• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An efficient QoS enhancement mechanism of VoIP using erasure array codes①

    2017-12-19 00:39:34LiZhenRenHuiLiuWenboGaoXinyan
    High Technology Letters 2017年4期

    Li Zhen (李 真), Ren Hui, Liu Wenbo, Gao Xinyan

    (*School of Information Engineering, Communication University of China, Beijing 100024, P.R.China) (**School of Software, Dalian University of Technology, Dalian 116024, P.R.China)

    An efficient QoS enhancement mechanism of VoIP using erasure array codes①

    Li Zhen (李 真)②, Ren Hui*, Liu Wenbo**, Gao Xinyan**

    (*School of Information Engineering, Communication University of China, Beijing 100024, P.R.China) (**School of Software, Dalian University of Technology, Dalian 116024, P.R.China)

    In order to solve the problem of losing voice packets in voice over internet protocol (VoIP), a kind of lost packets double recovery algorithm is proposed. The algorithm is based on erasure coding technique which comes from highly available data storage systems. An efficient coding scheme with higher tolerance based on STAR and Reed-Solomon (RS) erasure code is described. An efficient method is also provided which could transform the voice data packets of one dimensional bit stream into two dimensional array according to given window size. If the lost rate has increased beyond the error correction capability, packet-loss concealment will be adopted. Under various conditions of packet-loss simulation during the experiments, the algorithm has proved its better performance on MOS rating and coding rate.

    packet loss recovery, voice over internet protocol (VoIP), quality of service (QoS), array code

    0 Introduction

    It is well known that VoIP is a real-time transport protocol running on top of the user datagram protocol (UDP). Quality of service (QoS) is a major issue in VoIP applications. However, UDP is an unreliable delivery protocol. When routers of the packet-switched network are overloaded, some voice packets will be lost inevitably. Moreover, in real-time communications a voice packet that arrives at the receiving endpoint too late will be useless and has to be disregarded correspondingly. When losing packets happens, the quality of the audio at the receiving endpoint degrades greatly.

    To defend the problem of lost packets, researchers have proposed two classes of techniques for improving QoS, which are sender-based techniques and receiver-based techniques respectively, where receiver-based techniques employ packet-loss concealment algorithms to synthesize audio when packets of audio data are missing, while for sender-based loss-recovery techniques, the sender acts an active role to help the receiver recover lost information to improve QoS when packet loss occurs. Most sender-based lose-recovery methods work by transmitting redundant data to some degree. These approaches will consume additional resources such as network bandwidth and CPU capacity, which will conversely make the losing packet problem worse. Therefore, there should make a reasonable trade-off between additional resource consumption and redundant degree.

    Sender-based loss-recovery techniques typically introduce extra end-to-end delay into the media stream. Generally, humans cannot even perceive a one-way delay of less than 100ms, and most users can tolerate a one-way delay of up to 250ms. If the one-way delay exceeds 250ms, however, the delay would result in a serious talker-overlap effect that is intolerable for most users[1]. Therefore, additional delays should be considered as well as other factors such as bandwidth consumption when evaluating the feasibility and effectiveness of loss-recovery techniques.

    In data storage systems, there exists a big family of coding schemes which can be used to correct storage node failure for a given data redundancy. Maximum distance separable (MDS)[2]array codes are such error-correcting codes that have important applications in communication and highly available storage systems such as redundant arrays of inexpensive disks (RAID) architecture.

    Up to now, a number of MDS array codes have been studied, such as EVENODD[3], B-code[4], X-code[5], row-diagonal parity (RDP)[6], STAR code[7], zigzag code[8], etc.

    In general, an array code consists of arrays of size m×n, with each element of an array storing one symbol, which can be a simple bit, a byte or a binary string for any length. Among the n columns, k columns store the information symbols and r columns store the parity-check symbols (n=r+k). If the array code can tolerate any r storage node erasures, in an MDS array code, the information symbols can be recovered from any k columns.

    Most of them are designed to correct multiple node erasures. For example, the RDP code and the EVENODD code can tolerate any two node erasures. MDS array codes such as the generalized EVENODD, STAR, Triple-Star[9]and generalized RDP can tolerate any three erasures.

    Recently, array codes have been further studied and gradually applied to overcome the lost packets problem in real-time data communication area. In 2010,1-D interleaved parity codes were standardized by internet engineering task force (IETF) in request for comments (RFC) 6015 to recover lost packets in real-time transport protocol over UDP to transport data packets.

    Generally, the sender-based techniques are independent of the receiver-based techniques, so designers can combine both types of loss-recovery methods simultaneously.

    In this paper, the sender-based forward error correction technique is mainly focused on and the array code scheme (STAR code) is applied with multiple erasure correction capacity to construct a packets loss-recovery approach. The STAR code also combines with the traditional RS code which is always used in the sender-based loss-recovery. The key procedure of our method is to transform the original bit stream into two dimensional packet array under different losing models. When packets losing occur, the receiver will fill the lost packets with zero and perform erasure recovery process. If the lost column number is no more than the capacity of the array code, all lost packets will be recovered thoroughly. Otherwise, the lost packets will be discarded and a new shorten bit stream will be reconstructed from the received array. Then the WSOLA[10]algorithm will be carried over the new-generated bit stream.

    Based on the above considerations, an approach combining both sender-based and receiver-based techniques is proposed for VoIP communications QoS enhancement under various packet-loss conditions.

    The remainder of this paper is structured as follows. In Section 1, the main principles of STAR code and RS-code are recapitulated. The modified packet-level encoding and decoding algorithms are detailed for communication scenario. In Section 2 an overall algorithm framework is provided for packet-loss recovery and concealment and a prototype implementation is also presented. In Section 3, the performance of the approach is extensively evaluated for different types and levels of packet loss and for different byte rates. The effectiveness of different techniques is compared. In the Section 4, main conclusions are summarized.

