧美亚洲自偷自偷图片| 亚洲国产在线精品国自产拍影院 | 日本乱中文字幕系列在线看| 亚洲欧美日韩综合网导航| 夜夜添无码试看一区| 亚洲国产欧美日本韩中文字幕在线| 亚洲欧洲在线观看无码| 国产精品成人嫩草影院| 九九热精彩视频| 惠民福利国产精品无码aV一区二区三区| 亲胸揉胸膜下刺激视频试看| 久久精品欧美| 中文区中文字幕免费看| 浪潮国产精品久久久久?v浪潮| 久久综合九色综合欧美婷婷| 中文字幕无码亚洲视频| 亚洲va欧美va国产va天堂影| 免费99精品国产一级A大人片| 日韩免费福利剧场| 亚洲精品性美腿丝袜电影| 亚洲精品种子网站在线观看| 中文字幕一区二区人妻本田岬| 亚洲国产香蕉视频欧美明星换脸| 亚洲 中文 欧美 日韩 在线人| 日韩欧美国产免费一二三区| 欧美日韩一区二区三区一| 亚洲福利在线视频| 国产高清视频在线播放一区二区三区 | 免费99精品国产一级A大人片| 日本一区二区三区三州| 欧洲亚洲激情TV中文字幕| 插曲免费的视频大全影视| 亚洲视频在线观看免费一区| 狠狠干经典视频在线观看| 黄色欧美三级在线看| 亚洲精品国产专区在线| 一区二区成人免费网站大全| 伊人成综合网| 国产日潮亚洲精彩视频| 野花日本韩国视频免费高清观看 | 亚洲无码日韩精选中文字幕| 97精品日韩永久性无码| 欧美在线免费亚洲| 国产制服在线视频| 少妇极品美軳人体337p| aⅴ色综合久久天堂av色综合| 黄片视频免费国产| 激情依依av男人的天堂| 熟女一区二区天天操夜夜操| 扒开老女人p大荫蒂warmth| 欧美粗大猛烈18p图| 秋霞影院韩国伦片在线播放| 国产精品综合久久| 老司机影音先锋日本网站在线| 日本二区在线中文字幕好看到停不下来! | 日韩床上特黄一级片| 午夜福利导航APP| 亲亲发出吧唧吧唧的声音| 九九热精彩视频| 国产精品va在线观看my| 二次元人物桶二次元人物免费网站| 一级?性色生活片毛片| 日韩精品熟女AA久久毛片| 亚洲欧美中文日韩v在线在线观看| 草莓视频免费在线看| 欧美激情四射一区二区在线 | 欧美日韩精品一级高清| 偷拍女厕一区二区| 五月天伊人久久| 黄色视频在线观看视频网站| 亚洲一区二区三区日本九九日韩| 午夜福利精品视频| 最新国产成人精品区在线观看| 欧美狠狠入鲁的视频| 亚洲成人欧美在线| 欧美特黄三级又爽又粗| 国产精品丝袜亚洲熟女蜜月| 亚洲精品种子网站在线观看 | 国产精品免费播放器大全| 9久热在线精品996热视频观看| 五月丁香婷婷免费| 国产或人精品日本亚洲77美色| 在线观看免费的AV网址| 亚洲综合另类色区色偷偷TXT| 免费精品无码成人片在线观看 | 97久久久人妻一区精品| 最新全集网电影免费在线看| 久久国产这里只精品免费| 国产黄色在线网站| 欧美日本韩国在线视频| 久久精品囯產亞洲av麻豆色欲 | 中文字幕一区二区高清精品久久久| 69式真人无码视频免费| 欧美激情诱惑在线观看| 精品天天做天天爽夜夜爽人妻爽| 年轻的朋友3完整版在线观看| 白洁老师国产麻豆片| 日韩在线欧美在线一区二区三区| 无限看片的视频大全免费下载| 日韩欧美女破处视频免费观赏| 亚洲综合男人的天堂色婷婷| 性欧美VIDEOFREE高清大喷水| 亚洲日韩精品人妻| 亚洲人成人一区在线观看 | 中文字幕乱交第9页| 他一边曰一边吃我奶头| 一区二区毛片视频免费看 | 91极品丝袜美女在线观看| 日本人妻最新在线中| 曰韓無碼二三區中文字幕| 国产美女性爱亚洲性爱在线观看| 日本午夜在线视频| 国产乱子伦在线观看免费| 国产精品亚洲自拍| 国产视频日日操| 成人av免费网址在线观看| 成年人视频久久免费| 午夜毛片精彩毛片| 中国无码在线观看| 狼友看视频的网站| 男生女生一起怼怼的app下载大全 国产亚洲乱码无码www | 亚洲欧美日韩中文高清| 亚洲av无码网站yw尤物| 国产一二三区 韩国女主播| 日产一级毛片免费| 一级理论片免费观看在线| 桃子视频APP在线下载污| 免费在线观看精品亚洲| 特级毛片?级毛片在线播放| 久久人人爽人人澡人人高潮AV| 久久久人妻无码一区二区三区| 精品在线欧美一区二区| 性高湖久久久久久久久| 亚洲欧美中文国产二区| 9久热在线精品996热视频观看| 久久精品国产国产精品久久| 在线喷白浆在线视频| 跪趴着被主人狠狠调教| 久久精品欧美| 国产白领勾搭外卖av| 国产成a人亚洲精品无码性色| 国产av一区二区三区香焦| 亚洲AAA一级无费看| 亚洲精品美女网站久久m| 日韩欧美偷拍精品一区| 亚洲AV日韩AV高清在线播放 | 惠民福利久久精品国产亚洲7777| 国产精品福利福利一区在线观看| 阿牛影院在线观看视频| 16处破外女出血视频在线观看| 国产日韩男女激情视频免费播放| 久久精品視頻只有這里| 久久久久国产精品嫩草影院| 阿牛影院在线观看视频| 91精品国产高潮久久久久| 國產日韓視頻在線| 曰本女人牲交高潮視頻| 午夜性爽视频男人的天堂在线| 亚洲男男激情videos高清| 色网日本在线观看| 日韩床上特黄一级片| 午夜色a大片在线观看免费| 巨粗进入警花哭喊求饶| 一区二区放荡亚洲人妇| 亚洲影视AV一二三| av无码免费高潮喷水不卡| 五月天婷婷伊人久中文字幕| 永久免费毛片久久99| 人成午夜日本乱码伦视频亚洲 | 在线播放国产视频99| 国内9l视频自拍老熟女九色 | 加勒比在线看毛片| 精品国产女主自在线久草| 美女我无遮挡被艹网站自慰| 久久久久亚洲精品日久生情 | 三级片欧美在线| 女性高爱潮免费有声视频网站| 国产精品日本欧美一区三| 一级女性牲交免费视频| 欧美亚洲日韩国产中文在线| 最近中文字幕mv免费高清视频动| 香港三级日本三级妇三级| 白洁老师国产麻豆片| 国产目拍亚洲精品二区婷婷| 日韩三级黄片免费观看| 激情男女高潮射精?V免费 | 成年午夜免费aⅴ在线观看| 调教.