• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A lightweight RFID tags anti-collision scheme based on searching tree

    2018-12-27 03:19:48SHANGHong

    SHANG Hong

    (Jiangsu Key Laboratory of Internet of Things, Taihu University of Wuxi, Wuxi 214064, P. R. China)

    Abstract: The existing RFID (radio frequency identification) searching tree anti-collision schemes incur large amounts of redundancy data due to an excess of long query commands, which increases the communication overhead. The paper proposed a lightweight anti-collision scheme based on searching tree. At first, the scheme designed a novel query response mode (i.e., single query with duo responses), which can make the collided tags respond to the next query in two subsequent slots respectively according to their most significant collided bit, and reduce the total number of queries by half. The scheme replaced the prefix matching circuit in tag with a counter, which can eliminate the prefix as the reference parameter of query command. Besides, the scheme put forward a predictive identification method to decrease the total number of the required slots. Finally, the scheme also proposed a locking technique to avoid the identified tags colliding with the unidentified tags, which can improve the identification efficiency of tags. The experimental results show that the communication overhead is decreased overall 42% by using single query with duo responses mode and counter trigger, and that the throughput is improving with the number of tags by using predictive identification.

    Keywords:radio frequency identification (RFID); anti-collision; searching tree; lightweight

    1 Introduction

    Radio frequency identification (RFID) is an automatic identification system which consists of readers and tags. A tag has an identification number (ID) and a reader recognizes an object through consecutive communications with the tag attached to it[1]. The reader sends out a signal which supplies power and instructions to a tag, the tags transmit their ID using back scattering in response to the query from the reader. Since tags are self-contained entities that don’t know about other tags, they always send information to the reader on their own schedule. For a reader only has one channel for communication, having two or more tags simultaneously transmitting to the reader in the air interface leads to tag collision, the reader can’t identify the tags due to tag collision. To read information properly from these tags, the reader must adopt an anti-collision scheme. Taking system cost, protocol complexity, bandwidth requirements, hardware requirements for tag, and overall performance into consideration, time division multiple access (TDMA) protocols are the most popular methods to deal with the tags collision[2]. According to the coordinating policy for the shared RF wireless channel, they can be further classified into Aloha and tree based schemes. Aloha-based ones have fairly low cost and complexity in system implementation, but their throughput are low (less than 36.8%), and usually suffer from the tag starvation problem (i.e., some specific tags possibly can’t be identified due to always colliding with others)[3]. In contrast, tree-based schemes not only have high throughput, but don’t suffer from the tag starvation problem. In fact, tree-based ones can single out and read every tag by iteratively grouping the collided tags. According to grouping policy, tree-based schemes can be categorized into the following categories[4], i.e., query tree, splitting tree, searching tree and bitwise arbitration tree. Among the tree-based schemes, the searching tree scheme outperforms others because it uses Manchester coding[5]. The reader can find collided bits in the received tag ID by Manchester decoding. Once collision occurs, the reader will divide the collided tags into two subsets. Hence, there always exist some tags responding the query from the reader, which reduces the delay caused by idle slot, and improves the throughput (more than 50%)[6]. Therefore, our proposed RFID tags anti-collision scheme will still focus on the searching tree scheme.

    2 Related works

    In this section, we survey the relatedprevious works for the proposed scheme, which include three schemes based on binary search.

    In binary searching-based schemes, it requires the reader to knowthe position of collided bits, which can be resolved by Manchester coding. As known, Manchester coding represents each data bit by the level transition of signal wave within each bit period. So, there exists no data bit which signal level doesn’t change. If such data bit is tracked, it would be identified as a collided bit. Therefore, the reader can obtain the position and the number of collided bits.

    Binarysearching tree scheme (BST)[5]is the original binary searching-based scheme. The reader sends query command with reference ID. The initial reference ID is the maximum possible tag ID value (e.g., 11111111). Those tags with ID equal to or lower than the reference ID shall respond with their ID. If only one tag responds, the tag could be identified. Otherwise, some collisions occur, and none of tag could be identified. In this case, the reader can find the most significant collided bit (denoted asχ) in the received ID by Manchester decoding, and then send a new query command by replacing the |χ| bit of reference ID with ‘0’ (|χ| is the position ofχ). The above process is iterated, until only one tag responds. If the reader identifies a tag, it would send a quiet command, which require the tag to enter the sleep state and no longer respond to the query command from the reader.

