• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A collision recovery algorithm using optimal Q parameter based on BIBD in RFID①

    2016-12-22 05:45:27CuiYinghua崔英花
    High Technology Letters 2016年4期

    Cui Yinghua (崔英花)

    (School of Information and Communication Engineering, Beijing Information Science and Technology University, Beijing 100101, P.R.China)

    ?

    A collision recovery algorithm using optimal Q parameter based on BIBD in RFID①

    Cui Yinghua (崔英花)②

    (School of Information and Communication Engineering, Beijing Information Science and Technology University, Beijing 100101, P.R.China)

    In this work, an optimal Q algorithm based on a collision recovery scheme is presented. Tags use BIBD-(16,4,1) codes instead of RN16s. Therefore, readers can make a valid recognition even in collision slots. A way of getting the optimal slot-count parameter is studied and an optimal Q algorithm is proposed. The theoretical and simulation results show that the proposed algorithm can improve reading efficiency by 100% more than the conventional Q algorithm. Moreover, the proposed scheme changes little to the existing standard. Thus, it is easy to implement and compatible with ISO 18000-6C.

    radio frequency identification (RFID), anti-collision, collision recovery, balanced incomplete block design (BIBD), Q algorithm

    0 Introduction

    RFID (radio frequency identification) is an automatic identification system which includes readers and tags. Due to tags battery presence or absence, RFID technology can be divided into: passive, battery assisted passive and active RFID technology[1].

    In passive RFID, a reader communicates and powers tags using radio frequency (RF) waves transmitted by a reader antenna. Passive tags are able to harvest energy from the RF waves to power its circuitry, and respond back to the reader by smart reflection of the same RF waves. The carrier frequencies of the signals received by the reader are equal, as they originate from a single source, namely the transmitter of the reader. As the same oscillator is also available at the receiver, a down conversion without any frequency offset is readily possible. However the EPC standard[2]permits a large deviation of up to ±22% from that nominal frequency. Therefore synchronization in RFID readers is still an important task. In general, synchronization mechanisms are distinguished into maximum likelihood timing recovery[3]and minimum mean square error methods[4]. The first class estimates the timing instant by maximizing the likelihood function, while the latter estimates the timing instant by minimizing the mean square error.

    In RFID applications, the reader reads tags’ information within the effective range and the tags will respond the request according to a predefined protocol. If several tags respond simultaneously, the reader will detect collision and no tag will be recognized. To solve this problem, many anti-collision protocols have been designed. However, most of them are based on collision avoidance theory and have low system efficiency, usually less than 36.8%[5].

    Many researchers have investigated slots with colliding tag signals. Khasgiwale, et al.[6]estimated the number of tags involved in collision by the collision information on the physical layer. Kumar, et al.[7]proposed to use an interference cancellation scheme to separate the combined signals. Angerer, et al.[8]showed an RFID system which can be recovered from collision when two tags collide on a physical layer with a single antenna receiver. Kotevic, et al.[9]followed the work of Angerer and used more receiving antennas in the reader.

    Apart from the researches mentioned above, recently some researchers have studied on using BIBD (balanced incomplete block design) code in the RFID system. BIBD code is denoted by BIBD-(b,v,r,k,λ) and can be simply expressed as BIBD-(v,k,λ). Mathematically[10], it can be proved that the object set is unique for BIBD-(v,k,1) when no more than k blocks in a set. According to this theory, it can be concluded that BIBD- (b,v,r,k,1) can support b symbols, and identify up to k symbols at one transmission. For example, BIBD-(16,4,1), which is also denoted as, BIBD-(20,16,5,4,1) supporting up to 20 symbols, which are column vectors of the incident matrix. It can be recognized whenever not more than 4 symbols collide.

    In Ref.[11], Seol, et al. designed the symbols by using BIBD-(7, 3, 1) codes in the process of RFID tags identification and proposed a Multi-State Query Tree Protocol. The scheme does not require re-transmission when no more than 3 symbols collide, which will not only reduce the cost of power consumption, but also improve the system identification efficiency. In Ref.[12], Zhang, et al. advanced a novel and fast anti-collision algorithm based on the regressive-style RFID of BIBD-(4, 2, 1). The algorithm makes good use of the advantages of BIBD code, and can also significantly reduce the query time. However, these schemes use BIBD code to construct the EPC code, which decreases total number of supporting users, and are constrained to application-specific scenarios.

    In this study, an optimal Q parameter algorithm based on BIBD is proposed. This algorithm uses BIBD code to construct tag’s respond serials RN16 (16-bit random number) instead of tags’ EPC codes. The reader therefore can recover the RN16s from the colliding signals even in low SNR environment, and acknowledge one of the collision tags, thus increase the system efficiency greatly.

