• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Reducing energy consumption optimization selection of path transmission routing algorithm in opportunistic networks①

    2015-04-17 06:27:06WuJia
    High Technology Letters 2015年3期

    Wu Jia (吳 嘉)

    (School of Software, Central South University, Changsha 410075, P.R.China)

    ?

    Reducing energy consumption optimization selection of path transmission routing algorithm in opportunistic networks①

    Wu Jia (吳 嘉)②

    (School of Software, Central South University, Changsha 410075, P.R.China)

    Opportunistic networks are random networks and do not communicate with each other among respective communication areas. This situation leads to great difficulty in message transfer. This paper proposes a reducing energy consumption optimal selection of path transmission (OSPT) routing algorithm in opportunistic networks. This algorithm designs a dynamic random network topology, creates a dynamic link, and realizes an optimized selected path. This algorithm solves a problem that nodes are unable to deliver messages for a long time in opportunistic networks. According to the simulation experiment, OSPT improves deliver ratio, and reduces energy consumption, cache time and transmission delay compared with the Epidemic Algorithm and Spray and Wait Algorithm in opportunistic networks.

    opportunistic networks, routing algorithm, deliver ratio, energy consumption, transmission delay, cache time

    0 Introduction

    Opportunistic network[1]requires no link between the source node and the target node. The transmission of message is realized by movement and encounter of the nodes in opportunistic network. Consequently, it is very important to analyse the process of message transmission. Opportunistic networks belong to one of branches in DTN[2](delay tolerant networks).

    The traditional routing algorithms[3]can only be applied within links among nodes in the network topology. Hence these routing algorithms are no longer suitable for the opportunistic networks. It is necessary to establish new routing algorithms. The current research focuses on two aspects: on one hand, the process of nodes movement since mobile nodes can form different communication areas; on the other hand, how the nodes select appropriate neighbors in the messages transmission.

    This work is debated some problems with optimal path and reducing energy, and an algorithm is found to solve these problems. Section 1 is related work. Section 2 is model design. Section 3 is stimulation and analysis. And Section 4 is conclusion.

    1 Related work

    At present, the research of opportunistic network focuses on the routing algorithms. Existed routing algorithms can be transplanted into different areas by improvement. There are some methods adopted in opportunistic network as follows.

    Grossglauser, et al.[4]suggest a Store-and-forward mechanism Epidemic Algorithm simulating the transmission mechanism of infectious diseases. The feature of this algorithm is that two nodes exchange the message that not stored by each other when two nodes meet. This method is similar to exclusive or transmission and makes both the nodes get more information. The path when the node reaches the target node and transmit message can be guaranteed to be the shortest one with much network bandwidth, buffer memory space etc. In real application however, congestion could take place in the message transmission of the network with the increase of nodes included in the transmission since the related resource in real network is limited. In the application of real situation, this method can not get good effect since the limitation of the resource.

    Wang, et al.[5]suggest Spray and Wait algorithm based on the Epidemic Algorithm which consists of two phases that are Spray and Wait. In the Spray phase, the source node counts the available nodes around for message transmission first and transmits its message to the nodes around in a way of spraying. In the Wait phase, the message will be transmitted to the target node by the way of Direct Delivery to fulfill the process of transmission if no available node could be found in Spray phase. This method is a modified algorithm which improves the flood-transmission of the original Epidemic Algorithm. Nevertheless, the Spray phase may cause source nodes waste if there are a great mount of neighbor nodes which consume many spaces of the source nodes. Thus, this algorithm could cause nodes death by over spraying of the source nodes in some network with great randomness.

    Burgess, et al.[6]suggest a MaxProp Algorithm based on array setting priority. The feature of this algorithm is that the transmission sequence will be determined by the settled array priority when two notes meet. This method reduces consuming of the resource and improves the efficiency of the algorithm by setting the reasonable sequence of message transmission. Leguay, et al.[7]suggest a MobySpace Algorithm. In this algorithm, nodes groups or node pairs with higher relevance form into a self-organizing transmission area to fulfill the optimal communication among nodes.

    Burns, et al.[8]suggest a Context-Aware Routing Algorithm according to calculating the transmission probability of the source nodes to get the target nodes. This algorithm first gets the middle node by calculating the cyclic exchange transmission probability, then collects and groups the message to guide the middle node to transmit the message directly to the node with higher transmission probability.

    According to the analysis and summary of the related work, this paper tries to discuss and demonstrate the application in opportunistic networks.

    2 Model design

    The mobility and randomness of nodes lead to trouble with researching in opportunistic networks. It is very important to set an appropriate condition to analyse the message transmission in opportunistic networks. The nodes involved in the message communication areas are the research objects. The nodes involved in the communication are more active and these nodes are able to transfer message for a longer time, those less active nodes are possible to loss message or be unable to deliver message since they are not involved in message transmission for a long time.

