• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Uplink Grant-Free Pattern Division Multiple Access(GF-PDMA) for 5G Radio Access

    2018-05-23 01:38:04WanweiTangShaoliKangBinRenXinweiYue
    China Communications 2018年4期

    Wanwei Tang*, Shaoli Kang, Bin Ren, Xinwei Yue

    1 School of Electronic and Information Engineering, Beihang University, Beijing 100191, China

    2 Intelligence and Information Engineering College, Tangshan University, Tangshan 063000, China

    3 State Key Laboratory of Wireless Mobile Communications, China Academy of Telecommunications Technology, Beijing 100191, China

    I. INTRODUCTION

    With the explosive growth of data traffic and advent of a variety of smart terminals communications, massive machine type communication (mMTC) becomes one of important application scenarios for the fifth generation mobile communication (5G) [1-3]. In order to reduce the high signaling overhead for the transmission of small packet in mMTC, grantfree (GF) transmission has drawn considerable attention in new radio (NR). The agreement that NR should target to support uplink (UL)GF for mMTC has been passed in the third generation partnership project (3GPP) radio access network 1 (RAN1) #85 and RAN1#86 meeting. Authors in [4] proposed a GF transmission scheme by combining MA with physical layer optimization. A compressed sensing based ACK feedback scheme for GF transmission was proposed in [5]. GF can be implied in orthogonal frequency division multiple access(OFDMA) or non-orthogonal multiple access(NMA) [6, 7]. However, GF-OFDMA cannot efficiently support massive connectivity, especially for the UL transmission, since it is limited by orthogonal resource allocation. In order to support the extremely high connection density, GF-NMA has been investigated in some literatures. Authors in [8] proposed an UL GF sparse code multiple access (GF-SCMA)scheme, which allows different mMTC UEs contending for some pre-con figured resources.In [9], a dynamic compressive sensing-based multi-user detection is proposed to realize both user activity and data detection for UL GFNMA. As a potential implementation scheme for GF-NMA, GF pattern division multiple access (GF-PDMA) is warmly discussed in the standard. For the GF-NMA based on symbol level spreading, such as GF-SCMA or GF-PDMA, they provides another dimension for resource sharing symbols (or patterns). A traditional resource pool (time & frequency)could be extended to include patterns. Specifically, each resource group in the pool is associated with a pattern matrix. AUE selects a time-frequency resource as well as a pattern from the pattern matrix for transmission. Obviously,enlarging the resource pool could reduce collision probability. Compared with GF-SCMA, GF-PDMA use the patterns with different diversity which means that it can provide greater resource pool than SCMA. For example a typical matrix with dimension 4× 6while for GF-PDMA, the pattern matrix can be a subset comprised of any 6 columns from the matrix Some initial system level simulation results of GF-PDMA are presented in [10, 11].

    In this paper, a UL GF scheme based on PDMA (GF-PDMA)has been proposed.Resource definition and allocation for UL GF-PDMA scheme are investigated.

    Although some primary researches on GF-PDMA have been done in the aforementioned literatures, there are still some issues need to be investigated, such as details and designs of the resource definition, allocation,and selection as well as the potential collision management [12]. Motivated by this, we take a typical NMA scheme, PDMA [13, 14],as a subject investigated and propose an UL GF-PDMA scheme in this paper. The primary contributions of this paper are summarized as follows:

    1) We first analyze the transmission latency of grant based PDMA (GB-PDMA) and GF-PDMA. The analysis results show that GF scheme can reduce at least 1.07 ms compared with GB scheme under the assumption that a scheduling request (SR) period is 1 transmission time interval (TTI) and 1 TTI is equal to 2 orthogonal frequency division multiplexing(OFDM) symbols.

    2) We propose the more detailed definition of GF-PDMA resource and analyze the scalability to confront pattern collision for GF-PDMA. The link-level simulation (LLS)results are presented to demonstrate that lower pattern collision frequency (e.g., less than 3 times) has few influences on the system performance.

    3) We discuss the transmission scheme for GF-PDMA in detail. The system-level simulation (SLS) is conducted and the simulation results demonstrate that GF-PDMA carries higher system overload (nearly 2.15 times than GF-OFDMA).

    The remainder of this paper is organized as follows: Section II provides the system model for UL GF-PDMA. Latency properties of GB-PDMA and GF-PDMA are analyzed in Section III. Resource definition, allocation and transmission mechanism for UL GF-PDMA are introduced in Section IV. Numerical results of LLS and SLS are presented in Section V.Finally, Section VI concludes this paper.

    II. SYSTEM MODEL

    PDMA is proposed based on former research about successive interference cancellation amenable multiple access (SAMA) [15, 16].An UL PDMA system model is depicted as ifgure1.

    At the transmitter, the data ofKusers will experience a series of operations such as channel encoding, PDMA modulation & encoding and OFDM modulation. Then the data of users will be mapped on the resources defined on power, time & frequency or spatial domain with PDMA pattern matrix. The design methods of PDMA pattern matrix are described in[17]. For GF-PDMA, users pick pattern randomly from the given PDMA pattern matrix.

    At the receiver, the received information from users to the base station (BS) can be expressed as

    whereyis aN×1 vector composed by received signals,is aK×1 modulation symbol vector transmitted byKusers; andxkis the modulation symbol of thekthuser,nindicates the additive noise at BS and molded bydenotes PDMA equivalent channel response matrix with dimensionoverload rate, which means thatNresource elements (REs) are occupied byKusers.

    For reducing computational burden and accelerating simulation, we take a typical PDMA pattern matrixas an example. Then the PDMA equivalent channel response matrix is given by

    wherehijis the channel response between theithuser and thejthRE.