    1 Packet-level array encoding and decoding

    First the problem definition is described briefly which was initially proposed to address disk failures in RAID systems[6,7].

    Problem definition: Considering an m×n array, p is a prime number, such that symbol aij(0

    It is supposed that a packet is the minimum unit which consists of two parts: packet header PH and data payload PL. When the packets are transmitted in the channel, if packet loss occurs, the whole packet will be considered erased. In the header, there is a unique serial number to indicate its sending order.

    As shown in Fig.1, the STAR code is a (p+3, p) MDS code, consisting of (p+3) columns, where the first p columns contain information data and the last 3 columns contain parity data.

    Let P(k)denote the minimum data unit, where k∈N and (0K)(0≤i≤I-1, 0≤j≤J-1) denote the place of packets array. Here, k also denotes the unique index number of a packet indicating its sending order, I denotes the rows number of the code array (I=p+2t); J denotes the columns number of the code array (J=p+3), and P denotes the total number of packets.

    For simplification, it is supposed the length of the header PH is zero and P(k)can be reduced and rewritten as P(k).

    Let K denote the maximum packet number containing in one packets block B(i, j). Index i denotes the row number of the packet and j denotes the column number.

    B(i, j)=[P(i, j, 0)P(i, j, 1)P(i, j, 2),…, P(i, j, K)]

    (1)

    Fig.1 STAR and RS coding scheme

    The STAR code array can be represented by B(i, j)as

    (2)

    For convenience, let P(i, j, k)=P(i, j, k), then all packets set P can be described as

    =PD∪PS∪PR∪PSR∪PM

    (3)

    PDdenotes the data packets region, PSdenotes the STAR coding parity packets region, PRdenotes the RS coding parity packets region, PMdenotes the imaginary packets region of STAR coding ,and PRSdenotes the RS parity packets region of the STAR coding parity packets. Therefore, the following formulas hold.

    (4)

    (5)

    (6)

    (7)

    (8)

    In this paper, the audio codec used is the international telecommunication union (ITU-T) standard G.729A CS-ACELP codec. Typically, G.729 supports a frame length of 10 ms and provides payload bit rates of 6.4 kb/s (Annex D), 8 kb/s (original, Annex A, and Annex C), and 11.8 kb/s (Annex E).

    From Ref.[1], it is known that the the maximum duration of the sending window should be less than 250ms. Let W(bitstr) be the count of the original data bits in a sending bitstream bitstr and ω denote the time window of such maximum duration. Let L be the bit count of a data packet.

    Let K=Count(B(i, j)) be the count of packets in a block B(i, j)that can be assigned by the user.Then, the following is got:

    W=ω·b

    (9)

    W=(p-1)·(p+3)·C(Block(i, j))·L

    (10)

    where, ω≤250ms, 0≤i≤p-1, 0≤j≤p+2. From above two equations, the following equation is got which will be used in the sending procedure:

    ω·b=(p-1)·(p+3)·K·L

    (11)

    Four packet placement schemes are defined which determine how the packets are placed by the sender as to adapt to different network environments as shown in Fig.2.

    Definition: packet placement schemes

    (1) Block column first: (P′(i, j))?(B(i, j))

    (2) Block row first: (P′(i, j))?(B(j, i))

    (3) Column interleave: (P′(i, j, k))?(P(i+j·I+I·J·k))

    (4) Row interleave: (P′(i, j, k))?(P(j+i·J+I·J·k))

    where, (0≤k≤K-1)

    Fig.2 Packets placement scheme

    2 Overall enhancement algorithm

    This section presents the idea of the proposed packet loss recovery and concealment algorithm.

    2.1 Sending procedure

    As shown in Fig.3, once the sender realizes that some of the current packets are lost via feedback information, it tries to start the sender-based loss-recovery techniques by using STAR coding. Otherwise, the sender will still handle all packets normally without any redundant coding information.

    When the sender decides to begin with redundant error mechanism, it firstly configs all parameters including window size W, block size K, etc. Column number p can be then calculated by the formula: (p-1)·(p+3)·K≤W/L,where L denotes the packet length with packet header and data payload. Note that p should be the maximum prime number that satisfies the inequations.

    If the RS-coding also needs to start, the algorithm will determine capacity t of RS-coding and recalculate the column number p according to (p-1)·(p+3)·K+2·t·K≤W/L. The algorithm will then perform RS encoding procedure and store the generated redundant packets into rows ranging from p to 2·t+p-1. Otherwise, RS-coding step will be skipped and begin STAR coding process directly.

    Next, the STAR encoding algorithm is initialized according to these given factors and determines the coding scheme. The redundant symbols can be obtained by STAR Encoding procedure and arranged into p, p+1 and p+2 columns correspondingly. Then, all data packets and redundant packets will be sent to the receiver sequentially.

    Generally, if the network status is not serious, the sender need not start RS-coding recovery mechanism. Moreover, the two erasure coding techniques are independent of each other and can be applied simultaneously.

    Fig.3 Packets sending procedure

    2.2 Receiving procedure

    As shown in Fig.4, similarly, at the receiving side, each received packet is stored in the same buffer row by row as the sender until the buffer has received the whole array. When the packets are transmitted in the channel, if packet loss has happened, the receiver will label the corresponding packet lost and clear its content. After that, all the packets in the buffer will be sent to the decoding component, and then the decoded packets will be sent to the concealment algorithm and playout.