    BST scheme can deal with the tag collision, but it suffers from high communication overhead. BST usually selects the whole tag ID as the reference ID of the query command, and always require tag to respond the query with its whole ID. In order to reduce the communication overhead rooting from a long reference ID, conference[7]proposed dynamic binary searching tree (DBST) scheme which adopts variable-length ID as its reference ID. In the scheme, the reference ID is a prefix, which is a part of the received tag ID preceding theχfollowed by a data bit ‘0’. If the part of tag ID is equal to the prefix (i.e., tag ID match the prefix), the tag should respond with the remaining bits of the tag ID, which can reconstruct as a complete tag ID combined with the prefix by the reader. Otherwise, the tag shall enter a wait state to wait for the later query from reader. If collision occurs when more than one tag has the same prefix, the above process will repeat many times until only one tag responds.

    After a tag is identified successfully, DBST scheme will enter a new query iteration procedure after the reader sends a query command with initial reference ID (i.e., returns to the root), which doesn’t use the history information of the query process and results in low throughput. To improve the throughput, conference[8]proposed dynamic binary searching tree scheme based on regressive strategy (RDBST), which set up a stack in the reader, and pushes the prefix into the stack in every collision slot. After a tag is identified, the latest prefix shall be popped out to replace the initial reference ID as the reference ID of the next query command. This regressive strategy reduces repeating steps by the stack recording the whole query steps orderly. The total number of slots is reduced from lb(n!)+nto 2n-1 (nis the number of tags).

    RDBST scheme greatly reduce the total number of slots by the regressive strategy, thus its throughput is much higher than that of Aloha-based scheme. Furthermore by using variable-length ID, RDBST efficiently reduces the total number of transmitted bits, and improve the transmission efficiency of valid message. Hence, RDBST has much lower communication overhead. However, compared with the Aloha-based schemes, its communication overhead is still high because there are lots of redundant data in each turn of tag identification. Therefore, this paper aims to reduce the redundant data generated in the process of identification. As the above anti-collision schemes shown, the reader groups the collided tags into two subsets and then queries them respectively. Furthermore, the identified prefix is used as the reference ID of query command, which not only increases the communication overhead, but requires all the tag to do the prefix matching after receiving query command. However, using a new responses mode (i.e., Single query with duo responses mode) in our proposed scheme, the collided tags will respond the next query in two subsequent slots according to the |χ| bit in their ID, respectively. Meanwhile, the proposed scheme also eliminates the prefix matching related to query command through a new trigger method (i.e., Counter trigger).

    3 A lightweight RFID tags anti-collision scheme based on searching tree

    As the survey in Section 2 highlights, there is still a high communication overhead associated with these existing anti-collision schemes. So this paper focused on how to reduce the communication overhead and improve the throughput, and proposed a lightweight anti-collision scheme based on RDBST.

    3.1 Methods for how to reduce the communication overhead

    1) Single query with duo responses mode: to decrease the number of queries

    In the existing searching tree schemes[7-11],the reader first finds theχin the received ID if collision occurs, and then re-sends a query command with a new prefix. Here, the new prefix in the query consists of a part of the received ID before theχand a data bit ‘0’. If the corresponding part of collided tags’ ID matches the prefix (i.e., their |χ| bit is ‘0’), they will respond the query. Due to mismatching the new prefix, the remaining collided tags’ID (i.e., their |χ| bit is ‘1’) must wait for a new query command to give responses. In other words, the collided tags are divided into two subsets by the new prefix, which depends on the |χ| bit in essence. However, there is only one subset able to respond to a query with this prefix. Hence, the query-response mode is called single query with single response. Obviously, the mode in the existing schemes does not make full use of the independent feature of the two tag subsets in terms of ID bit pattern.

    To improve the tag identification efficiency of each query command, and further decrease the total number of queries, it require to design a new query-response mode, which is expected that the collided tags can give more than one independent responses for a query.For the purposes, the paper re-defines the part of the received ID preceding theχas the prefix within query commands. The re-definition can make the corresponding part of all collided tags’ ID able to match the prefix, and also make all of collided tags able to give respond once receiving a query. Besides, the paper also re-designs the responding strategy and operation for the collided tags as follows. If the |χ| bit in collided tags’ ID is ‘0’, then the tags are required to immediately respond in the current slot. Otherwise, they are required to be delayed a slot and respond in the next slot. The query-response mode is called single query with duo responses mode, which is illustrated by Fig.1.

