• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Adjusting Sink Location to Reduce End-to-End Delay in Low-Duty-Cycle Wireless Sensor Networks

    2015-06-01 09:59:24YuYuanLinKuoFengSsuandHauYuChiang

    Yu-Yuan Lin, Kuo-Feng Ssu, and Hau-Yu Chiang

    Adjusting Sink Location to Reduce End-to-End Delay in Low-Duty-Cycle Wireless Sensor Networks

    Yu-Yuan Lin, Kuo-Feng Ssu, and Hau-Yu Chiang

    —Low-duty-cycle mechanisms can reduce the energy consumption significantly in wireless sensor networks (WSNs). Sensors stay dormant most of the time to save their energy and wake up based on their needs. However, such a technique, while prolonging the network lifetime, sets excessive challenges for reducing the end-to-end (E2E) delay within the network. In this paper, the centralized cluster-based location finding (CCLF) algorithm is proposed to reduce the high latency in low-duty-cycle WSNs by finding a suitable position for the sink. The algorithm is mainly composed of three steps: a) the cluster construction, b) the fast look-up table (FLU-table) construction, and c) the sink location decision. The simulation results show that the performance of the CCLF algorithm is significantly similar to that of the optimal algorithm. Moreover, the CCLF algorithm requires less operation time compared with the optimal algorithm.

    Index Terms—Duty cycle, latency, sink, wireless sensor networks.

    1. Introduction

    Wireless sensor networks are the oncoming technology that has a wide range of promising applications including environmental surveillance, scientific exploration, target tracking, and infrastructure protection[1]–[7]. Such a network normally consists of a large number of distributed nodes that organize themselves into a multi-hop wireless network. Each node typically has one or more sensors, embedded processors, and low-power radios. The nodes are normally powered by batteries that have limited energy and usually non-rechargeable. Hence, the reduction of energyconsumption in wireless sensor networks (WSNs) is an important issue. In order to prolong the life time of WSNs, establishing the low-duty-cycle environment with less than 5% duty cycles is considered to diminish the energy consumption effectively. In low-duty-cycle WSNs, every node has its own working schedule. Nodes turn their radios on in limited time and sleep for the rest. When the next hop node is dormant, a node has to buffer the delivered message and waits for the next hop node to become active. The waiting time for mode switching causes high delivery latency. The working schedule of each node cannot be adjusted arbitrarily to reduce the latency. The working schedule is determined by the power management protocol which is designed for application requirements such as the quality of sensing coverage[8],[9]and target tracking[10],[11].

    A sink is the pivot in receiving and conducting messages in many applications such as disseminating commands to sensor nodes, configuring sensor setups, querying sensor states, and so on[12]–[17]. The sink transmits packets to each node hop-by-hop. Different sink locations result in various average end-to-end (E2E) delays because of varying transmission sequences and neighbors. The goal of this paper is to determine a suitable location for the sink. Thus, the message can be delivered quickly and the E2E delay can be reduced.

    In this paper, the centralized cluster-based location finding (CCLF) algorithm is developed to reduce the high latency in low-duty-cycle WSNs by finding a suitable position for the sink. The main contributions of this paper are as follows: a) to the best of our knowledge, this paper is the first to propose determining a proper sink location to reduce the E2E delay in low-duty-cycle WSNs. b) based on the CCLF algorithm, the proper sink location can be determined very quickly compared with the optimal algorithm. These two characters make the CCLF algorithm practical in many applications.

    The rest of the paper is organized as follows: Section 2 discusses the related work. Section 3 introduces the network model and assumptions. Section 4 presents the main design. Section 5 reports the simulation results. Section 6 concludes the work.

    2. Related Work

    The main purpose of the low-duty-cycle mechanism isto reduce the energy consumption. Yeet al. proposed a sensor medium-access control (S-MAC) protocol, which is designed for wireless sensor networks[18]. In this work, the proposed algorithm only focuses on energy consumption of the active and dormant modes. The consumed energy during switching from the dormant mode to the active mode has not been considered. An energy-aware switching and scheduling (ESS) algorithm was proposed to resolve the above problem[19]. The ESS algorithm achieves the energy consumption which is arbitrarily close to the global minimum solution.

    In low-duty-cycle environment, the reduction of the energy consumption also brings big challenge to the design of efficient packet transmission. There are a number of works that focus on the E2E delay reduction in low-duty-cycle WSNs. These works can be separated into two categories by their link assumption: Reliable links and unreliable links. First, the works based on reliable links networks are introduced. Dousseet al. proved that the E2E delay is proportional to the distance between the sensor and the sink[20]. Keshavarzianet al. designed efficient wake-up scheduling schemes for energy constrained sensor nodes that adhered to the bidirectional E2E delay constraints[21]. Lai and Paschalidis proposed a routing protocol which minimizes a weighted sum of these two opposed factors: the expected energy consumption and the exponent of the latency probability[22]. Guet al. proposed a delay maintenance method. This method augments additional active time slots to reduce the E2E delay[23]. Second, the works based on unreliable links networks are also introduced. Duanet al. introduced a dynamic data forwarding (DDF) scheme to reduce the E2E delay and guaranteed the deliver ratio. The manner is to find out a set of candidate nodes and forward packets to the first awake node in this set[24]. Sun and Xu proposed a delay-aware routing algorithm. Every sensor maintains a forwarding sequence set in which potential forwarders are sorted by their wake-up time[25]. Guet al. proposed a dynamic switch-based forwarding (DSF) algorithm. The DSF algorithm uses the forwarding sequence to reduce the transmission time[26]. As mention above, a number of methods are proposed to reduce the E2E delay. In our best knowledge, no previous work has researched into determining the proper location for the sink. In this paper, the CCLF algorithm is proposed to reduce the E2E delay by determining a proper location for the sink.

