• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Smart Prediction for Seamless Mobility in F-HMIPv6 Based on Location Based Services

    2018-05-23 01:38:18RawyaRizkHebaNashaat
    China Communications 2018年4期

    Rawya Rizk, Heba Nashaat

    Electrical Engineering Department, Port Said University, Port Said, 42523, Egypt

    I. INTRODUCTION

    Location Based Services (LBS) is becoming one of the most important features in mobile devices. It has a number of uses in social networking today as an entertainment service, which is accessible with mobile devices through the mobile network and which uses information on the geographical position of the mobile device. LBS are also used in a variety of contexts, such as indoor object search,entertainment, work, and personal life. It is a wireless-IP service that uses geographic information to serve a mobile user and enlarge the scope of mobile applications [1-4].

    Mobility management is an essential technology for keeping track of the users’ current location and for delivering data correctly. The Internet Engineering Task Force (IETF) has proposed Mobile IPv6 (MIPv6) [5] as the main protocol for mobility management at the IP layer. Several extensions such as Fast Handoff for Hierarchical Mobile IPv6 (F-HMIPv6)protocol has been proposed to enhance the performance.

    Figure 1 shows the network model of F-HMIPv6. A domain is managed by Mobility Anchor Point (MAP). While entering a MAP domain, the mobile node (MN) receives router advertisements containing information about local MAPs from Access Routers (ARs) within range. The MN obtains two care of addresses (CoAs): an onlink Local CoA (LCoA) and a Regional CoA (RCoA) within the selected MAP domain. Then, a Local Binding Update(LBU) message is sent to the MAP to bind the MN’s LCoA with its RCoA. Upon receipt of a successful Binding Acknowledgment (BA),the MN updates the binding of its RCoA with the home agent (HA) and each corresponding node (CN). As a result, packets destined to the MN are intercepted by the MAP, encapsulated and forwarded to the MN’s on-link address. A movement within the MAP domain (intra domain) merely incurs LBUs at the MAP without further propagation to the HA and CNs.Thus, it significantly reduces the signaling load and micro-mobility related handoff delays. F-HMIPv6 is an effective integration that has been designed to enable a MN to exchange handoff signaling messages with a local MAP and to establish a tunnel between the MAP and New AR (NAR) instead of between the Previous AR (PAR) and NAR [6].

    Some literatures introduce seamless handoffs in wireless networks by using prediction techniques have been presented. However,they have rarely addressed issues with predictions of behavior in real deployment. In addition, previous schemes based on F-HMIPV6 usually suffer from three major drawbacks:First, they do not consider the QoS of the traffi c. Second, they only focus on the micro mobility level. Third, they do not take advantage of the information they already have about the user mobility behavior in order to reduce handoff effects.

    This paper presents a performance evaluation analysis for original protocol for micro and macro handoff cases. Then solves the problem of quantifying the degradation of quality of services (QoS) a mobile user perceives during macro and micro handoff, and the signaling load costs associated with each case. In this paper, F-HMIPv6 based on LBS(LBS_ F-HMIPv6) scheme is proposed. It considers LBS that uses the available information about MN such as user mobility patterns to predict handoff and improve network’s QoS. This information is used efficiently to reduce handoff latency and improve services.The performance of the proposed scheme is verified by analysis. The comparison of F-HMIPv6 and the proposed scheme shows a significant improvement in the performance of the proposed scheme in terms of packet delivery cost and location update cost under the variation of user density and session-to-mobility ratio.

    The reset of this paper is organized as follows. Section II presents the related work. The proposed scheme is presented in Section III.The analytic models are shown in Section IV.Section V presents the simulation results for the prediction system. Section VI introduces the numerical results. Finally, Section VII,presents the concluding remarks.

    In this paper, a proposed scheme for smooth handoff over F-HMIPv6 networks is introduced.

    II. RELATED WORK

    Several extensions of MIPv6 such as Fast Handoffs for MIPv6 (FMIPv6) and Hierarchical MIPv6 (HMIPv6), have been proposed to enhance MIPv6. Combination of HMIPv6 and FMIPv6 motivates the design of F-HMIPv6 protocol. It combines more efficient network bandwidth usage of HMIPv6 and the less handoff latency and packet loss of FMIPv6.

    Fig. 1. Network Model of F-HMIPv6.

    Some literatures introduce performance analysis of IPv6 mobility management protocols using analytical models have been presented. These literatures involve the performance analysis of MIPv6 [7, 8], the performance for Hierarchical MIP (HMIP), Dynamic HMIP (DHMIP), and Multicast HMIP (MHMIP) [9], the performance of Proxy MIPv6(PMIPv6) [10], and comparison between PMIPv6 and Fast PMIPv6 (FPMIPv6) [11]. In[12], the performance analysis of F-HMIPv6 is presented. The analytical comparison between MIPv6, FMIPv6, HMIPv6, and a combination of FMIPv6 and HMIPv6 are introduced in [13,14]. Enhanced Scheme of F-HMIPv6 (ES-FHMIPv6) that is introduces the enhancement of F-HMIPv6 is presented in [15].

    A number of literatures introduce seamless handoffs in wireless networks by using prediction techniques have been introduced. Some prediction techniques estimate the received signal strength value for the ARs and select the best candidate AR [16-19]. In [20], the prediction is based on selection metrics that are collected and considered inputs of a fuzzy decision making system in order to select the best preferable AR. Three prediction schemes are presented. In Adaptive Handoff Prediction(AHP), handoff decisions are performed in each MN independently based on the direction toward APs, and it’s load. In Access Point candidacy value (APCV), the decision-making parameters are data rate and mobile speed. In D-Scan which considers QoS of ongoing applications, all obtained APs are stored in a local AP database. Thus, the scan process finds a certain number of APs with acceptable signal strength.

    Some of mobility prediction schemes are based on Markov Chains. In [21], a developed model that is based on Markov chain, predicts the user’s trajectory in terms of a handoff sequence in order to minimize the interruption time and the associated signaling when the handoff is triggered. In [22], a SmartDC comprises unsupervised mobility learner, mobility predictor, and Markov decision process-based adaptive duty cycling is presented. SmartDC estimates the regularity of individual mobility and predicts residence time at places to determine ef fi cient sensing schedules.

    In [23], MAHO_FHMIPv6 scheme is presented. It is based on F-HMIPv6 which implements a combined-detection function between MN and MAP and calculates the Normalized Edit Distance is presented to analyze the motion trail and estimate the motion pattern of MN. According to the estimating result, MAP determines the way MN attaches to the new AR so as to reuse some previous handoff information. However, it lacks in analysis since its performance is based on simulation, and it considers only micro mobility. In addition, it considers some known motion patterns such as ping pong, random, and linear instead of real motion.

    Previous works in F-HMIPV6 have rarely addressed issues with predictions of behavior in real deployment. They do not take advantage of the information they already have about the user mobility behavior in order to reduce handoff effects. In addition, they only focus on the micro mobility level and they do not consider the QoS of the traffic. In this paper, the user mobility behavior is considered which is based on real motion. It considers LBS that uses the available information about MN such as user mobility patterns to predict handoff and improve network’s QoS. This information is used efficiently to reduce handoff latency and improve services. The paper also presents the analysis of both micro and macro handoffs.