    The whole receiving process is as follows. Firstly, the receiver will check the current coding scheme and calculate buffer requirement for packets array. If the data packets are integrity or only the parity packets are lost, the received parity packets will be discarded directly and decoding procedure can also be skipped. Otherwise, the recovery mechanism will be started immediately. The receiver will then check the lost column number and determine whether the lost columns is beyond the error correction capacity or not. If the STAR decoder can handle current lost columns, then the receiver will call STAR Decoding() procedure to recovery the lost data packets. Otherwise, the receiver will check whether RS-coding scheme has also been applied with the data packets. If true, RS Decoding will be performed to each lost column one by one and recover lost data packets. If the lost rows in a column is beyond the RS-coding capacity, then this column will be discarded and continue to next column.

    Fig.4 Packets recovery and concealment flowchart

    If the whole RS-coding procedure is executed, the receiver will restart STAR-coding procedure to recover the handled data packets again. If the current status is still greater than the capacity of STAR-coding, the lost data packets will be cleared and the final stream will be shorten correspondingly. Otherwise, STAR Decoding procedure will be carried on the data packets handled by RS-coding algorithm to recover lost data packets.

    Next, the new generated stream will be passed to WSOLA algorithm to perform concealment operation and prepared for playout. The time scale factor can be determined by calculating the rate of received stream length and source stream length.

    3 Experiment and evaluation

    In this section, the effectiveness of erasure coding and the end audio quality under various network conditions characterized by packet loss models, packet loss rates, burst loss lengths, and transmission delays is measured. The results show that the performance can be enhanced by applying the proposed method.

    3.1 Packet loss model

    The sender-based loss-recovery techniques have different levels of performance that are heavily sensitive to the packets-loss properties of the network. The IP network is an interconnection of packet switched data communication networks, composed of hybrid of various wire-line and wire-less transmission links, as well as satellite links. Packet loss may occur due to buffer overflow within the network, deliberate discard as a result of some congestion control policy or transmission errors. Several of the mechanisms that can lead to packet loss are of a transient nature and hence the resulting packet loss is bursty in nature.

    In this paper, three packet-loss models will be considered which are random loss model, burst loss model and Gilbert loss model.

    (1) Gilbert loss model

    In this paper, the 2-state Gilbert model[11]is considered to characterize the bursty channel behavior. This model is widely used for describing error patterns in transmission channels and for analyzing the efficiency of coding for packets losing and recovery. Bolot[12]also studied the distribution of packet loss in the Internet and concluded that this could be represented by a Gilbert or Elliott model.

    As shown in Fig.5, the usual notation of a good (G) and bad (B) state is shown. Each of them may generate errors as independent events at a state dependent error rate 1-g in the good and 1-h in the bad state, respectively. When the channel is in the good state, there are very few packet losses, whereas when the channel is in the bad state, many packets are lost.

    Fig.5 Gilbert loss model

    Packet losses in the bad and good states are independent and occur with rates λ and γ respectively.

    (2) Random loss model

    With random loss model packets are lost randomly. If packet loss is entirely independent from one instant to the next, random loss would be experienced. Random loss is a condition that is very favorable for many of the sender-based loss-recovery techniques due to the relatively rare occurrences of multiple consecutive lost packets with random loss. The probability of losing m consecutive packets in a random-loss scenario drops sharply as m increases. M is used which is in Eq.(12) to represent the random loss packet location

    M=rand(ε) 0<ε

    (12)

    (3) Simple burst loss model

    In burst loss scenario, if the current packet is lost, the next packet is also likely to be lost. For burst loss model it is assumed that a condition that causes the loss of a packet persists for some period of time and therefore causes us to lose one or more subsequent consecutive packets.

    In order to study the effects of bursts of lost packets and erasure coding scheme on audio quality, the simulator is programmed to simulate burst loss by discarding lost packets in group of random sizes. As shown Fig.6, there are three parameters to control the packet dropping process, which are

    bc-burst count

    bl-burst length of each time

    bt-burst time

    Fig.6 Burst loss model

    The burst packets losing rate PLR can be defined as

    (13)

    bti+bli·1≤bti+1

    (14)

    btbc-1+blbc-1≤W

    (15)

    In fact, the data packets will experience different delays when they are transmitted from the sender to the receiver over IP network. The inter-arrival time of the packets on the receiver will not be constant even though the packet inter departure time on the sender is constant, which results in a jitter that packets arrive at the destination with varying delays between packets. In the simulator, this factor is not considered.

    3.2 Simulation of packets loss

    Firstly, necessary variables and symbols are defined and summarized for evaluating the algorithm performance as follows.

    p-a prime number, total number of column in STAR-coding;

    t-number of rows, the capacity of RS-coding recovery;

    l-size of codeword in code (Reed Solomon code);

    L-number of bits of a packet (packet size);

    ω- time window size(ms);

    W-window size(bits);

    F-frame length (ms);

    PLR-packet loss rate(random, burst, Gilbert);

    α-time scaling factor(WSOLA);

    ρE-error rate of Gilbert Model;

    b-payload bit rates of audio sources(kbps);

    γ-state transition probability to change from the good state to the bad;

    λ-state transition probability to change from the bad state to the good;

    Te-source data packets encoding time;

    Ne-number of source data packets for encoding;

    Nd-number of received data packets for decoding;

    As shown in Fig.7, the simulation and test experiment process are described. In the sender, the original audio clips are taken from the public speech database. The internet communication environment is simulated by the simulator with three impairment profiles: random, burst and Gilbert loss models.

    To evaluate the approach comprehensively, two categories of testing experiments are provided:

    Pure performance tests: performance indexes and MOS rating[13]under various conditions of the algorithm.