    2.1 Research mode

    The typical structure of opportunistic networks is a structure of connected areas consisted by random network topology. These areas are random and variable. As shown in Fig.1, in the time period T, a network is divided into several connected areas. In those areas, nodes can be communicated with each other, each area can only be transmitted messages by itself, but it does not deliver any messages to next area.

    In Fig.1, in the time period T, communication area A can deliver messages to B, but C, D and E areas can not receive the messages from A. Only when nodes move outside area A, then messages can be delivered out of A. How to choose the suitable node in A area, and ensure the message can be carried to others areas is a problem.

    2.2 Topology establishing

    According to the research model in opportunistic networks, a sub-network can been selected to research. Fig.2 is a sub-network in opportunistic network.

    Fig.2 A sub-network of the opportunistic network

    In Fig.2, there are a lot of nodes in the sub-network. Assuming in T period, node A carries message, and node’s speed is less than the speeding of message transfer, network topology remains unchanged in period T. Then node A sends the message. Which is can able of delivering the message to all nodes in the sub-network and constitutes a topology about sub-network shown in Fig.3.

    Fig.3 Message deliver topology in opportunistic networks

    According to the topology in Fig.3, the process of information transmission can be determined to establish the topology of a directed graph.

    2.3 Digraph establishing

    The digraph, in time T, can be defined according to the topology structure.

    Definition: the digraph in opportunistic network G=(V,E)

    In which, V={A,B,C,D,E,F,G,H,I,J,K,L,M}

    E={,,,,,,,,,,}

    According to the digraph, it can be seen the process of information transfer, determining the transmission path and selecting the path of travel. Messages via multi-hop transmission can be transmitted to the distant nodes, and communication among different areas can be ensured.

    2.4 Transfer model analysis

    According to analyzing digraph, nodes can find their neighbors by themselves and choose the next hop in opportunistic networks. Supposing that nodes go through the multi-hop in the network, they can carry information by sub-network. The more hops, the higher the level of activity on the path junction. Then, select a maximum number of hops the path, we can achieve the transfer message. In this case, the maximum number of hops path message becomes optimal path.

    2.5 Node traversal patterns

    According to analyzing digraph, in opportunistic networks, each sub-network topology is configured to traverse. Traversal method is DFS(Depth-first search) traversal. which is used to communicate nodes on the path to traverse in order to determine the optimal path.

    We can define pseudo-code with the algorithm. Table 1 shows DFS algorithm analysis.

    Table 1 Pseudo-code of DFS

    By traversing the depth-first search algorithm, it can be found a neighbor with each node. Then information transmission can be established.

    3 OSPT algorithm design

    3.1 OSPT design process

    According to the analysis model, messages are delivered by nodes in opportunistic networks. Therefore the algorithm can be designed and its steps are as follows:

    Step 1: Message in layer i, node A (see Fig.4).

    Fig.4 Message in layer i

    Step 2: Judging whether node A has neighbors in layer i+1. It defines neighbors BCD.

    Step 3: Pointer traversal p jumps once to layer i+1(see Fig.5).

    Fig.5 Message in layer i+1

    Step 4: Judging whether node BCD has neighbors in layer i+2. It defines neighbors EFG.

    Step 5: Pointer traversal p jumps twice to layer i+2(see Fig.6).

    Fig.6 Message in layer i+2

    Step 6: After jumping j times, pointer traversal p arrives at layer i+j and node M(see Fig.7). Then there is no neighbor.

    Fig.7 Message in layer i+j

    Step 7: Selecting node M. Obviously the nodes on the path have higher neighbor, and level of activity, for all messages on the path most likely to be portable, so the path is set to the optimal path (see Fig.8).

    Fig.8 Select optimal path

    On the path, nodes deliver the messages to the next communication area. It can been ensured that the information can pass to the entire opportunistic networks. In the process of algorithm design, message delivery process is acquired. At the same time, it reduces energy consumption during transmission.

    3.2 Design of OSPT routing algorithm

    According to the process of design, we can design pseudo-code in Table 2. The design of OSPT routing algorithm is as Table 2:

    Table 2 Pseudo-code of OSPT routing algorithm

    3.3 Delivery rate calculation

    In opportunistic networks, r is reached at target node parameter. Concerning reached delivery ratio function is defined d(ri). These are m messages delivered by nodes. Then during the transmission, the reached nodes of message D(r) are

    (1)

    There are n nodes sending in opportunistic networks. R is parameter about delivery. Each message is delivered as d(Ri). Then the whole messages are delivered:

    (2)

    According to Eqs(1,2), the delivery ratio D is defined as

    (3)

    Then according Eq.(3), it is counted delivery ratio.

    3.4 Energy consumption calculation

    Each node sends messages, then it delivers consume energy. It is defined that energy consumption is divided to two parts. One of a part is send energy, the other is delivery energy.