    The rest of this paper is organized as follows: Section 1 describes the RFID anti-collision scheme based on BIBD, analyzes its performance and studies how to get the optimum slot-count Q parameter. Section 2 proposes the collision recovery algorithm using optimal Q parameter selection. A performance analysis of the proposed scheme is provided in Section 3. The last section concludes the work.

    1 The optimal Q vlaue for the BIBD scheme

    The ISO 18000-6C specification proposes a frame slotted ALOHA based on anti-collision protocol, named Q-algorithm[13]. It has three basic commands: Query, QueryRep and QueryAdjust. After the reader sends a Query to initiate an inventory round, it then issues one or more QueryAdjust or QueryRep commands in this inventory round depending on whether the Q value needs to be changed. In response, tags that have nonzero slot numbers should decrease their count values and backscatter RN16 when their counter values reach zero. This process continues iteratively until all the tags have been recognized.

    In this section, a modified Q algorithm based on BIBD is presented which is compatible with ISO 18000-6C. In the scheme, tags use BIBD-(16,4,1) instead of RN16, and backscatter BIBD symbols to reader, who can recover the RN16s from the colliding signals, and make a valid recognition in collision slots.

    First, the system efficiency should be analyzed, and then how to choose the optimal Q parameter should be studied. Suppose there are totally n tags to be identified and the total slot number is N, the probability that k tags exist in one slot (k-occupation slot) follows a binomial distribution[14]:

    (1)

    So the expectation of k-occupation slot number is

    Ek=N×Pk

    (2)

    the system efficiency is defined by

    (3)

    Usually, the efficient reading slot refers to a successful tag transmission when exactly one tag transmits in a slot. The expectation of Eff can be calculated as

    (4)

    BIBD-(16,4,1) has 20 symbols with 16-bit in length, and identifies up to 4 symbols at one transmission. By using it instead of RN16, the reader can extract an individual BIBD code from the tags involved in a collision and make a valid acknowledgement. Accordingly, the expectation of the system efficiency can be denoted by

    (5)

    Letf=N/n, for different tag numbers, the optimal values of f and the maximal efficiency are obtained as shown in Fig.1 and Fig.2.

    Furthermore, for n and N→∞, Eq.(5) can be reformulated to

    (6)

    Fig.1 The optimal values of f for different tag numbers

    Fig.2 The maximal values of Eff for different tag numbers

    The maximal system efficiency can be reached with

    (7)

    It is a non-linear equation in one variable, and a simple bisection search or Newton’s methods are used to solve it, and the result is foptimal≈0.452. Therefore, the max system efficiency can be obtained as

    Effmax=Eff|f=0.452=0.817

    (8)

    The Q algorithm uses Q as the slot count parameter and sets the frame size as 2Q, where Q is in the range of [0, 15]. From the figure of function Eff(f), the maximal efficiency can be obtained at the point of nearby 0.452. It is easy to prove that the function is monotonic in the range of f<0.452 or f>0.452. Hence, the optimal Q value can be reached at

    (9)

    Here, integer T satisfies 2T-1<0.452n<2T.

    2 The collision recovery algorithm with optimal Q value selection based on BIBD

    Conventional readers only read data in singleton slots, while the proposed BIBD method is able to identify them in collision slots. So the original Q selection algorithm is not suitable here, and needs some modifications.

    It is known that the exact number of tags in the field allows an optimal choice of Q. When collisions occur, the number of tags involved in the slot can be determined. Combining the number of tags detected in afore rounds will give an accurate estimate of the number of tags participating in the identification process. This can be used to set a near optimal Q value for the next round. The details of the optimal identification process are described as follows:

    (1) Reader selects an initial tag number, let it be N=2Q, then sends Query command with a slot-count parameter Q to the tags. Tags will pick a random value in the range of [0, 2Q-1] and load this value into slot counter. Tags that pick zero will transit to the reply state, choose one of BIBD-(16,4,1) symbols randomly to make an 16-bit signal instead of RN16 and reply immediately, other tags will transit to the arbitrate state and await a QueryRep command.

    (2) If the reader detects no more than 4 tags’ reply, it shall choose one and sends an acknowledgment command to the tag. The identified tag then processes the received ACK and reports its ECP back to the reader.

    (3) If the reader detects idle or more than 4 RN16s, no tag will be acknowledged.

    (4) For each slot, the reader determines the number of reply tags. If there are more than four tags, the reader can’t determine the exact tag number in the slot. It then estimates the number with an approximation by 5. For example, the estimate for i-th slot is given by

    (10)

    Suppose current slot is the l-th slot, reader can estimate the total tag population by

    (11)

    Then, suppose 2T-1

    (12)

    To make the estimate more accurate, such calculation is made only when l≥3.

    (5) If Qoptequals to the current Q value, the reader uses QueryRep command to notify the tags to decrement their slot counters by 1, else reader estimates the remaining tags:

    Rl=Estl-Il

    (13)

    here Ilis the recognized tag number during this identification round. then it is used to estimate the new Q value:

    (14)

    The reader then adjusts the Q value with QueryAdjust command.

