国产精品人人爱一区二区白浆_国产我不卡午夜伦理_免费电影亚洲一级黄片_国产午夜福利久久_51视频在线观看免费国产_天堂AV网手机版_国产精品毛片一区二_印度女人性液_日韩大片91免费观看视频播放_日本欧美国产精品第一页久久

手機版
1 2 3 4
首頁 > 新聞中心 > 行業(yè)新聞 >
行業(yè)新聞

上海翻譯公司完成通信設(shè)備英文翻譯

發(fā)布時間:2018-08-10 10:59  點擊:

上海翻譯公司完成通信設(shè)備英文翻譯
2.1    AUTOMATED COMMUNUNICATIONS SYSTEMS - GENERAL
Using the Defense Information Infrastructure (DII) as a backbone, the Navy has designed automated systems ashore and afloat to process message traffic with minimal intervention by communications personnel. Figure 2-1 depicts the system flow. This chapter describes these systems, providing information to the communicator to assist in effective management of these systems.
The Navy's automated software based communications systems are dynamic. To keep these systems current users can propose improvements or report defects in the software systems used by the Navy.
 
2.2              MESSAGING SYSTEMS
One of the most important concepts of operating in an organization that is spread across the globe is not just the ability to communicate, but to communicate quickly, effectively, securely, and with full accountability. With the development, fielding, and proliferation of Internet Protocol (IP) based communications (i.e. E-mail and Internet Relay Chat), the desire is to quickly share information by any means available and people do.
With that in mind, the average user would think that with all of the e-mail and chat going on in the Navy that record message traffic would soon be replaced. To the contrary, Navy personnel have not only continued to use record message traffic, but have exceeded the capabilities of messaging systems and their associated communications paths.
With constantly stressed low data rate (LDR) communications networks such as the Common User Digital Information exchange Subsystem (CUDIXS), the need to maximize use of the “new” IP paths has become a driving force in the future of Naval Messaging. Even with existing systems (i.e. pre-DMS) we find the need to adapt to our available resources.
2.2.1          DMS OVERVIEW
The DMS employs the messaging and directory services using internationally recognized cOTS-based X.400 and X.500 messaging and directory products. The DMS COTS baseline, which includes DoD military messaging, directory, and security enhancements, provides the messaging infrastructure for DoD electronic organizational messaging support. The DMS messaging and directory components are managed and protected by specialized systems management and security support mechanisms and components. The DMS management system uses system management tools and message tracing applications to isolate and identify problems and to report on the health and welfare of the DMS infrastructure.
Protocols and components of the Multi-level Information Security Service Initiative (MISSI) provide DMS security services. The MISSI Message Security Protocol (MSP) and the Fortezza encryption card provide encryption and digital signature services. Each Fortezza card contains encryption keys that are based on the organization or command's authorized level of clearance and digital certificates that are unique to the card's assigned organization. A designated Certification Authority (CA) uses a CA Workstation (CAW) to generate and post the encryption keys and digital certificates to the organization's Fortezza card and to the DMS X.500 directory. The MSP and the Fortezza card generate and exchange security tokens that support the exchange of digitally signed and encrypted messages between DMS users.
DMS network transport services are provided by the Defense Information Systems Network (DISN) and secure dial-up connections. DoN users receive DMS services or enabling capabilities through the allocation of various levels of messaging, directory and network management services, and DISN network or dial-up connectivity.
2.2.1.1           TACTICAL MESSAGE GATEWAY (TMG)
The MFI is an infrastructure-level component that provides protocol conversion between the DMS MTS and the DTH legacy- messaging environment. The MFI is the primary means of providing interoperability with DTH users that have not migrated to DMS, including the Allied and tactical users. MFI'S are typically located in DISA managed DMS Transition Hubs (DTH), which include legacy switching centers, or Navy LNOSC locations. The DMS automatically routes messages through an MFI whenever the recipient's DMS X.500 directory address contains a legacy preferred delivery attribute.
2.2.1.2       CERTIFICATION AUTHORITY WORKSTATION (CAW)
The CAW is a National Security Agency (NSA) certified and approved workstation that provides enabling technology that supports messaging security services of confidentiality, integrity, authentication, and non-repudiation. Organizations use the CAW for programming identities onto Fortezza Cards, generating public-key certificates, and posting security information to the DMS X.500 directory. An appointed CA is responsible for operating the CAW, programming Fortezza cards, and using the CAW along with an ADUA to post certificates and security information to the DMS directory.
2.2.1.3       MESSAGE CONVERSION SYSTEM (MCS)
Currently, the Defense Message System-Message Conversion System (DMS-MCS) is operational at the DISA DTH located at Fort Detrick MD. As fielded, the DMS-MCS is comprised of the Message Conversion System Message Processor (MCSMP), the MCS Directory Component (MDC), the Central Directory Component (CDC), and the Update Authority Component (UAC). The UAC portion of the DMS-MCS is located at NCTAMS LANT and NCTAMSPAC. The Navy has fielded Regional MCS' at the two NCTAMS. The Regional MCS configuration consists of the MCSMP and the MDC. Changes were made to provide supportable, removable hard drive capability and to provide a Mode I interface to the NOVA System. Although the UAC and CDC are not considered part of the Regional MCS configuration, the Regional MCS receives Plain Language Address (PLA) updates from the CDC via the SIPRNET.
The primary purpose of the Regional MCS is to provide PLA-to- Routing Indicator (RI) look up and assignment. After receiving a message from the host NOVA System, the Regional MCS will validate the message, assign the appropriate RI(s) and return the message to the NOVA for delivery. If invalid PLAs are found by MCS, the MCS will automatically generate a service message to the originator. Each invalid PLA will receive a RI of RUBDPLA side routed on the original message. The MCS provides a means of inserting Routing Indicator(s) (RI'S) in an ACP128 formatted message based on the PLAs contained in that message. Currently, any U.S. General Service (GENSER) subscriber employing ACP128 format and sending narrative pattern traffic may, upon approval, use the DMS-MCS for PLA-to-RI conversion. Both the Navy Regional MCS and DMS-MCS are transitional systems to aid customers in the migration from AUTODIN to DMS. Even though these systems are transitional, both are designed to remain viable until the phase­out of the AUTODIN system is completed.
2.2.1.4   DMS AND TACTICAL DMS PROXY AFLOAT SYSTEM
The Tactical Messaging DMS proxy system at TMG sites provides the ability to interface and translate DMS messages to and from tactical units, using approved DMS infrastructure components. The NCTAMS sites have a direct interface to legacy systems and have the Tactical Messaging DMS proxy capability which is supported by the Integrated Shipboard Network System (ISNS) hardware with software provided by the Common PC Operating System Environment (COMPOSE).
2.2.1.5       DEFENSE MESSAGE DISSEMINATION SYSTEM (DMDS)
DMDS is an end user message profiling application that automatically profiles and disseminates a command or organization's incoming message traffic. The organization can configure DMDS to distribute the profiled messages in either encrypted or unencrypted form. If DMDS distributes encrypted messages, all recipients will need Fortezza security services. Organizations must protect local networks that distribute unencrypted DMS messages in accordance with guidelines set forth in OPNAVINST 523 9.1.
2.2.1.6     MAIL LIST AGENT (MLA)
The MLA provides a collective addressing capability for DMS. The MLA receives messages addressed to a collective address called a Mail List and redistributes them to those recipients who are members of the Mail List. The Mail List in DMS is similar to the Address Indicator Groups (AIG), Collective Address Designators (CAD), and task force designators (TF) used in the DTH legacy system. The MLA accepts delivery of a message addressed to a Mail List only from the user(s) authorized to submit messages to that Mail List. The MLA adds each member of the Mail List as a recipient to the message. If it is an encrypted message, the MLA generates a token for each recipient so recipients can decrypt the message.
DIRECTORY SYSTEMS AGENT (DSA)
The DSA serves as a repository for the DMS directory information. This information, known as the Directory Information Base (DIB), contains organizational user attribute information such as the organization's directory name, digital certificates, network address information, and administrative information such as telephone numbers and mailing addresses. The DIB is distributed throughout the directory system in multiple DSA'S. Users access the DSA through the IDUA, a directory browser application.
2.2.1.8       BACKBONE MESSAGE TRANSFER AGENT (BMTA)
BMTA'S function as high-level message store-and-forward switches within the DMS MTS. BMTA'S are installed at DMS infrastructure level sites (i.e., Defense Information Systems Agency (DISA) Regional Network Operations and Security Centers (RNOSC) and Regional Nodes (RN)). BMTA'S serve as independent store-and- forward message switches between LNOSC'S, USMC LCC'S, major claimant sites, and DISA operated DMS infrastructure sites.
BMTA'S are generally downward connected to one or more LMTA'S or primary GWS'S and either laterally or upwardly connected to other BMTA'S. The BMTA receives messages from other BMTA'S located throughout the global DMS infrastructure and routes them according to specific routing algorithms.
2.2.1.9       LOCAL MESSAGE TRANSFER AGENT (LMTA)
The LMTA functions as an intermediate-level message switch that stores and forwards messages across a fully interconnected switch fabric called the MTS. LMTA's typically reside at LNOSC sites and store and forward message traffic destined to and from DMS specialty products (i.e., PUA, Mail List Agent (MLA), MultiFunction Interpreter (MFI)). LMTA'S are bound to a local DMS Directory System Agent (DSA) and make routing decisions based on specific information stored in the X.500 directory.
2.2.1.10       HIGH ASSURANCE GUARD (HAG)
The DMS HAG is a secure "gateway" component installed in the DMS secret messaging domain that selectively allows or denies message exchange between DMS NIPRNET and SIPRNET messaging domains. The HAG examines each message to ensure that:
1.  The organization has digitally signed and encrypted messages exchanged between NIPRNET and SIPRNET domains.
2.  Message originators and recipients are authorized to exchange messages between the DMS NIPRNET and SIPRNET messaging domains.
3.  All exchanged messages via the HAG are appropriately marked as unclassified.
4.  Messages exchanged between the two messaging domains may include file attachment(s) if the rules listed below are followed:
a.  Attachment types must be limited to specific file extension types authorized by the organization as being crucial to mission accomplishment.
b.  All messages must be signed and encrypted with hard- token Class IV Fortezza to provide authentication and non-repudiation.
c.  The DMS HAG must be capable of decrypting messages to ensure attachments are of the appropriate types and to perform a dirty word search.
d.  The organization must define the HAG Access Control List (ACL) to limit the users who can send attachments from low to high.
The HAG also passes directory information between specific directory servers in the two messaging domains. Unclassified directory information for message recipients in both messaging domains is accessible to users on the NIPRNET. Changes and updates to the unclassified directory information are passed through the HAG to the SIPRNET domain through a process known as directory shadowing.
2.2.1.11         SERVICE MANAGEMENT SYSTEM (SMS)
The SMS supports monitoring and control of DMS components at various management levels. The SMS is comprised of a data base system as well as specialized message trace applications, directory administration tools, and fault management applications for collecting data and reporting on the status of DMS components. The SMS message trace and fault management applications run on a DMS component called the Management Workstation (MWS). Directory administration is performed using a DMS component called the Administrative Directory User Agent (ADUA). The MWS also incorporates a trouble ticket system for tracking and managing system problems and outages. The SMS applications and its MWS and ADUA hardware component systems are typically installed at Navy LNOSC locations and USMC Control Centers.
2.2.1.12       GROUPWARE SERVER (GWS)
The GWS is a component that stores and forwards messages from the DMS client to Primary Groupware Servers (PGWS) or Local Message Transfer Agents (LMTA). The GWS, PGWS, and LMTA all serve as store-and-forward message switching devices within the DMS architecture. The GWS operates at the lowest level in the DMS Message Transfer System (MTS). The GWS provides direct message store-and-forward support to DMS clients. The PGWS and LMTA provide second echelon message store-and-forward support to local or remote GWS'S. The GWS, PGWS, and LMTA components are frequently co-located at sites with large concentrations of DMS clients. Typically, these components will be centrally located at Navy LNOSC'S. The USMC typically will deploy GWS'S down to the major command level. DmS clients must use dial-up connections whenever DISN network connectivity is not available and the GWS is remotely located.
Message Store (MS)
The MS serves as an intermediary between the DMS client and a GWS. The MS resides on the GWS and serves as an electronic mailbox for the DMS client. The MS or GWS mailbox accepts and stores messages on behalf of the organization until recipients download and delete the messages.
DMS Client or User Agent
The client, sometimes referred to as the User Agent (UA), is a software application installed on a DMS-compliant hardware platform. The DMS client enables the preparation, review, release, submission, delivery, storage, archiving, display, and printing of DMS messages. A single hardware platform and a single DMS client application may support multiple users. The DMS client also contains an Integrated Directory User Agent (IDUA). The IDUA function allows the user to search the directory for addressing information that can be added directly to drafted messages or cached in the user's Personal Address Book (PAB) for later use.
2.2.2           TROUBLE MANAGEMENT SYSTEM (TMS)
To support the goal of increased reliability, Enterprise Network Management System (ENMS) has been fielded with a Trouble Management System (TMS) as an integral part of the network management tool set. TMS is based on the commercial “Remedy” product that is used extensively in the private sector to provide relevant data on network performance. TMS will be used by the shore establishment to track, from inception to completion, all events impacting service to individual or multiple units. ENMS will build databases that identify trends and provide hard data on performance that our current infrastructure is incapable of doing. That will aid in decision making about where to expend our precious fiscal and manpower resources to improve C4 service to the warfighter.
As with any automated system, the manner in which data is entered is critical to its success. TMS has the capability to automatically extract data from COMSPOT reports and fleet service advisories when presented in specific formats. To realize the capabilities that TMA offers, message drafters must take great care to ensure that data fields relevant to the incident at hand are formatted as directed herein. Messages not properly formatted
will result in delayed action due to unnecessary human intervention.
For COMSPOT reporting format and further guidance refer to Appendix B.
2.2.3   AUTOMATED MESSAGE STORE AND FORWARD (NOVA)
NOVA is a UNIX based, base-level Mode 1 store and forward terminal (Figure 2-2) dependent on the worldwide switching functions of the DTH to relay messages to other commands outside the immediate area of responsibility, services and agencies.
NOVA is a store and forward switching system that provides automated readdressal and quote functions for authorized users. For message accountability purposes, the system assigns a unique Processing Sequence Number (PSN) to each message received. This PSN provides a means of message recall and is used as part of an automated readdressal or quote request. NOVA provides duplicate checking and First-In First-Out (FIFO) by precedence processing. Received messages are sorted by routing indicator and delivered to the DTH and backside terminals, using Mode 1 protocol. NOVA performs validation of format lines 2 through 4, 12a, 12b, 15 and 16 of ACP 128 messages. Messages found to be in error are diverted to a Service Intercept Position (SIP) for manual intervention. If the message cannot be corrected at the SIP the message will be serviced by the NOVA operator. Installation of the nOva Virtual Circuit Protocol (VCP) brings a Local/Wide Area Network interface into the NOVA application in addition to the AUTODIN Mode One interface. Use of this interface reduces the number of connections to the DTH.
 
2.2.4           PERSONAL COMPUTER MESSAGE TERMINAL (PCMT)
PCMT is a microcomputer-based message processing system designed for low-volume telecommunications facilities. This store-and- forward processing system is operated by message center or fleet center personnel. PCMT provides exchange of messages between the telecommunications facility and user organizations using diskette media, Secure Telephone Units (STU) III or dedicated connectivity.
2.2.5           GATEGUARD
GateGuard serves as the primary legacy system interface point for DoN Organizations. It provides a gateway communication link from the AUTODIN Subscriber Terminal (AST) (e.g., Nova, MDT or PCMT) to an organization's Automated Information System (AIS) or Office Automation System (OAS). GateGuard was the first DoN messaging system to fulfill the "idea" of extending messaging services to the user level. Traffic received by the Nova, MDT or PCMT can be transferred electronically to GateGuard, which will ensure only

traffic of a classification level not exceeding that of the OAS communications line is transferred. GateGuard is capable of processing Unclassified to Top Secret SPECAT A type messages.
GateGuard can function as either a dedicated delivery device (paper or diskette) or as a gateway. The GateGuard system is composed of three elements: A Guard Device (for use on dedicated links), an AUTODIN Gateway Terminal (AGT), and a Gateway Communication Link to an arbitrary AIS. The AST communication link uses Local Digital Message Exchange-Remote Information Exchange Terminal (LDMX-RIXT) communication protocol. To the AST, GateGuard appears to be an attached RIXT and is also capable of providing a Mode I interface to suitably equipped hosts. The AGT is designed for operation by an organization's administrative personnel. The AGT can provide paper or diskette media for message dissemination within the organization. GateGuard exchanges data with the supporting AST using the communications link or diskette media. Unless a DMS-approved automated message release capability is available on the AIS, messages cross the communication link from the GateGuard to the AIS in one direction. The GateGuard performs the following functions:
1.  Audit Trail.
2.  User Identification.
3.  Message Storage and Retrieval.
4.   Format Checking.
5.  Security Checking.
6.  Precedence Notification.
7.  Message Routing.
8.  AST Mode I Interface.
If the communications link between GateGuard and the AST is not contained entirely within controlled spaces, it must be covered by approved communication security (COMSEC) equipment. The circuit must be covered even if only UNCLASSIFIED messages are exchanged. A KG-84 may be used to cover a circuit that will carry messages of any classification. STU III may be used to cover circuits that pass messages classified up to and including TOP SECRET.
2.2.6   FLEET MESSAGE EXCHANGE (FMX)
Fleet Message Exchange (FMX) replaced the Naval Computer Processing and Automatic Routing System (NAVCOMPARS). Whereas NAVCOMPARS consisted of five, loosely joined sites using similar
applications, FMX implemented a tightly integrated system of two sites running identical, interacting applications and using a worldwide tactical network to share data and resources. The FMX application rides on a layer of trusted, advanced commercial off- the-shelf (COTS) software: two UNIX operating systems, a Relational Database Management System (RDBMS), TCP/IP based LAN software, and an X Windows Graphical User Interface (GUI). The application operates on a platform of advanced computers connected locally by an Ethernet LAN and worldwide by the Defense Information Systems Network (DISN). Figure 2-3 depicts the in­line system configuration.
Two operating sites have been established for FMX; one at NCTAMS PAC Honolulu, HI and NCTAMS LANT Norfolk, VA. FMX consists of three separate components. One of these is a new system that is responsible for keying the fleet broadcast (BCST) and providing the necessary functionality to support the fleet broadcast requirements. This component is the Fleet Broadcast Keying System (FBKS). To reduce development time and need for operator interaction, FBKS was developed as a simple store and forward system. It runs on the same hardware platform as DUSC. Although FBKS and DUSC are functionally separate systems, they share the same database and use the same message parsing and validation software.
FBKS is connected on the backside of the NOVA system. In addition to providing the interface to FBKS, NOVA system provides the interface to the existing Common User Digital Information Exchange System (CUDIXS) and provides routing and alternate routing between circuits for FBKS and CUDIXS.
DIRECTORY UPDATE SERVICE CENTER (DUSC)
The Directory Update and Service Center (DUSC) is a multi-purpose system that will produce directory updates for the Defense Message System (DMS) Update Authority Component (UAC) and database updates for the FMX. The updates will be automatically produced from communications guard shift messages and collective update messages. DUSC will also process communications guard list request messages and allow operators to service fleet messages with errors found by the DMS Message Conversion System (MCS). DUSC performs the following functions:
1.  Provides for operation of the service message center.
2.  Produces directory updates for the DMS UAC from Communications Guard Shift (COMMSHIFT) messages and Collective update messages.
3.  Produces database update messages for FMS and FMX systems.
4.  Processes Communications Guard List (COMMGRDLST) request messages.

5.  Provides access to the CDC for query purposes.
6.  Two operating sites have been established, one at NCTAMS PAC, Honolulu, HI, and the other at NCTAMS LANT, Norfolk,
VA. NCTAMS PAC will be designated as the Master DUSC (MDUSC) and NCTAMS LANT will be the Alternate DUSC (ADUSC). The MDUSC is the only site that will be allowed to provide update transactions for the UAC. The ADUSC will have the capability of assuming full DUSC responsibilities of the MDUSC for contingency purposes.
Commshifts are processed at the DUSC system. The DUSC system sends updates to the UAC (Update Authority Component). The UAC then updates the CDC (Central Directory Component). The CDC then updates/replicates information to all MSC's (Message Conversion System). The DUSC also sends commshift updates to the FSM and FMX sites.

NEWSDEALER Message Switching System, much like the NOVA system, acts as the AUTODIN by-pass. NEWSDEALER MSS performs message switching, message safe storage, and message origination, creating a record communications infrastructure supporting the entire Intelligence Community. Both Defense Special Security Communications System (DSSCS) and General Service (GENSER) messages are exchanged. This system provides record communications for selected United States SIGINT System (USSS) field sites. Fielded systems have the capability to communicate with each other via the National Security Agency's wide area network (NSANet). Message routed outside of the USSS community are routed over the Defense Messaging Transition Hubs (DTH) or one of the NEWSDEALER Bridge Sites connecting NSANet and the Joint Worldwide Intelligence Communications System (JWICS).
Each NEWSDEALER is capable handling the ACP-128, DOI-103, DOI-103 Special format and Abbreviated Message Format (AMF). These systems may interface with computers, Automatic Message Handling System (AMHS), Message Correction System, Mode I and II circuits, STUIII Dial-up, and Virtual Circuit Protocol (VCP).
NEWSDEALER AMHS has simplified the task of drafting ACP, DOI 103, and DOI 103 Special formatted messages where as the actual message format is transparent to the user. AMHS provides simplified message drafting, coordination, and release of outgoing messages and a message internal distribution and delivery function for incoming messages.
A Virtual Circuit Protocol (VCP) has been defined to encapsulate record messages and transmit them using TCP/IP. As an added measure of security, a short header attached to the front of each VCP message transmitted contains a transaction ID indicating that it is a record message and the message size.
2.2.10   NAVAL MODULAR AUTOMATED COMMUNICATIONS SUBSYSTEM (NAVMACS)
NAVMACS is designed to increase the speed, efficiency and capacity of naval afloat and ashore communications operations.
The NAVMACS modular concept allows the system to be configured according to the particular afloat platforms' requirements.
Current versions of NAVMACS are:
1.  NAVMACS (V)2 provides up to four channels of fleet broadcast input; subscriber satellite interface to CUDIXS; and, the capability for on-line messaging. The (V)2 installation includes: computer (AN/UYK-20), teleprinter, printers, magnetic tape unit, paper tape unit and computer/satellite interface unit.
2.  NAVMACS (V)3 offers more automated features for fleet users. The V3 program provides four channels of fleet broadcast input, four channels of Full Period Termination directly on­line with the system and a subscriber satellite interface to CUDIXS. NAVMACS V3 will support 2.4kbps NON-DAMA or DAMA operations via the CUDIXS link. The (V)3 installation includes: two computers (AN/UYK-20), video display units, printers, magnetic tape units, paper tape unit and computer/satellite interface unit.
3.  NAVMACS (V)5 enhances automated communications with the addition of remote terminals for message input. The system also provides a subscriber satellite interface to CUDIXS.
To allow drafters at remote locations as well as message center personnel the opportunity to edit and retrieve messages, storage is on disk in addition to magnetic tape. The (V)5 suite includes: three computers (AN/UYK-2 0A or AN/UYK-44), video display units, RD-433 disks, magnetic tape units, paper tape units, computer/satellite interface unit and printers.
(a) This system provides the operator with 24 flexible- purpose serial input/output (i/o) channels which can be configured as any of the following:
1.      75, 300, 600, 1200 baud circuits.
2.    "Daisy-chained" remote displays and printers.
3.      Remote systems, e.g., CVIC.
4.     High speed tape readers.
5.     High speed tape punches.
6.      Compatible remote systems, e.g., Naval Intelligence Processing System (NIPS), and Personal Computer Remote System and (PCRS).
4.    NAVMACS (V)5A like NAVMACS (V)5 also enhances automated communications with the addition of remote terminals for message input. This system was developed primarily for the AEGIS equipped ships. The system also provides a subscriber satellite interface to CUDIXS. To allow drafters at remote locations as well as message center personnel the opportunity to edit and retrieve messages, storage is on disk in addition to magnetic tape. The (V)5A installation includes two AN/UYK-2 0A or AN/UYK- 44 computers; three AN/USQ-69 video display units in the main communications space and up to eight more for remote message input/output; two RD-433 disks, for program loading and short term message storage; two AN/USH-2 6 cartridge magnetic tape units (CMTUs) for backup program loading and long term message storage; two RD-3 97/UG Paper tape units for message input/output; an ON- 143(V) interconnecting box for interface between the computer and the satellite RF equipment; and three TT-624 high-speed printers located in main communications. It provides the operator with 14 flexible-purpose serial input/output (i/o) channels which can be configured as any of the following:
a.  75 baud circuits.
b.  "Daisy-chained" remote displays and printers.
c.  External systems, e.g., CVIC.
d.  High or low speed tape readers.
e.  High or low speed tape punch
f.  Compatible remote systems, e.g., Naval Intelligence Processing System (NIPS), Personal Computer Remote System (PCRS)
5.   NAVMACS II is a communications processor that provides message services to end users as well as command, control, and communications (C3) systems and will ultimately replace older versions of NAVMACS. It can be configured as either an afloat platform or as an ashore site. NAVMACS II replaces various communications systems previously employed by the U.S. Navy and all outdated versions of NAVMACS (V1 through V5/V5A). The purpose of NAVMACS II is to receive process, store, distribute, and transmit internal and external messages automatically.
NAVMACS II provides interfaces to multiple external systems of the DMS, including land lines and radio frequency (RF) circuits. It also provides interfaces to local systems within the NAVMACS II network. NAVMACS II is supported by software that performs the communications processing required by all connected systems, including a user interface. It allows end users to perform a variety of tasks, based on their security clearance level, authorization, and need. Basic tasks include reading and sending messages to other users on site. Advanced tasks include configuring system databases and performing system administration (Figure 2-4).
NAVMACS II is configurable on a site-by-site basis for the unique requirements of its users. The system (designated AN/SYQ-7A(V))
architecture is based on the Tactical Advanced Computer-3 (TAC- 3), a Hewlett-Packard™ 700 series computer. The minimum requirement for NAVMACS II is one TAC-3 computer (with the UNIX- based HP-UX™ operating system) configured as a “main communications” processor. The NAVMACS II main communications processor handles the processing and storage of all incoming and outgoing messages at a site, and is normally located in a site's primary communications area. Another type of processor may also be required in the main communications area to provide interfaces to external communication systems. This processor is the NAVMACS II Communications Controller (NCC). At sites with multiple users requiring access to NAVMACS II, additional TAC-3 computers may be configured as severs and clients on local area networks (LANs). Personal computers (PCs) may also be configured as clients.

 
Figure 2-5 CUDIXS Capabilities
2.2.12   SUBMARINE SATELLITE INFORMATION EXCHANGE SUBSYSTEM (SSIXS)
The SSIXS provides the SSN/SSBN Commanding Officer with an optional satellite path to complement existing VLF/LF/HF broadcasts. When the position of the submarine permits visibility of a satellite, and where the tactical situation permits exposure of a submarine mast-mounted antenna, the sub­system provides rapid exchange of digital information between SSN/SSBN submarines and shore stations. It also provides access to the satellite path through a programmable mixture of query-

response and broadcast without query so as to provide maximum operational flexibility to the submarine commander. All transmissions provide automatic, reliable, long range, and cryptographically secure UHF communications between submarines and shore stations and submarines themselves.
SSIXS has the same equipment configuration as CUDIXS, except SSIXS uses magnetic tape for message storage. Additionally, the shipboard version of SSIXS has an ON-143(V)6 microprocessor for interface via satellite with the shore SSIXS.
.13 BATTLE GROUP INFORMATION EXCHANGE SUBSYSTEM (BGIXS)
Battle Group Information Exchange Subsystem (BGIXS) provides the BG Commander on a properly equipped CVN or LHA/LHD dedicated battle group additional SATCOM support.
The BGIXS provides capability for direct, two-way, tactical communication between deployed battle group units and submarines at 4800 or 9600 bps.
2.2.14 NAVY REGIONAL ENTERPRISE MESSAGE SYSTEM (NREMS)
NREMS is the initiative to reduce the number of Navy DSP sites from five to two, eliminating the need for client-server DMS architecture and eliminating need for FORTEZZA cards / readers at the command desktop. NREMS provides web-based messaging capability that allows users (with accounts) to send and receive DMS messages using a web browser or via SMTP. The benefits are that it replaces current client-server DMS architecture and FORTEZZA at the command desktop and enables customers to use a personal computer web-browser to generate/receive messages and eliminate desktop software patches required by DMS.
NREMS provides DMS message service through the use of a web browser or SMTP e-mail client. Automated Message Handling System (AMHS) implements on-site redundancy and full Continuity of Operations Planning (COOP) capability between NCTAMS LANT and NCTAMS PAC. NREMS is scheduled to be complete in 2008.
FLEET BROADCASTS
GENERAL INFORMATION
With certain exceptions all ships, either individually or through guard ship arrangements will copy the Fleet Broadcast.
2.3.2           CONTROL OF THE FLEET BROADCASTS
Control of the Fleet Broadcasts is the responsibility of the FLTCOM's and/or numbered Fleet Commanders and is accomplished by four distinctive components of the Fleet Broadcast Communications System. These four components consist of:
1.  Broadcast Control Authority (BCA). The BCA implements an approved Fleet Broadcast, e.g., MULCAST, OPINTEL, RATT, for a specific communications area and provides direction and guidance to govern its assigned broadcast employment, configuration, and content. The responsibilities of a BCA may be self-assumed or delegated to a designated alternate.
2.  Broadcast Control Station (BCS). The BCS provides all the technical aspects of affecting a Fleet Broadcast, which include assembling key streams received from the various Broadcast Keying Stations (BKS) into specific broadcast channels and delivering a composite key stream to the Broadcast Radiating Station (BRS) for transmission. BCS and BRS are normally integral parts of a NCTAMS. Stations that possess a TD-1150 and have connectivity to a particular BKS and BRS have the ability to perform BCS functions.
3.  Broadcast Keying Station (BKS). The BKS introduces message or facsimile traffic into the Fleet Broadcast Network by generating a key stream of broadcast-bound information to the BCS for specific channel allocation before being forwarded to the BRS for broadcast transmission. Because of the diversity of broadcast-bound information, various BKS'S within the NAVCOMMAREA may key individual channels of multi­channel broadcast.
4.  Broadcast Radiating Station (BRS). The BRS radiates the broadcast signal to the Fleet via Satellite, Super High Frequency (SHF), and/or Low Frequency (LF). Both area NCTAMS have the ability to rekey/radiate individual broadcast channels via 75BPS Guard Numbers on all DAMA networks upon approval from the numbered fleet commander controlling the broadcast. Additionally, those units that possess SHF terminations can receive individual broadcast channel support or receive the entire aggregate from area BCS via FCC-100 connectivity.
2.3.3           COMMUNICATIONS GUARD REQUIREMENTS
Cognizant FLTCOM's require all commissioned ships and commands afloat to guard their assigned broadcast(s). Commands can meet this requirement by actively copying the broadcast or having the assigned broadcast screen ship in company supply the type channel of required broadcast. Only the vessels listed below are exempt from the above communications guard requirement:
1.  Foreign manned MSC Ships (USNS).
2.  Contract operated/tankers manned by civilians (USNS).
3.  Time chartered ships under the operational control of MSC (SS).
4.  Voyage chartered ships not under the operational control of the MSC, and cargo carrying ships at Berth (traffic rates).
With the advent of Automated Systems such as Fleet SIPRNET Messaging (FSM), SHF Gateguard units do not routinely submit COMSHIFTs when entering port. Units that do not resubmit COMMSHIFTs and lose primary delivery paths are cautioned that if primary path and secondary (ZOV path) are lost, Category I and II messages can and will be sent to tertiary paths listed in the latest COMMSHIFT on file at the Master Update Authority. For those units listing Fleet Broadcast channel (usually common channel) as an authorized ZOV route will have message traffic transmitted to it. Subsequently for those units not guarding the Fleet Broadcast while in port could possibly encounter numerous non-deliveries since the Fleet Broadcast does not require operator acknowledgement after the message is generated from the Fleet Message Exchange System (FMX). It is highly recommended that units that do not intend to monitor the Fleet Broadcast or CUDIXS termination while inport, have those ZOV routes removed from their COMSHIFT and replaced by a shore messaging system such as dial-in Gateguard or over the counter service to area NCTAMS.
2.3.4           BROADCAST IDENTIFICATION
Unique four-letter designators identify broadcasts. The first letter indicates the naval communication area (L-Atlantic and Mediterranean, P-Pacific). The second and subsequent letters identify whether it is a single or multiple channel broadcast and the broadcast type. NCTAMS LANT has assumed broadcast functions for the Atlantic and Mediterranean regions thusly removing the “M” designator that most communicators became familiar with. Additionally, NCTAMS PAC has conducted the same type merger for IMUL (Indian Ocean) Broadcast.
2.3.5     FREQUENCIES
Each NCTAMS generates Daily Communications Status Report Messages (often referred to as the 2301Z) that provide current down-link frequencies for UHF broadcast along with individual guard numbers for single channel DAMA support. In the rare event High Frequency (HF) support is required, submit Immediate precedence COMSPOT to the area NCTAMS to determine if single channel support is available in that area. HF, Multi-channel support is no longer offered to fleet units.
CIRCUIT CONFIGURATION
The source documents for block diagrams, equipment descriptions and quality control monitoring procedures for circuits are the Communications Quality Monitoring System documents (SPAWARSYSCOMINST 2 700.1 and SPAWARSYSCOMINST C2700.2) dated 27 January 1989. Commands may order these documents from the ASO Naval Publications and Forms Center, 5801 Tabor Ave., Philadelphia, PA 19120-5099 using NSN 0913-LD-054-7770 and NSN 0691-LD-319-9600 respectively.
2.3.7           CRYPTOGRAPHIC COVERAGE
Key list requirements and restart times for covered broadcast circuits are located in the appropriate CIBs; The EKMS Manager can provide the effective edition of the keying material.
Restart procedures are per applicable CIBs and KAO'S. EKMS 1 (SERIES) contains information on cryptographic systems.
2.3.8           BROADCAST MESSAGE NUMBERING
Each broadcast message is assigned a nine (9) position alphanumeric Broadcast Channel Sequence Number (BCSN) to ensure traffic continuity. The BCSN consists of a four-letter broadcast channel designator and a five digit sequence number, which indicates the number of cumulative transmissions that occurred for the particular channel. This number runs from 00001-99999 and is reset monthly at 010001Z. Should the sequence number exceed 99999 within a given month, the counter will reset to 00001 until the end of the month, and then reset again to 00001 to begin a new month. The BCSN is preceded by the message transmission identification (TI) indicator VZCZC (see paragraph below).
BCSN numbering continuity for overload channels is maintained the same way as above. In a situation where an overload channel is deactivated and then reactivated in the same month, the BCSN will run consecutively from the last number used. The overload channel activation message will indicate the first overload BCSN to be transmitted.
2.3.9           BROADCAST MESSAGE FORMAT
Each message originally transmitted over a broadcast channel that is keyed by FBKS will be formatted as follows.
EXAMPLE
VZCZCPMAA01013
R 220933Z FEB 00 PSN 000207H09
FM JCS WASHINGTON DC
TO USS CHOSIN
INFO USS HUE CITY
USS GETTYSBURG
BT
UNCLAS //N02300//
MSGID/GENADMIN/JCS//
SUBJ/EXAMPLE OF A BROADCAST MESSAGE// REF/A/GENADMIN/CHOSIN/101213ZFEB00//
RMKS/(40 MORE LINES OF TEXT)
PAGE 02 PMAA01013 UNCLAS (REMAINING TEXT) //
BT

#01013
NNNN
Each original broadcast transmission of a message, over either the single or multi-channel broadcast will begin with the Transmission Identification (TI) indicator and BCSN. The TI indicator consists of the characters "VZCZC". The V's purpose is to clear the circuit path of any extraneous characters and the ZCZC is to signal the start of a message indicated by the beginning of format line 2 of the message. Retransmissions will commence with the operating signal ZFG repeated three times.
EXAMPLE
ZFG ZFG ZFG VZCZCPMAA01014
O 220514Z FEB 00 PSN 000472H13 ZNZ1 FM USS SAN JOSE TO USS CALIFORNIA BT
TEXT
BT
#01014
NNNN
Before a message queues to a broadcast channel, FBKS validates delivery requirements specified in format lines 2, 4, 7 and 8.
The system rejects misrouted messages to the DUSC for service action.
To save transmission time FBKS edits each message. Because format lines 2 and 4 are validated by Nova they are not transmitted.
Side routes on format lines 7 and 8 are also validated and removed. Original page lines are removed and F/L 15 is replaced with the BCSN.
Lengthy messages are paged into blocks of 50 lines. Each page block will begin with a page number, BCSN, and the message classification. This is done to enhance a message's readability and ease of reproduction.
Nova assigns every message received an accountability number, called a Processing Sequence Number (PSN). This 6-digit number is included on F/L 5. It is followed by the site's letter identifier and a checksum of the PSN. The first letter of the BCSN and the F/L 5 site identifier will normally be the same. A difference between the two indicates that the screen action should be to the site identified on F/L 5.
Messages retransmitted over a single or multi-channel broadcast in reply to a Broadcast Screen Request (BSR) will begin with the operating signal ZDK repeated three times, followed by the TI indicator and the BCSN. The remainder of the transmission is the actual message beginning with F/L 5.

