• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An efficient QoS enhancement mechanism of VoIP using erasure array codes①

    2017-12-19 00:39:34LiZhenRenHuiLiuWenboGaoXinyan
    High Technology Letters 2017年4期

    Li Zhen (李 真), Ren Hui, Liu Wenbo, Gao Xinyan

    (*School of Information Engineering, Communication University of China, Beijing 100024, P.R.China) (**School of Software, Dalian University of Technology, Dalian 116024, P.R.China)

    An efficient QoS enhancement mechanism of VoIP using erasure array codes①

    Li Zhen (李 真)②, Ren Hui*, Liu Wenbo**, Gao Xinyan**

    (*School of Information Engineering, Communication University of China, Beijing 100024, P.R.China) (**School of Software, Dalian University of Technology, Dalian 116024, P.R.China)

    In order to solve the problem of losing voice packets in voice over internet protocol (VoIP), a kind of lost packets double recovery algorithm is proposed. The algorithm is based on erasure coding technique which comes from highly available data storage systems. An efficient coding scheme with higher tolerance based on STAR and Reed-Solomon (RS) erasure code is described. An efficient method is also provided which could transform the voice data packets of one dimensional bit stream into two dimensional array according to given window size. If the lost rate has increased beyond the error correction capability, packet-loss concealment will be adopted. Under various conditions of packet-loss simulation during the experiments, the algorithm has proved its better performance on MOS rating and coding rate.

    packet loss recovery, voice over internet protocol (VoIP), quality of service (QoS), array code

    0 Introduction

    It is well known that VoIP is a real-time transport protocol running on top of the user datagram protocol (UDP). Quality of service (QoS) is a major issue in VoIP applications. However, UDP is an unreliable delivery protocol. When routers of the packet-switched network are overloaded, some voice packets will be lost inevitably. Moreover, in real-time communications a voice packet that arrives at the receiving endpoint too late will be useless and has to be disregarded correspondingly. When losing packets happens, the quality of the audio at the receiving endpoint degrades greatly.

    To defend the problem of lost packets, researchers have proposed two classes of techniques for improving QoS, which are sender-based techniques and receiver-based techniques respectively, where receiver-based techniques employ packet-loss concealment algorithms to synthesize audio when packets of audio data are missing, while for sender-based loss-recovery techniques, the sender acts an active role to help the receiver recover lost information to improve QoS when packet loss occurs. Most sender-based lose-recovery methods work by transmitting redundant data to some degree. These approaches will consume additional resources such as network bandwidth and CPU capacity, which will conversely make the losing packet problem worse. Therefore, there should make a reasonable trade-off between additional resource consumption and redundant degree.

    Sender-based loss-recovery techniques typically introduce extra end-to-end delay into the media stream. Generally, humans cannot even perceive a one-way delay of less than 100ms, and most users can tolerate a one-way delay of up to 250ms. If the one-way delay exceeds 250ms, however, the delay would result in a serious talker-overlap effect that is intolerable for most users[1]. Therefore, additional delays should be considered as well as other factors such as bandwidth consumption when evaluating the feasibility and effectiveness of loss-recovery techniques.

    In data storage systems, there exists a big family of coding schemes which can be used to correct storage node failure for a given data redundancy. Maximum distance separable (MDS)[2]array codes are such error-correcting codes that have important applications in communication and highly available storage systems such as redundant arrays of inexpensive disks (RAID) architecture.

    Up to now, a number of MDS array codes have been studied, such as EVENODD[3], B-code[4], X-code[5], row-diagonal parity (RDP)[6], STAR code[7], zigzag code[8], etc.

    In general, an array code consists of arrays of size m×n, with each element of an array storing one symbol, which can be a simple bit, a byte or a binary string for any length. Among the n columns, k columns store the information symbols and r columns store the parity-check symbols (n=r+k). If the array code can tolerate any r storage node erasures, in an MDS array code, the information symbols can be recovered from any k columns.

    Most of them are designed to correct multiple node erasures. For example, the RDP code and the EVENODD code can tolerate any two node erasures. MDS array codes such as the generalized EVENODD, STAR, Triple-Star[9]and generalized RDP can tolerate any three erasures.

    Recently, array codes have been further studied and gradually applied to overcome the lost packets problem in real-time data communication area. In 2010,1-D interleaved parity codes were standardized by internet engineering task force (IETF) in request for comments (RFC) 6015 to recover lost packets in real-time transport protocol over UDP to transport data packets.

    Generally, the sender-based techniques are independent of the receiver-based techniques, so designers can combine both types of loss-recovery methods simultaneously.

    In this paper, the sender-based forward error correction technique is mainly focused on and the array code scheme (STAR code) is applied with multiple erasure correction capacity to construct a packets loss-recovery approach. The STAR code also combines with the traditional RS code which is always used in the sender-based loss-recovery. The key procedure of our method is to transform the original bit stream into two dimensional packet array under different losing models. When packets losing occur, the receiver will fill the lost packets with zero and perform erasure recovery process. If the lost column number is no more than the capacity of the array code, all lost packets will be recovered thoroughly. Otherwise, the lost packets will be discarded and a new shorten bit stream will be reconstructed from the received array. Then the WSOLA[10]algorithm will be carried over the new-generated bit stream.

    Based on the above considerations, an approach combining both sender-based and receiver-based techniques is proposed for VoIP communications QoS enhancement under various packet-loss conditions.

    The remainder of this paper is structured as follows. In Section 1, the main principles of STAR code and RS-code are recapitulated. The modified packet-level encoding and decoding algorithms are detailed for communication scenario. In Section 2 an overall algorithm framework is provided for packet-loss recovery and concealment and a prototype implementation is also presented. In Section 3, the performance of the approach is extensively evaluated for different types and levels of packet loss and for different byte rates. The effectiveness of different techniques is compared. In the Section 4, main conclusions are summarized.