    There are k nodes to send message on the path; each node consumes the same energy ecto send. Then the path consumes energy Ecis

    Ec=k×ec

    (4)

    If there are m paths taken part in sending messages, each road may have p nodes, sending messages consume energy Esis

    Es=m×p×ec

    (5)

    A node needs the same energy edin delivery by itself. There are q nodes joined in delivery. Then energy consumption Edin deliver is

    Ed=ed+ed+……+ed=q×ed

    (6)

    From Eqs(4,5), single node needs energy consumption Eais

    Ea=Es+Ed=m×p×ec+q×ed

    (7)

    Then according to Eq.(7), it is counted energy consumption.

    3.5 Cache time calculation

    In opportunistic networks, cache time is taken to be the total time being used to cache nodes during the life circle of message. Supposed the cache time of a single node is ti, these are n nodes taken part in delivery. Then the cache time T is

    (8)

    According to Eq.(8), it is counted cache time.

    4 Simulation and Analysis

    4.1 Simulation environment

    The performance of OSTP routing algorithm simulation and implementation can be evaluated in order to test in a real environment. Therefore, this paper used Helsinki University of Technology ONE1.4 (Opportunistic Network Environment simulator)[9]to develop tools for simulation test. The software uses different mobile models, depicting the trajectory. It can be expanded to various opportunistic networks routing algorithms, and then interactive interface can be provided to view real-time status to the nodes by the motion. This article is compared with OSTP, spray and wait and epidemic routing algorithms. Helsinki city topology is chosen as the background, in different streets, parks, shops are nearby in different streets and in different positions on the map to simulate the distribution, which is

    Fig.9 The map of Helsinki

    more than the realistic simulation of real-life communication situations. Specifically it is shown with reference in Fig.9.

    Experiment uses SPMBM (shortest path map based movement) mobile models. The model is used to calculate the shortest path algorithm Dijksatra between the source and destination. According to the map and the midpoint of the path, the mobile node is allowed moving according to the path. Table 3 is simulation parameters.

    Table 3 Network simulation parameters

    4.2 Parameters of performance comparison

    This research focuses on the following parameters analyzed.

    (1) Energy consumption: energy is consumed each time when node finishes transmitting information. More energy is consumed, the quicker the node withers away. Then information transmission in opportunistic networks will be blocked as a result of the node’s death.

    (2) Delivery ratio: delivery ratio is an important indicator. It refers to the ratio of the total number of the messages that successfully reach the target nodes in a certain period of time to the number of the messages that need to be transmitted, which shows the ability of a routing algorithm to send information.

    (3) Cache time: cache time is taken to be the total time being used to cache all nodes during the whole life circle of a message.

    (4) Transmission delay: Time needed for the target node from the source node to arrive. The smaller propagation delay that the transmission capability of the algorithm, the stronger the higher transmission efficiency, less occupied network resources.

    4.3 Analysis of simulation results

    The simulation can be operated with the simulation environment and performance parameters on analysis.

    Fig.10 shows delivery rate of several algorithms.

    Fig.10 Deliver ratio

    The abscissa represents the number of nodes, and the vertical axis indicates the transmission success rate. The number of nodes increase gradually over time when the success rate of transmission of different algorithms increases. It can been seen clearly that with the higher number of nodes increases. While Spray and Wait OSTP algorithm transmission success rate and Epidemic algorithm transmission success rate get lower. The nodes arrive at 100, the deliver ratio starts change because of nodes moving. Through experiments it can be seen the traditional epidemic algorithm will not increase the success rate of transmission nodes increased. Instead of spay and wait algorithm and OSTP algorithm after increasing transmission nodes, then messages are passing rate increased significantly. The rate of increasing is greater than spay and wait and OSTP algorithm.

    Fig.11 shows the variation of several algorithms cache time.

    Fig.11 Cache time

    Abscissa indicates the node, the vertical axis representing the cache time. It can be seen from the Figure, the node is gradually increased, and then cache time is gradually increased. The nodes arrive at 100, the cache time start change because of nodes moving. OSTP algorithm cache time reduces less than the epidemic and spay and wait algorithm. Fig.11 also shows by space OSTP algorithm consumes less than the network and spay and wait epidemic algorithm.

    The abscissa represents the number of nodes, and the vertical axis indicates the energy consumption. It can be seen from the Figure, OSTP algorithm node shows low energy consumption and energy consumption

    Fig.12 shows the variation of several algorithms energy consumption.

    algorithm obvious trends. The result is better than spray and wait algorithm. The algorithm increases in the junction node in the process, then epidemic algorithms maximum energy consumption.

    Fig.13 shows a transmission delay of several algorithms.

    Fig.13 Transmission delay

    The abscissa represents the number of nodes, and the vertical axis indicates the propagation delay. OSTP algorithm is, at beginning, the more nodes increased, the higher transmission delay, after getting to reach 400, the node reaches the maximum propagation delay, and then as the number of nodes increases, the transmission delay starts to decrease. In epidemic algorithm and the algorithm delay spay and wait, nodes are increased and the delay is risen.

    In this work, three classic mobility models are found to validate the algorithm in order to validate the performance of the algorithm OSTP. These three models are SPMBM model, RM (random walk) model and the RWP (random way point) model.