EXAMPLE
ZDK ZDK ZDK VZCZC PMAA00036
R 162038Z FEB 00 PSN 017677H28 FM COMSPAWARSYSCOM WASHINGTON DC//PMW151//
TO USS ENTERPRISE BT
UNCLAS //N02300//
MSGID/GENADMIN/CSWSC//
SUBJ/BROADCAST MESSAGE FORMAT//
RMKS/THIS IS AN EXAMPLE OF BROADCAST MESSAGE FORMAT//
BT
#00036
NNNN
2.3.10         BROADCAST RECAPS
Every 30 minutes a message summary (RECAP) is transmitted for each active first-run and overload broadcast channel. The RECAP provides a summary of the traffic that was transmitted the previous half hour. RECAP'S are assigned immediate precedence and are queued at the top of the immediate message queue.
A RECAP message for a first-run channel will show the associated overload or rerun channel. Likewise, a RECAP for an overload channel will show the associated first-run channel. Shipboard personnel should note this information each time a RECAP is received. This will help insure all appropriate broadcast channels are being copied.
The text of the RECAP reflects the BCSN, precedence, date—time- group, originator and broadcast addressees for each message transmitted on that broadcast channel. RECAP DTGs are always assigned on the half hour. Part one identifies the message transmitted including precedence, DTG, Originator, and any pertinent Q and Z signals. Part two identifies the specific CSNS that were sent to specific commands. The following depicts the format of a RECAP for the Pacific Overload Broadcast.
EXAMPLE
VZCZCIOCC01019 O 230200Z FEB 00 ZNZ FM FMX PAC HONOLULU HI TO POCC BCST BT
UNCLAS SVC //N00000//

SUBJ: BROADCAST RECAO 230130 FEB 07 — POCC OVERLOAD 一 PMCC FIRST RUN PART ONE
1013      R 220933Z JCS WASHINGTON DC/USS

1014      0 220514Z USS SAN JOSE/USS CALIFORNIA/ZNZ
1015      P 201514Z COMNAVNETOPSCOM WASHINGTON DC/CTF
1016      P 230005Z FLEWEACEN GUAM/ZPW 240001Z FEB00
1017      R 230105Z USS SAN FRANCISCO/COMTHIRDFLT/
1018      CANTRAN PART 2
PMCC BCST
1013       01015 01016 USS CHOSIN
01014
CTF FOUR TWO
01017
BT
#01019
NNNN
BROADCAST SERVICE MESSAGES

 

Broadcast Screen Request (BSR)
BSR is a PROFORMA message designed for fleet broadcast subscribers to request the transmission (ZDK) of messages missed or received garbled on any fleet broadcast. PROFORMA messages should be prepared using the approved message preparation software program. Every message sent over a broadcast channel is retransmitted over the associated rerun channel after a two-hour delay, if the rerun channel is not being used for some other purpose. Broadcast Keying Stations (BKS) generate summary messages every half-hour identifying intended recipients of a particular broadcast number. This helps recipients identify missing broadcast numbers/messages. Prior to sending a BSR to the broadcast station, every attempt must be made to obtain the missed messages from rerun channels, ships in company while underway, or shore communications facilities when in port. Subscribers will ensure each BSR cancels previous outstanding requests and lists all outstanding numbers on the broadcast channel concerned. Ships will send BSR's to the BKS unless otherwise directed.
If a recipient misses 50 or more broadcast numbers, the numbered fleet commander shall be included as an information addressee and a reason for outage should be identified by adding a remarks set to the BSR PROFORMA message. If the request is in excess of 100 total broadcast numbers, separate BSR'S in increments of 50 numbers must be generated. BSR's received with more than 100 Broadcast Screen Numbers (BCSN) will be rejected.
Each BSR will be complete in itself and will include all numbers missing at the time of submission, less missed numbers known not to be addressed to ship's or embarked commander's guard list.
This information is available on hourly FMX generated RECAP summary messages.
Embarked commanders who are assigned a routing indicator (RI) different from the RI assigned to the host ship must be included

when submitting a BSR. Embarked commanders, squadrons, detachments, etc., which share the host ship's or embarked commander's RI will not be included.
If a Broadcast Screen Ship (BSS) is designated prior to an exercise or operation, the BSS is responsible for gathering missed message input for ships in company and submitting a consolidated BSR.
The following format is currently used for submission of BSR'S. Detailed information for drafting BSR'S is available in NTP 4 Supp-2.
Retransmissions in response to BSR'S are only provided to those ships which are addressees (or have embarked commands) addressed in the missing numbers (messages) requested. Retransmissions are transmitted under the original broadcast numbers prefixed with a ZDK pilot.
In the event of an FMX failure which causes the BKS functions to be shifted, instructions will be provided to fleet units concerning BSR submission procedures.
EXAMPLE
RTTUNJSR RUEOMID3463 1191000-UUUU--RHMCSUU.
ZNR UUUUU
R 281000Z APR 00 ZYB FM USS JOHN C STENNIS TO FMX PAC HONOLULU HI BT
UNCLAS //N02790//
MSGID/BSR/STENNIS//
SCRN/USS JOHN C STENNIS /COMCARGRU THREE//
CHAN/PMAA/BSN:00012/BSN:00023/BSN:00050/BSN:00053//
CHAN/PMCC/BSN:00056/BSN:00087//
SCRN/ATKRON FIVE FOUR TWO//
CHAN/PMDD/BSN:000 90/BSN:000 92/BAND:00100-00103/BSN:00113// SCRN/USS JOHN C STENNIS //
CHAN/PMCC/BSN:00075//
PERIOD/2 00001ZJAN2 001/24235 9ZJAN2 001//
BT
#3463
NNNN
Broadcast Screen Summary (BSS)
The FBKS in response to a BSR generates the Broadcast Screen Summary (BSS). The BSR response will originate from the servicing FMX site and will bear the appropriate PLA for the site, i.e. FMX PAC HONOLULU HI. Examples of BSS responses are listed below:
1.  NO MESSAGES FOUND. (MASTER UPDATE AUTHORITY has screened originator BSR and missing messages are of no concern to

  originator.)  
2. FOL NRS CANTRAN.
3. FOL NRS ZFK 1/2.
4. FOL NRS ZDK AT TIMES INDICATED.
5. FOL NRS ZDK ASAP.
6. FOL NRS ZOV ASAP.
7. FOL NRS TO BE TRANS WITH NEW NRS.
8. FOL NRS TRANS AT TIMES INDICATED.
9. ERROR. (BSR contains error(s), Unable
  and resubmit.)
Broadcast Screen Summary Reply Example
 
 
OTTUZYUW RHOENPM00 9 9 0311030-UUUU--RHMCSUU.
ZNR UUUUU
O 311030Z JAN 00 ZYB FM FMX PAC HONOLULU HI TO USS NIMITZ BT
UNCLAS
MSGID/GENADMIN/FMX PAC//
SUBJ/BROADCAST SCREEN SUMMARY// REF/A/BSR/NIMITZ/311000ZJAN2 001/-/N〇TAL//
RMKS/
1.   ATKRON FOUR TWO
A. NO MESSAGES FOUND.
2.   USS NIMITZ
A.    FOL NRS CANTRAN: PMAA00023.
B.    FOL NRS ZFK 1/2 : NONE.
C.   FOL NRS ZDK AT TIMES INDICATED: PMAA00012/0310930
D.    FOL NRS ZDK ASAP: PMAA00050, PMAA00053, PMCC00053,
3.         USS JOHN C STENNIS
A. FOL NRS ZOV/ASAP:PMCC00075
4.   ERROR/USS NIMITZ/CHAN/PMDD/FIELD 5 INVALID, 99003 PROCESS/CORRECT AND RESUBMIT//
 
Figure 3-3 is the check-off sheet used for keeping a record of broadcast numbers received or transmitted. This form provides for the number received, the classification of the message, and also provides a record of destruction for classified traffic. These forms may be reproduced locally. A similar form is available through supply channels (Stock number 0196-LF-301- 8350).

2.3.12         BROADCAST OFF THE AIR MONITORING (OTAM)
OTAM is a computer-based monitoring system for up to 16 circuits. The fleet centers located at the NCTAMS and selected NAVCOMTELSTA'S monitor the fleet broadcast by receiving the same broadcast copied by fleet units. The monitor copy ensures channel continuity, crypto synchronization, and provides an analytical source for identifying and solving problems.
All broadcast channels transmitting live traffic (including those uncovered) will be monitored off the air to ensure proper operation. Area NCTAMS may assign OTAM responsibilities for individual broadcast channels to stations other than the originating station provided the designated stations can meet the tasking within existing manpower and equipment resources. No more than one station is required to monitor the same broadcast channel except when unusual conditions dictate. Keep NETWARCOM advised of situations involving unusual conditions. Support and residual stations which rekey broadcasts are required to conduct normal quality control of broadcast circuits and where equipment allows, should spot check with OTAM as part of the quality control effort.
Include the term OTAM in the remarks column of the broadcast line item in the station TELCOR Section I summary. Broadcast originating stations and those commands assigned OTAM functions are to include the broadcast monitoring and broadcast transmit equipment in the appropriate sections of the communications operating facility report.
2.4     TYPES OF BROADCASTS
2.4.1           FLEET MULTICHANNEL BROADCAST SYSTEM
The Fleet Multi-channel Broadcast System (MULCAST), provides the means of delivering message traffic to the Fleet. The MULCAST System is a highly flexible system providing global broadcast service to the Fleet via four major communications areas. FBKS keys the MULCAST. The paragraphs below describe the characteristics of MULCAST in terms of its broadcast area, FLTCOMS, operating frequencies, channelization and general operating procedures.
BROADCAST AREA FLTCOM
 
Operating frequencies: MULCAST may be operated on Satellite, Low Frequency (LF), Medium Frequency (MF), High Frequency (HF) and

Ultra High Frequency (UHF) ranges. Consult current CIB'S for operating frequencies.
Due to inherent limitations of HF propagation, the HF component of the MULCAST (when activated) is transmitted simultaneously on several frequencies to permit diversity reception. In some cases, diversity reception overcomes the anomalies of HF propagation and reduces the probability of broadcast interruption. Recipients of the MULCAST can use one of two methods for diversity reception which are:
Frequency of RF diversity in which the information signal is transmitted/received on two separate frequencies simultaneously. Shipboard use of frequency diversity permits uninterrupted circuit operation since fading over two different frequencies will seldom occur at the same time. Polarity diversity uses a vertically and horizontally polarized antenna to copy a single frequency.
A maximum of sixteen channels of information are combined to form the multi-channel broadcast. The multi-channel broadcast transmitted via satellite carries 15 channels of information (channel 16 contains system frame/sync data). Most ships maintaining their own guard are required to copy at least the common channel. If traffic tempo dictates, overload channels are activated to clear first run traffic. When required, overload channels are also used to rekey allied broadcasts in support of U.S. units participating in combined operations. Area CIB's reflect the current assignment of broadcast channels. These broadcasts are normally keyed continuously but require restarts at the beginning of each new CRYPTO day.
Normally all first-run traffic is retransmitted two hours later over the associated rerun channel, i.e., PMAA first-run traffic sent between 1400Z-1500Z will be transmitted over the rerun channel PRAA at 1600-1700Z. Because this procedure allows communications personnel the opportunity to copy broadcast numbers missed during the first transmission, submitting Broadcast Screen Requests (BSR) to obtain lower precedence missed numbers should be delayed until after the rerun transmission (see paragraph 419). If a RECAP message indicates that the missed number (message) is addressed to your ship/unit and the precedence is immediate or higher, BSR action may be necessary sooner.
Once a queue has been depleted on a first-run channel, it and its associated overload channel (if assigned) will commence rerunning messages. The last message transmitted will be the first message rerun. For example, if LMAA01016 was the last message transmitted it would be the first message rerun, followed by LMAA01015, LMAA01014, etc. A channel will revert to a first-run status whenever a new message is received.
2.4.2          WORLD-WIDE TACAMO (WTAC)
TACAMO (Take Charge And Move Out) is a survivable communications link during trans-attack and post-attack phases of conflict. It enables the President and the Secretary of Defense to directly contact submarines, bombers and missile platforms protecting our national security through strategic nuclear deterrence.
2.4.3           USW PATROL (VP) BROADCAST
The nature of USW patrol (VP) aircraft operations requires dedicated transmission of all ground-to-air traffic using the broadcast method. The VP broadcast operating in the HF mode serves as the primary vehicle for delivery of operational messages to aircraft regardless of the aircraft's mission, emission mode or supplemental means for delivery. COMPATWINGSPACINST C2330.1 and the Consolidated Maritime Brief Book provide broadcast operating instructions for the Pacific and Atlantic Ocean areas respectively.
2.4.4           SCI FLEET BROADCASTS
SCI communications utilizes three broadcasts, LMFF, IMNN and PMFF for the sole purpose of providing Over the Air Transfers (OTATs) of COMSEC keying material. These broadcasts are included in each particular fleet area, SSR-1 provided broadcast. Weekly OTATs are issued by UARNOC on the 7th, 14th, 21st, 2 8th and last day of the month. OTAT messages are sent the day prior to transmission of the OTAT. The OTAT message will contain the listing of the keying material that will be transmitted and the time of transmission.
2.5              MANAGEMENT AND CONTROL SYSTEMS
2.5.1          AUTOMATED DIGITAL NETWORKING SYSTEM (ADNS)
The primary function of the ADNS is to connect Navy shipboard networks to other ship and shore networks for transferring Internet Protocol (IP) data of various classification levels. The shipboard user can connect to the external networks of other Navy platforms and facilities and the Wide Area Networks (WANs) provided by the Defense Information Systems Agency (DISA).
The ADNS system is designed to allow network enclaves to route (IP) data over multiple RF mediums. The RF services include, but are not limited to, Super High Frequency Defense Satellite Communications System (SHF DSCS), Extremely High Frequency/Medium Data Rate (EHF/MDR), Extremely High Frequency/Time Division Multiple Access (EHF/TDMA) Interface Processor (EHF/TIP), International Marine/Maritime Satellite (INMARSAT B), SHF Commercial Wideband SATCOM program (CWSP) (which will be replaced by the Commercial Broadband Satellite Program (CBSP) beginning in 2008) and pier connections. The ADNS system provides Wide Area Network (WAN) connectivity to the shore by passing IP data over available RF mediums using Point-to-Point Protocol (PPP) for link establishment and maintenance. By dynamically routing IP data using Open Shortest Path First (OSPF), the ADNS system can choose which RF link to use to reach the shore.
RADIO COMMUNICATIONS SYSTEM (RCS)
The Radio Communications System (RCS) consists of several exterior communications subsystems which, in combination, provide all exterior communications requirements for the ship with the exception of the Special Intelligence Communications requirements. The RCS subsystems are turnkey installations and consist of the following subsystems: High Frequency Communications System, Very High Frequency Communications System, Ultra High Frequency Line-of-Sight Communications System, Ultra High Frequency Satellite Communications System, Extremely High Frequency Satellite Communications System, Super High Frequency Satellite Communications System, Communications Support Segment, Naval Modular Automate Communications System II, and the Bridge to Bridge Communications System.
NAVY ORDERWIRE TERMINAL (NOW)
NOW is A PC-based system that supports up to four full duplex circuits using Navy Orderwire software in conjunction with two Frontier Communications boards. The system replaces Teletype equipment formerly used on four orderwires and has message storage and retrieval capabilities as well as an editor for message preparation. Circuit logs may also be stored and retrieved. An optional printer may be attached for message copies and logs. This circuit is not certified and will not be used to pass traffic except as a last resort.
2.5.4          AUTOMATED NETWORK CONTROL CENTER / AUTOMATED TECHNICAL CONTROL (ANCC/ATC)
The ANCC and ATC are functionally identical except for size. ANCC/ATC replaces manual patch and test facilities ashore with a fully redundant computer-controlled switching and circuit monitoring system. This system provides the ability to reconfigure equipment interconnectivity and perform circuit monitoring for out-of-tolerance conditions in advance of circuit outages. At deployed locations, this system supplies 98 percent of voice, video, and data connectivity. Failures result in major C4I disruption of services to and from the operating forces in an entire communications area.
2.5.5           MULTI-CIRCUIT PATCH PANEL (MCPP)
The multi-circuit patch module provides for equipment interfaces requiring a database (DB)-type interface. It contains two non­powered (without LEDs) multi-circuit patch panels and a quick connect panel QCP. Two of the patch panels contain 17 patch modules while the others contain 16 patch modules. The two containing 17 patch modules have a test module with a DB 25-pin connector and standard modular patch jack. The two containing 16 patch modules have a test breakout module for connecting individual signals. Each patch module has line, equipment, and monitor appearances. The common signal interface to a patch module will be electronic industry association (EIA) standard RS- 232 for unbalanced and RS-53 0 for balanced. However, the following common interfaces RS-232/-423/-422/-530 or MIL-STD-188- 114 can be accommodated. Up to eight RS-423/-422 37-pin interfaces and twelve RS-232/-530 25-pin interfaces can be selectively pinned out using the QCP, thus eliminating a need to fabricate special cables when deployed. Interfaces from the multi-circuit module may also be routed through the high-speed COMSEC case for encryption/decryption. Two multi-circuit modules are provided with each TCTC package.
All Transit Case Technical Control (TCTC) modules may be interconnected using one-for-one standard DB 25- or 37-pin connector cables available from most telecommunications companies. Depending on the TCTC module, a number of female connectors on a rear signal entrance panel (SEP) are available for interfacing between modules. This allows interfacing with equipment using one-for-one cables to facilitate rapid set-up and interface. Connectors on the module SEPs are identified by the signal interface convention to which they conform; i.e., rS- 232/423/422/530 and MIL-STD-188-114. To accommodate equipment- specific pin-outs, signal conversions are accomplished in the TCTC module using quick connect/disconnect panels, thus eliminating the need to fabricate special cables when deployed. CJCSM 6231.01B defines the joint communications network model that the TCTC supports. A deployed JTF in a bare-base environment provides the basis for this model. The model can be changed to meet specific operational requirements. Internodal communications provides connectivity among DISN, JTF headquarters, and service component headquarters and their forces, along with supporting elements such as the JSOTF and its subordinate forces. The Air Force, Army, Navy, and Marines have component headquarters and forces. This network links the deployed locations by satellite and microwave troposcatter/line of sight. This transmission media supports the extension of common-user transports consisting of JWICS, NIPRNET, SIPRNET, record communications (AUTODIN and DMS), VTC, and other special- purpose circuits. The TCTC is capable of extending all of these transports or communication services.
SA2112(V) (SAS)
The heart of the radio transmitter and receiver distribution system is the SA-2112 single audio system (SAS). The SA-2112 secure switching unit, commonly referred to as the SVS or "coke machine", is the key element in the SAS. The SAS provides the ship with an integrated secure (cipher)/nonsecure (plain) R/T voice system. SAS features allow remote operating positions to select either cipher or plain voice operations without reconfiguring the existing system. It also provides automatic switching between remote operating positions and radio sets or
crypto equipment, centralized control and monitoring of the system, and a built-in-test (BIT) capability.
2.5.7           TIMEPLEX LINK 2+
The LINK/2+ has become the primary full or half-duplex, first level multiplexer for Navy tactical SHF communications. LINK/2+ is an intelligent transmission resource manager (TRM) currently supporting Navy SHF and commercial operations, providing high- performance networking capabilities for facilities with large I/O requirements. It is a multi-system high-capacity networking device for voice, data, and imagery communications transmissions over T-1/2.048 Mbps data rate (European)(E1) or lower speed facilities. It provides smart multiplexing, bandwidth efficient management and full network management capabilities.
The LINK/2+ incorporates a modular design for enhanced flexibility, reliability, and improved network performance. Navy SHF uses a basic 18-slot chassis, with the capability of an 18- slot-expansion chassis (two-nested) system. It is capable of processing digital data, voice (voice compression), and video synchronous, asynchronous, isochronous, asymmetrical (different transmit and receive speeds on the same channel), and simplex signal processing.
The LINK/2+ is capable of operating 12 trunks at aggregate data rates of 4.8 Kbps to 2.048 Mbps each (not to exceed 7 T-1's, each at 1.544 Mbps).
NETWORK SERVICES AND ARCHITECTURE
ROUTING ARCHITECTURE
Routing involves the forwarding of IP packets across a network to the intended destination IP address. Routing occurs at Layer 3 (the network layer) of the OSI reference model. To determine the optimal path for a packet to travel, routing protocols use metrics. To assist the process of determining the path a packet will travel, routing algorithms create and maintain routing tables (list of associations used to decide the next router a packet should be sent to reach ultimate its destination).
2.6.2       DISN TRANSPORT SERVICES
The Defense Information System Network (DISN) provides a variety of voice, video and data transport services for classified and unclassified users in the continental United States (CONUS) and overseas (OCONUS). DISN supports customer requirements from 2.4 Kbps to 155 Mbps (OCONUS) and 2.5 Gbps (CONUS). Its best-value network solutions include inherent joint interoperability, assured security, redundancy, high reliability/availability, 24/7 in-band and out-of-band network management, engineering support and customer service.
DISN transport services are available to all Department of Defense (DoD) agencies and military services, as well as other federal government agencies. Services can be ordered through the telecommunications control officer (TCO), who will validate requirements and verify funding authorization.
DoD Teleport System
The Defense Information Systems Agency (DISA) is implementing the Department of Defense (DoD) Teleport System. The system will integrate, manage, and control a variety of communications interfaces between the Defense Information System Network (DISN) terrestrial and tactical satellite communications (SATCOM) assets at a single point of presence.
The system is a telecommunications collection and distribution point, providing deployed warfighters with multiband, multimedia, and worldwide reach-back capabilities to DISN that far exceed current capabilities. Teleport is an extension of the Standardized Tactical Entry Point (STEP) program, which currently provides reach-back for deployed warfighters via the Defense Satellite Communications System (DSCS) X-band satellites.
This new system provides additional connectivity via multiple military and commercial SATCOM systems, and it provides a seamless interface into the DISN. The system provides inter- and intra-theater communications through a variety of SATCOM choices and increased DISN access capabilities.
The system will be implemented in three phases:
1.   Generation One - Currently being implemented. Generation One (FY02-08) architecture adds capabilities to a subset of existing STEP sites. It will provide satellite connectivity for deployed tactical communications systems operating in X-band (DSCS and follow-on X-band satellites), commercial C- and Ku- bands, Ultra High Frequency (UHF), Extremely High Frequency (EHF) SATCOM and initial Ka-band capabilities.
2.   Generation Two - This generation (FY 06-08) consists of implementing additional Ka-band terminals and a NETCENTRIC capability. The Ka-band terminals will provide interfaces to the Wideband Global System (WGS) program, which will provide Ka-band and X-band coverage with throughput far exceeding the current DSCS satellite constellation.
3.   Generation Three - This Generation is currently undefined and funding has not been identified. A capabilities development document is in development and a funding approach will be sought by the Joint Capabilities Board. For more information Email: 
GIG Enterprise Services
The Defense Information Systems Agency's (DISA) Global Information Grid Enterprise Services Engineering (GE) directorate plans, engineers, acquires and integrates joint, interoperable, secure global net-centric solutions satisfying the needs of the warfighter and develops and maintains a first-class engineering workforce to support the needs of DISA's programs. GE's core competencies include disciplined IT end-to-end systems engineering, security expertise for the Global Information Grid, leveraging commercial-off-the shelf products and services to solve joint and coalition needs and provide value added, trustworthy global net-centric solutions. Contact: GES Project Office at
Global Combat Support System (GCSS) Combatant Commanders/ Joint Task Force (CC/JTF)
GCSS (CC/JTF) is an initiative that provides end-to-end visibility of retail and unit level Combat Support (CS) capability up through National Strategic Level, facilitating information interoperability across and between CS and Command and Control functions. In conjunction with other Global Information Grid elements including Global Command and Control System-Joint, Defense Information Systems Network, Defense Message System, Computing Services, and Combatant Commands/Services/Agencies information architectures, GCSS (CC/JTF) will provide the information technology capabilities required to move and sustain joint forces throughout the spectrum of military operations.
GCSS (CC/JTF) supports the Combatant Commanders and their assigned Joint Task Forces by providing access to comprehensive logistics information from authoritative data sources. This access provides the warfighter with a single, end-to-end capability to manage and monitor units, personnel and equipment through all stages of the mobilization process. By providing access to high-level integrated information, GCSS (CC/JTF) enhances the ability of Combatant Command and JTF Commanders to make timely, informed decisions based on the near real-time or predicted status of his resources.
Mission
Provide end-to-end information interoperability across combat support and command and control functions to support the Combatant Command & Joint Task Force Commanders.
GCSS (CC/JTF) Warfighting Capabilities
1.  Provides dynamic access to command & control, intelligence, and logistics data via a single gateway.
2.  Provides browser-based, PKI-enabled capabilities on the SIPRNet and CAC-enabled capabilities on the NIPRNet.
3.  Provides joint logistics applications via a single sign on.
4.  Single, Mobility System, Global Transportation, Network, Intelligent Rail/Road Information Server, Asset Visibility, In-transit Visibility, Integrated Data Environment.
5.  Consuming web services from NGA's mapping capability (Adopt before you buy, Buy before you Create).
6.  Provides access to NCES' E-Collab from GCSS (CC/JTF).
7.  Provides permission-based, knowledge management system (KMS) for file-sharing within and across combatant commands.
8.  Provides ability for end-users to run reports and export to other formats, e.g., briefing, spreadsheet, .pdf.
9.  Provides a Watch Board to monitor critical items.
10. Provides a modular, net-centric, service oriented
environment for agile, flexible, rapid development and
delivery of critical capability.
11. Provides a Civil Engineers Modeling tool: Joint
Engineering Planning and Execution System (JEPES).
2.6.3         COMMUNICATIONS WITHIN DISN DATA SERVICES NETWORKS
CONNECTIONS TO THE INTERNET
1.  All bureaus and posts having access to OpenNet are required to establish Internet connectivity through OpenNet Plus. If OpenNet service is available to the bureau/post, the Department will no longer fund or approve Dedicated Internet Network (DIN) service unless the bureau or post has a valid waiver to implement a DIN.
2.  A post may have a contract with an Internet Service Provider (ISP) to provide bandwidth for contingency and VNet (also know as Virtual Private Network (VPN)) provided and managed by IRM/OPS/ENM/ND. This is to provide the post with an alternate route for connectivity back to the Open Net infrastructure and does not require a waiver.
3.  Information Resource Center (IRC) public access terminals have been granted a waiver from this policy; i.e., ODI (Overseas Dedicated Internet) LANs may continue to provide Internet access and other Public Diplomacy services to the public. Local networks used as test, development, web hosting, and research environments may also connect locally to the Internet, but can only do so after receiving a waiver. These Local Area Networks (LANs) are not to be linked to
OpenNet Plus or used by employees to carry out Department business transactions. Bureau/post must terminate all unauthorized use of ODI LANs no later than 90 days after OpenNet Plus is implemented at the bureau/post.
4.  The Department realizes that there may be exceptions to the requirement for accessing the Internet via the OpenNet.
Posts and bureaus may request a waiver to this policy. The IT Change Control Board (CCB) will review such requests on a case-by-case basis.
REQUESTING A WAIVER TO THE INTERNET CONNECTION POLICY
A Bureau/post requesting authorized continued use of a Dedicated Internet Network (DIN) connection must submit the DIN access waiver request. All DIN solutions must comply with the Department's standards and FAM guidance. Provide the following information when submitting the waiver request:
1.  Post or bureau name.
2.  Post or bureau point of contact, e-mail address, and telephone number.
3.  Location serviced by DIN.
4.  Type of Internet access service (DSL, dial-up, other).
5.  Configuration details (number of connections, users, rooms to be served).
6.  Purpose of the service.
7.  Reason requirement cannot be satisfied through OpenNet Plus (for example: Protocol is not available through OpenNet Plus—website not accessible).
8.  What post/bureau is doing to reduce risks (i.e. firewalls, virus protection).
9.  Projected costs.
10.    Timeframe of exception.
Submit DIN Access Waiver Requests by e-mail to “IT CCB Management” or by telegram or memorandum to the IT CCB Change Manager, IRM/OPS/ENM/NLM/ECM. The IT CCB Change Manager will conduct an abbreviated review with relevant IT CCB primary review authorities and will ensure the request appears on the next IT CCB meeting agenda for consideration and decision.
If a request for a waiver is denied, the bureau/post may send an appeal to the Chief Information Officer for final decision. If a bureau/post's network is connected to the Internet outside of OpenNet Plus and without the signed DIN waiver, the bureau/post is in conflict with security guidelines. If unauthorized Internet connections are detected, the responsible office will be instructed to disconnect them.
SWITCHES AND ROUTERS
A network switch is a computer networking device that connects network segments. Low-end network switches appear nearly identical to network hubs, but a switch contains more “intelligence” (and a slightly higher price tag) than a network hub. Network switches are capable of inspecting data packets as they are received, determining the source and destination device of that packer, and forwarding it appropriately by delivering each message only to the connected device it was intended for, a network switch conserves network bandwidth and offers generally better performance than a hub.
A router is a device that extracts the destination of a packet it receives, selects the best path to that destination, and forwards data packets to the next device along this path. They connect networks together; a LAN or WAN for example, to access the Internet. Some routers are available in both wired and wireless models.
2.6.5          UNCLASSIFIED BUT SENSITIVE INTERNET PROTOCOL NETWORK
(NIPRNET)
NIPRNET is a global long-haul IP based network to support unclassified IP data communications services for combat support applications to the Department of Defense (DoD), Joint Chiefs of Staff (JS), Military Departments (MILDEPS), and Combatant Commands (COCOM). Provide seamless interoperability IP services to customers with access data rates ranging from 56Kbps to 1.0Gbps via direct connections to a NIPRNET router, remote dial­up services (56Kbps), services to the Tactical community via ITSDN/STEP sites, and access to the Internet.
2.6.6         SECRET INTERNET PROTOCOL NETWORK (SIPRNET)
SIPRNET is the DoD's largest interoperable command and control data network, supporting the Global Command and Control System (GCCS), the Defense Message System (DMS), collaborative planning and numerous other classified warfighter applications. Direct connection data rates range from 56Kbps to 155Mbps. Remote dial­up services are available to 19.2Kbps.
AUTHORIZED SERVICE INTERRUPTION (ASI)
DISA policy requires that the best possible communications service be provided to warfighters and users of the Global Information Grid (GIG). This correlates to the availability of communications equipment and facilities. Periodic maintenance varies from the removal of equipment to a complete shutdown of a
DISN facility. These scheduled interruptions are generally known in advance and every effort must be initiated to provide continuity of service to the users during the scheduled interruptions. The DISA CONUS ASI Manager is the approval authority for routine service interruption requests on DISN stations, nodes, links, trunks, and circuits. The DISA CONUS Commander is the sole authority for approving/canceling ASIs with the CONUS Theatre. Cancellations and rescheduling will be accomplished by the DISA CONUS ASI Manager in conjunction with the guidance provided by the DISA CONUS Commander in coordination with the Global NetOps Center (GNC).
Types of ASIs:
Emergency Service Interruption (Real time operational impact only): Service interruptions to correct hazardous or degraded conditions where loss of life/property could occur through lack of immediate action. No prior coordination or user release is required (reference DISA Circular 310-70-1, c7.3.4.7). The facilities involved must notify users when time permits and report the circumstances to the NOC Controller or SCO/Watch Officer as soon as possible. These situations must also be reported to the appropriate DISA and O&M elements as time permits.
Urgent Service Interruptions:
Service interruptions that do not qualify as an emergency but are requested inside the 21-day prior notice period. A justification to waive the 21-day prior notice requirement must accompany the initial request. The DISA CONUS ASI Manager will stringently review the request and justification. The only exception to the 21-day notice policy is for the P4035 Optical contractor.
NOTE: Lack of coordination or resources is not a valid justification. It is important to note that urgent requests that do not have a valid 21-day justification will be handled as routine requests. The Commander, DISA CONUS has sole authority to approve urgent ASIs once customer concurrence is received.
Routine Request:
A service interruption in which the request is received no later than 21 days prior to the requested scheduled interruption. The requesting O&M elements must notify the DISA CONUS ASI manager no later than 21 days in advance of the requirement and request tentative approval. The only exception to the 21-day notice policy is for the P4035 Optical contractor. Facilities must submit times/dates avoiding peak traffic hours (1100z - 1800z) during the weekday. However, if a CONUS ASI will affect a real time mission in another AOR, the ASI will be scheduled to accommodate that mission.
Upon completion of the ASI, the appropriate maintenance activity will notify the NOC Controller or SCO/Watch Officer. The GNSC SCO will provide verbal notification to the GNC SCO of the ASI status.
Extension of an Ongoing Approved ASI - The GNC has sole authority to approve/disapprove ASI extensions for inter-theater systems supporting Europe, Pacific, and CENTCOM arenas. The GNSC SCO has authority to approve/disapprove extensions on the recommendation of the NOC Controller or SCO/Watch Officer of up to 1 hour to complete ongoing scheduled ASIs within CONUS. The GNSC SCO will notify the GnC SCO that an extension was granted. Extensions beyond 1 hour require DISA CONUS Commander approval and will be coordinated with the GNC SCO after mission impact has been jointly assessed by the GNSC and GNC SCO.
If an ASI has to be cancelled, the Node Site Coordinator or NOC Controller or SCO/Watch Officer will notify the DISA CONUS ASI Manager immediately or the GNSC SCO (after hours). The ASI Manager will notify the users by sending a cancellation message and the reason for cancellation to the field. If the cancellation comes immediately prior to the maintenance, then telephonic notification between the applicable NOC and users is authorized. An official cancellation/reschedule message will be sent as soon as possible.
CARRIER RATES (T1, E1, OC3, OC12, ETC)
A carrier signal is a frequency in a communications channel modulated to carry analog or digital signal information. For example, an FM radio transmitter modulates the frequency of a carrier signal and the receiver processes the carrier signal to extract the analog information. An AM radio transmitter modulates the amplitude of a carrier signal.
-T1: A dedicated connection supporting data rates of 1.544Mbps. A T-1 line actually consists of 24 individual channels, each of which supports 64Kbps. Each 64Kbps channel can be configured to carry voice or data traffic. T-1 lines are a popular option because they allow for Internet connectivity. The Internet backbone itself consists of faster T-3 connections.
-E1: Ten years following the success of the T1, Europe decided they wanted their own digital transmission technology and subsequently developed the E1. An E1 connection supports 2.048Mbps. The E1 and T1 can be interconnected for international use. Europe has E carrier ratings from E1 to E5 with E5 supporting 565.148Mbps.
-T3: A dedicated connection supporting data rates of about 43Mbps. A T-3 line actually consists of 672 individual channels, each of which supports 64Kbps. T-3 lines are used mainly by Internet Service Providers (ISP) connecting to the Internet backbone and for the backbone itself.
-OC: Is short for Optical Carrier, used to specify the speed of fiber optic networks conforming to the SONET standard. Below are the speeds for common OC levels:
OC = speed