求饶乖腿打开h| 激情精品视频在线观看| 二级黄色录像片免费播放| 亚洲日韩精品综合| 日本在线一区二区三区免费| 亚洲AV片在线观看高清小说| 亚洲一级午夜福利| 亚洲有无码av在线播放| 国产欧美精品一区二区粉嫩| 欧美极品jizzhd欧美仙踪林| 麻豆国产一区二区在线观看| 91久久成人亚洲精品观看| 久久图片视频小说| 在线视频日本亚洲| 国产ā v中文字幕乱码| 久久久888精品视频| 18款禁用安装的漫画软件| 激情影院免费视频试看| 欧美精品久久96人妻无码| 91国内精品视频在线观看| 狠狠色丁香婷婷综合久久网站| 中国国模无码AV| 欧美a级片在线观免费观看| 亚洲高清美女在线| 久久久久国产精品嫩草影院| 国产曰韩ai一区二区三区 | 国产精品综合久久| 国产免费午夜福利在线播放92| 日本电影中文字幕久久| 在线视频日本亚洲| 日本特黄特色大片免费在线观看 | 午夜福利精品视频| 特级一级毛片视频免费观看 | 动漫精品第一页| 国产香蕉精品视频| 日本人妻最新在线中| 日韩三级久久| 伊人色婷婷五月综合久久97| 中文字幕一区日韩无码| 国产精品亚洲自拍| 人妻一区在线播放| 亚洲日韩精品人妻| 欧美狠狠入鲁的视频| 亚洲欧美中文日韩v在线在线观看| 国产成人综合精品视频| 欧美XXXXX高潮抽搐免费播放观看等 | 色天堂在线观看视频| 亚洲一区二区一区| 久久久久久av无码专区| 人妻精品久久一区二区| 黄色电影免费在线| 99精品视频免费在线观看| 99精品视频免费在线观看| 久久精品国产精品亚洲艾草| 欧美日韩主播国产视频| 99尹人香蕉国产免费天天拍| 日韩免费AV无线在码| 国产91高潮流白浆在线播放un| 欧美亚洲精品另类| 欧美精品在线观看不卡一区| 影视免费三级少妇| 国产超碰97老师人人看| 91久久精品日本一区| 老师解开乳罩喂奶我脱她内| 亚洲爱潮AV永久无码浪潮AV| 国产精品va在线观看my| 中国女人内谢25xxxxx| 成人国产精品视频| 中日韩产精品1卡二卡三卡| 久久久久国色aV免费软件| 91精品在线观看免费视频| 国产91九色在线| 日韩一区二区在线视频| 欧美男人与动牲交zooz| 亚洲三区欧美一区二区在线| 亚洲国产激情小说视频| 狼友看视频的网站| 亚洲三级毛片一区二区| 性高湖久久久久久久久| 无限看片的视频大全免费下载| 国产指交视频在线观看| av中文字幕不卡无码| 最新国产成人精品区在线观看| 亚洲人成网址在线观看| 国产精品无码一区二区四区免费| 亚洲人成色7777在线观看不卡| 免费在线观看一区二区| 女性高爱潮免费有声视频网站| 67194在线观看熟妇| 成人亚洲色欲色一欲| 亚洲欧美日韩中文高清| 国产精品99国产精品久久gif| 亚洲成人特级毛片| 日韩欧美精品亚洲一区二区 | 亚洲欧美国产日日| 4se人人视频在线| 欧美亚洲国产手机在线dvd| 美女视频黄频a免费高清不卡软件| 高清少妇欧美中文| 国内高清A自拍视频| 久热这里只有国产中文精品| 在线视频日本亚洲| 911精品國產91久久久久| 欧美一级高清首页蜜桃| 成人亚洲色欲色一欲| 亚洲国产福利播放| 国产精品九九久久九九国产| 欧美一区手机在线观看视频| 日本在线视频色综合| 欧美成人香蕉在线视频| 男女高潮吃奶添下面动态图| 欧美在线观看不卡一区二区三区| 911永久在线网站| 成人国产精品视频| 91久久久韩系亚洲| 国产无码不卡视频| 国产一级久久女人毛片| 久久久久av綜合網成人| 越南女子杂交内射BBWBBW| 成人a一级毛片免费看视频| 男人J桶进男人屁股过程| 亚洲午夜一区二区三区福利| 国产精品青草婷婷| 亚洲va在线va天堂va国产2020 | 九九免费喷水视频| 黄色AAA大片免费| 亚洲最新无码av网址| 欧美gαy男男激情1069| 另类亚洲欧美精品综合| 国产无码喷水| 中文字幕亚洲无码色网视频| 欧美日亚洲黄色网站在线观看| 午夜三级理论福利电影| 日本二区在线中文字幕好看到停不下来! | 日本一区二区三区在线视频观看免费 | 前后夹击征服骚女完美爆| 欧美成人国产精品一区二区 | 国产精品视频毛片| 日韩欧美国产三级一区| 亚洲三区欧美一区二区在线| 欧美在线观看不卡一区二区三区| 亚洲日本精品va中文字幕| 国产∨a在线观看免费| 阿牛影院在线观看视频| 91视频欧美青青草| 狼友久久国产精品| 国产一级做?