    RWP and RW are kinds of random motion model while RW model is based on a simple random speed and direction of movement model and no memory of exercise. Then a mobile node’s current speed and direction of movement are completely independent of the previous speed and direction. The idealized model is one of poor performance in the simulation process. The RWP random walks model can be considered to improve the model. And then it is compared with the RW model, the main speed changes each time at the pause time. RWP model is the reflection of an entity's basic law of motion with good realistic.

    Fig.14 shows in three models, when the node is gradually increased, the rate of change of transmission success OSTP. RM model transmission success rate is significantly lower than RWP and SPMBM models.

    Fig.14 Deliver ratio of OSTP in different models

    Fig.15 shows three models of OSTP when increasing node, cache time of the change. In SPMBM mode, cache time is less than the change in the magnitude of OSTP RM and RWP model. In the actual scene, OSTP under SPMBM mode consumes a minimum of network resources.

    5 Conclusion

    This research designs an OSTP algorithm and generates a model which facilitates the transmission message in opportunistic networks. In the light of simulation, algorithm is improved in deliver ratio, reduced in energy consumption, cache time and transmission delay. Compared with the epidemic algorithm and spray and wait algorithm, produced better results.

    [1] Conti M, Giordano S, May M, et al. From opportunistic networks to opportunistic computing. Communications Magazine, IEEE, 2010, 48(9): 126-139

    [2] Jacquet P, Mans B, Rodolakis G. Information propagation speed in mobile and delay tolerant networks. Information Theory, IEEE Transactions on, 2010, 56(10): 5001-5015

    [3] Dvir A, Vasilakos A V. Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 2010, 40(4): 405-406

    [4] Grossglauser M, Tse DNC. Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Transactions on Networking, 2002,10(4): 477-486

    [5] Wang G, Wang B, Gao Y. Dynamic spray and wait routing algorithm with quality of node in delay tolerant network. In: Proceedings of the International Conference on Communications and Mobile Computing (CMC), Shenzhen, China, 2010, 3: 452-456

    [6] Burgess J, Gallagher B, Jensen D, et al. MaxProp: Routing for vehicle-based disruption-tolerant networks. In: Proceedings of the 25th IEEE International Conference on Computer Communications infocom, Barcelona, Spain, 2006, 6: 1-11

    [7] Leguay J, Friedman T, Conan V. Evaluating MobySpace-based routing strategies in delay-tolerant networks. Wireless communications and mobile computing, 2007, 7(10): 1171-1182

    [8] Burns B, Brock O, Levine B N. MORA routing and capacity building in disruption-tolerant networks. Ad hoc networks, 2008, 6(4): 600-620

    [9] Ker?nen A,Ott J,K?rkk?inen T.The ONE simulator for DTN protocol evaluation. In: Proceedings of the 2nd International Conference on Simulation Tools and Techniques, New York, USA, 2009

    Wu Jia, born in 1983, received his BS Degree from Gui Zhou University in China 2006, and he received his MS Degree from Yun Nan Uniersity in China 2009. He is a PhD candidate in software engineering at Central South University. He is system analyst and member of China Computer Federation (CCF). His research interests are opportunistic networks, wireless networks, software engineering, and big data research.

    10.3772/j.issn.1006-6748.2015.03.012

    ①Supported by the National Natural Science Foundation of China (No. 61379057, 61073186, 61309001, 61379110, 61103202), Doctoral Fund of Ministry of Education of China (No. 20120162130008) and the National Basic Research Program of China (973 Program) (No. 2014CB046305).

    ②To whom correspondence should be addressed. E-mail: jiawu5110@163.com Received on Apr. 28, 2014, Yi Xi, Chen Zhigang