OC-1 = 51.85 Mbps OC-3 = 155.52 Mbps OC-12 = 622.08 Mbps OC-24 = 1.244 Gbps OC-48 = 2.488 Gbps OC-192 = 9.952 Gbps OC-255 = 13.21 Gbps
IT-21
IT-21 is an information transfer strategy that provides Network Connectivity capable of Voice, Data and Video for afloat units. It provides access to NIPRNET, SIPRNET and JWICS, and supports all tactical and non-tactical mission areas. IT-21 uses Commercial Off the Shelf (COTS) Technology to keep ships updated with the most modern equipment. The goal of IT-21 is to provide an integrated, coordinated, end-to-end warfighting capability.
INTEGRATED SHIPBOARD NETWORKING SYSTEM (ISNS)
ISNS is a collection of workstations, servers, switches and routers, both at the Unclas and Secret levels that connect numerous systems like GCCS-M, NTCSS, SAMS, OPINS etc., to external routers like ADNS. It provides Navy ships with reliable, high-speed SECRET and UNCLASSIFIED Local Area Network (LAN)s; Network infrastructure (switches routers, and drops to the PC); Basic Network Information Distribution Services (BNIDS); Access to the DISN Wide Area Network (WAN); Secure and Non-secure Internet Protocol Router Network -SIPRNET and NIPRNET, used by other hosted applications (i.e. NTCSS, GCCS-M, DMS, NSIPS,
NAVMPS, TBMCS, and TTWCS) and enables real-time information exchange within the ship and between afloat units, Component Commanders, and Fleet Commanders. Figure 2-6 depicts a generic ISNS architecture.

Generic ISNS Architecture
(ATM/GigE/Fast Ethernet)
 
2.6.9.2           NAVAL TACTICAL COMMAND SUPPORT SYSTEM (NTCSS)
NTCSS' goal is to provide tactical automated support for maintenance, supply, financial, material and personnel administrative matters. Using IT-21, the Navy-Marine Corps Intranet (NMCI) communication links, and COTS software, NTCSS hopes to achieve bi-directional database replications. Replicating administrative information will reduce the warfighter's workload.
FLEET NETWORK OPERATIONS CENTERS (FLTNOC)
Naval shore communications has evolved from a series of shore based radio stations to a highly sophisticated communications infrastructure. The requirement to support
isolated

integrated voice, video, and data has increased the complexity of a typical communications shore station. Consequently, The Naval Computer and Telecommunications Area Master Stations (NCTAMS) were developed to provide operational direction and management oversight to all subordinate telecommunications system users.
The IT-21 FLTNOCs provide a number of critical Internet Protocol (IP) services to the Fleet (both deployed and pier side) and act as regional gateways to the Defense Information Systems Network (DISN) IP networks in each of their respective Areas of Responsibility (AOR). This is accomplished through the use of a flexible network architecture that can meet unique needs of the different regional forces. The FLTNOCs were originally established as independent data communication systems that only serviced units within specific coverage areas.
The nomenclature for FLTNOCs is AN/FSQ-2 06. The Navy currently has four sites designated as IT-21 FLTNOCs': European Central Region Network Operations Center (ECRNOC) NCTS Naples Italy, Indian Ocean Region Network Operations Center (IORNOC) NCTS Bahrain, Pacific Region Network Operations Center (PRNOC) NCTAMS PAC and Unified Atlantic Region (UARNOC) NCTAMS LANT. The four IT-21 FLTNOCs are geographically dispersed around the world to service deployed users, provide the entry points for Navy Tactical Satellite Systems and also operate and maintain one or more Defense Satellite Communications Systems (DSCS) terminals. Each IT-21 FLTNOC is typically responsible for providing services to Fleet users located in their corresponding AOR. Current technology provides the ability for a unit to be terminated via satellite RF and terrestrial paths at almost any FLTNOC, regardless of geographical location. FLTNOCs are designed to provide IP services to Fleet IT-21/Integrated Shipboard Network System (ISNS) and deployed ground forces. All are capable of flexibly providing IP services based on unit's satellite RF capabilities including multiple simultaneous RF paths using Automated Digital Network System (ADNS), Automated Digital Multiplexing System (ADMS) or legacy.
The current IT-21 FLTNOC network architecture operates as individual ingress and egress points for Forward Deployed Naval Forces (FDNF) within their specific AOR to provide connectivity to the DISN. Connectivity to the IT-21 FLTNOC from the FDNF afloat platforms is primarily done via the ADNS, which uses available satellite communications systems to enable ship-to- shore data connectivity. Exceptions to this configuration exist, dependant upon the individual mission of the FDNF unit or IT-21 FLTNOC, and are handled on a case-by-case basis. Each IT-21 FLTNOC provides local back-up and restore services via the Network Attached Storage (NAS) and the Out of Band Network, but does not provide for off-site backup and restore services. Figure 2-7 provides a list of baseline equipment for the IT-21 FLTNOC per enclave.
NOC Equipment Description/Use
Premise Router Connection point for each NOC to the DISN network.
Outer Security Screening Router (OSSR) Security filtering for outside the firewalls. Provides load balancing for the Bastion Hosts via VLAN with ISSR.
Firewalls Bastion hosts. Provides packet filtering, application and layer 4- proxy services.
Inner Security Screening router (ISSR) Security filtering inside the firewalls. Provides load balancing for the Bastion Hosts via VLAN with OSSR.
Service Switch Load balances internal DNS, Email, virus scan and web services.
Virus Scanners Scans inbound and outbound Email and attachments for viruses.
DNSMail Servers DNS and Email (SMTP) store and forwarding services.
Fleet Router Serial and IP connectivity to the ADNS network and IT-21 FLTNOC RF (legacy serial) connectivity.
Tunnel Router Generic Routing Encapsulation (GRE) tunneling services to the Fleet in order to establish NIPRNet Open Shortest Path First (OSPF) adjacencies across the ADNS network.
Network Encryption System (NES)
Inline Network Encryptor (INE)
Tactical Local Area Network Encryptor (TACLANE)
Encryption devices.
Dial-in switch Provides in-line connectivity to the Fleet Router
POTS and Integrated Services Digital Network (ISDN) dial-in Routers Provides dial-in services over telephone or ISDN lines.
Management Switch Provides connectivity for management devices
 
Figure 2-7
NOC Core Equipment
 

 
Figure 2-8 depicts a simplified topology of the current IT-21 FLTNOC architecture and displays only the core equipment for a single enclave (from the Premise Router to the Fleet Router). For the sake of brevity, server subsystems are indicated as Service Suites and do not display the correct number of servers. For example, each IT-21 FLTNOC has at least five DNS Mail servers but is displayed as a single Mail/DNS Suite. Other suites that make up the IT-21 FLTNOC are the Firewall, Virtual Private Network (VPN), Intrusion Detection, Virus Scan, and Web Cache suites. The Premise Router is the ingress and egress Point of Presence (POP) for the IT-21 FLTNOC to the DISN and is considered an untrusted interface. The Fleet Router is the ingress and degree POP to the ADNS network, and is considered a trusted network. This trusted network is the user side of the network system. Also note the External DNS Suite in the below diagram. Fleet NOCs use a feature called Split Horizon DNS. This is used to provide different DNS query answers to requests initiated outside the enclave. If the DNS zone is active internally (inside a FLTNOC enclave), the DNS/Mail Suite provides the actual answers to a DNS query that can associate an IP address to a ship if the query is initiated from inside the enclave. To minimize configuration changes when ships traverse from one AIR to another, the IT-21 FLTNOCs utilize secondary IP addresses called Virtual IPs (VIP), which are duplicated between each IT-21 FLTNOC. Using VIP addresses helps to simplify configuration management and obviates configuration changes to the ship networks or servers for INCHOP/OUTCHOP. VIPs are used for DNS forwarding, Simple Mail transfer Protocol (SMTP) relay and Network Time Protocol (NTP).
All unclassified voice and IP data traversing the classified enclave for ship and shore commands is encrypted using a NES 4001A, INE KG-235 or a TACLANE KG-175.

 
INCHOP/OUTCHOP
To obtain IP services from a FLTNOC the following criterion must be met:
1.  Must have a valid Interim Authority to Operate (IATO) or Authority to Operate (ATO) obtained from NETWARCOM Designated Approving Authority (DAA). The unit Information Assurance Manager (IAM) can provide guidance on validating or obtaining an (I)ATO.
2.  Submit an IP services request message in accordance with Global Communications Information Bulletin (GCIB) 3A.
3.  If service will be provided via satellite communications link, a valid Satellite Access Authorization (SAA) for the intended satellite RF path is required.
The current system allows Fleet units to transit between AORs without making configuration changes to their ISNS equipment.
This is facilitated by default configurations in the ADNS and the ISNS that utilize the IT-21 FLTOCs VIP address scheme. With the exception of physical path connectivity, the gaining FLTNOC drives the Change of Operational Control (CHOP) process. Once the satellite communications link has been terminated at the gaining Technical Control Facility (TCF, the IT-21 FLTNOC will enable the Fleet unit(s) DNS zone on the internal DNSMail servers. All zone
changes through the entire INCHOP/OUTCHOP process are accomplished by using either the NOC management web interface of the DNSMail servers command line. The Fleet unit(s) IP addresses are then added to the “trusted networks” table on the Navy Firewall Security System (NFSS). The Fleet unit(s) homeport IT-21 FLTNOC, which is authoritative for their DNS zone resolution, will be notified by the gaining IT-21 FLTNOC to direct the Fleet unit(s) external Mail Exchanger (MX) record to the gaining IT-21 FLTNOC. After the gaining IT-21 FLTNOC has verified IP connectivity for the fleet unit(s), their losing IT-21 FLTNOC is notified to deactivate the Fleet unit's DNS zone(s) on their DNSMail servers. Service verification is accomplished by a test email from the IT-21 FLTNOCs domain to the Fleet unit(s) domain (i.e., a successful email transfer between ior.navy.mil and Washington.navy.mil). The only exceptions are for embarked units that must have a CHOP in and out of the Navy IT-21 FLTNOCs (e.g. Marine Expeditionary Units (MEUs) that move from Navy and Marine NOCs)). Additionally, the gaining IT-21 FLTNOC is also responsible for ensuring the unit's IP address Classes Inter­Domain Routing (CIDR) block is being advertised via the IT-21 FLTNOC connection to DISN.
2.6.9.3.2           IT21 FLTNOC SECURITY
The security posture for each IT-21 FLTNOC is independently administered but centrally governed by the Chief of Naval Operations (CNO)/NETWARCOM Unclassified Trusted Network Protect (UTN Protect) firewall policy. Use and enforcement of this policy is mandated by CNO and NETWARCOM security policies. IT-21 FLTNOCs are also tasked with implementing IP block lists and DNS black hole lists as promulgated by Navy Cyber Defense Operations Center (NCDOC).
2.6.9.3.3           CUSTOMERS AND SUPPORT
The following section details the personnel who are currently involved in the day-to-day operations of an IT-21 FLTNOC. There are several types of customers in the IT-21 FLTNOC environment. The customers utilizing satellite or pier connectivity for IT-21 FLTNOC access represent the Fleet users. Additionally, there are embarked units such as air wings and command staff who also utilize the ship and IT-21 FLTNOCs assets for services. It is also important to note that the NCTAMS and/or NCTS may be serving local customers that do not fall within the IT-21 FLTNOC Program, but require service.
The IT-21 FLTNOCs utilize a multi-layered support concept. Each support tier is discussed in further detail below:
1.  Tier One - Provided 24/7 by the active duty Watch
section. This support includes troubleshooting ship-to- shore and intra-NOC communications and acts as the primary resource for IT-21 FLTNOC operations. Daily
configuration changes and maintenance of the system are also performed.
2.  Tier Two 一 System Administrators are responsible for the providing the highest state of operational readiness and availability of the IT-21 FLTNOC to the Fleet.
3.  Tier Three - Provided by the Fleet Systems Engineering Team (FSET) engineers which provide specialized system technical support, engineering assistance, and on site training for all NCTAMS/NCTS personnel.
4.  Tier Four - SPAWARSYSCEN Charleston acts as the primary engineering activity for IT-21 FLTNOC development and provides In-Service Engineering Activity (ISEA) support for the FSETs, NCTAMS, NCTS and other Fleet services. The ISEA also provides logistics for equipment replacement, testing, and training, and as well as hardware and software upgrades for all IT-21 FLTNOCs. The ISEA contacts and interfaces with commercial off-the-shelf (COTS) and government off-the-shelf (GOTS) vendors as necessary for technical support.
2.6.9.3.4       NAVY REGIONAL NETWORK OPERATIONS AND SECURITY CENTER (NAVRNOSC)
The ultimate goal is to migrate from the current four Fleet NOCs concept into expanded roles within NAVRNOSCs. ECRNOC and IORNOC will eventually be collapsed and UARNOC and PRNOC will remain essential elements within RNOSC East and RNOSC West respectively. While they will continue to support the service provider functions of the NCTAMS in addition to managing their portion of the Navy Enterprise Network (NEN), they will also provide virtual views of the enterprise at the strategic, operational and tactical levels. The NAVRNOSCs serve as the technical arm for the Navy in aggregating the elements of Network Operations (NetOps) including Enterprise Management (EM), Network Defense (ND), and Content Management (CM), which supplements Situational Awareness (SA) and Command and Control (C2), employed to operate and defend their portions of the NEN. The NAVRNOSC provides network and system status, performance and ND events from outlaying CONUS and OCONUS elements including the OCONUS Navy Enterprise Network (ONE-NET), IT-21, Network Operations Centers and other systems.
The NAVRNOSC will monitor and control faults, configuration accounting, performance and security of the NEN elements for which they have operational responsibility. The NAVRNOSC will coordinate closely with, and provide users and higher echelons with network status reports and access to real-time data. Additionally, the NAVRNOSC will maintain records pertaining to customer information, local tier control center and site coordinator contact information, network resources, faults and
outages. NAVRNOSC operators will have the capability to remotely manage and control lower echelon systems through the Enterprise Network Management System (ENMS). ENMS has a suite of EM, ND, CM, C2 and SA tools that can be leveraged to provide a common NAVRNOSC operational picture to the Navy Global Network Operations and Security Center (NAVGNOSC).
2.6.9.3.5       PROGRAM EXECUTIVE OFFICE, COMMAND, CONTROL, COMMUNICATIONS, COMPUTERS AND INTELLIGENCE (PEO C4I)
INTELLIGENCE (PEO C4I)
PEO C4I is the program manager for the NOC system and as such is responsible for its life cycle management. As the acquisition agent, PEO C4I is accountable for cost, schedule, and performance. Two program offices within PEO C4I have responsibility for different subsystems. PMW 160 has program management responsibility for the Information Assurance (IA) product suite and PMW 790 has responsibility for the rest of the equipment. Once deployed and fielded, the architecture is supported and maintained with NCTAMS/NCTS personnel. SPAWARSYSCEN Charleston provides technical oversight and engineering support as directed by the PMWs.
2.6.10       NAVY MARINE CORPS INTRANET (NMCI)
The Navy/Marine Corps Intranet (NMCI) was developed to procure and manage information technologies (IT) for the Navy at the enterprise level. NMCI is a partnership between the Navy and industry whereby industry provides IT services purchased by individual Navy commands. The key point is that the Navy does not own or manage the hardware, software, or communications infrastructure. Rather, a command purchases the IT services it requires from a catalog of standard services, and industry will then provide the necessary hardware and infrastructure to deliver those services. Performance requirements for each service are governed by standard Service-Level Agreements (SLAs) to ensure that the command's operational requirements are met.
The NMCI contract was designed to support all basic networking needs of shore users to include:
Network access:
1.   NIPRNET
2.   SIPRNET
3.   Fleet NOC/USN ships
4.    Internet (via NIPRNET)
5.   Ships via piers
6.   Legacy USN networks (Non-NMCI standard).
End-user services:
1.  Standard office suites
2.   Web hosting and browsing
3.   E-mail.
Key concepts that contribute to the full operational capabilities of NMCI include:
1.  Standardizing DON (Navy and Marine Corps) polices, architectures, and products.
2.  Providing basic protection across the DON via the Regional Network Operations Centers (RNOCs) to include piers, bases, commands, posts, and stations.
3.  Maximizing use of commercial off-the-shelf (COTS) internet technology security components (i.e., firewalls, intrusion detection, virtual private network (VPN), virus scanning, etc.).
4.  Hardening infrastructure and diverse connections (i.e., protect against denial of service and/or respond to existing vulnerabilities).
NMCI physical infrastructure consists of numerous LANs connected by base area networks (BANs) for each base or region. Base and regional server and data farms with associated support staffs provide data services. The BANs are connected by two separate WANs to form the Navy enterprise network. Network management and monitoring is provided by four NOCs located at Norfolk, VA; San Diego, CA; Pearl Harbor, HI, and Quantico, VA.
NMCI is designed to provide end-to-end communications within the Navy, seamlessly integrating with afloat naval forces.
2.6.11         OVERSEAS NAVY ENTERPRISE NETWORK (ONENET)
Commands in each region operate and maintain their own IT infrastructure. The Navy is presently extending its enterprise network OCONUS under the ONE-Net modernization program at 16 major fleet concentration areas:
1.  Europe — Naples, London, Rota, Souda Bay, Sigonella, and La Maddalena.
2.  Pacific Far East — Yokosuka, Sasebo, Misawa, Atsugi, Okinawa, Korea, Guam, Singapore, and Diego Garcia.
3.  Middle East — Bahrain.
ONE-Net is intended to replace legacy Navy IT networks and will serve an OCONUS population of 26,000 users. ONE-Net will implement a gigabit Ethernet backbone network on Navy and Marine Corps bases located OCONUS. The ONE-Net architecture is modeled
after the NMCI design in order to insure compatibility and connects to NMCI and afloat networks via the DISN.
In addition to shore networks, ONE-Net has installed network connectivity at CONUS and OCONUS piers at Pearl Harbor, Japan, and Guam. There are validated additional requirements for OCONUS pier side connectivity at Italy, Spain, and Greece.
Operation of ONE-Nets is envisioned to be taken over by NMCI; however, host-nation agreement (HNA) and status-of-forces agreement (SOFA) issues need to be resolved beforehand. Therefore, the Navy Network OCONUS will continue to operate as a Government- Owned/Government-Operated (GOGO) network until transition to a Contractor-Owned/Contractor-Operated (COCO) environment occurs under NMCI.
2.6.12       CONSOLIDATED AFLOAT NETWORKS AND ENTERPRISE SERVICES (CANES)
BACKGROUND:
Over the last two decades, the explosion of networking capability has created unintended consequences aboard afloat platforms. For each type of network requirement the navy identified (e.g., tactical, administrative, classified, coalition, etc.), a separate, distinct network was developed and installed. As a result, the navy's program office for Networks, Information Assurance and Enterprise Services manages a portfolio of multiple, unique networks with various classification levels, operating systems, and protocols. These individual networks are difficult to certify and defend from attacks; they bring their own racks and servers; and they are unable to share server and storage resources. As a result, the space, weight and power required have reached capacity on many platforms.
In order to address these challenges, the program office developed a phased plan to migrate its primary network programs into a single overarching program called Consolidated Afloat Networks and Enterprise Services (CANES). CANES will have at its roots primarily the Integrated Shipboard Network System (ISNS), but will also incorporate the capabilities of other networks such as Combined Enterprise Regional Information Exchange System (CENTRIXS); the Sensitive Compartmented Intelligence Local Area Network (SCI-LAN); and the Submarine LAN.
The basic concept of CANES is to take hardware requirements and create a single consolidated computing environment using standard network infrastructure and a common rack architecture. Enterprise services will support hosting of both warfighting and administrative application programs. This evolution requires detailed technical exchanges between the programs' engineers and a significant amount of resource reprogramming.
CANES is a CNO-directed approach to reduce infrastructure and
provide increased capability across the afloat enclaves. It provides technical and programmatic realignment of afloat infrastructure and services, utilizing Open Architectures. CANES will replace ISNS.
CAPABILITIES:
Voice Services
a.   IP Telephony
b.  Mobile and Stationary
c.  Secure and Un-Secure Video Services
a.   Video Teleconferencing
b.   Video/Graphics Distribution Data Services
a.   Network Support
b.    Information Management
c.   Core Infrastructure Services
d.   Network Access (IPv4/IPv6 Capable)
e.   Information Delivery Systems Management
a.   Performance, Availability, & Service Level Mgmt
b.    Fault, Problem, Incident, & Service Desk Mgmt
c.   Configuration, Change, & Release Mgmt
d.   Security Mgmt, IA, CND
e.   Capacity Mgmt

CANES GLOBAL INFORMATION GRID - BANDWIDTH EXPANSION (GIG-BE)
The Global Information Grid (GIG) bandwidth Expansion (GIG-BE) is key to realizing the Department's enterprise information environment. It is providing a worldwide, ground-based fiber­optic network that will expand Internet-Protocol (IP)-based connectivity and at the same time effectively and efficiently accommodate older, legacy command, control and communications (C3) systems. This enables an exponential leap in ground-based voice, video and data exchange capabilities for the Department of Defense and the intelligence community.
GIG-BE created a ubiquitous “bandwidth-available” environment to improve national security intelligence, surveillance and reconnaissance, and command and control information sharing. To implement GIG-BE, DISA is aggressively enhanced the existing end- to-end information transport system, the Defense Information System Network (DISN), by significantly expanding bandwidth and physical diversity to selected locations worldwide. The program provides increased bandwidth and diverse physical access to approximately 100 critical sites in the continental United States (CONUS) and in the Pacific and European theaters. These locations are interconnected via an expanded GIG core. Specifically, GIG-BE connects key intelligence, command and operational locations with high bandwidth capability over physically diverse routes, and the vast majority of these locations will be connected by a state-of- the-art optical mesh network design.

2.6.14     HIGH SPEED GLOBAL RING (HSRG)
The AN/USQ-169B(V)1 High Speed Global Ring (HSGR) provides increased capacity and connectivity in the transport communications links between major Naval ashore claimants. The HSGR transforms the legacy AN/USQ-169A(V)1 Automated Digital Multiplexing System (ADMS) shore connectivity architecture into an integrated network of transport services that provides the warfighter with a dynamic, reliable, flexible and restorable transport service capability. The HSGR enables implementation of new and improved capabilities. These include Fleet Network Operation Center (FLTNOC)-to-FLTNOC connectivity and Joint Service Imagery Processing System-Navy Concentrator Architecture (JCA) connectivity.
The primary purpose of the HSGR is to provide an increased transport link between NCTAMS PAC, NCTS San Diego, NCTAMS LANT, NCTS Naples, Italy and NCTS Bahrain. The HSGR network utilizes ATM, which provides transport services for high speed classified and unclassified IP networks as well as existing Legacy to major shore sites. All IT-21 IP traffic bound for another IT-21 resource will remain on Navy controlled networks utilizing the HSGR. The HSGR uses Marconi TNX-1100 and Lucent PSAX 23 00 Asynchronous Transfer Mode (ATM) switches interconnected via DISN ATM services or commercial leased lines to interconnect the two NCTAMS, NCTS San Diego, NCTS Naples, Italy and NCTS Bahrain. The HSGR is depicted in Figure 2-10 and 2-11.

 
Figure 2-11 High Speed Global Ring mesh topology
1  HSGR ADVANTAGES
backbone enables reconfigurable class and Quality of (QoS) parameters for data transport supporting tactical ATM is a dedicated connection switching technology that es digital data into 53-byte cell units and transmits them physical medium using digital signal technology. ually, a cell is processed asynchronously relative to elated cells and is queued before being multiplexed over nsmission path. ATM transmission rates operate at either 55 Mbps) or OC-12 (655 Mbps), though speeds on ATM s can reach up to OC-192 (10 Gbps). Operationally, the chitecture supports the following critical warfighting ments:
Increased bandwidth capacity between major shore facilities to support the requirements of the warfighter, to include:
a.  Near-real-time access to information and network services.
b.  Support shipboard terminations above 2 Mbps.

2.  Automated Digital Network System (ADNS) Increment (INC) II/III load distribution, to include:
a.  Provide primary path for Unclassified (UNCLAS) traffic with Commercial Wideband Satellite Program (CWSP) capable ships terminated in NCTS Naples, Italy or NCTS Bahrain.
b.  Provide failover path for all classes of traffic over CWSP when Defense Satellite Communications System (DSCS) is unavailable.
c.  Provide failover path for JCA traffic when CWSP path is unavailable.
3.  Provide for FLTNOC-to-FLTNOC (N2N) and other inter­theater network services restoral.
4.  Super High Frequency (SHF) connectivity restoral.
5.  Consolidation of other program of record terrestrial leases, to include transition of existing ADMS trunks across the HSGR backbone.
6.  Interface with Department of Defense (DoD)
Transformational programs (e.g. DoD Telecommunications Portal (TELEPORT), Global Information Grid (GIG)- Bandwidth Expansion (BE) and Transformational Communications Architecture [TCA]).
The ADNS to HSGR interface bandwidth is currently rated at OC-3 (155 Mbps) with future growth to OC-12 (655 Mbps). However, the current provision for ADNS traffic across the ring is 18 Mbps.
The HSGR as the Navy shore ground transport architecture creates an infrastructure to provide new Fleet services, improve performance and reliability for Fleet services and creates a flexible infrastructure that scales for the consolidation or expansion of FLTNOC services. Additionally, it also provides the infrastructure to deploy enterprise collaboration tools and applications that were previously blocked by the Fleet boundary firewalls.
2.6.14.2     HSGR NETWORK MANAGEMENT
Network Management refers to the broad subject of managing computer networks, using a variety of tools, applications and devices. HSGR Network Management is accomplished through:
1.  Direct connect (console)
2.  Remote (IP, SNMP)
3.  Distributed Local Area Network (LAN) Emulation (DLE)
The following tools are used in support of network management of the HSGR:
Service On Data (SOD) is a Marconi product that was implemented to provide management capabilities for the HSGR

 

core ATM switches.
2.  Lucent AQueView is a Simple (SNMP) based software suite capabilities for the Lucent
3.  Solarwinds software package
2.6.15                  N2N - NOC TO NOC
Network Management Protocol that provides management PSAX edge ATM switches. to analyze bandwidth throughput.