爰片久久毛片野外| 91香蕉视频国产免费下载| 深夜福利视频在线一区| 夜夜爽天天躁夜夜躁狠狠| 青青青精品大杳蕉| 久久视频精品38线视频在线观看| 99天天操天天做天天| 亚洲AV日韩AV高清在线播放| 宋雨琦ai人工智能造梦| 麻豆视频传媒APP| 午夜精品福利波多野结衣| 亚洲熟妇无码AⅤ不卡在线播放| 精品妇人妻视在线视频| 18禁黄网站禁片无遮挡观看APP免费 | 国产性夜夜春夜夜爽1a片| 国产又粗又长又爽黄又硬视频| 亚洲伊人成久久综合网| 99奇米a影色777四色在线观看| 性感日韩在线视频观看| 国产视频精选全网| 国产精品一二三级视频| 日韩欧美国产手机在线观看| 免费网站看v片在线毛| 日本国产在线播放一区二区不卡| 国产精品男人在线播放| 国产精品国产亚精品不卡| 亚洲色图一区二区的| 国产精品美女在线免费| 插曲免费的视频大全影视| 亚洲精品国产专区在线| 插曲免费的视频大全影视| 亚洲黄片账号免费| 黄人成a动漫片免费网站| 狼友小视频在线观看| 91天堂一区二区三区在线| 日韩欧美人妻之中文字幕| 丁香婷婷深情五月丁香中文字幕 | 日本丰满护士bbw| 国产高清不卡免费在线观看| 国产第一页草草影院ccyy| 狠狠躁天天躁无码中文幕| 国产亚洲成AⅤ人片在线观看| 丝袜足脚交91精品| 国产日潮亚洲精彩视频| 老师好日逼视频| 亞洲A∨精品一區二區三區下載| 青青青精品大杳蕉| 国内精品久久久久AV福利秒拍| 亚洲精品一区二区三区不| 国产高清在线观看AV片| 亚洲国产激情一区在线| 成人午夜福利小视频| 日韩av在线在线观看| 瑜伽裤透明全毛露丁字裤| 高清欧美久久综合| 天堂a亚洲国产色久在线| 狼人一区二区精品久久| 最近更新中文字幕大全| 免费萌白酱国产一区二区三区| 久久精品αⅴ无码中文字字幕不卡| 亚洲男人的天堂在线va| 国产指交视频在线观看| 理论片在线免费观看| 午夜福利男女xx00视频网站| 国产精品视频免费看人鲁| 香蕉视频久久免费直播| 国产精品亚洲精品91| 91香蕉视频国产免费下载| 欧美日韩中字在线| 三级片网站国产欧美日韩| 国产制服在线视频| 欧美成人午夜影院| 日本不卡免费新一二三区3| 狼人一区二区精品久久| 男女高潮吃奶添下面动态图| 亚洲va欧美a国产va综合| 蘑菇成品人app下载| 久久久精品2019中文字幕超碰| 亚洲三级视频在线播放| 亚洲三级毛片在那看| 國產精品99久久| 久久精品視頻只有這里| 亚洲三级视频在线播放| 欧美亚洲国产另类在线| 伊人色婷婷五月综合久久97| 做爰高潮a片视频35分钟| 亚洲国产精品第一二三区| 超碰成人免费观看在线| 国产乱子伦午夜精品视频| 被男狂揉吃奶胸高潮视频在线观看 | 色婷婷精品国产黑人一区二区三区| 另类亚洲欧美精品综合| 婷婷深爱亚洲五月| 欧美.久久久.精品| 激情影院免费视频试看| 最近中文字幕mv免费高清视频动| 视频福利一区二区三区| 二级黄色录像片免费播放| 欧美日韩人成国产自产高清| 白丝乳交内射一二三区| 日本国产我97在线| 亚洲一级特黄毛片| 久蕉在线视频免费精品| 妓女妓女一区二区三区在线| 中文字幕日本a√在线| 精品综合国产亚洲欧美久久| 三级在线观看mmm| 國產日韓視頻在線| yw尤物久久国产综合 | 毛片一区在线播放| 國產日韓視頻在線| 国产国产乱熟女视频网站| 欧美日老太太久久| 精品国产亚洲人成在线传媒| 在线美女一区二区三区四区| 黄色大片一级毛片视频| 欧美激情在线播放一区二区| 四虎国产在线| 狠狠躁狠狠躁东京热无码| 99国内精品久久久久久| av蓝导航精品导航| 国产精品久久秘 A级| 极品人妻videos人妻| 欧美日韩国产激情另类| 亚洲一级皇色大片蜜汁满满| 最新欧洲日韩在线播放| 久久精品亚洲精品五月色| 国产欧美日韩激情视频一区| 国产在线视频一卡| 欧美三级直播美女视频在线观看| 亚洲MV国产MV在线MV综合试| 女性高爱潮免费有声视频网站| 免费国产成人午夜在线观看| 亚洲一区二区三区日韩国产| 久久精品国产99国产精品严洲| 在线播放日韩国产欧美| 丝瓜草莓www在线观看| 中文少妇无码影视| 国产精品熟女第7页| 日韩无码一区二区高清视频| 亚洲一级日本在线播放| 精品人妻少妇aⅴ免费狠狠| 亚洲欧美日韩综合网导航| good电影在线观看三级中文| 国产成人剧情Av麻豆嘿嘿| 97人妻人人揉人人躁人人爽动漫| 日日狠狠伊人久久| 成人a一级毛片免费看视频| 一区二区三区色网视频在线观看| 91xav在线免费观看| 欧美va亚洲天堂网| 奖励网站正能量www正能量| 久久黄色美女小视频网站| 动漫播放在线国产成人| 国产一区二区三区撒尿在线| 亚洲av中文aⅤ无码av电影| 午夜三级理论福利电影| √天堂亚洲国产传媒在线观看| 久久综合综合久久?V在钱| 一区二区三区吞精| 夜夜操综合网| 免费A级特黄片日韩精品| 性感日韩在线视频观看| 亚洲欧美精品国产电影| ddd54手机免费看| 久久久精品一区二区藌桃| 欧洲国产精品sss在线观看av| 玩弄熟睡的小男生腐h| 在线观看不卡一区二区三区| 波多野结衣加勒比| 久久久久久久女国产乱让韩| 婷婷六月天激情| 日韩午夜在线高清成人| 1精品啪国产在线观看免费牛牛| 国产在线观看h尤| 久久无码私人网站| 久久午夜片电影鲁丝午夜精品 | 亚洲最新av无码中文字幕一区| 东热亚洲狂野欧美| 日韩精品熟女AA久久毛片| 男人扒开女人双腿猛进女人| 东京热无码一区| 久久久亚洲成人aⅴ| 中文字幕在线不卡观看视频| 毛片一区在线播放| 亚洲人成日本片| 阿牛影院在线观看视频| 天天做天天欢摸夜夜摸狠狠摸| 激情丝袜美女视频1区| 亚洲一区二区麻豆AV| 亚洲天堂在线观看完整版| 欧美日韩最新精品一二区热热 | 91短视频在线观看污污污| 亚洲人成网址在线观看| 在线观看免费国产一区二区| 国产成人福利在线观看视频| 欧美韩国亚洲精品综合a| 国产乱人视频在线免费观看| 无遮挡又黄又刺激在线视频| 国产精品网站 夜色| 1024手机在线看片| 亚洲男人的天堂在线n| 欧美综合自拍亚洲综合网| 少妇系列中文字幕一区| 成人黄片视频免费在线观看| 一级做a爰片久久毛片潮喷无码 | 在线视频精品中文无码| 