• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A collision recovery algorithm using optimal Q parameter based on BIBD in RFID①

    2016-12-22 05:45:27CuiYinghua崔英花
    High Technology Letters 2016年4期

    Cui Yinghua (崔英花)

    (School of Information and Communication Engineering, Beijing Information Science and Technology University, Beijing 100101, P.R.China)

    ?

    A collision recovery algorithm using optimal Q parameter based on BIBD in RFID①

    Cui Yinghua (崔英花)②

    (School of Information and Communication Engineering, Beijing Information Science and Technology University, Beijing 100101, P.R.China)

    In this work, an optimal Q algorithm based on a collision recovery scheme is presented. Tags use BIBD-(16,4,1) codes instead of RN16s. Therefore, readers can make a valid recognition even in collision slots. A way of getting the optimal slot-count parameter is studied and an optimal Q algorithm is proposed. The theoretical and simulation results show that the proposed algorithm can improve reading efficiency by 100% more than the conventional Q algorithm. Moreover, the proposed scheme changes little to the existing standard. Thus, it is easy to implement and compatible with ISO 18000-6C.

    radio frequency identification (RFID), anti-collision, collision recovery, balanced incomplete block design (BIBD), Q algorithm

    0 Introduction

    RFID (radio frequency identification) is an automatic identification system which includes readers and tags. Due to tags battery presence or absence, RFID technology can be divided into: passive, battery assisted passive and active RFID technology[1].

    In passive RFID, a reader communicates and powers tags using radio frequency (RF) waves transmitted by a reader antenna. Passive tags are able to harvest energy from the RF waves to power its circuitry, and respond back to the reader by smart reflection of the same RF waves. The carrier frequencies of the signals received by the reader are equal, as they originate from a single source, namely the transmitter of the reader. As the same oscillator is also available at the receiver, a down conversion without any frequency offset is readily possible. However the EPC standard[2]permits a large deviation of up to ±22% from that nominal frequency. Therefore synchronization in RFID readers is still an important task. In general, synchronization mechanisms are distinguished into maximum likelihood timing recovery[3]and minimum mean square error methods[4]. The first class estimates the timing instant by maximizing the likelihood function, while the latter estimates the timing instant by minimizing the mean square error.

    In RFID applications, the reader reads tags’ information within the effective range and the tags will respond the request according to a predefined protocol. If several tags respond simultaneously, the reader will detect collision and no tag will be recognized. To solve this problem, many anti-collision protocols have been designed. However, most of them are based on collision avoidance theory and have low system efficiency, usually less than 36.8%[5].

    Many researchers have investigated slots with colliding tag signals. Khasgiwale, et al.[6]estimated the number of tags involved in collision by the collision information on the physical layer. Kumar, et al.[7]proposed to use an interference cancellation scheme to separate the combined signals. Angerer, et al.[8]showed an RFID system which can be recovered from collision when two tags collide on a physical layer with a single antenna receiver. Kotevic, et al.[9]followed the work of Angerer and used more receiving antennas in the reader.

    Apart from the researches mentioned above, recently some researchers have studied on using BIBD (balanced incomplete block design) code in the RFID system. BIBD code is denoted by BIBD-(b,v,r,k,λ) and can be simply expressed as BIBD-(v,k,λ). Mathematically[10], it can be proved that the object set is unique for BIBD-(v,k,1) when no more than k blocks in a set. According to this theory, it can be concluded that BIBD- (b,v,r,k,1) can support b symbols, and identify up to k symbols at one transmission. For example, BIBD-(16,4,1), which is also denoted as, BIBD-(20,16,5,4,1) supporting up to 20 symbols, which are column vectors of the incident matrix. It can be recognized whenever not more than 4 symbols collide.

    In Ref.[11], Seol, et al. designed the symbols by using BIBD-(7, 3, 1) codes in the process of RFID tags identification and proposed a Multi-State Query Tree Protocol. The scheme does not require re-transmission when no more than 3 symbols collide, which will not only reduce the cost of power consumption, but also improve the system identification efficiency. In Ref.[12], Zhang, et al. advanced a novel and fast anti-collision algorithm based on the regressive-style RFID of BIBD-(4, 2, 1). The algorithm makes good use of the advantages of BIBD code, and can also significantly reduce the query time. However, these schemes use BIBD code to construct the EPC code, which decreases total number of supporting users, and are constrained to application-specific scenarios.

    In this study, an optimal Q parameter algorithm based on BIBD is proposed. This algorithm uses BIBD code to construct tag’s respond serials RN16 (16-bit random number) instead of tags’ EPC codes. The reader therefore can recover the RN16s from the colliding signals even in low SNR environment, and acknowledge one of the collision tags, thus increase the system efficiency greatly.