 
There are four IT-21 FLTNOCs geographically dispersed around the world to service deployed users. Each IT-21 FLTNOC is typically responsible for providing services to Fleet users located in their corresponding AOR. The four independent FLTNOCs have their own separate connectivity centers and do not exchange data directly with other FLTNOCs. The IT-21 FLTNOCs are located at the following locations:
1.  European Central Region (ECRNOC)- NCTS Naples, Naples, Italy
2.  Indian Ocean Region (IORNOC)- NCTS Bahrain, Manama, Bahrain
3.  Pacific Region (PRNOC)- NCTAMS PAC, Wahiawa, Hawaii
4.  Unified Atlantic Region (UARNOC)- NCTAMS LANT, Norfolk, Virginia
As the Navy migrates towards a two Regional Network Operations and Security Center (RNOSC) and one Global Network Operations and Security Center (GNOSC), the evolution of IP services will become more simplified. The IT-21 FLTNOCs provide a number of critical Internet Protocol (IP) services to the deployed Fleet in each of their respective Areas of Responsibility (AORs). This is accomplished through the use of a flexible network architecture that can meet unique needs of the different regional forces.
These FLTNOCs were originally established as independent data communications systems that only serviced units within specific coverage areas.
N2N leverages the connectivity and capabilities of the High Speed Global Ring as a transport. Access points to the HSGR terminate within each FLTNOC, allowing the ability to route Internet Protocol (IP) data to each other without having to traverse through Defense Information Systems Network (DISN), and subsequently, the destination FLTNOCs Boundary 1 (DISN facing) firewall architecture. Figure 2-12 provides an overview of the HSGR and its entry points into each FLTNOC:

 
The upshot of implementing N2N is FLTNOC interconnectivity and restoral capability should a FLTNOC lose connectivity on their DISN path. If a FLTNOC is unable to utilize their DISN connection, their outbound network traffic will automatically be diverted across the HSGR to another FLTNOC to utilize their DISN path.
The establishment of N2N allows the following capabilities that were previously unavailable:
1.  Transform four independently operated FLTNOCs into a single unified IT-21 FLTNOC Enterprise, providing transparent redundant services and security to the Fleet.
2.  Provides the infrastructure to deploy Enterprise collaboration tools and applications that were previously blocked by the Fleet Boundary 1 firewall.
3.  Enhanced security by keeping Fleet traffic on Navy controlled networks.
4.  Enhanced security by providing an Enterprise wide view of security management and monitoring devices.
5.   Improved ability to withstand denial-of-service attacks.
6.  Enhanced network monitoring by providing an Enterprise view of all IT-21 FLTNOC circuits, servers, and equipment.
7.  Improve configuration management by providing the infrastructure for a central repository for system configurations (server/router/switch configurations).
8.  Eventually, with the exception of embarked units (e.g. CVW or CCSG), the need for IT-21 FLTNOC system configuration changes when ships move between AORs will be eliminated.
9.  Provide continuity of service for the Fleet in the event of IT-21 FLTNOC outages.
2.6.15.1     N2N REMOTE RESTORATION
The N2N Enterprise Network provides the framework for connectivity to a central repository, which maintains configuration management and off-site backups of FLTNOC assets.
A FLTNOC can retrieve device configurations from the central repository if necessary.
2.6.15.2     N2N SECURITY
Security in the N2N Enterprise Network architecture is addressed on multiple levels to include global policies, procedures and configuration management, and, inter and intra-IT-21 FLTNOC network device security. The routing architecture will be authenticated and encrypted where applicable which reduces the possibility of a false route being injected into the N2N architecture. At each physical ingress and egress of the HSGR's ATM interface will be an Edge suite that consists of a firewall, Intrusion Protection System (IPS) and Edge Router.
2.6.15.3     FAILURE OF THE DISN SERVICE AT THE IT-21 FLTNOC (FAILOVER)
In the event of a DISN failure, or major service outage, all services will be redirected to the failed IT-21 FLTNOC Fleet Router, through the HSGR, to the backup IT-21 FLTNOC Fleet Router. As an example, UAR IT-21 FLTNOC ships will appear as if
they are a PR IT-21 FLTNOC ship and will continue to receive all
via the PR IT-21 FLTNOC. The failover process is
to the Fleet customers and the users.

 

Figure 2-13 shows an example of a DISN failure at UARNOC.

IP Traffic Flow
IT-21 over HSGR
External over NMCI/DISN
Re-routed UARNOC IP Traffic >r----------------------
Figure 2-13 DISN failure at UARNOC

2.6.16             CLASSIFIED TRUSTED NETWORK PROTECTION POLICY (CTNPP)
/ UNCLASSIFIED TRUSTED NETWORK PROTECTION POLICY (UTNPP)
The Navy Classified Trusted Network Protection Policy (CTNPP) and the Unclassified Trusted Network Protection Policy (UTNPP) provide Navy enclave protection to reflect a defense-in-depth measure and the minimum standards for interconnection between Navy trusted networks (networks which comply with UTNPP/CTNPP) and untrusted networks. NTD 09-07 refers.
2.6.17         IP VERSION (IPV6)
Internet Protocol Version 6 (IPv6) is the next generation network layer protocol of the Internet as well as the GIG, including networks such as NIPRNET, SIPRNET, JWICS, and emerging DoD space and tactical communications systems. Implementation of IPv6 is necessary due to the fundamental limitations of the current Internet Protocol, Version 4 (IPv4) protocol, including a maximum of only 4,294,967,296 possible IP addresses (of which, almost 300 million are reserved for special purposes). An IP address is a unique address that computers, routers and switches use to communicate on a network. In its present form, IPv4 cannot support the long-term requirements of both the DoD and the commercial community. IPv6 overcomes these limitations by expanding the available IP address space to accommodate the worldwide explosion in Internet usage. This improves end-to-end security, facilitates mobile communications, provides new enhancements to Quality of Service (QoS), and eases management system burdens. Additionally, IPv6 is designed to run well on most modern high-speed networks (e.g. Gigabit Ethernet, OC-12, ATM, etc.) without experiencing significant decreases on low bandwidth systems. IPv6 also greatly expands the number of available unique IP addresses available for use and eliminates the need for complex address conservation methods such as Classless Inter-domain Routing (CIDR).
2.6.18         GLOBAL COMMAND AND CONTROL SYSTEM - MARITIME (GCCS-M)
GCCS-M is the maritime implementation of the joint services GCCS providing a single, integrated, scalable C4I system. The system supplies information that aids Navy commanders in a full range of tactical decisions. In functional terms, GCCS-M fuses, correlates, filters, and maintains raw data and displays image-building information as a tactical picture. Specifically, the system displays the location of air, sea, and land units anywhere in the world and identifies whether those units represent friendly, neutral, or enemy forces. It operates in NRT and constantly updates unit positions and other SA data. GCCS-M also records the data in appropriate databases and maintains a history of the changes to those records. The user can then use the data individually or in concert with other data to construct relevant tactical pictures, using maps, charts, map overlays, topography, oceanographic, meteorological, imagery, and all-source intelligence information all coordinated into what is known as a CTP that can be shared. Supplied with this information, Navy commanders can review and evaluate the general tactical situation, determine and plan actions and operations, direct forces, synchronize tactical operations, and integrate force maneuver with firepower. The system operates in a variety of environments and supports joint, coalition, and allied forces.
The GCCS-M architecture is composed of three variants: GCCS-M afloat, GCCS-M ashore, and GCCS-M tactical/mobile that includes TSCs, mobile operations control center (MOCC), and Joint Mobile Ashore Support Terminal (JMAST).
2.7 VOICE AND VIDEO SERVICES
2.7.1   VOICE OVER IP (VOIP)
The mission of the Satellite Management Branch (Standardized Tactical Entry Point) and the Teleport Program Office (TPO), and Readiness Contingency and Exercise Support Branch is to extend Defense Information System Network (DISN) services to Joint Forces worldwide using both terrestrial and satellite communications (SATCOM). DISA's goal is to put a net-centric Internet Protocol (IP) architecture in place to better support the Warfighter. An individual DoD Gateway site is intended to be the interface between the deployed users and the Defense Information Systems Networks (DISN). IP based solutions are intended to enhance the DoD Gateways capabilities not replace legacy DISN services. To meet today's IP based solution shift, initial IP based solution suites have been installed at Landstuhl, Germany, Camp Roberts, California, and Fort Monmouth, New Jersey. The IP based solution suite supports SIPRNET (Secret Internet Protocol Router Network, NIPRNET (Unclassified but Sensitive Internet Protocol Router Network), Voice over IP (VoIP), JWICS, DRSN, Commercial ISP, and Commercial Voice applications. These emerging IP based solution exploit both traditional FDMA SATCOM modems and IP SATCOM Modems (current force and Joint Internet Protocol Modem (JIPM)) for long haul transport. The individual requirements are numbered to aid in tracking and for cross-referencing between the segment specifications, the system specification, and the Teleport Operational Requirements Document. The numbering system uses a designator in the following format: BXXXX, in which B is a letter defining the system or segment and the Xs represent numerals. The current conceptual the Teleport IP based solution equipment is annotated. The design incorporates three main new elements into the existing baseband architecture and new equipment to the encryption element: a convergence element (also known as the convergence router), a VoIP functionality (also known as the VoIP
gateway), a performance enhancing proxy (PEP) element, and a High Assurance Internet Protocol Encryption (HAIPE). HAIPE devices provide traffic separation and COMSEC functionality.
The convergence router will bring together NIPRNET, SIPRNET, and DSN VoIP traffic into a packet stream. The aggregate of the convergence router can be sent to either to the Multiplex Integration and Digital Communications Satellite Subsystem Automation System (MIDAS) or the IP SATCOM Modem. MIDAS will then transmit the Convergence Router traffic to the STEP/Teleport System's transmission security (TRANSEC) element. From the TRANSEC element, the MIDAS connects to the FDMA modem for transmission via satellite. The IP SATCOM Modem will support IP over Transponded SATCOM as well. The TRANSEC solution for IP SATCOM Modem employment is still not defined. The deployed warfighters' suite of equipment will reverse the convergence process, using similar equipment, by means of interoperable routing protocols and encryption keys for TRANSEC and communications security (COMSEC). The Encryption Element provides the TRANSEC and COMSEC required by the Gateway Systems. All satellite transmissions require TRANSEC in accordance with CJCSI 6510.01D, Information Assurance (IA) and Computer Network Defense (CND). COMSEC will be applied to all tactical circuits requiring COMSEC. The DoD Gateway System does not support unencrypted data above the Secret level; for example, JWICS and DRSN data passes through the systems encrypted. The interconnection element provides the electrical and physical interface between most elements of the DoD Gateway. It supports connectivity to either serial interface from the convergence router to the encryption element for TRANSEC or Ethernet connection into a IP SATCOM Modem. The modem element provides both FDMA modems and IP SATCOM Modems (TDMA) interfacing with the DoD Gateway terminal equipment for transmission over the satellite to the warfighter. The modems provide the needed modulation and demodulation for the SATCOM link. The VoIP gateway will be used to interface with the DSN and to convert legacy DSN voice to VoIP. The VoIP traffic will be sent to the convergence router to be merged with the NIPRNET and SIPRNET traffic.
B1190—The VoIP gateway shall support IPv4.
B12 00—The VoIP gateway shall support IPv6 or have a migration plan to implement IPv6 in future releases.
B1210—The VoIP gateway shall support QoS and CoS. All DoD Gateways will adhere to defined DISN CORE CoS and QoS standards and policies.
B1220—If no DoD policy with respect to QoS and CoS has been established, the VoIP gateway QoS and CoS shall comply with tactical user configurations.
2.7.2     DOD VIDEO TELECONFERENCING SERVICE (VTC)
VTC is an extension of traditional telephony technologies with the added feature of being able to see the person or persons with

whom one is talking. Another way to consider VTC technology is an extension or combination of television, which provides the audio and video communication aspect, and telephony or
telecommunications which provides the addressable, bi-directional connectivity. The results of which are a bi-directional, “closed circuit”, dial-able, TV system. The television portion of the technology uses video display screens (televisions/video monitors/projectors), video cameras, microphones, and speakers at each location connected to a Coder-Decoder (CODEC). The CODEC is the interface between the analog voice/video devices in the system and the addressable connectivity or transmission portion of the system. The CODEC converts the analog signals to digital format that is compatible with the transmission media. The CODEC also interfaces and converts presentation and whiteboard information. The combined digital signal is then transmitted to the remote location via a telecommunications network which is either TDM or IP based. Quality VTC communications requires much higher bandwidth than voice or traditional data communications. The actual bandwidth required is dependent upon the CODEC and compression algorithm used. The typical minimum bandwidth requires is 128Kbps with 384Kbps being typical and required for quality video. Some CODECs require as much as 2Mbps in support of high definition video.
The telecommunications network used for VTC connectivity is a traditional circuit switched telephony network such as the Defense Switched Network (DSN) and/or Public Switched Telephone Network (PSTN). The DSN is the preferred network for DoD VTC connectivity. Both of these networks are based in TDM technologies and typically provide Integrated Services Digital Network (ISDN) lines for access to the network. Both Basic Rate interface (BRI) and Primary Rate interface (PRI) ISDN lines are used. Addressability is handled as with any other telephone instrument, the address is the phone number associated with the line from the circuit switch to the instrument.
.3 DEFENSE SWITCHED NETWORK (DSN)
The Defense Information System Network (DISN) provides global voice services through the Defense Switched Network (DSN), a worldwide private-line telephone network. Multilevel precedence and preemption (MLPP) capabilities on the DSN utilized by command and control users ensure that the highest-priority calls achieve connection quickly, especially during a crisis situation. The DSN also provides global data and video services using dial-up switched 56Kbps or 64Kbps Integrated Services Digital Network (ISDN) services. Secure voice services are provided by the Secure Telephone Unit, Third Generation/Secure Terminal Equipment (STUIII/STE) family of equipment that provides end-to-end encryption over non-secure DSN circuits. Interfaces are provided between strategic and tactical forces, allied military and Enhanced Mobile Satellite Services (EMSS).
DEFENSE RED SWITCH NETWORK (DRSN)
The Defense Information System Network (DISN) provides global secure voice services using the Joint Staff Defense Red Switch Network (DRSN). The Joint Staff grants approval to access the network. The mission of the DRSN is to provide the President, Secretary of Defense, National Command Authority (NCA), the National Military Command Center (NMCC), Combatant Command Centers, Warfighters, and other critical Department of Defense and federal government agencies with reliable, secure, interoperable C2 and crisis management capabilities.
2.7.5     INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
ISDN is a circuit-switched telephone network system, designed to allow digital transmission of voice and data over ordinary telephone copper wires, resulting in better quality and higher data speeds than are available with analog. More broadly, ISDN is a set of protocols for establishing and breaking circuit switched connections and for advanced call features for the user.
2.7.6     PLAIN OLD TELEPHONE SYSTEM (POTS)
POTS refers to an un-enhanced telephone service with the ability to send and receive phone calls. In POTS, once a dedicated circuit connects the call, your voice is transmitted by a 4kHz analog wave form via a process known as a frequency division multiplexing. 4kHz band is used because it provides enough bandwidth to reproduce a recognizable human voice. Further, each channel supports a range of single amplitude (strength) that relates to a volume level. The amplitude level is limited, so no matter how loud you scream over the network it won't exceed a certain volume on the other end of the line. Together this combination of bandwidth and amplitude is not quite enough for perfect voice transmission, but is good enough so you can make out the words and recognize familiar voices.
.7 AFLOAT PERSONAL TELECOMMUNICATIONS SYSTEMS (APTS)
Providing personal telecommunications service to shipboard crewmembers at sea is a highly visible quality of life issue that positively affects the life of the sailor at sea. To maintain clear separation of appropriated and non-appropriated activities, SPAWAR and Navy Exchange Command (NEXCOM) work collaboratively to insure that the definition of technical and procedural requirements do not conflict in planning for future commercial services. This clear separation of functionality and funding is
known as the APTS system. With a fully complemented CV/CVN, costs per minute have driven down phone call charges into the $1.00 per minute range. A commercial smart debit card now provides telephone services for personnel on most ships equipped with the APTS “Sailor Phones".
2.7.8     KY68 DIGITAL SUBSCRIBER VOICE TERMINAL (FDVT)
KY68 is a ruggedized field terminal containing the audio processing, signaling and Communications Security (COMSEC) functions necessary to provide secure and non-secure voice and secure data access to circuit switched digital networks, and to provide secure access to a variety of non-switched, point-to- point (sole user) digital networks. The TSEC/KY-68 DSVT digitizes voice information using Continuously Variable Slope Delta (CVSD) modulation at a 16 or 32Kbps rate. The KY-7 8 is the strategic version.
2.7.9     VIDEO INFORMATION EXCHANGE SYSTEM (VIXS)
The video information exchange system (VIXS) provides a secure, GENSER SECRET and SCI, multipoint, interactive video teleconference (VTC) capability that facilitates efficient communications among CNO, fleet commanders, commanders at sea, Navy and Marine Corps fleet command authorities, and other users. It was originated in 1992 as CNO VTC and expanded to the fleet flagships in 1993. In 1994 the name was changed to VIXS and it expanded to include CVs, CVNs, and large deck amphibious ships, LHAs and LHDs. VIXS was implemented with COTS VTC systems and multipoint control units (MCUs) (bridging units) and utilizes Navy-standard cryptographic equipment. This integrated system supports global tactical C2 requirements to conduct distributed, collaborative planning.
Through the use of compressed digital transmission, the system provides a cost-effective means of producing high-quality video images using reduced bandwidth. VIXS conferences are normally held at 128-256Kbps. This reduced bandwidth requirement minimizes the expense of long distance service to Europe and allows SATCOM connectivity to Navy ships at sea. Normal shipboard bandwidth is 12 8 kbps, but CWSP gives equipped ships the bandwidth required to conference at 256 or 384Kbps. Live motion video, camera auto queue on speaker, computer graphics, videotape, document images, white boarding, and file sharing can currently be transmitted over the system. Support can be provided for up to 16 conferencing sites, enabling 8 simultaneous point-to-point conferences, or a series of mixed point-to-point and multipoint conferences. Gateways located at MCU sites provide access to other networks.
VIXS hubs are located at:
1.   NCTAMS LANT Norfolk, VA
2.   NCTS NAPLES, ITALY Naples, Italy
3.   NCTAMS PAC Makalapa, HI
4.   NCTS Bahrain.
VIXS shore access is provided to COMPACFLT, USPACOM, CFFC, United States Joint Forces Command (USJFCOM), COMUSNAVEUR London and Naples, NAVCENT Bahrain, and CNO. An additional 30 plus sites have been certified as VIXS network users via ISDN dial-up. A support hub at Space and Naval Warfare (SPAWAR) Systems Center (SSC) Charleston provides testing and diagnostics support in addition to providing backup multipoint conference support.
The VIXS shipboard configuration consists of one suite of VTC hardware and two separate encryption paths. One path is classified (GENSER) and the other is JWICS SCI. Both paths are encrypted via a KG-194 or KG-194A.
In FY02, upgrades included incorporation of a second MCU at VIXS hub sites to support simultaneous local unclassified and/or NATO multipoint conferences. Future hub upgrade requirements will include support of IP based systems such as adding an H.323 MCU and H.320/H.323 Gateway to accommodate NMCI user sites as well as adding additional port capacity to the Madge and Montage units to accommodate additional afloat and ashore VIXS users. Additional afloat platforms are expected to include CG and DDG utilizing SHF.
2.7.10       DISN VIDEO SERVICE GLOBAL (DVSG)
DVS-G capabilities include global connectivity, 24/7 availability, multiple security levels (Unclassified, U.S. Secret, and TS), and VTC services via STEP sites. VTC services are provided using multiple configurations (point-to-point, multi-point, switched, or dedicated), speed matching, and bridging services. If C2 capabilities are required, DVS-G must be configured to meet C2 performance measures.
DISA is planning to transition DVS-G to DVS II, a new IP-based network that includes C2 VTC operations. DISA is developing the follow-on DVS II contract; however, implementation dates are not presently available. The follow-on contract requirements include many new technologies, the merging of existing networks, and advanced connectivity to the warfighter. DVS II will build on the DVS-G platform.
The DISN Video Services (VS) provides global DOD VTC users a bridging service using industry standard technology for interoperability and multi-point VTC requirements for both classified and unclassified users. Increased flexibility was added to the system by providing subscribers a way to access VTC users on tactical networks such as the DSCS and DSN, as well as non-DOD networks. Through a cascade of Multipoint Control Units (MCU), DISN VS allows subscribers to access customer MCUs such as the Navy's tactical Video Information Exchange System (VIXS).

DISN VS supports Top Secret bridging requirements, providing VTC services to all U.S. Forces deployed worldwide. Additionally, through a processing procedure DISN VS supports Allied conferencing up to and including Top Secret. Existing DISN VS capabilities include global connectivity, multiple levels of security, reservation scheduling, directory assistance, multi­point conferencing, speed matching, access via STEP, and 24/7 help desk accessibility. Use of DISN VS is available through either dedicated service or dial-up (switched) service.
2.7.11     STE / STU (SECURE TELEPHONE)
Secure Telephone Unit - Third Generation (STU-III) is a low-cost, user-friendly, secure telephone device. The terminals are designed to operate reliably, with high voice quality, as both ordinary telephones and secure instruments over the dial-up public switch telephone network. STU-III operates in full-duplex over a single telephone circuit using echo canceling modem technology. STU-IIIs come equipped with 2.4 and 4.8Kbps code­excited linear prediction (CELP) secure voice. Secure data can be transmitted at speeds of 2.4, 4.8, and 9.6Kbps. There are many manufacturers each having different maximum throughput rates. The data throughput between two STU-IIIs can only be as great as the slowest STU-III connected.
The STU-III Family consists of some of the following devices (see figure 2-14):
 

 
1.  The STU-III/Low Cost Terminal (LCT) was designed for use in the office environment among a broad spectrum of military, civil, government, and selected private sector users. It is compatible with standard modular or multi-line (key system) connectors and operates full-duplex over a single telephone circuit.
2.  The STU-III/Cellular Telephone is interoperable with all other versions of the STU-III Family. It combines cellular mobile radiotelephone technology with advanced secure voice/data communications. The unit includes a message center that is integrated with the standard cellular handset; it can be conveniently mounted inside a vehicle and provides all STU-III functions, including authentication/classification display.
3.  The STU-III/Allied (A) is a specialized version of the STU- III/LCT that is compatible with the STU-II. It retains all basic STU-III functions and capabilities and incorporates STU-II BELLFIELD Key Distribution Center (KDC), STU-II net, and STU-II multipoint modes of operation.
4.  The STU-III/Remote Control Interface (RCU) provides RED enclave subscribers with STU-III compatible secure communications in a rack-mounted remotely controlled line encrypting unit. When used in conjunction with a RED switch or conferencing director, the STU-III/R allows STU-III users to confer with multiple STU-III users or others who have secure functions. It is capable of encrypting/decrypting voice or data over two-wire or four-wire telephone systems and incorporating a 2.4Kbps BLACK digital (external modem) interface.
5.  The Multi-Media Terminal (MMT) 1500 is a diversified STU-III capable of clear or secure voice and data communications over both analog and digital mediums. The MMT interfaces to the commercial telephone system via a standard RJ-11 telephone jack and to digital systems through a Black Digital Interface (BDI). The BDI port will support both half-and full-duplex communications, precedence dialing, black digital network signaling, and multiple satellite hops. When unattended the MMT can automatically answer an inbound call without operator intervention and establish a secure link with any user on a preprogrammed Access Control List (ACL).
6.  The Inter Working Function (IWF) is the shore gateway device that provides the digital to analog conversion between the MMT and the analog STU-III. The IWF supports half and full duplex voice and data communications with rates of 2.4, 4.8, and 9.6Kbps. The IWF improves secure voice and data synchronization over multiple satellite hops with programmable extended time-outs and pre-staging of STU-III call information. The IWF supports all necessary network- signaling functions to enable call setup and status messages including canned voice messaging to the analog user.
7.  The STU-III Secure Data Device (SDD) is designed with the same capabilities as other members of the STU-III family including Secure Access Control System (SACS), remote authentication (RA), remote control, auto-answer secure data, and capable of operating in both attended and unattended environments. The SDD provides protection for facsimiles, e-mail, and computer communications.
8.  The Motorola CipherTAC 2000 (CTAC), (see figure 2-15) STU- III family compatible secure voice communications via cellular phone. CTAC without an inserted CipherTAC 2000 security module is unclassified and functions as a non- secure commercial off the shelf (COTS) telephone product. The CTAC CiphterTAC security module is certified for all levels of classified discussions up to and including SECRET in an adequate operating/security environment.
 
The Secure Terminal Equipment (STE)
The Secure Terminal Equipment (STE)/Office is the evolutionary successor to the STU-III. The STE program will improve shore secure voice communications as well as shipboard communications by changing out the analog STU-III products with digital-based STE products. The STE cryptographic engine is on a removable Fortezza Plus KRYPTON ™ Personal Computer Memory Card International Association (PCMCIA) Card, which is provided separately. The STE Data Terminal provides a reliable, secure, high rate digital data modem for applications where only data transfer (FAX, PC files, Video Teleconferencing, etc.) is required. All STE products will be STU-III secure mode compatible with the following enhanced capabilities:
1.  Voice-recognition quality secure voice communication.
2.  High-speed secure data transfers (up to 38.4Kbps for asynchronous or 128Kbps for synchronous).
STE terminal products can use Integrated Services Digital Network (ISDN), analog PSTN, TRI-TAC, or direct connection to Radio Frequency (RF) assets via RS-530A/232E ports. Maximum STE performance may be attained only by those commands employing ISDN service with two Bearer Channels (2B+D ISDN Service). When connected to a PSTN (Analog Telephone) service, the STE/Office units will only support current STU-III voice and data capabilities.
A tactical version, STE/Tactical is a replacement for MMT 1500
with a Digital Non-secure Voice Terminal (DNVT) adapter. Though not a direct replacement for the KY-68, the STE/Tactical can serve as a DNVT replacement with secure voice communication capabilities in STU-III modes over TRI-TAC/Mobile Subscriber Equipment (MSE). STE/Tactical is not secure mode compatible with the Digital Secure Voice Terminal DSVT KY-68.
A STE Direct Dial capability comprised of the STE/C2 Tactical terminal and/or associated STE/Interworking Function(s) will improve on the existing Navy "Direct Dial" secure voice ship to shore dial-up operations. STE Direct Dial improves secure mode connectivity, provides operational flexibility support for both plain text and cipher text voice modes, and provides a standardized secure ship digital telephone system solution and Joint CINC interoperability with forces at sea and ashore.
Individual STE Product Capabilities:
1.  STE/Office provides enhanced STE capabilities over digital ISDN and STU-III over analog PSTN.
2.  STE/Data provides STE and STU-III data capabilities only.
3.  STE/Tactical with Wedge supports STU-III Black Digital Interface (BDI) over TRI-TAC/MSE or RF asset.
4.  STE Direct Dial:
a.  STE/C2 Tactical with Wedge supports STU-III BDI over ISDN or RF asset.
b.   STE/IWF provides interface with PSTN (Analog) and ISDN (Digital).
STE products without an inserted Fortezza Plus KRYPTON ™ Card are unclassified and function as non-secure COTS telephone products. The Fortezza Plus KRYPTON ™ Card is currently designated as an Accounting Legend Code 1 (ALC-1) item by the NSA. Even though STEs are unclassified items, they should still be treated as high-value Government property (e.g., such as an office computer). Certification of STE will provide security for all levels of traffic, up to and including TOP SECRET Special Compartmented Information (TS-SCI). When a Fortezza Plus KRYPTON Card is inserted into a STE, secure storage must be provided to the extent required by SECNAV M5510.36 (series) for the maximum classification level of the key used. Fortezza Plus KRYPTON ™
Card is considered classified to the maximum level of key classification until it is associated with a STE terminal. Once associated with a STE terminal, the card is considered unclassified when not inserted in the associated STE terminal.
2.7.12     ADVANCED NARROWBAND DIGITAL VOICE TERMINAL (ANDVT)
The Advanced Narrowband Digital Voice Terminal (ANDVT) Family comprises the AN/USC-43 Tactical Terminal (TACTERM), the KY-99A Miniaturized Terminal (MINTERM), and the KY-100 Airborne Terminal (AIRTERM). These terminals are handled as UNCLASSIFIED controlled cryptographic items (CCIs) when unkeyed; when keyed they assume the classification of the key. The ANDVT family provides joint interoperability between Service components of US command elements and North Atlantic Treaty Organization (NATO) allies.
ANDVT Family units are primarily used to satisfy tactical secure voice requirements on high frequency (HF), very high frequency (VHF), and ultra high frequency (UHF) satellite and line-of-sight (LOS) communications; UHF Non-Demand Assigned Multiple Access (Non-DAMA) and DAMA; super high frequency (SHF) and extremely high frequency (EHF) satellite communications (SATCOM) including Milstar; UHF Follow-on (UFO)/EHF; and Fleet Satellite EHF Package (FEP). All ANDVTs must have engineering change proposal-060 (ECP- 060)/field change -1 (FC-1) incorporated in order to operate over UHF SATCOM.
TACTERM: The TACTERM normal configuration consists of the Basic Terminal Unit (BTU) (CV-35 91) and a communications security module (KYV-5), providing half-duplex, secure transmission of voice or data communications in either point-to-point or netted mode. The peripherals include the split remote control units (SRCUs) Z-ANG and Z-ANH, which replaced the existing PARKHILL type IIIA and IIIB. A "Y" cable will allow remote loading of cryptographic variables from the SRCU Z-ANG. The Navy developed the TACTERM in association with the National Security Agency (NSA). See table 2-1 for a listing of some TACTERM Equipment.
MINTERM: The functions of the MINTERM are similar to those of the TACTERM; however, its updated design includes an improved modular architecture, and it has been reduced in size. The MINTERM is a low-cost, lightweight, low-power single channel, half-duplex, narrowband/wideband/wireline terminal providing secure voice and data communications with full key distribution and remote rekey capabilities. The MINTERM is certified to secure traffic up to TOP SECRET.
The MINTERM improvements include the following:
a.  Concurrent voice and data modes enable the users to connect both data equipment and voice handsets.
b.  VINSON (KY-57/58) mode of operation allows interoperability between the MINTERM and the VINSON wideband COMSEC equipment.
c.   Improved SATCOM performance incorporates the enhancements included in ECP-060/FC-1 to the ANDVT.
This includes an extended preamble for improved synchronization, selectable receive (RX) or transmit (TX) priority to prevent transmission conflicts,
Milstar mode requirements, push-to-talk (PTT) inhibit, and a bridge for signal fades.
The latest DOD LPC-10 algorithm (V58) has been enhanced to provide high-quality secure narrowband voice for military handsets and to maintain that quality and intelligibility in noisy acoustical environments.
AIRTERM: NSA is developing AIRTERM. Although originally designed for airborne applications, the Navy has also identified submarine, shipboard, Marine Corps communication vans, and landing craft air cushion (LCAC) requirements. AIRTERM incorporates MINTERM and VINSON operational modes. It is a wideband/narrowband terminal that interoperates with the TACTERM, MINTERM, VINSON, and Single Channel Ground and Airborne Radio System (SINCGARS). The AIRTERM is a lightweight, self-contained secure voice and data terminal that provides secure half-duplex voice, digital data, analog data, and remote-keying capabilities for transmission over radio circuits or wire line media. AIRTERM accepts classified analog voice information and uses advanced speech processing algorithms: LPC-10 at 2.4Kbps in narrowband voice modes and continuously variable slope delta (CVSD) modulation at 12Kbps and 16Kbps in wideband voice modes. The AIRTERM provides the same connectors, with similar functional pin outs, as the VINSON for the wideband operational modes. The AIRTERM is also available with a remote control unit (RCU), Z-AVH, which is functionally equivalent to the Main Terminal Unit (MTU) with regard to external controls.
Characteristics:
 
Equipment Height
(in)
Width
(in)
Depth
(in)
Weight
(lb)
CV-3591 7.63 4 . 91 13 .30 21.80
KYV-5 6 .25 4.88 3 .00 3 .60
Z-ANG (SRCU) 2 .25 5.72 4.13 3.30
Z-ANH (SRCU) 6.20 6 . 91 2 . 97 3.30
KY-9 9A 3 .00 5 .50 6.73 4 .50
KY-100 4 . 96 5.73 5.14 5.70
Z-AVH 2 .61 5.73 3 .14 1.80
 