欧洲亚洲成人精品| 性欧美亚洲第一综合天堂另类专 | 国产真实深喉口爆吞精视频| 午夜网站永久在线观看| 日韩美女自慰又黄又粗| 毛片女人片毛片免费二区| 亚洲熟妇真实自拍另类| 免费丰满少妇一级毛片| 高清欧美久久综合| 欧美激情四射一区二区在线| 好了AV第四综合无码久久| 色噜噜国产精品视频一区二区互动交流 | 中文字幕一本久久综合| 久久久久久久久久久国产| 日韩免费不卡视频1| 亚洲资源中文字幕| 精品久久久久久人妻黑人| 日本在线一区二区三区免费| 亚洲欧美一区二区在线观看| 国产看片在线观看一区| 99精品又大又粗又硬少妇毛片| 三级在线看中文字幕完整版| 亚洲色图国产无码| www亚洲欲色成人久久精品| 日本三级久久| 国产精品无码动漫| 精品国产三级AV在线视色| 最新欧洲日韩在线播放| 韩国三级电影久久久| 国产又爽又黄免费网站| 2020日韩中文字幕| (愛妃視頻)无码精品人妻一区二区三区中| 午间影院又黄又粗又大| 国产成人精品一区二三区韩国| 欧美亚洲欧美区| 浪潮国产精品久久久久?v浪潮 | 免费观看丰满少妇一级毛片| 国产一边做一边爱视频| 亚洲va欧美va人人爽老师| 日本不卡免费新一二三区3 | hezyo加勒比在线综合| 国产强奷在线播放免费重| 国产精品美乳| 国产女生自慰a级毛片| 6080YYY午夜理论片免费| 欧美中文字幕网站免费| 三级大黄片污软件| 成人无码视频在线一区| 女教师一级特黄毛片| 国产精品免费播放器大全| 无码国产精品一区二区蕉蕉免费式| 午夜短视频二区| 年轻的朋友3完整版在线观看| 91情侣在线精品国产| 成人a一级毛片免费看视频| 亚州中文字幕40| 99国内精品久久久久久| 最新欧洲日韩在线播放| 国产激烈刺激网站免费观看| 黄色欧美三级在线看| 精品免费一区二区爱| 隔壁放荡的人妻在线看中文| 国产超级无码一极毛片| 精品国产三级AV在线视色| 亚洲成AV人手机在线观看网站| 精品无码国产一区二区三区.闺蜜| 亚洲视频一区二区三区久久| 国产欧美久久一区| 免费国产一区二区8X| 绯色AV视频精品一区二区| 国产香蕉精品视频| 網友分享免费福利资源站在线视频心得| 免费国产成人无码学生妹| 亚洲精品无码av国模| 精品国产99国产精2021| 天天躁夜夜躁狠狠躁综合真实| 久久国产中文字亚洲幕| 亚洲亚洲国产精品| 色天堂在线观看视频| 亚洲中文无码成人网| 国产精品99欧美在线一区二区| 国产日韩综合一区二区性色?Ⅴ | 国产一级婬片免费播放电影| 久久99国产精品精品国产同意 | 国产欧美AA一区二区三区视频| 欧美sese尤物一区二区| 国产目拍亚洲精品二区婷婷| 色网日本在线观看| 久久精品欧美| 日韩欧美精品亚洲一区二区| 欧美人成一本免费观看视频| 成人毛片视频亚洲| 亚洲日韩精品人妻| 欧洲亚洲日本大胆色噜噜| 青青青精品大杳蕉| 无码一区二区三区av免费 | 偷拍亚洲综合二区| 青青青精品大杳蕉| 手机版亚洲成人网站| 色噜噜狠狠狠狠狠色综合 | 亚洲AV无码AV在线播放野外| 久久久久国产精品嫩草影院| 亚洲?V伊人久久综合密臀性色| 亚洲有码精品视频在线观看| 妓女精品一区二区| 亚洲国产自久久婷婷| 无码人妻侵犯一区侵犯| 午夜亚洲国产理论片2020| 黄色欧美三级在线看| 激情在线日韩欧美日韩| 国产在线麻豆精品观看| 三级在线看中文字幕完整版| 欧美97人人爱人人干| 欧美国产在线一区精品自拍| 亚洲AV日韩在线一区二区三区| 中国捆绑女裸绳艺视频| 国产真实迷奷系列在线看| 韩国无码在线| 国产一区二区三区精品免费播放 | 国产美女性爱视频免费| 韩国三级在线| av午夜福利一片看久久| 日韩三级手机在线观看不卡| 图片区电影区激情区小说区| 1精品啪国产在线观看免费牛牛| 国产又黄又爽又大的免费视频| 日韩美女高清视频在线观看| 国产一区二区三区在线观看色网站 | 久久国产午夜精品免费一区二区| 老司机在线观看亚洲二区一区| 欧美粗大猛烈18p图| 香蕉久久一區二區不卡無毒影院| 国产换脸二区手机影院| 99尹人香蕉国产免费天天拍| 餐桌下狂c亲女高辣h文| 欧美亚洲免费播放一区| 一二三四在线色网视频观看社区| 成码无人av片在线电影软件 | 大奶子视频一区二区| 丁香五月天堂网啪啪| 国产av一区二区三区香焦| 手机看片午夜福利| 东热亚洲狂野欧美| 欧美一区二区三区18禁| 在线亚洲資源免費看| 青青青国产女精品视频| 日韓福利一區| 久久精品成人免费看| 亚洲色欲或高潮影院伊人| 国产日韩欧美精品区性色| 午夜在线不卡精品国产| 殴州人成在线视频| 日韩人妻内射一级| 精品亚洲精品在线观看| 国产日韩另类综合11页| 日韩精品手机在线| 麻豆国产一区二区在线观看| 亚洲欧美日韩综合网导航| 亚洲三级毛片一区二区| 亚洲性爱A不卡| 国产三级片大全网| 九九免费喷水视频| 日本国产一区二区三区在线观看| 精品..