• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Research on the adaptive hybrid search tree anti-collision algorithm in RFID system①

    2016-12-06 02:39:57JinXiaofang靳曉芳LiuMengxuanShaoMinJinLibiaoHuangXianglin
    High Technology Letters 2016年1期

    Jin Xiaofang (靳曉芳), Liu Mengxuan, Shao Min, Jin Libiao, Huang Xianglin

    (Information Engineering, Communication University of China, Beijing 100024, P.R.China)

    ?

    Research on the adaptive hybrid search tree anti-collision algorithm in RFID system①

    Jin Xiaofang (靳曉芳)②, Liu Mengxuan, Shao Min, Jin Libiao, Huang Xianglin

    (Information Engineering, Communication University of China, Beijing 100024, P.R.China)

    Due to more tag-collisions result in failed transmissions, tag anti-collision is a very vital issue in the radio frequency identification (RFID) system. However, so far decreases in communication time and increases in throughput are very limited. In order to solve these problems, this paper presents a novel tag anti-collision scheme, namely adaptive hybrid search tree (AHST), by combining two algorithms of the adaptive binary-tree disassembly (ABD) and the combination query tree (CQT), in which ABD has superior tag identification velocity and CQT has optimum performance in system throughput and search timeslots. From the theoretical analysis and numerical simulations, the proposed algorithm can colligate the advantages of above algorithms, improve the system throughput and reduce the searching timeslots dramatically.

    anti-collision, adaptive binary-tree disassembly(ABD), hybrid search tree, discrimination

    0 Introduction

    Nowadays, radio frequency identification (RFID) technology is widely used in the automated identification system[1]. A general RFID system is comprised of a reader and a lot of tags. The reader recognizes an object through wireless communications with the tag which has a unique identification (ID) and is attached to the object[2,3]. However, if tags send signals to the reader at the same time, they will collide with each other. Thus, an efficient anti-collision algorithm is needed to reduce the collision timeslots and increase the system throughput effectively.

    The RFID anti-collision algorithm can be classified into two categories: tree-based algorithms and Aloha-based algorithms[4,5]. This paper focuses on the former one because the tree-based algorithms have 100% identification efficiency. As studied in Ref.[6], tree-based protocols are based on the collision resolution algorithm. In the binary tree algorithm (BT), when a set of tags causes collisions, the mechanisms split them into two subsets and attempt to recognize them in turn[7]. Therefore, theQ-ary tree would be split intoQsubsets.

    Based on the tree protocol, a lot of improved algorithms have been produced[5,6]. Sun[8]proposed an improved anti-collision algorithm based on the regressive style, and the algorithm took a quad tree structure when continuous collision bits appeared. An improved adaptive multi-tree search anti-collision algorithm (IAMS)[9]optimized the prefix which was set by the reader to reduce the idle timeslots, and through the collisions, the IAMS could choose the search tree adaptively. Although the above algorithms could choose the optimum search tree adaptively, the methods of selecting tree are limited only by using binary tree and quad tree. The optimal system efficiency could be obtained by using the 3-ary search tree[10]. The adaptive binary-tree disassembly (ABD) anti-collision algorithm in Ref.[11] grouped the tags adaptively. However, the query method still used the fixed binary tree. The combination query tree (CQT) anti-collision algorithm in Ref.[12] adjusted the query tree according to the length of tags, but it was not adaptive to vast tags. The performance of the ABD and the CQT algorithms did not achieve a desired effect.

    In order to achieve ideal performance, this paper synthesizes the advantages of ABD which has the superior tag identification velocity and the CQT which has the optimum throughput and search timeslots. Thus an adaptive hybrid search tree (AHST) algorithm is proposed. The simulations testify that the AHST algorithm has the least search timeslots and the highest throughput.

    The rest of this paper is organized as follows: Section 1 introduces the ABD and the CQT algorithms briefly. In Section 2, the AHST anti-collision algorithm is presented by analyzing the concept, formula and procedure. In Section 3, simulation results verify advantages of the new algorithm. Conclusions are showed in Section 4.

    1 Analyses on original tree-based algorithms

    1.1 The adaptive binary-tree disassembly anti-collision algorithm (ABD)

    According to signals received by the reader from tags (e.g., readable, idle or collision), the reader transmits feedback to inform the tags about what happens during the last cycle in the BT principle. When the feedback is collision, the tags involved in this collision generate a binary number randomly and add this number to their counter, where the initial value is 0.

    Fig.1 is an example of the BT.

    Fig.1 Tag identification procedure of the BT

    The ABD anti-collision algorithm has tag identification efficiency better than the BT algorithm in the first layer of depth. The timeslots are divided into three parts:

    (1) Readable timeslots: only one tag transmits its signals to the reader and then this tag is recognized by the reader.

    (2) Idle timeslots: no tag transmits information. This timeslot is wasteful and should be reduced.