    1 Packet-level array encoding and decoding

    First the problem definition is described briefly which was initially proposed to address disk failures in RAID systems[6,7].

    Problem definition: Considering an m×n array, p is a prime number, such that symbol aij(0

    It is supposed that a packet is the minimum unit which consists of two parts: packet header PH and data payload PL. When the packets are transmitted in the channel, if packet loss occurs, the whole packet will be considered erased. In the header, there is a unique serial number to indicate its sending order.

    As shown in Fig.1, the STAR code is a (p+3, p) MDS code, consisting of (p+3) columns, where the first p columns contain information data and the last 3 columns contain parity data.

    Let P(k)denote the minimum data unit, where k∈N and (0K)(0≤i≤I-1, 0≤j≤J-1) denote the place of packets array. Here, k also denotes the unique index number of a packet indicating its sending order, I denotes the rows number of the code array (I=p+2t); J denotes the columns number of the code array (J=p+3), and P denotes the total number of packets.

    For simplification, it is supposed the length of the header PH is zero and P(k)can be reduced and rewritten as P(k).

    Let K denote the maximum packet number containing in one packets block B(i, j). Index i denotes the row number of the packet and j denotes the column number.

    B(i, j)=[P(i, j, 0)P(i, j, 1)P(i, j, 2),…, P(i, j, K)]

    (1)

    Fig.1 STAR and RS coding scheme

    The STAR code array can be represented by B(i, j)as

    (2)

    For convenience, let P(i, j, k)=P(i, j, k), then all packets set P can be described as

    =PD∪PS∪PR∪PSR∪PM

    (3)

    PDdenotes the data packets region, PSdenotes the STAR coding parity packets region, PRdenotes the RS coding parity packets region, PMdenotes the imaginary packets region of STAR coding ,and PRSdenotes the RS parity packets region of the STAR coding parity packets. Therefore, the following formulas hold.

    (4)

    (5)

    (6)

    (7)

    (8)

    In this paper, the audio codec used is the international telecommunication union (ITU-T) standard G.729A CS-ACELP codec. Typically, G.729 supports a frame length of 10 ms and provides payload bit rates of 6.4 kb/s (Annex D), 8 kb/s (original, Annex A, and Annex C), and 11.8 kb/s (Annex E).

    From Ref.[1], it is known that the the maximum duration of the sending window should be less than 250ms. Let W(bitstr) be the count of the original data bits in a sending bitstream bitstr and ω denote the time window of such maximum duration. Let L be the bit count of a data packet.

    Let K=Count(B(i, j)) be the count of packets in a block B(i, j)that can be assigned by the user.Then, the following is got:

    W=ω·b

    (9)

    W=(p-1)·(p+3)·C(Block(i, j))·L

    (10)

    where, ω≤250ms, 0≤i≤p-1, 0≤j≤p+2. From above two equations, the following equation is got which will be used in the sending procedure:

    ω·b=(p-1)·(p+3)·K·L

    (11)

    Four packet placement schemes are defined which determine how the packets are placed by the sender as to adapt to different network environments as shown in Fig.2.

    Definition: packet placement schemes

    (1) Block column first: (P′(i, j))?(B(i, j))

    (2) Block row first: (P′(i, j))?(B(j, i))

    (3) Column interleave: (P′(i, j, k))?(P(i+j·I+I·J·k))

    (4) Row interleave: (P′(i, j, k))?(P(j+i·J+I·J·k))

    where, (0≤k≤K-1)

    Fig.2 Packets placement scheme

    2 Overall enhancement algorithm

    This section presents the idea of the proposed packet loss recovery and concealment algorithm.

    2.1 Sending procedure

    As shown in Fig.3, once the sender realizes that some of the current packets are lost via feedback information, it tries to start the sender-based loss-recovery techniques by using STAR coding. Otherwise, the sender will still handle all packets normally without any redundant coding information.

    When the sender decides to begin with redundant error mechanism, it firstly configs all parameters including window size W, block size K, etc. Column number p can be then calculated by the formula: (p-1)·(p+3)·K≤W/L,where L denotes the packet length with packet header and data payload. Note that p should be the maximum prime number that satisfies the inequations.

    If the RS-coding also needs to start, the algorithm will determine capacity t of RS-coding and recalculate the column number p according to (p-1)·(p+3)·K+2·t·K≤W/L. The algorithm will then perform RS encoding procedure and store the generated redundant packets into rows ranging from p to 2·t+p-1. Otherwise, RS-coding step will be skipped and begin STAR coding process directly.

    Next, the STAR encoding algorithm is initialized according to these given factors and determines the coding scheme. The redundant symbols can be obtained by STAR Encoding procedure and arranged into p, p+1 and p+2 columns correspondingly. Then, all data packets and redundant packets will be sent to the receiver sequentially.

    Generally, if the network status is not serious, the sender need not start RS-coding recovery mechanism. Moreover, the two erasure coding techniques are independent of each other and can be applied simultaneously.

    Fig.3 Packets sending procedure

    2.2 Receiving procedure

    As shown in Fig.4, similarly, at the receiving side, each received packet is stored in the same buffer row by row as the sender until the buffer has received the whole array. When the packets are transmitted in the channel, if packet loss has happened, the receiver will label the corresponding packet lost and clear its content. After that, all the packets in the buffer will be sent to the decoding component, and then the decoded packets will be sent to the concealment algorithm and playout.