    Comparison tests: audio quality comparison between plain delivery of G.729 and the array coding based enhancement approach.

    G.729[14]is selected in the experiment because it is an International Telecommunications Union standardized low bit-rate codec providing near toll quality. Generally, G.729 is a kind of code-excited linear prediction (CELP) codec and runs at 8 kbps with a 10 ms frame. Furthermore, a plain delivery approach is taken as a baseline for the purpose of comparison with the optimized techniques. Plain delivery is more prevalent than any other delivery technique in VoIP solutions which does not provide any sender-based effort to improve audio quality when packets loss occurs.

    Fig.7 Simulation process

    The involved pure performance indexes of algorithm are listed as below.

    MOS rating: audio quality result, in terms of the mean opinion score (MOS), which ranges from 1 (worst) to 5 (best).

    Encoding rate: encoding packets number per second with RS-coding or STAR coding.

    Decoding rate: decoding packets number per second with RS-coding or STAR coding.

    3.3 Experiment under different models

    (1) Experiment under random loss model

    Fig.8 presents the MOS ratings with 5, 10, 15, 20, 25, and 30 percent packet loss at random loss.

    (2) Experiment under Gilbert loss model

    Fig.9 presents the 5, 10, 15, 20, 25, and 30 percent packet loss at Gilbert loss.

    Fig.8 Experiment results under random loss model

    (3) Experiment under burst loss model

    Fig.10 presents the MOS ratings with 5, 10, 15, 20, 25, and 30 percent packet loss at burst model. The study indicates that STAR coding or STAR+RS coding frequently achieves a higher MOS rating than G.729A in various consecutive-loss tests.

    Fig.8~Fig.10(a),(b),(c) are the results of only the sender-based packet loss recovery , the recovery are STAR、STAR+RS and STAR+RS+PRS, and the Fig.8~Fig.10(d),(e),(f) are the results of sender-based packet loss recovery and receiver-based packet concealment, the packet concealment is WSOLA. It is seen that under the random loss model , the STAR coding achieves the best performance among the STAR coding , STAR+RS coding and STAR+RS+PRScoding. From Fig.8(a), it can be seen that if audio codec G.729 and after STAR redundant coding are selected, it can achieve better MOS score than onlyG.729 at all packet loss rate. If receiver exploits the WSOLA, from Fig.8(d), (e) and (f), it can be seen that the performance of STAR+WSOLA can achieve better performance than only G.729+WSOLA. Fig.9 shows that the results of Gilbert loss model are similar to those of random loss model.

    Fig.9 Experiment results under Gilbert loss model

    Fig.10 Experiment results under burst loss model

    Fig.10 is the results of burst loss model, from Fig. 10 (a), (b) and (c), it can be seen that the performance of STAR and STAR+RS are similar, they all can achieve higher MOS rating of all packet loss rate than only G.729. When receiver exploits the WSOLA, Fig. 10 (d), (e) and (f) show that if the packet loss is more than 15%, G.729+STAR+WSOLA and G.729+STAR+RS+WSOLA all can achieve higher score than only G.729+WSOLA, but if packet loss is too high, the results will be worse.

    3.4 Performance evaluation

    Due to special properties of array codes, the encoding and decoding procedure are performed with pure XOR and shift operation. The performance of the method is shown in Table 1.

    Table 1 Performance of encoding and decoding

    From Table 1 it can be seen that the rate of STAR coding is faster than STAR+RS coding because of the computational complexity of RS coding. And the decoding rate is little difference. So the delay of STAR coding is smaller than the STAR+RS coding.

    4 Conclusions and future work

    An efficient QoS enhancement mechanism based on array code for lost packets recovery is proposed. The experimental results have shown that the method has low computational complexity and lower delay which proves that the array coding in VoIP system has a good effect on packet loss recovery, and is suitable for real-time applications. This method is suitable for random packet loss model, the Gilbert packet loss model and the burst packet loss model.

    In the following studies, the proposed method will be applied to more complex models to test its performance under new environment, and make it widely use in the VoIP system in the future.

    [ 1] Brady P T. Effects of transmission delay on conversational behavior on echo-free telephone circuits. Bell Labs Technical Journal, 1971, 50(1):115-134

    [ 2] MacWilliams F J, Sloane N J A. The Theory of Error Correcting Codes. Amsterdam: North-Holland, 1977. 11-33

    [ 3] Jin H, Cortes T, Buyya R. High Performance Mass Storage and Parallel I/O. New Jersey/New York: John Wiley & Sons, 2001. 187-208

    [ 4] Xu L, Bohossian V, Bruck J, et al. Low-density MDS codes and factors of complete graphs. IEEE Transactions on Information Theory, 1999,45(6):1817-1826

    [ 5] Xu L, Bruck J. X-code: MDS array codes with optimal encoding. IEEE Transactions on Information Theory, 1999,45(1):272-276

    [ 6] Blaum M. A family of MDS array codes with minimal number of encoding operations. In: Proceedings of the IEEE International Symposium on Information Theory, Seattle, USA, 2006. 2784-2788

    [ 7] Huang C, Xu L. STAR: an efficient coding scheme for correcting triple storage node failures. In: Proceedings of the Usenix Conference on File & Storage Technologies, San Francisco, USA, 2005. 889-901

    [ 8] Tamo I, Wang Z, Bruck J. Zigzag codes: MDS array codes with optimal rebuilding. IEEE Transactions on Information Theory, 2015, 59(3):1597-1616

    [ 9] Wang Y, Li G, Zhong X. Triple-Star: a coding scheme with optimal encoding complexity for tolerating triple disk failures in RAID. International Journal of Innovative Computing, Information and Control,2012,8(3): 1731-1742

