期刊文献+
共找到60篇文章
< 1 2 3 >
每页显示 20 50 100
Application Research and Implementation of the CORBA-Based Web Distributed Network Management System 被引量:3
1
作者 WANGFeng SHIBing-xin 《Wuhan University Journal of Natural Sciences》 EI CAS 2004年第5期699-705,共7页
The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Archite... The distributed management has become an important tendency of development for the NMS (Network Management System) with the development of Internet. Based on the analysis of CORBA (Conmon Object Request Broker Architecture) technique, we mainly discuss about the applicability of the approach by which CORBA combined with Java has been applied to the system model and Web architecture: and address the applied frame and the interface definitions that are the, key technologies for implementing the Distributed Object Computing (DOC). In addition, we also conduct the research on its advantages and disadvantages and further expected improvements. Key words distributed Web network management - CORBA - Java CLC number TP 393.07 Foundation item: Supported by the QTNG (Integrated Network Management System) Project Foundation and QT-NMS (SDH NMS) Project Foundation of Wuhan Qingtian Information Industry Co., LTD of Hubei of China (SDH.001)Biography: WANG Feng (1979-), male Master candidate, research direction: administration of network and software engineering. 展开更多
关键词 distributed Web network management CORBA JAVA
下载PDF
An Emulating Environment for Network Management of Space Network
2
作者 ZHANG Jun HUANG Yingjun +1 位作者 LI Guohui WU Defeng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第2期365-369,共5页
An emulating environment for network management of the space network was presented. The emulating environment was developed with node-link model. The nodes of the satellite entities were controlled by the controlling ... An emulating environment for network management of the space network was presented. The emulating environment was developed with node-link model. The nodes of the satellite entities were controlled by the controlling network, which consist of sets of HLA/RTI based federates. These federates described the different aspect of the attributes of the satellites, such as orbit coordinate, routing table and the chain budget. We described the architecture of the emulation environment and the software design of federates. We measured the response time of the protocol data units and verified the detecting of the network topology in the environment. The environment was open that the on board router and the simulator of satellite link which developed by third party could be integrated. 展开更多
关键词 space network emulating network management HLA/RTI (High Level Architecture/Runtime infrastructure)
下载PDF
Research and Design of IPv6 Network Management and Operations Support System
3
作者 Chen Bin Ji Wenchong Qiu Zhonghui (China Network Communications Group Corporation, Beijing 100032, China) 《ZTE Communications》 2006年第1期16-20,共5页
IPv6 is the foundation of the development of Next Generation Internet (NGI). An IPv6 network management and operations support system is necessary for real operable NGI. Presently there are no approved standards yet a... IPv6 is the foundation of the development of Next Generation Internet (NGI). An IPv6 network management and operations support system is necessary for real operable NGI. Presently there are no approved standards yet and relevant equipment interfaces are not perfect. A Network Management System (NMS) at the network layer helps implement the integrated management of a network with equipment from multiple vendors, including the network resources and topology, end-to-end network performance, network failures and customer Service Level Agreement (SLA) management. Though the NMS will finally realize pure IPv6 network management, it must be accommodated to the management of relevant IPv4 equipment. Therefore, modularized and layered structure is adopted for the NMS in order to implement its smooth transition. 展开更多
关键词 work Research and Design of IPv6 network management and Operations Support System Design RFC IETF NMS MIB RMON NGI SNMP ICMP
下载PDF
Research and Design of Network Management Construction Based on Mobile AGENT
4
作者 Yuan-Hui Yu 《Journal of Electronic Science and Technology of China》 2007年第3期215-217,共3页
The technical characters of mobile agent (MA) originated in the distributional artificial intelligence domain is introduced. A network management construction based on agent (NMCA) is then proposed. The NMCA struc... The technical characters of mobile agent (MA) originated in the distributional artificial intelligence domain is introduced. A network management construction based on agent (NMCA) is then proposed. The NMCA structure features are elaborated in detail. A prototype design of NMCA is given by using the jKQML programming. The establishment of NMCA platform will be helpful to reduce the correspondence load of network management and improves the efficiency and the expansion ability of network management systems. 展开更多
关键词 HARBOR manage center monitored node network management construction based on agent.