    (3) Collision timeslots: more than one tag transmit their signals to the reader, so that the reader could not recognize any one of them.

    The ABD algorithm splits 2ltimeslots at the first layer of depth. l is defined as discrimination and increases adaptively when the number of tags increases. The number of sub-binary trees can be decided by the number of collision timeslots at the first layer of depth, the idle timeslots needn’t to be dealt with again, and the readable timeslots can recognize tags directly. Then, the remaining tags will be recognized till all tags are identified using the binary-tree algorithm.

    Fig.2 is an example of the ABD algorithm when l=2.

    Suppose N tags are identified by the reader and the IDs of these tags are random distribution. T represents the timeslots which are needed to identify all tags. S stands for the throughput which is defined as N/T×100% and reflects the efficiency of the communication channel.

    Fig.2 Tag identification procedure of the ABD (The discrimination of the first depth is 2)

    In the BT algorithm[13]:

    TBT=N([log2N]+1)

    ([]: round up to an integer)

    (1)

    (2)

    In the ABD algorithm:

    =N([log2N]-l+1)+2l

    (3)

    (4)

    Tsub=TBT-TABD=Nl-2l

    (5)

    It is seen clearly that when N increases, the ABD algorithm effectively decreases the number of search timeslots, and then increases the throughput[11].

    1.2 The combination query tree (CQT)

    The combination query tree (CQT) is based on the 3-ary tree principle. In Ref.[10], the authors showed that the 3-ary tree had the optimum performance, but only when the length of the ID of a tag is the multiple of 3. In order to tackle this disadvantage, the CQT algorithm proposes a novel protocol which is suitable for tags with random length.

    In the 3-ary query tree algorithm, it is needed to convert binary to ternary. The conversion process is called the binary convert to ternary (BCT). The basic mechanism of the BCT algorithm is shown in Table 1.

    Table 1 The mechanism of binary convert to ternary

    The conversion methods of CQT are showed as follows:

    (1) If the ID length of the tags is the multiple of three, it can convert to ternary directly,so these tags can be identified using the 3-ary tree algorithm.

    (2) If the tags’ ID length is divided by three and the remainder is one bit, the tags can be just identified by 3-ary tree algorithm. For example, two tags here: (0100) and (0101), are converted into ternary numbers: (020) and (021), the tags will collide each other after the algorithm recognizes 02, then the tags will only leave one number, namely 0 or 1. Thus, the algorithm can directly identify one from the other.

    (3) If the tags’ ID length is divided by three and the remainder is two bits, such tags can be identified by the combinations of 3-ary tree algorithm and 2-ary tree algorithm. The 3-ary tree algorithm will be used to deal with the whole number and the remainder can be identified by the 2-ary tree algorithm.

    Fig.3 Tag identification procedure of the CQT

    Fig.3 is an example of the CQT in which the reminder is two bits. There are six tags whose ID lengths are 5 bits, which are (00000), (00100), (00110), (01110), (10000), and (11001). The conversions of binary to ternary are (00 00), (01 00), (01 10), (10 10), (11 00), (20 01). The implementations of this algorithm are showed in Fig.3.

    2 The adaptive hybrid search tree anti-collision algorithm (AHST)

    The new algorithm aims to take the advantages of both ABD and CQT algorithms. First, system encodes the IDs of the tags as described in Part 2.2. Second, in the first search layer of depth, the system splits the search tree. Last, the system selects binary tree or 3-ary tree according to the new IDs. The new algorithm can achieve higher efficiency with large scale tags in RFID system.

    Fig.4 shows the frame diagram of the AHST:

    Fig.4 Frame diagram of the AHST

    2.1 Principle and process

    All the specific procedures are showed as follows:

    1. The reader splits Q=3lat the first layer of depth (1≤l≤L, L represents the length of tags). The reader sends query codes with l within the relevant time, tags with the same code respond to the reader.

    2. The reader determines the number of 3-ary trees at the second layer of depth according to the number of collision timeslots. No tags exist in the idle timeslots which needn’t to be handled again. A tag can be identified directly in the readable timeslots.

    3. In the second layer of depth, tags are identified by using the CQT algorithm. According to the different lengths of tags’ ID, they can be converted into different new IDs.

    The tags that have the new IDs are identified by using the 3-ary tree algorithm.

    4. The reader examines whether the sub-3-ary tree is the last one. If it is not the last one, it will be returned to the third procedure.