    III. THE ARCHITECTURE OF THE PROPOSED LBS_ F-HMIPV6 SCHEME

    In this section, the proposed LBS_ F-HMIPv6 scheme is presented. It has the advantages of low latency and fast handoff. In real life,most people usually follow a finite number of paths such as the path from home to work.According to this observation the proposed scheme defines a number of mobility patterns based on user daily behavior. This information is used efficiently to reduce handoff latency and improve services. The user may change his behavior at any moment. For example, if he would like to try something new such as traveling to another town in the weekend. In this case, he follows a new path which is not included in his known mobility profiles. The proposed scheme adapts with such situations by using LBS.

    Figure 2 shows the major components of the proposed scheme. It consists of a prediction system in MN which is presented as software package installed in MN’s operating system. This package uses a learning algorithm to gather information about user behavior using LBS. This information is used to create user mobility pro files which can be used to predict the NAR in order to reduce handoff latency.So the prediction system is mainly based on user mobility pro files.

    The proposed LBS_ F-HMIPv6 scheme works as follows: First, Layer 2 (L2) in MN indicates that there is available AR, and then it searches the mobility profile stored in MN for a path that contains the current AR’s IP. If a number of matching paths appear as a result of this search, prediction system selects three paths that have highest weights and uses them to predict NAR’s IP and its MAP. In this case,the prediction process becomes successful as it returns the paths containing MN’s current point. Then, MN can register with NAR and send the LBU message to NARs. L2 starts the handoff procedure and Layer 3 (L3) connection is lost. In the end, MN sends BU message to HA. All CNs will continue sending and receiving packets via NAR.

    The prediction system of the proposed scheme is implemented in MN to predict the NAR in order to reduce handoff latency. The prediction is based on the information stored in user mobility pro file allocated by LBS. The system is presented as a software package that is installed on MN’s operating system as a necessary step when the network is con figured on the MN’s device for the first time. This software works as a running LBS which aims to collect information about the user and analyze this information to update user pro file.

    The prediction system works when the service faces L2 triggering situation in which L2 indicates that a NAR is available, or when it receives a better signal from NARNfollowed by the degradation of the PAR’s signal. This type of events generated by L2 mechanisms,forces the prediction system to invoke AR’s IP prediction algorithm to predict the NAR based on the existing mobility pro file.

    The program’s main structure can be represented by the pseudo code in Figure 3, in which the main loop runs forever to present the running service that keeps track of the MN’s different events such as L2 triggering or capturing user behavior.

    The prediction system can be divided into two modules: the training module and the AR’s IP prediction module.

    i) The training module is presented in Figure 4. LBS information trains the proposed system to understand the user behavior. For example, most mobile users leave their homes in the morning heading to work using the same paths every day. They probably would like to take advantage of the time they waste in transition between work and home. So they use their cell phones/laptops to accomplish work using network services that include dealing with different traffic types.

    Fig. 2. The architecture of the proposed LBS_ F-HMIPv6.

    Fig. 3. Pseudo code of main program.

    The training system gathers LBS information about the user and concatenating with cur-rent AR’s IP and MAP. The system captures this information every given amount of time called capture time. This information is stored in MN’s memory to build the user behavior table. User behavior table contains records showing changing AR’s IP and MAP along the user’s day. The pseudo code of the “Capture Behavior” event handler is presented in Figure 5.

    The second part in the training module is the analysis process. The system uses the gathered information and analyses it to con figure mobility patterns for the user. The analysis process is executed after given amount of time called analysis time.

    The training module invokes analysis procedure is shown in Figure 6. In the analysis process, every captured event in the user’s behavior table is analyzed. The output of the analysis procedure would be a mobility profile that shows a list of paths the user follows during the analysis time. For example, on the fi rst day the user leaves home at 6:00 am, and goes to the work. In his way the user crosses the ARs [PARP, NARP, PARN, and NARN] at 6:30, 7:15, 8:00, and 9:00 am; respectively.Then he arrives his work in NARNat 9:00 am,stays at work till 4:00 pm, and then returns to home passing ARs [NARN, PARN, NARP, and PARP].

    Then, this path [PARP, NARP, PARN, NARN,PARN, NARP, and PARP] is stored. Each AR with its entry time and the path is linked to its day. This linked path presents a record in the generated user mobility pro file that would contains a record for every day in the analysis period. The mobility profile is the output of the analysis process. In order to have a result with high precision, the generated mobility profile must be validated with the previous mobility pro file which was generated from the last analysis process.

    Fig. 4. Training procedure.

    Fig. 5. Pseudo code of “Capture Behavior” procedure.

    Fig. 6. Pseudo code of “Analyze Behavior” procedure.

    Validation process involves comparing the results and shows what paths the user usually takes in his daily life. Validation emphasizes these paths and gives them a higher weight according to how much the user takes these paths. Validation process also takes notice if the user changes his daily behavior. For example, if the user changes his work place, a new path is detected. The program analyzes it and replaces the new path with the corresponding old one. The output of the validation system is the validated mobility profile and this is the pro file in which the system uses to predict NAR’s IP.

    ii) The prediction system which is the AR’s IP prediction is presented in Figure 7. In this procedure, the system inquires the mobility profile about the predicted NAR’s IP. This happens when L2 indicates that a NAR is available. In this case, the system asks the mobility pro file if the user has already experienced this AR’s IP at a time which is close to the current. Then, the mobility pro file returns one or more matching paths. A selection algorithm is executed on the returned matching paths to choose three paths. The selecting algorithm takes the paths’ weight into consideration to select the chosen paths. The chosen paths return the predicted NAR’s IP so MN can start registering.

    Fig. 7. Predicting mobility path procedures.

    Fig. 8. Hexagonal cellular con figurations in F-HMIPv6 architecture.

    Fig. 9. State diagram of MN’s movement.

    The handoff prediction system includes three processes: the querying process which is presented in “Find Path” function, the selection process which is presented in “Applying Selection Algoritm” function, and registration process which uses the returned predicted NAR’s IP to register MN with the NAR.

    IV. ANALYTIC MODELS

    The mobility management procedure is used to implement the cost functions. These cost functions are used to analyze the performance of F-HMIPv6 and the proposed LBS_ F-HMIPv6 scheme. The notation used is given in Table 1.

    A cellular network decomposed into hexagonal cells is considered where each cell contains a base station. Each cell is surrounded by rings of cells, except for cells in the outermost ring. Each domain is composed of k rings of the same size. The inmost cell labeled “0”, the central cell. Cells labeled “1” constitute the fi rst ring around cell “0”, and so on. Each ring is labeled in accordance with the distance to the cell “0”. Figure 8 shows an example of a MAP domain with two rings [24].

    The Baumann mobility model is considered since that it is proved in [12] that it is appropriate for any type of MN movement. It finds the border crossing rate for which the MN out of an AR and the border crossing rate out of MAP. Furthermore, it finds the border crossing rate for which the MN out of an AR and still stays in the same MAP. When the MN crosses a MAP border, it also crosses an AR border.According to the state transition diagram in Figure 9, the state i (i ≥ 0) is defined as the number of AR that the MN passes within a single access network. The state transition μAR(i,i+1)(0 ≤ i < k) represents the rate of MN’s movement from one AR to another. The transitions μMAP(i,0) (1 ≤ i ≤ k) represent the movement to an AR out of the MAP [8].

    If there are k sufficiently large ARs within a MAP, then the border crossing rate of MN may be defined as [8]. The movement rate out of an AR:

    The implementation of cost function consists of implementing location update cost,and packet delivery cost.