    Fig.1 An example of single query with duo responses mode

    If tag collision occurs in slot 0, the prefix is pushed into stack; otherwise, the reader sends a quiet command and then the identified tag enters the sleep state. If tag collision occurs in slot 1, the collided tags in the slot are queried again; otherwise, the latest prefix shall be popped out and used as the parameter of next query command (i.e., regressive query).

    The little hare took it and cried, Now it is my turn to pierce them, and as he spoke he passed the rod back through the reeds and gave Big Lion s tail a sharp poke15

    2) Counter trigger: to reduce the total length of query command

    As known from the above subsection, the tag can respondonly if its ID matches the prefix of query command. Therefore, the prefix matching plays the key role in deciding whether the tag responds the query command. However, as the reference parameter in query command, the prefix usually takes more bits of query command, which increases the communication overhead in tag identification. By using variable-length ID, the prefix takes up partial tag ID, but it’s not enough short yet.

    In order to reduce the total length of query command,it is very necessary to shorten the identification parameter in query command. Based on the requirement, the value of |χ| directly replaces the prefix as the identification parameter of query command, and the prefix is re-assigned a new function, i.e., a recorder of collided tag. Besides, a counter is set up in tag to trace the depth of the recorder, and is used as a trigger to respond the next new query command. Its initial value is zero. If tag collision occurs, only the collided tags which counter value is zero can respond the new queries. The other tags which counter value is non-zero must wait for a regressive query command (i.e., de-query) until their counter decrease to zero, and then start a new round of query.

    The identification process with counter trigger is illustrated as shown in Fig.2. Here, the example will present the process from the following key aspects, i.e., when/how to push/pop the ID information of collided tags (i.e., the prefix and the value of |χ|), how to trace the collision event by the counter in the collided tag, and the counter how to trigger the response operations of the collided tag. There are 5 tags with tag ID of 8-bit length in this example.

    Step1The reader starts the identification process by sending an initial command. All tags initialize their counter (i.e.,C1~C5←0) and then respond. The reader finds the most significant collided bit |χ|=3 in received ID by Manchester decoding.

    Step2The reader sends a query command, i.e., query(3). The tags with a counter value of zero check the 3thbit in their ID. It is ‘0’ in tag1~3, so they respond in slot0. It is ‘1’ in tag4 and tag5, so they respond in slot1. Tag1~3 collide in slot0, the reader pushes the prefix and the |χ| (i.e., 10110, 2) into the stack, and tag1~3 increase their counters by one (i.e.,C1~C3←+1), respectively. Tag4~5 collide in slot1, the reader finds the |χ| (i.e., 0) in received ID.

    Fig.2 An illustration of the identification process with counter trigger

    Step3The reader sends a query command, i.e., query(0). Because the value of counters in tag1~3 is 1, so tag1~3 don’t respond. In contrast, Tag4~5 respond in slot0 and slot1, respectively. And so they can be identified and then enter sleep state.

    Step4Because no collision occurs in step 3, the reader pops the latest prefix and the |χ| (i.e., 10110, 2), and then sends a regressive command, i.e., de-query(2). Once received the de-query command, the tags (i.e., tag1~3) are required to decrease their counters by one, and so the counter value of tag1~3 is 0. Tag1~3 respond in slot0 and slot1, respectively. Tag1 is identified in slot0. Tag2~3 collide in slot1, the reader finds the |χ| (i.e., 1) in received ID.

    As shown,the tags can respond only if its counter value is zero. If prefix is pushed into the stack, the counter shall increase by one; if prefix is popped, the counter shall decrease by one.

    3.2 The methods for how to improve the throughput

    1) Predictive identification: to decrease the total number of slots

    In [12], tag ID and its XORed value (i.e., parity-check bit) are reconstructed a new tag ID. Because the parity-check bit is the most significant bit of the new ID, it is always identified firstly. Once it is identified, all the responding tags will have even (or odd) number of ‘1’ in their ID. But there isn’t the case of one collided bit in the received ID. Only in the case of two collided bits, the reader can identify two tags by its parity-check bit. This scheme increases the complexity of scheme. In this paper, we adopted an easy predictive identification method as follows. If there is only one collided bit in received ID, the reader could directly identify the two tags. Because the collided bit must be caused by two tags, the bit is either ‘0’ or ‘1’. For example, if the received ID is 101011X0 (X is the collided bit), the ID of two tags must be 10101100 and 10101110. The predictive identification could also save two slots.