    The rest of this paper is organized as follows: Section 1 describes the RFID anti-collision scheme based on BIBD, analyzes its performance and studies how to get the optimum slot-count Q parameter. Section 2 proposes the collision recovery algorithm using optimal Q parameter selection. A performance analysis of the proposed scheme is provided in Section 3. The last section concludes the work.

    1 The optimal Q vlaue for the BIBD scheme

    The ISO 18000-6C specification proposes a frame slotted ALOHA based on anti-collision protocol, named Q-algorithm[13]. It has three basic commands: Query, QueryRep and QueryAdjust. After the reader sends a Query to initiate an inventory round, it then issues one or more QueryAdjust or QueryRep commands in this inventory round depending on whether the Q value needs to be changed. In response, tags that have nonzero slot numbers should decrease their count values and backscatter RN16 when their counter values reach zero. This process continues iteratively until all the tags have been recognized.

    In this section, a modified Q algorithm based on BIBD is presented which is compatible with ISO 18000-6C. In the scheme, tags use BIBD-(16,4,1) instead of RN16, and backscatter BIBD symbols to reader, who can recover the RN16s from the colliding signals, and make a valid recognition in collision slots.

    First, the system efficiency should be analyzed, and then how to choose the optimal Q parameter should be studied. Suppose there are totally n tags to be identified and the total slot number is N, the probability that k tags exist in one slot (k-occupation slot) follows a binomial distribution[14]:

    (1)

    So the expectation of k-occupation slot number is

    Ek=N×Pk

    (2)

    the system efficiency is defined by

    (3)

    Usually, the efficient reading slot refers to a successful tag transmission when exactly one tag transmits in a slot. The expectation of Eff can be calculated as

    (4)

    BIBD-(16,4,1) has 20 symbols with 16-bit in length, and identifies up to 4 symbols at one transmission. By using it instead of RN16, the reader can extract an individual BIBD code from the tags involved in a collision and make a valid acknowledgement. Accordingly, the expectation of the system efficiency can be denoted by

    (5)

    Letf=N/n, for different tag numbers, the optimal values of f and the maximal efficiency are obtained as shown in Fig.1 and Fig.2.

    Furthermore, for n and N→∞, Eq.(5) can be reformulated to

    (6)

    Fig.1 The optimal values of f for different tag numbers

    Fig.2 The maximal values of Eff for different tag numbers

    The maximal system efficiency can be reached with

    (7)

    It is a non-linear equation in one variable, and a simple bisection search or Newton’s methods are used to solve it, and the result is foptimal≈0.452. Therefore, the max system efficiency can be obtained as

    Effmax=Eff|f=0.452=0.817

    (8)

    The Q algorithm uses Q as the slot count parameter and sets the frame size as 2Q, where Q is in the range of [0, 15]. From the figure of function Eff(f), the maximal efficiency can be obtained at the point of nearby 0.452. It is easy to prove that the function is monotonic in the range of f<0.452 or f>0.452. Hence, the optimal Q value can be reached at

    (9)

    Here, integer T satisfies 2T-1<0.452n<2T.

    2 The collision recovery algorithm with optimal Q value selection based on BIBD

    Conventional readers only read data in singleton slots, while the proposed BIBD method is able to identify them in collision slots. So the original Q selection algorithm is not suitable here, and needs some modifications.

    It is known that the exact number of tags in the field allows an optimal choice of Q. When collisions occur, the number of tags involved in the slot can be determined. Combining the number of tags detected in afore rounds will give an accurate estimate of the number of tags participating in the identification process. This can be used to set a near optimal Q value for the next round. The details of the optimal identification process are described as follows:

    (1) Reader selects an initial tag number, let it be N=2Q, then sends Query command with a slot-count parameter Q to the tags. Tags will pick a random value in the range of [0, 2Q-1] and load this value into slot counter. Tags that pick zero will transit to the reply state, choose one of BIBD-(16,4,1) symbols randomly to make an 16-bit signal instead of RN16 and reply immediately, other tags will transit to the arbitrate state and await a QueryRep command.

    (2) If the reader detects no more than 4 tags’ reply, it shall choose one and sends an acknowledgment command to the tag. The identified tag then processes the received ACK and reports its ECP back to the reader.

    (3) If the reader detects idle or more than 4 RN16s, no tag will be acknowledged.

    (4) For each slot, the reader determines the number of reply tags. If there are more than four tags, the reader can’t determine the exact tag number in the slot. It then estimates the number with an approximation by 5. For example, the estimate for i-th slot is given by

    (10)

    Suppose current slot is the l-th slot, reader can estimate the total tag population by

    (11)

    Then, suppose 2T-1

    (12)

    To make the estimate more accurate, such calculation is made only when l≥3.