    [10] Verhelst W, Roelands M. An overlap-add technique based on waveform similarity (WSOLA) for high quality time-scale modification of speech. IEEE International Conference on Acoustics, 2002,2(2):554-557

    [11] Hasslinger G, Hohlfeld O. The Gilbert-Elliott model for packet loss in real time services on the Internet measuring. In: Proceedings of the GI/ITG Conference of Measuring, Modelling and Evaluation of Computer and Communication Systems, Dortmund, Germany, 2008. 1-15

    [12] Bolot J, Fosse-Parisis S, Towsley D. Adaptive FEC-based error control for interactive audio in the Internet. In: Proceedings of IEEE Infocom, New York, USA, 1998. 1453-1460

    [13] Chua T K, Pheanis D C. QoS Evaluation of Sender-Based Loss-Recovery Techniques for VoIP. IEEE Network , 2006,20(6):14-22

    [14] Telecommunication Standardization Sector of ITU. G.729 Coding of Speech at 8 kbit/s Using Conjugate-Structure Algebraic-Code-Excited Linear Prediction. Geneva: International Telecommunication Union.1996

    Li Zhen, born in 1978. She received her Master degree in Hebei University of Technology in 2003. She worked in Communication University of China since 2003. Her research interests include the digital signal processor, voice communication and speech enhancement.

    10.3772/j.issn.1006-6748.2017.04.007

    ①Supported by the National Science and Technology Planning Project (No. 2012BAH38F00).

    ①To whom correspondence should be addressed. E-mail: lizhen@cuc.edu.cn

    on Jan. 10, 2017*, Zhang Qin*

    data packets decoding and recovery time;