久久久久久| 久久影院午夜未满十八勿入| 无限看片的视频大全免费下载| 激情婷婷丁香五月| 欧美在线三级艳情网站亚洲成人99 | 狠狠色狠狠色綜合久久第一次 | 无码AV中文字幕| 久久久久久av无码专区| 凹凸在线一区二区三区熟妇| 免费看一级a女人自慰青春网| 日韩美女A∨性爽一级毛片| 日韓福利一區| 野花社区观看免费观看视频6大全| 成人免费在线观看高清视频| 国产视频亚洲精品| 久久精品成人免费看| 国产欧美VA天堂在线观看视频下载| 日韓三級電影在線觀看| 免费在线亚洲| 菠萝菠萝蜜免费影视在线观看| 国产高清色高清在线观看九在线视频 | 内裤堵嘴app高清| 丝袜足脚交91精品| 五月天婷五月天综合网 欧美片区| 亚洲一区二区三区日本九九日韩| 欧美黑人又粗又大又硬免费视频| 码 码加勒比国产在线| 国产精品亚洲欧美—级久久精品| 久久精品αⅴ无码中文字字幕不卡| 国产高清吹潮免费视频| 夜夜高潮夜夜爽精品视频| 特级做a爰片毛片免费看108 | 国产区成人在线观看| 餐桌下狂c亲女高辣h文| 无套挺进少妇私下处内射| 日日狠狠伊人久久| 无码国产福利av私拍导航| 免费无码AV片在线观看sm| 亚洲精品私拍国产福利88 | 丰满多毛xXXⅩ精品视频| 最近在线中文字幕更新| 一区二区三区.在线看| 东热亚洲狂野欧美| 大香蕉国产综合在线视频| 精品久久久久久无码福利片| 奇米777在线影视四色首页| 日韩一区二区三区视频在线| 老外黑人一级毛片| 国产一二一成人观看| 18禁美女裸体无遮挡的网站 | 99久久99久久久精品| 久久156精品视频| 亚洲欧美伊人久久| 国产免费女明星色视频| 夜鲁夜鲁夜鲁高清免费看| 有没有试过一前一后两个人| 亚洲日韩精品综合在线一区二区| 熟女一区二区天天操夜夜操| 插曲免费的视频大全影视| 精品成在人线AV免费| 欧美午夜久久精品另类| 精品无码人妻遭多人侵犯Av| 亚洲日韩精品人妻| 亚洲欧洲在线观看无码 | 日韩av手机在线观看| 色偷偷色噜噜狠狠网站野外| 一级黄色欧美性爱| 久久人人爽人人爽av片| 中文字幕永久有效丝袜| 双乳被快递员揉搓玩弄在线播放| 日韩av手机在线观看| 五月天婷五月天综合网 欧美片区| 久久免费视频8| 中文字幕欧美熟妇一区| 国产美女性爱视频免费| 国产黄色三级三级三级| 亚洲欧洲AVAV天堂系列| 精品国产91无码大片在线观看| 色五月丁香五月综合五月橹| 一级a爱片国产亚洲精品| 在线观看精品成人综合视频| 黄色午夜网站| 精品唯美系列最新在线视频| 欧美日韩中文字幕国产一区| 欧洲亚洲日本大胆色噜噜| 在线精品三级视频在线网| 香蕉在视频线精品视频| 老妇亚洲精品国产免费无码| 大奶子视频一区二区| 99热手机在线最新地址| 色欲悠久久久久综合区欧美亚洲日韩 | 黄色一级毛片在线| 欧美在线Vs免费一级片| 春色 都市 亚洲 小说区| 国产激情一区二区三区成人麻豆 | 久久人人97超碰人人爱百度| 午夜精品福利91| 女人十八毛片免费观| 欧美综合在线观看日本| 嫩模自慰一区二区三区动漫| 亚洲av成人片无码网站动画| 国产99热在线露出| 亚洲av手机在线观看| 91果冻精品国产自产自产在| 18禁美女裸体无遮挡的网站| 99久国产久精品视频| 无码av蜜桃av色欲| 国产无遮挡裸体免费视频| 好吊妞视频这里有精品妞干网| 免费A级特黄片日韩精品| 久久国产中文字亚洲幕| 久久精品2021国产| 亚洲aⅴ女人的天堂在线观看| 玩弄粉嫩少妇高潮出白浆AⅤ| 精品唯美系列最新在线视频| 成人限制第一页| 91短视频在线观看污污污| 惠民福利久久精品国产亚洲7777 | 夜夜高潮夜夜爽精品视频| 国产无码不卡视频| 精品二区三区在线观看| 亚洲一区二区三区日本九九日韩| 惠民福利国产精品无码aV一区二区三区 | 国产成人欧美综合在线观看| 1区3区4区产品乱入视频| 国产强奷在线播放免费重| 国产一区二区三区精品高清| 国产特黄色一级| 澳门精品久久国产电影| 国产无遮挡无码免费视频在线抪| 91成人午夜精品福利院| 日韩免费不卡视频1| 2020国产成人精品视频网站| 亚洲中文字幕在线有码| 国产网友自拍视频| 三级大黄片污软件| 国产女生自慰a级毛片| 黄色AAA大片免费| 疯狂做受ⅩXXX高潮欧美| 久久精品囯產亞洲av麻豆色欲| 欧美牲交?欧美牲交| 日本一本高清在线观看视频亚洲一区二区三区| 日韩欧美一卡二区| 亚洲日韩精品综合| 精品唯美系列最新在线视频| 亚洲熟妇无码AV| 色天堂在线观看视频| 日韩毛片午夜在线观看| 成人高清毛片视频| 久久伊人毛片视频| 国产高清乱码无卡女大生| 欧美牲交?欧美牲交| 亚洲天堂在线观看完整版 | 国产私人尤物无码不卡| 国产国产人精品视频69| 日本中文字幕www| 无码人妻热线精品视频| 亚洲欧美日韩综合第一| 婷婷深爱亚洲五月| 免费AV无码不卡在线网站| 粉色视频免费观看下载| 久精品视频在线播放网站| 日本午夜色噜噜| 91影视在线观看| 欧美牲交?欧美牲交| 美人+妻+影音先锋| 久久156精品视频| 日韩美女粉嫩小泬在线精品 | 国产尤物A∨尤物在线观看| 91影视在线观看| 国产成人av大片大片在线播放| 18禁美女裸体无遮挡的网站| 久久久精品3d动漫一区二区三区| 免费A级毛卡片不收费视频| 在线播放国产女同闺蜜| 国产污污视频在线观看| 中文字幕无?v免费久久| 国产精品66婷婷伊人五月| 国产区成人在线观看| 不卡av中文在线观看| 免费在线亚洲| 国产免费午夜福利在线播放92| 国产A级无码一级毛片| 免费电影AV网站| 后入式肏大屁股眼免费视频| 在线美女一区二区三区四区| 成人午夜精品網站在線觀看| 欧美一区二区久久精品| 无码中文字幕aⅴ免费费放| 日韩美女自慰又黄又粗| 日韩高清一区二区第50页 | 草草影院欧美三级日本| 无码人妻热线精品视频| 蜜臀98精品國產免費觀看| ddd54手机免费看| 欧美一区二区在线播放免费播放 | 日韩视频在线观看免费6080| 性XXXXX欧美老肥婆多毛| 伊人蕉影院久亚洲影院| 