    2) Locking technique: to avoid the identified tags colliding with the unidentified tags

    In some cases, the reader repeatedly identifies the same tags since these tags always stay in itscommunication range. If the overlapping area has tags, the identified tags still respond and collide with the unidentified tags. In order to prohibit the identified tags from colliding with the unidentified tags, the paper proposed a locking technique working as follows. Each tag reserves a memory area to store the ID of the reader (i.e., RID) when starting the identification, and clear the RID after leaving reader’s communication range. When starting tag identification, the reader sends an initial command with RID to the tags nearby. Then the tags interpret themselves as the identified tags if the tags have a matching RID. These identified tags are locked, and enter the sleep state and don’t respond. They can get out of the sleep state after leaving reader’s communication range. If the storage area is empty, the tags regard themselves as the unidentified tags, and then store the received RID, meanwhile responding with their IDs to the query of reader.

    4 Performance evaluation and analysis

    The simulation of MATLAB situation is as follows. There is only one reader, and the number of tags in the field of the reader increases from 100 to 1 600. The length of the tag IDs is 16 bits. We consider two scenarios according to the distribution pattern of tag IDs, i.e., Random assignment and sequential assignment. The following metrics[13]are considered in evaluating the efficiency of tag identification, i.e., the total number of queries, the length of query command, the throughput and the communication overhead. From these aspects, we comparatively evaluate the performance of RDBST scheme[8], FST scheme[12]and our proposed scheme LWST. For simplicity, we use the bit-sequence of the reference parameter in the query commands and the transmitted ID bits as the communication overhead without considering the control parameters (e.g., suffixes and check redundancy). The ratio of the total number of slots to the total number of the identified tags is defined as the throughput (u).

    As shown in Fig.3 and Fig.4, compared with FST scheme, the total number of queries is decreased by half in LWST no matter the allocation of tag IDs. The results show that Single query with duo responses mode decreases the total number of queries by half.

    Fig.3 Number of queries (random ID)

    Fig.4 Number of queries (sequential ID)

    Fig.5 shows the performance comparison where the prefix andthe |χ| are used as the reference parameter of query command, respectively. The LWST uses the counter as the trigger in response to query, which makes the reference parameter of query command need only the |χ|. The expression of the |χ| needs only lbkbits (kis the length of ID). If the length of ID is doubled, the parameter of query command only needs to increase one bit. However, other schemes use the prefix matching circuit as the trigger, which requires the prefix as the reference parameter of query command. If the length of ID is doubled, the parameter of command would double. The result indicates our proposed scheme significantly reduce the length of query command by using the counter as the trigger in response to query.

    Fig.5 Length of query command

    As shown in Fig.6,the throughput of RDBST approaches 50%, which is close to theoretical value:u=n/(2n-1). The throughput of FST and LWST are significantly higher than RDBST. It indicates that the predictive identification improve the throughput by reducing the total number of slots. Fig.7 shows the case that 16-bit IDs are allocated by sequential assignment. The throughput of RDBST is still 50%. However, the throughput of the other two schemes is close to 1. That indicates the predictive identification could improve the throughput by taking advantage of the allocation of tag IDs. As shown in Fig.6 and Fig.7, the throughput curves of FST and LWST almost coincide. That indicates the simple predictive identification of LWST could replace the complex predictive identification of FST.

    Fig.6 Throughput (random ID)

    Fig.7 Throughput (sequential ID)

    Fig.8 showsthe case that 16-bit IDs are allocated by random assignment, LWST has overall 42% less communication overhead than RDBST, 38% less than FST. Fig. 9 shows the case that 16-bit IDs are allocated by sequential assignment, LWST has overall 69% less communication overhead than RDBST, 39% less than FST. The results show that LWST performs better than other schemes no matter the allocation of tag IDs.

    Fig.8 Communication overhead (random ID)

    Fig.9 Communication overhead (sequential ID)

    The results also prove thatin the sequential assignment of tag IDs experiment, LWST shows better performance. In most cases, tag IDs are assigned sequentially, such as warehouse management, production line, etc. In conferences [14]and [15], they preprocess ID or lock the collided bits before next query, and the locked bits constitute a new ID. In the case of a few tags, the schemes save some transmitted ID bits. While in the case of a large quantity of tags, the amount of the saved bits is the same as LWST. Therefore, those schemes don’t win better performance but increase the complexity of the schemes.