    2.2 Formula and proof

    In the 3-ary tree principle[7]:

    TBS=N([log3N]+1)

    ([]: round up to an integer)

    (6)

    (7)

    As the length of tags is L, when mod(L,3)=0, the search process is 3-ary tree, then

    =N([log3N]-l+1)+3l

    (8)

    (9)

    When mod(L,3)=1, the last layer of search tree is binary tree and only one bit needs to be identified. The remaining average of the search timeslots is 1 besides the 3-ary search timeslots of the previous layers. So

    =N([log3N]-l+1)+3l+1

    (10)

    (11)

    When mod(L,3)=2, the last layer of the search tree is a binary tree and only two bits need to be identified. The rest tags can be searched by using the 2-ary tree algorithm, in which the timeslots is 2n-1. However, in this system, there is an overlap between the first node of the 2-ary tree and the previous node in the 3-ary tree, so the timeslots have to be 2n-2. By means of the formula 2n-2, it is easily concluded that when there is only one tag left, the timeslot that needed for identifying the tags is 0. When there are two tags, the timeslot is two. Three tags, four timeslots, four tags, six timeslots, thus, the average number is (0+2+4+6)/4=3. So

    =N([log3N]-l+1)+3l+3

    (12)

    (13)

    So

    (14)

    According to the formula above, the search timeslots and throughputs could be calculated. So in the next part, it only needs to analyze the condition of mod(L,3)=2, like Fig.3. However, the discrimination l is unknown, so it is necessary to find the optimal l within different ranges of tags.

    Theoretically, l should increase with the increase of the number of tags and it could be calculated via Eq.12 above.

    l=2, T1=N([log3N]-2+1)+32+3

    l=3, T2=N([log3N]-3+1)+33+3

    l=4, T3=N([log3N]-4+1)+34+3

    l=5, T4=N([log3N]-5+1)+35+3

    and

    T1=T2, N=18

    T2=T3, N=54

    T3=T4, N=162 are got.

    By the simulation of the formula, best selection of l is got. Table 2 describes the optimal value of l with different number of tags, and the same value from Fig.6 in the next part could be got.

    Table 2 Selections of l

    3 Algorithm simulation and performance analyses

    In order to compare different deterministic algorithms and find the optimal one within different ranges of tags, this paper tests the identification efficiency and the scopes of the discrimination l of the AHST algorithm.

    3.1 The comparisons of four algorithms

    According to the formula in Section 2 and 3, the performance of the AHST algorithm compared with the BT, the ABD and the CQT is evaluated, the variation range of tags from 0 to 500 is set, and the length of tags is chosen as 5.

    Fig.5(a) presents the relations between the number of tags and the search timeslots. Fig.5(b) presents the relations between the number of tags and throughputs.

    (a) Comparison of search timeslots when l=5

    (b) Comparison of system throughput when l=5

    As shown in Eq.14, the search timeslots are related to [log3N], since it is discontinuous integers, there are sharp fluctuations at some points. As showed in Fig.5(a), the search timeslot of AHST is the lowest among the other algorithms with the increasing number of tags. When systems are stable, search timeslots of the new algorithm decreases by 52.5%, 37.5%, 26.5% compared with the BT, the ABD and the CQT algorithms.

    Fig.5(b) shows that the system throughput of the AHST is the highest among the BT, the ABD and the CQT algorithms. When systems are stable, the new AHST algorithm has the throughput 3.45 times higher than the BT algorithm, and 2.45 times, 1.62 times higher than the ABD and the CQT algorithms respectively.

    3.2 The optimum selection of l within different ranges of tags

    In the AHST algorithm, l represents the discrimination which is unknown. When the number of tags is large, this algorithm can reduce search timeslots and improve system throughput effectively. When the number of tags is small and the allocations of initial timeslots are too many, the performance of the algorithm would decline obviously. Thus, finding optimal l within different ranges of tags is very important. Fig.6 presents the relations between the number of tags and discrimination l. The simulation results verify the validity of the theoretical analysis like Eq.14 in Section 3. Discrimination l is set as 2, 3, 4, and 5 respectively.

    As is shown in the Fig.6(a), with the increase in the tags, systems with different l have different efficiency. Fig.6(b) is a partial enlarged drawing of the Fig.6(a). From Fig.6, it is concluded that when the number of tags is less than 18, l=2 requires the least search timeslots. When the number of tags is between 18 and 54, l=3 performs better. When the number of tags is between 54 and 162, l=4 performs better. When the number of tags is larger than 162, l=5 performs better, and it can forecast that there will be more crossover points with the increase in the tags. The result is the same as the described situation in Table 2.

    4 Conclusion

    This study presents a novel tag anti-collision algorithm, which performs effectively for large scale tags in RFID system. By using the AHST, a decrease in the search depth leads to a decrease in the search timeslots effectively. At the same time, the 3-ary search tree algorithm is used which has the efficiency better than the other Q-ary search tree algorithms. Theoretical analyses and simulated experiments in Part 4 prove the validity of the AHST algorithm. That is when the number of tags is large, the new algorithm can improve the system efficiency effictively. Search timeslots of the new algorithm decreases by 52.5%, 37.5% and 26.5% compared to the BT, the ABD and the CQT algorithms. Meanwhile, the system throughput is 3.45 times, 2.45 times and 1.62 times higher than the BT, the ABD and the CQT algorithms. At last, the optimal intervals of discriminationlare confirmed. So AHST is a complete solution and is proved to be the optimal scheme.