    3. System Model

    3.1 Network Model

    The network is consisted of a sink andNsensor nodes. A unique ID number is assigned to each node from 1 toN. The ID number of sink is 0. The sink works all the time and has no power restriction. The active state and dormant state are assigned to each sensor node. In the active state, sensor nodes turn their radios on to transmit or receive data packets. In the dormant state, sensor nodes disable all its function modules. The two states change periodically to achieve the conditions of the low-duty-cycle environment. In this paper, the working period of all sensor nodes isTtime slots.Mtime slots are selected randomly as its active states from 0 toT-1. The duty cycle of the network isM/T(M/T≤ 5% means that the duty ratio is extremely small in the low-duty-cycle environment). In this paper, the working periodTis assigned 100 time units.

    3.2 Transmission Latency

    In the low-duty-cycle environment, when the next hop node is dormant, a node has to buffer the message and wait for the next hop node to become active. In Fig. 1, the node 1 wants to send a message to the node 2. Node 1 wakes up at the time slot 2. Node 1 cannot send the packet out immediately and needs to wait until the node 2 wakes up at the time slot 5. The latency of the node 1 passing the packet to the node 2 is 3 time slots.

    Fig. 1. Illustration of transmission latency.

    4. Main Design

    Average E2E delays are varied due to different sink locations. The goal of this paper is to find a suitable location for the sink to reduce the E2E delay. In this section, the optimal algorithm and the CCLF algorithm will be introduced. The performance of these two algorithms will be evaluated in Section 5.

    4.1 Optimal Algorithm

    The optimal sink location is found by the optimal algorithm. The entire network is separated into a twodimensional coordinate system. The optimal algorithm will be executed to calculate the average E2E delay on every coordinate. The coordinate with the minimal average E2E delay will be taken as the optimal sink location.

    The optimal algorithm is divided into two states. a) Initial state: When the candidate sink is positioned on a coordinate, the transmission latencies of its neighbor nodes are determined by the candidate sink’s transmission time slot and neighbor nodes’ working schedules. b) Recursive state: The transmission latency of nodexis determined by its previous hop node. Nodexwill also check thetransmission latency from its neighbor nodey. If the path throught nodeyto nodexhas the lower transmission latency, the nodeywill become the previous hop node of the nodex. The chain reaction operates until the transmission latencies of all nodes cannot be changed by their neighbors. The E2E delay of the candidate sink is the time that all nodes receive the message. The candidate sink sendsTmessages out from the time slot 0 to the time slotT-1 on every coordinate in order to calculate the average E2E delay.

    4.2 CCLF Algorithm

    The CCLF algorithm is mainly composed of three steps: a) cluster construction, b) the fast look-up table (FLU-table) construction, and c) sink location decision. In the CCLF algorithm, the network is separated into multiple clusters, and each cluster has its own candidate sink. The candidate sink with the smallest average E2E delay in the network will be taken as the sink location in the low-duty-cycle WSN.

    a) Cluster construction: There is an optimal sink location with the minimal average E2E delay in the network. The main purpose of cluster construction is to reduce the number of candidate sinks. The reduction of candidate sinks also reduces the sink location finding time. The candidate sink with the smallest average E2E delay is always near the optimal sink location because of the same topology and duty cycle schedules. The cluster can be constructed by many parameters such as the residual battery energy, degree, and ID number. This paper presents a simple heuristic cluster construction. The cluster construction sequence is decided by the unique node ID number. The available node is the node which has not been assigned to any cluster. The first cluster is consisted by the smallest available node ID and its neighbors. The cluster ID of the first cluster is 1 and the head node’s ID is 1. The second cluster is consisted by the node with the smallest ID in available nodes and its neighbors in the same way. The cluster ID of the second cluster is 2 and the cluster head node is the node with the smallest ID in the cluster 2. The cluster construction procedure will be terminated until every node belongs to a cluster.

    b) The FLU-table construction: The second step of the CCLF algorithm is to establish the FLU-table for each cluster. The gateway node is defined as a node whose neighbors are not all in the same cluster. The path with the minimum transmission latencies from each gateway node to all its cluster members is recorded in the FLU-table. With the help of FLU-table, the transmission latencies within a cluster can be searched efficiently, especially in the case that the transmission latency of gateway node has been modified by the node of different clusters. The FLU-table is constructed by the following mechanism. A gateway node floods a message to all the cluster members. The latencies of the gateway node and its neighbor nodes are determined by gateway node’s message transmission time slot and neighbor nodes’ working schedules. The neighbor nodes of the gateway node also flood the received packets to calculate the transmission latencies. A node may have different transmission latencies because of different previous hop neighbors. The shortest transmission latency is recorded in the FLU-table and used to get the transmission latency of next next hop neighbors. The procedure will be terminated until the transmission latencies of all cluster members have been fixed. The delay from gateway nodes to each node in the same cluster can be recorded precisely in the FLU-table. For example, the nodex, nodeyand nodezare gateway nodes in Fig. 2. The corresponding FLU-table for the cluster 1 is shown in Table 1. Equation (1) is given to calculate the transmission latencies between the gateway node and its cluster members:

    whereNi(Am) means that themth active time slot ofNi.Nj(An) denotes the time slot thatNjreceives the message from the previous hop node. min (Ni(Am)-Nj(An)) is the minimum transmission latency from the nodejto the nodei.

    Fig. 2. Example of gateway node.

    Table 1: FLU-table of cluster 1

    c) Sink location decision: The candidate sink in each cluster is set on the location with the most number of neighbors. More available connections to fleetly spread the packets to the entire network can obtain the lower average E2E delay. If more than two locations satisfy the condition mentioned above, the one with the most active time slots will be chosen as the candidate sink. The transmissionlatencies of the candidate sink and its neighbor nodes are determined by the transmission time slot of candidate sink and working schedules of neighbor nodes. The transmission latencies of neighbor nodes also affect the transmission latencies of other related cluster members. A node may have different transmission latencies because of different previous hop neighbors. The shortest transmission latency is recorded and used to get the transmission latencies of next hop neighbors. The procedure will be terminated until the transmission latencies of all cluster members have been fixed. Once the latency of gateway nodes is decided, the transmission latencies of neighbor clusters is determined by the FLU-table efficiently. The chain reaction continues until the E2E delay of network is determined. The FLU-tables can be used repetitively by the candidate sinks to calculate the E2E delay efficiently and avoid transmitting redundant messages.