    5 Conclusions

    This paper is aimed primarily at reducing the redundant data generated in the process of identification and proposes alightweight anti-collision scheme based on searching tree. The scheme greatly decreases the total number of queries and reduces the length of query command, thus reducing the communication overhead. In the case of one collided bit in the received ID, the reader can identify two tags by predictive identification, which reduces the total slots and improves the throughput. The analysis on simulation result indicates that LWST scheme performs significantly better than the existing binary tree schemes. It is very suitable for the RFID anti-collision protocol in the case of a large quantity of tags.

    日韩在线高清观看一区二区三区| 国产午夜福利久久久久久| 中文欧美无线码| 国产亚洲91精品色在线| 亚洲欧美日韩高清专用| 国产色婷婷99| 日本-黄色视频高清免费观看| 国内揄拍国产精品人妻在线| 观看美女的网站| 亚洲人与动物交配视频| 国产精品不卡视频一区二区| 天天躁夜夜躁狠狠久久av| 亚洲国产欧洲综合997久久,| 一级毛片我不卡| 亚洲av不卡在线观看| 日日摸夜夜添夜夜添av毛片| 久久久午夜欧美精品| 少妇的逼好多水| 午夜老司机福利剧场| 久久精品国产亚洲av天美| 别揉我奶头 嗯啊视频| 日日摸夜夜添夜夜添av毛片| 国产亚洲5aaaaa淫片| 国产成人福利小说| 中文字幕精品亚洲无线码一区| 啦啦啦观看免费观看视频高清| 亚洲中文字幕日韩| 亚洲国产欧美在线一区| 国产片特级美女逼逼视频| 丝袜喷水一区| 三级国产精品欧美在线观看| 亚洲自偷自拍三级| 禁无遮挡网站| 国产欧美日韩精品一区二区| 永久免费av网站大全| 国产一区亚洲一区在线观看| 一本久久精品| 欧美97在线视频| 久久精品91蜜桃| 亚洲欧洲国产日韩| 久久人人爽人人爽人人片va| 一本一本综合久久| 亚洲av中文字字幕乱码综合| 少妇高潮的动态图| 国产精品久久久久久久电影| 天天躁夜夜躁狠狠久久av| 自拍偷自拍亚洲精品老妇| 亚洲精品日韩av片在线观看| 99热网站在线观看| 深爱激情五月婷婷| 亚洲精品影视一区二区三区av| 青春草亚洲视频在线观看| 国产乱人视频| 在线免费十八禁| 日韩av在线大香蕉| 久久精品久久精品一区二区三区| av在线天堂中文字幕| 国产一区二区亚洲精品在线观看| 久久久久精品久久久久真实原创| 两个人的视频大全免费| 欧美另类亚洲清纯唯美| 久久久久网色| 毛片一级片免费看久久久久| 超碰av人人做人人爽久久| 亚洲成人精品中文字幕电影| 亚洲精品亚洲一区二区| 女人久久www免费人成看片 | 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 国产片特级美女逼逼视频| 热99re8久久精品国产| 久久精品国产99精品国产亚洲性色| 久久草成人影院| 麻豆精品久久久久久蜜桃| 麻豆精品久久久久久蜜桃| 精品无人区乱码1区二区| 国产69精品久久久久777片| 亚洲精品乱码久久久v下载方式| 亚洲丝袜综合中文字幕| 国产在视频线精品| 99在线视频只有这里精品首页| 如何舔出高潮| 