Table 2-1 TACTERM EQUIPMENT
 

 
Supports the following Data Rates:
Narrowband (3kHz) 300 bps, 600 bps, 1200 bps, and 2400 bps in the HF mode
2400 bps digital secure voice in the HF mode 2400 bps digital voice and data in the LOS mode
MINTERM
Supports the following Data Rates:
Narrowband (3 kHz) 300, 600, 1200, 2400 bps in HF or BLACK digital mode (BDM)
2400 bps in LOS mode
Wideband (25 kHz) 12 and 16 kbps in the VHF/UHF/SATCOM mode AIRTERM
Supports the following Data Rates:
Narrowband (3 kHz) 300, 600, 1200, 2400 bps in HF or BDM 2400 bps in LOS mode
2400 bps digital secure data in the LOS mode
Wideband (25 kHz) 12 and 16 kbps voice or data in the baseband/diphase (BB/DP) mode
2.7.13     FUTURE NARROWBAND DATA TERMINAL (FNBDT) STANDARD
NSA achieved secure interoperability between some wired and wireless systems when it created an industry and government consortium that agreed on a common signaling protocol called the Future Narrow Band Digital Terminal (FNBDT). Despite its name, however, FNBDT is no longer just narrow band, but also includes a common voice processing capability, a crypto-algorithm base and a key-management process. It has become the primary security standard for cell phones, military radios and emerging public safety communications devices for homeland security missions and first responders around the world. FNBDT products were designed to accept—and have accepted—secure software upgrades. For example, the General Dynamics Sectera Secure GSM phone as well as the Qualcomm QSec-800 CDMA secure cell phone, have added upgrades that provide the ability to pass short messaging data.
Although the data file transfers are limited to low bandwidth, the addition of secure voice and data interoperability in FNDBT mode is a first step toward the convergence of voice and data over secure wireless networks. NSA now maintains an FNBDT interoperability test bed that verifies vendor compliance with the current version of FNBDT specifications and tests interoperability among the current versions of all wireline and wireless products to verify secure, end-to-end interoperability.
2.8     INTELLIGENCE AND CRYPROLOGIC SYSTEMS
2.8.1   JOINT SERVICES IMAGERY PROCESSING SYSTEMS (JSIPS-N) CONCENTRATOR ARCHITECTURE (JCA)
Imagery is the highest use of bandwidth for the CSG or ESG, typically on the order of 768Kbps. The JSIPS JCA was developed for the fast and efficient delivery of imagery while providing increased flexibility in bandwidth management. The JCA is a client-server based architecture, with web-like browsing features and capabilities for fleet imagery subscribers that is scalable up to 8Mbps. It provides the fleet with a SECRET, GENSER, user- friendly network-centric, imagery delivery system. The JCA has four major components, including imagery sources, concentrators, sites, and communications.
1.  Imagery sources — Sources originate imagery and imagery- related products that are required by users for various operational needs such as tactical reconnaissance, battle damage assessment (BDA), and targeting.
2.  JCA concentrator — The primary concentrator is the JCA central repository of imagery and imagery related products that are supplied to the fleet. The data comes from the source, and populates databases based on standing fleet imagery requirements as well as individual fleet-initiated requests for imagery and imagery-related products.
3.  JCA sites — Navy afloat JCA sites are command ships, carriers, and large deck amphibious ships (LHD/LHA). Each site houses an image product library (IPL) workstation that is used to coordinate delivery, ordering and acknowledging receipt of imagery products.
4.  JCA communications — Communications between the concentrator and ESG and CSG ships are via broadband (DSCS or CWSP)
SATCOM connectivity.
2.8.2   GLOBAL COMMAND CONTROL SYSTEM - INTEGRATED INTELLIGENCE AND IMAGERY
Global Command and Control System-Integrated Intelligence and Imagery (GCCS-I3) provides COP-centric imagery and intelligence- related capabilities developed by the four military services and selected agencies in response to joint warfighter requirements. Through the GCCS-I3 integration process, these tools provide intelligence support to operations seamlessly within the GCCS family of systems.
GCCS-I3 enhances the operational commander's situation awareness by providing a standard set of integrated, linked tools and
services that give ready access to imagery and intelligence directly from the operational display. GCCS-I3 gives tactical operators and intelligence analysts' direct access to the nationally produced modernized integrated database (MIDB) for order of battle (OOB) data, weapons systems characteristics and performance information, and national imagery. GCCS-I3 also gives those users the capability to integrate locally collected tactical imagery, live video stream, and other intelligence with national and theater-produced intelligence. This intelligence can be plotted directly on operational/tactical displays alongside continuously updating operational and operational-intelligence information, providing tactical operators and intelligence analysts vastly improved knowledge of the tactical battlespace. The all-source fusion capabilities of GCCS-I3 provide decision makers with a composite picture of the battlespace augmented with SCI-level intelligence, bringing together NRT track, OOB, maps and imagery, military overlays, and other forms of specialized intelligence data to produce a CIP. When combined with other enabling technologies, such as database replication and guards, GCCS-I3 supplies geographically focused, OPINTEL to the GCCS-M CTP battlespace view, aiding decision support and improved SA for the intelligence and operations elements of the commander's staff.
Included in the GCCS-I3 suite are the following applications:
1.  Joint threat analysis tools/ground template toolkit (JTAT/GTT) generates terrain suitability and other tactical decision aids based on military aspects of terrain and contributes to intelligence preparation of the battlespace (IPB) analysis. It supports the joint force and component commanders' campaign/mission planning and decision making by identifying, assessing, and estimating the adversary's battlespace center of gravity, critical vulnerabilities, capabilities, limitations, and intentions, most likely COA, and COA most dangerous to friendly forces.
2.  Joint targeting toolbox (JTT) provides a common standardized, scalable, and DII-COE compliant set of targeting tools to manage and/or produce targets, target data, and target-derived products and services in response to customer requirements in a manner consistent with targeting mission objectives and warfighter requirements.
3.  Improved many-on-many (IMOM) models electronic combat scenarios and can provide threat evaluation. It is a 2-D graphics oriented user-interactive program which aids in mission planning and IPB analysis. IMOM visually displays the complex interaction of multiple ground-based radar systems being acted upon by multiple airborne ECM aircraft. IMOM models the detection capabilities of radar effects, the effects of stand-off jamming platforms, and the effects of self-protection jamming platforms. The model adds the effects of terrain masking and ECM on any OOB, exploits the results to perform a variety of analyses, and provides hard copy post processing in a variety of formats.
2.8.3   JOINT DEPLOYABLE INTELLIGENCE SUPPORT SYSTEM (JDISS)
The Joint Deployable Intelligence Support System (JDISS) program provides a family of hardware and software capabilities that allow connectivity and interoperability with intelligence systems supporting forces, in garrison, and deployed during peace, crisis, and war. It provides the Joint Intelligence Center (JIC), Joint Task Forces (JTF) and operational commanders with on-site automation support and the connectivity necessary to execute the intelligence mission. JDISS and the Joint Worldwide Intelligence Communications System (JWICS) together comprise the joint standard and foundation for commonality among intelligence support systems. JDISS provides joint intelligence centers, joint task forces, and operational commanders with on-site automation support and the connectivity to make the best use of the Intelligence Community's resources. JDISS is also the technical baseline for DODIIS client-server environment (CSE).
JDISS provides automated support for the following:
1.  transmitting and receiving specific requests for intelligence
2.  Accessing Theater, Service and National intelligence databases
3.  Supporting digitized imagery exchange
4.  Accessing automated record message processing systems, indications and warning systems, and collection management systems
5.  Inputting intelligence data into a variety of operations/intelligence systems, and
6.  Performing multi-media functions, such as voice electronic publishing and video teleconferencing.
The core software for JDISS is:
1.  E-mail/chatter
2.  Word processing/message generator
3.  Imagery manipulation
4.  Communications interfaces/map graphics
5.  Briefing tools/utilities, and
6.  Desktop video/voice
JDISS can be utilized in any context which requires the connectivity and interoperability with the intelligence systems. This product has been accepted as part of the GCCS suite of products. This means that the experts from the GCCS Executive Agent have created and evaluated the quality and applicability of this product for use within the GCCS domain for the Department of Defense.
2.8   4 TACTICAL EXPLOITATION SYSTEM - NAVY
Tactical exploitation system—Navy (TES-N) is the Navy shipboard implementation of the Army tactical exploitation system (TES-A). TES-N is presently installed only on PAC Fleet CVNs. It is an integrated, scalable, multi-intelligence system specifically designed for rapid correlation of national and theater ISR information to support network-centric operations. TES-N provides the warfighting commander with access to NRT, multi-source, and continuously updated day/night battle space ISR information. TES- N supports strike operations using numerous ISR collection planning, data correlation, geo-location, data dissemination, and storage functions.
It is interoperable with other service derivatives of the TES system: TES-A, the Marine Corps' tactical exploitation group (TEG), and the Air Force's ISR manager.
2.8   5 INTEGRATED BROADCAST SYSTEM
IBS has integrated several existing intelligence and information dissemination systems into a single system of broadcasts that will allow for the receipt of data via a single receiver (the joint tactical terminal). IBS will disseminate threat avoidance, targeting, maneuvers, force protection, target tracking, and target/situation awareness information, and will be continuously refined by data from national, theater, and tactical sensors. The reported information will contain unique references (e.g., report or track/event number) to allow IBS producers and users to correlate IBS products. IBS will allow the tactical user to construct successively detailed intelligence pictures of the battlespace. IBS will interface with Tactical Data Links (TDLs) such as Link 16 and joint variable message formats (VMFs) networks to ensure a seamless flow of intelligence information onto those networks.
The IBS architecture will be theater-based dissemination with global connectivity through terrestrial and high capacity communications paths. IBS will take advantage of the communications paths users already have by implementing an information management scheme integrated with other DOD information management systems (e.g., GBS information dissemination manager).
The effective dissemination of NRT intelligence data requires secure, worldwide data communications with prioritized use of available bandwidth between producers and users at all echelons of command. The existing components of the IBS are:
1.  Simplex (IBS-S) — formerly known as the TRAP data dissemination system (TDDS).
2.  Interactive (IBS-I) — formerly known as the tactical information broadcast service (TIBS).
3.  Network (IBS-N) — formerly known as the NRT dissemination (NRTD) system.
4.  LOS (IBS-LOS) — formerly known as the Tactical Reconnaissance Intelligence eXchange System (TRIXS).
Additionally, TADIXS-B is currently part of the overall IBS network but will not migrate into the final IBS architecture. The legacy intelligence dissemination systems were developed to support the operational requirements of specific groups of users. They each provide a portion of the total operational requirements necessary for an effective intelligence data dissemination architecture that supports the warfighter. IBS will migrate (combine) these legacy systems into a new system that has theater-focused dissemination architecture, with global connectivity, and uses a common information transfer language (standardized message formats). For the USN, the strategy for the implementation of IBS will be known as the Maritime Integrated Broadcast System (MIBS).
2.8.6   RADIANT MERCURY
Radiant Mercury is a hardware and software application that automatically sanitizes and downgrades formatted data from SCI to GENSER. It is also used to sanitize data from U.S.-Only to Releasable for sharing with allied and coalition partners.
It only sanitizes formatted (OTG family, USMTF family, tabular, TDMIF, NITF, etc.) data. Message transliteration provides interoperability with other systems by allowing one format to come in and multiple different formats with the same data to go out (see Figure 2-16). The headers of NITF imagery files are formatted extensively, and Radiant Mercury is able to perform all of its capabilities on the header. Radiant Mercury cannot examine the image itself, so classified objects in the image pixels will pass through a Radiant Mercury screening untouched.
Radiant Mercury capabilities include:
1.   Automating sanitization and guarding from higher to lower classifications
2.   Downgrading to lower classification levels
3.   Providing message format transliteration
4.   Facilitating releasability to allies
5.   Providing communications port guard (low to high)
6.   Providing mechanism for data field integrity
7.   Providing mechanism for selected data field checking
8.   Providing a complete audit record
9.   Supporting post event reconstruction
 
7 SENSITIVE COMPARTMENTED INFORMATION NETWORKS
SCI networks (formerly SCI ADNS) provide multimedia delivery of tactical, administrative and intelligence information to ships at sea and provide ships access to shore cryptologic and intelligence resources. SCI networks are based on the integration of COTS/GOTS protocols, processors, and routers and provide network services such as secure e-mail, chat, websites, and file transfer.
The implementation of SCI networks will enable existing communications/network programs to migrate away from stove piped IXS protocols with their associated communications paths toward a single network with voice, video, and data transmission based on the TCP/IP protocol.

Depending on individual ship configuration, SCI networks use DSCS SHF, CWSP, UHF DAMA, EHF LDR/MDR, and Inmarsat-B HSD RF satellite connectivity through a single ADNS point of entry. Since the ADNS network operates at the GENSER SECRET level, SCI data is in-line encrypted to allow transport over the ADNS backbone using Motorola network encryption system (NES) devices. NES is capable of providing data confidentiality and integrity and peer identification and authentication, as well as
mandatory/discretionary access control services. IP tunneling via the SIPRNET is used by SCI networks to reduce stovepipe connectivity, simplifies NES and network administration, and provides for secure alternate routing via standard ADNS connectivity.
Compartmented traffic, other than SI, is routed by SCI-ADNS to BORDERGUARD equipment and a separate computer workstation in SSES for use by appropriately cleared personnel.
2.8.8     JOINT WORLDWIDE INTELLIGENCE COMMUNICATIONS SYSTEM (JWICS)
The JWICS is operated by the Defense Intelligence Agency (DIA) as a secure global network designed to meet the requirements for TS/SCI multimedia intelligence communications worldwide. It provides users an SCI-level high-speed multimedia network using high-capacity communications to handle data, voice, imagery, and graphics. Secure e-mail, chat rooms, point-to-point and multipoint VTCs, broadcast of the DIN, and website access are the primary uses of JWICS by afloat users. The system also provides network services for collaborative electronic publishing, the electronic distribution of finished intelligence, and tools to accommodate the transfer of reference imagery, maps, and geodetic materials, as well as other high-end graphics products.上海翻譯公司完成通信設(shè)備英文翻譯

世聯(lián)翻譯-讓世界自由溝通!專業(yè)的全球語言翻譯供應(yīng)商,上海翻譯公司專業(yè)品牌。絲路沿線56種語言一站式翻譯與技術(shù)解決方案,專業(yè)英語翻譯、日語翻譯等文檔翻譯、同傳口譯、視頻翻譯、出國外派服務(wù),加速您的全球交付。 世聯(lián)翻譯公司在北京、上海、深圳等國際交往城市設(shè)有翻譯基地,業(yè)務(wù)覆蓋全國城市。每天有近百萬字節(jié)的信息和貿(mào)易通過世聯(lián)走向全球!積累了大量政商用戶數(shù)據(jù),翻譯人才庫數(shù)據(jù),多語種語料庫大數(shù)據(jù)。世聯(lián)品牌和服務(wù)品質(zhì)已得到政務(wù)防務(wù)和國際組織、跨國公司和大中型企業(yè)等近萬用戶的認可。
  • “貴司提交的稿件專業(yè)詞匯用詞準確,語言表達流暢,排版規(guī)范, 且服務(wù)態(tài)度好。在貴司的幫助下,我司的編制周期得以縮短,稿件語言的表達質(zhì)量得到很大提升”

    華東建筑設(shè)計研究總院

  • “我單位是一家總部位于丹麥的高科技企業(yè),和世聯(lián)翻譯第一次接觸,心中仍有著一定的猶豫,貴司專業(yè)的譯員與高水準的服務(wù),得到了國外合作伙伴的認可!”

    世萬保制動器(上海)有限公司

  • “我公司是一家荷蘭駐華分公司,主要致力于行為學(xué)研究軟件、儀器和集成系統(tǒng)的開發(fā)和銷售工作,所需翻譯的英文說明書專業(yè)性強,翻譯難度較大,貴司總能提供優(yōu)質(zhì)的服務(wù)�!�

    諾達思(北京)信息技術(shù)有限責(zé)任公司

  • “為我司在東南亞地區(qū)的業(yè)務(wù)開拓提供小語種翻譯服務(wù)中,翻譯稿件格式美觀整潔,能最大程度的還原原文的樣式,同時翻譯質(zhì)量和速度也得到我司的肯定和好評!”

    上海大眾

  • “在此之前,我們公司和其他翻譯公司有過合作,但是翻譯質(zhì)量實在不敢恭維,所以當我認識劉穎潔以后,對她的專業(yè)性和貴公司翻譯的質(zhì)量非常滿意,隨即簽署了長期合作合同�!�

    銀泰資源股份有限公司

  • “我行自2017年與世聯(lián)翻譯合作,合作過程中十分愉快。特別感謝Jasmine Liu, 態(tài)度熱情親切,有耐心,對我行提出的要求落實到位,體現(xiàn)了非常高的專業(yè)性�!�

    南洋商業(yè)銀行

  • “與我公司對接的世聯(lián)翻譯客服經(jīng)理,可以及時對我們的要求進行反饋,也會盡量滿足我們臨時緊急的文件翻譯要求。熱情周到的服務(wù)給我們留下深刻印象!”

    黑龍江飛鶴乳業(yè)有限公司

  • “翻譯金融行業(yè)文件各式各樣版式復(fù)雜,試譯多家翻譯公司,后經(jīng)過比價、比服務(wù)、比質(zhì)量等流程下來,最終敲定了世聯(lián)翻譯。非常感謝你們提供的優(yōu)質(zhì)服務(wù)。”

    國金證券股份有限公司

  • “我司所需翻譯的資料專業(yè)性強,涉及面廣,翻譯難度大,貴司總能提供優(yōu)質(zhì)的服務(wù)。在一次業(yè)主單位對完工資料質(zhì)量的抽查中,我司因為俄文翻譯質(zhì)量過關(guān)而受到了好評�!�

    中辰匯通科技有限責(zé)任公司

  • “我司在2014年與貴公司建立合作關(guān)系,貴公司的翻譯服務(wù)質(zhì)量高、速度快、態(tài)度好,贏得了我司各部門的一致好評。貴司經(jīng)理工作認真踏實,特此致以誠摯的感謝!”

    新華聯(lián)國際置地(馬來西亞)有限公司

  • “我們需要的翻譯人員,不論是筆譯還是口譯,都需要具有很強的專業(yè)性,貴公司的德文翻譯稿件和現(xiàn)場的同聲傳譯都得到了我公司和合作伙伴的充分肯定。”

    西馬遠東醫(yī)療投資管理有限公司

  • “在這5年中,世聯(lián)翻譯公司人員對工作的認真、負責(zé)、熱情、周到深深的打動了我。不僅譯件質(zhì)量好,交稿時間及時,還能在我司資金周轉(zhuǎn)緊張時給予體諒�!�

    華潤萬東醫(yī)療裝備股份有限公司

  • “我公司與世聯(lián)翻譯一直保持著長期合作關(guān)系,這家公司報價合理,質(zhì)量可靠,效率又高。他們翻譯的譯文發(fā)到國外公司,對方也很認可�!�

    北京世博達科技發(fā)展有限公司

  • “貴公司翻譯的譯文質(zhì)量很高,語言表達流暢、排版格式規(guī)范、專業(yè)術(shù)語翻譯到位、翻譯的速度非常快、后期服務(wù)熱情。我司翻譯了大量的專業(yè)文件,經(jīng)過長久合作,名副其實,值得信賴�!�

    北京塞特雷特科技有限公司

  • “針對我們農(nóng)業(yè)科研論文寫作要求,盡量尋找專業(yè)對口的專家為我提供翻譯服務(wù),最后又按照學(xué)術(shù)期刊的要求,提供潤色原稿和相關(guān)的證明文件。非常感謝世聯(lián)翻譯公司!”

    中國農(nóng)科院

  • “世聯(lián)的客服經(jīng)理態(tài)度熱情親切,對我們提出的要求都落實到位,回答我們的問題也非常有耐心。譯員十分專業(yè),工作盡職盡責(zé),獲得與其共事的公司總部同事們的一致高度認可�!�

    格萊姆公司

  • “我公司與馬來西亞政府有相關(guān)業(yè)務(wù)往來,急需翻譯項目報備材料。在經(jīng)過對各個翻譯公司的服務(wù)水平和質(zhì)量的權(quán)衡下,我們選擇了世聯(lián)翻譯公司。翻譯很成功,公司領(lǐng)導(dǎo)非常滿意�!�

    北京韜盛科技發(fā)展有限公司

  • “客服經(jīng)理能一貫熱情負責(zé)的完成每一次翻譯工作的組織及溝通。為客戶與譯員之間搭起順暢的溝通橋梁。能協(xié)助我方建立專業(yè)詞庫,并向譯員準確傳達落實,準確及高效的完成統(tǒng)一風(fēng)格�!�

    HEURTEY PETROCHEM法國赫銻石化

  • “貴公司與我社對翻譯項目進行了幾次詳細的會談,期間公司負責(zé)人和廖小姐還親自來我社拜訪,對待工作熱情,專業(yè)度高,我們雙方達成了很好的共識。對貴公司的服務(wù)給予好評!”

    東華大學(xué)出版社

  • “非常感謝世聯(lián)翻譯!我們對此次緬甸語訪談翻譯項目非常滿意,世聯(lián)在充分了解我司項目的翻譯意圖情況下,即高效又保質(zhì)地完成了譯文�!�

    上海奧美廣告有限公司

  • “在合作過程中,世聯(lián)翻譯保質(zhì)、保量、及時的完成我們交給的翻譯工作�?蛻艚�(jīng)理工作積極,服務(wù)熱情、周到,能全面的了解客戶的需求,在此表示特別的感謝。”

    北京中唐電工程咨詢有限公司

  • “我們通過圖書翻譯項目與你們相識乃至建立友誼,你們報價合理、服務(wù)細致、翻譯質(zhì)量可靠。請允許我們借此機會向你們表示衷心的感謝!”

    山東教育出版社

  • “很滿意世聯(lián)的翻譯質(zhì)量,交稿準時,中英互譯都比較好,措辭和句式結(jié)構(gòu)都比較地道,譯文忠實于原文。TNC是一家國際環(huán)保組織,發(fā)給我們美國總部的同事后,他們反應(yīng)也不錯�!�

    TNC大自然保護協(xié)會

  • “原英國首相布萊爾來訪,需要非常專業(yè)的同聲傳譯服務(wù),因是第一次接觸,心中仍有著一定的猶豫,但是貴司專業(yè)的譯員與高水準的服務(wù),給我們留下了非常深刻的印象�!�

    北京師范大學(xué)壹基金公益研究院

  • “在與世聯(lián)翻譯合作期間,世聯(lián)秉承著“上善若水、厚德載物”的文化理念,以上乘的品質(zhì)和質(zhì)量,信守對客戶的承諾,出色地完成了我公司交予的翻譯工作�!�

    國科創(chuàng)新(北京)信息咨詢中心

  • “由于項目要求時間相當緊湊,所以世聯(lián)在保證質(zhì)量的前提下,盡力按照時間完成任務(wù)。使我們在世博會俄羅斯館日活動中準備充足,并受到一致好評�!�

    北京華國之窗咨詢有限公司

  • “貴公司針對客戶需要,挑選優(yōu)秀的譯員承接項目,翻譯過程客戶隨時查看中途稿,并且與客戶溝通術(shù)語方面的知識,能夠更準確的了解到客戶的需求,確保稿件高質(zhì)量�!�

    日工建機(北京)國際進出口有限公司

99久久国产综合精品尤物婷婷| 黑人粗大区一区二视频| 97理论三级九七午夜在线观看| 久久久一二三区精品| 艳妇荡乳欲伦2中文字幕| 亚洲国产在线精品国自产拍影院| 高清国产美女在线观看| 成人高清影院| 久久国产这里只精品免费| 人妻出差精油按摩被中出| 一区二区三区吞精| 亞洲國產歐美在線觀看| 久久综合老色鬼网站| 亚洲一区二区精品久久av女优| 欧美日韩二区视频| 国产视频精选全网| 精品在线亚洲影院| 国产精品看片在线| 人妻日韩AV无码一区二区| 最近最新中文字幕2018| 久久精品国产99国产精品严洲 | 免费国产一区二区8X| 欧美亚洲精品另类| 亚洲无遮挡一级精品视频| 欧美在线免费亚洲| 激情精品视频在线观看| 搡老女人老妇老熟女50ⅹxxx| 电影《色戒》未删减版| 制服丝袜美腿 AV影院| 国产刺激一女多男一区二区| 国产一级大片免费视频| 好紧好湿好爽免费视频美女做 | 在线亚洲无码| 日韩欧美自在线观看亚洲精品福利片| AV无码免费1区2区3区| 国语自产拍在线观看99网| 在线观看无码三级少妇| 黄色大片一级毛片视频| 97久久国语露脸精品对白| 亚洲tv日韩tv国产tv无码综合| 色欲久久国产色av免费看老司| 成人高清毛片视频| 黑人巨大精品无码专区| 榴莲APP下载汅网站进入官网| 中文字幕日韩亚洲视频在线| 国产午夜福利精品理论片久久 | 亚洲无码免费看在线视频| 在线观看日韩www视频免费| 欧美精品日韩精品在线| 亚洲色大全在线视频观看| 福利社区在线观看| 日韩欧美一区二区精品久久asspics人体japanese | 亚洲日本韩国成人在线视频 | 日韓三級免費看| 成人国产精品视频| 熟女一区二区天天操夜夜操| 久久黄色美女小视频网站| 欧美一区二区免费播放| 911精品國產91久久久久| 97人人视频波多野结衣蜜月| 无码国产福利av私拍导航| 欧美在线三级艳情网站亚洲成人99| 麻豆国产精品VA白浆| 日韩在线视频高清| 很很鲁免费视频在线观看| 国产精品www在线观看| 亚洲激情午夜视频| 岳乳丰满一区二区三区| 精品一区二区性爱| 成人国产经典精品视频| 国产日批视频免费在线播放| 二级黄色录像片免费播放 | 亚洲色成人www在线观看| 欧美综合色网| 在线观看国产一区二区三区| 91好色先生下载污| 妓女妓女一区二区三区在线| 日韩无码一区二区高清视频| 人妻少妇精品久久人妻| 日韩毛片午夜在线观看| 2022v视频无码高清网站| 欧美性色aⅴ视频一区日韩精品| 加勒比在线视频频図鑑| 中文字幕精品三级视频| 九九九九在线精品免费视频| old老太videos老妇中国| (愛妃精選)免费无码毛片一区二区 | 亚洲av美女在线播放啊| 成人国产一区二区三区精品小说| 自拍影视无码免费| 麻豆视频传媒APP| 91香蕉视频国产免费下载| 久久精品2021国产| 秋霞影院韩国伦片在线播放| 亚洲欧美日产国产视频| 成人午夜福利小视频| 了解最新精品国产拍拍拍无遮挡| 99热国产这里只有精品99| 狼群影院中文字幕| 香蕉国产人午夜视频在线| 精性国产在线视频| 日本www久久久久久久久| 1024大香蕉手机看片| 美女裸体视频在线无卡黄色免费网站| 免费AV无码不卡在线网站| 国产精品青草婷婷| 久久精品囯產亞洲av麻豆色欲| 成年女人喷潮视频免费观看| 999福利精品久久久| 野花社区最新免费视频| 一级aa免费视频毛片| 人妻撑开合不拢流出白浆视频| 歐美成人久久久| 全免费a级毛片免费| 亚洲国产香蕉视频欧美明星换脸| 久久精品視頻只有這里| 美女我无遮挡被艹网站自慰| 音影先锋男人在线资源网| 国产精品剧情在线蜜臀| 视频一区亚洲专区| 亚洲日韩国产精品久久久综合网 | 好了AV第四综合无码久久| 草莓视频app下载18| 亚洲男人的天堂在线n| 国:产一级黄色电影| 国产91九色在线| 国产又黄又爽又大的免费视频| 亚洲一品二品三品精区网站| 伊人久久香综合蕉五月天 | 国产午夜有码精品免费看| 国产成人69天堂| 亚洲成人特级毛片| 亚洲无码高清免费视频亚洲| 老实人夫被爆炒主角们爆炒了| 国产精品网站 夜色| 97一区二区在线播放| 精品久久久久久人妻黑人| 4se人人视频在线| 大家都能看的免费毛片视频| 国产欧美精品一区二区粉嫩 | 欧美嘿咻嘿咻视频免费| 欧美韩国亚洲精品综合a| 色五月丁香五月综合五月橹| 亚洲麻豆精品久久久| 麻豆视频传媒APP | 中文字幕亚州欧美专区| 曰韓無碼二三區中文字幕| 欧美日韩国产精品动漫精品| 嘟嘟嘟大豆行情网www| 伊人成综合网| 国产精品电影不卡无码| 国产精品美女久久久浪潮?v| 欧美日韩aⅴ人妻| 欧美激情xxxx孕妇| 精品黄色国产在线观看| 日韩视频在线观看免费6080| 日本一区二区三区在线视频观看免费 | 国产又爽又黄免费网站| 国产精品久久成年人免费视频| 免费成人一级毛片电影| 女人18毛片18A级水真多| 十八禁在线免费观看| 这里只有好看的a视频| 国产精品久久久久片免费又是看| 久久久888精品视频| 男女做爰猛烈吃奶吃出乳液| 二区三区中文字幕在线观看| 国产高清不卡免费在线观看| 99天天操天天做天天| 一级aa免费视频毛片| 2022久久最新国产精品| 鲁大师视频在线观看免费播放| 亚洲无码高清免费视频亚洲| 色情无码WWW视频无码区| 国产精品久久久久久五月天加勒比| 成年女人喷潮视频免费观看| 美人+妻+影音先锋| 久久免费视频777| 拔萝卜免费观看高清视频下载 | 中文字幕无?v免费久久| 欧美色图一区二区| 午夜在线不卡精品国产| 一级毛片av一区| 欧美日在线观看视频| 中文字幕人妻久久精品一区二区| 精品日韩久久一区| 亚洲tv日韩tv国产tv无码综合| 北条麻妃青青久久av| 91精品网站天堂系列在线播放| 亚洲中文字幕乱码影院在线| 中文字幕一二区二三| 欧美精品v日韩精品v| 日韩精品视频无码一区我們每天24小時不間斷| 成人中文字幕亚洲乱码| 久久九九青青国产精品| 亚洲第一天堂日韩| 电车痴汉侵犯短裙人妻| 亚洲欧美另类久久| 一级做a爰片久久毛片免费看| 欧美在线观看不卡一区二区三区| 国产精品视播放一区二区三区| 久久精品99无色码中文字幕| 国产刺激一女多男一区二区| 香蕉在视频线精品视频| 国产美女露底激情视频| 国语对白久久精品视频| 惠民福利国产精品无码aV一区二区三区| 午夜福利在线免费| 亚洲午夜AV无码成人福利| 中文字幕大屁股熟女乱| 波多野结衣迅雷下载| 制服丝袜物喷水亚洲综合精品 | 欧美亚州国产精品| 国产一区二区三区在线观看色网站| 97久久一精品人妻人人玩| 日韩精品一区二区在线观看视频| 國產午夜人做人免費視頻中文| 久久精品国产亚洲av夜色九虎| 中文一区二区视频成人二区| 日韩精品一区二区在线观看视频| 一级黄色毛片在观看| 91久久久韩系亚洲| 91视频污APP色版下载| 中文字幕AV二区| 国产亚洲欧美ai在线看片| 国产自慰喷水视屏| 免费国产一区二区久久| 精品妇人妻视在线视频| 国产αV无码日韩αV无码网站| 伊人色婷婷五月综合久久97| 高清 无码 自拍 日韩| 亚洲成a人无码无卡| 欧美成人国产精品一区二区 | 日韩无码一级黄色毛片| 日本www成人网站在线观看 | 欧洲精品高清无码一区二区三区| 96久久自偷自偷国产精品| 偷自拍亚洲综合在线| 国产精品视频毛片| 天天看天天噜噜噜在线视频| 国产精品麻豆综合在线| 973午夜伦伦电影论片| 日韓歐美一區二區三區不卡| 91短视频在线观看污污污| 国产人与禽ZoZ0性伦69| 日韩免费福利剧场| 国产乱子伦午夜精品视频| 张警官撞玻璃9分10秒| 亚洲中文字幕一区二区不卡国产 | 亚洲手机在线成人| 欧美.久久久.精品| 自拍亚洲欧美另类动漫| 高清少妇欧美中文| 色噜噜狠狠狠狠狠色综合| 国产精品久久久久片免费又是看| 久久美女视频黄片| 国产欧美精品一区二区粉嫩| 女性喷液过程高清免费视频 | 黑人巨大精品无码专区| av日韩色情三级在线看| 亚洲性爱A不卡| 497799欧洲版的国产suv| 鲁丝片一区二区在线观看| 99精品無碼人妻一區二區三區| 国产在线观看h尤| 国产精品国产三级国产午| 凹凸在线一区二区三区熟妇| 91超级好看一区二区三区| 鲁丝片一区二区在线观看| 香蕉国产人午夜视频在线| 欧美91成人亚洲播放网站| 91精品国产一二三产区在线观看| 夜夜欢av一区二区三区| 91香蕉视频一区二区在线观看国产b站视频 | 成人3d动漫一区二区三区| 国产口爆吞精在线视频免费观看| 一级特级女人18真人片免费视频| 国产人妻高清国产拍精品| 欧洲熟妇精品视频在线成视频| 亚洲免费视频免费观看| 亚洲一区二区精品按摩| 日韩产品和欧美产品的区别| 肛交的免费视频91视频| 丰满爆乳无码专区线一区二区三区| 四虎永久在线免费视频一二区| 老司机带带我精品视频| 国产一级久久女人毛片| 亚洲日本日本精品18不卡| 亚洲欧洲日产韩国夜夜高潮| 国产一级二级三级免费| 在线国产视频一区二区三区| 日韩国产精品99久久久久| 天天草天天射| 嘟嘟嘟大豆行情网www| 凹凸在线一区二区三区熟妇| 久久夜色精品国产亚洲| 车里要了好多次天天影院网| 国产毛片的高清视频| 亚洲国产1区2区3区| 欧美97人人爱人人干| 精品久久久久久无码人妻外国| 欧美牲交?欧美牲交| 怡红院免费的全部视频国产a| 国产丰满老女人A片免费观看| 今日亚洲2021在线观看| 图片区电影区激情区小说区| 884aa四虎影成人精品| 国产精品欧美日韩视频播放一区| 伊人影院在线播放| 中文字幕中文乱码51精品| 日韩乱女乱妇熟女熟妇av| 国产经典无码在线免费看| 27报视频十八禁| 韩国美女一级毛片| 日本成a人片在线观看网站| 黄色一线免费高清在线视频16| 秋霞电影午夜伦免费观看| 久久无码精品国产亚洲AV未满十八 | 色偷偷色噜噜狠狠网站野外| 欧美另类亚洲日韩精品一区二区不卡| 亚洲国产香蕉视频欧美明星换脸| 亚洲av成人在线观看| 国产盗摄精品一区二区酒店等| 91精品国产成人久久久久久| 自拍影视无码免费| 久久精品国产亚洲aⅤ麻豆图片| 99国产精品视频一区二区69堂| 嫩草国产等最新內容| 亚洲欧美日产国产视频| 国产原创剧情情欲放纵| 性白俄罗斯高清xxxxx| 日韩精品亚洲色大成网站| 日韩在线欧美观看| 精品91自产拍在线观看99re| 亚洲一级午夜福利| 亚洲日本日本精品18不卡| 日韩国产欧美中文字幕在线播放| 亚洲天堂在线观看完整版| 伊人查蕉在线综合| 国产精品有码无码脛∨在线| 国产欧美AA一区二区三区视频| 免费精品无码成人片在线观看| 天堂网2021天堂手机版| 973午夜伦伦电影论片| 91成人精品亚洲高清在线观看 | 亚洲日韩制服另类| 三级在线看中文字幕完整版| 成年无码AV片在线蜜芽| 亚洲最新无码2021| 日本羞羞视频在线观看| 欧洲亚洲成人精品| 在线观看精品一区二区三区| 春色 都市 亚洲 小说区| 日韩在线试看一区96丝袜| 国产精品自偷自拍| 亚洲av成人在线观看| 久久国产精品15色老板| 白丝被弄羞涩娇喘动态图| 好了AV第四综合无码久久| 欧美三级电影天堂| 久久一区二区美女视频网| 久热这里只有国产中文精品 | 国产看片在线观看一区| 国产91作品一区在线观看| 国产精品白丝久久久| 色噜噜狠狠狠狠狠色综合 | 亚洲v欧美v国产ⅴ在线成| 国产av无码变态另类专区| XVIDEOS免费人成视频网址| 久久er热这里只有国产中文精品 | 成年人在线观看网站| 无码人妻不卡久久一区二区| 国内高清A自拍视频| 韩国午夜理论a三级在线观看| 亚洲欧美一区二区三区69| 在厨房拨开内裤进入在线视频| 亚洲精品成人一二三区| 欧美日韩精选在线观看| 国产99视频免费精品| 色吧超碰97人妻| 亚洲欧美日韩综合第一| 国产精品色哟哟免费看麻豆| 中文字幕美谷朱里精品久久| 男生和女生在一起打牌的很痛的app| 精品妇人妻视在线视频| 日韩高清一区二区第50页| 国产精品九九久久九九国产| 9久热在线精品996热视频观看| 亚洲高清美女在线| 在线观看不卡一区二区三区 | 亚洲成人一区久久| (凹凸)青草制服丝袜一区第一页| 中文成人无码国产亚洲| 小视频播放亚洲欧美| 国产成人av大片大片在线播放| 久久久久亚洲精品日久生情 | 国产精品一区二区三区免费久久| 伊人久久综在合线亚洲2019}| 九九九国产在现视频| 欧美成人专区| 久久黄色高清视频。| 日韩午夜在线高清成人| 韩国三级电影久久久| 国产成人AV一区二区三区| 国产指交视频在线观看| 正在播放极品白嫩真实面试| 最近最中文字幕视频| 日本久久高清一区二区三区| 黑人粗大区一区二视频| 尹人在线视频| 亚洲 欧洲 日产 专区| 久久黄色高清视频。 | 影音先锋国产在线| 久久综合综合久久?V在钱| 99久久99久久久精品| 中国毛片在线观看| 伊人久久大香線蕉AV五月天| 久久久久国产精品嫩草影院| 日产精品一二三四区国产亚洲| 丝袜在线视频网站| 中文字幕黄色在线观看| av无码av高潮av喷吹免费| 日韩免费无码人妻波多野| 色婷婷狠狠干| 宋雨琦ai人工智能造梦| 欧美日韩精选在线观看| 97久久久人妻一区精品| 高清国产在线日韩欧美| 亚洲午夜一区二区三区福利| 国产区清纯高中生| AV免费不卡国产在线观看| 国产视频亚洲精品| 91老师秘片黄在线观看| 91短视频在线观看污污污| 被cao哭高H调教1v1H| 尊龙凯时·(中国区)人生就是搏!| 免费无码a∨片在线观看| 2020日韩中文字幕| 欧美成人国产精品一区二区 | av日韩色情三级在线看| 扒开老女人p大荫蒂warmth| 国产情侣实拍在线播放| 一级在线中文观看日韩| 欧美成人国产精| 亚洲精品高清你懂的| 有没有试过一前一后两个人| 日本不卡免费新一二三区3| 惠民福利国产AV无码专区亚洲AV毛片搜| 91精品國產免費久久國語蜜臀| 国产亚洲综合秋霞影院国产| 国产 无码 免费| 99精品亚洲国产精品| 欧美日韩人成国产自产高清 | 16处破外女出血视频在线观看| 色综合久久中文字幕无码色欲| 午夜免费福利av| 久久婷婷色中文字幕免费高清| 日韩一区二区三区在线观看照片| 一区二区三区午夜片| 久久久综合视频一本| 日韩和的一区二区| 日本特黄特色大片免费在线观看| 久久久久久中文字幕人妻69| 超碰真人在线| 女人18毛片18A级水真多| 在线亚洲无码| 日韩殴无码中文字幕| 久久午夜青青草原影院| 熟女一区二区天天操夜夜操| 国产精品日产精品久久| 亚洲精品国产导航一区二区| 三级片欧美在线| 成年女人喷潮视频免费观看| 亚洲欧美伊人久久| 亚洲国产精品久久一线APP| 欧美日韩精选在线观看| 父子1v2她还是你的小心肝| 日韩欧美一区二区三区成人精品| 欧美激情四射一区二区在线| 欧美日韩国产激情另类| 果冻国产精品麻豆成人av电影| 日本特黄特色大片免费在线观看 | 国产精品中文一区二区三区| 亚洲午夜久久免费| 另类小说图片区日本久久大视频| 蜜臀98精品國產免費觀看| 午夜性爽视频男人的天堂在线| 久久久免费丁香五月| 国产一级性爱一级视频自拍| 偷自拍亚洲综合在线| 无码国产精品一区二区蕉蕉免费式 | 少妇中文字幕久久精品无码| 国:产一级黄色电影| 91精品国产综合久久久亚洲日韩| 免费国产成人无码学生妹| 亚洲中文字幕在线有码| 国产亚洲欧美ai在线看片| 中国捆绑女裸绳艺视频| 欧美性生活视屏精品| 欧美sese尤物一区二区| A级成人婬片免费看无码| 国产一级大片免费视频| 香蕉久久AB一区二区三区| 国产麻豆精品成人毛片| 亚洲欧美日韩制服综合| 一区二区三区午夜片| 另类小说图片区日本久久大视频| 91精品国产91久久久久久无码天美 | 国产福利 在线播放| 奶水美人双性h美人多汁| 日韩在线视频高清| 欧洲成熟女人色惰片| 国产一级黄aa爽| 在线观看亚洲精品视频| 丝袜美足国产一区在线| 谁有操逼毛片网站| 精品国产青草久久久久福利| 91香蕉视频下载安装| 青青青国产女精品视频| 日本少妇一级婬片HD69网站| 国产日韩精品在线一区二区三区| 國產午夜人做人免費視頻中文| a级片在线免费播放| 亚洲欧美日韩精品久久久一区二区| 草莓视频app下载18| 91在线无码精品秘九色APP| 精品无码一区二区三区少妇97| 91久久成人亚洲精品观看| 丝袜足脚交91精品| 日韩国产欧美成人综合另类| 亚洲国产视频二区| 久久图片视频小说| 在线播放第一页国产自拍手机直播| 黄色av网页地址一| 欧美性爱综合网站99国品区区视频| 中文精品影视日本| a级毛片高清免费视频在线| 成人午夜福利小视频| 韩国三级中文字幕HD久久精品| 懂色午夜一区二区三区| 榴莲APP下载汅网站进入官网 | 色呦呦网站免费| 国产激情福利| metart精品白嫩的asspics | 跪趴着被主人狠狠调教| 超碰97人人模人人爽人喝| 老师解开乳罩喂奶我脱她内| 国产精品亚洲日韩高清资源| 日韩A∨无码综合久久五月| 国产一久久久久久久久| 欧美日韩高清不卡一区| 日韩av在线在线观看| 五月婷婷丁香综合| 欧美性爱福利视频| 日韩一区二区三区四区在线播放| 亚洲欧美中文日韩v在线在线观看| 中国精品视频在线一区二区| 中文字幕欧美熟妇一区| 亚洲中文字幕一区二区三区在线91| 91在线无码精品秘九色APP| 久久视频精品38线视频在线观看 | 国产一级内射麻豆91| 亚洲欧美变态| 国产无码不卡视频| 国产刺激一女多男一区二区| 日韩久久精品一区二区| 国产成人福利在线视频播放下载| 香蕉精品视频一区二区三区| 黄色成人香蕉视频网站| 韩国三级电影久久久| 插我一区二区在线观看| 99久久免费只有精品国产在| 欧美午夜在线观看免费完整版| 日韩人妻久久久av一区二区 | 成年人视频久久免费| 亚洲va欧美va国产va天堂影| 一女享受夫奴口舌伺候| 蜜臀aⅴ永久无码一区二区| A欧美亚洲日韩在线观看| 午夜亚洲亚洲精品福利| 亚洲AV日韩AV高清在线播放| 97超碰国产精品| 1024手机在线看片| 亚洲国产激情小说视频| 清纯唯美欧美综合第一页| 少妇人妻中文字幕hd| 欧洲熟妇精品视频在线成视频| av无码av高潮av喷吹免费| 亚洲永久免费无码打屁股| 中文字幕久久精品有码综合网| 久久精品99国产国产精人s| 中文字幕不卡乱偷在线| 亚洲AV无码国产精品色午夜久久| 国产第一页草草影院ccyy| 手机在线看片亚洲一区| jizz一区二区在线观看| 男生女生一起怼怼的app下载大全| av中文字幕不卡无码| 日韩一区二区三区在线观看照片| 日韩精品老熟女视频网站免费观看| 亚洲熟妇真实自拍另类| 日产一级毛片免费| 精品国产女主自在线久草| 精品精品男人的天堂在线| 久久亚洲精品少妇| 97人人视频波多野结衣蜜月 | 一本色道無碼道dvd在線觀看| good电影在线观看三级中文 | 91久久精品国产免费一区| 日韩一线二线伦理片免费观看网页| 中文字幕一区日韩无码| 黄色片久久美女啊啊啊内色| 一区二区人人在线| 四虎国产精品永久在线无码首页| 超碰97人人模人人爽人喝| 女人毛片免费看一分钟| 了解最新国产精品视频一区二区三区经 | 国产成人无码精品久久久亚洲精品人成无码中文毛片 | 精品国产一级黄色片| 国产精品无码天堂2021| 国产精品久久久久久五月天加勒比| 中国国模无码AV| 中文字幕乱码亚洲影视亚洲日本va午夜| 欧美A级毛片免费播敢| 极品人妻videos人妻| 一级特黄视频免费播放| 人妻精品久久一区二区| 亚洲 自拍 露出 极品| 在线免费观看国产视频| 久久影院午夜未满十八勿入| 欧美国产在线一区精品自拍| 亚洲日韩国产精品久久久综合网| 日本无码一区AⅤ二三区超碰| 无码日韩小说视频| 中国毛片在线观看| v影院一区二区三区自产不卡视频 午夜亚洲乱码伦小说区 | 婷庭九月天综合水蜜桃| 日韩无码一区二区高清视频| 午夜福利在线观看不卡| 歐美日韓一區二區視頻免費看| 国产91高潮流白浆在线播放un| 大屁股人妻女教师撅着屁股| 拔萝卜视频直播下载| 国产又粗又猛又大爽又黄的软件| 天堂网2021天堂手机版| 久久婷婷色中文字幕免费高清| 亚洲va欧美va人人爽老师| 成在线人av免费无码高潮喷水 | 成人A免费播放网站| 色吧超碰97人妻| 在线观看国产高清a| 日本免费一区二区三区看片| 精品妇人妻视在线视频| 久久99人妻精品涩爱噜噜噜蜜臀| 一进一出把女子干的全身抽搐| 奇米777四色欧美精品| 国产亚洲精品精品在线精品| ac网站不卡免费在线观看| 免费嗨片直播网中文字幕| 丁香五月久久激情综合中文字幕| 日本久久高清一区二区三区| 真实国产乱子伦对白在线播放| 久久久久久中文字幕人妻69| 欧美日韩国产三级久久| 一区二区毛片视频免费看| 在线三级网址| 亚洲av日韩国产激情| 亚洲一区二区三区aⅴ无码| 免费精品美女久久久久久久久久| 日韓三級免費看| 久久黄色高清视频。| 国产成人裸体片免费看| 国产在线一区二区三区乱码| 五月综合婷婷欧美| 9久热在线精品996热视频观看| 欧美激情诱惑在线观看| 自拍影视无码免费| 麻豆国产一区二区在线观看| 91麻豆极品99精品国产综合久久久| 久久精品国产AⅤ无码| 中文字幕无码色综合| 1024手机在线看片| 野花日本韩国视频免费高清观看| 美女欧美一区二区| 91亚洲黄色在线看| 亚洲国产日韩欧美综合在线一区二区三区 | 日韩欧群交p片内射中文| old老太videos老妇中国| 自慰在线观看18p| a毛片免费全部播放吃 | 免费黄色资源| 色就色综合偷拍区欧美| 在线观看精品成人综合视频 | 操小孩污视频在线免费观看| 久久久久av綜合網成人| 一区二区三区四区在线免费观看| 草草影院欧美三级日本| 惠民福利黄色成人网站免费无码av | 91久久精品国产免费一区| 一区二区三区不卡中文字幕| 亚洲中文字幕乱码影院在线| 亚州中文字幕不卡影院| 丁香婷婷深情五月丁香中文字幕 | 97视频人人做人人爱免费体验| 欧美群交一区二区大吊曰大逼| 日本午夜色噜噜| 69国产成人精品午夜福无毒| 亚洲欧州国产综合不卡在线免费视频| 五月天日韩AV电影| 日本丰满护士bbw| 欧美精品日韩精品在线| 精品在线欧美一区二区| 国产又长又粗达到性高潮的视频| aⅴ色综合久久天堂av色综合| 国产91黑人在线| 国产又爽又黄免费网站| 国产免看一级a一片成人AⅤ| 最新国免费看黄a级毛片| 性高湖久久久久久久久| 国产激情一区二区三区成人麻豆| 亚洲有码精品视频在线观看| 91欧美激情一区二区三区成人日韩99久久综合狠狠综合久久 | 国产精品美女在线免费| 99久久免费只有精品国产在 | 一本无码人妻在中文字幕免费经典| 久久美女视频黄片| 国产超级va在线观看视频| 精品卡通动漫在线观看视频一区| 色噜噜狠狠狠狠狠色综合| 午夜精品一区二区三区国产色欲| 中文字幕无码亚洲视频| 女人18一级毛片免费视频| 91视频污APP色版下载| 正在播放极品白嫩真实面试| 色婷婷精品国产黑人一区二区三区| 亚洲欧美中文日韩v在线在线观看| 特级做a爰片毛片免费看108| 亚洲 欧洲 日产 专区| 惠民福利久久精品国产亚洲7777 | 制服丝袜美腿 AV影院| 美女制服で視頻網站| 爱福利秒拍国产导航小视频| 国产一区二区三区不卡在线| 成人国产精品福利视频| 91超级好看一区二区三区| 中文又粗又大又硬毛 | 91精品國產免費久久國語蜜臀| 亚洲亚洲国产精品| 国产无码喷水| 九一视频免费版污| 1024手机在线看片| 欧美va亚洲天堂网| 十大禁止安装app软件入口免费| 亚洲欧美日韩另类色图 | av在线免费观看高清| 亚洲人成网站18岁禁止| 日韩美女粉嫩小泬在线精品| 好爽快点我受不了了视频| 91精品一二区久久无码电影| 亚洲欧美精品免费观看| 亚洲午夜无码毛片Av久久京东热| 手机成人免费视频| 人妻日韩AV无码一区二区| 一起嗟嗟嗟免费观看短片| 国产午夜一区二区在线观看m| 国产aⅤ一二三区无码视频| 成年人在线观看网站| 99RE8国产这里只有精品| 亚洲国产欧美日本韩中文字幕在线 | 日本天堂影音资源在线观看| 1024大香蕉手机看片| 97一区二区在线播放| 搡老女人老妇老熟女50ⅹxxx | 55夜色66亚洲精品| 污污视频免费网站| 亚洲一级午夜福利| 亚洲国产的精品太乱码一区二区 | 91久久精品国产免费一区| 69国产成人精品午夜福无毒| 成人无码视频在线观看| 在线观看片a免费不卡观看| 高清国产在线日韩欧美| 日日摸夜夜添无码无码a∨| 亚洲国语毛片在线看国产| 久久 久久 国内精品亚洲| 精品综合在线99亚洲青草91| 国产精品色哟哟免费看麻豆| 精品乱伦欧美国产| 韩国r级中文字幕在线播放| 榴莲APP下载汅网站进入官网| 免费美女视频一区| a级片在线免费播放| 天堂成人一区二区三区av片| 精品妇人妻视在线视频| 免费成人一级毛片电影| 日本特黄特色大片免费在线观看| 日日摸夜夜添无码无码a∨| 久蕉在线视频免费精品| 亚洲tv日韩tv国产tv无码综合| 亚洲av午夜福利无码精品一区| 91精品一区国产高清在线GIF| 白丝被弄羞涩娇喘动态图| 2020国产成人精品视频网站 | 欧美性生活视屏精品| 国产毛多水多女人A片色情| 精品国产AⅤ一区二区三区4区| 国产无遮挡裸体免费视频| 天堂av2017男人的天堂 | 国产一国产精品免费播放| 午夜福利男女xx00视频网站| 国产免费女明星色视频| 国产99视频免费精品| 国产偷窥熟女精品| 一级做a爱片高潮毛片| 国产又黄又爽的免费视频| 亚洲欧美日韩国产一区在线| 日本香蕉视频在线观看| 91香蕉视频在线观看分享的内容是很丰富的 | 日韩免费福利一区八区| 久久黄色高清视频。| 杨幂喷水高潮在线观看视频 | 狼友看视频的网站| 国产AV三级精品成人网站| 19禁无遮挡啪啪无码网站性色| 人妻回春按摩肏到中出| 二级黄色录像片免费播放| 色婷婷狠狠干| 无码日韩中文专区视频| 谁有操逼毛片网站| 高清免费三级毛片| 高清少妇欧美中文| 男女无遮挡动态图| 久精品视在线中文字幕| 成人限制第一页| 一级做a爱片高潮毛片| 91探花偷偷拔套在线播放| 韩国三级在线| 最近最新中文字幕2018| 色五月丁香五月综合五月橹| 午夜精品人成在线观看| 亚洲中文字幕丁香婷婷| 91精品无码4k岛国| 国内精品久久久久AV福利秒拍| 国产白领勾搭外卖av| 国产黄A片免费网站免费| 亚洲国产激情小说视频| 97久久一精品人妻人人玩| 99视频精品全部免费在线| 国产日潮亚洲精彩视频| 免费一级黄色网络网站欧美| 无码在线视频免费| 特级无码毛片在线观看| 久久偷拍视频SPA| 四川少扫搡BBW搡BBBB| 免费萌白酱国产一区二区三区| 国产韩国日本高清视频| 四川少扫搡BBW搡BBBB| 欧洲精品一二区无码人妻| 91无码久久国产线看观看hd| 美女黄又色高清视频免费| 亚洲AV综合色区无码区| 杨幂喷水高潮在线观看视频| 国产性爱第8页在线观看| 车子越颠进入的更深h| 国产成人综合精品视频| 国产精品九九久久九九国产| 国产成人精品在线不卡 | 中文字幕大屁股熟女乱| 在线观看无码高清aaa| 亚洲av手机在线观看| 91亚洲色欲国色天香| 狠狠躁狠狠躁东京热无码| 久久精品日产第一区高清版| 网红久久精品一区二区| 超97视频在线免费观看| 亚州中文字幕不卡影院| 国产欧美日韩丝袜高跟鞋| 国语对白久久精品视频| 亚洲一区二区精品按摩| 色婷婷精品国产黑人一区二区三区| 永久免费毛片久久99| 一级做a爰片久久毛片潮喷无码| 国产精品无码久久AV嫩| 国产尤物A∨尤物在线观看| 毛片三级片在线免费观看| 色欲洲av无码精品国产午夜亚色 | 国产真实乱子伦| 欧美视频第2页在线视频| 美女内射口爆av在线| 综合色久七七综合七七网站| 国产成人AⅤ免费观看| 国内精品久久99人妻无码特黄| 久久综合老色鬼网站| 国产精品综合久久| 菠萝菠萝蜜免费影视在线观看| 女教师一级特黄毛片| 久久精品囯產亞洲av麻豆色欲| 国产视频亚洲精品| 绯色AV视频精品一区二区| 亚洲午夜无码电影| 亚洲人成网址在线观看| 三级在线免费a免费看| 青青草中国三级片| 女人的天堂毛片AV在线| 在线观看xxxx国产| 亚洲成人欧美在线| 亚洲欧美日韩制服综合| 激情在线日韩欧美日韩| 啪一啪鲁一鲁2019在线视频| 国产又黄又爽又大的免费视频| 国产精品免费播放器大全| av高清理伦片在线观看| 国产精品va在线观看my| 二次元人物桶二次元人物免费网站 | 狠狠色丁香婷婷综合久久网站| 国产情侣自拍AV在线播放| 宋雨琦ai人工智能造梦| a级高清毛片视频免费观看| 国产激情一区二区三区成人麻豆| 亚洲熟妇av一区二区三区痴汉| 午夜成人精品福利网站在线| 91成人精品亚洲高清在线观看| 日本高清在线视频无码| 扒开老女人p大荫蒂warmth| 蜜臀aⅴ永久无码一区二区| 497799欧洲版的国产suv| 性欧美VIDEOFREE高清大喷水| 国产成人在线免费网站| 国模欢欢销魂全过程| 色婷婷狠狠干| 青青青国产免费手机视频在线观看 | 美女动态三级在线| 香蕉视频久久免费直播| 日韩成人在线视频观看苍井空 | 免费观看又色又刺激的视频| 前后夹击征服骚女完美爆| 中国一级免费黄色电影| 国产午夜视频免费观看| 午夜最新电影| 蘑菇成品人app下载| 午夜老司机福利日韩视频在线高清| 做爰高潮a片视频35分钟| 在线国语精品视频| 激情在线日韩欧美日韩| 国产精品久久秘 A级| 欧美一区二区在线播放免费播放 | 拔萝卜免费观看高清视频下载 | 9191精品国产免费久久国语| 韩国无码在线| 啊灬啊别停灬用力啊黑人| 亚洲高清无码操逼视频| 殴州人成在线视频| 自拍亚洲欧美另类动漫| 国产综合v亚洲欧美大片| 1024在线看片你懂的| 日韩黄色大片在线观看| 国产精品素人亚洲国产| 日韩无码一级黄色毛片| 双乳被快递员揉搓玩弄在线播放| 日韩黄色高清视频| 国产网友自拍视频| 国产午夜福利红色一片精品| 免费成人三级电影在线观看| 久久er热这里只有国产中文精品| 欧美综合在线观看日本| 岳乳丰满一区二区三区| A级成人婬片免费看无码| 亚洲最新无码2021| ac网站不卡免费在线观看| 国产欧美日韩丝袜高跟鞋| 91天堂一区二区三区在线| 中国国模无码AV| 高潮抽搐流白浆视频在线观看| 人妻回春按摩肏到中出| 鲁大师在线手机日韩| 亚洲熟妇无码AV| 国产一线在线观看| 欲乱人妻少妇邻居+毛片| 国产一级一极性活片免费视频| 一二三四在线色网视频观看社区| 天天爽天天爽免费视频| 色天堂在线观看视频| 1024手机在线国产你懂的| 白丝乳交内射一二三区| a免费在线观看| 一区二区三区.在线看| 国产精品麻豆一区二区三区v视界| 白丝紧致爆乳自慰喷水玩具动态图| 欧美黑人又粗又大又硬免费视频| 无码不卡毛片视频免费播放| 精品无码国产一区二区三区.