    婷婷精品国产亚洲av在线| 乱人视频在线观看| 91在线精品国自产拍蜜月| 午夜激情欧美在线| 99热精品在线国产| 大型黄色视频在线免费观看| 亚洲国产欧洲综合997久久,| 真人一进一出gif抽搐免费| 直男gayav资源| 老司机深夜福利视频在线观看| 国产乱人视频| 九色成人免费人妻av| 免费在线观看影片大全网站| 一区福利在线观看| 日韩av在线大香蕉| 人妻久久中文字幕网| 久久久久久久久中文| 国产亚洲精品久久久久久毛片| 男人舔女人下体高潮全视频| 免费搜索国产男女视频| 日本在线视频免费播放| 白带黄色成豆腐渣| 男女下面进入的视频免费午夜| 免费大片18禁| 国产精品久久久久久久久免 | 在线观看一区二区三区| 成人特级av手机在线观看| 欧美乱妇无乱码| 又爽又黄a免费视频| 伦理电影大哥的女人| 午夜福利在线在线| 噜噜噜噜噜久久久久久91| 午夜精品久久久久久毛片777| 老女人水多毛片| 婷婷精品国产亚洲av| 日韩中字成人| 毛片一级片免费看久久久久 | 99久久成人亚洲精品观看| 久久久久久久久久成人| 亚洲乱码一区二区免费版| 国产精品爽爽va在线观看网站| 国产淫片久久久久久久久 | 精品不卡国产一区二区三区| 91狼人影院| 少妇的逼水好多| 婷婷亚洲欧美| 国产午夜福利久久久久久| 国产真实伦视频高清在线观看 | 亚洲片人在线观看| 日韩欧美三级三区| 国产一区二区亚洲精品在线观看| 嫩草影院新地址| 在现免费观看毛片| 成人无遮挡网站| 色精品久久人妻99蜜桃| 蜜桃亚洲精品一区二区三区| 黄色一级大片看看| 久久精品国产亚洲av香蕉五月| 99国产精品一区二区蜜桃av| av黄色大香蕉| 1000部很黄的大片| 露出奶头的视频| 99热6这里只有精品| 亚洲av中文字字幕乱码综合| 婷婷精品国产亚洲av在线| 舔av片在线| 很黄的视频免费| av专区在线播放| 精品福利观看| 特级一级黄色大片| 好看av亚洲va欧美ⅴa在| 国产熟女xx| 午夜免费男女啪啪视频观看 | 午夜免费激情av| 午夜免费激情av| 国产亚洲欧美98| 少妇人妻精品综合一区二区 | 啪啪无遮挡十八禁网站| www.www免费av| 熟女人妻精品中文字幕| 国产成人欧美在线观看| 精品久久久久久成人av| av专区在线播放| 搞女人的毛片| 不卡一级毛片| 亚洲精品一区av在线观看| 美女高潮喷水抽搐中文字幕| 天天躁日日操中文字幕| 国产 一区 欧美 日韩| 国产精品久久久久久久电影| 国产一区二区在线av高清观看| 成人av在线播放网站| 日韩大尺度精品在线看网址| 亚洲精品一区av在线观看| 午夜亚洲福利在线播放| 国内久久婷婷六月综合欲色啪| 国产黄片美女视频| 深夜精品福利| 精品熟女少妇八av免费久了| 欧美绝顶高潮抽搐喷水| 黄色女人牲交| 久久久色成人| 赤兔流量卡办理| 欧美又色又爽又黄视频| 久久久久久久精品吃奶| 最近最新中文字幕大全电影3| 夜夜看夜夜爽夜夜摸| 精品午夜福利在线看| 好男人在线观看高清免费视频| 国产探花在线观看一区二区| 国产三级在线视频| 亚洲精品影视一区二区三区av| 在线播放国产精品三级| 亚洲专区中文字幕在线| 日日干狠狠操夜夜爽| 亚洲av电影不卡..在线观看| 久久精品91蜜桃| 国产三级黄色录像| 一级av片app| 欧美激情久久久久久爽电影| 久久久久久久久久黄片| 亚洲人成电影免费在线| 99国产精品一区二区三区| 男女下面进入的视频免费午夜| 久久久久国内视频| 亚洲人成网站高清观看| 99国产极品粉嫩在线观看| 亚洲av第一区精品v没综合| 日本在线视频免费播放| 又粗又爽又猛毛片免费看| 一区二区三区激情视频| АⅤ资源中文在线天堂| 99久国产av精品| 日本成人三级电影网站| 亚洲无线在线观看| 别揉我奶头 嗯啊视频| 午夜两性在线视频| www.999成人在线观看| 国产真实乱freesex| 日日摸夜夜添夜夜添av毛片 | 国产黄色小视频在线观看| 人妻久久中文字幕网| 国产视频一区二区在线看| 欧美黑人欧美精品刺激| 欧美3d第一页| 全区人妻精品视频| 九九热线精品视视频播放| 成年免费大片在线观看| 亚洲人成网站在线播放欧美日韩| 极品教师在线免费播放| 中文字幕人妻熟人妻熟丝袜美| 三级国产精品欧美在线观看| 搡老妇女老女人老熟妇| 夜夜躁狠狠躁天天躁| 又粗又爽又猛毛片免费看| 我要搜黄色片| 国内精品久久久久精免费| 91午夜精品亚洲一区二区三区 | 三级毛片av免费| 熟妇人妻久久中文字幕3abv| 97超视频在线观看视频| 成年女人毛片免费观看观看9| 国产精品1区2区在线观看.