    亚洲av成人av| 国产探花在线观看一区二区| 97超视频在线观看视频| 亚洲国产精品合色在线| 欧美成人午夜免费资源| 听说在线观看完整版免费高清| 久久久久久久亚洲中文字幕| 两个人视频免费观看高清| 亚洲国产欧洲综合997久久,| 国产精品一区二区三区四区免费观看| 成人综合一区亚洲| 日韩 亚洲 欧美在线| 嫩草影院新地址| 久久久精品欧美日韩精品| 一区二区三区高清视频在线| 免费无遮挡裸体视频| 久久久久久久国产电影| 午夜免费激情av| 国产一区二区亚洲精品在线观看| 中文欧美无线码| 日本-黄色视频高清免费观看| 久久鲁丝午夜福利片| 国产精品麻豆人妻色哟哟久久 | 国产午夜精品久久久久久一区二区三区| 国产毛片a区久久久久| 99热精品在线国产| 高清毛片免费看| 欧美3d第一页| 国产淫片久久久久久久久| 久久精品久久精品一区二区三区| 嫩草影院新地址| 精品午夜福利在线看| av播播在线观看一区| 午夜日本视频在线| 国产黄片美女视频| 伦理电影大哥的女人| 国产亚洲av片在线观看秒播厂 | 免费av毛片视频| 免费观看在线日韩| 女人久久www免费人成看片 | 日韩av不卡免费在线播放| 两个人的视频大全免费| 夫妻性生交免费视频一级片| 欧美+日韩+精品| 天堂影院成人在线观看| 精品久久久久久成人av| 1024手机看黄色片| 毛片一级片免费看久久久久| 国产精品日韩av在线免费观看| 中文欧美无线码| 婷婷色麻豆天堂久久 | 男女国产视频网站| 久久精品夜夜夜夜夜久久蜜豆| 91aial.com中文字幕在线观看| 亚洲色图av天堂| 女人久久www免费人成看片 | 在线免费观看的www视频| 日本午夜av视频| 亚洲自拍偷在线| 成人毛片60女人毛片免费| 国产午夜福利久久久久久| 久久精品国产亚洲av涩爱| 精品久久久噜噜| 国产免费又黄又爽又色| 久久久精品大字幕| 久久精品国产鲁丝片午夜精品| 啦啦啦啦在线视频资源| 一卡2卡三卡四卡精品乱码亚洲| 热99re8久久精品国产| 一夜夜www| 九九久久精品国产亚洲av麻豆| 国产精品不卡视频一区二区| 国产欧美日韩精品一区二区| 直男gayav资源| 亚洲精品乱码久久久v下载方式| 尤物成人国产欧美一区二区三区| 淫秽高清视频在线观看| 亚洲18禁久久av| 日韩欧美三级三区| 日本wwww免费看| 国产三级在线视频| 日本黄大片高清| 国产三级中文精品| 国产乱人视频| 一区二区三区高清视频在线| 免费av不卡在线播放| 波野结衣二区三区在线| 国产午夜精品论理片| 久久久久久久久久成人| kizo精华| 国产淫片久久久久久久久| 亚洲av熟女| 男女视频在线观看网站免费| 一区二区三区乱码不卡18| 97热精品久久久久久| 中国国产av一级| 青青草视频在线视频观看| 长腿黑丝高跟| 男女边吃奶边做爰视频| 亚洲av成人av| 99在线人妻在线中文字幕| 高清av免费在线| 亚洲熟妇中文字幕五十中出| 久久久久久久久大av| 国产黄a三级三级三级人| 亚洲熟妇中文字幕五十中出| 色吧在线观看| 亚洲综合色惰| 精品国产三级普通话版| 色综合亚洲欧美另类图片| 免费播放大片免费观看视频在线观看 | 久久久久久伊人网av| 国产三级在线视频| ponron亚洲| eeuss影院久久| 国产一区二区在线av高清观看| 亚洲国产精品成人综合色| 精品无人区乱码1区二区| 国产色爽女视频免费观看| 中文资源天堂在线| 亚洲成色77777| av.在线天堂| 欧美日韩一区二区视频在线观看视频在线 | 久久久久久久亚洲中文字幕| 国产亚洲av片在线观看秒播厂 | 免费大片18禁| 国产黄色小视频在线观看| 国产高清有码在线观看视频| 亚洲精品国产av成人精品| 午夜精品在线福利| 欧美色视频一区免费| 午夜激情欧美在线| 亚洲欧美中文字幕日韩二区| 精品欧美国产一区二区三| 免费观看的影片在线观看| av视频在线观看入口| 亚洲五月天丁香| 亚洲国产精品成人综合色| 欧美zozozo另类| 大香蕉97超碰在线| 插阴视频在线观看视频| 亚洲欧美中文字幕日韩二区| 超碰97精品在线观看| 久热久热在线精品观看| 如何舔出高潮| 国产成人精品一,二区| av在线老鸭窝| 国产又黄又爽又无遮挡在线| 美女被艹到高潮喷水动态| 秋霞伦理黄片| 亚洲人成网站在线观看播放| 人人妻人人澡人人爽人人夜夜 | 午夜精品在线福利| 最近的中文字幕免费完整| 久久99热6这里只有精品| 久热久热在线精品观看| 在线播放国产精品三级| 亚洲无线观看免费| .国产精品久久| 成人毛片60女人毛片免费| 国产av在哪里看| 亚洲自偷自拍三级| 成人特级av手机在线观看| 我要搜黄色片| 日韩成人av中文字幕在线观看| 天天躁日日操中文字幕| 亚洲欧美中文字幕日韩二区| 内地一区二区视频在线| 成人一区二区视频在线观看| 看黄色毛片网站| 欧美区成人在线视频| 国产极品精品免费视频能看的| 亚洲欧美日韩无卡精品| 少妇的逼好多水| av卡一久久| av女优亚洲男人天堂| 国产麻豆成人av免费视频| 亚洲精品一区蜜桃| 在线播放国产精品三级| 成人一区二区视频在线观看| 九草在线视频观看| 国产午夜福利久久久久久| 婷婷色麻豆天堂久久 | 99久国产av精品国产电影| 建设人人有责人人尽责人人享有的 | 免费人成在线观看视频色| 天堂av国产一区二区熟女人妻| 国产精品不卡视频一区二区| 1000部很黄的大片| 国产一区二区在线观看日韩| 黑人高潮一二区| 我要看日韩黄色一级片| 色播亚洲综合网| 亚洲精品国产av成人精品| 麻豆成人午夜福利视频| 欧美另类亚洲清纯唯美| 18+在线观看网站| 亚洲成色77777| 亚洲精品,欧美精品| 精品一区二区免费观看| 久久久精品94久久精品| 噜噜噜噜噜久久久久久91| 91久久精品国产一区二区成人| 免费观看的影片在线观看| 91精品国产九色| 欧美成人精品欧美一级黄| 日韩一区二区视频免费看| 欧美激情国产日韩精品一区| 