高清毛片免费看| 亚洲性久久影院| 一区二区三区高清视频在线| 自拍偷自拍亚洲精品老妇| 国产av在哪里看| 亚州av有码| 亚洲欧美日韩卡通动漫| 国产黄色视频一区二区在线观看 | 天堂中文最新版在线下载 | 99久久精品热视频| 亚洲国产欧美在线一区| 菩萨蛮人人尽说江南好唐韦庄 | 一级av片app| 国产一区有黄有色的免费视频 | 干丝袜人妻中文字幕| 又爽又黄a免费视频| 国产成人午夜福利电影在线观看| 亚洲av二区三区四区| 男女啪啪激烈高潮av片| 国产真实伦视频高清在线观看| 成人国产麻豆网| 精品一区二区免费观看| 五月玫瑰六月丁香| 国产亚洲最大av| 日本免费a在线| 国产黄色小视频在线观看| 亚洲av熟女| 嫩草影院入口| 国内精品宾馆在线| 欧美xxxx性猛交bbbb| 干丝袜人妻中文字幕| 国产色婷婷99| 久久99蜜桃精品久久| 一夜夜www| 亚洲精品乱码久久久v下载方式| 99视频精品全部免费 在线| 国产私拍福利视频在线观看| 久久久色成人| 中文资源天堂在线| 亚洲国产精品专区欧美| 大香蕉97超碰在线| 国产亚洲精品av在线| 久久精品国产亚洲av涩爱| 欧美日韩在线观看h| 久久精品久久精品一区二区三区| 99久久成人亚洲精品观看| 日本免费在线观看一区| 偷拍熟女少妇极品色| 免费看日本二区| 国语自产精品视频在线第100页| 国产成人免费观看mmmm| 热99re8久久精品国产| 国产成人一区二区在线| 免费播放大片免费观看视频在线观看 | 午夜亚洲福利在线播放| 高清毛片免费看| 亚洲电影在线观看av| 色哟哟·www| 三级国产精品片| 日本熟妇午夜| av又黄又爽大尺度在线免费看 | 国产精品久久久久久久电影| 久久久精品94久久精品| 成年av动漫网址| 美女脱内裤让男人舔精品视频| 最近最新中文字幕免费大全7| 一本一本综合久久| 日本熟妇午夜| 欧美精品国产亚洲| 色视频www国产| h日本视频在线播放| 99久久精品热视频| 国产高清有码在线观看视频| 久久久久性生活片| 午夜视频国产福利| 男女啪啪激烈高潮av片| 麻豆国产97在线/欧美| 国产精品美女特级片免费视频播放器| 国产免费又黄又爽又色| 日本黄色视频三级网站网址| 亚洲伊人久久精品综合 | 三级国产精品片| 天堂av国产一区二区熟女人妻| 成人毛片60女人毛片免费| 又粗又硬又长又爽又黄的视频| 老司机影院成人| 精品人妻一区二区三区麻豆| 精品酒店卫生间| 亚洲精品日韩在线中文字幕| 亚洲av免费在线观看| 精品久久久久久久末码| 午夜福利成人在线免费观看| 久久这里有精品视频免费| 国产极品精品免费视频能看的| 美女黄网站色视频| 欧美成人一区二区免费高清观看| 一级av片app| 国产伦在线观看视频一区| 熟女电影av网| 亚洲国产欧美人成| 成人性生交大片免费视频hd| 大又大粗又爽又黄少妇毛片口| 亚洲欧美精品自产自拍| 少妇的逼好多水| 免费黄色在线免费观看| 久久久欧美国产精品| av在线观看视频网站免费| 国产精品精品国产色婷婷| 啦啦啦啦在线视频资源| videos熟女内射| 国产黄片美女视频| 国产一区二区三区av在线| 青青草视频在线视频观看| 麻豆成人午夜福利视频| videos熟女内射| 黄色一级大片看看| 亚洲精品亚洲一区二区| 草草在线视频免费看| 国产一区二区亚洲精品在线观看| 天美传媒精品一区二区| 国产真实乱freesex| 亚洲国产色片| 久久国内精品自在自线图片| 国产精品久久视频播放| 欧美激情在线99| 一个人免费在线观看电影| 97在线视频观看| 久久久精品94久久精品| 免费在线观看成人毛片| 国产精品不卡视频一区二区| 国产精品一区二区在线观看99 | 亚洲国产最新在线播放| 国产黄片视频在线免费观看| 日本一二三区视频观看| 成人av在线播放网站| 九九爱精品视频在线观看| 美女被艹到高潮喷水动态| 18+在线观看网站| 老司机影院毛片| 麻豆久久精品国产亚洲av| 亚洲精品日韩在线中文字幕| 久久久久久久久久黄片| 亚洲国产精品成人久久小说| 亚洲丝袜综合中文字幕| 婷婷色麻豆天堂久久 | 又爽又黄a免费视频| av天堂中文字幕网| 