| 黄片小视频在线播放| 熟女人妻精品中文字幕| 日韩精品中文字幕看吧| 床上黄色一级片| 欧美中文日本在线观看视频| 国产午夜福利久久久久久| 亚洲最大成人av| 色综合欧美亚洲国产小说| 熟女电影av网| 国产精品女同一区二区软件 | 黄色一级大片看看| 精品久久久久久久久av| 欧洲精品卡2卡3卡4卡5卡区| 久久欧美精品欧美久久欧美| 一边摸一边抽搐一进一小说| 日日摸夜夜添夜夜添av毛片 | 18美女黄网站色大片免费观看| 人妻丰满熟妇av一区二区三区| 久久久久亚洲av毛片大全| 免费人成视频x8x8入口观看| 精品久久久久久久人妻蜜臀av| eeuss影院久久| 亚洲成av人片免费观看| 国产精品乱码一区二三区的特点| 精品午夜福利在线看| 久久99热6这里只有精品| 日本成人三级电影网站| 嫩草影院精品99| 高清在线国产一区| 国产三级在线视频| 别揉我奶头~嗯~啊~动态视频| 国产熟女xx| 欧美午夜高清在线| 久久久国产成人精品二区| 又紧又爽又黄一区二区| 偷拍熟女少妇极品色| 久久伊人香网站| 日韩免费av在线播放| 久久久久久久精品吃奶| 91九色精品人成在线观看| 高清日韩中文字幕在线| 国产精品伦人一区二区| 国内精品美女久久久久久| 午夜亚洲福利在线播放| 精品久久久久久久人妻蜜臀av| 国内揄拍国产精品人妻在线| 老司机午夜十八禁免费视频| 熟女电影av网| 免费看美女性在线毛片视频| 啦啦啦韩国在线观看视频| www日本黄色视频网| 成年人黄色毛片网站| 91狼人影院| 日韩欧美三级三区| 女人被狂操c到高潮| 全区人妻精品视频| 一个人观看的视频www高清免费观看| 中文字幕久久专区| 99久久精品热视频| 国产精品亚洲av一区麻豆| 午夜福利在线观看免费完整高清在 | 国产一区二区激情短视频| 免费在线观看成人毛片| 在线a可以看的网站| a级毛片免费高清观看在线播放| 欧美极品一区二区三区四区| 国产高清视频在线播放一区| 禁无遮挡网站| 久久久久久久久久成人| 变态另类丝袜制服| 天堂影院成人在线观看| 97人妻精品一区二区三区麻豆| 久久性视频一级片| 免费无遮挡裸体视频| 有码 亚洲区| 免费黄网站久久成人精品 | 欧美中文日本在线观看视频| 亚洲精品亚洲一区二区| 欧美成狂野欧美在线观看| 亚洲,欧美,日韩| 亚洲熟妇中文字幕五十中出| 国产大屁股一区二区在线视频| 色在线成人网| 精品一区二区三区视频在线| 亚洲色图av天堂| a级毛片a级免费在线| 国产av一区在线观看免费| 国产野战对白在线观看| 国产中年淑女户外野战色| 久久国产精品影院| 丝袜美腿在线中文| 内射极品少妇av片p| 欧美精品国产亚洲| 精品人妻一区二区三区麻豆 | 国产亚洲精品综合一区在线观看| 黄片小视频在线播放| 国产v大片淫在线免费观看| 每晚都被弄得嗷嗷叫到高潮| 国产成人影院久久av| 国产探花极品一区二区| 欧美性猛交黑人性爽| 国产 一区 欧美 日韩| 美女免费视频网站| xxxwww97欧美| 日韩人妻高清精品专区| 精品欧美国产一区二区三| 久久久久国产精品人妻aⅴ院| 精品久久国产蜜桃| 免费在线观看日本一区| 九九久久精品国产亚洲av麻豆| 免费在线观看亚洲国产| 久久精品人妻少妇| 成年人黄色毛片网站| 亚洲经典国产精华液单 | 久久久久国产精品人妻aⅴ院| 欧美日韩中文字幕国产精品一区二区三区| 99热精品在线国产| 十八禁网站免费在线| av女优亚洲男人天堂| 欧美日韩国产亚洲二区| a级毛片免费高清观看在线播放| 又黄又爽又刺激的免费视频.| 亚洲成人中文字幕在线播放| 女人被狂操c到高潮| av在线蜜桃| 欧美成人a在线观看| 久久久久免费精品人妻一区二区| 国产一区二区三区在线臀色熟女| 丁香六月欧美| 亚洲内射少妇av| 高清在线国产一区| 久久婷婷人人爽人人干人人爱| 桃色一区二区三区在线观看| 三级国产精品欧美在线观看| 成年人黄色毛片网站| 国产毛片a区久久久久| 亚洲av电影在线进入| 亚洲av成人精品一区久久| 久久精品久久久久久噜噜老黄 | netflix在线观看网站| 欧美黑人欧美精品刺激| 99热这里只有是精品50| 国产91精品成人一区二区三区| 国产日本99.