    Figure 2 shows the pattern matrix and related resource mapping. Where, the diversities of pattern 1, pattern 2 and pattern 3 are 2, 1 and 1, respectively. GF-PDMA makes the users do not need to wait the signaling from BS and transmit the data based on a mode of arriveand-go. So the users pick the PDMA pattern from the pattern matrix randomly. Without lose of generality, we assume that user 1 picks pattern 1, and the data from user 1 are mapped onto both two REs, user 2 pick pattern 2 and the data from user 2 are mapped onto RE 1 and user 3 pick pattern 3 and the data from user 3 are mapped onto RE 2.

    Fig. 1. UL PDMA system model.

    Fig. 2. Three users multiplexing on two REs.

    Fig. 3. The factor graph of BP-IDD receiver based on PDMA pattern matrix

    The multi-user detection algorithm based on belief propagation algorithm and iterative detection- decoding (BP-IDD) at the receiver can be simply explained as figure 3 [18]. infigure 3, thekthuser’s codes,decoded by Turbo decoder are converted into users’ data symbols, then these symbols are involved in the BP iteration operation between user nodeand channel nodealso means the received signal on thejthRE).

    ?

    Table I. Computation complexity of receiver.

    The BP-IDD detection algorithm is shown in Algorithm 1. Wheredenote the transmission information from user node to channel node and from channel node to user node respectivelythe priori log likelihood ratio (LLR) ofck,mgiven by the Turbo decoder in the previous iteration;whereMdenotes the size of modulation constellation;Tin,Toutanddfrepresent IDD inner iteration number,outer iteration number, and maximum row weight of PDMA pattern matrix;N(k)jis the set comprising of all elements ofN(k)jexcludingj.

    Table I shows computation complexity of the BP -IDD receiver and BP receiver. It should also be noted that the computation of Turbo decoder is not accounted.

    From table 1, we can see that the BP-IDD isTouttimes more complexity than BP on addition operation. However, BP-IDD can further improve the performance of BP, since that the reliability of the symbols is further improved after Turbo decoding.

    III. ANALYSIS ON TRANSMISSION LATENCY FOR GB-PDMA AND GFPDMA

    In the GB-PDMA scheme, a user sends a scheduling request (SR) to the serving BS periodically, however, the style of packet arriving is aperiodic and massive in mMTC scenario. Higher signaling overhead exists in GB-PDMA scheme, which significantly reduces the system capacity. GF-PDMA transmission allows the users to transmit their packets at any time. In GF-PDMA, transmission from users does not need the explicit scheduling grant from BS and multiple users can share the same time and frequency resources.

    Figure 4 describes the main difference between GB-PDMA and GF-PDMA scheme.For UL GB-PDMA transmission, before transmitting the data packet, a user sends a SR and receives a scheduling grant. Sending SR needs to wait for a SR-valid resource and a corresponding scheduling grant transmitted to the user in response. After the grant is decoded successfully, the data transmission starts.At the receiver, the BS decodes and detects whether the data is correct or not. If not, BS generates and sends negative acknowledge-ment (NACK) to the user. After the NACK is decoded successfully, the data retransmission starts. So the total delay for one GB-PDMA transmission concludes 7 parts shown infigure 4 (a), i.e., average waiting time for physical UL control channel (PUCCH), a user send SR on PUCCH, BS decodes SR and generates the scheduling grant, transmission of scheduling grant, user processing delay, transmission of UL data and data decoding in BS. The latency expression can be given by

    For GF-PDMA scheme, the total delay for one transmission only concludes 3 parts shown in figure 4 (b), i.e., average waiting time for UL access, transmission of UL data and buffer status report on PUSCH and data decoding in BS. The corresponding latency expression can be given by

    If SR period is 1 transmission time interval(TTI) and 1 TTI is equal to 2 OFDM symbols.(3) and (4) can be further expressed as

    From (5) and (6), we can see that the GF-PDMA can reduce about 1.07 ms latency compared with GB-PDMA.

    IV. TRANSMISSION SCHEME DESIGN FOR UL GF-PDMA

    4.1 Resource definition and allocation for GF-PDMA

    For the UL PDMA with GF access, several users may share the same pattern on the same REs, and due to the random access nature,those users may transmit at the same time. BPIDD receiver described in Section II is used to detect the data streams and distinguish multiple users with their channel state as long as these users use different pilot sequences or different demodulation reference signal (DMRS).Pattern reuse can help to increase the effective system overload and the number of connection to realize the massive connectivity.

    Fig. 4. Comparison of latency between GB-PDMA and GF-PDMA transmission.

    Fig. 5. Definition of a GF transmission unit.

    In order to support UL GF-PDMA, radio resources are defined for the proposed multiple access scheme. As shown in figure 5, a basic resource unit (BTU) is comprised of time & frequency, PDMA pattern and pilot sequence. There are 3 unique patterns defined over 2 time & frequency resources and 4 pilot sequences associated with each pattern.The allocation of pilot resources and PDMA pattern matrix resources are introduced as follows:those BTUs with serial number (0,1, 2), (3, 4, 5), (6, 7, 8) or (9, 10, 11) have the identical pilot resource yet different PDMA patterns whereas the BTUs with serial number (0, 3, 6, 9) have different pilot sequences yet identical PDMA patterng1=[1 1]T, the BTUs with serial number (1, 4, 7, 10) have different pilot sequences yet identical PDMA patterng2=[1 0]Tand so forth.

    In order to evaluate the performance of confronting collision,we add the PDMA patterns collision times continuously. Takingas an example, we investigate the average performance of 3, 4, 5 or 6 users under the assumption of 0, 1, 2 and 3 times collisions.