    The message received by different gateway nodes may cause different transmission latencies. The following equation is used to modify the transmission latencies between neighbor clusters:

    where min (Ln,m) is the transmission latency fromNntoNm. Once the transmission latency of gateway nodeNnis changed, the equation will check the transmission latency of the passing message fromNntoNmby the FLU-table. The path with the shortest transmission latency is determined by (2). The message transmitting time of sink is variable. The average E2E delay is calculated by an expected value method. The sink knows the working schedules of its neighbors.Ws= {a1,a2,… ,an}is the working schedule set. The average E2E delay is calculated based on (3). The working period of all sensor nodes isTtime slots.

    According to the average E2E delay calculated by (3), the candidate sink with the minimal average E2E delay will be selected as the sink location in the network.

    5. Simulation Results

    In the simulation environment, 144 to 1600 sensor nodes are deployed randomly on 400 m2to 6400 m2square field (randomly-generated network). The network density keeps the same. The node communication range is 3 m. The cluster is constructed by the head node and its 2-hops neighbors. The E2E delay and the operation time with the proposed CCLF algorithm, randomly pick method, and optimal algorithm will be compared in the following. The operation time is the time to find the location for the sink.

    5.1 Different Duty Cycle

    There are 250 nodes in the network. The duty cycles of the node are 1% to 4%. In Fig. 3, the curve shows that the performance of the proposed CCLF algorithm is consistently better than the randomly pick method and is very close to the optimal algorithm. Fig. 3 also shows that the higher duty cycle follows with the less E2E delay.

    Fig. 3. Comparison of average E2E delay versus duty cycle.

    5.2 E2E Delay and Operation Time

    The performance of the CCLF algorithm in different network size with and without the restricted area is shown in this section. The duty cycle is 3% in the following simulation.

    a) Randomly-generated network without restricted area. In Fig. 4, the average E2E delay is increased as the network size is expanded. The CCLF algorithm significantly outperforms the random pick method and the delay is decreased up to 38.54%. The performance of the CCLF algorithm is very close to the optimal algorithm. The difference of the average E2E delay between the CCLF algorithm and the optimal algorithm is around 1%. The relationship of total operation time between the CCLF algorithm and the optimal algorithm is presented in Fig. 5. The CCLF algorithm is obviously faster than the optimal algorithm in all test conditions. The CCLF algorithm achieves 5.32 times faster than the optimal algorithm for network size of 1600 m2.

    Fig. 4. Comparison of average E2E delay versus network size.

    Fig. 5. Comparison of average operation time versus network size.

    b) Randomly-generated network with forbidden area. In this section, the network with a forbidden area is simulated. The sensor nodes would not be deployed in the forbidden area. In Fig. 6, the performance of the CCLF algorithm is nearly the same as compared with the optimal algorithm. However, in Fig. 7, the CCLF algorithm achieves 5.43 times faster on the total operation time than the optimal algorithm in network size of 1600 m2.

    Fig. 6. Comparison of E2E delay for WSNs with forbidden area.

    Fig. 7. Operation time for WSNs with forbidden area.

    5.3 Different Delay Bound and Hit Rate Comparison

    The impact of delay bound is shown in Fig. 8. There are 250 nodes in the network and the duty-cycle is 1%. In Fig. 8, the curves of the CCLF algorithm and the optimal algorithm are nearly the same. When the delay bound is above 420 time units, the CCLF algorithm can guarantee a 100% message delivery ratio from the sink to each node. The randomly pick scheme only achieves approximately a 70% message delivery ratio. The cumulative distribution function (CDF) of the CCLF algorithm is consistently larger than the randomly pick scheme in all cases.

    Fig. 8. Comparison of CDF versus delay bound.

    The hit rate of the CCLF algorithm is shown in Fig. 9. The hit rate represents the rate that the sink location found by the CCLF algorithm is the same as the location found by the optimal algorithm. The CCLF algorithm obtains the average hit rate of 60%. For the 40% miss cases, the resultant performance is also similar to the optimal algorithm.

    Fig. 9. Comparison of hit rate versus network size.

    6. Conclusions

    A low-duty-cycle mechanism has been used to reduce the energy consumption. However, such a technique, while increasing the network lifetime, has challenges to improving E2E delay within the network. This paper introduced a CCLF algorithm for low-duty-cycle WSNs. The CCLF algorithm is a sink positioning solution based on cluster classification and fast look-up tables. The simulation results show that the CCLF algorithm achieves competitiveperformance with the optimal algorithm. The operation time even achieves 5.32 times faster than the optimal algorithm. The extensive simulation also demonstrates the reliability of CCLF scheme under varying conditions of the network environment.

    [1] R. Szewczyk, A. Mainwaring, J. Polastre, J. Anderson, and D. Culler, “An analysis of a large scale habit monitoring application,” inProc. of ACMConf. on Embedded Networked Sensor Systems, 2004, pp. 214–226.

    [2] X. Liu, J. Cao, S. Lai, C. Yang, H. Wu, and Y. Xu, “Energy efficient clustering for WSN-based structural health monitoring,” inProc. of IEEEConf. on Computer Communications, 2011, pp. 2768–2776.

    [3] Q. Zhang, G. Sobelman, and T. He, “Gradient-driven target acquisition in mobile wireless sensor networks,” inProc. of Conf. on Mobile Ad-hoc and Sensor Networks, 2006, pp. 365–376.