下载PDF
Design of Power Communication Data Network Management System and Implementation of Data Acquisition Module
5
作者 Yue Zhang Zefeng Jian Hao Wang 《Journal of Electronic Research and Application》 2021年第6期1-5,共5页
The power communication network is a separate network from the power grid whose primary purpose is to ensure the power grid's safe operation.This paper expounds the composition of the comprehensive network managem... The power communication network is a separate network from the power grid whose primary purpose is to ensure the power grid's safe operation.This paper expounds the composition of the comprehensive network management architecture of the power communication data network and the implementation of the data acquisition module in the network management system through theoretical analysis,for the reference of relevant personnel,in order to better promote the collection of power grid communication network data. 展开更多
关键词 Electric power communication network management system design Data acquisition
下载PDF
Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques
6
作者 Nasser Alshammari Shumaila Shahzadi +7 位作者 Saad Awadh Alanazi Shahid Naseem Muhammad Anwar Madallah Alruwaili Muhammad Rizwan Abid Omar Alruwaili Ahmed Alsayat Fahad Ahmad 《Computer Systems Science & Engineering》 2024年第2期363-394,共32页
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne... Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment. 展开更多
关键词 Software defined network network function virtualization network function virtualization management and orchestration virtual infrastructure manager virtual network function Kubernetes Kubectl artificial intelligence machine learning
下载PDF
Threshold-Based Software-Defined Networking(SDN)Solution for Healthcare Systems against Intrusion Attacks
7
作者 Laila M.Halman Mohammed J.F.Alenazi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1469-1483,共15页
The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are ... The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are widely used in healthcare systems,as they ensure effective resource utilization,safety,great network management,and monitoring.In this sector,due to the value of thedata,SDNs faceamajor challengeposed byawide range of attacks,such as distributed denial of service(DDoS)and probe attacks.These attacks reduce network performance,causing the degradation of different key performance indicators(KPIs)or,in the worst cases,a network failure which can threaten human lives.This can be significant,especially with the current expansion of portable healthcare that supports mobile and wireless devices for what is called mobile health,or m-health.In this study,we examine the effectiveness of using SDNs for defense against DDoS,as well as their effects on different network KPIs under various scenarios.We propose a threshold-based DDoS classifier(TBDC)technique to classify DDoS attacks in healthcare SDNs,aiming to block traffic considered a hazard in the form of a DDoS attack.We then evaluate the accuracy and performance of the proposed TBDC approach.Our technique shows outstanding performance,increasing the mean throughput by 190.3%,reducing the mean delay by 95%,and reducing packet loss by 99.7%relative to normal,with DDoS attack traffic. 展开更多
关键词 network resilience network management attack prediction software defined networking(SDN) distributed denial of service(DDoS) healthcare
下载PDF
An Architectural Modelfor Intelligent Network Management 被引量:1
8
作者 罗军舟 顾冠群 费翔 《Journal of Computer Science & Technology》 SCIE EI CSCD 2000年第2期136-143,共8页
Traditional network management approach involves the management of each vendor's equipment and network segment in isolation through its own proprietary element management system. It is necessary to set up a new n... Traditional network management approach involves the management of each vendor's equipment and network segment in isolation through its own proprietary element management system. It is necessary to set up a new network management architecture that calls for operation consolidation across vendor and technology boundaries. In this paper,an architectural model for Intelligent Network Management (INM) is presented. The INM system includes a manager system, which controls all subsystems and coordinates different management tasks; an expert system, which is responsible for handling particularly difficult problems, and intelligent agents, which bring the management closer to applications and user requirements by spreading intelligent agents through network segments or domain. In the expert system model proposed, especially an intelligent fault management system is given. The architectural model is to build the INM system to meet the need of managing modern network systems. 展开更多
关键词 network management intelligent network management artificial intelligence expert system intelligent agent
原文传递
Study of the Improvement on Network Management Performance with Mobile Agent 被引量:9
9
作者 LIJie WANGRu-chuan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2003年第3期11-16,共6页