    (5) If Qoptequals to the current Q value, the reader uses QueryRep command to notify the tags to decrement their slot counters by 1, else reader estimates the remaining tags:

    Rl=Estl-Il

    (13)

    here Ilis the recognized tag number during this identification round. then it is used to estimate the new Q value:

    (14)

    The reader then adjusts the Q value with QueryAdjust command.

    (6) The above process may iterate many times, until all the tags have been recognized.

    In contrast to the conventional Q algorithm, the proposed scheme uses BIBD-based 16-bit signals instead of RN16, and employs an optimal Q selection algorithm. The scheme estimates the tag population during recognition process, and adjusts the Q parameter more efficiently. For each collision slot, only one tag is preferred to acknowledge, though acknowledge all the collided tags within one slot can increase the system efficiency greatly. While it will introduce more change to the conventional Q scheme which is not desirable. It is clear that the scheme is compatible with ISO 18000-6C and easy to implement.

    3 Simulation results

    The performance of the proposed method for collision recovery is verified through MATLAB simulations. In this section, a simulation model based on the algorithms described in section 2 is established and it is compared with the conventional Q parameter algorithm and the modified Q algorithm mentioned in Ref.[15], which is one of the previous work based on BIBD without optimal Q parameter selection. The simulation is repeated 100 times for each number of tags from 100 to 1000, and the initial value of Q is set to 4. Actually, the tag number beforehand is unknown and the frame size N is a power of 2 and parameter Q can only be adjusted gradually, so the actual system efficiency should be a little lower than the theoretical maximum.

    The result of this experiment is depicted in Fig.3. It shows that the optimal Q value scheme is far more effective than the conventional one. For other improved Aloha-based schemes, such as EDFSA[16]and TSA[17], the proposed scheme also behaves much better than them, as their average efficiencies did not exceed 38%. Moreover, the optimal scheme is also better than the modified Q algorithm. The two Q algorithms both choose 4 as the initial value of Q; the modified Q algorithm employs a slightly changed Q selection algorithm while the optimal scheme uses an optimal Q parameter selection, which proves that the optimal slot-count parameter choosing method contributes to the identification efficiency greatly. It is interesting to notice that the figure of the proposed scheme is like a wave, the crests are reached at about 64, 256, 512, … which are the points the estimation is the most accurate.

    Fig.3 Comparison of the efficiency of different algorithms

    It also should be emphasized that the proposed scheme only makes minor changes to the original Q algorithm. One is using BIBD-(16,4,1) block instead of RN16 for tags, which is the main idea of the proposed scheme to enable readers to decode RN16s from collision signals and make a valid acknowledge within a collided slot. The other is the optimal slot-count select algorithm. Qestis updated after every reading slot, and the Q value is adjusted dynamically when necessary. Therefore, the scheme is compatible with ISO 18000-6C and easy to implement. The theoretical and simulation results show that the scheme has greatly improved system efficiency.

    4 Conclusion

    In this work a collision recovery algorithm using optimal Q parameter based on BIBD is proposed. Using BIBD-(16,4,1) code instead of RN16 for tags’ backscatter, it enables readers to make a valid acknowledge from collision slots with no more than 4 tags. As a result, the system efficiency can be improved greatly. Moreover, the optimum slot-count parameter selection is studied and an optimal Q algorithm is designed which can adjust the slot-count parameter more efficiently. Simulation indicates that the scheme has good

    performance. Compared with the standard Q algorithm in Gen2, a performance gain of about 100% can be achieved.

    [ 1] Dobkin D M. The RF in RFID. Burlington: Elsevier, 2008

    [ 2] EPCGloabl. EPC Radio-Frequency Identity ProtocolsClass-1 Generation-s UHF RFID, Oct., 2008

    [ 3] Kobayashi H. Simultaneous adaptive estimation and decision algorithm for carriesr modulated adata transmission systems. IEEE Transcations on Communication Technology, 1997, 19(3):268-280

    [ 4] Barry J R, Lee E A, Messerschmitt D G. Digital Communication. 3rd Edition, Springer, 2004

    [ 5] Finkenzeller K. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. 2nd Edition. John Wiley & Sons Ltd, 2003

    [ 6] Khasgiwale R S, Adyanthaya R U, Engels D W. Extracting information from tag collisions. In: Proceedings of the IEEE International Conference on RFID, Orlando, USA, 2009. 131-138

    [ 7] Kumar R, La Porta T F. Interference cancellation-based RFID Tags Identification. In: Proceedings of the 14th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, Miami, USA, 2011. 111-118

    [ 8] Angerer C, Langwieser R, Rupp M. RFID reader receivers for physical layer collision recovery. IEEE Transactions on Communications, 2010, 58(12): 3526-3537

    [ 9] Kaitovic J, Langwieser R, Rupp M. RFID reader with multi antenna physical layer collision recovery receivers. In: Proceedings of the IEEE International Conference On RFID-Technologies and Applications (RFID-TA), Sitges, Spain, 2011. 286-291