    4.1 Location update signaling cost

    Location update cost is represented by the number of control messages transferred during location update time. This cost can either appear in wireless network or in a wired network. The transmission cost of a control packet between two nodes X and Y belonging to the wired part of a network can be expressedwhile the cost between two nodes in a wireless network can be represent-where dX,Yis the hop distance between the two network elements X and Y,τis the unit transmission cost over a wired link, and z is the weighting factor of the wireless link. Thus, the transmission cost in a wireless link is generally larger than the transmission cost in a wired link [25].

    Depending on the type of movement and the mobility management protocol, two kinds of binding updates can be performed: micro handoff (local) and macro handoff (global).The former are movements within a MAP administrative domain, while the latter implies movements between domains. The location update procedures are carried out for micromanagement and macro management. The following assumptions are used; the distance between the PAR and MAP is equal to the distance between the NAR and MAP, and the link layer information (L2 trigger) is used either to predict or rapidly respond to handoff events.

    Table I. List of notations.

    Based on the signaling load functions for location update; the total binding update signaling cost per MN in terms of session-to-mobility ratio (SMR) with Baumann mobility model is expressed as follows:

    4.1.1 Local location update signaling cost for F-HMIPv6

    Figure 10 illustrates a sequence of message used in F-HMIPv6 when an MN moves from PAR to NAR within MAP’s domain and the MAP already knows the adequate information on the link-layer address and network prefix of each AR. This illustration is based on the assumption that an MN has entered into a new MAP domain and that MIPv6/HMIPv6 registration procedures were already completed[14].

    The F-HMIPv6 signaling cost function for micro handoff CMicrois expressed as follows[12]:

    Fig. 10. Signaling messages sequence for Micro handoff in F-HMIPv6 [12].

    The expression of SL2_spresents the cost for a successfully anticipated handoff and can be computed as:

    4.1.2 Global location update signaling cost for F-HMIPv6

    The signaling cost function for macro handoff CMacrocan be expressed as the total of the signaling cost of the MN at MAPNand Shcwhich is the binding update cost at the HA at all active CNs.

    4.1.3 Local location update signaling cost for LBS_ F-HMIPv6

    To drive the micro mobility location update cost, the probability PL2of a successful handoff signaling anticipation is assumed to be as large as possible. It reaches 1 when L2 successfully generates handoff trigger. In case of successful handoff signaling anticipation (i.e.PL2=1), the proposed scheme starts invoking the prediction system which either returns a known mobility pattern or unknown mobility pattern.

    When the prediction system manages to successfully return a known mobility pattern and predict NAR’s IP and its MAP, the location update cost starts as soon as L2 generates handoff trigger. So, the location update cost is considered to be the maximum cost between the registration cost and the cost of reestablishing new link. Then, the location update cost for predicted mobility pattern CMicro_LBScan be represented as follows:

    An additional processing time in the MN is added for storing or retrieving mobility pro file PCMN, which is necessary for the prediction system to predict NAR’s IP. PCMNis measured as a small value comparable with the location update cost. On the other hand, it helps to reduce the packet loss during L3 handoff. In practical experiments, PCMNranges between 30 to 50 milliseconds, as it considers as a simple process to retrieve stored data [26].

    The total cost of micro handoff mobility in both cases of known and unknown mobility patterns can be expressed as (14) shown in the bottom at this page, where Pr (NAR successfully predicted) depends on how well the prediction system can predict NAR’s IP and its MAP. It’s mainly depends on user’s behavior.For most mobility users with a fixed daily routine, the probability of successful prediction is as large as possible.

    4.1.4 Global location update signaling cost for LBS_ F-HMIPv6

    Global location update cost is considered to be the maximum cost between the registration cost and the cost of reestablishing new link.

    The total cost of micro handoff mobility in both cases of known and unknown mobility pattern can be expressed as (16) shown in the bottom at this page.

    4.2 Packet delivery cost in handoffperiod

    The packet delivery cost is defined as the linear combination of packet tunneling cost (CTun-nel) and packet loss cost (CLoss) during handoff latency. Let α and β be weighting factors(where α + β = 1), which emphasize tunneling effect and dropping effect. Then, the packet delivery cost is computed as follows:

    It is necessary to compute handoff latency to evaluate packet delivery cost. The handoff latency is divided into three components:link switching or L2 handoff latency (tL2), IP connectivity latency (tIP) and location update latency (tU). tIPreflects how quickly an MN can send IP packets after L2 handoff, while tUis the latency time from the starting point of L2 handoff until an MN receives IP packets for the fi rst time after link switching [8]. It is expected that the handoff latency would vary from micro mobility and macro mobility.

    4.2.1 Local packet delivery cost for F-HMIPv6

    Figure 11 illustrates the timing diagram associated to micro mobility of F-HMIPv6 and shows that there is a delay before an MN begins to receive packets directly through the NAR. It can be computed through (9), where F-HMIPv6 enables PAR to forward packets to NAR by using a bi-directional tunnel established between them and by buffering all forwarded packets.

    So the packet loss cost CLossdue to the time required to establish a tunnel between PAR and NAR is very small value. It can be expressed as:

    CDatais the cost of transferring data packets from CN to MN via PA

    where η is the transferring cost of data packet.It is greater than the cost of transferring control:

    and the packet tunneling cost is given by:

    where the location update latency for micro handoff

    Fig. 11. Handoff latency timeline of local handoff for F-HMIPv6 [10].

    Fig. 12. Handoff latency timeline of global handoff for F-HMIPv6 [10].

    Fig. 13. Handoff latency timeline of local handoff for proposed scheme.

    4.2.2 Global packet delivery cost for F-HMIPv6

    The timing diagram for macro handoff is presented in Figure 12. There is no forwarding during macro handoff (CTunnel= 0); then, only packet loss cost occurs and it can be evaluated as follows:

    where the updating cost contains tHAwhich is the delay for performing BU procedure to the HA, tRRwhich is the delay for return routability procedure, and tCNwhich is the delay for performing BU process to all active CNs.

    4.2.3 Local packet delivery cost for LBS_F-HMIPv6

    Figure 13 illustrates the timing diagram associated to micro mobility for proposed and shows that there is a delay before an MN begins to receive packets directly through the NAR. As in F-HMIPv6, the scheme enables PAR to forward packets to NAR by using a bi-directional tunnel established between them and by buffering all forwarded packets. The packet loss cost due to the time required to establish a tunnel between PAR and NAR can be expressed as in Equation (18). The packet tunneling cost is given by:

    4.2.4 Global packet delivery cost for LBS_F-HMIPv6

    Figure 14 presents the timing diagram associated to macro mobility of proposed scheme for known mobility pattern. The elapsed time between L2 handoff trigger and the establishment of a new link is used to make a connection to the NAR and its MAP. So packet loss cost can be expressed as:

    where the location update latency as in global location update for FHMIPv6

    For known mobility pattern, there would be no buffering, so CTunnelwill be equal to zero.

    V. SIMULATION RESULTS FOR PREDICTION SYSTEM

    In this section the simulation results for prediction system are introduced. We examined the typical behavior of a mobile user by supposing several scenarios for a certain user.Software program is built to capture MN behavior. Then, the program was tested to ensure the capability of the learning process by testing it with new scenarios that either different or similar to known mobility patterns of the learned scenarios.