成人三级黄色视频| АⅤ资源中文在线天堂| 一区二区三区乱码不卡18| 亚洲欧美精品综合久久99| 久久久久久久久中文| 国产免费福利视频在线观看| 国产私拍福利视频在线观看| 免费观看人在逋| 非洲黑人性xxxx精品又粗又长| 联通29元200g的流量卡| 国产av码专区亚洲av| 亚洲欧美成人综合另类久久久 | 国内精品一区二区在线观看| 欧美日本亚洲视频在线播放| or卡值多少钱| 2022亚洲国产成人精品| 99久久精品国产国产毛片| 日韩,欧美,国产一区二区三区 | 91狼人影院| 国产成年人精品一区二区| 特大巨黑吊av在线直播| 亚洲真实伦在线观看| 2021少妇久久久久久久久久久| 欧美人与善性xxx| 长腿黑丝高跟| av在线老鸭窝| 哪个播放器可以免费观看大片| 好男人在线观看高清免费视频| 国产精品一区二区三区四区免费观看| 最近视频中文字幕2019在线8| 国产高清三级在线| 久久久久久久久大av| 久久精品国产99精品国产亚洲性色| 国产女主播在线喷水免费视频网站 | 色播亚洲综合网| 亚洲成av人片在线播放无| 亚洲av男天堂| 老司机影院成人| 秋霞伦理黄片| 国产av码专区亚洲av| 国产精品一及| 精品久久久久久久末码| 99久国产av精品国产电影| 三级毛片av免费| av线在线观看网站| 久久精品国产99精品国产亚洲性色| 中文字幕精品亚洲无线码一区| 免费在线观看成人毛片| 久久精品久久久久久久性| 中文字幕亚洲精品专区| 亚洲在线观看片| 少妇的逼水好多| 一个人看视频在线观看www免费| 一级黄色大片毛片| 欧美三级亚洲精品| 国产精品综合久久久久久久免费| 亚洲真实伦在线观看| 久久精品国产自在天天线| 美女黄网站色视频| 舔av片在线| 插阴视频在线观看视频| 嘟嘟电影网在线观看| 久久久a久久爽久久v久久| 狂野欧美激情性xxxx在线观看| 久久精品夜夜夜夜夜久久蜜豆| 精品熟女少妇av免费看| 波多野结衣高清无吗| 国内揄拍国产精品人妻在线| 国产精品一区二区三区四区久久| 亚洲av免费高清在线观看| 国产免费男女视频| 色噜噜av男人的天堂激情| 午夜亚洲福利在线播放| 中文字幕免费在线视频6| 色网站视频免费| 精品国产三级普通话版| 成人午夜高清在线视频| 中文字幕人妻熟人妻熟丝袜美| 在线a可以看的网站| 亚洲av福利一区| 最近2019中文字幕mv第一页| 免费无遮挡裸体视频| 国产一区亚洲一区在线观看| 热99re8久久精品国产| 99久久九九国产精品国产免费| 男女边吃奶边做爰视频| 亚洲精品乱码久久久v下载方式| 国产乱人视频| 一个人观看的视频www高清免费观看| 天堂av国产一区二区熟女人妻| 国产不卡一卡二| 亚洲四区av| 一个人看视频在线观看www免费| 国产成年人精品一区二区| 久久精品国产99精品国产亚洲性色| 永久网站在线| 99国产精品一区二区蜜桃av| 又黄又爽又刺激的免费视频.| 日韩精品青青久久久久久| 国产黄色小视频在线观看| 久久人人爽人人片av| 国产精品一区二区三区四区免费观看| 国产又黄又爽又无遮挡在线| 亚洲,欧美,日韩| 在线观看一区二区三区| 丝袜美腿在线中文| av线在线观看网站| 国产av码专区亚洲av| 亚洲内射少妇av| 久久精品国产亚洲网站| 亚洲最大成人中文| 国产成人91sexporn| 亚洲欧美日韩高清专用| 国产伦理片在线播放av一区| 久久精品夜夜夜夜夜久久蜜豆| 99久久精品国产国产毛片| 国产精品电影一区二区三区| 国产午夜精品久久久久久一区二区三区| 久久6这里有精品| 国产一区有黄有色的免费视频 | 天堂网av新在线| 久久久成人免费电影| 亚洲人成网站在线播| 国产一区二区三区av在线| 国产乱来视频区| 欧美又色又爽又黄视频| 日韩一区二区三区影片| 国产午夜精品久久久久久一区二区三区| 最近2019中文字幕mv第一页| 亚洲精品乱码久久久久久按摩| 人妻少妇偷人精品九色| 久久热精品热| 免费在线观看成人毛片| 亚洲自拍偷在线| 啦啦啦啦在线视频资源| 精华霜和精华液先用哪个| 久久草成人影院| 亚洲国产精品sss在线观看| 麻豆乱淫一区二区| 91aial.com中文字幕在线观看| 