Owing to the increasing great complexity, computer network systems requiremore sophisticated management strategies to be adopted so as to guarantee adequate levels ofperformance. The classic centralized paradigm, adop... Owing to the increasing great complexity, computer network systems requiremore sophisticated management strategies to be adopted so as to guarantee adequate levels ofperformance. The classic centralized paradigm, adopted by SNMP, which was once appropriate in theprevenient phrase, has posed problems with the explosive expansion of networks, as well as othercentralized models. Mobile Agent (MA), owing to its capability of implementing a distributed system,represents a challenging approach to provide network management with high performance. In thispaper we analyze the network management structure model based on MA at first, and then we putforward a reference scenario based on MA and compare it with the traditional model. We also describea prototype implementation based on our mobile agent system named MAS. Finally, we do someexperiments to verify the performance of our framework prototype. 展开更多
关键词 network management SNMP MA JAVA
原文传递
Study of the Security in Network Management Based on Mobile Agents 被引量:2
10
作者 CHEN Zhi~1 WANG Ru-chuan~(1,2)1.Department of Computer Science and Technology,Nanjing University of Posts and Telecommunications,Nanjing 210003,P.R.China 2.State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210093,P.R.China 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2004年第4期37-42,共6页
Security of mobile-agent based network management must be considered due to the widespread adoption of mo-bile agents in network management,which involves the protections of mobile agents,management station and manage... Security of mobile-agent based network management must be considered due to the widespread adoption of mo-bile agents in network management,which involves the protections of mobile agents,management station and managed de-vices.The integrated security model proposed in our paper incorporates the effective security countermeasures of these entitiesinto a trusted execution environment and two security protection layers.Sandbox based on Java virtual machine and Javacard independent on the network devices also with the cryptography technology in this model together protect the networkmanagement process. 展开更多
关键词 network management mobile agent SECURITY Java card CRYPTOGRAPHY
原文传递
Gym-ANM: Reinforcement learning environments for active network management tasks in electricity distribution systems
11
作者 Robin Henry Damien Ernst 《Energy and AI》 2021年第3期171-193,共23页
Active network management(ANM)of electricity distribution networks include many complex stochastic sequential optimization problems.These problems need to be solved for integrating renewable energies and distributed s... Active network management(ANM)of electricity distribution networks include many complex stochastic sequential optimization problems.These problems need to be solved for integrating renewable energies and distributed storage into future electrical grids.In this work,we introduce Gym-ANM,a framework for designing reinforcement learning(RL)environments that model ANM tasks in electricity distribution networks.These environments provide new playgrounds for RL research in the management of electricity networks that do not require an extensive knowledge of the underlying dynamics of such systems.Along with this work,we are releasing an implementation of an introductory toy-environment,ANM6-Easy,designed to emphasize common challenges in ANM.We also show that state-of-the-art RL algorithms can already achieve good performance on ANM6-Easy when compared against a model predictive control(MPC)approach.Finally,we provide guidelines to create new Gym-ANM environments differing in terms of(a)the distribution network topology and param-eters,(b)the observation space,(c)the modeling of the stochastic processes present in the system,and(d)a set of hyperparameters influencing the reward signal.Gym-ANM can be downloaded at https://github.com/robinhenr y/gym-anm. 展开更多
关键词 Gym-ANM Reinforcement learning Active network management Distribution networks Renewable energy
原文传递
Network traffic identification in packet sampling environment
12
作者 Shi Dong Yuanjun Xia 《Digital Communications and Networks》 SCIE CSCD 2023年第4期957-970,共14页
With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management... With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management systems.In this paper,in order to improve the accuracy of network traffic identification,sampled NetFlow data is applied to traffic identification,and the impact of packet sampling on the accuracy of the identification method is studied.This study includes feature selection,a metric correlation analysis for the application behavior,and a traffic identification algorithm.Theoretical analysis and experimental results show that the significance of behavior characteristics becomes lower in the packet sampling environment.Meanwhile,in this paper,the correlation analysis results in different trends according to different features.However,as long as the flow number meets the statistical requirement,the feature selection and the correlation degree will be independent of the sampling ratio.While in a high sampling ratio,where the effective information would be less,the identification accuracy is much lower than the unsampled packets.Finally,in order to improve the accuracy of the identification,we propose a Deep Belief Networks Application Identification(DBNAI)method,which can achieve better classification performance than other state-of-the-art methods. 展开更多
关键词 network measurement Application identification Packet sampling Application behavior CHARACTERISTIC Metric correlation network management
下载PDF
The Design of Management Software for Network Device Faults
13
作者 KOU Ya-nan, LI Guo-li, LI Zeng-zi Institute of Computer Architecture & Network, Xi’an Jiaotong University, Xi’an 710038, P. R. China 《International Journal of Plant Engineering and Management》 2001年第1期52-56,共5页