    (6) The above process may iterate many times, until all the tags have been recognized.

    In contrast to the conventional Q algorithm, the proposed scheme uses BIBD-based 16-bit signals instead of RN16, and employs an optimal Q selection algorithm. The scheme estimates the tag population during recognition process, and adjusts the Q parameter more efficiently. For each collision slot, only one tag is preferred to acknowledge, though acknowledge all the collided tags within one slot can increase the system efficiency greatly. While it will introduce more change to the conventional Q scheme which is not desirable. It is clear that the scheme is compatible with ISO 18000-6C and easy to implement.

    3 Simulation results

    The performance of the proposed method for collision recovery is verified through MATLAB simulations. In this section, a simulation model based on the algorithms described in section 2 is established and it is compared with the conventional Q parameter algorithm and the modified Q algorithm mentioned in Ref.[15], which is one of the previous work based on BIBD without optimal Q parameter selection. The simulation is repeated 100 times for each number of tags from 100 to 1000, and the initial value of Q is set to 4. Actually, the tag number beforehand is unknown and the frame size N is a power of 2 and parameter Q can only be adjusted gradually, so the actual system efficiency should be a little lower than the theoretical maximum.

    The result of this experiment is depicted in Fig.3. It shows that the optimal Q value scheme is far more effective than the conventional one. For other improved Aloha-based schemes, such as EDFSA[16]and TSA[17], the proposed scheme also behaves much better than them, as their average efficiencies did not exceed 38%. Moreover, the optimal scheme is also better than the modified Q algorithm. The two Q algorithms both choose 4 as the initial value of Q; the modified Q algorithm employs a slightly changed Q selection algorithm while the optimal scheme uses an optimal Q parameter selection, which proves that the optimal slot-count parameter choosing method contributes to the identification efficiency greatly. It is interesting to notice that the figure of the proposed scheme is like a wave, the crests are reached at about 64, 256, 512, … which are the points the estimation is the most accurate.

    Fig.3 Comparison of the efficiency of different algorithms

    It also should be emphasized that the proposed scheme only makes minor changes to the original Q algorithm. One is using BIBD-(16,4,1) block instead of RN16 for tags, which is the main idea of the proposed scheme to enable readers to decode RN16s from collision signals and make a valid acknowledge within a collided slot. The other is the optimal slot-count select algorithm. Qestis updated after every reading slot, and the Q value is adjusted dynamically when necessary. Therefore, the scheme is compatible with ISO 18000-6C and easy to implement. The theoretical and simulation results show that the scheme has greatly improved system efficiency.

    4 Conclusion

    In this work a collision recovery algorithm using optimal Q parameter based on BIBD is proposed. Using BIBD-(16,4,1) code instead of RN16 for tags’ backscatter, it enables readers to make a valid acknowledge from collision slots with no more than 4 tags. As a result, the system efficiency can be improved greatly. Moreover, the optimum slot-count parameter selection is studied and an optimal Q algorithm is designed which can adjust the slot-count parameter more efficiently. Simulation indicates that the scheme has good

    performance. Compared with the standard Q algorithm in Gen2, a performance gain of about 100% can be achieved.

    [ 1] Dobkin D M. The RF in RFID. Burlington: Elsevier, 2008

    [ 2] EPCGloabl. EPC Radio-Frequency Identity ProtocolsClass-1 Generation-s UHF RFID, Oct., 2008

    [ 3] Kobayashi H. Simultaneous adaptive estimation and decision algorithm for carriesr modulated adata transmission systems. IEEE Transcations on Communication Technology, 1997, 19(3):268-280

    [ 4] Barry J R, Lee E A, Messerschmitt D G. Digital Communication. 3rd Edition, Springer, 2004

    [ 5] Finkenzeller K. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. 2nd Edition. John Wiley & Sons Ltd, 2003

    [ 6] Khasgiwale R S, Adyanthaya R U, Engels D W. Extracting information from tag collisions. In: Proceedings of the IEEE International Conference on RFID, Orlando, USA, 2009. 131-138

    [ 7] Kumar R, La Porta T F. Interference cancellation-based RFID Tags Identification. In: Proceedings of the 14th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, Miami, USA, 2011. 111-118

    [ 8] Angerer C, Langwieser R, Rupp M. RFID reader receivers for physical layer collision recovery. IEEE Transactions on Communications, 2010, 58(12): 3526-3537

    [ 9] Kaitovic J, Langwieser R, Rupp M. RFID reader with multi antenna physical layer collision recovery receivers. In: Proceedings of the IEEE International Conference On RFID-Technologies and Applications (RFID-TA), Sitges, Spain, 2011. 286-291