    The whole receiving process is as follows. Firstly, the receiver will check the current coding scheme and calculate buffer requirement for packets array. If the data packets are integrity or only the parity packets are lost, the received parity packets will be discarded directly and decoding procedure can also be skipped. Otherwise, the recovery mechanism will be started immediately. The receiver will then check the lost column number and determine whether the lost columns is beyond the error correction capacity or not. If the STAR decoder can handle current lost columns, then the receiver will call STAR Decoding() procedure to recovery the lost data packets. Otherwise, the receiver will check whether RS-coding scheme has also been applied with the data packets. If true, RS Decoding will be performed to each lost column one by one and recover lost data packets. If the lost rows in a column is beyond the RS-coding capacity, then this column will be discarded and continue to next column.

    Fig.4 Packets recovery and concealment flowchart

    If the whole RS-coding procedure is executed, the receiver will restart STAR-coding procedure to recover the handled data packets again. If the current status is still greater than the capacity of STAR-coding, the lost data packets will be cleared and the final stream will be shorten correspondingly. Otherwise, STAR Decoding procedure will be carried on the data packets handled by RS-coding algorithm to recover lost data packets.

    Next, the new generated stream will be passed to WSOLA algorithm to perform concealment operation and prepared for playout. The time scale factor can be determined by calculating the rate of received stream length and source stream length.

    3 Experiment and evaluation

    In this section, the effectiveness of erasure coding and the end audio quality under various network conditions characterized by packet loss models, packet loss rates, burst loss lengths, and transmission delays is measured. The results show that the performance can be enhanced by applying the proposed method.

    3.1 Packet loss model

    The sender-based loss-recovery techniques have different levels of performance that are heavily sensitive to the packets-loss properties of the network. The IP network is an interconnection of packet switched data communication networks, composed of hybrid of various wire-line and wire-less transmission links, as well as satellite links. Packet loss may occur due to buffer overflow within the network, deliberate discard as a result of some congestion control policy or transmission errors. Several of the mechanisms that can lead to packet loss are of a transient nature and hence the resulting packet loss is bursty in nature.

    In this paper, three packet-loss models will be considered which are random loss model, burst loss model and Gilbert loss model.

    (1) Gilbert loss model

    In this paper, the 2-state Gilbert model[11]is considered to characterize the bursty channel behavior. This model is widely used for describing error patterns in transmission channels and for analyzing the efficiency of coding for packets losing and recovery. Bolot[12]also studied the distribution of packet loss in the Internet and concluded that this could be represented by a Gilbert or Elliott model.

    As shown in Fig.5, the usual notation of a good (G) and bad (B) state is shown. Each of them may generate errors as independent events at a state dependent error rate 1-g in the good and 1-h in the bad state, respectively. When the channel is in the good state, there are very few packet losses, whereas when the channel is in the bad state, many packets are lost.

    Fig.5 Gilbert loss model

    Packet losses in the bad and good states are independent and occur with rates λ and γ respectively.

    (2) Random loss model

    With random loss model packets are lost randomly. If packet loss is entirely independent from one instant to the next, random loss would be experienced. Random loss is a condition that is very favorable for many of the sender-based loss-recovery techniques due to the relatively rare occurrences of multiple consecutive lost packets with random loss. The probability of losing m consecutive packets in a random-loss scenario drops sharply as m increases. M is used which is in Eq.(12) to represent the random loss packet location

    M=rand(ε) 0<ε

    (12)

    (3) Simple burst loss model

    In burst loss scenario, if the current packet is lost, the next packet is also likely to be lost. For burst loss model it is assumed that a condition that causes the loss of a packet persists for some period of time and therefore causes us to lose one or more subsequent consecutive packets.

    In order to study the effects of bursts of lost packets and erasure coding scheme on audio quality, the simulator is programmed to simulate burst loss by discarding lost packets in group of random sizes. As shown Fig.6, there are three parameters to control the packet dropping process, which are

    bc-burst count

    bl-burst length of each time

    bt-burst time

    Fig.6 Burst loss model

    The burst packets losing rate PLR can be defined as

    (13)

    bti+bli·1≤bti+1

    (14)

    btbc-1+blbc-1≤W

    (15)

    In fact, the data packets will experience different delays when they are transmitted from the sender to the receiver over IP network. The inter-arrival time of the packets on the receiver will not be constant even though the packet inter departure time on the sender is constant, which results in a jitter that packets arrive at the destination with varying delays between packets. In the simulator, this factor is not considered.

    3.2 Simulation of packets loss

    Firstly, necessary variables and symbols are defined and summarized for evaluating the algorithm performance as follows.

    p-a prime number, total number of column in STAR-coding;

    t-number of rows, the capacity of RS-coding recovery;

    l-size of codeword in code (Reed Solomon code);

    L-number of bits of a packet (packet size);

    ω- time window size(ms);

    W-window size(bits);

    F-frame length (ms);

    PLR-packet loss rate(random, burst, Gilbert);

    α-time scaling factor(WSOLA);

    ρE-error rate of Gilbert Model;

    b-payload bit rates of audio sources(kbps);

    γ-state transition probability to change from the good state to the bad;

    λ-state transition probability to change from the bad state to the good;

    Te-source data packets encoding time;

    Ne-number of source data packets for encoding;

    Nd-number of received data packets for decoding;

    As shown in Fig.7, the simulation and test experiment process are described. In the sender, the original audio clips are taken from the public speech database. The internet communication environment is simulated by the simulator with three impairment profiles: random, burst and Gilbert loss models.

    To evaluate the approach comprehensively, two categories of testing experiments are provided:

    Pure performance tests: performance indexes and MOS rating[13]under various conditions of the algorithm.

    Comparison tests: audio quality comparison between plain delivery of G.729 and the array coding based enhancement approach.