    (a) Search timeslots of new protocol with different l

    (b) The blowup of picture (a)

    Reference

    [ 1] Amira S, Hania H, El-Sayed E. A new proposed anti-collision algorithm for RFID. In: Proceedings of the 30th National Radio Science Conference, Cairo, Egypt, 2013. 424-429

    [ 2] Liu X H, Qian Z H, Zhao Y H, et al. An adaptive tag anti-collision protocol in RFID wireless systems.InformationSecurity, 2014, 11(7):117-127

    [ 3] Yang Q, Li J Ch, Wang H Y, et al. An anti-collision algorithm using tag random-dispersing for RFID system. In: Green Computing and Communication, 2013 IEEE and Internet of Things, IEEE International Conference on and IEEE Cyber, Physical and Social Computing, Beijing, China, 2013.1077-1080

    [ 4] He Y J, Wang X Y. An ALOHA-based improved anti-collision algorithm for RFID systems.IEEEWirelessCommunication, 2013, 20(5):152-158

    [ 5] Huang Y H, Chen X R. Dynamic slots collision tracking tree based RFID anti-collision algorithm. In: Proceedings of the 10th International Conference on Wireless Communications, Networking and Mobile Computing, Beijing, China, 2014. 662-669

    [ 6] Wang X, Jia Q X, Gao X, et al. Effective RFID anti-collision algorithm based on 3-ary collision-track tree.JournalofHuazhongUniversityofScienceandTechnology(NatureScienceEdition), 2014, (6): 73-78 (In Chinese)

    [ 7] Shin J M, Jeon B C, Yang D M. Multiple RFID tags identification with M-ary query tree scheme.IEEECommunicationsLetters, 2013, 17(3):604-607

    [ 8] Sun W Sh, Hu L M. Anti-collision algorithm for adaptive multi-branch tree based on regressive-style search.JournalofComputerApplications, 2011, 31(8): 2052-2055 (In Chinese)

    [ 9] Zhang X J, Cai W Q, Wang S P. One anti-collision algorithm based on improved adaptive multi-tree search.ActaElectronicaSinica, 2012, 40(1): 193-198 (In Chinese)

    [10] Mathys P, Flajolet P. Q-ary collision resolution algorithms in random-access systems with free or blocked channel access.InformationTheory, 1985, 31(2):217-243

    [11] Ding Z G. Research and realization on key technologies of RFID: [Ph.D dissertation]. Hefei: University of Science and Technology of China, 2009. 68-77 (In Chinese)

    [12] Jiang Y, Zhang R N. An adaptive combination query tree protocol for tag identification in RFID systems.IEEECommunicationsLetters, 2012, 16(8):1192-1195

    Jin Xiaofang, born in 1980. She is a Ph.D candidate in the area of the digital signal processing in the Communication University of China. She received her M.S. degree from Communication University of China in 2006. Her research interests are digital signal processing and the areas of RFID.

    10.3772/j.issn.1006-6748.2016.01.015

    ① Supported by the National Natural Science Foundation of China (No. 61401407).

    ② To whom correspondence should be addressed. E-mail: myjinxf@sohu.comReceived on Dec. 22, 2014