    [10] Colbourn C J, Dinitz J H. The CRC Handbook of Combinatorial Design. Boca Raton: CRC Press, 1996

    [11] Seol J M, Kim S W. Collision-resilient multi-state query tree protocol for fast RFID tag identification. In: Proceedings of the International Conference on Computational Intelligence and Security, Guizhou, China, 2006. 1159-1162

    [12] Li Z, Zhang X, Lei Z. Anti-collision algorithm based on the regressive-style RFID of BIBD (4,2,1). In: Proceedings of the International Conference on Advanced Computer Theory and Engineering (ICACTE), Chengdu, China, 2010. 352-355

    [13] International Organization for Standardization/International Electrotechnical Commission. ISO/IEC 18000-6 information technology automatic identification and data capture techniques—radio frequency identification for item management air interface—Part 6: parameters for air interface communications at 860-960MHz. International Organization for Standardization, 2007

    [14] Vogt H. Efficient object identification with passive RFID tags. In: Proceedings of the 1st International Conference on Pervasive Computing,Zürich, Switzerland, 2002. 98-113

    [15] Cui Y H, Yang S G. A modified Q parameter scheme based on BIBD in RFID. Advanced Materials Research, 2013, 765: 2041-2045

    [16] Lee S R, Joo S D, Lee C W. An enhanced dynamic framed slotted aloha algorithm for RFID tag identification. In: Proceedings of the 2nd Annual International Conference for Mobile Ubiquitous Systems: Networking and Services, Boston, USA, 2005. 162-172

    [17] Bonuccelli F L M A, Martelli F. Tree slotted aloha: a new protocol for tag identification in RFID networks. In: Proceedings of the International Symposium on World of Wireless, Mobile and Multimedia Networks, New York, USA, 2006. 603-608

    Cui Yinghua, born in 1973. She received her Ph.D degree and Master degree from Peking University in 2009 and 2003. Her research interests include anti-collision algorithm in RFID, wireless communication, and wireless sensor network.

    10.3772/j.issn.1006-6748.2016.04.002

    ① Supported by the National Natural Science Foundation of China (No. 61340005), Beijing Natural Science Foundation (No. 4132012), Beijing Education Committee Science and Technology Development Plan (No. KM201411232011), Beijing Outstanding Personnel Training Project (No. 2013D005007000006), Scientific Research Improving Project-Intelligent Sense and Information Processing (No. 5211524100).

    ② To whom correspondence should be addressed. E-mail: cui_ying_hua@sina.com Received on Sep. 15, 2015