免费观看| 欧美激情国产日韩精品一区| 自拍偷自拍亚洲精品老妇| 我的女老师完整版在线观看| 色5月婷婷丁香| 美女高潮喷水抽搐中文字幕| 欧美成人免费av一区二区三区| 成人毛片a级毛片在线播放| 日日干狠狠操夜夜爽| 午夜精品一区二区三区免费看| 色在线成人网| 亚洲av免费高清在线观看| 搡老熟女国产l中国老女人| avwww免费| 欧美日韩福利视频一区二区| 国产精品亚洲美女久久久| 国产成年人精品一区二区| 欧美成人免费av一区二区三区| 国产精品一区二区性色av| 国产精品女同一区二区软件 | 国产成人aa在线观看| 亚洲,欧美,日韩| 男女床上黄色一级片免费看| 国内精品久久久久久久电影| 国语自产精品视频在线第100页| 国产成人福利小说| 国产日本99.免费观看| 国产午夜福利久久久久久| 嫩草影院新地址| a级一级毛片免费在线观看| 少妇被粗大猛烈的视频| 好男人在线观看高清免费视频| 又黄又爽又免费观看的视频| 最新中文字幕久久久久| 桃红色精品国产亚洲av| 国产精品野战在线观看| 国产男靠女视频免费网站| 97热精品久久久久久| 久久久精品大字幕| av在线观看视频网站免费| 久久午夜福利片| 国产av麻豆久久久久久久| 国内揄拍国产精品人妻在线| 成人av在线播放网站| 伦理电影大哥的女人| 国产三级黄色录像| 欧美高清性xxxxhd video| 欧美一区二区精品小视频在线| 精品免费久久久久久久清纯| 国产探花在线观看一区二区| 在线观看一区二区三区| 成年人黄色毛片网站| 国内精品一区二区在线观看| 国产高清有码在线观看视频| 黄色配什么色好看| 欧美激情在线99| 成人国产综合亚洲| 一区二区三区免费毛片| 国产精品亚洲一级av第二区| 亚洲成av人片免费观看| 久久久久久九九精品二区国产| 亚洲最大成人手机在线| 身体一侧抽搐| 国产成人av教育| 日韩欧美国产一区二区入口| 欧美丝袜亚洲另类 | 国产国拍精品亚洲av在线观看| 人妻丰满熟妇av一区二区三区| 十八禁网站免费在线| 中文字幕久久专区| 成人特级av手机在线观看| 人人妻人人看人人澡| 露出奶头的视频| 中文资源天堂在线| 欧美日韩乱码在线| 99久久九九国产精品国产免费| 日日干狠狠操夜夜爽| 日韩精品中文字幕看吧| 一区二区三区免费毛片| 国产一级毛片七仙女欲春2| 桃红色精品国产亚洲av| 一进一出抽搐gif免费好疼| 国产欧美日韩一区二区精品| 日韩精品青青久久久久久| 国产麻豆成人av免费视频| 久久热精品热| 欧美丝袜亚洲另类 | av视频在线观看入口| 国产精品一区二区三区四区免费观看 | 亚洲精品在线观看二区| 成年免费大片在线观看| 婷婷色综合大香蕉| 亚洲不卡免费看| 国产欧美日韩一区二区三| 级片在线观看| 变态另类丝袜制服| 在线观看舔阴道视频| 乱人视频在线观看| 757午夜福利合集在线观看| 免费搜索国产男女视频| 夜夜看夜夜爽夜夜摸| 日韩亚洲欧美综合| 大型黄色视频在线免费观看| 性欧美人与动物交配| 欧美在线黄色| 亚洲天堂国产精品一区在线| 少妇的逼好多水| 国产精品野战在线观看| 我要搜黄色片| 波野结衣二区三区在线| 国产亚洲精品久久久com| 不卡一级毛片| 免费在线观看亚洲国产| 婷婷色综合大香蕉| 老师上课跳d突然被开到最大视频 久久午夜综合久久蜜桃 | 国产v大片淫在线免费观看| 在线观看一区二区三区| 国产 一区 欧美 日韩| 长腿黑丝高跟| 18+在线观看网站| 美女xxoo啪啪120秒动态图 | 精品欧美国产一区二区三| 久久热精品热| 免费看日本二区| 中文字幕人成人乱码亚洲影| 欧美国产日韩亚洲一区| 亚洲自偷自拍三级| 亚洲午夜理论影院| 亚洲狠狠婷婷综合久久图片| 久久精品国产亚洲av涩爱 | 国产精品综合久久久久久久免费| 色视频www国产| 少妇丰满av| 老女人水多毛片| 麻豆国产97在线/欧美| 亚洲午夜理论影院| 91久久精品国产一区二区成人| 欧美区成人在线视频| 最近在线观看免费完整版| 欧美又色又爽又黄视频| 校园春色视频在线观看| 高清日韩中文字幕在线| 国产在线男女| 亚洲七黄色美女视频| 国产黄片美女视频| 麻豆国产av国片精品| 91午夜精品亚洲一区二区三区 | 天美传媒精品一区二区| 日日摸夜夜添夜夜添小说| or卡值多少钱| 免费无遮挡裸体视频| 日本一二三区视频观看| 日韩人妻高清精品专区| 99久国产av精品| 亚洲激情在线av| 