    [4] Y. Zhang, L. Zhang, and X. Shan, “Robust distributed localization with data inference for wireless sensor networks,” inProc. of IEEE Conf. on Communications, 2008, pp. 3125–3129.

    [5] N. Xu, S. Rangwala, K. K. Chintalapudi, D. Ganesan, A. Broad, R. Govindan, and D. Estrin, “A wireless sensor network for structural monitoring,” inProc.of ACM Conf. on Embedded Networked SensorSystems, 2004, pp. 13–24.

    [6] W.-T. Wang and K.-F. Ssu, “Obstacle detection and estimation in wireless sensor networks,”Computer Networks, vol. 57, no. 4, pp. 858–868, Mar. 2013.

    [7] W.-C. Chu and K.-F. Ssu, “Decentralized boundary detection without location information in wireless sensor networks,” inProc. of IEEEConf. on Wireless Communications and Networking, 2012, pp. 1720–1724.

    [8] G. Wang, G. Cao, P. Berman, and T. F. La Porta, “Bidding protocols for deploying mobile sensors,”IEEE Trans. on Mobile Computing, vol. 6, no. 5, pp. 563–576, May 2007.

    [9] D. Wang, B. Xie, and D. P. Agrawal, “Coverage and lifetime optimization of wireless sensor networks with gaussian distribution,”IEEE Trans. onMobile Computing, vol. 7, no. 12, pp. 1444–1458, Dec. 2008.

    [10] S. Subramaniam, V. Kalogeraki, and T. Palpanas,“Distributed real-time detection and tracking of homogeneous regions in sensor networks,” inProc.of IEEE Symposium on Real-Time Systems, 2006, pp. 401–411.

    [11] L. Lazos, R. Poovendran, and J. A. Ritcey, “Probabilistic detection of mobile targets in heterogeneous sensor networks,” inProc. IEEESymposium on Information Processing in Sensor Networks, 2007, pp. 519–528.

    [12] D. Lymberopoulos, A. Bamis, and A. Savvides, “A methodology for extracting temporal properties from sensor network data streams,” inProc. of ACM Conf. on Mobile Systems, Applications, and Services, 2009, pp. 193–206.

    [13] K. Romer, “Discovery of frequent distributed event patterns in sensor networks,” inProc. of European Conf. on Wireless Sensor Networks, 2008, pp. 106–124.

    [14] S. R. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong, “TinyDB: An acquisitional query processing system for sensor networks,”ACM Trans.on Database Systems, vol. 30, no. 1, pp. 122–173, Mar. 2005.

    [15] C.-T. Huang, T.-H. Lin, L.-J. Chen, and P. Huang, “XD: A cross-layer designed data collection mechanism for mission-critical WSNs in urban buildings,” inProc. of IEEE Conf. on Mobile Data Management:Systems, Services, and Middleware, 2009, pp. 399–404.

    [16] R. Mangharam, A. Rowe, R. Rajkumar, and R. Suzuki,“Voice over sensor networks,” inProc. of IEEE Symposium on Real-TimeSystems, 2006, pp. 291–302.

    [17] M. Y. Nam, C. G. Lee, K. Kim, and M. Caccamo,“Time-parameterized sensing task model for real-time tracking,” inProc. of IEEESymposium on Real-Time Systems, 2005, pp. 245–255.

    [18] W. Ye, J. Heidemann, and D. Estrin, “Medium access control with coordinated adaptive sleeping for wireless sensor networks,”IEEE/ACM Trans. onNetworking, vol. 12, no. 3, pp. 493–506, Jun. 2004.

    [19] N. Aydin, M. Karaca, and O. Ercetin, “Energy-optimal scheduling in low duty cycle sensor networks,” inProc. IEEE Symposium on Performance Evaluation of Computer & Telecommunication Systems, 2011, pp. 119–126.

    [20] O. Dousse, P. Mannersalo, and P. Thiran, “Latency of wireless sensor networks with uncoordinated power saving mechanisms,” inProc. of ACM Symposium on Mobile Ad Hoc Networking and Computing, 2004, pp. 109–120.

    [21] A. Keshavarzian, H. Lee, and L. Venkatraman, “Wakeup scheduling in wireless sensor networks,” inProc. of ACM Symposium on MobileAd Hoc Networking and Computing, 2006, pp. 322–333.

    [22] W. Lai and I. C. Paschalidis, “Sensor network minimal energy routing with latency guarantees,” inProc. of ACM Symposium on MobileAd Hoc Networking and Computing, 2007, pp. 199–208.

    [23] Y. Gu and T. He, “Bounding communication delay in energy harvesting sensor networks,” inProc. of IEEE Conf. on DistributedComputing Systems, 2010, pp. 837–847.

    [24] Y. Duan, X. Wu, F. Wu, and G. Chen, “Dynamic data forwarding in low-duty-cycle sensor networks,” inProc. of IEEE Conf. on Parallel and Distributed Systems, 2011, pp. 505–511.

    [25] G. Sun and B. Xu, “Delay-aware routing in low duty-cycle wireless sensor networks,” inProc. of IEEE Conf. on WirelessCommunications Networking and Mobile Computing, 2010, pp. 1–4.

    [26] Y. Gu and T. He, “Dynamic switching-based data forwarding for low-duty-cycle wireless sensor networks,”IEEE Trans. on Mobile Computing, vol. 10, no. 12, pp. 1741–1754, Dec. 2011.

    Yu-Yuan Lin received the B.S. degree in computer and information science from Soochow University, Soochow and the M.S. degree in computer and communication engineering from National Cheng Kung University, Tainan. He is currently a Ph.D. student with the Institute of Computer and Communication Engineering, National Cheng Kung University. His research interests include mobile computing and wireless sensor networks.