    国产亚洲精品第一综合不卡| 美女大奶头黄色视频| 午夜福利免费观看在线| 精品人妻一区二区三区麻豆| 狂野欧美激情性bbbbbb| 一边摸一边抽搐一进一出视频| 国产免费视频播放在线视频| 久久久久精品国产欧美久久久 | 丝袜在线中文字幕| 久热爱精品视频在线9| 老司机亚洲免费影院| 午夜福利影视在线免费观看| 成年人午夜在线观看视频| 日韩 亚洲 欧美在线| 啦啦啦啦在线视频资源| 欧美日韩亚洲高清精品| av在线老鸭窝| 国产探花极品一区二区| 国产高清不卡午夜福利| 亚洲一码二码三码区别大吗| 亚洲天堂av无毛| 精品国产露脸久久av麻豆| 狠狠精品人妻久久久久久综合| 精品午夜福利在线看| 午夜老司机福利片| 九草在线视频观看| 亚洲第一区二区三区不卡| 超色免费av| 黄片无遮挡物在线观看| 日韩一卡2卡3卡4卡2021年| 日韩大片免费观看网站| 精品一区二区三区四区五区乱码 | 成人亚洲欧美一区二区av| 国产成人精品福利久久| 精品人妻熟女毛片av久久网站| 男女床上黄色一级片免费看| 久久久久久久久久久免费av| 国产探花极品一区二区| 亚洲人成77777在线视频| 国产精品一区二区在线观看99| 国产成人精品久久二区二区91 | 亚洲精品乱久久久久久| 国产麻豆69| 成人国产麻豆网| 久久精品久久久久久噜噜老黄| 91国产中文字幕| 亚洲一区二区三区欧美精品| 日韩av在线免费看完整版不卡| 亚洲精品日韩在线中文字幕| 亚洲av国产av综合av卡| 男的添女的下面高潮视频| 午夜福利网站1000一区二区三区| 中文字幕人妻丝袜制服| 国产伦人伦偷精品视频| 亚洲激情五月婷婷啪啪| 一级,二级,三级黄色视频| 777米奇影视久久| 欧美 亚洲 国产 日韩一| 国产亚洲av片在线观看秒播厂| 欧美日韩亚洲综合一区二区三区_| 看非洲黑人一级黄片| 欧美日韩视频高清一区二区三区二| 国产亚洲av高清不卡| kizo精华| 人人妻人人澡人人看| 啦啦啦视频在线资源免费观看| 精品少妇一区二区三区视频日本电影 | 下体分泌物呈黄色| 久久亚洲国产成人精品v| 超色免费av| 在线观看国产h片| 亚洲五月色婷婷综合| 色播在线永久视频| 国产精品麻豆人妻色哟哟久久| 美女脱内裤让男人舔精品视频| 最新在线观看一区二区三区 | 亚洲欧美中文字幕日韩二区| 亚洲第一青青草原| 国产欧美日韩综合在线一区二区| 亚洲成人手机| 天天影视国产精品| 久久精品亚洲av国产电影网| 国产成人免费无遮挡视频| 久久人人爽人人片av| 亚洲第一青青草原| 色婷婷av一区二区三区视频| 老司机影院成人| 在线观看免费视频网站a站| 亚洲精品自拍成人| 9色porny在线观看| 十八禁高潮呻吟视频| 免费女性裸体啪啪无遮挡网站| 菩萨蛮人人尽说江南好唐韦庄| 好男人视频免费观看在线| av线在线观看网站| 午夜福利在线免费观看网站| 国产男人的电影天堂91| 天堂俺去俺来也www色官网| 国产成人一区二区在线| 亚洲国产av新网站| 在现免费观看毛片| 国产xxxxx性猛交| 国产成人精品久久二区二区91 | 涩涩av久久男人的天堂| 欧美精品一区二区大全| 亚洲国产精品一区三区| 热re99久久精品国产66热6| 欧美黄色片欧美黄色片| 又大又黄又爽视频免费| 女人爽到高潮嗷嗷叫在线视频| videos熟女内射| 男女之事视频高清在线观看 | 我的亚洲天堂| 人人妻,人人澡人人爽秒播 | 最黄视频免费看| 亚洲精品久久午夜乱码| 熟妇人妻不卡中文字幕| 国产熟女欧美一区二区| 亚洲国产欧美在线一区| 黄色视频在线播放观看不卡| 欧美变态另类bdsm刘玥| 久久性视频一级片| 午夜日韩欧美国产| 成人午夜精彩视频在线观看| 欧美日韩福利视频一区二区| 热99国产精品久久久久久7| 久久精品熟女亚洲av麻豆精品| 日韩一本色道免费dvd| 在线观看国产h片| 亚洲国产成人一精品久久久| 午夜福利网站1000一区二区三区| 日本av手机在线免费观看| 熟妇人妻不卡中文字幕| 男女免费视频国产| 欧美少妇被猛烈插入视频| 夜夜骑夜夜射夜夜干| 日本欧美视频一区| 日韩大码丰满熟妇| 91精品国产国语对白视频| 男女午夜视频在线观看| 亚洲国产欧美一区二区综合| 啦啦啦在线免费观看视频4| 涩涩av久久男人的天堂| 汤姆久久久久久久影院中文字幕| 校园人妻丝袜中文字幕| 国产日韩欧美在线精品| 大香蕉久久成人网| 亚洲欧美一区二区三区久久| 1024香蕉在线观看| 