国产成人精品久久久久久| 国产一区二区在线观看日韩| 国产国拍精品亚洲av在线观看| 大香蕉97超碰在线| 久久精品国产亚洲av天美| 久久久欧美国产精品| 一个人看的www免费观看视频| 亚洲精品自拍成人| 欧美精品国产亚洲| 一区二区三区免费毛片| 最近手机中文字幕大全| 成年免费大片在线观看| 日韩一区二区视频免费看| 黄色日韩在线| 欧美又色又爽又黄视频| 亚洲18禁久久av| 有码 亚洲区| 免费av观看视频| 成人一区二区视频在线观看| 亚洲国产精品合色在线| 国产三级在线视频| 中文精品一卡2卡3卡4更新| 99国产精品一区二区蜜桃av| 嘟嘟电影网在线观看| 欧美变态另类bdsm刘玥| 全区人妻精品视频| 亚洲精品日韩av片在线观看| 国产一区二区在线av高清观看| 18禁在线无遮挡免费观看视频| 亚洲欧美中文字幕日韩二区| 久久久a久久爽久久v久久| 人妻制服诱惑在线中文字幕| 2021天堂中文幕一二区在线观| 丰满人妻一区二区三区视频av| 亚洲欧美日韩卡通动漫| 国产人妻一区二区三区在| 国产91av在线免费观看| 可以在线观看毛片的网站| 久久精品91蜜桃| 在线免费观看的www视频| 日本av手机在线免费观看| 人妻少妇偷人精品九色| 内地一区二区视频在线| 天堂av国产一区二区熟女人妻| www.av在线官网国产| 2022亚洲国产成人精品| 久久人人爽人人爽人人片va| 亚洲婷婷狠狠爱综合网| 欧美3d第一页| 看片在线看免费视频| 亚洲欧美精品自产自拍| 国产精品av视频在线免费观看| 我要看日韩黄色一级片| 少妇熟女欧美另类| 久久久久久久亚洲中文字幕| 亚洲色图av天堂| 亚洲国产精品sss在线观看| 久久久精品欧美日韩精品| 久久精品夜色国产| 欧美日韩国产亚洲二区| 天天躁夜夜躁狠狠久久av| 久久人人爽人人爽人人片va| 麻豆成人午夜福利视频| av线在线观看网站| 亚洲欧美日韩东京热| 日韩欧美 国产精品| 亚洲精品色激情综合| 国产高清有码在线观看视频| 国产美女午夜福利| 天堂av国产一区二区熟女人妻| www.av在线官网国产| 自拍偷自拍亚洲精品老妇| 亚洲av成人av| 春色校园在线视频观看| 内地一区二区视频在线| 日韩国内少妇激情av| 黄片无遮挡物在线观看| 亚洲av福利一区| 久久午夜福利片| 国产v大片淫在线免费观看| 伊人久久精品亚洲午夜| 中文字幕av成人在线电影| 国产高清视频在线观看网站| 亚洲精品国产av成人精品| 建设人人有责人人尽责人人享有的 | 一个人看视频在线观看www免费| 永久网站在线| 国产精品av视频在线免费观看| 高清av免费在线| 99久久精品国产国产毛片| 亚洲人成网站高清观看| 久久久久久久久久久免费av| av免费观看日本| 精品免费久久久久久久清纯| 亚洲av不卡在线观看| 欧美日本视频| 婷婷色麻豆天堂久久 | 亚洲美女搞黄在线观看| 久久久久久久久久成人| 国产高潮美女av| 成年女人永久免费观看视频| 国产老妇伦熟女老妇高清| 国产精品麻豆人妻色哟哟久久 | 特级一级黄色大片| 久久久亚洲精品成人影院| 黑人高潮一二区| 日韩亚洲欧美综合| 中文在线观看免费www的网站| 九草在线视频观看| 人人妻人人澡欧美一区二区| or卡值多少钱| 水蜜桃什么品种好| 国产伦在线观看视频一区| 亚洲乱码一区二区免费版| 青春草亚洲视频在线观看| 啦啦啦啦在线视频资源| 久久鲁丝午夜福利片| 97人妻精品一区二区三区麻豆| 国产精品女同一区二区软件| 国产精品美女特级片免费视频播放器| 看片在线看免费视频| 国产三级在线视频| 免费大片18禁| 亚洲国产精品久久男人天堂| 免费看光身美女| 久久精品国产自在天天线| 免费大片18禁| 女人被狂操c到高潮| 成人高潮视频无遮挡免费网站| 日韩精品青青久久久久久| 色综合站精品国产| 麻豆精品久久久久久蜜桃| 日日摸夜夜添夜夜添av毛片| 亚洲精品亚洲一区二区| 91久久精品国产一区二区三区| 建设人人有责人人尽责人人享有的 | 在线天堂最新版资源| 成人一区二区视频在线观看| 永久网站在线| 色综合站精品国产| 国产中年淑女户外野战色| 夜夜爽夜夜爽视频| 男女啪啪激烈高潮av片| 中国国产av一级| 极品教师在线视频| 欧美高清成人免费视频www| 亚洲精品,欧美精品| 男女边吃奶边做爰视频| 久久久国产成人免费| 看片在线看免费视频| 精华霜和精华液先用哪个| 六月丁香七月| 国产综合懂色| 亚洲第一区二区三区不卡| 长腿黑丝高跟| 亚洲国产色片| 成人一区二区视频在线观看| 日产精品乱码卡一卡2卡三| 淫秽高清视频在线观看| 久久精品久久久久久久性| 亚洲在久久综合| 久久这里只有精品中国| 国语对白做爰xxxⅹ性视频网站| 美女被艹到高潮喷水动态| 男人舔奶头视频| 亚洲av电影在线观看一区二区三区 | 亚洲欧美日韩高清专用| 午夜精品一区二区三区免费看| 国内精品美女久久久久久| 成人特级av手机在线观看| 国产亚洲一区二区精品| 成年版毛片免费区| 日韩大片免费观看网站 | 国产在视频线在精品| 国产爱豆传媒在线观看| 亚洲欧美日韩卡通动漫| 99久久成人亚洲精品观看| 精品熟女少妇av免费看| 欧美一区二区国产精品久久精品| 一级黄片播放器| 免费av不卡在线播放| 九色成人免费人妻av| 麻豆精品久久久久久蜜桃| 免费看光身美女| 久久99热这里只有精品18| 99久久精品国产国产毛片| 亚洲无线观看免费| 日本午夜av视频| 丰满少妇做爰视频| 日韩在线高清观看一区二区三区| 少妇丰满av| 男插女下体视频免费在线播放| 日韩一区二区视频免费看| 日本与韩国留学比较| 91在线精品国自产拍蜜月| 久久久精品大字幕| 男女下面进入的视频免费午夜| 一边摸一边抽搐一进一小说| 成人美女网站在线观看视频| 亚洲精品乱码久久久久久按摩| 91精品伊人久久大香线蕉| 国产亚洲av片在线观看秒播厂 | 国产精品久久电影中文字幕| 亚洲国产高清在线一区二区三| 久久久久久久午夜电影| 