    大型av网站在线播放| 亚洲国产毛片av蜜桃av| 精品熟女少妇八av免费久了| av有码第一页| 黄色视频不卡| 人妻一区二区av| 日本五十路高清| 99re6热这里在线精品视频| 黄频高清免费视频| 18禁裸乳无遮挡动漫免费视频| 久久综合国产亚洲精品| 建设人人有责人人尽责人人享有的| 91成人精品电影| 免费黄频网站在线观看国产| 久久久久久久国产电影| 激情视频va一区二区三区| 麻豆乱淫一区二区| 亚洲情色 制服丝袜| 色网站视频免费| 捣出白浆h1v1| 叶爱在线成人免费视频播放| 亚洲av日韩在线播放| 伊人亚洲综合成人网| 国产精品 国内视频| 亚洲五月婷婷丁香| 少妇人妻 视频| 首页视频小说图片口味搜索 | 制服诱惑二区| 一级,二级,三级黄色视频| 看十八女毛片水多多多| 成人免费观看视频高清| 丝袜美腿诱惑在线| 深夜精品福利| 成年人免费黄色播放视频| 精品少妇黑人巨大在线播放| 免费看不卡的av| 亚洲,欧美精品.| 国产一卡二卡三卡精品| 亚洲第一青青草原| 考比视频在线观看| 日韩精品免费视频一区二区三区| 涩涩av久久男人的天堂| 欧美精品高潮呻吟av久久| avwww免费| 午夜免费男女啪啪视频观看| 成在线人永久免费视频| 老鸭窝网址在线观看| 久久精品久久久久久噜噜老黄| 两人在一起打扑克的视频| 国产亚洲精品久久久久5区| 大香蕉久久网| 亚洲国产日韩一区二区| 97精品久久久久久久久久精品| 2021少妇久久久久久久久久久| 日本欧美国产在线视频| 一级a爱视频在线免费观看| 日韩中文字幕欧美一区二区 | 午夜福利在线免费观看网站| 中国美女看黄片| 午夜久久久在线观看| 亚洲欧美清纯卡通| 日韩电影二区| 久久久亚洲精品成人影院| 国产精品免费大片| 亚洲三区欧美一区| 一本一本久久a久久精品综合妖精| 视频在线观看一区二区三区| 精品一区二区三区av网在线观看 | 中文精品一卡2卡3卡4更新| 咕卡用的链子| 91麻豆精品激情在线观看国产 | 一区二区av电影网| 久久国产亚洲av麻豆专区| 老司机靠b影院| 亚洲,欧美,日韩| 亚洲五月婷婷丁香| 日日夜夜操网爽| 飞空精品影院首页| 90打野战视频偷拍视频| 中文字幕色久视频| 午夜激情av网站| avwww免费| 国产成人精品久久久久久| 少妇人妻久久综合中文| www.熟女人妻精品国产| 国产一区二区 视频在线| 欧美精品av麻豆av| 国产亚洲欧美在线一区二区| 妹子高潮喷水视频| 少妇猛男粗大的猛烈进出视频| 99久久精品国产亚洲精品| 日韩人妻精品一区2区三区| 女人久久www免费人成看片| 考比视频在线观看| 久久久久国产一级毛片高清牌| 美女高潮到喷水免费观看| 日韩伦理黄色片| 91精品伊人久久大香线蕉| 三上悠亚av全集在线观看| 国产欧美亚洲国产| 少妇人妻 视频| 王馨瑶露胸无遮挡在线观看| 欧美在线黄色| 伊人亚洲综合成人网| 国产片内射在线| 亚洲三区欧美一区| 色94色欧美一区二区| 色婷婷av一区二区三区视频| 亚洲情色 制服丝袜| 丝袜美足系列| 欧美日韩国产mv在线观看视频| 2021少妇久久久久久久久久久| 女人爽到高潮嗷嗷叫在线视频| 无限看片的www在线观看| 日韩中文字幕欧美一区二区 | 成年动漫av网址| 五月开心婷婷网| 男女边摸边吃奶| 操美女的视频在线观看| 午夜免费鲁丝| 成年人午夜在线观看视频| 在线观看免费视频网站a站| 亚洲av欧美aⅴ国产| 久久久久精品国产欧美久久久 | 国产精品一二三区在线看| 久久久久精品人妻al黑| 少妇人妻久久综合中文| 亚洲一区中文字幕在线| 高清视频免费观看一区二区| 久久久精品国产亚洲av高清涩受| 99国产精品一区二区三区| 成年动漫av网址| 超色免费av| 亚洲 欧美一区二区三区| 韩国精品一区二区三区| 免费观看av网站的网址| 青春草亚洲视频在线观看| 亚洲av综合色区一区| 亚洲av日韩精品久久久久久密 | 晚上一个人看的免费电影| 亚洲av日韩精品久久久久久密 | 三上悠亚av全集在线观看| 人人妻人人澡人人爽人人夜夜| 18禁裸乳无遮挡动漫免费视频| 国产老妇伦熟女老妇高清| 精品人妻在线不人妻| 久久99精品国语久久久| 在线观看免费高清a一片| 久久久国产欧美日韩av| 色精品久久人妻99蜜桃| 国产99久久九九免费精品| 黑人巨大精品欧美一区二区蜜桃| 久久人妻熟女aⅴ| 国产精品 欧美亚洲| 在线观看www视频免费| 