国产精品无大码| 国精品久久久久久国模美| 国产深夜福利视频在线观看| 国产精品 国内视频| 久久久久久久精品精品| 极品少妇高潮喷水抽搐| 十八禁人妻一区二区| 一区二区三区四区激情视频| 精品一品国产午夜福利视频| 国产熟女午夜一区二区三区| www日本在线高清视频| 一区二区日韩欧美中文字幕| 久久精品久久久久久噜噜老黄| 午夜福利影视在线免费观看| 80岁老熟妇乱子伦牲交| 人人妻人人澡人人看| 无限看片的www在线观看| 男人添女人高潮全过程视频| 亚洲一卡2卡3卡4卡5卡精品中文| 亚洲一区中文字幕在线| 捣出白浆h1v1| 欧美中文综合在线视频| 精品亚洲乱码少妇综合久久| 最新的欧美精品一区二区| av国产精品久久久久影院| 国产在线一区二区三区精| 黄频高清免费视频| 一区二区三区四区激情视频| 久久久精品免费免费高清| 99香蕉大伊视频| 一本久久精品| 18禁国产床啪视频网站| 桃花免费在线播放| 亚洲精品国产区一区二| 国产男女超爽视频在线观看| 中国国产av一级| 日日啪夜夜爽| 波多野结衣一区麻豆| 咕卡用的链子| 国产精品二区激情视频| 啦啦啦在线观看免费高清www| 韩国高清视频一区二区三区| 色网站视频免费| www.熟女人妻精品国产| 涩涩av久久男人的天堂| 免费高清在线观看视频在线观看| 不卡av一区二区三区| 亚洲精品一二三| 亚洲伊人久久精品综合| 激情视频va一区二区三区| 色网站视频免费| 久久午夜综合久久蜜桃| 青春草视频在线免费观看| 成人手机av| 我要看黄色一级片免费的| 热99久久久久精品小说推荐| 操美女的视频在线观看| 久久久久久久大尺度免费视频| 大话2 男鬼变身卡| 亚洲国产欧美网| 欧美黑人精品巨大| 日日撸夜夜添| 美女视频免费永久观看网站| 一级片免费观看大全| 日日摸夜夜添夜夜爱| 日韩视频在线欧美| 一级毛片 在线播放| 亚洲熟女毛片儿| 女人久久www免费人成看片| 18禁动态无遮挡网站| 精品国产一区二区三区四区第35| 日韩,欧美,国产一区二区三区| 日韩av在线免费看完整版不卡| 国产男人的电影天堂91| 老司机在亚洲福利影院| 久久久精品免费免费高清| 天天操日日干夜夜撸| 人人妻人人澡人人看| 久久久久久久精品精品| 亚洲欧美激情在线| 一区福利在线观看| 制服丝袜香蕉在线| 国产麻豆69| 久久国产亚洲av麻豆专区| 免费看av在线观看网站| 国产精品二区激情视频| 国产成人精品无人区| 婷婷色麻豆天堂久久| 少妇人妻 视频| 一边亲一边摸免费视频| 日韩 亚洲 欧美在线| 国产成人一区二区在线| 国产极品天堂在线| 男人爽女人下面视频在线观看| 女人久久www免费人成看片| √禁漫天堂资源中文www| 狠狠精品人妻久久久久久综合| 久久久久久久久久久久大奶| 亚洲精品国产av成人精品| 国产精品久久久人人做人人爽| 一区二区av电影网| 黄色 视频免费看| 国产福利在线免费观看视频| 咕卡用的链子| 捣出白浆h1v1| 亚洲国产精品一区三区| 精品一品国产午夜福利视频| av又黄又爽大尺度在线免费看| 久久久久久久国产电影| 成人手机av| 老司机亚洲免费影院| videosex国产| 黑人欧美特级aaaaaa片| 精品人妻在线不人妻| 极品人妻少妇av视频| 99热全是精品| 亚洲精品视频女| 亚洲欧美清纯卡通| 大陆偷拍与自拍| 最近中文字幕高清免费大全6| 一区二区日韩欧美中文字幕| 又粗又硬又长又爽又黄的视频| 老熟女久久久| bbb黄色大片| 丰满饥渴人妻一区二区三| 国产成人精品久久久久久| 亚洲,一卡二卡三卡| 1024香蕉在线观看| 久久久久精品国产欧美久久久 | av电影中文网址| 欧美激情极品国产一区二区三区| 亚洲国产精品一区三区| 蜜桃在线观看..| 大码成人一级视频| 国产野战对白在线观看| 又大又黄又爽视频免费| 悠悠久久av| 这个男人来自地球电影免费观看 | av在线观看视频网站免费| 国产精品熟女久久久久浪| 久久久国产精品麻豆| 久久影院123| 精品国产一区二区三区四区第35| 精品午夜福利在线看| 日日啪夜夜爽| 亚洲伊人久久精品综合| 乱人伦中国视频| 香蕉国产在线看| 一二三四在线观看免费中文在| 精品国产露脸久久av麻豆| 国产成人免费无遮挡视频| 男女床上黄色一级片免费看| 亚洲情色 制服丝袜| 青春草视频在线免费观看| 精品一区二区三区四区五区乱码 | 性色av一级| av网站免费在线观看视频| 久久精品国产综合久久久| 久久鲁丝午夜福利片| 