Effective network management software ensures networks to run credibly. In this paper we discuss the design and implementation of network device fault management based on Pure Java. It includes designs of general func... Effective network management software ensures networks to run credibly. In this paper we discuss the design and implementation of network device fault management based on Pure Java. It includes designs of general functions, server functions, client functions and a database table. The software can make it convenient to monitoring a network device, and improve network efficiency. 展开更多
关键词 network management device fault SERVER CLIENT DATABASE
下载PDF
Research on Digital and Analog Electronic Experiment Teaching Course Management based on UltraLab Network Experiment Platform
14
作者 FAN Yiqiang ZHANG Jing +2 位作者 YU Haoran HE Guannan YUAN Hongfang 《International Journal of Plant Engineering and Management》 2018年第4期206-215,共10页
Digital circuit and analog circuit courses are basic courses for students of science and engineering universities. Among them,the practical courses are of great significance for students to master the knowledge of ele... Digital circuit and analog circuit courses are basic courses for students of science and engineering universities. Among them,the practical courses are of great significance for students to master the knowledge of electronics. In order to make teachers teaching more efficiently and students studying more quickly,how to update the experimental course in teaching reform is the key point. This paper analyzing the present situation of teaching in the digital circuit and analog circuit courses,the teaching questions in universities. On the basis of it,the innovation measures of experimental teaching methods and contents are discussed. Our school tries to introduce the UltraLab network experiment platform,reform and optimize the teaching methods of related courses.And it’ s accelerating the construction and development of emerging engineering education’ s process,reducing effectively the teacher’s time for managing in equipment,improving the students’ ability to use instruments. 展开更多
关键词 Index terms-teaching reform in digital and analog circuit UltraLab network experimental platform network management for equipment Emerging engineering education
下载PDF
Development Methodologies for Network Softwarization: A Comparison of DevOps, NetOps, and Verification
15
作者 Mehmet Beyaz 《International Journal of Communications, Network and System Sciences》 2023年第5期97-104,共8页
This white paper explores three popular development methodologies for network softwarization: DevOps, NetOps, and Verification. The paper compares and contrasts the strengths and weaknesses of each approach and provid... This white paper explores three popular development methodologies for network softwarization: DevOps, NetOps, and Verification. The paper compares and contrasts the strengths and weaknesses of each approach and provides recommendations for organizations looking to adopt network softwarization. 展开更多
关键词 Development Methodologies network Softwarization DevOps NetOps VERIFICATION Software-Defined networking network Function Virtualization Automation COLLABORATION Testing Validation network Operations network management
下载PDF
Machine learning-based zero-touch network and service management:a survey 被引量:2
16
作者 Jorge Gallego-Madrid Ramon Sanchez-Iborra +1 位作者 Pedro M.Ruiz Antonio F.Skarmeta 《Digital Communications and Networks》 SCIE CSCD 2022年第2期105-123,共19页
The exponential growth of mobile applications and services during the last years has challenged the existing network infrastructures.Consequently,the arrival of multiple management solutions to cope with this explosio... The exponential growth of mobile applications and services during the last years has challenged the existing network infrastructures.Consequently,the arrival of multiple management solutions to cope with this explosion along the end-to-end network chain has increased the complexity in the coordinated orchestration of different segments composing the whole infrastructure.The Zero-touch Network and Service Management(ZSM)concept has recently emerged to automatically orchestrate and manage network resources while assuring the Quality of Experience(QoE)demanded by users.Machine Learning(ML)is one of the key enabling technologies that many ZSM frameworks are adopting to bring intelligent decision making to the network management system.This paper presents a comprehensive survey of the state-of-the-art application of ML-based techniques to improve ZSM performance.To this end,the main related standardization activities and the aligned international projects and research efforts are deeply examined.From this dissection,the skyrocketing growth of the ZSM paradigm can be observed.Concretely,different standardization bodies have already designed reference architectures to set the foundations of novel automatic network management functions and resource orchestration.Aligned with these advances,diverse ML techniques are being currently exploited to build further ZSM developments in different aspects,including multi-tenancy management,traffic monitoring,and architecture coordination,among others.However,different challenges,such as the complexity,scalability,and security of ML mechanisms,are also identified,and future research guidelines are provided to accomplish a firm development of the ZSM ecosystem. 展开更多