    [10] Colbourn C J, Dinitz J H. The CRC Handbook of Combinatorial Design. Boca Raton: CRC Press, 1996

    [11] Seol J M, Kim S W. Collision-resilient multi-state query tree protocol for fast RFID tag identification. In: Proceedings of the International Conference on Computational Intelligence and Security, Guizhou, China, 2006. 1159-1162

    [12] Li Z, Zhang X, Lei Z. Anti-collision algorithm based on the regressive-style RFID of BIBD (4,2,1). In: Proceedings of the International Conference on Advanced Computer Theory and Engineering (ICACTE), Chengdu, China, 2010. 352-355

    [13] International Organization for Standardization/International Electrotechnical Commission. ISO/IEC 18000-6 information technology automatic identification and data capture techniques—radio frequency identification for item management air interface—Part 6: parameters for air interface communications at 860-960MHz. International Organization for Standardization, 2007

    [14] Vogt H. Efficient object identification with passive RFID tags. In: Proceedings of the 1st International Conference on Pervasive Computing,Zürich, Switzerland, 2002. 98-113

    [15] Cui Y H, Yang S G. A modified Q parameter scheme based on BIBD in RFID. Advanced Materials Research, 2013, 765: 2041-2045

    [16] Lee S R, Joo S D, Lee C W. An enhanced dynamic framed slotted aloha algorithm for RFID tag identification. In: Proceedings of the 2nd Annual International Conference for Mobile Ubiquitous Systems: Networking and Services, Boston, USA, 2005. 162-172

    [17] Bonuccelli F L M A, Martelli F. Tree slotted aloha: a new protocol for tag identification in RFID networks. In: Proceedings of the International Symposium on World of Wireless, Mobile and Multimedia Networks, New York, USA, 2006. 603-608

    Cui Yinghua, born in 1973. She received her Ph.D degree and Master degree from Peking University in 2009 and 2003. Her research interests include anti-collision algorithm in RFID, wireless communication, and wireless sensor network.

    10.3772/j.issn.1006-6748.2016.04.002

    ① Supported by the National Natural Science Foundation of China (No. 61340005), Beijing Natural Science Foundation (No. 4132012), Beijing Education Committee Science and Technology Development Plan (No. KM201411232011), Beijing Outstanding Personnel Training Project (No. 2013D005007000006), Scientific Research Improving Project-Intelligent Sense and Information Processing (No. 5211524100).

    ② To whom correspondence should be addressed. E-mail: cui_ying_hua@sina.com Received on Sep. 15, 2015