    To better understand how a MN’s mobility pattern is created, suppose the scenario shown in Figure 15. The mobile user’s residence is located in cell ‘0’, while its place of work is located in cell (2, c). It is considered that, the user leaves home at 08:00 am each morning.During its trip from home to work, the user crosses cells labeled (1, c), (2, e), (2, d) and fi nally arrives another cell labeled (2, c). The user has a break every day at 12:00 pm at the cafe located in cell (2, b). At about 06:00 pm,the user leaves work in the direction of its residence passing through the same cells as in the morning but in the opposite order.

    It is assumed that each day is divided into periods that represent the capture times. Capture time is assumed to be 30 min. To decrease the overhead resulting from saving the different paths during the day, 8 hours are ignored that represent the sleeping hours. Then, the remaining 16 hours are divided into 32 capture points. The analysis time is assumed one week to con figure mobility patterns from the capture points. Table 2 shows the points of success or fails of the stored paths during the fi rst week.Only 16 points out of the 32 points are tabulated in order to compress the results. Predicting the correct path is represented by (√), whereas the faults are represented by (x). The faults are distributed according to the random positions that the MN moves during each day. The result of each row represents the average faults per point and the result of each column represents the average faults per day. Then, the average faults during the first week are calculated.The last column represents the average faults during the second week.

    Fig. 14. Handoff latency timeline of global handoff for proposed scheme.

    Fig. 15. MN’s movement scenario.

    It is shown that the total average faults in the first week is 17.86%, whereas this value is decreased to 16.75% in the second week since the program is acquired more learning and then it updated the stored paths according to the movement of the MN during the first week. The value of average faults during the second week is changed by ±1% during the consequence weeks. Then, 16.96% is considered in our analysis as the value of the percentage of faults during the prediction system.So this value can be used in (14) and (16) as the value for probability of unknown pattern that is required in order to evaluate total macro cost.

    Table 3 presents total average handoff faults of LBS_F-HMIPv6 compared with the prediction schemes in [20]. In this table, the average number of failed handoffs in the proposed scheme is compared with the existing prediction schemes AHP, APCV, and D-Scan [20].As shown in the table that, the total average number of failed handoffs in these schemes are 22%, 21%, and 37.2%; respectively. These percentages are considered high with respect to the percentage of failed handoffs in the proposed prediction scheme. The results from[20] are based on five mobility patterns only.However, the average number of faults in the proposed scheme is based on real mobility patterns for two weeks that incorporate 64 capture points. Thus, the obtained results in the proposed LBS_F-HMIPv6 simulate real environment.

    VI. NUMERICAL RESULTS

    This section presents various analyses results based on the proposed scheme analytical model. It presents a comparison between the proposed scheme and F-HMIPv6 protocol.The results for location update cost, packet delivery cost, total cost, and handoff latency are investigated. There are various parameters that should be considered when studying the performance of the proposed scheme. Parameters such as user’s velocity, packet arrival rate, user density and session-to-mobility ratio have a considerable impact on different types of cost.For example, location update cost depends on the user velocity; the user density influences packet delivery cost, while total cost is affected by SMR. Table 4 presents the values of the system’s parameters. The parameter values for the analysis were referenced from [6]. The experiments performed to evaluate the value of PCMNand the estimated value of processing time in MN was in range 30-50 milliseconds[27].

    Table II. Points of success and fails.

    6.1 Location update cost

    Figure 16(a and b) depicts location update cost variation when the MN’s mean velocity is changed with different number of the ARs within an MAP. As expected, the MN performs fewer movements as the average residence time of the MN increases. Therefore, the location update cost is inversely proportional to the average residence time. In the proposed case study, the user density is set as 0.002. Since the MN with a higher average velocity has a higher domain crossing rate, a higher location update cost is required. Therefore, the location update cost increases as the average velocity increases. It is clear that, the location update cost in the proposed LBS_F-HMIPv6 is lower than that of FHMIPv6 for various velocity values. This reduction is due the reduced location update cost for predicted mobility pattern. It is also shown that, the location update cost of a ring with size 1 is larger than that of a ring with the size 3. This is because the MN located in the MAP domain with a small ring size is more likely to perform global binding update procedures.

    6.2 Packet delivery cost

    In general, the location update cost is affected by the user mobility and not by the user population. On the other hand, the packet delivery cost depends on user density as the MAP needs to determine whether the destination MN belongs to the mapping table or not.The cost of this lookup procedure is generally proportional to the number of MNs in a MAP domain. Therefore, the packet delivery cost increases as the number of MNs in the MAP domain increases. Figure 17 (a and b) shows the packet delivery cost as the MN density(ρ) changes for local and global mobility; respectively. The results show that, the packet delivery cost increases linearly as the number of MNs increases. As expected, the proposed LBS_F-HMIPv6 achieves a lower packet delivery cost than FHMIPv6 for local and global mobility since that the handoff latency is reduced in the proposed scheme.

    Table III. Comparison of total average handoff faults percentages between LBS_FHMIPv6, AHP, APCV, and D-Scan schemes.

    Table IV. The values of system parameters.

    Fig. 16 (a). Location update cost as a function of user velocity at k=1.

    Fig. 16 (b). Location update cost as a function of user velocity at k=3.

    Fig. 17 (a). Packet delivery cost as a function of user density for local mobility.

    Fig. 17 (b). Packet delivery cost as a function of user density for global mobility.

    Fig. 18 (a). Total cost as a function of SMR (SMR<1).

    Fig. 18 (b). Total cost as a function of SMR (1< SMR < 10).

    6.3 Total cost

    Total cost combines the location update cost and the packet delivery cost. Figure 18 (a and b) shows the total cost as a function of SMR in the Baumann model in the case of SMR ≤ 1 and SMR > 1; respectively. The SMR is equal to λm/μAR, which is the session arrival rate divided by the cell crossing rate. As a result, the growing of the SMR implies an increase of the session arrival rate and the total cost increases.In the case of SMR ≤ 1, i.e. λm≤ μAR, the location update cost is more dominant than packet delivery cost in the total cost. When the SMR is larger than 1, the impact of the location update cost on the total cost is reduced, while the packet delivery becomes more effective in the total cost. In both cases, the proposed LBS_F-HMIPv6 achieves a lower total cost than F-HMIPv6.

    6.4 Handoff latency

    In this section, the handoff latency of the proposed scheme is presented. Since that the handoff latency mainly affects the cost functions, it can be computed through Equations(from 18 to 26). It is compared to F-HMIPv6 and another motion detection scheme in [23]in the case when upper limit of the MN velocity is 50 m/s since it is the considered value in this scheme.

    The impact of cell radius is investigated in Figure 19. As shown, the handoff latency is decreased when cell radius is increased.Following this result, the handoff is occurred more frequently when the cell radius goes to smaller. In the LBS_F-HMIPv6, the handoff latency is 270 msec when the cell radius is 50 m and it goes to 110 msec when cell radius goes to 150 m.

    User velocity is examined which is used further to determine an appropriate model to represent the changing range of user velocity. Figure 20 (a and b) show the increase in the handoff latency due to an increase in moving speed of MNs. As can be seen, LBS_F-HMIPv6 scheme performs better than F-HMIPV6 even with high MN speed.