性高湖久久久久久久久免费观看| 亚洲国产欧美在线一区| 热99国产精品久久久久久7| 亚洲欧美一区二区三区国产| 国产亚洲av片在线观看秒播厂| 高清视频免费观看一区二区| 亚洲av日韩精品久久久久久密 | 久久久国产欧美日韩av| 巨乳人妻的诱惑在线观看| 国产在线免费精品| 老鸭窝网址在线观看| 中文字幕色久视频| 欧美日韩国产mv在线观看视频| 国产一级毛片在线| 成年动漫av网址| 51午夜福利影视在线观看| 色播在线永久视频| 水蜜桃什么品种好| 日本欧美视频一区| 国产高清不卡午夜福利| 视频区图区小说| 一区二区三区四区激情视频| 999精品在线视频| 国产主播在线观看一区二区 | 免费日韩欧美在线观看| 国产日韩欧美在线精品| 天堂中文最新版在线下载| 亚洲国产欧美在线一区| 97人妻天天添夜夜摸| 国产xxxxx性猛交| 美女大奶头黄色视频| 七月丁香在线播放| 大片免费播放器 马上看| 日韩制服丝袜自拍偷拍| 一区福利在线观看| 一级片免费观看大全| 色综合欧美亚洲国产小说| 免费日韩欧美在线观看| 精品国产一区二区三区四区第35| 电影成人av| 免费av中文字幕在线| 狂野欧美激情性bbbbbb| 日韩精品免费视频一区二区三区| 人成视频在线观看免费观看| 久久久国产一区二区| 成年人午夜在线观看视频| 少妇被粗大的猛进出69影院| 久久天躁狠狠躁夜夜2o2o | av欧美777| 一级片免费观看大全| 男女边吃奶边做爰视频| a级毛片黄视频| 欧美在线黄色| 纵有疾风起免费观看全集完整版| 欧美精品av麻豆av| 纯流量卡能插随身wifi吗| 叶爱在线成人免费视频播放| 别揉我奶头~嗯~啊~动态视频 | 免费在线观看视频国产中文字幕亚洲 | 一级毛片 在线播放| 亚洲欧洲精品一区二区精品久久久| 一二三四在线观看免费中文在| 久久国产精品男人的天堂亚洲| 你懂的网址亚洲精品在线观看| 欧美日韩亚洲国产一区二区在线观看 | www.精华液| 一级黄片播放器| 亚洲,欧美,日韩| 母亲3免费完整高清在线观看| 桃花免费在线播放| 制服人妻中文乱码| 五月天丁香电影| 在线观看免费视频网站a站| 男的添女的下面高潮视频| av网站在线播放免费| av国产久精品久网站免费入址| 999久久久国产精品视频| 在线天堂中文资源库| 亚洲美女黄色视频免费看| 成人18禁高潮啪啪吃奶动态图| 丰满少妇做爰视频| 亚洲熟女毛片儿| 在线观看www视频免费| 久久久国产欧美日韩av| 国产精品国产av在线观看| 日韩欧美一区视频在线观看| 人人妻人人爽人人添夜夜欢视频| 国产精品.久久久| 美女脱内裤让男人舔精品视频| 交换朋友夫妻互换小说| 丝袜人妻中文字幕| 国产极品粉嫩免费观看在线| 狂野欧美激情性xxxx| 啦啦啦视频在线资源免费观看| 午夜激情av网站| 亚洲专区中文字幕在线| 欧美av亚洲av综合av国产av| 亚洲第一av免费看| 捣出白浆h1v1| 满18在线观看网站| 欧美成狂野欧美在线观看| 欧美精品av麻豆av| 每晚都被弄得嗷嗷叫到高潮| av有码第一页| 欧美黄色淫秽网站| 又黄又粗又硬又大视频| 午夜福利一区二区在线看| 丝袜人妻中文字幕| 夫妻午夜视频| 国产片特级美女逼逼视频| av视频免费观看在线观看| 国产成人影院久久av| 多毛熟女@视频| 美国免费a级毛片| 精品一品国产午夜福利视频| 久久99一区二区三区| 夫妻午夜视频| 国产亚洲av高清不卡| 国产av一区二区精品久久| 色精品久久人妻99蜜桃| 婷婷丁香在线五月| 久久国产精品影院| 亚洲成av片中文字幕在线观看| 后天国语完整版免费观看| 少妇猛男粗大的猛烈进出视频| 男女午夜视频在线观看| 男女之事视频高清在线观看 | 制服人妻中文乱码| 亚洲欧美激情在线| 熟女av电影| bbb黄色大片| av电影中文网址| 久久久国产欧美日韩av| www.av在线官网国产| 欧美亚洲 丝袜 人妻 在线| 免费久久久久久久精品成人欧美视频| 国产精品一国产av| 99久久综合免费| 国产亚洲精品第一综合不卡| 国产伦人伦偷精品视频| 国产男人的电影天堂91| 水蜜桃什么品种好| 国产欧美日韩一区二区三区在线| 免费在线观看影片大全网站 | 成人免费观看视频高清| 婷婷色综合大香蕉| 啦啦啦中文免费视频观看日本| 亚洲精品国产区一区二| 国产在线视频一区二区| 黄色片一级片一级黄色片| 99九九在线精品视频| 亚洲国产毛片av蜜桃av| 日韩一本色道免费dvd| 日本av手机在线免费观看| 