    婷婷成人精品国产| 9色porny在线观看| 天天操日日干夜夜撸| √禁漫天堂资源中文www| 天天操日日干夜夜撸| 日本五十路高清| av福利片在线| 精品少妇久久久久久888优播| 一区二区av电影网| 国产xxxxx性猛交| 欧美日韩精品网址| 欧美亚洲 丝袜 人妻 在线| 亚洲自偷自拍图片 自拍| 国产一区二区在线观看av| 午夜精品国产一区二区电影| av又黄又爽大尺度在线免费看| 99国产精品免费福利视频| 男人舔女人的私密视频| 男男h啪啪无遮挡| 亚洲av在线观看美女高潮| 国产亚洲午夜精品一区二区久久| 看十八女毛片水多多多| 精品久久久精品久久久| 亚洲欧美色中文字幕在线| 久久久久视频综合| 成人国产一区最新在线观看 | 国产高清videossex| 交换朋友夫妻互换小说| 亚洲国产看品久久| 午夜日韩欧美国产| 国产一区二区激情短视频 | 精品国产国语对白av| 久久天堂一区二区三区四区| 大片免费播放器 马上看| 国产黄频视频在线观看| 黑人巨大精品欧美一区二区蜜桃| 欧美日韩综合久久久久久| 国产精品99久久99久久久不卡| 狠狠婷婷综合久久久久久88av| 国产高清视频在线播放一区 | 国产99久久九九免费精品| 视频在线观看一区二区三区| 女人被躁到高潮嗷嗷叫费观| 婷婷色av中文字幕| 老司机午夜十八禁免费视频| 午夜福利一区二区在线看| 欧美日韩av久久| 国产av精品麻豆| 久久久久久人人人人人| 人成视频在线观看免费观看| 午夜日韩欧美国产| 国产精品偷伦视频观看了| 久久久精品区二区三区| 国产熟女午夜一区二区三区| 五月天丁香电影| 久久久欧美国产精品| 国产精品熟女久久久久浪| av片东京热男人的天堂| 久久精品人人爽人人爽视色| a 毛片基地| 中文字幕色久视频| 久久精品成人免费网站| 亚洲人成电影观看| 满18在线观看网站| 交换朋友夫妻互换小说| 在线观看人妻少妇| 无遮挡黄片免费观看| 国产高清国产精品国产三级| 亚洲欧美精品自产自拍| 亚洲人成77777在线视频| 美女中出高潮动态图| 又黄又粗又硬又大视频| 午夜日韩欧美国产| 国精品久久久久久国模美| 久久久久久亚洲精品国产蜜桃av| 波野结衣二区三区在线| 国产精品久久久人人做人人爽| 一二三四在线观看免费中文在| av一本久久久久| 国产又爽黄色视频| 日本一区二区免费在线视频| 国产福利在线免费观看视频| 深夜精品福利| 国产精品麻豆人妻色哟哟久久| 精品卡一卡二卡四卡免费| 亚洲五月婷婷丁香| 首页视频小说图片口味搜索 | 国产一区二区三区av在线| 无遮挡黄片免费观看| 一本—道久久a久久精品蜜桃钙片| 免费少妇av软件| 99香蕉大伊视频| 啦啦啦啦在线视频资源| 亚洲色图 男人天堂 中文字幕| 亚洲人成电影观看| avwww免费| 国产欧美日韩一区二区三区在线| 欧美黄色淫秽网站| 亚洲,欧美精品.| 国产一区二区 视频在线| 夫妻性生交免费视频一级片| 下体分泌物呈黄色| 国产1区2区3区精品| 一级片'在线观看视频| 亚洲成色77777| 免费在线观看影片大全网站 | 亚洲国产看品久久| 在线精品无人区一区二区三| 色精品久久人妻99蜜桃| 侵犯人妻中文字幕一二三四区| 中文字幕最新亚洲高清| 汤姆久久久久久久影院中文字幕| 亚洲国产欧美日韩在线播放| 一级毛片女人18水好多 | 丰满人妻熟妇乱又伦精品不卡| 十八禁网站网址无遮挡| 久久久久久久大尺度免费视频| 777米奇影视久久| 亚洲一区二区三区欧美精品| 伊人久久大香线蕉亚洲五| 久久久久国产精品人妻一区二区| 制服人妻中文乱码| 久久亚洲国产成人精品v| 久久 成人 亚洲| 97在线人人人人妻| 日韩人妻精品一区2区三区| 欧美激情 高清一区二区三区| 曰老女人黄片| 久久鲁丝午夜福利片| 天天躁日日躁夜夜躁夜夜| 女人久久www免费人成看片| 欧美 亚洲 国产 日韩一| 自线自在国产av| 午夜福利影视在线免费观看| 精品人妻在线不人妻| 黄色怎么调成土黄色| 亚洲国产欧美一区二区综合| 国产主播在线观看一区二区 | 久久精品aⅴ一区二区三区四区| 亚洲人成电影观看| 久久精品亚洲熟妇少妇任你| 少妇裸体淫交视频免费看高清 | 波野结衣二区三区在线| 精品人妻1区二区| 国产免费一区二区三区四区乱码| 又大又黄又爽视频免费| 亚洲av日韩在线播放| av天堂在线播放| 欧美另类一区| 午夜精品国产一区二区电影| 欧美日韩福利视频一区二区| 九色亚洲精品在线播放| 欧美日韩福利视频一区二区| 51午夜福利影视在线观看| www.av在线官网国产| 久久久久久免费高清国产稀缺| 国产免费视频播放在线视频| 制服诱惑二区| www.