    The proposed LBS_F-HMIPv6 is compared with another motion detection, that is called MAHO_F-HMIPv6 in [23]. Since MAHO_F-HMIPv6 considers the upper limit of the MN velocity is 50 m/s, this value is considered in the comparison. Figure 21 shows the impact of MN average moving speed on handoff latency for F-HMIPv6, LBS_F-HMIPv6,and MAHO_F-HMIPv6. As shown in Figure 21, the handoff latency for F-HMIPv6 and MAHO_F-HMIPv6 exceeds that of LBS_F-HMIPv6.

    VII. CONCLUSIONS

    In this paper, a proposed scheme for smooth handoff over F-HMIPv6 networks is introduced. The goal of the proposed scheme is to minimize handoff latency, location update cost, and packet delivery cost. The architecture of the proposed scheme is based on LBS package in each MN and a prediction system.This package is responsible for capturing information about user behavior and using this information to create user mobility profiles.The proposed LBS_F-HMIPv6 scheme is analyzed using cost functions and compared with F-HMIPv6. The probability of the successful prediction system of the proposed scheme is tested via simulation in different scenarios.The obtained prediction value from simulation is used in evaluating the cost functions numerically. The numerical results show that the proposed scheme achieves the smallest cost as it starts the registration process as earlier as possible due to the known mobility patterns that is in turn reduces the handoff latency.LBS_F-HMIPv6 scheme reflects an optimized smooth handoff better than F-HMIPv6 and MAHO_FHMIPv6 motion detection scheme.In addition, it reduces both the location update cost and the packet delivery cost.

    Fig. 19. Handoff latency as a function of cell radius.

    Fig. 20 (a). Handoff latency as a function of user velocity at k=3.

    Fig. 20 (b). Handoff latency as a function of user velocity at k=6.

    Fig. 21. Handoff latency as a function of user velocity for different motion detection schemes.

    References

    [1] N. Fei, Y. Zhuang, J. Gu, J. Cao, and L. Yang, “Privacy-preserving relative location based services for mobile users,”China Communications,vol.12, no. 5, 2015, pp.152-161.

    [2] M. Yassin, and E. Rachid, “A survey of position-ing techniques and location based services in wireless networks,” Proc. IEEE International Conference on Signal Processing, Informatics,Communication and Energy Systems (SPICES),India, 2015, pp. 1-5.

    [3] C. Anagnostopoulos, K. Kolomvatsos, and S.Hadjiefthymiade, “Efficient location based services for groups of mobile users,”Proc.IEEE 14th International Conference on Mobile Data Management (MDM),Italy, 2013, pp. 6-15.

    [4] M. Aal-Nouman, O. H. Salman, and H. T.-Rizk,“A new architecture for location-based services core network to preserve user privacy,”Proc.Annual Conference on New Trends in Information & Communications Technology Applications(NTICT),2017.

    [5] D. Johnson, C. Perkins, and J. Arkko, “Mobility Support in IPv6,”Internet Soc., Reston, VA, IETF RFC 3775, January 2004.

    [6] D. K. Panwar, D. K. Lal, and I. Chaudhary, “Handover latency analysis of mobility management protocols in all-IP networks,”Proc. Advances in Computing, Control, & Telecommunication Technologies (ACT ‘09), 2009, pp. 390-394.

    [7] H. Nashaat, R. Rizk, and H. Mahdi, “A robust analytical model of mobile IP handoff with multiple traffic pro file,”International Journal of Wireless Information Network, Springer, vol. 18,no. 4, 2011, pp. 210-223.

    [8] H. Nashaat, R. Rizk, and H. Mahdi “Performance analysis of streamed video over mobile IP based networks,”Proc. 9th IEEE/ACS International Conference on Computer Systems and Applications(AICCSA), Egypt, 2011.

    [9] N. Kara, “Mobility management approaches for mobile IP networks: performance comparison and use recommendations,”IEEE Transactions on Mobile Computing,vol. 8, no. 10, 2009, pp.1312-1325.

    [10] J.-H. Lee, T. Ernst, and T.-M. Chung, “Cost analysis of IP mobility management protocols for consumer mobile devices,”IEEE Transactions on Consumer Electronics, vol. 56, no. 2, 2010, pp.1010-1017.

    [11] O. Lee, J. Bonnin, I. You, and T. Chung. “Comparative handover performance analysis of IPv6 mobility management protocols,”IEEE Transactions on Industrial Electronics, vol. 60, no. 3,2013, pp. 1077-1088.

    [12] H. Nashaat, R. Rizk and H. Mahdi, “An analytical framework of fast handover for hierarchical MIPv6,”Proc. The World Congress on Computer Science and Information Technology (WCSIT’11),Egypt, vol. 1, no. 2, 2011, pp. 38-44.

    [13] C. Makaya and S. Pierre, “An analytical framework for performance evaluation of IPv6-based mobility management protocols,”IEEE Transactions on Wireless Communication,vol. 7, no. 3,2008, pp. 972-983.

    [14] M. Skorepa, and R. Klug, “Enhanced analytical method for IP mobility handover schemes cost evaluation,” Telecommunication Systems, vol.52, no. 3, 2013, pp. 1573-1582.

    [15] H. S. Yoo, R. Tolentino, B. Park, B. Y. Chang, and S. H. Kim, “ES-FHMIPv6: An efficient scheme for fast handover over HMIPv6 networks,”International Journal of Future Generation Communication and Networking, vol. 2, no. 2, 2009, pp. 38-48.

    [16] A. S. Sadiq, K. Abu Bakar, K. Z. Ghafoor, J. Lloret,and S. Mirjalili, “A Smart handover prediction system based on curve fitting model for Fast Mobile IPv6 in wireless networks,”International Journal of Communication Systems, vol. 27, no.7, 2014, pp. 969-990.

    [17] S. H. Wady, K. A. Bakar, and K. Z. Ghafoor, “A robust regression model for handover prediction in wireless networks,”Journal of Zankoy Sulaimani - Part A - For Pure and Applied Science, vol.17, no. 2, 2015.

    [18] Y. Luo, P. N. Tran, D. Sahinel, A. Timm-Giel,“Handover prediction for wireless networks in office environments using hidden markov model,” Proc.IFIP Wireless Days (WD),Valencia,2013, pp. 1-7.

    [19] A. M. Miyim, M. Ismail, R. Nordin, and M. T.Ismail, “Technique for cross-layer vertical handover prediction in 4G wireless networks,”Proc.The 4th International Conference on Electrical Engineering and Informatics (ICEEI),Malaysia,2013, pp. 114-121.

    [20] A. S. Sadiq, N. B. Fisal, K. Z. Ghafoor, and J.Lloret, “An adaptive handover prediction scheme for seamless mobility based wireless networks,”The Scientific World Journal, Article ID 610652, 2014, 17 pages.

    [21] A. Mohamed, O. Onireti, S. A. Hoseinitabatabaei, M. Imran, A. Imran, and R. Tafazolli, “Mobility prediction for handover management in cellular networks with control/data separation,”Proc. IEEE International Conference on Communications (ICC), London, 2015, pp. 3939-3944.

    [22] Y. Chon, E. Talipov, H. Shin, and H. Cha, “Smart-DC: mobility prediction-based adaptive duty cycling for everyday location monitoring,”IEEE Transactions on Mobile Computing, vol. 13, no.3, 2014, pp. 512–525.

    [23] H. Yu and M. Tao, “Fast handover in hierarchical mobile IPv6 based on motion pattern detection of mobile node,”Wireless Personal Communications, vol. 61, no. 2, 2011, pp. 303–321.