亚洲丰满少妇色网视频网| 免费啪视频在线观看视频日本| 变态骚女玩男人在线免费观看| 国产尤物A∨尤物在线观看| av日韩色情三级在线看| 免费AV无码不卡在线网站| 欧美成人国产精品一区二区| 欧美性爱福利视频| 国国产精品V欧美精品∨日韩| 前后夹击征服骚女完美爆| 成人国产经典精品视频| 国产真实迷奷系列在线看| 久久婷婷国产免费天天| 日韩三级手机在线观看不卡| 欧美97人人爱人人干| 亚洲欧洲久久久精品| 香港三级日本三级妇三级| 国产天堂网www在线资源av网 | 殴州人成在线视频| 三年片在线观看中文| 欧美gαy男男激情1069| 91麻豆精品国产自产91成人久久| 欧美在线Vs免费一级片| 天天噜夜夜噜狠狠噜| 免费在线亚洲| 在线国产网站中文字幕av| 女性喷液过免费视频| 欧美午夜在线观看免费完整版 | 国产乱婬AV麻豆剧传媒牛牛影视| 美女自卫慰视频福利喷水| 91香蕉视频在线观看分享的内容是很丰富的| 日韩精品中文字幕一区二区污污视频| 日日插人人插天天插| 91xav在线免费观看| 亚洲手机在线成人| 欧美日亚洲黄色网站在线观看| 女人毛片免费看一分钟| 超碰97久久尤物| 欧美亚州国产精品| 歐美性一交激情視頻在線| 91精品一二区久久无码电影| 日韩视频在线观看免费6080| 欧美性爱激情| 18款禁用安装的漫画软件| 欧美A级毛片免费播敢| 日本中文精品在线观看| 日产午夜精品一区二区播放| 无码av蜜桃av色欲| 99精品無碼人妻一區二區三區| 97人妻人人揉人人躁人人爽动漫| 成人丝袜18秘 视频在线观看| 国产在线拍偷自揄拍无码成人| 久久精品国产国产精品久久| 精品视频卡1卡2卡3| 色婷婷国产精品欧美毛片| 国产真实深喉口爆吞精视频| 另类小说图片区日本久久大视频 | 色吧超碰97人妻| 18进黄址app最新版| 亚洲国产在人线播放午夜免费| 免费黄色小说视频| 精品动漫中文字幕一区| 国产一国产精品免费播放| 日本成a人片在线观看网站 | 国产国产乱熟女视频网站| 欧美日韩性视频在线| 国产黄色三级三级三级| 五月开心中文版在线观看| 99精品欧美一区二区蜜桃美图| 亚洲熟妇无码AV| 911精品國產91久久久久| 亚洲中文无码成人网| 不卡一卡二卡在线视频黄色大片免费在线观看 | 精品乱伦欧美国产| 国产亚洲加勒比久久精品| 18禁止裸身美女动漫网站| 久久国产福利一区二区三区| 在线视频日本亚洲| 最近最新的日本中文字幕| 国产香蕉精品视频| 人妻中文字幕专区| 亚洲乱码国产乱码精品精乡村 | 福利姬白浆AV导航| 中文字幕新无码国产在线视频 | 久久免费视频8| 中国激情一区二区三区成人| 日本不卡一区在线| 夜色www中国精品视频网站| 国产精品综合久久| 日本欧美一区二区| 国产精品v欧美| 久久青青草原精品国产APP| 无码人妻侵犯一区侵犯| 污网站免费观看污网站| 亚洲AV综合色区无码区| 欧美亚洲自偷自偷图片| 91香蕉依人综合久久| 国产在线一区二区三区乱码| 黑人处破女免费播放| 成人高清影院| 美女动态三级在线| 国产精品酒店在线观看| 伊人影院在线播放| 91欧美激情一区二区三区成人日韩99久久综合狠狠综合久久 | 欧美日老太太久久| 国产精品免费久久久久影院周| 69式真人无码视频免费 | 亚洲一级日本在线播放| 精品亚洲成av人在线免播网站| av无码三级片在线播放| 亚洲av日韩国产激情| 91精品国产综合久久久亚洲日韩| 精品91自产拍在线观看99re| 无人视频免费观看免费视频| 高清免费人成在线视频观看| 日韩午夜在线高清成人| 94人妻喷水视频在线| 亚洲AAA一级无费看| 丰腴饱满的极品熟妇| 千金去SM体验馆被调教| 肉色丝袜超薄一区二区三区| 亚洲av日韩国产激情| 日韩中文无线码免费观看| 91精品在线观看免费视频| 欧美一区二区三区免费观看视频互動交流| 狠狠干2017欧美最新| 一级做a爰片久久毛片免费看| 亚洲 欧洲 日产 专区| 亚洲中文字幕不卡无码| 久久亚洲精品少妇| 国产盗摄精品一区二区酒店等| 手机在线观看的国产网站| 最近在线中文字幕更新| 免费国产福利一区二区| 日本免费AⅤ乱码高清专区| 日日狠狠伊人久久| 日本一本色道高清| 做爰高潮a片视频35分钟| 亚洲专区日韩中文在线 | 中国精品视频在线一区二区| 三级片欧美在线| 日韩三级久久| 国产特黄a三级三级三级| 2019天天拍拍天天爽视频全集| 亚洲丝袜在线观看| 久久亚洲免费伦理| 又黄又爽免又刺激费视频网站| …久久精品99久久香蕉国产 | 欧美群交一区二区大吊曰大逼| 精品在线观看免费一级毛片| 成人久久免费视频| 国产精品九九久久九九国产| 国产狼友精品视频网| 好姑娘10影视剧在线观看| 久久成人国产精品青青| 6080精品人妻一区| 国产精品无码动漫| 欧洲亚洲激情TV中文字幕| 日韩精品 欧美 制服丝袜| jk制服白丝喷水视频开放| 欧美日韩精品第一区二区| 成人久久一区精品| 亚洲性爱A不卡| 亚洲精品高清你懂的| 欧美亚洲日韩国产中文在线| 亚洲国产自久久婷婷 | 91久久成人亚洲精品观看| 久久电影午夜鲁丝片无码| 久久美女视频黄片| 亚洲高清美女在线| 国产无遮挡又黄又爽在线观看 | 国产韩国日本高清视频| 成人片在线观看亚洲欧美| 波多野结衣午夜福利| 欧美一级二级三级网站大全| 国产精品视播放一区二区三区| 超碰成人在线91| 亚洲图片视频欧美日韩| 国产乱人视频在线免费观看| 成人无码视频在线播放| 