国产片内射在线| 久久精品熟女亚洲av麻豆精品| 一本—道久久a久久精品蜜桃钙片| 18禁动态无遮挡网站| 91国产中文字幕| 在线免费观看不下载黄p国产| 男女下面插进去视频免费观看| 亚洲国产最新在线播放| 免费在线观看视频国产中文字幕亚洲 | 免费观看性生交大片5| 久久久久网色| 国产av码专区亚洲av| 亚洲 欧美一区二区三区| 久久久欧美国产精品| 各种免费的搞黄视频| 黑人巨大精品欧美一区二区蜜桃| 人人妻人人澡人人看| 女人被躁到高潮嗷嗷叫费观| 一区在线观看完整版| 激情视频va一区二区三区| 亚洲av中文av极速乱| 日本欧美国产在线视频| 成人毛片60女人毛片免费| 日韩欧美精品免费久久| 色网站视频免费| 毛片一级片免费看久久久久| 夫妻性生交免费视频一级片| 卡戴珊不雅视频在线播放| 在线天堂中文资源库| 国产人伦9x9x在线观看| 熟妇人妻不卡中文字幕| 中文字幕另类日韩欧美亚洲嫩草| 亚洲激情五月婷婷啪啪| 国产一区二区三区av在线| 丰满少妇做爰视频| 在线精品无人区一区二区三| 国产精品人妻久久久影院| 久久人人爽人人片av| 一个人免费看片子| 久久久久精品久久久久真实原创| 一二三四在线观看免费中文在| 亚洲久久久国产精品| 别揉我奶头~嗯~啊~动态视频 | 午夜福利免费观看在线| 国产亚洲午夜精品一区二区久久| 中文字幕制服av| 高清黄色对白视频在线免费看| av在线播放精品| 美女中出高潮动态图| 看非洲黑人一级黄片| 日韩 亚洲 欧美在线| 不卡视频在线观看欧美| 成年女人毛片免费观看观看9 | 国产成人精品久久二区二区91 | 亚洲久久久国产精品| 9色porny在线观看| 午夜福利,免费看| 国产精品女同一区二区软件| 欧美日本中文国产一区发布| 久久99热这里只频精品6学生| 精品人妻熟女毛片av久久网站| 日本av手机在线免费观看| 国产探花极品一区二区| 午夜福利视频精品| 在线天堂最新版资源| 亚洲综合精品二区| 久久99一区二区三区| 欧美 亚洲 国产 日韩一| 久久人妻熟女aⅴ| 超碰成人久久| 电影成人av| 在线免费观看不下载黄p国产| 亚洲一区二区三区欧美精品| 国产无遮挡羞羞视频在线观看| 亚洲色图 男人天堂 中文字幕| 国产成人欧美| 精品一区二区三区四区五区乱码 | 午夜免费男女啪啪视频观看| 国产精品一区二区在线不卡| 精品人妻熟女毛片av久久网站| 久久99热这里只频精品6学生| 黄色视频不卡| 丝袜美足系列| 欧美日韩亚洲综合一区二区三区_| 又黄又粗又硬又大视频| 最近最新中文字幕大全免费视频 | 午夜免费男女啪啪视频观看| 亚洲精品乱久久久久久| 欧美日韩亚洲高清精品| 亚洲欧美精品自产自拍| 国产成人精品久久二区二区91 | 日韩免费高清中文字幕av| 国产免费又黄又爽又色| 一区二区三区精品91| 大片免费播放器 马上看| 97在线人人人人妻| 国产精品国产三级专区第一集| 好男人视频免费观看在线| 久久久精品免费免费高清| 精品久久久久久电影网| 热re99久久精品国产66热6| 纵有疾风起免费观看全集完整版| 啦啦啦在线免费观看视频4| 国产午夜精品一二区理论片| 日韩大片免费观看网站| 久久久久久久国产电影| 久久99精品国语久久久| 无限看片的www在线观看| 不卡视频在线观看欧美| 精品一区在线观看国产| 国产精品麻豆人妻色哟哟久久| 国产精品国产三级专区第一集| 亚洲一区中文字幕在线| 香蕉丝袜av| 黄色毛片三级朝国网站| 热99久久久久精品小说推荐| 高清av免费在线| 亚洲精品中文字幕在线视频| 街头女战士在线观看网站| 超碰97精品在线观看| 亚洲色图 男人天堂 中文字幕| 久久久精品区二区三区| 亚洲美女视频黄频| 91成人精品电影| 久久久久国产一级毛片高清牌| 国产精品香港三级国产av潘金莲 | 亚洲精品第二区| 亚洲av国产av综合av卡| 国产一级毛片在线| 免费不卡黄色视频| 精品一品国产午夜福利视频| 欧美久久黑人一区二区| 国产免费现黄频在线看| 蜜桃国产av成人99| 纵有疾风起免费观看全集完整版| 国产老妇伦熟女老妇高清| 国产成人精品福利久久| 91老司机精品| 国产伦理片在线播放av一区| 国产精品人妻久久久影院| 97在线人人人人妻| 久久这里只有精品19| 免费黄网站久久成人精品| 两性夫妻黄色片| 日韩中文字幕欧美一区二区 | 亚洲四区av| 免费日韩欧美在线观看| 欧美日韩亚洲综合一区二区三区_| 久久青草综合色| av视频免费观看在线观看| 熟女少妇亚洲综合色aaa.