    [24] H. Tuncer, S. Mishra, and N. Shenoy, “A survey of identity and handoff management approaches for the future Internet,”Sciencedirect in Computer Communications, vol. 36, 2012, pp. 63-79.

    [25] V. Casares-Giner, V. Pla, and P. Escalle-Garcia,“Mobility models for mobility management,”Springer LNCS 5233, 2011, pp. 716–745.

    [26] H. Su-Cheng, L. Chien-Sing, and N. Mustapha,“Bridging XML and relational databases: map-ping choices and performance evaluation,”IETE Technical review, vol. 27, no. 4, 2010, pp. 308-317.

    [27] V. Gupta, and S. Dharmaraja, “Reliability and performance modeling of VoIP system with multiple component failure,”International Journal of Reliability and Safety, vol. 7, no. 1, 2011,pp. 79-95.

    国产伦精品一区二区三区视频9| 中文字幕免费在线视频6| 日本与韩国留学比较| 搡老妇女老女人老熟妇| 日韩,欧美,国产一区二区三区 | 亚洲欧美精品自产自拍| 日本三级黄在线观看| 秋霞伦理黄片| 日韩一区二区三区影片| 欧美成人一区二区免费高清观看| 国产高清国产精品国产三级 | 欧美不卡视频在线免费观看| 国产午夜福利久久久久久| av国产免费在线观看| 日韩强制内射视频| 一级毛片电影观看 | 欧美不卡视频在线免费观看| 少妇的逼好多水| 日日啪夜夜撸| 美女脱内裤让男人舔精品视频| 国产探花极品一区二区| 欧美激情国产日韩精品一区| 国产精品永久免费网站| 婷婷六月久久综合丁香| 久久亚洲国产成人精品v| 午夜久久久久精精品| 国产乱人偷精品视频| 国产成人精品一,二区| av线在线观看网站| 免费黄网站久久成人精品| 色噜噜av男人的天堂激情| 黄色欧美视频在线观看| 女人被狂操c到高潮| 国产成人aa在线观看| 桃色一区二区三区在线观看| 亚洲丝袜综合中文字幕| 中文字幕久久专区| 天堂av国产一区二区熟女人妻| 亚洲国产最新在线播放| 国产成人精品久久久久久| 成人午夜精彩视频在线观看| 99久久精品一区二区三区| 国产精品久久久久久久电影| 国产一区二区在线观看日韩| 高清av免费在线| 在线观看美女被高潮喷水网站| 中文字幕av成人在线电影| 日韩大片免费观看网站 | 亚洲丝袜综合中文字幕| 亚洲av中文字字幕乱码综合| av在线蜜桃| 久久精品国产自在天天线| 男人舔女人下体高潮全视频| 神马国产精品三级电影在线观看| 波多野结衣高清无吗| 九九爱精品视频在线观看| 国产黄a三级三级三级人| 久久人人爽人人爽人人片va| 亚洲国产欧美人成| 国产免费视频播放在线视频 | 中文在线观看免费www的网站| 国语自产精品视频在线第100页| 亚洲成人中文字幕在线播放| 国产精品女同一区二区软件| a级毛色黄片| 日韩在线高清观看一区二区三区| 久久精品人妻少妇| 成人漫画全彩无遮挡| 好男人在线观看高清免费视频| 国产亚洲av片在线观看秒播厂 | 免费av不卡在线播放| 99视频精品全部免费 在线| 久久久亚洲精品成人影院| 国产av码专区亚洲av| 日本爱情动作片www.在线观看| www日本黄色视频网| 欧美不卡视频在线免费观看| 国产精品一区二区三区四区免费观看| 久久久亚洲精品成人影院| 久久久精品94久久精品| 人妻系列 视频| 一级爰片在线观看| 成人午夜精彩视频在线观看| 别揉我奶头 嗯啊视频| 麻豆国产97在线/欧美| 草草在线视频免费看| 久久久成人免费电影| 九九久久精品国产亚洲av麻豆| 黄片无遮挡物在线观看| 亚洲精品,欧美精品| 黄片wwwwww| 少妇猛男粗大的猛烈进出视频 | 国产单亲对白刺激| 深夜a级毛片| 免费观看在线日韩| 日本-黄色视频高清免费观看| 国产精品久久久久久久电影| 91久久精品电影网| 亚洲国产欧美人成| 美女高潮的动态| 真实男女啪啪啪动态图| 久久久久精品久久久久真实原创| 边亲边吃奶的免费视频| 国产极品天堂在线| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 午夜日本视频在线| 边亲边吃奶的免费视频| 久久亚洲精品不卡| 日本五十路高清| eeuss影院久久| 日本wwww免费看| 中文精品一卡2卡3卡4更新| 亚洲国产欧美人成| 性插视频无遮挡在线免费观看| 欧美成人一区二区免费高清观看| 免费看av在线观看网站| 一级爰片在线观看| 久久久久免费精品人妻一区二区| 国产淫语在线视频| 国产伦在线观看视频一区| 人人妻人人看人人澡| 国产黄片美女视频| 国产精品一区二区性色av| 精品少妇黑人巨大在线播放 | 亚洲精品国产成人久久av| 国产高清视频在线观看网站| 一边亲一边摸免费视频| 18禁在线播放成人免费| 插阴视频在线观看视频| 午夜激情福利司机影院| av线在线观看网站| 亚洲精品一区蜜桃| 久久久a久久爽久久v久久| 国产亚洲精品av在线| 夜夜看夜夜爽夜夜摸| 天天躁夜夜躁狠狠久久av| 少妇被粗大猛烈的视频| 亚洲一级一片aⅴ在线观看| or卡值多少钱| 能在线免费看毛片的网站| 亚洲一区高清亚洲精品| 亚洲av成人精品一区久久| 亚洲最大成人中文| 欧美日韩综合久久久久久| 天堂中文最新版在线下载 | 五月玫瑰六月丁香| 国产亚洲最大av| 亚洲aⅴ乱码一区二区在线播放| 亚洲婷婷狠狠爱综合网| 人体艺术视频欧美日本| 一级毛片aaaaaa免费看小| 18禁动态无遮挡网站| www.av在线官网国产| 波多野结衣巨乳人妻| 久久久久久久久中文| 免费av不卡在线播放| 爱豆传媒免费全集在线观看| 亚洲欧美一区二区三区国产| 搞女人的毛片| 国产精品久久久久久精品电影| av女优亚洲男人天堂| 中国美白少妇内射xxxbb| 亚洲欧洲国产日韩| 