自偷自拍.com| 一边摸一边抽搐一进一出视频| 尾随美女入室| 自线自在国产av| 中文精品一卡2卡3卡4更新| 亚洲美女黄色视频免费看| 亚洲av成人不卡在线观看播放网 | 好男人视频免费观看在线| 中国国产av一级| 欧美黄色片欧美黄色片| 天堂8中文在线网| 成年女人毛片免费观看观看9 | 亚洲欧美一区二区三区久久| 国产精品一区二区免费欧美 | 少妇裸体淫交视频免费看高清 | 成人国产av品久久久| 飞空精品影院首页| 91精品伊人久久大香线蕉| 99香蕉大伊视频| 在线亚洲精品国产二区图片欧美| 18禁黄网站禁片午夜丰满| 性色av一级| 老鸭窝网址在线观看| 国产av一区二区精品久久| 天天躁日日躁夜夜躁夜夜| 欧美日韩一级在线毛片| 一级毛片 在线播放| 亚洲天堂av无毛| 男人操女人黄网站| bbb黄色大片| 美女脱内裤让男人舔精品视频| 老熟女久久久| 狂野欧美激情性bbbbbb| 中文字幕精品免费在线观看视频| 大香蕉久久成人网| 男人爽女人下面视频在线观看| 久久久久久久久久久久大奶| 啦啦啦视频在线资源免费观看| videosex国产| 国产精品一区二区精品视频观看| 久久久久视频综合| 国产成人精品久久二区二区91| 日韩精品免费视频一区二区三区| 欧美日韩亚洲高清精品| 9色porny在线观看| 国产高清不卡午夜福利| 青春草亚洲视频在线观看| 伊人亚洲综合成人网| 成年动漫av网址| 岛国毛片在线播放| 老鸭窝网址在线观看| 视频区图区小说| 制服人妻中文乱码| 免费日韩欧美在线观看| 亚洲精品国产av蜜桃| 国产成人一区二区在线| 亚洲精品自拍成人| 免费观看av网站的网址| 视频在线观看一区二区三区| 国产色视频综合| 亚洲欧美成人综合另类久久久| √禁漫天堂资源中文www| 国产成人精品久久二区二区免费| 天堂俺去俺来也www色官网| 亚洲av在线观看美女高潮| 亚洲精品久久成人aⅴ小说| 99精国产麻豆久久婷婷| kizo精华| 精品免费久久久久久久清纯 | 久久亚洲精品不卡| 熟女av电影| 午夜精品国产一区二区电影| 天天躁夜夜躁狠狠躁躁| 黄色 视频免费看| 欧美大码av| 久久久精品94久久精品| 国产男女内射视频| 久久久国产一区二区| 亚洲情色 制服丝袜| 亚洲,欧美,日韩| 亚洲男人天堂网一区| 亚洲欧美精品综合一区二区三区| 看免费av毛片| 久久久国产一区二区| 日韩熟女老妇一区二区性免费视频| 亚洲五月婷婷丁香| 老司机影院毛片| 岛国毛片在线播放| 每晚都被弄得嗷嗷叫到高潮| 麻豆av在线久日| 午夜免费观看性视频| 亚洲色图综合在线观看| 精品久久蜜臀av无| 天堂中文最新版在线下载| kizo精华| 久久久久久久大尺度免费视频| 在现免费观看毛片| 国产成人一区二区三区免费视频网站 | 91精品伊人久久大香线蕉| 女人久久www免费人成看片| 亚洲精品第二区| 大陆偷拍与自拍| 午夜福利视频精品| 成人手机av| 国产女主播在线喷水免费视频网站| 午夜福利乱码中文字幕| 亚洲欧美日韩高清在线视频 | 免费不卡黄色视频| 久久国产精品男人的天堂亚洲| 亚洲av综合色区一区| 多毛熟女@视频| 国产免费视频播放在线视频| 精品一区二区三区av网在线观看 | 亚洲成人免费av在线播放| www.自偷自拍.com| 丝瓜视频免费看黄片| 在线观看一区二区三区激情| 80岁老熟妇乱子伦牲交| 最近手机中文字幕大全| 欧美久久黑人一区二区| 国产成人av激情在线播放| 无限看片的www在线观看| 啦啦啦在线观看免费高清www| 日韩一卡2卡3卡4卡2021年| 久久99精品国语久久久| 成年人黄色毛片网站| 免费在线观看黄色视频的| 如日韩欧美国产精品一区二区三区| 国产国语露脸激情在线看| 国产xxxxx性猛交| 老司机在亚洲福利影院| 免费人妻精品一区二区三区视频| 国产麻豆69| 精品国产一区二区三区四区第35| 一区二区三区乱码不卡18| 亚洲熟女精品中文字幕| 亚洲久久久国产精品| 午夜福利影视在线免费观看| 性高湖久久久久久久久免费观看| 欧美中文综合在线视频| 在线观看免费午夜福利视频| 在线亚洲精品国产二区图片欧美| 高清av免费在线| 日韩熟女老妇一区二区性免费视频| 中国国产av一级| 菩萨蛮人人尽说江南好唐韦庄| 搡老岳熟女国产| 国产1区2区3区精品| 