    If multiple users pick pattern 1 simultaneously, (1) can be expressed as:

    4.2 Transmission mechanism based on GF-PDMA

    In the mMTC scenario, most of the communications are sporadic [19], i.e., few of them being active at a relatively long time duration.The transmitted packets are usually with low data rate and small sizes. At the user side, a user can randomly choose a pattern from a predefined matrix, when multiple users choose the same pattern, they will be allocated different pilot sequences to distinguish between each other (as shown in figure 5). At the BS side, the dynamic UL grant is no longer necessary for GF-PDMA since UL grants occupy downlink (DL) control channel resources,elimination of grant signaling for traffic with UL GF-PDMA means that DL signaling overhead can be reduced.

    The proposed GF-PDMA features a six-step transmission procedure, which is described as follows:

    Step 1:The BS and the users predefine the key GF parameters such as system bandwidth,time & frequency partition ration, data transmission format, BTU and the mapping rule between BTU and users.

    Step 2:The users send random access request and access BS using the current LTE access scheme.

    Step 3:The BS builds a one to one mapping relationship according to the mapping parameters (e.g., path loss, position, UL receiving power and UL signal noise ratio(SNR)), then inform the relationship to users and acquire all the candidates carried on every PDMA BTU.

    The mapping rules from users to BS are described as follows:

    Rule 1: When the users access the base station, the BS allocates the corresponding PDMA BTU to the users. When the users send data, they can use the allocated resource.

    According to the number of the users in the deployment scenario and the ability of the BS processor, the BS selects suitable PDMA pattern matrix, and allocates the patterns with high and low diversity to the users far and near from the BS respectively. Each user will pick a pattern randomly from the pattern matrix. Specifically, PDMA patterns are divided into different groups according to the different diversity, and the patterns with the same diversity are divided into the same groups. Then the data in different groups, established time &frequency and pilot resources are mapped onto the PDMA BTUs. Thereinto,the main consideration for grouping with diversity is that the distribution and the UL channel conditions of the users are different, therefore, those users with similar channel conditions are allocated into the groups with same diversity.

    Rule 2:When the users access the BS, the BS does not allocate explicit resources to the users. According to the specific characteristics of the user (such as physical ID), the users are mapped onto the corresponding PDMA BTU according to certain rules (e.g., conduct modular operation between the user physical ID and the number of PDMA BTU).

    Rule 3:Using ergodic searching method,count the number of users on each BTU, and the BTUs with the least number of users have the priority to carry the coming data.

    Step 4:The users acquire the mapping relationship that the BS sends and transmit data and pilot on the allocated PDMA BTU at the same time when there are data need to send.

    Step 5:The BS monitors all the signals of the candidates on every PDMA BTU and determines the users whether to send data or not. Then the BS will conduct pilot channel estimation and data detection for those users sending data.

    Step 6:The BS determines whether there are multi-user pilot collisions (pilot collision is defined as more than two users select the same pilot on the same PDMA BTU), i.e., whether the time interval receiving the data from a user is longer the certain fixed threshold value, if yes, the pilot collision exists otherwise non-exist. When the pilot collision happens,there are two methods to address the problem.

    Method 1:the BS conducts one schedule transmission for the user on the reserved granted time & frequency resource and informs the user map on a new PDMA BTU by downlink signaling.

    Method 2:the BS informs the users that there are multiple pilot collisions, then the users generate a random back off time and each user sends its data after the corresponding back off time.

    V. NUMERICAL RESULTS

    In this section, we present some results and analysis of LLS and SLS. For LLS, we evaluate the scalability of GF-PDMA by increasing the pattern collision, and for SLS, we evaluate the system packet dropping rate (PDR) by varying the system traf fi c loading (packet arrival rate(PAR)) to verify the GF-PDMA’s capability to support massive connections for mMTC.

    5.1 LLS simulation results

    The assumptions for LLS simulation are shown as table 2.

    As listed in table 2, the patterns of PDMA are designed as Section II. The dimension of PDMA pattern is 2 with 0 or 1 non-zero elements in each pattern. There are up to 6 users in a group with pattern matrix. PDMA layers are detected with the BP-IDD detector and 6 physical resource blocks (PRB) are used in the simulation. For the OFDMA, the minimum mean square error (MMSE) algorithm[20] is used for detection.

    Table II. UL GF-PDMA link-level simulation assumptions.

    Fig. 6. LLS simulation results for multiple users pick pattern 2.

    The LLS results in terms of block error rate(BLER) performance are shown in figure 6 and figure 7.

    infigure 6, we evaluate the average performances of multiple users picking pattern 2.The results show that performance loss is very small when collision is less than three times.However, three times collision brings nearly 0.8 dB performance degradation @ BLER=0.01 compared with no collision but still is better than OFDMA.

    Fig. 7. LLS simulation results for multiple users pick pattern 1.

    Table III. UL GF-PDMA system-level simulation assumptions.

    infigure 7, we assume that user 1, user 4,user 5 and user 6 pick pattern 1, then we can see that the average performances of users are not been greatly affected when the number of collisions is less than 3. And there is about 0.1 dB performance degradation when 3 times collision happens @ BLER=0.01) compared with no collision. And the average BLER performance of PDMA still outperforms that of OFDM even there are 3 times collision happening.

    Comparing figure 6 and figure 7, we can observe that multiple users picking pattern 1 is slightly better than they picking pattern 2,since that pattern 1,g1=[1 1]T, has higher diversity than pattern 2,g2=[1 0]T. The LLS simulation results show that with the pattern design and BP-IDD receiver, PDMA is robust to pattern collision, thus enables GF transmission.

    5.2 SLS simulation results

    The mMTC traffic is small packet with sparse packet arrival, which is assumed that the packet size is equivalent to the transport block size in the simulation. System packet arrival rate should meet the requirement of packet dropping rate <= 1%. The packet dropping criteria is given as follows: drop a packet if the packet reaches the maximum number of transmissions N and cannot be decoded correctly where N is maximum number of HARQ transmissions in the simulation, or if its transfer is not completed within a maximum transfer time, e.g.[10ms].