国产亚洲av嫩草精品影院| 赤兔流量卡办理| 国产 一区精品| 欧美成人一区二区免费高清观看| 青春草视频在线免费观看| 国产极品天堂在线| 亚洲最大成人手机在线| 日日摸夜夜添夜夜添av毛片| 久久这里只有精品中国| 99热全是精品| 欧美最新免费一区二区三区| АⅤ资源中文在线天堂| 亚洲久久久久久中文字幕| 成年女人看的毛片在线观看| 我要看日韩黄色一级片| 亚洲人成网站高清观看| 精华霜和精华液先用哪个| 一级毛片我不卡| 国产伦精品一区二区三区四那| 欧美日韩在线观看h| 能在线免费看毛片的网站| 国产在线男女| 亚洲伊人久久精品综合 | 国产 一区 欧美 日韩| 一区二区三区高清视频在线| 久久精品久久精品一区二区三区| 老师上课跳d突然被开到最大视频| 久久热精品热| 最近手机中文字幕大全| 国产探花极品一区二区| 久久久久久久午夜电影| 亚洲天堂国产精品一区在线| 中文字幕av成人在线电影| 免费观看性生交大片5| 国产亚洲av片在线观看秒播厂 | 久久精品夜夜夜夜夜久久蜜豆| 亚洲四区av| 久久亚洲国产成人精品v| 国产精品久久久久久精品电影| 亚洲欧美一区二区三区国产| 亚洲色图av天堂| 亚洲国产欧美人成| 丝袜喷水一区| 3wmmmm亚洲av在线观看| 久久人人爽人人片av| 三级男女做爰猛烈吃奶摸视频| 国产一区二区在线av高清观看| 如何舔出高潮| 麻豆久久精品国产亚洲av| 国产黄色小视频在线观看| 一级爰片在线观看| 亚洲怡红院男人天堂| 午夜激情欧美在线| 国产免费福利视频在线观看| 狠狠狠狠99中文字幕| 青春草视频在线免费观看| eeuss影院久久| 在线免费十八禁| 国产精品国产高清国产av| 国产亚洲91精品色在线| 级片在线观看| 国产不卡一卡二| 国产真实乱freesex| 国产毛片a区久久久久| АⅤ资源中文在线天堂| 国产又黄又爽又无遮挡在线| 久久99蜜桃精品久久| 美女内射精品一级片tv| 伦精品一区二区三区| 国产一区亚洲一区在线观看| 亚洲精品456在线播放app| 1000部很黄的大片| 好男人视频免费观看在线| 赤兔流量卡办理| 亚洲综合色惰| 18禁动态无遮挡网站| ponron亚洲| 久久6这里有精品| 看片在线看免费视频| 久久99热这里只有精品18| 在线免费观看不下载黄p国产| 精品不卡国产一区二区三区| 欧美性感艳星| 国产激情偷乱视频一区二区| 精品一区二区免费观看| 成人亚洲精品av一区二区| 久久精品人妻少妇| 久久久国产成人免费| 岛国毛片在线播放| 少妇裸体淫交视频免费看高清| 国产成人a区在线观看| 亚洲国产精品sss在线观看| 亚洲欧美日韩高清专用| 精品不卡国产一区二区三区| 校园人妻丝袜中文字幕| 亚洲无线观看免费| 国产精品日韩av在线免费观看| 亚洲国产精品国产精品| 欧美日韩精品成人综合77777| 国产成人aa在线观看| 欧美区成人在线视频| 国产黄色小视频在线观看| av专区在线播放| 婷婷六月久久综合丁香| 亚洲av电影不卡..在线观看| 又粗又爽又猛毛片免费看| 午夜老司机福利剧场| 两性午夜刺激爽爽歪歪视频在线观看| 我要看日韩黄色一级片| 精品久久久久久久人妻蜜臀av| av免费在线看不卡| 直男gayav资源| 91aial.com中文字幕在线观看| 亚洲欧美日韩高清专用| 成年女人看的毛片在线观看| 卡戴珊不雅视频在线播放| 中国美白少妇内射xxxbb| 国产男人的电影天堂91| av在线老鸭窝| www.色视频.com| 成人鲁丝片一二三区免费| 纵有疾风起免费观看全集完整版 | 欧美xxxx性猛交bbbb| 日本免费在线观看一区| 国产伦一二天堂av在线观看| 久久久久久久久大av| 国产黄色视频一区二区在线观看 | 热99re8久久精品国产| 亚洲中文字幕日韩| 亚洲va在线va天堂va国产| 人妻制服诱惑在线中文字幕| 噜噜噜噜噜久久久久久91| 亚洲在线自拍视频| 亚洲国产精品专区欧美| 亚洲国产精品国产精品| 久久99热这里只有精品18| 99久国产av精品| 男人舔奶头视频| 亚洲精品国产av成人精品| 欧美不卡视频在线免费观看| 超碰av人人做人人爽久久| av专区在线播放| 亚洲精品乱久久久久久| videos熟女内射| 久久精品国产自在天天线| 建设人人有责人人尽责人人享有的 | 看黄色毛片网站| 国产高清视频在线观看网站| 日韩欧美国产在线观看| 免费av毛片视频| 亚洲欧美精品综合久久99| 久久欧美精品欧美久久欧美| 国产精品一区www在线观看| 成年女人看的毛片在线观看| 一边摸一边抽搐一进一小说| 国产精品国产高清国产av| 我要搜黄色片| 亚洲在久久综合| 乱人视频在线观看| 在线播放无遮挡| 亚洲欧洲日产国产| 欧美潮喷喷水| 精品久久久久久久久av| 精品国内亚洲2022精品成人| 免费电影在线观看免费观看| 国产在线一区二区三区精 | 三级国产精品片| 国产午夜福利久久久久久| 成人无遮挡网站| 女人久久www免费人成看片 | 精品熟女少妇av免费看| 国产精华一区二区三区| 欧美日韩一区二区视频在线观看视频在线 | 午夜精品一区二区三区免费看| 日本色播在线视频| 久99久视频精品免费| 亚洲无线观看免费| 亚洲欧洲日产国产| 午夜免费男女啪啪视频观看| 有码 亚洲区| 亚洲三级黄色毛片| 亚洲欧洲日产国产| 国产又色又爽无遮挡免| 国产亚洲最大av| 波多野结衣巨乳人妻| 色哟哟·www| 一级毛片aaaaaa免费看小| 国产男人的电影天堂91| 啦啦啦韩国在线观看视频| 97超视频在线观看视频| 日本一本二区三区精品| 国产精品一区二区三区四区久久| 国产日韩欧美在线精品| 国产黄a三级三级三级人| 国产探花在线观看一区二区| 亚洲av成人av| 国产精品野战在线观看| 狂野欧美激情性xxxx在线观看| 成人欧美大片| 天堂√8在线中文| 午夜精品一区二区三区免费看| 黑人高潮一二区| 最近最新中文字幕大全电影3| 久久久久久久久大av| 尤物成人国产欧美一区二区三区| 亚洲怡红院男人天堂| 色尼玛亚洲综合影院| 九九久久精品国产亚洲av麻豆| 亚洲精品乱码久久久v下载方式| 男女下面进入的视频免费午夜| 久久久久久久国产电影| 国产伦精品一区二区三区视频9| 免费黄网站久久成人精品| 最新中文字幕久久久久| 中文字幕制服av| 日韩中字成人| 久久精品国产亚洲av天美| 日韩制服骚丝袜av| 国产高清三级在线| 亚洲内射少妇av| 国产探花在线观看一区二区| 国产黄a三级三级三级人| 秋霞伦理黄片| av在线天堂中文字幕| 色5月婷婷丁香| 18禁在线播放成人免费| 