久久久久久久精品精品| 欧美另类一区| 一级毛片电影观看| 久久精品人人爽人人爽视色| 韩国高清视频一区二区三区| 晚上一个人看的免费电影| 精品视频人人做人人爽| 中文字幕人妻丝袜一区二区| 国产野战对白在线观看| 巨乳人妻的诱惑在线观看| 日韩欧美一区视频在线观看| 久久国产精品影院| 精品国产超薄肉色丝袜足j| 日韩 亚洲 欧美在线| 黑人欧美特级aaaaaa片| 侵犯人妻中文字幕一二三四区| 亚洲黑人精品在线| 精品国产一区二区三区四区第35| 丰满饥渴人妻一区二区三| 国产精品一区二区在线不卡| 狂野欧美激情性xxxx| av欧美777| av在线app专区| 国产无遮挡羞羞视频在线观看| 免费观看a级毛片全部| 国产精品一国产av| 天天操日日干夜夜撸| 在线精品无人区一区二区三| 亚洲精品久久成人aⅴ小说| 成人三级做爰电影| 国产99久久九九免费精品| 18禁国产床啪视频网站| √禁漫天堂资源中文www| 国产国语露脸激情在线看| 丰满人妻熟妇乱又伦精品不卡| 国产精品免费大片| 人成视频在线观看免费观看| 欧美激情高清一区二区三区| 久久天躁狠狠躁夜夜2o2o | 美女主播在线视频| 狂野欧美激情性xxxx| 欧美精品av麻豆av| 婷婷成人精品国产| 国产精品久久久人人做人人爽| 久久人人97超碰香蕉20202| av天堂久久9| 国产午夜精品一二区理论片| 久久久久久免费高清国产稀缺| 久久久久久免费高清国产稀缺| 国产又色又爽无遮挡免| 国产精品成人在线| 天堂8中文在线网| 九色亚洲精品在线播放| 热99久久久久精品小说推荐| 成人手机av| 久久性视频一级片| 9色porny在线观看| 欧美日韩视频精品一区| 亚洲av成人不卡在线观看播放网 | 欧美变态另类bdsm刘玥| 亚洲七黄色美女视频| 久久久国产一区二区| 一级毛片我不卡| 亚洲图色成人| 久久中文字幕一级| 免费观看a级毛片全部| 王馨瑶露胸无遮挡在线观看| avwww免费| 国产色视频综合| 777米奇影视久久| 精品高清国产在线一区| 久久国产精品男人的天堂亚洲| 国产成人精品久久久久久| 国产日韩一区二区三区精品不卡| 亚洲国产成人一精品久久久| 黄频高清免费视频| 久久这里只有精品19| 热re99久久国产66热| 久久99热这里只频精品6学生| 久久久久国产精品人妻一区二区| 国产一级毛片在线| 色网站视频免费| 国产女主播在线喷水免费视频网站| 国产精品欧美亚洲77777| 中文字幕最新亚洲高清| 蜜桃国产av成人99| 国产亚洲av高清不卡| 人妻一区二区av| 亚洲av男天堂| 婷婷色av中文字幕| 国产欧美日韩一区二区三 | 如日韩欧美国产精品一区二区三区| 精品一区在线观看国产| 9热在线视频观看99| 国产一区二区三区综合在线观看| 亚洲熟女精品中文字幕| 免费日韩欧美在线观看| 欧美变态另类bdsm刘玥| 精品国产乱码久久久久久小说| 国产99久久九九免费精品| 两个人免费观看高清视频| 亚洲天堂av无毛| 亚洲欧美精品综合一区二区三区| 日韩熟女老妇一区二区性免费视频| 日韩中文字幕视频在线看片| 一本大道久久a久久精品| 18禁国产床啪视频网站| 国产男人的电影天堂91| 黄色视频在线播放观看不卡| 国产欧美日韩精品亚洲av| 久久久久国产一级毛片高清牌| 热99国产精品久久久久久7| 99re6热这里在线精品视频| 777米奇影视久久| 久久精品国产a三级三级三级| 亚洲国产精品一区二区三区在线| 国产片内射在线| 老司机靠b影院| 十八禁高潮呻吟视频| 国产女主播在线喷水免费视频网站| 2018国产大陆天天弄谢| 久久久久网色| kizo精华| 亚洲国产av影院在线观看| 日韩 亚洲 欧美在线| 国产精品.久久久| 免费av中文字幕在线| 国产成人欧美| 久久女婷五月综合色啪小说| 亚洲av成人精品一二三区| 国产高清videossex| 国产女主播在线喷水免费视频网站| 免费高清在线观看日韩| 午夜久久久在线观看| 黄色 视频免费看| 成人亚洲欧美一区二区av| 最新在线观看一区二区三区 | 欧美+亚洲+日韩+国产| 久久鲁丝午夜福利片| 久久久久久亚洲精品国产蜜桃av| 一区二区三区激情视频| 人妻一区二区av| 久久久久国产一级毛片高清牌| 久久久久久久国产电影| 高清黄色对白视频在线免费看| 两个人看的免费小视频| 无限看片的www在线观看| av天堂在线播放| 男女边摸边吃奶| 日韩免费高清中文字幕av| 精品国产一区二区三区四区第35| 青草久久国产| 色播在线永久视频| 18禁国产床啪视频网站| av又黄又爽大尺度在线免费看| 晚上一个人看的免费电影| 亚洲av日韩在线播放| 亚洲av电影在线观看一区二区三区| www.