    G.729[14]is selected in the experiment because it is an International Telecommunications Union standardized low bit-rate codec providing near toll quality. Generally, G.729 is a kind of code-excited linear prediction (CELP) codec and runs at 8 kbps with a 10 ms frame. Furthermore, a plain delivery approach is taken as a baseline for the purpose of comparison with the optimized techniques. Plain delivery is more prevalent than any other delivery technique in VoIP solutions which does not provide any sender-based effort to improve audio quality when packets loss occurs.

    Fig.7 Simulation process

    The involved pure performance indexes of algorithm are listed as below.

    MOS rating: audio quality result, in terms of the mean opinion score (MOS), which ranges from 1 (worst) to 5 (best).

    Encoding rate: encoding packets number per second with RS-coding or STAR coding.

    Decoding rate: decoding packets number per second with RS-coding or STAR coding.

    3.3 Experiment under different models

    (1) Experiment under random loss model

    Fig.8 presents the MOS ratings with 5, 10, 15, 20, 25, and 30 percent packet loss at random loss.

    (2) Experiment under Gilbert loss model

    Fig.9 presents the 5, 10, 15, 20, 25, and 30 percent packet loss at Gilbert loss.

    Fig.8 Experiment results under random loss model

    (3) Experiment under burst loss model

    Fig.10 presents the MOS ratings with 5, 10, 15, 20, 25, and 30 percent packet loss at burst model. The study indicates that STAR coding or STAR+RS coding frequently achieves a higher MOS rating than G.729A in various consecutive-loss tests.

    Fig.8~Fig.10(a),(b),(c) are the results of only the sender-based packet loss recovery , the recovery are STAR、STAR+RS and STAR+RS+PRS, and the Fig.8~Fig.10(d),(e),(f) are the results of sender-based packet loss recovery and receiver-based packet concealment, the packet concealment is WSOLA. It is seen that under the random loss model , the STAR coding achieves the best performance among the STAR coding , STAR+RS coding and STAR+RS+PRScoding. From Fig.8(a), it can be seen that if audio codec G.729 and after STAR redundant coding are selected, it can achieve better MOS score than onlyG.729 at all packet loss rate. If receiver exploits the WSOLA, from Fig.8(d), (e) and (f), it can be seen that the performance of STAR+WSOLA can achieve better performance than only G.729+WSOLA. Fig.9 shows that the results of Gilbert loss model are similar to those of random loss model.

    Fig.9 Experiment results under Gilbert loss model

    Fig.10 Experiment results under burst loss model

    Fig.10 is the results of burst loss model, from Fig. 10 (a), (b) and (c), it can be seen that the performance of STAR and STAR+RS are similar, they all can achieve higher MOS rating of all packet loss rate than only G.729. When receiver exploits the WSOLA, Fig. 10 (d), (e) and (f) show that if the packet loss is more than 15%, G.729+STAR+WSOLA and G.729+STAR+RS+WSOLA all can achieve higher score than only G.729+WSOLA, but if packet loss is too high, the results will be worse.

    3.4 Performance evaluation

    Due to special properties of array codes, the encoding and decoding procedure are performed with pure XOR and shift operation. The performance of the method is shown in Table 1.

    Table 1 Performance of encoding and decoding

    From Table 1 it can be seen that the rate of STAR coding is faster than STAR+RS coding because of the computational complexity of RS coding. And the decoding rate is little difference. So the delay of STAR coding is smaller than the STAR+RS coding.

    4 Conclusions and future work

    An efficient QoS enhancement mechanism based on array code for lost packets recovery is proposed. The experimental results have shown that the method has low computational complexity and lower delay which proves that the array coding in VoIP system has a good effect on packet loss recovery, and is suitable for real-time applications. This method is suitable for random packet loss model, the Gilbert packet loss model and the burst packet loss model.

    In the following studies, the proposed method will be applied to more complex models to test its performance under new environment, and make it widely use in the VoIP system in the future.

    [ 1] Brady P T. Effects of transmission delay on conversational behavior on echo-free telephone circuits. Bell Labs Technical Journal, 1971, 50(1):115-134

    [ 2] MacWilliams F J, Sloane N J A. The Theory of Error Correcting Codes. Amsterdam: North-Holland, 1977. 11-33

    [ 3] Jin H, Cortes T, Buyya R. High Performance Mass Storage and Parallel I/O. New Jersey/New York: John Wiley & Sons, 2001. 187-208

    [ 4] Xu L, Bohossian V, Bruck J, et al. Low-density MDS codes and factors of complete graphs. IEEE Transactions on Information Theory, 1999,45(6):1817-1826

    [ 5] Xu L, Bruck J. X-code: MDS array codes with optimal encoding. IEEE Transactions on Information Theory, 1999,45(1):272-276

    [ 6] Blaum M. A family of MDS array codes with minimal number of encoding operations. In: Proceedings of the IEEE International Symposium on Information Theory, Seattle, USA, 2006. 2784-2788

    [ 7] Huang C, Xu L. STAR: an efficient coding scheme for correcting triple storage node failures. In: Proceedings of the Usenix Conference on File & Storage Technologies, San Francisco, USA, 2005. 889-901

    [ 8] Tamo I, Wang Z, Bruck J. Zigzag codes: MDS array codes with optimal rebuilding. IEEE Transactions on Information Theory, 2015, 59(3):1597-1616

    [ 9] Wang Y, Li G, Zhong X. Triple-Star: a coding scheme with optimal encoding complexity for tolerating triple disk failures in RAID. International Journal of Innovative Computing, Information and Control,2012,8(3): 1731-1742

    [10] Verhelst W, Roelands M. An overlap-add technique based on waveform similarity (WSOLA) for high quality time-scale modification of speech. IEEE International Conference on Acoustics, 2002,2(2):554-557