    The users in the simulation are assumed to adopt the GF transmission scheme, and collisions happen when they occupy the same RE groups and pattern. For OFDMA, the signal of collided users is treated as interference.For PDMA, the base station tries to detect those collided users by BP-IDD algorithm.For OFDMA, minimum mean square error(MMSE) algorithm is used to detect the data from multiple users. The methodology for the simulation is described in [21] and the detailed simulation parameters for SLS are listed in table 3.

    In the simulation, by varying the system traffic loading in the simulations, we evaluate the system PDR. A user packet will be dropped, if, for example in this evaluation,the packet transmissions failed after the retransmissions exceed a certain time limit. We provide preliminary SLS simulation results below. Figure 8 illustrates the performance of GF-PDMA and GF-OFDMA, where it shows the system PDR vs. packet arrival rate.

    For OFDMA and PDMA, a 20 bytes packet is transmitted in one TTI. In the simulation,the maximal number of HARQ transmissions is 8 and random back-off is used.

    Figure 8 demonstrates the system PDR as a function of packet arrival rate for GF-PDMA and GF-OFDMA. It is observed that GF-PDMA has shown the significant performance enhancement over the GF-OFDMA baseline.It is shown that the GF-OFDMA PDR performance degrades much faster with the traffic load increasing than GF-PDMA. Specifically,@ PDR 1% point of interest in terms of packet arrival rate, GF-PDMA demonstrates nearly 111% gain over the GF-OFDMA baseline(i.e., GF-PDMA is 2.11 times the capability of GF-OFDMA).

    In figure 9, GF-PDMA demonstrates a large advantage over GF-OFDMA in terms of supported number of users to achieve the same system PDR. The GF-PDMA gains over GF-OFDMA are 1.9, 1.96 and 2.11 in terms of number of users the system support for given system PDRs of 0.4%, 0.8% and 1%, respectively. The significant gain of GF-PDMA can be explained by the fact that multiple users can multiplex on same resources and the collisions can also be handled well by BP-IDD algorithm.

    The SLS results infigure8 and figure9 also show that GF-PDMA is able to achieve significant gains over GF-OFDMA under different packet arrival rate (or traffic loading) scenarios.

    Fig. 8. System level simulation results of GF-PDMA compared with GF-OFDMA.

    Fig. 9. Capacity supported based on different PDR.

    VI. CONCLUSIONS

    In this paper, an UL GF scheme based on PDMA (GF-PDMA) has been proposed.Resource definition and allocation for UL GF-PDMA scheme are investigated. Transmission scheme is described and system performances are presented. LLS simulation results reveal that the collision of PDMA pattern has very limited impact on the reliability (BLER)performance with a given collision times (less than 3 times). SLS simulation results show that GF-PDMA outperforms GF-OFDMA in terms of PDR and system capacity. All the results demonstrate that the proposed scheme,GF-PDMA, can efficiently support massive connections for mMTC.

    ACKNOWLEDGEMENT

    This work was supported by National High Technology Research and Development Program of China (863 Program, No.2015AA01A709).

    References

    [1] 3GPP, NTT DOCOMO, “New sid proposal: Study on new radio access technology,” RP-160671,Mar. 2016.

    [2] 3GPP, CATT, “Usage scenarios of non-orthogonal multiple access,” R1-166466, Aug. 2016.

    [3] 3GPP, CATT, “Discussion on scenarios and use cases for multiple access,” R1-164246, May 2016.

    [4] D. Lin, G. Charbit and I. K. Fu, “Uplink Contention Based Multiple Access for 5G Cellular IoT,”Proc.2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), Boston, MA, 2015, pp.1-5.

    [5] X. Yang, X. Wang and J. Zhang, “Compressed sensing based ACK feedback for grant-free UL data transmission in 5G mMTC,”Proc. 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Valencia,2016, pp. 1-5.

    [6] Y. Wang, B. Ren, S. Sun, S. Kang and X. Yue,“Analysis of non-orthogonal multiple access for 5G,” inChina Communications, vol. 13, no. Supplement2, 2016, pp.

    [7] Linglong Dai, Bichai Wang, Yifei Yuan, et al.,“Non-Orthogonal Multiple Access for 5G: Solutions, Challenges, Opportunities, and Future Research Trends,”IEEE Commun. Magazine, vol.53, no. 9, Sep. 2015, pp. 74-81.

    [8] K. Auet al., “Uplink contention based SCMA for 5G radio access,”Proc. 2014 IEEE Globecom Workshops (GC Wkshps), Austin, TX, 2014, pp.900-905.

    [9] B. Wang, L. Dai, Y. Zhang, T. Mir and J. Li, “Dynamic Compressive Sensing-Based Multi-User Detection for Uplink Grant-Free NOMA,” in IEEE Communications Letters, vol. 20, no. 11, pp.2320-2323, Nov. 2016.

    [10] 3GPP, CATT, “Initial SLS results of PDMA,” R1-166470, Aug. 2016.

    [11] 3GPP, CATT, “SLS results of PDMA,” R1-1608756,Oct. 2016.

    [12] 3GPP, Huawei, HiSilicon, Discussion on grantfree transmission R1-166095, Gothenburg, Sweden, Aug. 2016.

    [13] W. Tang, S. Kang, B. Ren, X. Yue and X. Zhang,“Uplink Pattern Division Multiple Access(PDMA) in 5G Systems,” inIET Communications,to be appeared.

    [14] S. Chen, B. Ren, Q. Gao, et al., “Pattern Division Multiple Access—A Novel Nonorthogonal Multiple Access for Fifth-Generation Radio Networks,”IEEE Transactions on Vehicular Technology, vol. 66, no. 4, Apr. 2017, pp. 3185-3196.