成人国产一区最新在线观看 | 久久久久久免费高清国产稀缺| 久久精品国产亚洲av高清一级| 亚洲中文日韩欧美视频| 一二三四社区在线视频社区8| 欧美另类一区| 美女午夜性视频免费| 国产成人av教育| 啦啦啦啦在线视频资源| 久久久亚洲精品成人影院| 婷婷色综合www| 亚洲,欧美,日韩| 国产成人一区二区三区免费视频网站 | 欧美精品av麻豆av| 欧美国产精品va在线观看不卡| 两个人免费观看高清视频| 电影成人av| 亚洲情色 制服丝袜| 国产无遮挡羞羞视频在线观看| 国产欧美亚洲国产| 久久久久久亚洲精品国产蜜桃av| 国产精品久久久久久精品电影小说| 18禁国产床啪视频网站| 女警被强在线播放| www日本在线高清视频| 午夜福利一区二区在线看| 国产精品成人在线| 91精品国产国语对白视频| 中文字幕制服av| 国产av精品麻豆| 精品欧美一区二区三区在线| 精品少妇一区二区三区视频日本电影| 老汉色av国产亚洲站长工具| 最新在线观看一区二区三区 | 考比视频在线观看| 久久久久久亚洲精品国产蜜桃av| 丁香六月天网| 中文字幕色久视频| 精品国产一区二区三区四区第35| 熟女少妇亚洲综合色aaa.| 久久国产精品男人的天堂亚洲| 亚洲精品乱久久久久久| 啦啦啦啦在线视频资源| 欧美日韩综合久久久久久| 亚洲国产欧美在线一区| 999精品在线视频| 国产精品.久久久| 99热网站在线观看| 久久国产精品影院| 国产男女超爽视频在线观看| 国产精品 欧美亚洲| 中文字幕亚洲精品专区| 国产成人精品无人区| 黄色a级毛片大全视频| 国产不卡av网站在线观看| 夫妻午夜视频| 宅男免费午夜| 午夜免费鲁丝| 五月开心婷婷网| 久久 成人 亚洲| av有码第一页| 一级毛片我不卡| 大香蕉久久网| www.熟女人妻精品国产| 久久久久久久国产电影| a级毛片在线看网站| 精品久久久精品久久久| h视频一区二区三区| 国产成人av教育| 曰老女人黄片| 日本欧美视频一区| 男人操女人黄网站| 亚洲欧美清纯卡通| 久久久欧美国产精品| 性少妇av在线| 五月天丁香电影| 国产伦理片在线播放av一区| 可以免费在线观看a视频的电影网站| 国产一级毛片在线| 纵有疾风起免费观看全集完整版| 日日摸夜夜添夜夜爱| 国产精品久久久人人做人人爽| 免费不卡黄色视频| 欧美 日韩 精品 国产| 日本午夜av视频| 丝袜在线中文字幕| 国产成人一区二区三区免费视频网站 | 看免费av毛片| 免费黄频网站在线观看国产| 又大又爽又粗| 丁香六月欧美| 精品亚洲乱码少妇综合久久| 1024视频免费在线观看| 一区二区三区乱码不卡18| 国产午夜精品一二区理论片| 精品一区二区三区四区五区乱码 | 欧美激情 高清一区二区三区| 少妇人妻久久综合中文| tube8黄色片| 午夜激情久久久久久久| 午夜福利一区二区在线看| 国产人伦9x9x在线观看| 一二三四社区在线视频社区8| 色视频在线一区二区三区| 亚洲男人天堂网一区| 久久久久久久久免费视频了| 精品人妻熟女毛片av久久网站| 一级毛片女人18水好多 | 在现免费观看毛片| 久久久久久久久久久久大奶| 在线观看www视频免费| 日本色播在线视频| 久久精品国产a三级三级三级| 日韩制服骚丝袜av| 亚洲欧美色中文字幕在线| 熟女少妇亚洲综合色aaa.| av视频免费观看在线观看| 亚洲精品国产一区二区精华液| 国产精品国产av在线观看| 成人18禁高潮啪啪吃奶动态图| 亚洲久久久国产精品| 丁香六月欧美| 一级毛片黄色毛片免费观看视频| 女性被躁到高潮视频| 母亲3免费完整高清在线观看| 一级黄片播放器| 国产一区二区三区av在线| 晚上一个人看的免费电影| 精品一区二区三区四区五区乱码 | 国产欧美日韩综合在线一区二区| av线在线观看网站| 精品久久蜜臀av无| 久久久欧美国产精品| 人人妻人人添人人爽欧美一区卜| www.999成人在线观看| 亚洲av成人不卡在线观看播放网 | 中文字幕另类日韩欧美亚洲嫩草| 日日夜夜操网爽| 青春草视频在线免费观看| 国产麻豆69| 亚洲精品第二区| 午夜福利,免费看| 国产亚洲欧美精品永久| 亚洲av综合色区一区| 麻豆av在线久日| 最近手机中文字幕大全| 美女高潮到喷水免费观看| 国产片内射在线| 男人添女人高潮全过程视频| 日本色播在线视频| 999精品在线视频| 成年美女黄网站色视频大全免费| 啦啦啦中文免费视频观看日本| 久久久欧美国产精品| 