| 精品一区二区三卡| 18禁裸乳无遮挡动漫免费视频| 日本91视频免费播放| 久久久久视频综合| 久久婷婷青草| 中文字幕人妻熟女乱码| 欧美成人午夜精品| 你懂的网址亚洲精品在线观看| 在线观看免费高清a一片| 尾随美女入室| av一本久久久久| 在线观看免费视频网站a站| xxx大片免费视频| 亚洲国产精品国产精品| 亚洲熟女精品中文字幕| 蜜桃国产av成人99| av在线观看视频网站免费| 一级a爱视频在线免费观看| 精品免费久久久久久久清纯 | 别揉我奶头~嗯~啊~动态视频 | 美女扒开内裤让男人捅视频| 国产一区有黄有色的免费视频| 日日撸夜夜添| 国产深夜福利视频在线观看| 亚洲美女视频黄频| 亚洲图色成人| 日韩不卡一区二区三区视频在线| 性色av一级| 国产极品天堂在线| 成年人午夜在线观看视频| 免费观看人在逋| 亚洲欧美日韩另类电影网站| 国产高清不卡午夜福利| 少妇猛男粗大的猛烈进出视频| 黄色一级大片看看| 免费日韩欧美在线观看| 国产精品一国产av| 免费黄网站久久成人精品| av网站在线播放免费| 国产精品二区激情视频| 人妻人人澡人人爽人人| 亚洲精品日韩在线中文字幕| 久久精品国产a三级三级三级| 日韩av免费高清视频| 欧美老熟妇乱子伦牲交| 丝袜美足系列| 亚洲精品视频女| 熟妇人妻不卡中文字幕| 多毛熟女@视频| av有码第一页| 老司机在亚洲福利影院| 国产国语露脸激情在线看| 91成人精品电影| 青春草亚洲视频在线观看| 欧美最新免费一区二区三区| 侵犯人妻中文字幕一二三四区| 99精品久久久久人妻精品| 巨乳人妻的诱惑在线观看| 建设人人有责人人尽责人人享有的| 久久精品久久久久久噜噜老黄| 国产又爽黄色视频| 日本av手机在线免费观看| 男女之事视频高清在线观看 | 人人妻人人添人人爽欧美一区卜| 精品少妇黑人巨大在线播放| 啦啦啦中文免费视频观看日本| 黑丝袜美女国产一区| 色婷婷久久久亚洲欧美| 哪个播放器可以免费观看大片| 亚洲专区中文字幕在线 | 亚洲美女搞黄在线观看| 夫妻午夜视频| 久久女婷五月综合色啪小说| 国产精品嫩草影院av在线观看| 欧美日韩视频精品一区| 久久国产精品男人的天堂亚洲| 黄色怎么调成土黄色| 制服丝袜香蕉在线| 久久久久久久大尺度免费视频| 大片电影免费在线观看免费| 精品酒店卫生间| 久久久久精品性色| 久久久久精品久久久久真实原创| 人妻 亚洲 视频| 国产1区2区3区精品| 母亲3免费完整高清在线观看| 天天躁夜夜躁狠狠躁躁| 一级毛片电影观看| av有码第一页| 侵犯人妻中文字幕一二三四区| 精品久久久久久电影网| 搡老岳熟女国产| 伦理电影免费视频| 深夜精品福利| 黑人欧美特级aaaaaa片| 老司机亚洲免费影院| 一级毛片黄色毛片免费观看视频| 女人爽到高潮嗷嗷叫在线视频| 色网站视频免费| 国产 精品1| 一区二区三区精品91| 纯流量卡能插随身wifi吗| 亚洲av男天堂| 秋霞伦理黄片| 黄色怎么调成土黄色| 国产av码专区亚洲av| av女优亚洲男人天堂| 成人黄色视频免费在线看| 嫩草影视91久久| 日本午夜av视频| av在线app专区| 国产精品亚洲av一区麻豆 | av免费观看日本| 亚洲伊人色综图| 自拍欧美九色日韩亚洲蝌蚪91| 国产毛片在线视频| 大片免费播放器 马上看| 永久免费av网站大全| 国产 精品1| 在线观看免费午夜福利视频| 无遮挡黄片免费观看| 亚洲国产精品一区三区| 色网站视频免费| 国产亚洲av高清不卡| 国产精品秋霞免费鲁丝片| 久久精品熟女亚洲av麻豆精品| 在线观看国产h片| 久久久久视频综合| 国产毛片在线视频| 一区二区三区乱码不卡18| 亚洲国产欧美一区二区综合| 飞空精品影院首页| 精品久久蜜臀av无| 赤兔流量卡办理| 大片免费播放器 马上看| 国产女主播在线喷水免费视频网站| 蜜桃国产av成人99| 中国三级夫妇交换| 国产伦理片在线播放av一区| 精品国产国语对白av| 国产女主播在线喷水免费视频网站| 超碰97精品在线观看| 男女边摸边吃奶| 中文字幕制服av| 国产男女内射视频| 亚洲国产日韩一区二区| 久久精品亚洲熟妇少妇任你| 超色免费av| 亚洲五月色婷婷综合| 日韩一卡2卡3卡4卡2021年| 日韩欧美一区视频在线观看| 一本—道久久a久久精品蜜桃钙片| 亚洲人成网站在线观看播放| 午夜福利视频精品| 国产免费福利视频在线观看| av卡一久久|