亚洲欧美日韩高清在线视频| a级毛片a级免费在线| 在线十欧美十亚洲十日本专区| 久久久久国内视频| 欧美一区二区精品小视频在线| 麻豆av噜噜一区二区三区| eeuss影院久久| 亚洲第一电影网av| 国产一区二区激情短视频| 国产精品99久久久久久久久| 日韩高清综合在线| 欧美+亚洲+日韩+国产| 国产精品亚洲av一区麻豆| 国产免费av片在线观看野外av| 免费在线观看日本一区| 天美传媒精品一区二区| 亚洲电影在线观看av| 非洲黑人性xxxx精品又粗又长| 自拍偷自拍亚洲精品老妇| 欧洲精品卡2卡3卡4卡5卡区| 哪里可以看免费的av片| 日韩国内少妇激情av| 日韩高清综合在线| 神马国产精品三级电影在线观看| 亚洲av不卡在线观看| 美女高潮喷水抽搐中文字幕| 国产熟女xx| 精品久久久久久久末码| 成人国产一区最新在线观看| 中出人妻视频一区二区| 91麻豆精品激情在线观看国产| 成人一区二区视频在线观看| 少妇裸体淫交视频免费看高清| 日本成人三级电影网站| 国产中年淑女户外野战色| 国内揄拍国产精品人妻在线| 欧美潮喷喷水| 精品免费久久久久久久清纯| 永久网站在线| 欧美黄色淫秽网站| 久久精品国产亚洲av香蕉五月| 日日夜夜操网爽| а√天堂www在线а√下载| 一级黄色大片毛片| 午夜精品久久久久久毛片777| 美女大奶头视频| 又黄又爽又刺激的免费视频.| 久久久精品欧美日韩精品| 国产精品国产高清国产av| 午夜福利视频1000在线观看| 午夜福利18| 国产 一区 欧美 日韩| 久久久精品欧美日韩精品| 亚洲专区国产一区二区| 99热6这里只有精品| 男女做爰动态图高潮gif福利片| 丁香六月欧美| 超碰av人人做人人爽久久| 亚洲成人免费电影在线观看| 非洲黑人性xxxx精品又粗又长| 热99在线观看视频| 国产在线男女| 久久午夜福利片| 此物有八面人人有两片| 亚洲美女搞黄在线观看 | 少妇被粗大猛烈的视频| 观看免费一级毛片| 国产精品自产拍在线观看55亚洲| 婷婷精品国产亚洲av| 51国产日韩欧美| 国产精品av视频在线免费观看| 怎么达到女性高潮| 女人十人毛片免费观看3o分钟| 午夜两性在线视频| 成人鲁丝片一二三区免费| 香蕉av资源在线| 亚洲国产日韩欧美精品在线观看| 中国美女看黄片| 又粗又爽又猛毛片免费看| 别揉我奶头 嗯啊视频| 综合色av麻豆| 亚洲av二区三区四区| 欧美日韩福利视频一区二区| 国产高清激情床上av| 成人欧美大片| 久久久久久久精品吃奶| 久久精品人妻少妇| 亚洲第一电影网av| 黄色视频,在线免费观看| 日韩中文字幕欧美一区二区| 国产亚洲欧美98| 88av欧美| 欧美日韩瑟瑟在线播放| 国产成人aa在线观看| 久久精品国产亚洲av香蕉五月| 日韩欧美在线乱码| 一本久久中文字幕| 美女大奶头视频| 啦啦啦韩国在线观看视频| 色播亚洲综合网| 97碰自拍视频| 观看免费一级毛片| 亚洲无线在线观看| 麻豆成人av在线观看| 桃色一区二区三区在线观看| 国产成年人精品一区二区| 91狼人影院| 99riav亚洲国产免费| 日韩成人在线观看一区二区三区| 日本一本二区三区精品| 久久6这里有精品| 一进一出抽搐gif免费好疼| 国产久久久一区二区三区| 欧美性猛交黑人性爽| 欧美区成人在线视频| 欧美中文日本在线观看视频| 变态另类丝袜制服| av福利片在线观看| 欧美丝袜亚洲另类 | 成人性生交大片免费视频hd| 男女下面进入的视频免费午夜| 少妇的逼水好多| 十八禁人妻一区二区| 丁香欧美五月| 国产精品电影一区二区三区| 一区二区三区免费毛片| 国产午夜精品久久久久久一区二区三区 | 亚洲av电影在线进入| 九九在线视频观看精品| 蜜桃亚洲精品一区二区三区| 国产精品日韩av在线免费观看| 精品不卡国产一区二区三区| 亚洲精品456在线播放app | 亚洲欧美激情综合另类| 亚洲18禁久久av| 亚洲av五月六月丁香网| 在线看三级毛片| 国产欧美日韩精品亚洲av| .国产精品久久| 久久久国产成人精品二区| 色哟哟·www| 中文亚洲av片在线观看爽| 特大巨黑吊av在线直播| 精品久久国产蜜桃| 亚洲人成网站在线播放欧美日韩| 99久国产av精品| 国产精品爽爽va在线观看网站| 日韩av在线大香蕉| 人妻制服诱惑在线中文字幕| 精品免费久久久久久久清纯| 亚洲欧美日韩东京热| 日韩欧美精品免费久久 | 欧美一区二区亚洲| 人妻制服诱惑在线中文字幕|