    [15] X. Dai, S. ShaoHui, W. Yingming and R. Zou,“Successive interference cancellation amiable space-time codes with good multiplexing-diversity tradeoff,”Proc. 2009 15th Asia-Pacific Conference on Communications, Shanghai,2009, pp. 237-240.

    [16] X. Dai, R. Zou, J. An, X. Li, S. Sun and Y. Wang,“Reducing the Complexity of Quasi-Maximum-Likelihood Detectors Through Companding for Coded MIMO Systems,” inIEEE Transactions on Vehicular Technology, vol. 61, no. 3,2012, pp. 1109-1123.

    [17] B. Ren, Y. Wang, X. Dai, K. Niu and W. Tang,“Pattern matrix design of PDMA for 5G UL applications,” inChina Communications, vol. 13,no. Supplement2, 2016, pp. 159-173,

    [18] B. Ren et al., “Advanced IDD receiver for PDMA uplink system,”Proc. 2016 IEEE/CIC International Conference on Communications in China(ICCC), Chengdu, 2016, pp. 1-6.

    [19] 3GPP, CATT, “Consideration of mMTC in 5G system design”, R1-162302, Busan, South Korea,Apr. 2016

    [20] A. I. Sulyman and M. Hefnawi, “Capacity-aware linear MMSE detector for OFDM-SDMA systems,” inIET Communications, vol. 4, no. 9,2010, pp. 1059-1064.

    [21] 3GPP, CATT, “Remaining issues on evaluation assumption and methodology of MA”, R1-166468, Gothenburg, Sweden, Aug. 2016.