闺蜜| 日韩高清一区二区第50页| 成人片在线观看亚洲欧美| 久精品视频在线播放网站| 国产精品电影不卡无码| 538pro精品视频我们不只是| 97人妻人人揉人人躁人人爽动漫| 十八禁爽爽爽无遮挡在线观看网站 | 国产亚洲1卡二卡三卡4卡| 无码gogo大胆啪啪艺术免费 | 精品妇人妻视在线视频| 男生女生一起怼怼的app下载大全| 亚洲精品成人?v在线| 狠狠久久久精品| 97人人视频波多野结衣蜜月| 车里要了好多次天天影院网| 国产成人AⅤ免费观看| 人成午夜日本乱码伦视频亚洲| 亚洲av无码不卡无码| 中文字幕av美利坚合众国无码| 精品无码久久久久国产| 日韩激情一级毛片| 亚洲欧美中文日韩v在线在线观看| 国产福利精品在线| 亚洲三级毛片一区二区| 亚洲午夜福利精品一区| 一区二区三区.在线看| 伊人久久香综合蕉五月天| 亚洲AV日韩在线一区二区三区| 久久国产这里只精品免费 | 日本黄色影片在线观看| 三级在线观看mmm| 亚洲欧洲久久久精品| 一色屋精品无码免费视频| 国产精品.久久久| 亚洲中文字幕在线有码| av无码免费高潮喷水不卡| 日韩AAAA级无码专区免费| 偷自拍亚洲综合在线| 国产视频精选全网| 中文字幕一区二区人妻本田岬| 少妇人妻中文字幕hd| 亚i洲成色在线综合网站| 欧美视频日韩视频国产视频| 91精品国产高清自| 玖玖玖在线视频免费观看| 一区二区毛片视频免费看| 18观看免费永久视频| 九九九九在线精品免费视频| 污视频在线免费观看| 亚洲国产99在线精品五区| 高潮时奶水喷出来了| 国产精品剧情在线蜜臀| 国产欧美AA一区二区三区视频| 国产精品高潮在线| 亚洲青青草原男人的天堂| 欧美激情xxxx孕妇| 国产精品自偷自拍| 国产亚洲国际精品福利| 亚洲最新av无码中文字幕一区| 精品亚洲国产aⅴ在线| 丝袜足脚交91精品| 18禁裸乳無遮擋啪啪無碼免費| 制服丝袜自拍偷拍av一区| 日韩毛片午夜在线观看| 亚洲欧美日韩中文高清| 亚洲成a∨人片在线观看无码好看| 91精品国产自产老师啪| 欧美人成网站| 久久精品99国产国产精人s| 天天爽天天爽夜夜爽毛片| 春色 都市 亚洲 小说区| 免费无码AV片在线观看sm| 亚洲熟妇av一区二区三区痴汉 | 久久人人97超碰人人爱百度| 欧美亚洲日韩国产中文在线| 欧美日韩一区二区视频播放黑人粗| 无码国产福利av私拍导航| 一级少妇精品视频一区二区| 夜夜爽天天躁夜夜躁狠狠| 拔萝卜又疼又叫视频下载安装| 人妻中文字幕无碼在线| 国产成人av大片大片在线播放| 亚洲国产日韩欧美综合在线一区二区三区 | 日韩视频在线观看免费6080| 黄色a级视频免费播放| 欧美亚洲自偷自偷图片| 一区二区放荡亚洲人妇| 亚洲欧美日韩综合第一| 国产一区二区三区精品免费播放| 自慰在线观看18p| 精品国产乱码久久久久久166 | 天天爽爽夜夜爽爽视频小视频| 国产在线麻豆精品观看| 91久久久久久国产免费| 日韩免费福利剧场| 亚洲色综合中文字幕在线| 韩国r级中文字幕在线播放| 亚洲日韩欧美aⅤ精品| 久久精品久久观看| 日韓中文字幕無碼高清毛片 | 亚洲视频在线观看免费一区| 亚洲性爱A不卡| 又黄又爽国产免费网站在线观看 | 日韩色欲人妻无码精品av| 天美麻花果冻女演员表| 国产精品久久秘 A级| 精品国产?Ⅴ一区二区三区| app搞鸡视频在线观看黄色| 亚洲欧美日韩精品专区52| 久久免费福利资源站 | 麻豆精品国产一级| 亚洲精品手机在线视频 | 自慰在线观看18p| 成年无码AV片在线蜜芽| 国产综合v亚洲欧美大片| 国产激情福利| 青娱乐精品视频在线免费观看| 亚洲精品手机在线视频| 无遮挡美女18禁免费啪啪| 无码日韩小说视频| 有没有免费无码h网站的| 成年人在线观看网站| 女人用炮机高潮合集视频播放| 无码熟妇一区二区| 男女视频网站一区二区三区免费| 综合色久七七综合七七网站| 欧美激情一区精品| 99久久久国产免费观看精品| 成人无码av一区二区三区| 国产无遮挡裸体免费视频| 缅甸恐怖网站lomando| 精子射入几天可以着床| 一本色道無碼道dvd在線觀看| 办公室a片在线观看 | 日本午夜在线视频| 嫩草国产等最新內容| 亚洲 自拍 露出 极品| 隔壁放荡人妻bd高清| 少妇太爽了在线观看视频| aⅴ色综合久久天堂av色综合| 成人无码视频在线观看| 亚洲一区二区精品按摩| 欧美精品久久96人妻无码| 亚洲欲色欲色XXXXX在线小说 | old老太videos老妇中国| 国产国产成人久久精品杨幂| 91短视频在线观看污污污 | 久久无码私人网站| 果冻国产精品麻豆成人av电影| 搡老女人老妇老熟女50ⅹxxx| 91香蕉视频一区二区在线观看国产b站视频| 久久久精品2019中文字幕超碰| 成人自拍视频在线观看| 宝可梦沙奈朵口吐白色液体| 亚洲午夜一区二区三区福利| 日韩黄色高清视频| 99爱免费视频在线观看禁| 久久成人国产精品青青| 善良的嫂子高清播放完整版| 偷自拍亚洲综合在线| 国产成人久久99| 91国内精品视频在线观看| 免费国产一区二区久久| 91免费入口在线观看| 2022久久最新国产精品| A级国产乱理伦片喂奶| 精品精品男人的天堂在线| 草莓视频app下载18| 中国无码在线观看| 污软件在线观看软件| 伊人久久大香線蕉AV五月天| 日韩激情偷拍第3页| 久精品视在线中文字幕| 午夜最新电影| 亚洲国产永久视频免费看| 成人国产一区二区三区精品小说| 亞洲國產歐美在線觀看| 18禁美女裸体无遮挡的网站| 亚洲AAA一级无费看| dy888午夜国产精品亚洲| 越南女子杂交内射BBWBBW| 911精品國產91久久久久| 久久精品国产亚洲最新国产| 国产av亚洲v天堂av| 一级?性色生活片毛片| 99RE6国产精品99RE在线| 国产91九色在线| 日本一本高清在线观看视频亚洲一区二区三区 | 亚洲码专区欧美色图久久| 亚洲AV无码AV在线播放野外| 婷婷六月天激情| 国产精品99久久久久久宅男小说| 日韩欧美人妻之中文字幕| 亚洲图片视频欧美日韩| 亚洲国产福利播放| 手机在线看片亚洲一区| 亚洲欧美中文日韩v在线在线观看| 有没有试过一前一后两个人| 国产国产成人久久精品杨幂| 99久久国产热无码精品免费久久精品A亚洲国产V高清不卡 | 无码熟妇一区二区| 91精品国产一二三产区在线观看| 久久伊人免费视频| AV免费不卡国产在线观看| 亚洲性爱视频网站一级看片 | 天堂国产在线视频| 色吧超碰97人妻| 国产亚洲精品成人| 1024手机在线国产你懂的| 一本久久a久久精品∨r综合| 精品无码国产一区二区三区.闺蜜| 99ER这里只有精品视频8 | 久久99热免费精品久久| 亚洲人妻精品综合无码专区 | 扒开老女人p大荫蒂warmth| 亚洲AV乱码一区二区三区按摩..| 欧美日在线观看视频| h工口福利里番库全彩| 欧日一道本dvd在线无码| 码 码加勒比国产在线| 国产福利 在线播放| 国产又黄又爽又大的免费视频| 在线亚洲无码| 午夜毛片精彩毛片| 四川少扫搡BBW搡BBBB| 亚洲九九夜无码在线观看| 国产中文亚洲熟女曰韩| 国产精品老师好紧好爽最新毛片| 成人黄片视频免费在线观看| 中文字幕有码欧美精品| 91精品国产91久久久久久无码天美| 一区二区三区在线观看欧美| 久久影院午夜未满十八勿入| 高清区一区二区在线播放| 国精一二二产品无人区免费应用| 男人把j伸进女人的p免费| 一区二区三区在线观看欧美| 91丨熟女丨丰满熟女| 综合色久七七综合七七网站| 国产黄色在线网站| 日韩国产欧美日韩一区二区久久 | 亚洲最新av无码中文字幕一区| 午夜国产精品福利影院| 欧美日韩国产人成在线| 日韩欧美人妻之中文字幕| 婷庭九月天综合水蜜桃| 女人的天堂毛片AV在线| 最近的2019中文字幕7| 99久久精品一区二区毛片下载| 韩国午夜理论a三级在线观看| 欧美日韩电影码国产| 久久精品亚瑟全部免费观看| 久久黄色片三级片黄色网址| 国产日潮亚洲精彩视频| 一区二区放荡亚洲人妇| 我的好妈妈6高清在线观看| av在线免费观看高清| 一级黄色片免费观看| 天堂网www天堂在线资源| 在线亚洲理论午夜AV大片| 亞洲歐美日韓中文字幕首頁 | 国产亚洲综合秋霞影院国产| 精品国产乱码久久久久久166| 国产精品色片免费| 中文字幕永久有效丝袜| 亚洲 综合 视频 一区| 亚洲色欲AV无码专区在线播放| 国产亚洲精品精品在线精品| 欧美一级aa大片免费看视频 | 国产美女露底激情视频| 精品自拍一區| 国产精品美女久久久久久大全| 国产av网站高跟丝袜| 日韩精品中文字字幕有码专区 | 亚洲国产香蕉视频欧美明星换脸 | 音影先锋男人在线资源网| 亚洲一日韩中文字暮AV| 欧美成人在线视频在线| 免费av中文字幕| 视频一区亚洲专区| 免费啪视频在线观看视频日本| 亚洲手机在线成人| 精品国产午夜肉伦伦影院| 皮衣战神聂小雨1080p黑椒不打烊 jizz一区二区在线观看 | 曰本大码熟中文字幕| 午夜短视频二区| 成码无人av片在线电影软件| 福利社区在线观看| 久久久免费丁香五月| 美女欧美一区二区| 亚洲国产精品 制服丝袜| 国产午夜精品草莓一区二区三区| 成人国产精品视频| 成人无码视频在线播放| 亚洲av福利天堂在线观看| 亚洲欧洲日产韩国夜夜高潮| 中文字幕黄色在线观看| 久久伊人免费视频| 日韩国产欧美中文字幕在线播放| 国产天堂网www在线资源av网| 国产色精品vr一区区三区| 欧洲国产精品sss在线观看av| 欧美一级在线高清免费观看| 成人久久久一区二区| 午夜精品影视网热门电影全集免费播放在线观看 | 日本国产一区二区三区在线观看| 国产无遮挡无码免费视频在线抪 | 国产精品1区2区3区4级网站| 国产三级片大全网| 激情丝袜美女视频1区| 久久er热这里只有国产中文精品| 免费国产自产一区二区三区四区| 国产小视频一区二区三区中文字幕在线播放 | 色偷偷AV永久无码精品无码| 亚洲无码模一级黄片| 99久久99久久久精品| 亚洲国产小u女在线| 中文字幕乱码一区二区三区蜜桃成熟时 | 日本高清中文无卡| 精品免费一区二区爱 | 人妻日韩AV无码一区二区| 五月色丁香国产精品白拍| 少妇挑战黑人4p惨叫| 在线无码无码播放视频| 中文精品影视日本| 亚洲色图在线视频| 色情无码WWW视频无码区| 欧美一区手机在线观看视频| 国产精品a久久久久| 国产精品久久秘 A级| 跪趴着被主人狠狠调教| 日韩婬乱a一级毛片视频| ▓草莓视频在线观看▓| 精品国产午夜在线| 亚洲丝袜在线观看| 制服丝袜物喷水亚洲综合精品| 偷自拍亚洲综合在线| 日韩欧群交p片内射中文| 亚洲色图一区二区的| 国产成人午夜一级电影在线 | 中文成人无码国产亚洲| 国产成人av麻豆精品| 一区二区人人在线| 亞洲歐美日韓中文字幕首頁 | 日韩成人精品视频自拍| 国产精品va在线观看my| 亚洲免费视频免费观看| 国产精品欧美日韩视频播放一区| 1024大香蕉手机看片| 国产无码喷水| 成人A免费播放网站| 春色 都市 亚洲 小说区| 欧洲熟妇精品视频在线成视频| 欧美亚洲日韩国产中文在线| 男人的天堂亚洲一区二区无码| 三级在线看中文字幕完整版| 在线综合亚洲欧美成人影院| 日韩久久精品一区二区| 91久久精品国产免费一区| 欧美激情诱惑在线观看| 国产精品熟女第7页| hezyo加勒比在线综合| 玩弄熟睡的小男生腐h| 亚洲欧美日韩综合第一| 国产偷窥成熟女精品视频| 免费真人一对一视频| 国产福利一区二区在线观看| 一区二区毛片视频免费看| 好了AV第四综合无码久久| 惠民福利国产精品无码aV一区二区三区| 麻豆视频传媒APP| 黄色一线免费高清在线视频16| 亚洲性爱A不卡| 在线观看麻豆| 成人女人在线观看| 无码区一二区mv| 97精品一区二区视频观看| 99久久久国产免费观看精品| 久久图片视频小说| 中文字幕无码138页| 久久久久av綜合網成人| 亚洲欧洲AVAV天堂系列| 91久久打屁股調教網站| 一区二区毛片视频免费看| 老子影院午夜伦手机不卡无码 | 欧美精品第56页| 欧美一区二区三区18禁| 谁有操逼毛片网站| 欧美一级aa大片免费看视频| 成在线人av免费无码高潮喷水 | 扒开老女人p大荫蒂warmth| 天堂网2021天堂手机版| 国国产最新精品盗摄视频| www亚洲欲色成人久久精品| 欧美激情诱惑在线观看| 日韩国产欧美中文字幕在线播放| 中文字幕無碼亂碼人妻系列蜜桃 | 亚洲视频在线观看免费一区| 自拍亚洲欧美另类动漫| 亚洲国产成人高清一区在线| 亚洲AV乱码一区二区三区| 亚洲欲色欲色XXXXX在线小说 | 伊人蕉影院久亚洲影院| 亚洲人成日本片| 国产精品欲AV麻豆网站| 有没有免费无码h网站的| 很黄很黄的曰批视频| 一区二区三区国产V欧美| 在线亚洲理论午夜AV大片| 国产成人精品一二三区| 最新国产成人精品区在线观看| 久久免费看少妇高潮XXX| 日韩台精品电影在线观看网站免费| 福利视频日韩欧美国产| 久久亚洲免费伦理| 福利姬白浆AV导航| 一级黄色毛片在观看| 精品久久久久久无码福利片| 亚洲日韩av免费在线观看| 日日夜夜摸多人换着玩| 精品国产成a人片在线观看 | 久久亚洲精品少妇| 思思热这里只有精品5| 三浦恵理子息与子中文字幕| 欧美无砖专区日本免费观看| 国产精品有码无码脛∨在线 | 国产91黑人在线| 日韩一区二区三区在线看| 日本黄色影片在线观看| 精品无码作爱无码视频| 偷自拍亚洲综合在线| 亚洲欧美日韩a∨在线观看| 美女动态三级在线| 国产精品视频色拍拍2021| 亚洲国产视频二区| 疯狂做受ⅩXXX高潮欧美| 一本久久a久久精品∨r综合| 国自产拍在线亚洲网站| 色秀视频在线WWW色| 亚洲欧美日韩a∨在线观看| 天天干天天肏| 91久久精品日本一区| 91桃色国产精品免费在线观看| 99国产精品视频一区二区69堂| 999福利精品久久久| 欧美国产第一区| 草莓视频APP下载官方| 国产精品v欧美| 影音先锋国产在线| 亚洲午夜久久免费| 欧美性生活视屏精品| 亲亲发出吧唧吧唧的声音| 亚洲永久免费无码打屁股| 超级碰97直线国产免费公开| 了解最新精品国产拍拍拍无遮挡| 亚洲精品成人?v在线| 亚洲av久播在线观看| 国产白领勾搭外卖av| 欧美综合自拍亚洲久久| 国产精品免费播放器大全| 部长侵犯人妻一区二区三区| 亚洲无码高清免费视频亚洲| 亚洲无码aⅴ色图| 厨房里强摁做开腿呻吟动漫| 亚州中文字幕| 欧美97人人爱人人干| 日本少妇一级婬片HD69网站| 啊灬啊别停灬用力啊黑人| 国产精品成人AV片免费看| 午夜网站黄色在线观看免费完整高清观看 | 亚洲男人久久综合天堂 | 色噜噜中文网在线| 日韩一区二区三区四区在线播放| 天堂av在线观看免费| 国产精品熟女第7页| 女人被男人桶| 焯逼国产精品| 青草久久在线免费观看视频| 91精品國產免費久久國語蜜臀| 中文无码一区99xav| 久久精品2021国产| 18禁裸乳無遮擋啪啪無碼免費 | 国产熟女精品视频国语| 国产精品一区二区精品片子| 韩国三级中文字幕HD久久精品| 久久精品成人免费看| av日韩在线观看一区二区三区| 亚州中文字幕| 亚洲国产香蕉视频欧美明星换脸| a级片在线免费播放| 亚洲国产午夜电影在线观看| 日韩av在线在线观看| 中文字幕无码一区二区乱码| 成人看片黄在线观看| 福利社区在线观看| 9久热在线精品996热视频观看| 亚洲国产福利精品一区二区| 中文字幕人妻毛片av| 99奇米a影色777四色在线观看| 国产精品福利福利一区在线观看| 欧美日韩在线二区下载| 超碰97人人天天夜夜| 91久久国语露脸精品国产| 亚洲欧美一区电影| 成全影视大全| 青草久久在线免费观看视频| 欧美一级二级三级网站大全| 91超级好看一区二区三区| 国产精品???a片在线观看原神 | old老太videos老妇中国| 69式真人无码视频免费| 国产91黑人在线| 天天噜夜夜噜狠狠噜| 91探花偷偷拔套在线播放| 欧美另类性视频| 国产精品视频色拍拍2021| 国产αV无码日韩αV无码网站| 免费成人三级电影在线观看| 天美传媒国产精品果冻| 国产免费人成视频不卡顿在线播放播| 秋霞电影伦理手机版| 99RE8国产这里只有精品| ..亚洲欧美日韩成人高清在线一区| 亚洲成年网站| 黄片软件免费下| 欧美日韩二区视频| 100款禁用黄台网站小黄鸭| 又黄又爽国产免费网站在线观看| 又爽又黄又爽又刺激的视频| 国产狼友精品视频网| 菠萝菠萝蜜免费影视在线观看| 青青草国产成人久久网| 成人国产精品视频| 福利视频日韩欧美国产| 中文字幕日韩亚洲视频在线| 一二三四高清在线观看视频中文 | 国产精品无码久久AV嫩| 一区二区三区无码在线| 97久久久精品综合88久久| 欧美成人aa久久狼窝五月| 国产成a人亚洲精v| 黑人巨大精品无码专区| 妓女网一区二区| 欧美顶级AⅤ高清视频| 视频一区亚洲专区| 一级做a爱片高潮毛片| 亚洲国产视频二区| 精品国产成a人片在线观看 | 91欧美激情一区二区三区成人日韩99久久综合狠狠综合久久 | 成人毛片视频亚洲| 欧美日韩字幕一区| 欧美一区二区亚洲成人| 中文精品影视日本| 中文久久三级欧美| 成人高清毛片视频| 亚洲欧美一区二区三区69| 91精品國產免費久久國語蜜臀| 久久国产福利一区二区三区| 日韓福利一區| 国产三级在线视频播放线| 久热这里只有国产中文精品| 黄片软件免费下| 亚洲人成人一区在线观看| 真实国产乱子伦对白在线播放| 91在线无码精品秘比基尼| 国产 亚洲 欧美 另类中文| 午夜国产精品福利影院| 日产一级毛片免费| 天天躁夜夜躁狠狠躁综合真实| 国产av亚洲v天堂av| 图片区小说区另类春色蜜芽| a毛片免费全部播放吃| 老司机带带我精品视频| 亚洲国产中文字幕在线视频| 日韩一二区无码精品一区| 伊人丁香五月在线视频| 99精品又大又粗又硬少妇毛片| 欧美一区二区三区福利网| 无遮挡美女18禁免费啪啪| 这里只有好看的a视频| 在线观看AV无毒网站| 精品综合国产亚洲欧美久久| 9久热在线精品996热视频观看| 久久久久免費精品視頻| 天堂av在线观看免费| 91麻豆一区二区在线观看| 国产免费牲交视频38禁| 欧美精品青青久久久久久久久久久 | 久蕉在线视频免费精品| 国产午夜福利精品理论片久久| 国产欧美亚洲精选视频| 国产目拍亚洲精品二区婷婷| 亚洲卡2卡三卡4卡2021老狼| 免费网站看v片在线毛| 无码gogo大胆啪啪艺术免费| 亚洲综合五月天激动情网 | 国产精品a久久久久| 色欲久久国产色av免费看老司| 亚洲免费视频免费观看| 久久久久国色aV免费软件| 欧美日韩在线视频h| 国产毛片久久久久久久久久久久| 午夜免费一级av福利毛片| 国产精品熟女第7页| 亚洲日韩精品综合| 久久电影午夜鲁丝片无码| 最新无码国产在线视频2023| 久久久久免費精品視頻| 亚洲九九夜无码在线观看| 人妻出差精油按摩被中出| 国产精品a久久久久| 久久久国产精品免费无码| 欧美极品jizzhd欧美仙踪林| 黄色美女免费| 亚洲一区二区精品按摩| 在线播放国产视频99| 1024手机在线看片| 欧美综合自拍亚洲综合网| 前后夹击征服骚女完美爆| 日韩一区二区三区视频在线| 亚洲日本精品va中文字幕 | 久久99国产精品二区不卡| 亚洲欧美日韩中文另类不卡| 秋霞在线手机国产在线| 国产一级一极性活片免费视频 | 亚洲精品色无码一二三区| 黄色欧美三级在线看| 欧美成人精品一区二区男人看| 男人和女人一起打扑克牌差差差痛游戏 | 国产偷窥熟女精品| 亚洲一区二区麻豆AV| 97视频人人做人人爱免费体验| 乡村女教师艳妇欲爱| 91精品国产一二三产区在线观看| 宝可梦沙奈朵口吐白色液体| 亚洲午夜无码毛片Av久久京东热| 國產精品三級在線觀看| 丁香婷婷深情五月丁香中文字幕| 亚洲av成人在线观看| 夜鲁夜鲁夜鲁高清免费看| 美女内射口爆av在线| 图片区电影区激情区小说区| 国产性欧美疯狂猛交69hd| 精品国产网红主播在线观看| 中文字幕日本a√在线| 亚洲精品一区二区三区不| 八戒影视大草原久久揄拍片 | 午夜国产一级大片免费观看| 婷庭九月天综合水蜜桃| 国产精品大白天新婚身材| 国产影视乱伦三级| 免费看一级a女人自慰青春网| 亚洲人成人一区在线观看| 外国av在线免费观看| 一区二区精品在线| 日韩AV无码一区二区三区不卡开心久久婷婷综合中文字幕 | 久久频这里精品香蕉久久| 久久精品国产亚洲最新国产| 国产超级无码一极毛片| 人妻中文字幕一区二区不卡| 午夜视频成在线人成在线人| 日韩国产欧美一区免费观看| 久久精品欧美| 亚洲精品国产成人影片在线观看| 久久艹这里只有精品| 三级在线看中文字幕完整版| 91无码久久国产线看观看hd| 亚洲天堂久久精品9966| 老司机午夜精品99久久免费| 丰腴饱满的极品熟妇| 国产精品日产精品久久| 电影天堂免费在线观看| 亚洲欧美综合精在线一区| 日韓歐美一區二區三區不卡 | 欧美va亚洲天堂网| 亚洲午夜久久免费| 国产高清视频在线播放一区二区三区 | 最新无码不卡手机在线视频| 肛交的免费视频91视频| 亚洲国产的精品太乱码一区二区 | 日韓福利一區| 久久久免费丁香五月| 日本丰满熟妇厨房伦| 中文字幕免费日韩中文中文| 精品国产日韩在线观看| 九九热最新国产视频| 餐桌下狂c亲女高辣h文| 最近最新中文字幕2018| 网红久久精品一区二区| 曰本女人牲交高潮視頻| 国产麻豆精品成人毛片| 日韩一区二区三区视频在线| 亚洲无码日韩精选中文字幕| 日韩无码一级黄色毛片| 黑人处破女免费播放| 精品国产第一页动漫| 国产精品亚洲日韩高清资源| 狠狠干2017欧美最新| 香蕉久久AB一区二区三区| 国产无码不卡视频| 亚洲另类无码一区二区三区冫| 欧美亚洲精品另类| 白丝被弄羞涩娇喘动态图| 韩国午夜理论a三级在线观看| 亚洲精品视频中的话| 人妻中出中文字幕資源免費看| 日韩乱女乱妇熟女熟妇av| 女人用炮机高潮合集视频播放 | 亚洲一日韩中文字暮AV| 1024在线看片你懂的| 亚州中文字幕40| 欧洲黑白配一二三四区| 午夜亚洲国产理论片2020| AV免费不卡国产在线观看| 毛片无遮挡高清免费久久| 成码无人av片在线电影软件| 中文字幕乱码一区二区三区蜜桃成熟时 | 国产亚洲精品精品在线精品| 极品人妻videos人妻| 亞洲國產精品不卡在線電影| 国产精品青青草原免费无码中国| 国产十八禁在线观看十八禁宿舍 | 国产av剧情精品麻豆| 午夜亚洲国产理论片2020| 国产强上视频在线观看| 91香蕉视频黄版下载| 91精品国产综合久久久亚洲日韩| 狠狠干经典视频在线观看| 亚洲日韩av一区久久精品| 精品人妻挤奶一二三四区 | 亚洲丰满少妇色网视频网| 亚洲精品综合在线导航网址| 秋霞影院韩国伦片在线播放| 无码强姦精品一区二区| 国产欧美日韩激情视频一区| 国产精品www在线观看| 亚洲精品高清你懂的| 久久精品无码亚日韩免费影视观看中文 | 久久五月一区二区精品| 大陆日韩欧美成人| 日本黄色影片在线观看| 精品综合在线99亚洲青草91| 亚洲成人激情在线观看| 久久精品国产亚洲Vā香蕉| 中文成人无码国产亚洲| 欧美人成网站| 一级特级女人18真人片免费视频| AV网站国产大全| 日韩精品一区二区亚洲A ∨| 九色91POPNY蝌蚪新疆| (凹凸)青草制服丝袜一区第一页| 成年午夜免费aⅴ在线观看| 蜜桃一区二区百万视频| av无码av高潮av喷吹免费| 久久久久久久国产精品视频| 日韩高清一区二区第50页| 国产精品主播视频欧美日韩| 国产成人av大片大片在线播放 | 久久精品国产99国产精品严洲 | 最新欧洲日韩在线播放| 欧美在线激情性受内射不卡在线观看| 亚洲一级免费观看高清无码| 国产精品有码无码脛∨在线| 影音先锋+高潮+痉挛| 日日噜噜噜夜夜爽狠狠视频| 亚洲国产精品第一二三区| 在厨房拨开内裤进入在线视频| 少妇系列中文字幕一区| 久久视频精品38线视频在线观看| 毛片三级片在线免费观看| 国产精品v欧美| 亚洲狼人制服中文字幕| 色呦呦网站免费| 亚洲亚洲国产精品| 日韩色系视频在线观看| 日韩美女粉嫩小泬在线精品| 亚洲色拍国产另类| 日韩人妻熟精品久久无码少年阿宾| 国产成人真人片亚洲精品不卡 | 特级毛片?级毛片在线播放| 午夜精品福利波多野结衣| 亚洲一品二品三品精区网站| 女性喷液过程高清免费视频| 视频一区亚洲自拍最新国产精品亚洲| 免费萌白酱国产一区二区三区| 国产指交视频在线观看| a毛片免费全部播放吃| 国产99热在线露出| 国产高清乱码无卡女大生| 亚洲aⅤ无码国产片| 欧洲熟妇精品视频在线成视频| 中文字幕新无码国产在线视频| 伊人久久大香线蕉?v男同| 国产无码不卡视频| 一区二区三区av免费| 久久精品亚洲精品五月色| 国内一区二区三免费视频| 国产午夜一区二区在线观看m| 亚洲欧美日韩免费在线播放| 曰韓無碼二三區中文字幕| 久久亚洲精品少妇| 高潮时奶水喷出来了| 无限看片的视频大全免费下载| 日韩午夜在线高清成人| 欧美成人aa久久狼窝五月| 日韩特黄精品一在线看| 精品精品男人的天堂在线| 国产成人69天堂| 最近更新中文字幕大全| 亚洲色图国产无码| tobu8 天堂网www中文在线| 亚洲天堂在线观看免费更新| qvod经典视频在线播放| 一区二区三区无码精久久| 在线观看无码高清aaa| 国产高清av大屁股免费看| 色偷偷AV永久无码精品无码| 日韩国产欧美日韩一区二区久久| 粉嫩白浆国产精品| 亚洲国产自久久婷婷| 國產精品99久久| 国产成人av国语在线| 亚洲精品成人国产| 在线精品三级视频在线网| 成人丝袜18秘 视频在线观看| 国产精品AV毛片免费看观看| 澳门l永久无码视频| 最近最新的日本中文字幕| 国产午夜福利精品理论片久久| 91精品国产成人久久久久久| 国产免费人成视频不卡顿在线播放播| 精品三级66在线播放| 亚洲影视AV一二三| 狼人一区二区精品久久| 狠狠色狠狠色綜合久久第一次| 国产精品a久久久久| 日本在线一区二区三区免费| 国产精品男人在线播放| 亚洲成人一线二三线在线观看| 最新欧美极品一区二区三区| 日韩欧美偷拍精品一区| 国产成人69天堂| 114人体棚拍人体私密大尺度| 成人国产欧美日本精品久久麻豆| 精品国产?Ⅴ一区二区三区| 一级做性色α爱片久久毛片色| 日产一级毛片免费| 欧美精品v日韩精品v| 久久久精品午夜免费不卡91| 青青草中国三级片| 五月天日韩AV电影| dddd亚洲日韩欧美精油| 久久99国产精品二区不卡| 色吧超碰97人妻| 久久精品国产亚洲最新国产| a级毛片高清免费视频在线| 性奴秘书裸侍跪趴等主人玩| 日产一级毛片免费| 在线免费观看视频a| 日韩三级久久| 网红久久精品一区二区| 久久艹这里只有精品| 国产精品美女白丝自慰| 无码日韩做暖暖大全免费| 国产人妻高清国产拍精品| 欧美另类性视频| 秋霞影院韩国伦片在线播放| 韩日中文无码在线视屏| 日韩欧美偷拍人妻丝袜第一页| 精品无码一区二区三区少妇97| 久久天天躁狠狠躁夜夜2020!观看视频| 免费AV无码不卡在线网站| 中文字幕无码138页| 5x性社区免费视频播| 亚洲欧美精品国产电影| 丝袜足脚交91精品| 国产av最新网址| 亚洲欧美国产日日| 欧美成人专区| 亚洲性爱视频网站一级看片 | 久久一区视频精品| 97人人超人人超碰超国产| 国产熟女精品视频国语| 国产一久久久久久久久| 亚洲第一天堂日韩| 亚洲 自拍 色综欧美合图区| 在ktv上班被客人吃奶头| 精品综合久久久久久8888| 免费国产一区二区久久| 欧美性爱福利视频| 色99热久久99热国产精品| 精品亚洲国产成人无码| 日本丰满护士bbw| 91久久精品美女高潮| 亚洲国产成人高清一区在线| 粉色视频免费观看下载| 色婷婷亚洲综合五月| 日韩免费福利一区八区| 亚洲国产av无码综合原创国产| 国产第一页草草影院ccyy| 亚洲精品影院久久久久久| 亚洲欧美日韩精品专区52| 亚洲人成网站18岁禁止| 国产十八禁在线观看十八禁宿舍| 免费久久黄色毛片| 国产精品素人亚洲国产| 国产性夜夜春夜夜爽1a片| 99久久精品一区二区毛片下载 | 91视频欧美青青草| 美女视频黄a视频全免费观看蜜臀| 成人无码视频在线观看| 夜夜操综合网| 久久久久av綜合網成人| 国产精品a久久久久| 益日韩欧群交P片内射中文| 大学生一级毛片全黄真无码| 国产偷窥成熟女精品视频| 制服丝袜物喷水亚洲综合精品| 思思热这里只有精品5| 亚洲欧美一区二区三区69| 午夜精品人成在线观看| 国产黄色一级片在线观看无码高清 | 国产精品喷水综合久久久| 成人国产欧美日本精品久久麻豆| 嫩模自慰一区二区三区动漫| 黄色电影免费在线| 日韩成人手机午夜在线播放网站| 在线观看自拍无码综合| 人妻被中出不敢呻吟A片视频| 国产一二三区 韩国女主播| 久久艹这里只有精品| 亚洲精品一区二区三区不| 国产一国产精品免费播放| 国产精品香港三级国产| 亚洲100部在线观看| 16处破外女出血视频在线观看| 91果冻精品国产自产自产在| 厨房里强摁做开腿呻吟动漫| 无码A∨高潮抽搐流白浆8MAV | AV无码免费1区2区3区| 日韩在线精品一二三区| 手机在线日本视频| 少妇极品美軳人体337p| 国产一线在线观看| 黄片软件免费下| 国产精品www在线观看| 日韩AⅤ在线免费观看| 特级毛片?