亚洲国产精品合色在线| av国产久精品久网站免费入址| h日本视频在线播放| 国产精品久久视频播放| 天堂中文最新版在线下载 | 99在线人妻在线中文字幕| 成人欧美大片| 欧美性感艳星| 国产精品一区二区三区四区免费观看| 好男人视频免费观看在线| 精品国产一区二区三区久久久樱花 | 99久久人妻综合| 亚洲美女视频黄频| 中文在线观看免费www的网站| 丰满人妻一区二区三区视频av| 丝袜喷水一区| 免费不卡的大黄色大毛片视频在线观看 | 亚洲av成人精品一区久久| 中文精品一卡2卡3卡4更新| 一级毛片aaaaaa免费看小| 欧美一区二区国产精品久久精品| 欧美日本视频| 两个人视频免费观看高清| 黄色配什么色好看| 午夜福利在线观看吧| 亚洲成人av在线免费| 男人的好看免费观看在线视频| 亚洲国产高清在线一区二区三| 老司机影院成人| 国产高潮美女av| 亚洲欧美一区二区三区国产| 免费看a级黄色片| 极品教师在线视频| 亚洲怡红院男人天堂| 国产 一区 欧美 日韩| 中文精品一卡2卡3卡4更新| a级一级毛片免费在线观看| 中文字幕熟女人妻在线| 亚洲无线观看免费| 一夜夜www| 国产白丝娇喘喷水9色精品| 一级毛片我不卡| 日本-黄色视频高清免费观看| 中文乱码字字幕精品一区二区三区 | 美女脱内裤让男人舔精品视频| 久久久久九九精品影院| 欧美精品一区二区大全| 国产精品一二三区在线看| 深夜a级毛片| 久久草成人影院| 男女下面进入的视频免费午夜| 亚洲图色成人| 国产成年人精品一区二区| 一级爰片在线观看| 国产亚洲av片在线观看秒播厂 | www.色视频.com| 亚洲av成人精品一区久久| 国产亚洲午夜精品一区二区久久 | 非洲黑人性xxxx精品又粗又长| 亚洲精品,欧美精品| 欧美极品一区二区三区四区| 久久久成人免费电影| 国产av一区在线观看免费| 免费av毛片视频| 国产成人a区在线观看| 成人特级av手机在线观看| 亚洲在久久综合| 亚洲婷婷狠狠爱综合网| 国产高潮美女av| 99热这里只有是精品在线观看| 日韩中字成人| 国产精品麻豆人妻色哟哟久久 | 亚洲欧美清纯卡通| 22中文网久久字幕| 免费看日本二区| 国产精品久久久久久精品电影| 成人综合一区亚洲| 免费大片18禁| av福利片在线观看| 亚洲成人久久爱视频| 免费看a级黄色片| 99热这里只有精品一区| 久久99热这里只有精品18| 精品99又大又爽又粗少妇毛片| 自拍偷自拍亚洲精品老妇| 国内精品宾馆在线| 国产精品国产高清国产av| 免费观看性生交大片5| 亚洲av中文字字幕乱码综合| 亚洲欧美成人综合另类久久久 | 国产黄片美女视频| 欧美zozozo另类| 一级毛片aaaaaa免费看小| 亚洲av免费在线观看| 日韩一区二区三区影片| 纵有疾风起免费观看全集完整版 | 国产欧美另类精品又又久久亚洲欧美| 久久久久久久国产电影| 最新中文字幕久久久久| 国产乱来视频区| 婷婷色麻豆天堂久久 | 日韩欧美 国产精品| 插阴视频在线观看视频| 大话2 男鬼变身卡| 中文乱码字字幕精品一区二区三区 | 国产色爽女视频免费观看| 在线免费观看的www视频| 国产久久久一区二区三区| av国产免费在线观看| 男人狂女人下面高潮的视频| 两个人的视频大全免费| 一级毛片我不卡| 亚洲色图av天堂| 亚洲国产精品成人综合色| 大香蕉久久网| 日日摸夜夜添夜夜爱| 高清视频免费观看一区二区 | 岛国在线免费视频观看| 精品少妇黑人巨大在线播放 | 日韩国内少妇激情av| 久久久精品94久久精品| 国产一区有黄有色的免费视频 | 成人毛片a级毛片在线播放| 国产亚洲av嫩草精品影院| 欧美日本视频| 青春草亚洲视频在线观看| 国产亚洲精品av在线| 亚洲av电影在线观看一区二区三区 | 哪个播放器可以免费观看大片| 欧美色视频一区免费| 免费av不卡在线播放| 最后的刺客免费高清国语| 国产黄片美女视频| 一区二区三区四区激情视频| av在线亚洲专区| 日本免费a在线| 国产伦在线观看视频一区| 久久精品久久精品一区二区三区| 伊人久久精品亚洲午夜| 狠狠狠狠99中文字幕| 大香蕉久久网| 毛片一级片免费看久久久久| 国产精品.久久久| 69av精品久久久久久| 久久久久免费精品人妻一区二区| av在线播放精品| 欧美不卡视频在线免费观看| av国产久精品久网站免费入址| 日本免费在线观看一区| 亚洲va在线va天堂va国产| 小说图片视频综合网站| 亚洲国产最新在线播放| 国产老妇女一区| 日韩欧美精品免费久久| 国产熟女欧美一区二区| 一边摸一边抽搐一进一小说| 人体艺术视频欧美日本| 一区二区三区乱码不卡18| 日本黄色视频三级网站网址| 午夜精品在线福利| 永久网站在线| 国产一区二区在线av高清观看| 中文字幕制服av| 黄色日韩在线| 国产成人a∨麻豆精品| 成人高潮视频无遮挡免费网站| 69人妻影院| 一级黄色大片毛片| 午夜福利视频1000在线观看| 两个人的视频大全免费| 麻豆乱淫一区二区| 婷婷色综合大香蕉| 国产乱人偷精品视频| 亚洲内射少妇av| 亚洲,欧美,日韩| 天天躁日日操中文字幕| 免费观看在线日韩| 国产美女午夜福利| 黄片无遮挡物在线观看| 色尼玛亚洲综合影院| av又黄又爽大尺度在线免费看 | 成人一区二区视频在线观看| 欧美精品国产亚洲| 午夜免费男女啪啪视频观看| av视频在线观看入口| 人人妻人人澡人人爽人人夜夜 | 日本av手机在线免费观看| 女人久久www免费人成看片 | 国产伦在线观看视频一区| 一个人观看的视频www高清免费观看| 日本黄色视频三级网站网址| 成人av在线播放网站| 久久欧美精品欧美久久欧美| 亚洲av不卡在线观看| 高清日韩中文字幕在线| 日韩一区二区视频免费看| 国产精品女同一区二区软件| 国产成人freesex在线| 午夜福利在线观看吧| 国产一级毛片七仙女欲春2| 精品无人区乱码1区二区| 久久99蜜桃精品久久| 高清毛片免费看| 亚洲熟妇中文字幕五十中出| 亚洲精华国产精华液的使用体验| 日韩成人av中文字幕在线观看| 国产白丝娇喘喷水9色精品| av视频在线观看入口| 中文亚洲av片在线观看爽| 1024手机看黄色片| 欧美日本亚洲视频在线播放| 亚洲国产精品国产精品| 五月玫瑰六月丁香| 尾随美女入室| 18禁在线无遮挡免费观看视频| h日本视频在线播放| 99在线视频只有这里精品首页| 亚洲精品日韩在线中文字幕| 国产91av在线免费观看| 国产欧美另类精品又又久久亚洲欧美| 亚洲三级黄色毛片| 久久久精品欧美日韩精品| 国产成人一区二区在线| 日日摸夜夜添夜夜爱| 精品国产露脸久久av麻豆 | 国产不卡一卡二|