    Kuo-Feng Ssu received the B.S. degree in computer science and information engineering from National Chiao Tung University, Hsinchu and the Ph.D. degree in computer science from the University of Illinois, Urbana-Champaign. He is currently a professor with the Department of Electrical Engineering, National Cheng Kung University, Tainan. He is also a visiting scholar with the Department of Computer and Information Sciences, University of Delaware, Newark, Delaware. He was a visiting associate professor with the School of Electrical and Computer Engineering, Cornell University, Ithaca, New York. His research interests include mobile computing, distributed systems, and dependable computing. His research awards include the Ta-You Wu Memorial Award, the K.T. Li Research Award, and the Lam Research Thesis Award. He is a member of IEEE, ACM, and the Phi Tau Phi Honor Scholastic Society.

    Hau-Yu Chiang received the B.S. in computer and information science from Soochow University, Soochow and the M.S. degree in computer and communication engineering from National Cheng Kung University, Tainan. His research interests include mobile ad hoc networks and wireless sensor networks.

    Manuscript received December 28, 2013; revised March 18, 2014. This work was supported in part by NSC under Grant No. NSC 100-2628-E-006-028-MY3, 100-2221-E-006-136-MY2, and 101-2221-E-006-247-MY3.

    Y.-Y. Lin is with the Institute of Computer and Communication Engineering, National Cheng Kung University, Tainan 701 (e-mail: bao@dcl.ee.ncku.edu.tw).

    K.-F. Ssu is with the Department of Electrical Engineering, National Cheng Kung University, Tainan 701 (Corresponding author e-mail: ssu@ee.ncku.edu.tw).

    H.-Y. Chiang is with the Data Systems Consulting Co., Ltd, Taipei 106 (e-mail: healmax@gmail.com).