自偷自拍.com| 成在线人永久免费视频| 亚洲国产中文字幕在线视频| 中文乱码字字幕精品一区二区三区| 久久av网站| 亚洲综合色网址| 婷婷色av中文字幕| 美女大奶头黄色视频| 看免费av毛片| 国产精品久久久av美女十八| 亚洲精品自拍成人| 伦理电影免费视频| 欧美精品高潮呻吟av久久| 婷婷色麻豆天堂久久| 色视频在线一区二区三区| 日韩 亚洲 欧美在线| 国产精品.久久久| 91老司机精品| 亚洲国产精品国产精品| 只有这里有精品99| 亚洲成人手机| 一区二区日韩欧美中文字幕| 久久久精品国产亚洲av高清涩受| 亚洲欧美精品综合一区二区三区| 精品国产乱码久久久久久男人| 亚洲av电影在线观看一区二区三区| 三上悠亚av全集在线观看| www.999成人在线观看| 精品欧美一区二区三区在线| 国产高清视频在线播放一区 | 亚洲欧美精品自产自拍| 午夜免费鲁丝| 青春草视频在线免费观看| 一区二区三区精品91| 国产精品熟女久久久久浪| 国产高清不卡午夜福利| 欧美日韩视频高清一区二区三区二| 丁香六月天网| 99精品久久久久人妻精品| 啦啦啦在线免费观看视频4| 久久久欧美国产精品| 久久这里只有精品19| 飞空精品影院首页| 日韩av在线免费看完整版不卡| 欧美乱码精品一区二区三区| 欧美黄色片欧美黄色片| 欧美黄色淫秽网站| 亚洲国产欧美网| 人人妻人人爽人人添夜夜欢视频| 2018国产大陆天天弄谢| 丝袜喷水一区| 亚洲欧美精品自产自拍| 国产免费视频播放在线视频| 久久国产精品男人的天堂亚洲| 菩萨蛮人人尽说江南好唐韦庄| 国产亚洲av高清不卡| 性色av乱码一区二区三区2| 国产激情久久老熟女| av在线老鸭窝| 国产极品粉嫩免费观看在线| 亚洲欧美激情在线| 国产亚洲精品久久久久5区| av网站在线播放免费| 亚洲五月色婷婷综合| 国产精品麻豆人妻色哟哟久久| 叶爱在线成人免费视频播放| 国产精品人妻久久久影院| 亚洲 国产 在线| 亚洲熟女精品中文字幕| 另类精品久久| 51午夜福利影视在线观看| 久久影院123| 亚洲精品久久成人aⅴ小说| 国产亚洲欧美精品永久| 精品亚洲成a人片在线观看| 亚洲人成电影免费在线| 国产无遮挡羞羞视频在线观看| 最近最新中文字幕大全免费视频 | kizo精华| 久久午夜综合久久蜜桃| 亚洲成人国产一区在线观看 | 午夜免费观看性视频| 国产97色在线日韩免费| 精品亚洲成a人片在线观看| 美女主播在线视频| 老熟女久久久| 菩萨蛮人人尽说江南好唐韦庄| 国产日韩欧美亚洲二区| 女人精品久久久久毛片| 中文字幕制服av| 只有这里有精品99| 国产精品久久久久久精品古装| 日韩人妻精品一区2区三区| 97人妻天天添夜夜摸| 免费观看人在逋| 大片免费播放器 马上看| 国产亚洲欧美在线一区二区| 王馨瑶露胸无遮挡在线观看| 成在线人永久免费视频| 国产在视频线精品| 夫妻性生交免费视频一级片| 国产精品三级大全| 两个人免费观看高清视频| 亚洲精品国产色婷婷电影| 亚洲国产看品久久| 在线观看免费午夜福利视频| 真人做人爱边吃奶动态| 久久av网站| 午夜免费鲁丝| 欧美激情极品国产一区二区三区| 久久 成人 亚洲| 国产精品久久久久久精品古装| 成人黄色视频免费在线看| 一二三四在线观看免费中文在| 男女之事视频高清在线观看 | 国产成人欧美| 十八禁人妻一区二区| 欧美成人午夜精品| 欧美精品一区二区免费开放| 老司机影院成人| 国产女主播在线喷水免费视频网站| 久久精品aⅴ一区二区三区四区| 日韩大片免费观看网站| 国产在线一区二区三区精| 国产一区二区三区av在线| 晚上一个人看的免费电影| 午夜老司机福利片| 男男h啪啪无遮挡| 午夜免费男女啪啪视频观看| 久久ye,这里只有精品| 日韩视频在线欧美| 婷婷丁香在线五月| 日韩欧美一区视频在线观看| 又大又爽又粗| 欧美日韩精品网址| 99国产综合亚洲精品| 在现免费观看毛片| 日韩人妻精品一区2区三区| 国产亚洲av高清不卡| 国产精品一国产av| 999久久久国产精品视频| 99香蕉大伊视频| av线在线观看网站| 极品人妻少妇av视频| 精品亚洲成a人片在线观看| 一级毛片 在线播放| 久久久精品区二区三区| 99香蕉大伊视频| av天堂在线播放| 熟女少妇亚洲综合色aaa.| 宅男免费午夜|