    [11] Hasslinger G, Hohlfeld O. The Gilbert-Elliott model for packet loss in real time services on the Internet measuring. In: Proceedings of the GI/ITG Conference of Measuring, Modelling and Evaluation of Computer and Communication Systems, Dortmund, Germany, 2008. 1-15

    [12] Bolot J, Fosse-Parisis S, Towsley D. Adaptive FEC-based error control for interactive audio in the Internet. In: Proceedings of IEEE Infocom, New York, USA, 1998. 1453-1460

    [13] Chua T K, Pheanis D C. QoS Evaluation of Sender-Based Loss-Recovery Techniques for VoIP. IEEE Network , 2006,20(6):14-22

    [14] Telecommunication Standardization Sector of ITU. G.729 Coding of Speech at 8 kbit/s Using Conjugate-Structure Algebraic-Code-Excited Linear Prediction. Geneva: International Telecommunication Union.1996

    Li Zhen, born in 1978. She received her Master degree in Hebei University of Technology in 2003. She worked in Communication University of China since 2003. Her research interests include the digital signal processor, voice communication and speech enhancement.

    10.3772/j.issn.1006-6748.2017.04.007

    ①Supported by the National Science and Technology Planning Project (No. 2012BAH38F00).

    ①To whom correspondence should be addressed. E-mail: lizhen@cuc.edu.cn

    on Jan. 10, 2017*, Zhang Qin*

    data packets decoding and recovery time;