    Digital Object Identifier: 10.3969/j.issn.1674-862X.2015.01.005

    两个人的视频大全免费| 搞女人的毛片| 怎么达到女性高潮| 午夜日韩欧美国产| 欧美三级亚洲精品| 五月伊人婷婷丁香| 国产精品爽爽va在线观看网站| 黄片大片在线免费观看| 欧美极品一区二区三区四区| 日日摸夜夜添夜夜添小说| 亚洲电影在线观看av| 亚洲成人精品中文字幕电影| 九九热线精品视视频播放| 又大又爽又粗| 亚洲人成网站高清观看| 一级黄色大片毛片| 亚洲国产看品久久| 岛国在线免费视频观看| 国产成人啪精品午夜网站| 亚洲专区字幕在线| 午夜免费成人在线视频| 免费观看人在逋| 免费在线观看亚洲国产| 日日摸夜夜添夜夜添小说| 麻豆久久精品国产亚洲av| 1024香蕉在线观看| 毛片女人毛片| 人妻丰满熟妇av一区二区三区| 精品少妇一区二区三区视频日本电影| 久久精品aⅴ一区二区三区四区| 日韩欧美免费精品| 中出人妻视频一区二区| 欧美日韩瑟瑟在线播放| 美女午夜性视频免费| 亚洲九九香蕉| 久久精品国产99精品国产亚洲性色| 人人妻人人看人人澡| 三级国产精品欧美在线观看 | 国产在线精品亚洲第一网站| 老熟妇乱子伦视频在线观看| 成人特级黄色片久久久久久久| 日韩三级视频一区二区三区| 日日摸夜夜添夜夜添小说| 三级毛片av免费| 非洲黑人性xxxx精品又粗又长| 在线视频色国产色| 亚洲av中文字字幕乱码综合| 床上黄色一级片| 熟妇人妻久久中文字幕3abv| 成人18禁高潮啪啪吃奶动态图| 亚洲中文日韩欧美视频| 久久精品国产综合久久久| 在线国产一区二区在线| 日日夜夜操网爽| 亚洲国产日韩欧美精品在线观看 | 丰满人妻一区二区三区视频av | 法律面前人人平等表现在哪些方面| 欧洲精品卡2卡3卡4卡5卡区| 欧美日韩精品网址| 两个人免费观看高清视频| 性色av乱码一区二区三区2| 两人在一起打扑克的视频| 国产亚洲精品av在线| 欧美一区二区精品小视频在线| 美女免费视频网站| 国内毛片毛片毛片毛片毛片| 波多野结衣高清作品| 久久中文看片网| or卡值多少钱| 国产精品爽爽va在线观看网站| 99国产综合亚洲精品| 亚洲av熟女| 18美女黄网站色大片免费观看| 久久久久九九精品影院| 国模一区二区三区四区视频 | 亚洲国产精品成人综合色| 色精品久久人妻99蜜桃| 日韩大码丰满熟妇| 非洲黑人性xxxx精品又粗又长| 国产精品久久电影中文字幕| 婷婷亚洲欧美| 国产私拍福利视频在线观看| 黄片大片在线免费观看| 99久久99久久久精品蜜桃| 99国产极品粉嫩在线观看| 国产精品爽爽va在线观看网站| 免费在线观看成人毛片| 一本综合久久免费| 中文亚洲av片在线观看爽| 国产1区2区3区精品| 国产精品av视频在线免费观看| 美女大奶头视频| 亚洲国产欧洲综合997久久,| 国产一区二区激情短视频| 欧美日韩中文字幕国产精品一区二区三区| 欧美性猛交╳xxx乱大交人| 色播亚洲综合网| 成年人黄色毛片网站| 可以免费在线观看a视频的电影网站| 一卡2卡三卡四卡精品乱码亚洲| 黄色a级毛片大全视频| 国产亚洲精品av在线| 国产99白浆流出| 国产男靠女视频免费网站| 色噜噜av男人的天堂激情| 亚洲激情在线av| 亚洲成av人片免费观看| 午夜精品一区二区三区免费看| 日韩免费av在线播放| 嫩草影院精品99| 99精品在免费线老司机午夜| 天天躁夜夜躁狠狠躁躁| 亚洲国产精品成人综合色| www.熟女人妻精品国产| 国产爱豆传媒在线观看 | 成人18禁高潮啪啪吃奶动态图| 身体一侧抽搐| 一个人免费在线观看的高清视频| 免费在线观看亚洲国产| 亚洲va日本ⅴa欧美va伊人久久| 国产真人三级小视频在线观看| 免费人成视频x8x8入口观看| 中文字幕最新亚洲高清| 精品人妻1区二区| 亚洲精品中文字幕一二三四区| 精品久久久久久成人av| 两个人的视频大全免费| 国产一区二区三区在线臀色熟女| 成人国语在线视频| 亚洲中文字幕一区二区三区有码在线看 | 啦啦啦免费观看视频1| 亚洲aⅴ乱码一区二区在线播放 | 久久精品影院6| x7x7x7水蜜桃| 老熟妇乱子伦视频在线观看| 免费电影在线观看免费观看| 最近在线观看免费完整版| 久久久久九九精品影院| 成人欧美大片| 欧美日本亚洲视频在线播放| 啪啪无遮挡十八禁网站| 欧美日韩亚洲国产一区二区在线观看| 国产熟女xx| 亚洲av成人精品一区久久| 日韩精品免费视频一区二区三区| 五月伊人婷婷丁香| 美女高潮喷水抽搐中文字幕| 欧美日韩乱码在线| 国产成人aa在线观看| 日韩欧美国产在线观看| 亚洲午夜理论影院| 不卡一级毛片| 婷婷六月久久综合丁香| 亚洲中文av在线| a在线观看视频网站| 性欧美人与动物交配| 亚洲人成网站高清观看| 欧美日韩精品网址| 一a级毛片在线观看| 99在线人妻在线中文字幕| 亚洲国产精品成人综合色| 日韩欧美在线二视频| 日本黄大片高清| a级毛片a级免费在线| 特大巨黑吊av在线直播| 成人特级黄色片久久久久久久| 久久久久久久午夜电影| 狂野欧美白嫩少妇大欣赏| 亚洲男人的天堂狠狠| 中国美女看黄片| 欧美成人免费av一区二区三区| 久久久久国产精品人妻aⅴ院| 国产精品av视频在线免费观看| 啪啪无遮挡十八禁网站| 亚洲国产精品久久男人天堂| 国语自产精品视频在线第100页| 啦啦啦免费观看视频1| 亚洲一码二码三码区别大吗| 久久久久精品国产欧美久久久| 熟女电影av网| 在线永久观看黄色视频| 中亚洲国语对白在线视频| 两人在一起打扑克的视频| 黄色丝袜av网址大全| 亚洲人成网站在线播放欧美日韩| 日韩成人在线观看一区二区三区| 五月玫瑰六月丁香| 制服丝袜大香蕉在线| 亚洲人成电影免费在线| 国产精品久久电影中文字幕| 又黄又粗又硬又大视频| 男人舔奶头视频| 90打野战视频偷拍视频| 麻豆成人午夜福利视频| 成人18禁高潮啪啪吃奶动态图| 在线十欧美十亚洲十日本专区| 亚洲真实伦在线观看| 五月玫瑰六月丁香| 高清毛片免费观看视频网站| 日本三级黄在线观看| 亚洲色图av天堂| 国产一区在线观看成人免费| 亚洲成av人片免费观看| 777久久人妻少妇嫩草av网站| 亚洲精品美女久久久久99蜜臀| 97超级碰碰碰精品色视频在线观看| 成年版毛片免费区| 日韩欧美免费精品| 男男h啪啪无遮挡| 久久精品aⅴ一区二区三区四区| 可以在线观看的亚洲视频| 成人国产综合亚洲| 亚洲九九香蕉| 一级毛片高清免费大全| 宅男免费午夜| 欧美中文综合在线视频| 亚洲欧美日韩无卡精品| 狂野欧美白嫩少妇大欣赏| 国产精品1区2区在线观看.