亚洲av不卡在线观看| 国内精品美女久久久久久| 最近中文字幕高清免费大全6| 韩国高清视频一区二区三区| 免费看光身美女| 97超视频在线观看视频| 超碰97精品在线观看| 一级黄色大片毛片| 国产av不卡久久| 久久久精品欧美日韩精品| 久热久热在线精品观看| 九九在线视频观看精品| 少妇裸体淫交视频免费看高清| 亚洲国产精品久久男人天堂| 日韩欧美 国产精品| 69av精品久久久久久| 国产成人精品一,二区| 日韩av不卡免费在线播放| 一个人观看的视频www高清免费观看| kizo精华| 婷婷六月久久综合丁香| a级毛色黄片| 欧美不卡视频在线免费观看| 少妇的逼好多水| 国产精品蜜桃在线观看| 欧美日韩一区二区视频在线观看视频在线 | 在线观看66精品国产| 男女那种视频在线观看| 久久久久性生活片| 日韩国内少妇激情av| 国产亚洲91精品色在线| 国产视频内射| 精品国产露脸久久av麻豆 | 中文天堂在线官网| 一夜夜www| 十八禁国产超污无遮挡网站| 亚洲欧美日韩无卡精品| 乱系列少妇在线播放| 99久久九九国产精品国产免费| 国产成人精品婷婷| 亚洲欧美精品综合久久99| av福利片在线观看| 超碰av人人做人人爽久久| 国产综合懂色| av播播在线观看一区| 久久久国产成人免费| 黄色配什么色好看| 精品午夜福利在线看| 特大巨黑吊av在线直播| 国产高潮美女av| 女人十人毛片免费观看3o分钟| 日韩一区二区视频免费看| 国产伦精品一区二区三区视频9| 韩国高清视频一区二区三区| 午夜福利在线观看免费完整高清在| 视频中文字幕在线观看| 久久久欧美国产精品| 搡女人真爽免费视频火全软件| 免费在线观看成人毛片| 免费观看在线日韩| 搡老妇女老女人老熟妇| 国产精品野战在线观看| 亚洲精品色激情综合| 久热久热在线精品观看| 成人毛片60女人毛片免费| 精品久久久久久久末码| 欧美人与善性xxx| 国产亚洲午夜精品一区二区久久 | 色综合亚洲欧美另类图片| 国产精品一二三区在线看| 亚洲第一区二区三区不卡| 免费观看性生交大片5| 亚洲人成网站在线观看播放| 爱豆传媒免费全集在线观看| 国产v大片淫在线免费观看| 久久久亚洲精品成人影院| 精品欧美国产一区二区三| 亚洲成色77777| 两个人视频免费观看高清| 18+在线观看网站| av又黄又爽大尺度在线免费看 | av在线亚洲专区| 变态另类丝袜制服| 天堂影院成人在线观看| 欧美日韩精品成人综合77777| 国产中年淑女户外野战色| 永久网站在线| av卡一久久| 伦精品一区二区三区| 高清av免费在线| 日韩欧美国产在线观看| eeuss影院久久| 一级黄片播放器| 天堂中文最新版在线下载 | 中文字幕亚洲精品专区| 国产一级毛片七仙女欲春2| 免费搜索国产男女视频| 波多野结衣巨乳人妻| 五月玫瑰六月丁香| 国产综合懂色| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 青春草国产在线视频| 伦精品一区二区三区| 男女国产视频网站| 国产成人a区在线观看| 国产极品天堂在线| 欧美成人a在线观看| 熟妇人妻久久中文字幕3abv| 麻豆国产97在线/欧美| 成人欧美大片| 国产国拍精品亚洲av在线观看| 亚洲精品一区蜜桃| 五月伊人婷婷丁香| 国产精品久久久久久久久免| 国产精品国产三级专区第一集| 久久久国产成人免费| 中文亚洲av片在线观看爽| 亚洲欧美日韩卡通动漫| 91精品一卡2卡3卡4卡| 99九九线精品视频在线观看视频| 国产精品野战在线观看| 国产男人的电影天堂91| 日韩欧美国产在线观看| 久久这里只有精品中国| 成人亚洲精品av一区二区| 波多野结衣高清无吗| 国产黄色视频一区二区在线观看 | 日本爱情动作片www.在线观看| 尾随美女入室| 嫩草影院精品99| 国产伦在线观看视频一区| 国国产精品蜜臀av免费| 大又大粗又爽又黄少妇毛片口| 欧美精品国产亚洲| 最近最新中文字幕大全电影3| 欧美bdsm另类| 晚上一个人看的免费电影| 亚洲精品日韩在线中文字幕| 人妻少妇偷人精品九色| 午夜福利高清视频| 国产精品一区www在线观看| 国内少妇人妻偷人精品xxx网站| 大香蕉97超碰在线| 高清午夜精品一区二区三区| 国语对白做爰xxxⅹ性视频网站| 在线a可以看的网站| 免费av毛片视频| 成人亚洲精品av一区二区| 97人妻精品一区二区三区麻豆| 韩国高清视频一区二区三区| 国产极品天堂在线| 超碰97精品在线观看| 成人三级黄色视频| 麻豆av噜噜一区二区三区| 日韩欧美精品v在线| 嘟嘟电影网在线观看| 国产爱豆传媒在线观看| 亚洲国产色片| 日本免费一区二区三区高清不卡| 成人av在线播放网站| 午夜福利在线观看免费完整高清在| 日本欧美国产在线视频| 大话2 男鬼变身卡| 亚洲欧美中文字幕日韩二区| 中文字幕av成人在线电影| 国产人妻一区二区三区在| 91午夜精品亚洲一区二区三区| 能在线免费观看的黄片| 男女啪啪激烈高潮av片| 国产精品熟女久久久久浪| 成人毛片a级毛片在线播放| 好男人在线观看高清免费视频| 欧美三级亚洲精品| 亚洲四区av| 成人毛片a级毛片在线播放| 免费在线观看成人毛片| av播播在线观看一区| 超碰97精品在线观看| 少妇被粗大猛烈的视频| 亚洲人成网站在线播| 久久久久久伊人网av| 99热这里只有是精品50| 免费不卡的大黄色大毛片视频在线观看 | 亚洲美女视频黄频| 亚洲久久久久久中文字幕| 七月丁香在线播放| 国产伦精品一区二区三区四那| 欧美一区二区国产精品久久精品| 亚洲欧美成人精品一区二区| 深爱激情五月婷婷| 少妇高潮的动态图| 亚洲综合精品二区| 一区二区三区高清视频在线| 亚洲人与动物交配视频| 在线观看av片永久免费下载| 免费在线观看成人毛片| 少妇人妻一区二区三区视频| 国产91av在线免费观看| 国产成人免费观看mmmm| 中文字幕久久专区| 久久久精品欧美日韩精品| 亚洲最大成人中文|