无码国产精品一区二区蕉蕉免费式 | 欧美日韩精品一级高清| 惠民福利久久精品国产亚洲7777 | 贵州少妇一级毛片| 久热国产精品视频一区二区| 老司机影音先锋日本网站在线| 国自产拍偷拍福利精品免费一| 日本天堂成人在线视频| 精品人妻挤奶一二三四区| k频道国产网红欧美在线视频| 日韩毛片午夜在线观看| 国产极品午夜在线观看| 菠萝菠萝蜜免费影视在线观看| 国产成人av国语在线| 国产精品成人AV片免费看| 国产高清色高清在线观看九在线视频 | 久久久久中文字幕1区| 国产又长又粗达到性高潮的视频 | 色影音先锋色资源网站| 秋霞鲁丝片AV无码| 免费乱伦亚洲无码| 午夜亚洲亚洲精品福利| 日韩人妻无码视频18岁| 中国毛片在线观看| 成人欧美视频免费看黄黄| 完整版av片永久免费| 极品人妻videos人妻| 亚洲日韩精品综合| 综合 欧美 日韩 中文字幕| 色戒未删减2小时38分在线| 欧美性爱激情| 被男狂揉吃奶胸高潮视频在线观看 | 羞羞视频在线观看免费视频| 天堂网2021天堂手机版| 国产又粗又长又爽黄又硬视频| 国产一二三区 韩国女主播| 丁香婷婷深情五月丁香中文字幕 | 98bb国产精品视频| 午夜网站永久在线观看| 亚洲九九夜无码在线观看| 亚洲男人久久综合天堂 | 国产18成人三级在线观看| 成年女人喷潮视频免费观看| 国产精品自产拍在线18禁| 亚洲无码模一级黄片| 亚洲无码免费看在线视频| yw尤物久久国产综合 | 91精品一区国产高清在线GIF| 成人无码视频在线观看| 94人妻喷水视频在线| 久久久久久久女国产乱让韩| 狠狠色狠狠色綜合久久第一次| 成人综合在线视频免费观看完整版| 国产精品美女白丝自慰| 精品国产午夜在线| 女式开襟游泳衣免费| 天堂资源中文在线地址bt| 亚洲 欧洲 日韩 综合AV| 亚洲中文字幕一区二区三区在线91| 三年片在线观看中文| 久久久久国色aV免费软件| (愛妃)久久AV无码精品人妻出轨| 最近在线中文字幕更新| 精品国产乱码久久久久久166| 欧洲精品高清无码一区二区三区| 久久亚洲av成人网| 亚洲 中文 欧美 日韩 在线人| 天堂av在线观看免费| 色午夜天香婷婷丁香| 国产1区2区精品自拍| 国产精品亚洲欧美—级久久精品| 国产成人综合精品视频| 欧美性猛交xxxxx水多| 国产精品va在线观看my| 国产色A∨在线看精品| 丰满爆乳无码专区线一区二区三区| 国产99视频免费精品| 一区二区三区不卡中文字幕 | 秋霞久久女婷五月综合色啪| 亚洲v欧美v国产ⅴ在线成| 亚洲国产一级精品毛一级精品看免费视频 | 日韩人妻无码视频18岁| 亚洲手机在线成人| 日韩亚洲色欲色一欲www| 亚洲精品私拍国产福利88| 变态骚女玩男人在线免费观看| 国产超碰97老师人人看| 韩国电影密爱在线观看| 肉色丝袜超薄一区二区三区| 自拍亚洲欧美另类动漫| 久久99人妻精品涩爱噜噜噜蜜臀 | 狠狠久久久精品| 国产精品香港三级国产| 欧美亚洲国产另类在线| 亞洲A∨精品一區二區三區下載| 丁香婷婷深情五月丁香中文字幕| 丝袜足脚交91精品| 色噜噜国产精品视频一区二区互动交流 | 国产视频精选全网| 二区三区精品| 亚洲欧美日韩中文高清| 97理论三级九七午夜在线观看| 不卡av中文在线观看| 日本不卡免费新一二三区3| 欧美日韩aⅴ人妻| 久久精品丰满人妻99| 亚洲Av秘无码一区二区| 神马免费视频在线观看| 在线免费观看国产视频| 国产精品影音先锋69| 国产91久久精品一区二区九色| 最新av网站网址免费观看| 女生奖励自己隐私越狠越安全好| 精品一区二区三区免费在线视频| zayou亚洲福利一区| 亚洲综合另类色区色偷偷TXT| 久久99成人精一区二区三区| 免费视频成人欧美精品影院| 日日摸夜夜添无码无码a∨| 久久久久久久久av毛片| 成年人国产一级片| 草久在线视频在线观| 婷婷综合六月| 亚洲国产永久视频免费看| 天堂av2017男人的天堂| 亚洲欲色欲色XXXXX在线小说| 羞羞视频APP下载网站| 人妻日韩AV无码一区二区| 字幕大全网址撩人精品磁力视频二区 | 网友分享国产亚洲精品福利片心得| 成人毛片视频亚洲| 国产Av激情久久无码天堂| 韩国无码在线| 日本人妻最新在线中| 久久人人97超碰人人爱百度| 天天爽天天爽夜夜爽毛片| 精品国产91无码大片在线观看| 久久爽av鲁丝无码中文| 国产目拍亚洲精品二区婷婷| 亚洲成人特级毛片| 北条麻妃青青久久av| (愛妃精選)免费无码毛片一区二区| 老师和学生边上课边做h| 免费黄色资源| 91麻豆一区二区在线观看| 国产成人真人片亚洲精品不卡| 成人3d动漫一区二区三区| 亚州中文字幕| 中文字幕永久有效丝袜| 黄色一线免费高清在线视频16 | XVIDEOS免费人成视频网址| 一级?