    亚洲情色 制服丝袜| 多毛熟女@视频| 啦啦啦在线观看免费高清www| bbb黄色大片| 精品熟女少妇八av免费久了| 日韩大码丰满熟妇| 精品熟女少妇八av免费久了| 亚洲国产中文字幕在线视频| 午夜免费鲁丝| a级毛片黄视频| 亚洲 国产 在线| 天天影视国产精品| 岛国毛片在线播放| 欧美精品一区二区大全| 欧美成狂野欧美在线观看| 国产成人一区二区三区免费视频网站 | 午夜福利在线免费观看网站| 久久久久久久久久久久大奶| 这个男人来自地球电影免费观看| 电影成人av| 你懂的网址亚洲精品在线观看| 日韩熟女老妇一区二区性免费视频| 久久99一区二区三区| 欧美日韩一级在线毛片| 男女边吃奶边做爰视频| 精品国产国语对白av| 天堂俺去俺来也www色官网| 欧美精品高潮呻吟av久久| 国产在线视频一区二区| 日韩一本色道免费dvd| 十分钟在线观看高清视频www| 91老司机精品| 国产黄色视频一区二区在线观看| 亚洲少妇的诱惑av| 一本一本久久a久久精品综合妖精| 久久精品人人爽人人爽视色| 一区二区三区精品91| 日韩av免费高清视频| 国产成人精品久久二区二区免费| 久久久精品区二区三区| 美女午夜性视频免费| 黄色视频不卡| 亚洲国产精品一区二区三区在线| 高清黄色对白视频在线免费看| 肉色欧美久久久久久久蜜桃| 国产伦人伦偷精品视频| 亚洲一码二码三码区别大吗| 成人亚洲欧美一区二区av| 亚洲国产日韩一区二区| 亚洲国产精品一区二区三区在线| 99热国产这里只有精品6| 欧美激情高清一区二区三区| 中国美女看黄片| 成年女人毛片免费观看观看9 | 日日摸夜夜添夜夜爱| 99热全是精品| 国产一区有黄有色的免费视频| 十八禁网站网址无遮挡| 一级毛片黄色毛片免费观看视频| 国产精品成人在线| 亚洲伊人久久精品综合| 国产高清国产精品国产三级| av国产久精品久网站免费入址| 中文字幕精品免费在线观看视频| 咕卡用的链子| 精品国产超薄肉色丝袜足j| 精品一品国产午夜福利视频| 一级毛片黄色毛片免费观看视频| 黄色片一级片一级黄色片| 国产片内射在线| 色婷婷久久久亚洲欧美| 国产亚洲av片在线观看秒播厂| 人妻一区二区av| 久久久亚洲精品成人影院| 菩萨蛮人人尽说江南好唐韦庄| 国产精品欧美亚洲77777| 久久久久久久精品精品| 啦啦啦在线免费观看视频4| 精品卡一卡二卡四卡免费| 欧美性长视频在线观看| 99热全是精品| 午夜免费成人在线视频| 亚洲视频免费观看视频| 久久精品人人爽人人爽视色| 男的添女的下面高潮视频| 一级,二级,三级黄色视频| 亚洲欧美成人综合另类久久久| 国产一区亚洲一区在线观看| 亚洲精品久久午夜乱码| 精品久久久精品久久久| 手机成人av网站| 精品亚洲成a人片在线观看| 国产精品九九99| 国产精品成人在线| www.熟女人妻精品国产| 99国产精品99久久久久| 中文字幕制服av| 热99久久久久精品小说推荐| 老鸭窝网址在线观看| 777米奇影视久久| 超碰成人久久| 乱人伦中国视频| 亚洲中文av在线| 99精品久久久久人妻精品| 久久综合国产亚洲精品| 一级黄片播放器| av视频免费观看在线观看| 永久免费av网站大全| 91麻豆av在线| 2021少妇久久久久久久久久久| 中文字幕制服av| 午夜福利视频在线观看免费| 蜜桃在线观看..| 亚洲av日韩精品久久久久久密 | 欧美精品一区二区大全| 日本午夜av视频| 满18在线观看网站| 视频区欧美日本亚洲| 日本a在线网址| 大香蕉久久成人网| av片东京热男人的天堂| 久久久精品94久久精品| 国产成人精品久久二区二区免费| av不卡在线播放| av不卡在线播放| 国产精品国产三级国产专区5o| 亚洲伊人色综图| 1024香蕉在线观看| 精品少妇黑人巨大在线播放| 国产免费现黄频在线看| 久久精品亚洲av国产电影网| 日韩大片免费观看网站| 国产精品一区二区免费欧美 | 50天的宝宝边吃奶边哭怎么回事| 精品高清国产在线一区| 9热在线视频观看99| 天天躁夜夜躁狠狠躁躁| h视频一区二区三区| 国产亚洲欧美在线一区二区| 国产成人精品无人区| 精品国产乱码久久久久久小说| 亚洲精品国产一区二区精华液| av国产精品久久久久影院| 免费日韩欧美在线观看| 老汉色∧v一级毛片| 美女中出高潮动态图| 欧美激情极品国产一区二区三区| 老鸭窝网址在线观看| 国产一区二区在线观看av| 在线观看国产h片| 啦啦啦视频在线资源免费观看| 亚洲国产精品成人久久小说| 欧美日韩亚洲高清精品| 国产淫语在线视频| 大香蕉久久网| 免费看十八禁软件| 99久久精品国产亚洲精品| 高潮久久久久久久久久久不卡| 黄片播放在线免费| 在线观看免费高清a一片| 国产黄色视频一区二区在线观看| 嫩草影视91久久| 亚洲精品美女久久久久99蜜臀 | 男人舔女人的私密视频| 无遮挡黄片免费观看| 日韩,欧美,国产一区二区三区| 久久久亚洲精品成人影院| 少妇的丰满在线观看| 在线观看免费高清a一片| 在线观看www视频免费| 午夜免费观看性视频| 中文字幕另类日韩欧美亚洲嫩草| 亚洲一卡2卡3卡4卡5卡精品中文| 欧美另类一区| 黄色a级毛片大全视频| 久久 成人 亚洲| 国产亚洲av高清不卡| 亚洲国产毛片av蜜桃av| 午夜福利视频在线观看免费| 黄片小视频在线播放| av视频免费观看在线观看| 黄频高清免费视频| 成人三级做爰电影| 9热在线视频观看99| 久久毛片免费看一区二区三区| 婷婷色麻豆天堂久久| 成人18禁高潮啪啪吃奶动态图| 女性被躁到高潮视频| 在线观看一区二区三区激情| 肉色欧美久久久久久久蜜桃| 久久这里只有精品19| 亚洲色图综合在线观看| 国产精品一二三区在线看| 赤兔流量卡办理| 一级,二级,三级黄色视频| 亚洲国产欧美在线一区| 50天的宝宝边吃奶边哭怎么回事| 精品卡一卡二卡四卡免费| 中文字幕亚洲精品专区| 亚洲男人天堂网一区| 日韩大码丰满熟妇| www.