级毛片在线播放 | 国产在线一区二区三区乱码| 欧美精品在线观看不卡一区| 亚洲国产在线精品国自产拍影院| 亚洲三级视频在线播放| 爱丫爱丫影院电视剧免费| 日本天堂影音资源在线观看 | 国产污污视频在线观看| 国产在线视频一卡| 国产精品sea8视频| 亚洲av成人在线观看| 日韩中文无线码免费观看 | 越猛烈欧美xx00动态图带声音| 韩国羞羞漫画无遮羞在线看| 欧美中文日韩综合在线视频| 国产中文自拍无码| 欧美一级欧美一级在线观看 | 亚洲综合男人的天堂色婷婷| 国产大尺度无遮挡在线观看| 91人妻午夜综合精品视频| 国产一区二区三区精品免费播放| 免费+无码+国产www| 国产成a人亚洲精品无码性色| 亞洲國產精品不卡在線電影| 老司机无码精品A| 日本又色又爽又黄的网站免费| 91在线无码精品秘九色APP| 亚洲AV无码AV在线播放野外| 精品综合在线99亚洲青草91| 欧美另类性视频| 在线免费观看视频a| 美女制服で視頻網站| 日韩免费福利一区八区| 久久视频精品38线视频在线观看 | 青青草中国三级片| 国产激情福利| 中文字幕一区二区高清精品久久久| 18禁动漫一区二区三区| 一级在线中文观看日韩| 国产高清乱码无卡女大生| 天天爽天天爽夜夜爽毛片| 孕妇动漫精品国产一区二区三区| 蜜桃一区二区百万视频| 神马免费视频在线观看| 久久精品亚瑟全部免费观看| 日韩人妻熟精品久久无码少年阿宾| 秋霞在线手机国产在线| 啪一啪鲁一鲁2019在线视频| 亚洲精品国产导航一区二区| 五月天日韩AV电影| 殴州人成在线视频| 国产聚色窝在线首页| 午夜综合影院欧美聚众性派| 98bb国产精品视频| 久久免费看少妇高潮XXX| 一本久久a久久精品免费不| 欧美一级视频高清片| 亚洲中文字幕乱码影院在线| 韩国无码在线| 成熟少妇av免费网站| 午夜福利啪爽国产片精品 | 国产99视频免费精品| 色婷婷综合激情蜜桃tv| 在线观看免费综合亚洲| v影院一区二区三区自产不卡视频| 亚洲aⅤ无码国产片| 亚洲欧美中文日韩v在线在线观看 91精品国产高清一区二区三密臀 欧美日韩国产三级久久 | 国产日批视频免费在线播放| 国产品国语在线不卡| 前后夹击征服骚女完美爆| 亚洲欧美一区二区在线观看| 在线观看xxxx国产| 国产超级va在线观看视频 | 国产精品亚洲日韩高清资源| 人妻被中出不敢呻吟A片视频 | 蜜桃一区二区百万视频| 亚洲tv日韩tv国产tv无码综合 | 精品国产午夜肉伦伦影院| 色婷婷狠狠干| 日本黄色影片在线观看| 一区二区三区无码在线| 人妻夜夜爽天天爽4区| 亚洲VS欧洲999在线观看视频| 日韓福利一區| 日韩一区二区三区视频在线| 久久精品国产99国产精品严洲 | 亚洲国产一卡2卡3卡4卡精品| 久久综合九色综合欧美婷婷| 亚洲电影激情五月激情| 男人把j伸进女人的p免费| 亚洲三级视频在线播放| 亚洲欧洲久久久精品| 午夜短视频二区| 亚洲日韩精品人妻| 91精品一二区久久无码电影| 精品综合久久久久久8888| 永久无码日韩a片免费看蜜臀| 国产精品美女久久久久久大全 | 欧美性生活视屏精品| 欧美日韩性视频在线| 黄色a级视频免费播放| 国产亚洲精品美女2020久久| 亚洲性爱A不卡| 日韩精品亚洲专区在线影院| 天天爽天天爽夜夜爽毛片| 羞羞视频在线观看免费视频| 亞洲Aⅴ无码乱码在线观看| 高清偷自拍亚洲精品三区| 惠民福利久久精品国产亚洲7777 | 国产精品美女久久久浪潮?v | 色综合精品视频在线| 国自产拍偷拍福利精品免费一| 成人免费a级毛片无码片在线播放| 日韩三级久久| 先锋影音制服丝袜| 影视久久夜色国产精品噜噜噜| 国产91作品一区在线观看| 444kk免费看片在线观看| 色网在线观看| 香蕉精品视频一区二区三区| 中文字幕久无码免费久久| 在线观看免费人成视频色9| 韩国成人AV网站在线观看| 国产看片在线观看一区| 视频福利一区二区三区| 性国产日韩欧美一区二区在线 | 午夜视频成在线人成在线人| 人成在线免费观看亚洲| 久久精品国产国产精品久久| 成人自拍视频在线观看| 青青青国产免费手机视频在线观看 | 久久人人97超碰人人爱百度| 永久免费看黄| 亚洲国产成人mv在线观看| 凹凸國產熟女精品視頻APP| 亚洲中文字幕不卡无码| 国产性夜夜春夜夜爽1a片| 国产极品午夜在线观看| 性国产天堂VIDEOFREE高清| 国产白丝喷水娇喘视频| 久久久综合精品一区二区三区无码 | 国产乱码人妻一区二区三区| 網友分享免费福利资源站在线视频心得| 亚洲一级免费观看高清无码| 日产精品一二三区| 手机在线看片你懂得| 丁香五月婷婷综合网| 天堂国产在线视频| 国产天天精品视频| 欧美亚洲日韩国产中文在线| 国产视频日日操| 久久精品国产亚洲?V无码偷窥| 国产 无码 免费| 在线综合亚洲欧美成人影院| 宋雨琦ai人工智能造梦| 伊人丁香五月在线视频| 草莓视频污污污版下载| 亚洲经典国产av| 成人综合在线视频免费观看完整版| 精品综合久久久久久8888| 一级少妇精品视频一区二区| 色婷婷久久精品网| 国产在线高清无码视频| 中文字幕乱码亚洲影视亚洲日本va午夜 | 巨粗进入警花哭喊求饶| 国产精品AV毛片免费看观看| 一区二区精品在线| 国产精品影音先锋69| 国产成人剧情Av麻豆嘿嘿| 欧美.久久久.精品| 女教师一级特黄毛片| 久久夜靖品2区含羞草| 国产白丝喷水娇喘视频| 亚洲国产99在线精品五区| 女性喷液过程高清免费视频| 八戒影视大草原久久揄拍片| 欧洲aⅴ无码片一区二区三区| 最近在线中文字幕更新| 99久久99久久久精品| 久久综合老色鬼网站| 欧美亚洲不卡av免费一二三区| 中文字幕av美利坚合众国无码| 日韩精品手机在线| 国产av自拍播放| 日本一本一道久久香蕉男人的天堂| 国产尤物A∨尤物在线观看| 三年片在线观看中文| ▓草莓视频在线观看▓| 天美传媒mv免费观看| 大奶子视频一区二区| 免费av中文字幕| 日韓中文字幕無碼高清毛片| 一级毛片av一区| 亚洲自拍偷拍午夜福利| 老司机带带我精品视频| 中国捆绑女裸绳艺视频| 日本不卡免费新一二三区3| 国产一级国产一级在线观看| 免费啪视频在线观看视频日本| 日韩AⅤ在线免费观看| 国产精品久久久久久成人热AV| 午夜国产精品福利影院| 夜夜操天天爽| 香蕉精品视频一区二区三区| 无码熟妇一区二区| 久久午夜福利久久网| 日韩中文无线码免费观看| 亚洲无码日韩精选中文字幕| 欧美成人午夜影院| 久久成人精品免费国产片| 亚洲精品手机在线视频| 日本特黄特色大片免费在线观看| 日本免费一区二区三区看片| 十大禁止安装app软件入口免费| 亚洲国产欧洲韩国高清专区| 91精品国产高清自| 亚洲欧洲在线观看无码| 免费无码a∨片在线观看| 在线免费观看a级片| 国产精品欧美久久久无广告| 亚洲一级午夜福利| 欧美激情四射一区二区在线| 在线观看精品成人综合视频| 亚洲欧州国产综合不卡在线免费视频 | 亚洲国产视频二区| 999福利精品久久久 | 五月婷婷丁香综合| 被男子脱掉内裤的美女视频| 无码日韩做暖暖大全免费| 国产三级片大全网| 午夜性爽视频男人的天堂在线| 另类亚洲欧美精品综合| 老师解开乳罩喂奶我脱她内 | 亚洲无码模一级黄片| 好爽快点我受不了了视频| 成人3d动漫一区二区三区| 亚洲日本精品va中文字幕| 日韩激情一级毛片| 日韩欧美综合在线二区三区| 日韩欧美人妻之中文字幕| 奶茶视频APP黄在线播放| 欧洲美女一级牲交视频| 欧美性猛交xxxxx水多| 久久久久久久久久久精品| 欧美在线免费亚洲| 久久久精品产一区二区三区日韩| 国产激烈刺激网站免费观看| 欧美黄片十分钟不卡一区| 91老师秘片黄在线观看| 亚洲无码三级片影院免费观看| 手机在线看片你懂得 | 日韩精品中文字字幕有码专区 | 久久精品亚瑟全部免费观看| 亚洲无遮挡一级精品视频| av无码av高潮av喷吹免费| 国产日韩精品在线一区二区三区| 精品国产v无码大片在| 中文字幕乱码亚洲影视亚洲日本va午夜| 欧美三级直播美女视频在线观看| 久久久精品2019中文字幕超碰| 年轻的朋友3完整版在线观看| 国产污污污软件免费下载观看| 国内高清A自拍视频| 鲁大师视频在线观看免费播放| 男人把j伸进女人的p免费| 91精品国产91久久久久久无码天美 | 谁有操逼毛片网站| 欧美日韩一区二区视频播放黑人粗| 久久免费视频777| 国产熟女一区二区三区灬| 日韩 一国产一无码一日韩| 中文字幕无码138页| 精品区一区二在线观看| 天堂成av午夜电影| 精品无码一区二区三区少妇97| 夜夜添无码试看一区| 欧美在线天堂视频不卡| 小编在这里为大家带来看日韩黄色毛片 | 免费黄色资源| 父子1v2她还是你的小心肝| 久久国产午夜精品免费一区二区| 日本天堂影音资源在线观看 | 国产在线播放线视频免费| 暖暖www视频免费高清最新期| 91视频污APP色版下载| 日韩精品亚洲色大成网站| 中文字幕永久有效丝袜| 在线观看无码精品秘?日本| ▓草莓视频在线观看▓| 成在线人免费视频一区二区| 性感日韩在线视频观看| 91在线无码精品秘九色APP| 日韩中文字幕欧美亚洲第一区| 久久99国产精品二区不卡 | 91视频欧美青青草| 宋雨琦ai人工智能造梦| 亚洲AV日韩在线一区二区三区 | 成人毛片免费aa级 | 精品国产亚洲人成在线传媒| √天堂中文官网8在线| 撕掉英语老师的黑色蕾丝内衣| 水蜜桃视频污在线观看| 欲乱人妻少妇邻居+毛片| 亞洲國產精品不卡在線電影| 久久99成人精一区二区三区| 久久精品人妻一区二区三区一| a级毛片无码真人版| old老太videos老妇中国| 亚洲高清美女在线| 69国产成人精品午夜在线| 黄色一级毛片在线| 亚洲午夜福利精品一区| 亚洲欧美日韩岛国色图| 日本高清免费中文字幕区dd| 2022v视频无码高清网站| 中文精品影视日本| 国产三级片大全网| 91久久精品美女高潮| 18勿看免费大片1000拍拍 | 国产精品色片免费| 天天草天天射| 性白俄罗斯高清xxxxx| 欧美12一13SEX性视频| 欧美群交一区二区大吊曰大逼| 蜜柚影院AV免费观看| 日本无遮挡h肉动漫在线观看| 无码人妻侵犯一区侵犯| 老实人夫被爆炒主角们爆炒了| 国产精品剧情在线蜜臀| 久久草福利视频国产| 免费最婬荡荡谢毛片午夜剧场 | 午夜亚洲乱码伦小说区| 少妇中文字幕久久精品无码| 拔萝卜视频直播下载| 亚洲中文无码日韩A∨精品亚洲免费观看网 | 一级黄色片免费观看| 国产精品成人嫩草影院| 亚洲三级视频在线播放| 在线观看国产高清a| 老赵揉着粉嫩的双乳太舒服了秀婷| 欧美日韩性视频在线| 国产精品美女在线免费| 国产超级无码一极毛片 | ▓草莓视频在线观看▓| 天堂国产在线视频| 叶玉卿被揉到高潮下不了床| 日本二区在线中文字幕好看到停不下来! | 国产精品.久久久| 成a人片免费在线观看| 国产中文在线精品一区| 日韩黄色高清视频| 内裤堵嘴app高清| 中文字幕日韩亚洲视频在线| 美腿丝袜诱惑一区2区| 亚洲欧美日产国产视频| 日韩精品亚洲色大成网站| 色欲?ⅴ精品一区二区三区四区 | 国产乱人视频在线免费观看| 久久精品囯產亞洲av麻豆色欲 | 2022v视频无码高清网站| 亚洲高清国产拍精品青青草原| 久久艹这里只有精品| 国产精品久久久久片免费又是看| 久久精品人妻中文系列葵司| 亚洲AV综合色区无码区| 国产18成人三级在线观看| 国产精品一区二区精品片子| 91老师秘片黄在线观看| 日韩精品中文字字幕有码专区| 影视免费三级少妇| 亚洲无遮挡一级精品视频| 免费美女视频一区| 超碰97人人天天夜夜| 五月丁香婷婷免费| 黑人处破女免费播放| 国产看片在线观看一区| 国产Av激情久久无码天堂| 久精品视频在线播放网站| 午夜亚洲乱码伦小说区| 久久婷婷国产免费天天| 国产成人综合在线女婷五月99播放| 在线观看精品一区二区三区| 丁香婷婷深情五月丁香中文字幕 | 欧美无砖专区日本免费观看| 国产天堂在线一区二区三区| 成年午夜免费aⅴ在线观看| 欧美日韩精人妻品一区| 日韩三级片免费观看| 免费在线观看一区二区| 国产成人真人片亚洲精品不卡| 国产高清视频在线播放一区二区三区 | 亚洲AV日韩在线一区二区三区| 国产精品青青草原免费无码中国| 日韩免费福利一区八区| 四虎在线最新地址99| 很黄很黄的曰批视频| 综合亚洲伊人午夜网| 国产成 人 亚洲 综合| 深夜福利视频在线一区| 无码区一二区mv| 男女做爰大粗舒服小说| 国产成人综合亚洲国产vr| 视频一区亚洲专区| 国产乱妇乱子视频在线观看免费 | 欧美人妻精品一二三区| 缅甸恐怖网站lomando| 久久久综合精品一区二区三区无码| 亚洲欧美日韩岛国色图| 天天做天天欢摸夜夜摸狠狠摸| 国产一级婬片免费播放电影 | 精品人妻挤奶一二三四区| 免费国产一区二区8X| 日韩婬乱a一级毛片视频| 午夜国产精品福利影院| 欧美jizz18性欧美色天堂综合在线| 国产精品色片免费| 高清免费三级毛片| yy111111少妇影院无码光屁股| 国产一区二区三区三州在线观看| 激战雪姨后厨2最新版本更新内容| 日韩制服丝袜片中文字幕| 日本在线一级| 免费久久黄色毛片| 久久大屁股白浆一区二区| 亚洲永久精品ww47 91一区| 日本在线视频色综合| 二次元人物桶二次元人物免费网站| 国产尤物A∨尤物在线观看| 精品国产伦一区二区三区在唱戏| 国产成人69天堂| 免费夫妻生活片av| 18勿看免费大片1000拍拍| 中文字幕无码亚洲视频| 男女做爰大粗舒服小说| 美女视频黄又黄又免费| 国产热の有码热の无码视频 | 国产亚洲乱码无码www| av午夜福利精品一区| 综合 欧美 日韩 中文字幕| 男人你懂的在线观看视频| 做爰高潮a片视频35分钟| 亚洲 欧洲 日产 专区| 国产 亚洲 欧美 另类中文| 国产欧美久久一区| 国产精品福利视频一区二区三区| 熟妇av日韩不卡| 91好色先生下载污| 奇米777在线影视四色首页| 国产露脸无码a区久久蘑菇| 欧美猛少妇色xxxx久久久久| 女人十八毛片免费观| 国产一级普通话农村毛片| 秋霞午夜国产一区二区三区| 黑人粗大区一区二视频| 精品免费在线欧美| 了解最新精品国产拍拍拍无遮挡 | 欧美一级在线高清免费观看| 亚洲日韩制服另类| 国产精品免费播放器大全| 亚洲911精品影剧| a免费在线观看| 国产美女性爱亚洲性爱在线观看| 婷婷六月天无码| 99精品又大又粗又硬少妇毛片| 四虎影视国产免费| 国产刺激一女多男一区二区| 日韓歐美一區二區三區不卡| 在线精品三级视频在线网| 国产亚洲乱码无码www| 91成人午夜精品福利院| 国产成人福利在线观看视频| 免费国产福利一区二区| 在线播放国产视频99| 最新国产成人精品区在线观看| 最近最新的日本中文字幕| 做爰高潮a片视频35分钟| 无码av高潮抽搐流白浆在线| 黄色成人在线播放| 精品91自产拍在线观看99re| 亚洲国产精品 制服丝袜| 国产精品国产亚精品不卡| 亚洲视频在线观看污污的黄| 99视频精品全部免费在线| 韩国电影密爱在线观看| 亚洲欧美一区二区在线观看| 免费综合日本中文| 亚洲一级皇色大片蜜汁满满| 精品国产AⅤ一区二区三区4区| 欧美一区日本二区| 黑人巨茎大战俄罗斯白人美女| 国产又长又粗达到性高潮的视频| 香蕉视频久久免费直播| 一区二区毛片视频免费看| 极品人妻videos人妻| 亚洲欧美日韩免费在线播放| 东京热无码一区| 高清国产在线观看| 韩国午夜理论a三级在线观看 | 日本不卡一区在线| 蜜柚影院AV免费观看| 青春草五月天婷婷欧美日韩| 欧美在线天堂视频不卡| 青娱乐精品视频在线免费观看 | 亚洲毛片精品二区| 欧美日本不卡一二三区| 一进一出把女子干的全身抽搐| 少妇人妻偷人精品毛片免费√| 波多野结衣加勒比| 欧美疯狂性受xxxxx另类| 天天被干免费观看视频| 深夜福利视频在线一区| 偷自拍亚洲综合在线| 影音先锋国产在线| 欧美激情诱惑在线观看| 免费无码在线aⅴ| 一级做a爰片久久毛片免费看| 欧美一区二区三区免费观看视频互動交流| 无码av高潮抽搐流白浆在线| 国产一级精品精品精品| 国精产品一区一区三区m| 久久久久久久女国产乱让韩| 欧美无砖专区日本免费观看| 一级做性色α爱片久久毛片色| 香蕉久久AB一区二区三区| 久久er热这里只有国产中文精品 | 大香伊蕉最新视频国产| 亚洲人看A∨免费片| 草莓茄子丝瓜樱桃鸭脖绿巨人| 1024手机在线国产你懂的| 欧美一区日韩在线播放| 一级少妇精品视频一区二区| 国产精品主播视频欧美日韩| 久久精品日产第一区高清版| 亚洲国产欧美日本韩中文字幕在线| 欧美经典复古伦理在线| 特级a毛片免费观看| 国产69久久精品成人必看| 国产高清在线观看AV片| 欧美亚洲国产手机在线dvd | 最近更新中文字幕大全| 老司机在线观看亚洲二区一区| 国产精品成人嫩草影院| 国产亚洲精品精品在线精品| 91久久精品日本一区| 2022v视频无码高清网站| 免费夫妻生活片av| 亚洲最新无码2021| 国产成人av大片大片在线播放| 189国产亚洲精品视频第1页| 久久亚洲av成人网| 88AV葵司便利店侵犯堕落| 亚洲欧美日韩综合第一| 精品国产三级AV在线视色| xxxx黄色网站在线观看| …久久精品99久久香蕉国产 | 久久精品国产AⅤ无码| 亚成人欧美在线观| 自拍欧美在线观看三级| 一级aa免费视频毛片| 欧美亚州国产精品| k频道国产网红欧美在线视频 | hezyo加勒比在线综合| 精品自拍自产一区二区三区免费 | 444kk免费看片在线观看| 最近最新中文字幕2018| 一区二区三区吞精| 久久久久久久国产精品视频| (愛妃)久久AV无码精品人妻出轨| 亲亲发出吧唧吧唧的声音| 中文字幕乱码一区二区三区蜜桃成熟时| 在线观看免费综合亚洲| 91成人精品亚洲高清在线观看| 车里要了好多次天天影院网 | 欧美亚洲免费播放一区| 亚洲国产的精品太乱码一区二区| 亚洲人妻久久无码| 无码日韩做暖暖大全免费| 日本欧美一区二区| 无遮挡美女18禁免费啪啪| 在线观看免费国产一区二区| 国产另类欧美自拍日韩综合| 97久久久人妻一区精品| 久久黄色高清视频。| 国产午夜福利影音| 亚洲国产激情一区在线| 中文字幕AV二区| 亚洲 自拍 露出 极品| 精品国产成a人片在线观看| …久久精品99久久香蕉国产| 国产黄色在线观看.| 八戒影视大草原久久揄拍片| 91精品无码4k岛国| 天天做天天干中文字幕| a级毛片无码真人版| 正在播放黑人巨大在線觀看| 日本一本色道高清| 日韩欧美在线观看一区二区三区| 九一视频免费版污| 少妇熟女高潮流白浆| 欧美无砖专区日本免费观看| 97人人视频波多野结衣蜜月| 尹人在线视频| 人妻久久系列精品| 很黄很黄的曰批视频| 午夜精品影视网热门电影全集免费播放在线观看 | 免费真人一对一视频| 日韩精品亚洲色大成网站| 久久久久久免费播放一级毛片| 欧美成人午夜影院| 欧美日韩一二区在线观看| 日本国产一区二区三区在线观看| 成人免费在线观看高清视频| 久久156精品视频| 日韩亚洲色欲色一欲www| 99久久免费只有精品国产在 | 444kk免费看片在线观看| 911精品國產91久久久久| 欧美日在线观看视频| 欧美性爱福利视频| 午夜宅男视频| 四虎影视国产免费| 欧美日韩精人妻品一区| 奶水美人双性h美人多汁| 91精品国产成人久久久久久| 国产一级国产一级在线观看| 跪趴着被主人狠狠调教| 国产超清无码 片内射免费| a毛片免费全部播放吃| 国产一级普通话农村毛片| 久久综合综合久久?V在钱| 欧美中文日韩综合在线视频| 果冻国产精品麻豆成人av电影| 高潮喷水女仆流白浆| 国产激情福利| 国产av网站高跟丝袜| 午夜精品九九九九99蜜桃| 特级毛片www免费版| 善良的嫂子高清播放完整版| 欧美一级aa大片免费看视频 | 丰满多毛xXXⅩ精品视频| 日韩在线试看一区96丝袜| 国产精品亚洲综合每日| 精品久久久久久无码福利片 | 国产成视频在线观看| 久久成人精品免费国产片| 亚洲国产欧美日本韩中文字幕在线| av日韩在线观看一区二区三区| 国产成人欧美综合在线观看| 国产成人av一区二区三区中文精品 | 91视频欧美青青草| 狠狠干经典视频在线观看| 日产午夜精品一区二区播放| 外国av在线免费观看| 成人国产欧美日本精品久久麻豆 | 網友分享国产一区精品在线心得| 男人J桶进男人屁股过程| 国产亚洲成AⅤ人片在线观看| 亚洲无遮挡一级精品视频| 青青青青久久精品国产首| 色午夜天香婷婷丁香| 免费在线观看一区二区| 九色91POPNY蝌蚪新疆| 在车里被弄了4次高潮| 久久久久av綜合網成人| 日韩av手机在线观看| 91伊人久久大香线蕉网站| 熟女一区二区天天操夜夜操| 人妻系列专区无码在线| 天堂a亚洲国产色久在线| 国产成人真人片亚洲精品不卡 | 色五月丁香五月综合五月橹| 免费av中文字幕| 91桃色国产精品免费在线观看| 好吊妞视频这里有精品妞干网| 亚洲s码欧洲m码一二三区| 狠狠综合久久一区二区三区| 懂色午夜一区二区三区| 在线观看精品一区二区三区| 五月天伊人久久| 国产内地刺激性精品毛片 | 张警官撞玻璃9分10秒| 四虎永久在线免费视频一二区| 国产超级va在线观看视频| 国产一线在线观看| 日本欧美一区二区| 国产强上视频在线观看| 了解最新精品国产拍拍拍无遮挡| 精品国产v无码大片在| 二区三区精品| 九九爱WWW无码人成| 2022久久最新国产精品| 精品久久久久免费免费自慰| 9色丨porny丨人妻| 日产一区二区三区精品视频| 女人十八毛片免费观| 国产亚洲h网综合h网久久| 欧美激情四射一区二区在线| 天堂成人在线视频| 国产精品免费久久久久影院周| 国产刺激一女多男一区二区| 最新av网站网址免费观看| 成人3d动漫一区二区三区| 精品乱伦欧美国产| 午夜激情无码| 国产极品午夜在线观看| 欧美日韩三级在线观看| 拔萝卜视频直播下载| 一级婬片一级视频| A级成人婬片免费看无码| 啊灬啊别停灬用力啊黑人| 国产日韩欧美啪啪色| 中文字幕精品三级视频| 亚洲欧美中文日韩v在线在线观看| 日本成a人片在线观看网站| 亚洲精品无码av国模| 北条麻妃青青久久av| 日韩A∨无码综合久久五月| 视频一区亚洲自拍最新国产精品亚洲| 久久久久久亚洲精品电影| 久久久久久人妻| 亚洲黄色AV电影在线不卡| 日韩2022中文字幕| 欧美经典复古伦理在线| 色噜噜国产精品视频一区二区互动交流| 欧美国产第一区| 人妻一区在线播放| 在线播放国产视频99| 香蕉视频免费在线观看| 搡女人真爽免费视频人成午夜| 亚洲殴美在线视频| 鲁大师视频在线观看免费播放| 欧美另类亚洲日韩精品一区二区不卡| 日韩精品成人蜜桃| 中文字幕av美利坚合众国无码 | 日日澡夜夜澡人人| 人妻夜夜爽天天爽4区| 国产精品日本欧美一区三| 孕妇动漫精品国产一区二区三区| 欧美综合色网| 久久 久久 国内精品亚洲| 亚洲精品国产成人影片在线观看| 日韩AAA久久蜜桃AV| 五月天婷婷伊人久中文字幕| 亚洲男男激情videos高清| 亚洲电影激情五月激情| 午夜亚洲国产理论片2020| 成人久久一区精品| 久久美女视频黄片| 成人无码视频在线一区| 凹凸在线一区二区三区熟妇| 亚洲av永久无码偷拍另类| 欧美激情在线播放一区二区 | 中文字幕欧美精品日韩在线| 久久夜色精品国产亚洲| 精品免费一区二区爱| 精品国产日韩在线观看| 国产毛片久久久久久久久久久久| 在线亚洲理论午夜AV大片| 美女欧美一区二区| 114人体棚拍人体私密大尺度 | 欧美在线激情性受内射不卡在线观看| 亚洲欧洲AVAV天堂系列| 好紧好湿好爽免费视频美女做| 精品手机在线| 亚洲AⅤ成人综合网伊人APP| 韩国r级中文字幕在线播放| 91久久久韩系亚洲| 亚洲精品综合在线导航网址| 日韩三级片免费观看| 91久久精品日本一区| 国产高清视频在线播放一区二区三区 | 精品香蕉在线观看国产首页| 思思热视频精品在线观看| 麻豆国产精品VA白浆| 亚洲精品性美腿丝袜电影| 网址你懂得国产精品| 国产成 人 亚洲 综合| 久久精品2021国产| 黑人巨大无码系列在线| 欧美成人专区| 伊人久久香综合蕉五月天| 色网在线观看| 又脱又摸下面激烈免费视频| 手机版亚洲成人网站| 精品一区二区三区播放| 成人精品aaa亚洲丝袜在线观看| 制服丝袜自拍偷拍av一区| 国产片淫乱一级毛片视频| 天堂成人一区二区三区av片| 五月天婷婷伊人久中文字幕| 亞洲歐美日韓中文字幕首頁 | 国内高清A自拍视频| 欧美亚洲不卡av免费一二三区| 国产成a人亚洲精v| 白洁老师国产麻豆片| 色噜噜国产精品视频一区二区互动交流| 色网日本在线观看| 欧美一区二区三区18禁| 国产 亚洲 欧美 另类中文| dy888午夜国产精品亚洲| 精品自拍自产一区二区三区免费| 欧洲aⅴ无码片一区二区三区| 亚洲av日韩国产激情| 手机成人免费视频| 狠狠干2017欧美最新| 国产精品亚洲自拍| 亚洲午夜久久免费| 国内a级毛片免费观看| 爱情岛免费视频论坛一路线| 国产内地刺激性精品毛片| 在线a亚洲v天堂网2018影| app搞鸡视频在线观看黄色| 91香蕉视频一区二区在线观看国产b站视频| 国产毛多水多女人A片色情| 少妇人妻一区二区视频| 贵州少妇一级毛片| 动漫av观看网站不卡无码| 色吧超碰97人妻| 女生奖励自己隐私越狠越安全好| 99天天操天天做天天| 亚洲日韩成人在线| 午夜精品成人一区二区三区| 亚洲婷婷影院女优视频网站| 性感日韩在线视频观看| 日韩婬乱a一级毛片视频| 亚洲欧美精品日韩片| 欧美黄片十分钟不卡一区| 免费观看又色又刺激的视频| 性欧美亚洲第一综合天堂另类专 | 在线看片免费视频国产五月天| 日韩免费福利剧场| 国精一二二产品无人区免费应用| 久久精品99国产国产精人s| 6080YYY午夜理论片免费| 高潮时奶水喷出来了| 国产男女嘿咻视频在线| 日韩欧美国产免费一二三区| 色综合久久中文字幕无码色欲| 国产精品亚洲日韩高清资源| 成人无码视频在线一区 | 欧美午夜久久精品另类| 特级一级毛片视频免费观看| 日韩殴无码中文字幕| 不卡av中文在线观看| 亚洲精品手机在线视频| 美女夜午夜福利二区| 久久精品欧美| 久久99蜜桃精品久久久久| 成人性做爰aaa片免费看不忠| 国产精品亚洲欧美—级久久精品| 国产精品九九久久九九国产| 国产狼友精品视频网| 亚洲精品欧美综合久久| 久久成人国产精品青青| 成人国产一区二区三区精品小说| 99久久精品无码一区二区麻豆| 免费99精品国产一级A大人片| 国产目拍亚洲精品二区婷婷| 欧美视频第2页在线视频| 亚洲av日韩国产激情| 国产中文自拍无码| heyzo无码综合亚洲精品| 日韩制服丝袜片中文字幕 | 中国精品视频在线一区二区| 午夜色a大片在线观看免费| 777午夜精品被窝影院| 黄到让你下面湿的视频| 秋霞影院韩国伦片在线播放| 国产黄色在线网站| dy888午夜国产精品亚洲| 欧美日韩在线二区下载| 肉色丝袜超薄一区二区三区 | 自拍欧美在线观看三级| 国产偷窥熟女精品| 日本一本色道高清| 亚洲视频欧美在线专区| 麻豆精品国产一级| 色戒未删减2小时38分在线| 欧美日韩二区视频| 婷婷深爱亚洲五月| 亚洲婷婷影院女优视频网站| 激情影院免费视频试看| 老实人夫被爆炒主角们爆炒了| 女性高爱潮免费有声视频网站| 亚洲欧美日产国产视频| 亚洲国产欧洲韩国高清专区| 肛交的免费视频91视频| 青青草原免费在线观看| 欧美一区手机在线观看视频| 亚洲精品成人?v在线| 国国产最新精品盗摄视频| 日韩一区二区在线视频| 欧美视频在线观看精品一级| 日韩欧美自在线观看亚洲精品福利片 | 久久精品国产99国产精品严洲 | av资源久久免费下载| 波多吉野一区二区三区av | 18禁裸乳無遮擋啪啪無碼免費| 成人3d动漫一区二区三区| 夜夜高潮夜夜爽精品视频| 相泽南作品在线观看| 日韩国产欧美中文字幕在线播放| 欧美黑人精品一区二区在线| 88AV葵司便利店侵犯堕落| 少妇一区二区三区精品| 亚洲色综合中文字幕在线| 国产成人精品毛片AV在线| 国产精品成人AV片免费看| av蓝导航精品导航| 久久99蜜桃精品久久久久| 久久国产精品15色老板| 日韩国产亚洲欧美有码| 国产成人AⅤ免费观看| 99久久99久久久精品| 免费国产自产一区二区三区四区| 亚洲中文无码成人网| 草莓视频免费在线看| 精品国产午夜肉伦伦影院| 无码观看在线一区| 欧美三级日韩国产在线观看| 国产精品综合久久| 中文字幕精品三级视频| 国产又粗又猛又大爽又黄的软件| 日韩制服丝袜片中文字幕 | 中文字幕永久有效丝袜| 益日韩欧群交P片内射中文| 成人高清影院| 在线观看亚洲精品视频| 国产又粗又大又硬又爽免费视频| 婷婷五月深爱五月| 欧美精品在线观看不卡一区| 欧洲精品aaa一区二区| 日本在线一区二区三区免费| 玖玖玖在线视频免费观看| 国产精品麻豆一区二区三区v视界| 最新无码国产在线视频2023| 亚洲三级无码经典三级| 国产精品a久久久久| 国产日批视频免费在线播放| 最近在线中文字幕更新| 国产精品麻豆一区二区三区v视界 国产精品精品综合在线网址 | 亚洲MV国产MV在线MV综合试| 亚洲精品无码av国模| 又脱又摸下面激烈免费视频| 相泽南作品在线观看| 精品久久久久免费免费自慰| 下载强漫画人物软件| 插曲免费的视频大全影视| 入禽太深在线色网视频5| 欧美日韩中字在线| A欧美亚洲日韩在线观看| 肛交的免费视频91视频| 天美传媒mv免费观看| 最近在线中文字幕更新| 茄子短视频app在线观看| 最新全集网电影免费在线看 | 正在播放黑人巨大在線觀看| 国内精品久久99人妻无码特黄| 亚洲成AV人手机在线观看网站| 91免费入口在线观看| 黄色人成影院一级| 亚洲精品视频中的话| 久久精品一区二区三区卡| 亚洲三级毛片在那看| 中文字幕人妻毛片av| 亚洲人成网站在线播放青春| 成人国产精品视频| 欧美影视一区| 久久久888精品视频| 18观看免费永久视频| 欧美一级欧美一级在线观看| 国产成人在线看片| 亚洲黄色AV电影在线不卡| 欧美日韩字幕一区| 不卡一卡二卡在线视频黄色大片免费在线观看 | 中国一级免费黄色电影| 911精品國產91久久久久| 日本精品在线免费观看| 69国产成人精品午夜在线| 久久免费观看一级毛片| 久久高清综合免费| 69国产成人精品午夜在线| 美女视频黄a视频全免费观看蜜臀| 色网日本在线观看| 夜夜欢av一区二区三区| 国产在线高清无码视频| 4se人人视频在线| 免费国产成人午夜在线观看| 亚州中文字幕不卡影院| 孕妇被内谢出白浆视频| 亚洲男男激情videos高清| 绿巨人聚合app入口| 日本二区在线中文字幕好看到停不下来! | 亚洲va欧美a国产va综合| 餐桌下狂c亲女高辣h文| 高清国产在线观看| 东京热无码一区| 韩国三级中文字幕HD久久精品| 欧美精品青青久久久久久久久久久| 丁香五月婷婷综合网| 日韩偷拍一区二区三区| 久久久精品午夜免费不卡91| 在线观看亚洲欧美一区二区三区 | 国产精品视频色拍拍2021| 一二三四高清在线观看视频中文| 久久99视频丝袜爱| 一区二区三区在线观看欧美| 亚洲精品免费影院| 亚洲911精品影剧| 三浦恵理子息与子中文字幕| 拔萝卜视频直播下载| 日韩免费无码| 少妇人妻偷人精品毛片免费√| 亚洲精品手机在线视频| 91精品国产91久久久久久无码天美 | 日韩床上特黄一级片| 日韩一区二区三区四区在线播放| 国内精品久久久久AV福利秒拍| 国产精品视播放一区二区三区| 欧美在线天堂视频不卡| 亚洲无码高清国产| 日本免费无码高清色倩片| 日本午夜色噜噜| 国产成a人亚洲精品无码性色| dddd亚洲日韩欧美精油| 天堂a亚洲国产色久在线| 国产99热在线露出| 亚洲国产福利播放| 亚洲熟妇av一区二区三区痴汉| 免费美女视频一区| 厨房里强摁做开腿呻吟动漫| 免费啪视频在线观看视频日本| 国产欧美一区二区日本加勒比| 性欧美VIDEOFREE高清大喷水| 亚洲性爱视频网站一级看片 | 日韩台精品电影在线观看网站免费| 女人毛片免费看一分钟| 国内精品视频天天在线观看| 久久精品日产第一区高清版| 国产人妻高清国产拍精品| 亚洲日本韩国成人在线视频| 日韩精品亚洲色大成网站| 樱桃视频草莓视频幸福宝| 欧美一区二区久久精品| 日韩国产亚洲欧美有码| 免费国产一区二区久久| 久久久精品一区二区藌桃| 桃子视频APP在线下载污| 日韩精品一区国产偷窥在线| 黄色美女网站av| 午夜亚洲乱码伦小说区| 奶茶视频APP黄在线播放| 国产成人真人片亚洲精品不卡| 欧美国产第一区| AV网站国产大全| 久久高清综合免费| 厨房里强摁做开腿呻吟动漫| 亚洲成人特级毛片| 欧洲精品高清无码一区二区三区| 先锋影音制服丝袜| 亚洲一区国产区羞羞视频| 久久精品丰满人妻99|