啦啦啦在线观看免费高清www| 成人国产一区最新在线观看 | 日本av手机在线免费观看| 欧美黄色片欧美黄色片| 欧美中文综合在线视频| 波多野结衣av一区二区av| 欧美日韩一级在线毛片| 国产视频一区二区在线看| 男女边摸边吃奶| 国产精品久久久久久精品电影小说| 精品国产一区二区三区久久久樱花| 一级毛片女人18水好多 | 黄色a级毛片大全视频| 亚洲视频免费观看视频| 中文精品一卡2卡3卡4更新| 午夜免费成人在线视频| 日本色播在线视频| 亚洲欧美激情在线| 免费女性裸体啪啪无遮挡网站| netflix在线观看网站| 少妇被粗大的猛进出69影院| 欧美黄色淫秽网站| 三上悠亚av全集在线观看| 91国产中文字幕| 亚洲午夜精品一区,二区,三区| 最近中文字幕2019免费版| 真人做人爱边吃奶动态| 国产成人精品无人区| 亚洲精品在线美女| 一区二区av电影网| 精品视频人人做人人爽| 人人妻人人添人人爽欧美一区卜| 精品国产乱码久久久久久男人| 亚洲欧美中文字幕日韩二区| 日本av免费视频播放| 国产日韩欧美亚洲二区| 男女高潮啪啪啪动态图| 国产免费现黄频在线看| 精品福利观看| 别揉我奶头~嗯~啊~动态视频 | 精品免费久久久久久久清纯 | 国产成人一区二区三区免费视频网站 | 欧美日本中文国产一区发布| 在线观看免费高清a一片| 免费观看av网站的网址| 精品国产超薄肉色丝袜足j| 日本wwww免费看| 男女无遮挡免费网站观看| 黄片播放在线免费| 你懂的网址亚洲精品在线观看| 亚洲欧美精品综合一区二区三区| 国产黄色免费在线视频| 午夜免费成人在线视频| 精品一区在线观看国产| 国产成人精品在线电影| 一二三四在线观看免费中文在| 99热国产这里只有精品6| 久久国产精品男人的天堂亚洲| 国产精品一区二区免费欧美 | 一本—道久久a久久精品蜜桃钙片| 精品人妻在线不人妻| 欧美大码av| 黄片小视频在线播放| av一本久久久久| 亚洲成人国产一区在线观看 | 国产又色又爽无遮挡免| 十分钟在线观看高清视频www| 国产精品一二三区在线看| 亚洲精品自拍成人| 亚洲成人手机| av欧美777| 国产欧美日韩综合在线一区二区| 91字幕亚洲| 日本一区二区免费在线视频| 国产成人欧美| 只有这里有精品99| 亚洲成人免费电影在线观看 | 一区二区三区乱码不卡18| 国产精品av久久久久免费| 精品高清国产在线一区| 看十八女毛片水多多多| 高清不卡的av网站| 久久精品人人爽人人爽视色| 人人澡人人妻人| 国产欧美日韩精品亚洲av| 91精品伊人久久大香线蕉| 久久中文字幕一级| 超碰成人久久| 交换朋友夫妻互换小说| 每晚都被弄得嗷嗷叫到高潮| 少妇的丰满在线观看| 欧美人与善性xxx| 2021少妇久久久久久久久久久| 欧美日韩视频精品一区| 精品亚洲成国产av| 亚洲国产中文字幕在线视频| 午夜福利免费观看在线| 一级黄色大片毛片| 国产97色在线日韩免费| 亚洲成av片中文字幕在线观看| av国产久精品久网站免费入址| 这个男人来自地球电影免费观看| 午夜免费成人在线视频| 久久久久久久久免费视频了| 日本a在线网址| 午夜视频精品福利| 一边亲一边摸免费视频| 成年人免费黄色播放视频| 亚洲精品日本国产第一区| 日韩伦理黄色片| 另类亚洲欧美激情| 一本久久精品| 如日韩欧美国产精品一区二区三区| 国产亚洲av片在线观看秒播厂| 色视频在线一区二区三区| 欧美在线一区亚洲| 国产深夜福利视频在线观看| 久久午夜综合久久蜜桃| 久久人妻熟女aⅴ| 中文字幕亚洲精品专区| av一本久久久久| 久久中文字幕一级| 免费在线观看影片大全网站 | 欧美+亚洲+日韩+国产| svipshipincom国产片| 精品久久久久久久毛片微露脸 | 亚洲欧洲日产国产| 国产不卡av网站在线观看| 中文字幕av电影在线播放| 天天添夜夜摸| 色婷婷久久久亚洲欧美| 亚洲精品日韩在线中文字幕| 久久久久久免费高清国产稀缺| 视频区图区小说| 天天躁狠狠躁夜夜躁狠狠躁| 亚洲精品国产一区二区精华液| 国产91精品成人一区二区三区 | 男女边摸边吃奶| 日韩一区二区三区影片| 日韩中文字幕视频在线看片| 看免费成人av毛片| 亚洲一区中文字幕在线| bbb黄色大片| 又大又黄又爽视频免费| 午夜免费观看性视频| 一级毛片我不卡| 别揉我奶头~嗯~啊~动态视频 | 欧美日韩成人在线一区二区| 国产日韩欧美在线精品| 91字幕亚洲| 一级毛片电影观看| 少妇裸体淫交视频免费看高清 |