    国产精品亚洲一级av第二区| 日韩免费av在线播放| 国产蜜桃级精品一区二区三区| 性色av乱码一区二区三区2| 国产极品粉嫩免费观看在线| 国产在线精品亚洲第一网站| 国产无遮挡羞羞视频在线观看| 亚洲美女黄片视频| 国产成人精品在线电影| 亚洲成人久久性| 精品国产一区二区三区四区第35| 在线观看免费午夜福利视频| 99精品在免费线老司机午夜| 18禁观看日本| 一二三四社区在线视频社区8| 十八禁人妻一区二区| 大码成人一级视频| 欧美不卡视频在线免费观看 | 自线自在国产av| 村上凉子中文字幕在线| 极品教师在线免费播放| 老司机午夜福利在线观看视频| 一级毛片女人18水好多| 久久人人97超碰香蕉20202| 男女床上黄色一级片免费看| 制服诱惑二区| 真人做人爱边吃奶动态| 亚洲少妇的诱惑av| 欧美日韩乱码在线| 久久久久国产一级毛片高清牌| 咕卡用的链子| 国产xxxxx性猛交| 香蕉丝袜av| 免费看十八禁软件| cao死你这个sao货| 国产精品99久久99久久久不卡| 亚洲专区字幕在线| 激情在线观看视频在线高清| 欧美性长视频在线观看| 天堂俺去俺来也www色官网| 侵犯人妻中文字幕一二三四区| 精品国产亚洲在线| 国产成人欧美| 精品一区二区三区视频在线观看免费 | 亚洲aⅴ乱码一区二区在线播放 | 亚洲国产中文字幕在线视频| 淫妇啪啪啪对白视频| 亚洲av片天天在线观看| 色婷婷久久久亚洲欧美| 精品国产超薄肉色丝袜足j| 99久久人妻综合| 少妇被粗大的猛进出69影院| 美女高潮到喷水免费观看| 极品教师在线免费播放| www国产在线视频色| 美国免费a级毛片| 亚洲精品在线观看二区| 久久精品人人爽人人爽视色| 国产精品亚洲av一区麻豆| 国产亚洲精品一区二区www| 婷婷精品国产亚洲av在线| 琪琪午夜伦伦电影理论片6080| 欧美日韩一级在线毛片| 美国免费a级毛片| 日韩成人在线观看一区二区三区| 亚洲狠狠婷婷综合久久图片| 日韩高清综合在线| 亚洲黑人精品在线| 91成年电影在线观看| 在线天堂中文资源库| 亚洲久久久国产精品| 日韩三级视频一区二区三区| 精品国产乱码久久久久久男人| 免费看十八禁软件| 老司机午夜十八禁免费视频| 久久伊人香网站| 午夜日韩欧美国产| 国产精品99久久99久久久不卡| 久久人人97超碰香蕉20202| 在线观看免费视频网站a站| 色综合站精品国产| 午夜福利在线观看吧| 免费不卡黄色视频| 成人18禁高潮啪啪吃奶动态图| 日韩一卡2卡3卡4卡2021年| 一级片'在线观看视频| svipshipincom国产片| 黄片播放在线免费| 黄色毛片三级朝国网站| 欧美乱色亚洲激情| 欧美日韩黄片免| 色哟哟哟哟哟哟| 人人妻,人人澡人人爽秒播| 亚洲片人在线观看| 日韩三级视频一区二区三区| 日日干狠狠操夜夜爽| 国产精品偷伦视频观看了| 人人妻人人澡人人看| 国产精品亚洲av一区麻豆| 亚洲精品久久午夜乱码| 免费日韩欧美在线观看| 亚洲av成人不卡在线观看播放网| 国产av一区二区精品久久| 美女高潮到喷水免费观看| 亚洲精华国产精华精| 夜夜夜夜夜久久久久| 久久久久久久久免费视频了| 久久久久久久久免费视频了| 国产精品国产高清国产av| 久久欧美精品欧美久久欧美| 美女高潮喷水抽搐中文字幕| 满18在线观看网站| 亚洲人成电影免费在线| www国产在线视频色| 一级毛片精品| 成人永久免费在线观看视频| 九色亚洲精品在线播放| 欧美日韩瑟瑟在线播放| 91在线观看av| 亚洲 欧美一区二区三区| 女人精品久久久久毛片| 丝袜人妻中文字幕| 亚洲七黄色美女视频| 久久久国产精品麻豆| 免费高清视频大片| 日韩大码丰满熟妇| 精品日产1卡2卡| 亚洲精品av麻豆狂野| 欧美日韩瑟瑟在线播放| 成年版毛片免费区| ponron亚洲| 少妇被粗大的猛进出69影院| 黄频高清免费视频| 国产成人一区二区三区免费视频网站| 国产精品一区二区在线不卡| 超碰成人久久| av天堂在线播放| 十八禁网站免费在线| 最近最新免费中文字幕在线| 亚洲成国产人片在线观看| 亚洲色图综合在线观看| av免费在线观看网站| 欧美av亚洲av综合av国产av| 美女高潮到喷水免费观看| 午夜免费激情av| 国产av一区在线观看免费| 水蜜桃什么品种好| 婷婷精品国产亚洲av在线| 一区福利在线观看| 91成年电影在线观看| 成年人黄色毛片网站| 国产精品永久免费网站| 91九色精品人成在线观看| 激情视频va一区二区三区| 美女大奶头视频| 国产精品自产拍在线观看55亚洲| 久久久久九九精品影院| 老司机福利观看| 精品国产国语对白av| 亚洲三区欧美一区| av欧美777| 免费女性裸体啪啪无遮挡网站| 啪啪无遮挡十八禁网站| 性欧美人与动物交配| 两个人看的免费小视频| 午夜两性在线视频| 国产一卡二卡三卡精品| 国产精品久久视频播放| 久久伊人香网站| 国产精品一区二区精品视频观看| 亚洲国产看品久久| 日日干狠狠操夜夜爽| 99久久综合精品五月天人人| 免费日韩欧美在线观看| 99re在线观看精品视频| 满18在线观看网站| 成熟少妇高潮喷水视频| 国产精品国产高清国产av| 一a级毛片在线观看| 最近最新中文字幕大全免费视频| 久久久国产成人精品二区 | 精品一区二区三区视频在线观看免费 | 精品少妇一区二区三区视频日本电影| 老汉色∧v一级毛片| 国产高清激情床上av| 成人亚洲精品一区在线观看| 成年人黄色毛片网站| 老司机福利观看| 午夜福利影视在线免费观看| 男女午夜视频在线观看| av有码第一页| 亚洲色图 男人天堂 中文字幕| 男女高潮啪啪啪动态图| 欧美激情久久久久久爽电影 | 精品一品国产午夜福利视频| 色综合站精品国产| 免费在线观看黄色视频的| 欧美成人免费av一区二区三区| 亚洲 欧美一区二区三区| 又紧又爽又黄一区二区| 国产又色又爽无遮挡免费看| 19禁男女啪啪无遮挡网站| 视频在线观看一区二区三区| 两人在一起打扑克的视频| 国产精品野战在线观看 | 日本免费a在线| 免费在线观看黄色视频的| 脱女人内裤的视频| 