精华液| 久久久久网色| 精品亚洲成国产av| 一本一本久久a久久精品综合妖精| 人成视频在线观看免费观看| 国产成人av教育| 丰满迷人的少妇在线观看| 成年人午夜在线观看视频| 国产在线一区二区三区精| 美女高潮到喷水免费观看| 国产精品国产三级专区第一集| 一边亲一边摸免费视频| 我要看黄色一级片免费的| 日本五十路高清| 久久鲁丝午夜福利片| 在线观看免费日韩欧美大片| 欧美精品av麻豆av| 丝袜脚勾引网站| 在线观看一区二区三区激情| 久久国产精品大桥未久av| 日本一区二区免费在线视频| 啦啦啦在线免费观看视频4| 丝袜在线中文字幕| 国产精品二区激情视频| 大香蕉久久成人网| 国产视频首页在线观看| 妹子高潮喷水视频| 熟女av电影| 日韩人妻精品一区2区三区| 777米奇影视久久| 国产精品久久久久成人av| 自线自在国产av| 九草在线视频观看| 香蕉国产在线看| 亚洲国产精品一区三区| 精品少妇一区二区三区视频日本电影| 日韩精品免费视频一区二区三区| 日本a在线网址| 中文字幕色久视频| 夜夜骑夜夜射夜夜干| 欧美av亚洲av综合av国产av| 90打野战视频偷拍视频| 操美女的视频在线观看| 国产片特级美女逼逼视频| 日韩视频在线欧美| 国产福利在线免费观看视频| 国产精品欧美亚洲77777| 精品福利观看| 欧美激情 高清一区二区三区| 国产极品粉嫩免费观看在线| 精品久久久精品久久久| 精品人妻1区二区| 久久中文字幕一级| 在线av久久热| 又黄又粗又硬又大视频| 欧美精品高潮呻吟av久久| 国产免费福利视频在线观看| 国产成人欧美在线观看 | 女人爽到高潮嗷嗷叫在线视频| 成年av动漫网址| 中文字幕另类日韩欧美亚洲嫩草| 国产成人免费观看mmmm| 国产成人精品久久二区二区免费| 中文字幕制服av| 国产亚洲欧美在线一区二区| 又大又黄又爽视频免费| 丝袜美足系列| 精品人妻一区二区三区麻豆| 欧美日韩亚洲综合一区二区三区_| 99精品久久久久人妻精品| 亚洲色图综合在线观看| 久久久久久人人人人人| 精品少妇黑人巨大在线播放| 如日韩欧美国产精品一区二区三区| 中国国产av一级| 国产一级毛片在线| 欧美激情极品国产一区二区三区| 少妇人妻 视频| 午夜日韩欧美国产| 极品少妇高潮喷水抽搐| 中文字幕人妻丝袜制服| 亚洲国产欧美在线一区| 一二三四在线观看免费中文在| 日韩 亚洲 欧美在线| 国产成人精品久久二区二区免费| 日韩电影二区| 别揉我奶头~嗯~啊~动态视频 | 一级毛片电影观看| 久久久精品区二区三区| 99精国产麻豆久久婷婷| 一本—道久久a久久精品蜜桃钙片| 亚洲欧美精品综合一区二区三区| 大香蕉久久网| 免费久久久久久久精品成人欧美视频| 国产精品国产三级国产专区5o| 亚洲av电影在线进入| 国产一区亚洲一区在线观看| 一二三四在线观看免费中文在| 深夜精品福利| 女警被强在线播放| 一本综合久久免费| 巨乳人妻的诱惑在线观看| 亚洲激情五月婷婷啪啪| 国产精品 欧美亚洲| 欧美成狂野欧美在线观看| 操美女的视频在线观看| 夜夜骑夜夜射夜夜干| h视频一区二区三区| 一区二区三区精品91| 脱女人内裤的视频| 狂野欧美激情性bbbbbb| 美国免费a级毛片| 国产深夜福利视频在线观看| 国产精品一区二区在线观看99| 操美女的视频在线观看| 九色亚洲精品在线播放| 一本一本久久a久久精品综合妖精| 国产极品粉嫩免费观看在线| 久久国产亚洲av麻豆专区| 久热爱精品视频在线9| 国产不卡av网站在线观看| 高清黄色对白视频在线免费看| 成人亚洲精品一区在线观看| 色婷婷av一区二区三区视频| 日本欧美国产在线视频| kizo精华| 别揉我奶头~嗯~啊~动态视频 | 国产亚洲欧美精品永久| 欧美日韩成人在线一区二区| 日韩大片免费观看网站| 亚洲欧美清纯卡通| 天天影视国产精品| 亚洲国产精品一区二区三区在线| 国产精品亚洲av一区麻豆| 无限看片的www在线观看| tube8黄色片| 你懂的网址亚洲精品在线观看| 女人精品久久久久毛片| 丰满少妇做爰视频| 国产亚洲av片在线观看秒播厂| 亚洲黑人精品在线| 亚洲综合色网址| av电影中文网址| 精品国产一区二区三区四区第35| 人成视频在线观看免费观看| 欧美精品av麻豆av| 久久ye,这里只有精品| 真人做人爱边吃奶动态| 国产精品久久久av美女十八| 麻豆av在线久日| 久久青草综合色| 天天躁狠狠躁夜夜躁狠狠躁| 成在线人永久免费视频| 精品久久蜜臀av无| 无限看片的www在线观看| 高潮久久久久久久久久久不卡| 国产黄色视频一区二区在线观看| 天堂俺去俺来也www色官网| 国产成人系列免费观看| 成人亚洲精品一区在线观看| 黄片小视频在线播放| 国产成人av教育| 亚洲专区国产一区二区| 90打野战视频偷拍视频| 久久久精品94久久精品| 亚洲精品国产av蜜桃| 纵有疾风起免费观看全集完整版| 亚洲精品国产色婷婷电影| 国产成人欧美| 大片免费播放器 马上看| 18禁观看日本| 欧美激情极品国产一区二区三区| 国产欧美日韩综合在线一区二区| 精品少妇久久久久久888优播| 亚洲精品乱久久久久久| 97精品久久久久久久久久精品| 国产亚洲欧美在线一区二区| 亚洲精品国产一区二区精华液| 免费在线观看影片大全网站 | 天天操日日干夜夜撸| 成人18禁高潮啪啪吃奶动态图| 侵犯人妻中文字幕一二三四区| 美国免费a级毛片| 十八禁高潮呻吟视频| 国产成人精品久久久久久| 亚洲综合色网址| 在线亚洲精品国产二区图片欧美| 亚洲av日韩在线播放| 高清不卡的av网站| 午夜精品国产一区二区电影| 啦啦啦啦在线视频资源| 国产三级黄色录像| 亚洲国产中文字幕在线视频| 老熟女久久久| 男的添女的下面高潮视频| 美女福利国产在线| 2021少妇久久久久久久久久久| 少妇 在线观看| 国产成人一区二区在线| 久久精品久久久久久噜噜老黄| 不卡av一区二区三区| av视频免费观看在线观看| 亚洲精品日韩在线中文字幕| 1024视频免费在线观看| 精品卡一卡二卡四卡免费| 1024香蕉在线观看| 爱豆传媒免费全集在线观看| 