| 91麻豆精品激情在线观看国产| 久久久久性生活片| 国产午夜福利久久久久久| 国内毛片毛片毛片毛片毛片| 夜夜躁狠狠躁天天躁| 一级a爱片免费观看的视频| 午夜精品在线福利| 国产精品98久久久久久宅男小说| 90打野战视频偷拍视频| 国产探花在线观看一区二区| 久久精品aⅴ一区二区三区四区| 黄色片一级片一级黄色片| av免费在线观看网站| 91成年电影在线观看| 伦理电影免费视频| 中文字幕人成人乱码亚洲影| 99精品久久久久人妻精品| 777久久人妻少妇嫩草av网站| 一个人免费在线观看的高清视频| 两个人看的免费小视频| 丰满的人妻完整版| 亚洲男人的天堂狠狠| 午夜福利在线在线| 久久香蕉激情| 精品一区二区三区视频在线观看免费| 制服丝袜大香蕉在线| 免费观看精品视频网站| 欧美午夜高清在线| 老司机午夜福利在线观看视频| 亚洲精品中文字幕在线视频| 啪啪无遮挡十八禁网站| 久久精品国产综合久久久| 国产成年人精品一区二区| 一卡2卡三卡四卡精品乱码亚洲| 伊人久久大香线蕉亚洲五| 夜夜爽天天搞| 国产精品亚洲美女久久久| 在线免费观看的www视频| 特大巨黑吊av在线直播| 亚洲欧美日韩无卡精品| 国产视频内射| 国产亚洲精品久久久久久毛片| 长腿黑丝高跟| 午夜精品久久久久久毛片777| 最近最新中文字幕大全电影3| 国产高清videossex| 激情在线观看视频在线高清| ponron亚洲| 99热只有精品国产| 母亲3免费完整高清在线观看| 久久久久国产一级毛片高清牌| 一本大道久久a久久精品| 国产成人系列免费观看| 欧美性猛交╳xxx乱大交人| 国产成人一区二区三区免费视频网站| 国产1区2区3区精品| 波多野结衣高清无吗| 久久香蕉国产精品| 成人欧美大片| 亚洲精品中文字幕在线视频| 亚洲av熟女| 色综合婷婷激情| 99久久精品热视频| 法律面前人人平等表现在哪些方面| 国产av在哪里看| 国产熟女午夜一区二区三区| 国产精品免费视频内射| 俄罗斯特黄特色一大片| 热99re8久久精品国产| 韩国av一区二区三区四区| 久久国产乱子伦精品免费另类| 少妇裸体淫交视频免费看高清 | 99在线视频只有这里精品首页| 久久伊人香网站| 在线a可以看的网站| 啦啦啦免费观看视频1| 母亲3免费完整高清在线观看| 日本三级黄在线观看| 99久久久亚洲精品蜜臀av| 亚洲国产欧美人成| 非洲黑人性xxxx精品又粗又长| 亚洲最大成人中文| 他把我摸到了高潮在线观看| 午夜精品在线福利| 国产亚洲精品av在线| 午夜福利欧美成人| 午夜精品在线福利| 久久久久免费精品人妻一区二区| 国内揄拍国产精品人妻在线| 一个人观看的视频www高清免费观看 | 很黄的视频免费| 人人妻人人看人人澡| 97碰自拍视频| 欧美黑人欧美精品刺激| 18美女黄网站色大片免费观看| 国产99久久九九免费精品| 久久欧美精品欧美久久欧美| 18禁美女被吸乳视频| 日本在线视频免费播放| 少妇粗大呻吟视频| 叶爱在线成人免费视频播放| 国产久久久一区二区三区| 国产99白浆流出| 国内毛片毛片毛片毛片毛片| 正在播放国产对白刺激| 久久久久久人人人人人| 免费看美女性在线毛片视频| 久久久久精品国产欧美久久久| 18禁观看日本| 亚洲一码二码三码区别大吗| 久久久久久久久免费视频了| 色哟哟哟哟哟哟| 免费搜索国产男女视频| 欧美激情久久久久久爽电影| 亚洲精品中文字幕一二三四区| 国产午夜精品论理片| or卡值多少钱| 国产熟女xx| 精品久久久久久久毛片微露脸| 成人一区二区视频在线观看| 亚洲精品美女久久av网站| 两个人看的免费小视频| 波多野结衣高清作品| 两个人看的免费小视频| 十八禁网站免费在线| 久久午夜综合久久蜜桃| 日韩欧美一区二区三区在线观看| 久久伊人香网站| 男女下面进入的视频免费午夜| 91麻豆av在线| 国产一区二区在线观看日韩 | 欧美性猛交╳xxx乱大交人| 男男h啪啪无遮挡| 国产三级黄色录像| 麻豆一二三区av精品| 一二三四社区在线视频社区8| 亚洲精品国产一区二区精华液| ponron亚洲| 在线观看舔阴道视频| 欧美av亚洲av综合av国产av| 亚洲精华国产精华精| 人妻丰满熟妇av一区二区三区| 天天躁夜夜躁狠狠躁躁| 一级片免费观看大全| 日日摸夜夜添夜夜添小说| av欧美777| 一进一出抽搐动态| 久热爱精品视频在线9| 久久久国产精品麻豆| www.熟女人妻精品国产| 日本五十路高清| 亚洲五月婷婷丁香| 亚洲自偷自拍图片 自拍| 岛国视频午夜一区免费看| 又爽又黄无遮挡网站| 动漫黄色视频在线观看| 日韩欧美免费精品| 免费在线观看日本一区| 国产真人三级小视频在线观看| 麻豆国产av国片精品| 白带黄色成豆腐渣| 国产精品 国内视频| 婷婷精品国产亚洲av| 精品久久久久久久末码| 欧美三级亚洲精品| 亚洲欧美日韩高清专用| 嫩草影视91久久| 免费在线观看成人毛片| 丁香欧美五月| 成人18禁在线播放| 丰满人妻一区二区三区视频av | 国产伦人伦偷精品视频| 欧美精品啪啪一区二区三区| 老鸭窝网址在线观看| 又黄又爽又免费观看的视频| 最近最新免费中文字幕在线| 亚洲国产高清在线一区二区三| 成年人黄色毛片网站| 悠悠久久av| 别揉我奶头~嗯~啊~动态视频| 久久婷婷成人综合色麻豆| 久久精品成人免费网站| 成人永久免费在线观看视频| 亚洲第一欧美日韩一区二区三区| 国产午夜福利久久久久久| 亚洲精品国产精品久久久不卡| www国产在线视频色| 老熟妇乱子伦视频在线观看| 宅男免费午夜| 女人被狂操c到高潮| 国产精品免费视频内射| 精品久久久久久久毛片微露脸| 