99国产精品99久久久久| 黄色成人免费大全| 在线观看免费视频网站a站| 满18在线观看网站| 精品欧美一区二区三区在线| 9191精品国产免费久久| 欧美日韩av久久| 欧美黑人精品巨大| 免费搜索国产男女视频| av天堂久久9| 精品国产亚洲在线| 国产成年人精品一区二区 | 亚洲人成网站在线播放欧美日韩| 欧美av亚洲av综合av国产av| 国产成人精品在线电影| 欧美色视频一区免费| 中文字幕最新亚洲高清| 夜夜看夜夜爽夜夜摸 | 如日韩欧美国产精品一区二区三区| 国产在线精品亚洲第一网站| 热re99久久精品国产66热6| 黄片小视频在线播放| 男人的好看免费观看在线视频 | 欧美日韩黄片免| 亚洲精品美女久久av网站| 美女 人体艺术 gogo| 亚洲中文日韩欧美视频| 欧美乱妇无乱码| 美女福利国产在线| 亚洲国产精品sss在线观看 | 欧美久久黑人一区二区| 精品国产国语对白av| 热99re8久久精品国产| 好看av亚洲va欧美ⅴa在| 日韩欧美一区视频在线观看| 一边摸一边抽搐一进一小说| 日日夜夜操网爽| 亚洲精品一区av在线观看| 日本免费a在线| 久久午夜亚洲精品久久| 18禁裸乳无遮挡免费网站照片 | 亚洲国产欧美日韩在线播放| 人人妻人人爽人人添夜夜欢视频| 成人手机av| 正在播放国产对白刺激| 老司机亚洲免费影院| 男人舔女人下体高潮全视频| 久久天躁狠狠躁夜夜2o2o| 制服人妻中文乱码| 久久久久久免费高清国产稀缺| 日本黄色日本黄色录像| 国产极品粉嫩免费观看在线| 欧美乱码精品一区二区三区| 欧美av亚洲av综合av国产av| 99精国产麻豆久久婷婷| 可以免费在线观看a视频的电影网站| 国产精品国产高清国产av| 另类亚洲欧美激情| 欧美精品一区二区免费开放| 看黄色毛片网站| 天天影视国产精品| 最近最新免费中文字幕在线| 亚洲avbb在线观看| 麻豆成人av在线观看| 亚洲精品粉嫩美女一区| 午夜福利欧美成人| 亚洲aⅴ乱码一区二区在线播放 | 丰满人妻熟妇乱又伦精品不卡| 亚洲av成人一区二区三| 波多野结衣av一区二区av| 人成视频在线观看免费观看| 久久久久精品国产欧美久久久| 一区二区三区激情视频| 在线天堂中文资源库| 日本撒尿小便嘘嘘汇集6| 两性午夜刺激爽爽歪歪视频在线观看 | 欧美在线黄色| 丝袜人妻中文字幕| 国产99久久九九免费精品| 精品人妻1区二区| 久久久久久久久久久久大奶| 亚洲在线自拍视频| 97碰自拍视频| av网站免费在线观看视频| 久久人妻av系列| www.自偷自拍.com| 久久精品影院6| 亚洲熟妇中文字幕五十中出 | 亚洲熟女毛片儿| 欧美日本中文国产一区发布| 中文字幕色久视频| 亚洲专区国产一区二区| 日韩欧美三级三区| 黄色片一级片一级黄色片| 两性午夜刺激爽爽歪歪视频在线观看 | 大型黄色视频在线免费观看| 欧美激情高清一区二区三区| 国产精品久久电影中文字幕| 欧美日韩黄片免| 少妇裸体淫交视频免费看高清 | 国产激情欧美一区二区| 国产亚洲精品第一综合不卡| 国产精品 国内视频| 窝窝影院91人妻| 亚洲成人精品中文字幕电影 | 久久青草综合色| 国产亚洲精品第一综合不卡| 免费看十八禁软件| 中文字幕高清在线视频| 国产三级黄色录像| 一区二区三区国产精品乱码| 亚洲av日韩精品久久久久久密| 亚洲在线自拍视频| 十八禁网站免费在线| 国产aⅴ精品一区二区三区波| 久久亚洲精品不卡| www.精华液| 美女午夜性视频免费| 久久久久久亚洲精品国产蜜桃av| 新久久久久国产一级毛片| 久99久视频精品免费| 黄色 视频免费看| 国产精华一区二区三区| 不卡一级毛片| 一级作爱视频免费观看| 少妇粗大呻吟视频| 日韩有码中文字幕| 99久久久亚洲精品蜜臀av| 成年人黄色毛片网站| 国产亚洲精品久久久久久毛片| 电影成人av| a级毛片黄视频| 亚洲精品中文字幕一二三四区| 国产成+人综合+亚洲专区| 淫秽高清视频在线观看| 欧美乱码精品一区二区三区| 中文字幕人妻丝袜制服| 一本大道久久a久久精品| av在线天堂中文字幕 | 18禁国产床啪视频网站| 久久久久久久久免费视频了| www.999成人在线观看| 亚洲欧洲精品一区二区精品久久久| 男人舔女人下体高潮全视频| 黑人猛操日本美女一级片| 久久亚洲精品不卡| 午夜久久久在线观看| 男女下面进入的视频免费午夜 | 在线观看午夜福利视频| 国产精品1区2区在线观看.| 国产成人精品无人区| 一本大道久久a久久精品| 香蕉丝袜av| 一本大道久久a久久精品| av在线天堂中文字幕 | 国产亚洲欧美在线一区二区| 麻豆一二三区av精品| 久久香蕉国产精品| 在线观看免费高清a一片| 色综合站精品国产| 韩国av一区二区三区四区| 99国产综合亚洲精品| 大香蕉久久成人网| 国产乱人伦免费视频| 久久亚洲真实| 欧美日韩av久久| 母亲3免费完整高清在线观看| 亚洲国产精品合色在线| 精品福利永久在线观看| av免费在线观看网站| 夜夜爽天天搞| 麻豆成人av在线观看| 久久久国产精品麻豆| 91精品三级在线观看| 国产男靠女视频免费网站| 久久久水蜜桃国产精品网| 亚洲色图 男人天堂 中文字幕| 欧美黄色淫秽网站| 国产无遮挡羞羞视频在线观看| 亚洲国产欧美一区二区综合| 精品国产乱子伦一区二区三区| 人人妻,人人澡人人爽秒播| 国产黄色免费在线视频| 一级毛片高清免费大全| 日本精品一区二区三区蜜桃| 精品久久蜜臀av无| 热re99久久精品国产66热6| 午夜亚洲福利在线播放| 亚洲欧美精品综合久久99| 麻豆久久精品国产亚洲av | 精品欧美一区二区三区在线| 亚洲三区欧美一区| 午夜亚洲福利在线播放| 99国产精品99久久久久| 国产欧美日韩一区二区三| 精品熟女少妇八av免费久了| 在线十欧美十亚洲十日本专区| 五月开心婷婷网| 亚洲第一欧美日韩一区二区三区| 悠悠久久av| 满18在线观看网站| 国产成人免费无遮挡视频| 丁香欧美五月| 欧美人与性动交α欧美精品济南到| 午夜福利影视在线免费观看| www.999成人在线观看| 亚洲国产中文字幕在线视频| 