性色生活片毛片| 又色又爽又硬又刺激的视频| 国产成人无码精品久久久亚洲精品人成无码中文毛片 | 天天做天天干中文字幕| 亚洲 欧洲 日产 专区| 中文字幕一区二区人妻本田岬| 中文字幕久久第13页| 国产盗摄精品一区二区酒店等| 另类小说图片区日本久久大视频 | 永久免费毛片久久99| 欧美激情在线播放一区二区| 亚洲国产视频二区| 一级少妇精品视频一区二区| 福利午夜伦理影院| 激情男女高潮射精?V免费| 人成午夜日本乱码伦视频亚洲 | 2022v视频无码高清网站| 极品精品伊人国产| 爱情岛免费视频论坛一路线| 日本电影中文字幕久久| 欧美精品第56页| 大黑人交xxxx大黑人交野外| 码 码加勒比国产在线| 婷婷六月天激情| 999福利精品久久久| 白丝被弄羞涩娇喘动态图| 歐美成人久久久| 国产区清纯高中生| 国产成人精品亚洲二区| 日韩高清一区二区第50页| 无码制服丝袜一区| 网页在线观看无码高清| 99ER这里只有精品视频8| 欧美在线免费亚洲| 亚洲综合无码一区二区三区四区| 99re66热这里只有精品66| 91无码久久国产线看观看hd| 午夜福利在线观看不卡| 韩国r级中文字幕在线播放| 韩国三级中文字幕HD久久精品| yy111111少妇影院无码光屁股| 国产亚洲加勒比久久精品| 国语对白国产精品一区| 这里只有好看的a视频| 久久久精品一区二区藌桃 | 日韩美女高清视频在线观看| 国产99视频免费精品| 国产成人综合精品视频| 四虎影视国产免费| 一区二区三区在线观看欧美| 国产一线在线观看| 国产啪嗒啪嗒无遮美女视频| 亚洲成α人V欧美综合天堂| 嫩草国产等最新內容| 鲁丝片一区二区在线观看| 日韩欧美亚洲国产精品| 国产尤物A∨尤物在线观看| 亚洲国产香蕉视频欧美明星换脸| 91精品国产高清自| 二区三区精品| 东京热无码一区| 久久久人妻无码一区二区三区| 国产国产乱熟女视频网站| 熟女一区二区天天操夜夜操| 无码不卡毛片视频免费播放| 天天在线观看日韩免费AV | 黄色片久久美女啊啊啊内色| 亚洲综合男人的天堂色婷婷| 一级无码国产片手机版| 99国内精品久久久久久| 欧美97人人爱人人干| 亚洲欧美日韩岛国色图| 精品久久久久久无码福利片| 国产成人av国语在线| 精品国产?Ⅴ一区二区三区 | 884aa四虎影成人精品| 精品免费在线欧美| 日本香蕉视频在线观看| 免費在線一級片| 精品黄色国产在线观看| 男女做爰大粗舒服小说 | 人妻中出中文字幕資源免費看| 亚洲欧美日韩免费在线播放| 啊灬啊别停灬用力啊黑人| 精品国产午夜肉伦伦影院| 久久五月天影院| 熟女一区二区天天操夜夜操| 1024在线看片你懂的| 成人久久久一区二区| 相泽南作品在线观看| 超级极品白嫩美女在线| 亚洲成α人V欧美综合天堂| 日韩精品中文字字幕有码专区| 欧美牲交?欧美牲交| 一级黄色片免费观看| 抖音成人版短视频| 高潮喷水女仆流白浆| 玖玖玖在线视频免费观看| 91国内精品视频在线观看| 欧美黑人精品一区二区在线| 国产午夜精品草莓一区二区三区| 一级女性牲交免费视频 | 欧美日韩国产三级久久| 区二区三区在线观看视频| 国产一级黄aa爽| 欧洲亚洲成人精品| 欧美性猛交xxxxx水多| √天堂中文官网8在线| 隔壁放荡的人妻在线看中文| 国产狼友精品视频网| 人妻精品久久一区二区| 欧美日韩成人精品第一区| 亚洲国产在线精品国自产拍影院| 日韩午夜在线高清成人| 高清偷自拍亚洲精品三区| 欧美激情诱惑在线观看| JK白丝高中小仙女自慰| 大乳爆乳无码一区二区三区| 丝袜ol美脚秘书在线播放| 欧洲亚洲成人精品| 最新全集网电影免费在线看| 嘟嘟嘟大豆行情网www| 色综合久久综合中文综合网| 91香蕉视频黄版下载| 国产成人无码精品久久久亚洲精品人成无码中文毛片 | 区二区三区在线观看视频| 欧美日韩国产在线一区二| 国产 无码 免费| 91精品一区国产高清在线GIF| 五月丁香婷婷成人网| 国产日韩欧美中文一区| 99久久精品一区二区毛片下载 | av午夜福利一片看久久| 色综合精品视频在线| 嘿嘿连载下载app| 天堂av2017男人的天堂| 囯产精品99久久一区二区三区| 久久久久久久久av毛片| 免费AV无码不卡在线网站| 497799欧洲版的国产suv| 亚洲成人特级毛片| xxxx黄色网站在线观看| 久久影院午夜未满十八勿入| 国产精品青青草原免费无码中国| 亚洲va欧美va人人爽老师| 殴州人成在线视频| 国产精品1区2区3区4级网站| 国产亚洲欧美日韩网站| 爱情岛免费视频论坛一路线| 精品无码国产一区二区三区.闺蜜| 91精品国产高潮久久久久| 精品卡通动漫在线观看视频一区| 欧美一级欧美一级在线观看| 国产精品亚洲欧美—级久久精品 | 国产成人综合在线女婷五月99播放| 久久er热这里只有国产中文精品| 麻豆国产91视频| 久久99国产精品二区不卡 | 精品免费在线欧美| 一级黄色片免费观看| 激情男女高潮射精?V免费| 激情在线日韩欧美日韩| 韩国美女一级毛片| 久久精品国产精品亚洲艾草| 日本中文精品在线观看| 欧美亚洲欧美区| 欧美日亚洲黄色网站在线观看 | 正在播放黑人巨大在線觀看| 性高湖久久久久久久久| 国产αV无码日韩αV无码网站| 亚洲欧洲AVAV天堂系列| 日本天堂成人在线视频| 亚洲欧美一区电影| 日韩国产亚洲欧美有码| 一本久草综合| 中文字幕久久久久一区| 亚洲爆乳av一区二区三区| 亚洲AⅤ成人综合网伊人APP | 欧美国产直接看的精品A视频| 一本久道久久综合网| 啊灬啊别停灬用力啊黑人| 欧美一区二区三区福利网| 欧美三级电影天堂| 国产精品a久久久久| 欧美一区二区久久精品| 入禽太深在线色网视频5| 曰本女人牲交高潮視頻| 欧美日韩在线精品激情福利综合| 国产视频亚洲精品| 欧美亚洲日韩国产中文在线| 亚洲AV片在线观看高清小说 | 国产精品欧洲激情无码AV在线| 91香蕉app下载汅api免费网站无限看| 最新国免费看黄a级毛片| 国产无码不卡视频| 亚洲av成人片无码网站动画| 久久综合第一页无码97| 人妻丰满妇岳av无码区HD| 久久久久久免费免费麻辣| 精品国产乱码久久久久久166| 久久精品人妻中文系列| 国产91九色在线|