婷婷成人精品国产| 永久免费av网站大全| 国产av国产精品国产| 一区福利在线观看| 黄色片一级片一级黄色片| 少妇的丰满在线观看| 男女边吃奶边做爰视频| 美女视频免费永久观看网站| 国产熟女欧美一区二区| 免费日韩欧美在线观看| 少妇猛男粗大的猛烈进出视频| 亚洲精品成人av观看孕妇| 亚洲视频免费观看视频| 免费人妻精品一区二区三区视频| 操美女的视频在线观看| 国产av精品麻豆| 日本av免费视频播放| av天堂久久9| 亚洲欧美清纯卡通| 妹子高潮喷水视频| 91成人精品电影| 婷婷色综合www| 精品亚洲成国产av| 久久人妻熟女aⅴ| 婷婷丁香在线五月| 色婷婷久久久亚洲欧美| 国产av一区二区精品久久| 麻豆av在线久日| 青青草视频在线视频观看| 国产无遮挡羞羞视频在线观看| 精品人妻熟女毛片av久久网站| 精品欧美一区二区三区在线| 欧美精品亚洲一区二区| 免费观看人在逋| 高清不卡的av网站| 亚洲精品一二三| 91麻豆av在线| 嫩草影视91久久| 中文欧美无线码| 女性被躁到高潮视频| 国产免费现黄频在线看| 制服人妻中文乱码| 午夜影院在线不卡| 日本一区二区免费在线视频| 99热全是精品| 欧美在线一区亚洲| 精品久久久精品久久久| 黄色视频不卡| 国产高清国产精品国产三级| 一区福利在线观看| 久久久精品国产亚洲av高清涩受| 欧美成人午夜精品| 亚洲欧美精品自产自拍| netflix在线观看网站| www.999成人在线观看| 一边亲一边摸免费视频| videos熟女内射| 在线观看免费午夜福利视频| 秋霞在线观看毛片| 国产成人精品久久二区二区91| 久久精品国产综合久久久| 啦啦啦 在线观看视频| 国产片内射在线| 日韩视频在线欧美| 国产97色在线日韩免费| 欧美成人精品欧美一级黄| 免费高清在线观看视频在线观看| 亚洲午夜精品一区,二区,三区| 色网站视频免费| 啦啦啦中文免费视频观看日本| 国产一卡二卡三卡精品| 精品欧美一区二区三区在线| 亚洲少妇的诱惑av| 国产欧美日韩综合在线一区二区| 亚洲熟女毛片儿| 伊人亚洲综合成人网| 日韩免费高清中文字幕av| 久久女婷五月综合色啪小说| 精品少妇久久久久久888优播| 宅男免费午夜| 欧美国产精品一级二级三级| 国产在线观看jvid| 七月丁香在线播放| 国产欧美日韩一区二区三区在线| 日韩大码丰满熟妇| 欧美日韩av久久| 大型av网站在线播放| 日本欧美国产在线视频| 免费女性裸体啪啪无遮挡网站| 91九色精品人成在线观看| 性高湖久久久久久久久免费观看| 精品高清国产在线一区| 国产一区二区激情短视频 | 各种免费的搞黄视频| 亚洲国产精品国产精品| 女警被强在线播放| 欧美亚洲日本最大视频资源| 超色免费av| 99热全是精品| 欧美亚洲 丝袜 人妻 在线| 狂野欧美激情性bbbbbb| 大型av网站在线播放| 色婷婷久久久亚洲欧美| 日本a在线网址| 99国产精品一区二区三区| 免费观看人在逋| 日韩免费高清中文字幕av| 亚洲九九香蕉| 大片免费播放器 马上看| 色94色欧美一区二区| 久久 成人 亚洲| 国产一区二区激情短视频 | 亚洲成人手机| 国产免费现黄频在线看| 91精品国产国语对白视频| 国产精品二区激情视频| 国产精品一区二区免费欧美 | 免费在线观看完整版高清| 男女国产视频网站| 精品一品国产午夜福利视频| 大片电影免费在线观看免费| 男人添女人高潮全过程视频| 亚洲国产欧美在线一区| 在线观看一区二区三区激情| 可以免费在线观看a视频的电影网站| 成人国产一区最新在线观看 | 免费看av在线观看网站| 在线观看免费日韩欧美大片| 日韩一区二区三区影片| 视频在线观看一区二区三区| 亚洲精品第二区| 久久精品成人免费网站| 97人妻天天添夜夜摸| 99国产精品一区二区蜜桃av | 欧美成人精品欧美一级黄| 亚洲色图 男人天堂 中文字幕| 亚洲精品在线美女| 后天国语完整版免费观看| 老汉色∧v一级毛片| 日本av免费视频播放| 亚洲精品第二区| 成年美女黄网站色视频大全免费| 欧美人与性动交α欧美软件| 国产精品av久久久久免费| 国产成人精品久久二区二区免费| 国产免费现黄频在线看| 王馨瑶露胸无遮挡在线观看| 老司机影院毛片| 国语对白做爰xxxⅹ性视频网站| 性色av乱码一区二区三区2| 又黄又粗又硬又大视频| 亚洲七黄色美女视频| 欧美大码av| 蜜桃在线观看..| 丰满迷人的少妇在线观看| 国产成人一区二区在线| 亚洲 欧美一区二区三区| 大香蕉久久网| netflix在线观看网站| 在线看a的网站| 国产精品免费视频内射| 大香蕉久久成人网| 免费在线观看影片大全网站 | 国产免费视频播放在线视频| 99国产精品免费福利视频| 99国产精品99久久久久| 亚洲九九香蕉| 美女国产高潮福利片在线看| 久久精品成人免费网站| 黄网站色视频无遮挡免费观看| 国产熟女午夜一区二区三区| 黑人巨大精品欧美一区二区蜜桃| 桃花免费在线播放| 精品一区二区三卡| 免费av中文字幕在线| 人妻一区二区av| 啦啦啦在线免费观看视频4| 成人亚洲精品一区在线观看| 一本综合久久免费| av网站免费在线观看视频| 亚洲三区欧美一区| 精品熟女少妇八av免费久了| 国产精品久久久av美女十八| 国产高清videossex| 国产精品九九99| 老司机深夜福利视频在线观看 | 69精品国产乱码久久久| 国产在线一区二区三区精| 777米奇影视久久| 精品一品国产午夜福利视频| 黄色a级毛片大全视频| 最近中文字幕2019免费版| 热99国产精品久久久久久7| 视频在线观看一区二区三区| 老汉色∧v一级毛片| 老司机午夜十八禁免费视频| 日本欧美视频一区| 国产视频首页在线观看| 欧美日本中文国产一区发布| 亚洲欧美一区二区三区久久| 男女下面插进去视频免费观看| 国产视频一区二区在线看| 欧美人与性动交α欧美精品济南到| 日韩制服丝袜自拍偷拍| 精品欧美一区二区三区在线| 亚洲,欧美精品.| 国产成人精品久久二区二区免费|