国产深夜福利视频在线观看| 亚洲五月天丁香| 欧美乱码精品一区二区三区| 琪琪午夜伦伦电影理论片6080| 人人澡人人妻人| 午夜福利欧美成人| 国产成人欧美在线观看| 天天躁夜夜躁狠狠躁躁| 中国美女看黄片| xxxhd国产人妻xxx| 国产精品国产av在线观看| 99精品久久久久人妻精品| 又紧又爽又黄一区二区| 国产亚洲精品久久久久5区| 亚洲欧美日韩高清在线视频| 日韩欧美国产一区二区入口| 久久天躁狠狠躁夜夜2o2o| 国产成人啪精品午夜网站| 在线观看一区二区三区激情| a级毛片在线看网站| 美女福利国产在线| 国产在线观看jvid| 亚洲免费av在线视频| 欧美国产精品va在线观看不卡| 在线免费观看的www视频| 无遮挡黄片免费观看| 热re99久久精品国产66热6| 免费高清在线观看日韩| 婷婷丁香在线五月| 激情视频va一区二区三区| 欧美激情高清一区二区三区| 国产在线精品亚洲第一网站| 男女做爰动态图高潮gif福利片 | 一区二区日韩欧美中文字幕| 两人在一起打扑克的视频| 每晚都被弄得嗷嗷叫到高潮| 国产色视频综合| 亚洲国产精品合色在线| 日韩三级视频一区二区三区| 校园春色视频在线观看| 欧美日韩黄片免| 99国产精品一区二区蜜桃av| 我的亚洲天堂| 婷婷六月久久综合丁香| 成人亚洲精品av一区二区 | 少妇的丰满在线观看| 亚洲一区二区三区色噜噜 | 最新在线观看一区二区三区| 12—13女人毛片做爰片一| 欧美日韩一级在线毛片| ponron亚洲| 亚洲人成电影观看| 亚洲午夜精品一区,二区,三区| 国产一区二区三区在线臀色熟女 | 99国产精品免费福利视频| 老司机午夜福利在线观看视频| 国产无遮挡羞羞视频在线观看| 久久久久国内视频| 色婷婷久久久亚洲欧美| 嫩草影院精品99| 黄色a级毛片大全视频| 国产精品久久久av美女十八| 亚洲人成电影免费在线| 热re99久久精品国产66热6| 亚洲黑人精品在线| 国产精品乱码一区二三区的特点 | 亚洲国产欧美一区二区综合| 国产成+人综合+亚洲专区| 免费高清在线观看日韩| 夜夜躁狠狠躁天天躁| 国产高清激情床上av| 婷婷丁香在线五月| 久久人人97超碰香蕉20202| 国产精华一区二区三区| 国产乱人伦免费视频| 日本免费a在线| 在线国产一区二区在线| 日本黄色日本黄色录像| 久久影院123| a级片在线免费高清观看视频| 校园春色视频在线观看| 精品国产一区二区三区四区第35| 最新在线观看一区二区三区| 婷婷精品国产亚洲av在线| 亚洲人成伊人成综合网2020| 成人国产一区最新在线观看| 视频区图区小说| 12—13女人毛片做爰片一| 制服诱惑二区| 国产亚洲av高清不卡| 在线观看午夜福利视频| 日韩精品中文字幕看吧| 欧洲精品卡2卡3卡4卡5卡区| 午夜免费成人在线视频| 在线观看免费午夜福利视频| 国产欧美日韩一区二区三区在线| 麻豆国产av国片精品| 成人av一区二区三区在线看| 久9热在线精品视频| 身体一侧抽搐| 中文字幕人妻熟女乱码| 精品电影一区二区在线| 欧美日韩一级在线毛片| 大型黄色视频在线免费观看| 人人妻人人澡人人看| 免费在线观看影片大全网站| 91国产中文字幕| 999久久久精品免费观看国产| tocl精华| 亚洲一区二区三区色噜噜 | 黑人欧美特级aaaaaa片| 欧美激情极品国产一区二区三区| av国产精品久久久久影院| 亚洲精品粉嫩美女一区| 国产日韩一区二区三区精品不卡| 一进一出好大好爽视频| 久久久久久久久免费视频了| 中文字幕人妻丝袜一区二区| 人人妻人人添人人爽欧美一区卜| 美女高潮喷水抽搐中文字幕| xxx96com| 男女床上黄色一级片免费看| www.精华液| 国产不卡一卡二| 精品午夜福利视频在线观看一区| 国产精品国产av在线观看| 成人18禁高潮啪啪吃奶动态图| 国产精品免费一区二区三区在线| 久久影院123| 91麻豆精品激情在线观看国产 | 亚洲av成人av| 久久久久久久久中文| 精品国产乱码久久久久久男人| 亚洲av片天天在线观看| 日本免费a在线| 国产精品久久久久成人av| 亚洲av熟女| 国产精品一区二区精品视频观看| 精品福利永久在线观看| 日韩国内少妇激情av| 国产一区二区三区在线臀色熟女 | 黄色视频,在线免费观看| 一本大道久久a久久精品| 满18在线观看网站| 777久久人妻少妇嫩草av网站| 国产精品 国内视频| 夜夜看夜夜爽夜夜摸 | 女人爽到高潮嗷嗷叫在线视频| 亚洲一码二码三码区别大吗| 一二三四在线观看免费中文在| 国产精华一区二区三区| 午夜视频精品福利| 夜夜夜夜夜久久久久| 一级a爱片免费观看的视频| 亚洲第一欧美日韩一区二区三区| 少妇被粗大的猛进出69影院| 丰满迷人的少妇在线观看| 欧美日本中文国产一区发布| 在线国产一区二区在线| 狠狠狠狠99中文字幕| 亚洲熟女毛片儿| 国产精品美女特级片免费视频播放器 | 国产精品美女特级片免费视频播放器 | 99国产精品99久久久久| 国产亚洲精品久久久久5区| 一级a爱视频在线免费观看| 欧美精品一区二区免费开放| 久久欧美精品欧美久久欧美| 99久久综合精品五月天人人| 国产精品免费一区二区三区在线| 久久青草综合色| 精品国产乱码久久久久久男人| 欧美不卡视频在线免费观看 | 黄色片一级片一级黄色片| 日韩成人在线观看一区二区三区| 高清在线国产一区| 欧美激情极品国产一区二区三区| 一本综合久久免费| 国产精品久久视频播放| 老汉色∧v一级毛片| 很黄的视频免费| 国产一区在线观看成人免费| 久久久久精品国产欧美久久久| 久久天堂一区二区三区四区| 99精品在免费线老司机午夜| 日本免费a在线| 亚洲三区欧美一区| x7x7x7水蜜桃| 久热这里只有精品99| 亚洲 欧美一区二区三区| 日本a在线网址| 国产一区二区三区视频了| 欧美中文日本在线观看视频| 免费在线观看完整版高清| 国产亚洲精品一区二区www| 国产精品久久久久久人妻精品电影| 国产精品98久久久久久宅男小说| 久9热在线精品视频| 亚洲自拍偷在线| 亚洲欧洲精品一区二区精品久久久|