级片在线观看| 精华霜和精华液先用哪个| 黄色片一级片一级黄色片| 国产亚洲精品久久久久久毛片| 日本免费a在线| 黄色毛片三级朝国网站| 国产精品免费一区二区三区在线| 久久精品国产99精品国产亚洲性色| 每晚都被弄得嗷嗷叫到高潮| 亚洲国产精品成人综合色| 欧美日本视频| 久久精品影院6| 一本精品99久久精品77| 午夜福利欧美成人| aaaaa片日本免费| 悠悠久久av| 国产成人一区二区三区免费视频网站| 亚洲国产精品999在线| 午夜福利成人在线免费观看| 免费电影在线观看免费观看| 女人爽到高潮嗷嗷叫在线视频| 国产精品日韩av在线免费观看| 婷婷六月久久综合丁香| 99热6这里只有精品| 成人特级黄色片久久久久久久| 欧美日韩乱码在线| 天堂av国产一区二区熟女人妻 | 丝袜美腿诱惑在线| 99久久综合精品五月天人人| 777久久人妻少妇嫩草av网站| 露出奶头的视频| 精品久久久久久久久久久久久| 亚洲欧美日韩无卡精品| 黄片大片在线免费观看| 丁香六月欧美| 国产精品一及| 亚洲欧美激情综合另类| 国产精品98久久久久久宅男小说| 日韩高清综合在线| 18禁观看日本| 亚洲欧美精品综合久久99| 国产免费av片在线观看野外av| 91大片在线观看| 亚洲精品美女久久久久99蜜臀| 看黄色毛片网站| 日本a在线网址| 在线观看66精品国产| 亚洲欧美日韩高清专用| 国产野战对白在线观看| 国产激情久久老熟女| 香蕉av资源在线| 亚洲人成网站高清观看| 最近视频中文字幕2019在线8| www日本在线高清视频| 久久久久国内视频| 午夜视频精品福利| 成年女人毛片免费观看观看9| 国产精品久久久人人做人人爽| 午夜精品一区二区三区免费看| 淫秽高清视频在线观看| 激情在线观看视频在线高清| 亚洲色图 男人天堂 中文字幕| 国产精品久久久久久亚洲av鲁大| 亚洲精品国产一区二区精华液| 亚洲男人天堂网一区| 色综合婷婷激情| 国产成人精品久久二区二区91| 亚洲 欧美 日韩 在线 免费| 国产麻豆成人av免费视频| 亚洲成人中文字幕在线播放| 国产精品一区二区免费欧美| 成在线人永久免费视频| 老熟妇乱子伦视频在线观看| 国产熟女午夜一区二区三区| 亚洲国产精品999在线| 黄色丝袜av网址大全| 麻豆国产97在线/欧美 | a级毛片a级免费在线| 久久久久国产精品人妻aⅴ院| 在线观看免费日韩欧美大片| 人人妻人人澡欧美一区二区| 法律面前人人平等表现在哪些方面| 国产精品一区二区三区四区久久| 在线观看舔阴道视频| 亚洲五月天丁香| 久久久久久人人人人人| 特大巨黑吊av在线直播| 国产高清视频在线观看网站| 欧美乱色亚洲激情| 国模一区二区三区四区视频 | 午夜福利免费观看在线| 手机成人av网站| 青草久久国产| 国产精品久久久久久亚洲av鲁大| √禁漫天堂资源中文www| 亚洲精品美女久久久久99蜜臀| 一本综合久久免费| 男人的好看免费观看在线视频 | svipshipincom国产片| 99在线人妻在线中文字幕| 欧美绝顶高潮抽搐喷水| 日韩高清综合在线| 人人妻,人人澡人人爽秒播| 亚洲国产精品久久男人天堂| 琪琪午夜伦伦电影理论片6080| 色老头精品视频在线观看| tocl精华| 18禁黄网站禁片免费观看直播| 级片在线观看| 最近视频中文字幕2019在线8| 亚洲精品一卡2卡三卡4卡5卡| 可以在线观看的亚洲视频| 国产一区在线观看成人免费| 脱女人内裤的视频| 国产成人精品无人区| 岛国在线观看网站| 欧美zozozo另类| 九色国产91popny在线| 精品福利观看| 成人午夜高清在线视频| 两性午夜刺激爽爽歪歪视频在线观看 | 亚洲真实伦在线观看| 非洲黑人性xxxx精品又粗又长| 波多野结衣高清无吗| 精品无人区乱码1区二区| 动漫黄色视频在线观看| 俺也久久电影网| 精品一区二区三区视频在线观看免费| 久久性视频一级片| 麻豆久久精品国产亚洲av| av福利片在线| 国产精品久久久久久亚洲av鲁大| 国产区一区二久久| 久久国产乱子伦精品免费另类| 可以免费在线观看a视频的电影网站| 国产成人系列免费观看| 成人亚洲精品av一区二区| 在线观看一区二区三区| 国产久久久一区二区三区| 免费电影在线观看免费观看| 夜夜躁狠狠躁天天躁| 久久香蕉国产精品| netflix在线观看网站| 在线观看美女被高潮喷水网站 | 国产高清视频在线观看网站| 99国产精品一区二区三区| 给我免费播放毛片高清在线观看| 搡老岳熟女国产| 亚洲 欧美一区二区三区| 欧美zozozo另类| 18禁观看日本| www.熟女人妻精品国产| 天天添夜夜摸| 动漫黄色视频在线观看| 精品日产1卡2卡| 国产亚洲欧美在线一区二区| 777久久人妻少妇嫩草av网站| 中文字幕精品亚洲无线码一区| 久久这里只有精品中国| 精品久久久久久久人妻蜜臀av| а√天堂www在线а√下载| 亚洲色图av天堂| 男插女下体视频免费在线播放| 悠悠久久av| aaaaa片日本免费| 国产在线观看jvid| 精品午夜福利视频在线观看一区| 欧美在线黄色| 午夜福利成人在线免费观看| 国产高清激情床上av| 正在播放国产对白刺激| 国产蜜桃级精品一区二区三区| 亚洲天堂国产精品一区在线| 长腿黑丝高跟| 久久精品国产综合久久久| 两个人视频免费观看高清| 黄色成人免费大全| 亚洲欧美日韩高清专用| 欧美又色又爽又黄视频| 精品日产1卡2卡| 国产精品,欧美在线| 国产av麻豆久久久久久久| 我要搜黄色片| 亚洲午夜精品一区,二区,三区| 在线观看午夜福利视频| ponron亚洲| www国产在线视频色| 他把我摸到了高潮在线观看| 一级毛片女人18水好多| 淫秽高清视频在线观看| 亚洲av片天天在线观看| 男女之事视频高清在线观看| 精品少妇一区二区三区视频日本电影| 真人一进一出gif抽搐免费| 此物有八面人人有两片| 国产v大片淫在线免费观看| 在线免费观看的www视频| 真人做人爱边吃奶动态| 18禁美女被吸乳视频| 精品少妇一区二区三区视频日本电影| 69av精品久久久久久| 国产成人av教育| 一级a爱片免费观看的视频| 精品第一国产精品|