关键词 Zero-touch network and service management(ZSM) Next generation networks(NGN) Artificial intelligence(AI) Machine learning(ML)
下载PDF
A Survey on Event Mining for ICT Network Infrastructure Management 被引量:1
17
作者 LIU Zheng LI Tao WANG Junchang 《ZTE Communications》 2016年第2期47-55,共9页
1 IntroductionNowadays in China, there are more than six hundred million netizens [1]. On April 11, 2015, the nmnbet of simultaneous online users of the Chinese instant message application QQ reached two hundred milli... 1 IntroductionNowadays in China, there are more than six hundred million netizens [1]. On April 11, 2015, the nmnbet of simultaneous online users of the Chinese instant message application QQ reached two hundred million [2]. The fast growth ol the lnternet pusnes me rapid development of information technology (IT) and communication technology (CT). Many traditional IT service and CT equipment providers are facing the fusion of IT and CT in the age of digital transformation, and heading toward ICT enterprises. Large global ICT enterprises, such as Apple, Google, Microsoft, Amazon, Verizon, and AT&T, have been contributing to the performance improvement of IT service and CT equipment. 展开更多
关键词 event mining failure prediction log analysis network infrastructure management root cause analysis
下载PDF
Home Network and Digital Rights Management Technology 被引量:2
18
作者 Yang Cheng 1Wang Yongbin 2Yang Yixian 3(1. Information Engineering School, Communication University of China, Beijing 100024, China 2. Computer and Software School, Communication University of China, Beijing 100024, China 3. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China) 《ZTE Communications》 2006年第4期12-18,共7页
The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becom... The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description. 展开更多
关键词 HDCP Home network and Digital Rights management Technology ZTE ISDB ATSC
下载PDF
Several Key Issues in Networking Management of Analytic Instruments 被引量:3
19
作者 LIU Jie 《International Journal of Plant Engineering and Management》 2008年第2期89-95,共7页
To improve the application of networking to analytic instruments, a kind of networking method based on conversion module between serial port RS-232 and protocol TCP/IP of MOXA Company is studied and compared with trad... To improve the application of networking to analytic instruments, a kind of networking method based on conversion module between serial port RS-232 and protocol TCP/IP of MOXA Company is studied and compared with traditional methods. Several characteristic classifications of equipment are summarized, and the methods of relevant data treatment are introduced. The key technical issues and successful cases are also presented which provides the networking of equipment in laboratories with a flexible and highly efficient solution. 展开更多
关键词 analytic instrument networking management TCP/IP RS-232
下载PDF
Management and Control of Outsourcing in Dispersed Network Manufacturing Systems
20
作者 Rob Dekkers Luping Wang 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期249-,共1页
The trend of economic globalisation and advances in i nformation technology has led to the emergence of dispersed manufacturing system s as a form of the virtual organisation. New manufacturing strategy pays more at t... The trend of economic globalisation and advances in i nformation technology has led to the emergence of dispersed manufacturing system s as a form of the virtual organisation. New manufacturing strategy pays more at tention to the management of the total value chain and therefore puts emphasis o n outsourcing. In fact, outsourcing is an efficient way of utilizing available r esources and has become one key aspect of the manufacturing strategy. Improved d ecision and organization on outsourcing will result in cost production and short er lead-times. However, most concepts and practice of traditional outsourcing do not adapt to t he changing environment and meet increasing performance requirements. On the oth er hand, virtual organisations might display instability between pure outsourcin g and establishing alliance. Balance and trade-off between independent agents a nd creating alliance are thus required. Therefore, the purpose of this paper is to develop a model to support decision-making, management and control on outsou rcing in a dispersed network manufacturing system and to discuss several key iss ues that are relevant to the relationship between the agents of the network. Dev elopment of the model will deploy Applied System Theory and will be built on fou ndations of earlier research on industrial management such the theories of Outso urcing, Order Entry Points, Design of Organisations and Logistic Control. The is sues that will be addressed in this paper are: · The selection of suppliers and co-makers; · Communication between suppliers and clients; · The mechanisms for profit-sharing between agents; · The product data management to integrate the knowledge of the different agent s into product design. Industrial companies will benefit from this research by the practical methods an d implementation extending their business models beyond concepts for outsourcing and alliances. Additionally, the exploration will lead to proactive contributio n of manufacturing during engineering, which would improve management and contro l of dispersed manufacturing systems. 展开更多
关键词 management and Control of Outsourcing in Dispersed network Manufacturing SYSTEMS
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部