99热这里只有是精品在线观看| 午夜福利在线在线| 建设人人有责人人尽责人人享有的 | 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 少妇猛男粗大的猛烈进出视频 | 欧美日韩精品成人综合77777| 久久久国产成人精品二区| 亚洲精品,欧美精品| 久久久久性生活片| 少妇人妻一区二区三区视频| 亚洲精品456在线播放app| 少妇人妻一区二区三区视频| 午夜福利成人在线免费观看| 久久精品国产自在天天线| 中文字幕亚洲精品专区| 九九久久精品国产亚洲av麻豆| 免费黄网站久久成人精品| 午夜a级毛片| 亚洲国产成人一精品久久久| 国产午夜精品久久久久久一区二区三区| 99久久精品国产国产毛片| 成人欧美大片| 日韩欧美国产在线观看| 亚洲中文字幕一区二区三区有码在线看| 综合色av麻豆| 精品人妻一区二区三区麻豆| 一区二区三区四区激情视频| 人人妻人人澡欧美一区二区| 国产av不卡久久| 人妻少妇偷人精品九色| 国产成人freesex在线| 免费不卡的大黄色大毛片视频在线观看 | 亚洲乱码一区二区免费版| 听说在线观看完整版免费高清| av线在线观看网站| 蜜臀久久99精品久久宅男| 天天躁日日操中文字幕| 中文字幕av在线有码专区| 久久婷婷人人爽人人干人人爱| 非洲黑人性xxxx精品又粗又长| 高清午夜精品一区二区三区| 久久综合国产亚洲精品| 精品国内亚洲2022精品成人| 男人舔女人下体高潮全视频| 国产乱来视频区| 色5月婷婷丁香| 国产精品野战在线观看| 国产精品无大码| 性色avwww在线观看| 91精品一卡2卡3卡4卡| 日本wwww免费看| 久久人人爽人人片av| 色网站视频免费| 爱豆传媒免费全集在线观看| 简卡轻食公司| 国产亚洲av片在线观看秒播厂 | 七月丁香在线播放| 免费搜索国产男女视频| 国产亚洲午夜精品一区二区久久 | 国产精品久久久久久久电影| 一夜夜www| 国产一区有黄有色的免费视频 | 欧美一级a爱片免费观看看| 身体一侧抽搐| 欧美性感艳星| 十八禁国产超污无遮挡网站| 亚洲成人中文字幕在线播放| 国产成人aa在线观看| 夫妻性生交免费视频一级片| 精品免费久久久久久久清纯| 成人午夜精彩视频在线观看| 成年版毛片免费区| 天天躁夜夜躁狠狠久久av| 九九热线精品视视频播放| 国产精品一二三区在线看| 亚洲在久久综合| 久久精品国产自在天天线| 午夜老司机福利剧场| 99热这里只有是精品50| 午夜福利网站1000一区二区三区| 亚洲内射少妇av| 久久99热6这里只有精品| 看免费成人av毛片| 久久这里只有精品中国| 最近手机中文字幕大全| 小蜜桃在线观看免费完整版高清| 精品人妻视频免费看| 丰满少妇做爰视频| 99久久精品一区二区三区| 国产三级在线视频| 欧美成人a在线观看| 亚洲在线自拍视频| 人妻夜夜爽99麻豆av| АⅤ资源中文在线天堂| 99热这里只有是精品在线观看| 又粗又爽又猛毛片免费看| 一个人观看的视频www高清免费观看| 日韩欧美在线乱码| av免费在线看不卡| 亚洲图色成人| 国产不卡一卡二| 一级av片app| 只有这里有精品99| 精品人妻熟女av久视频| 国内精品美女久久久久久| 插阴视频在线观看视频| 一个人看的www免费观看视频| 久久精品久久精品一区二区三区| 亚洲性久久影院| 亚洲国产欧美人成| 国产免费又黄又爽又色| 亚洲国产精品专区欧美| 亚洲久久久久久中文字幕| 日韩中字成人| 极品教师在线视频| 久久国产乱子免费精品| 嘟嘟电影网在线观看| 美女大奶头视频| 男人狂女人下面高潮的视频| 深夜a级毛片| 国产单亲对白刺激| 国产午夜精品久久久久久一区二区三区| 国产精品女同一区二区软件| 亚洲成人av在线免费| 久久鲁丝午夜福利片| 免费搜索国产男女视频| 国产老妇女一区| 午夜精品在线福利| 又粗又爽又猛毛片免费看| 久久人人爽人人片av| 少妇人妻一区二区三区视频| 欧美另类亚洲清纯唯美| 亚洲怡红院男人天堂| 国产av一区在线观看免费| 免费不卡的大黄色大毛片视频在线观看 | 91在线精品国自产拍蜜月| 日韩国内少妇激情av| 亚洲欧美日韩卡通动漫| 国产老妇女一区| 中文乱码字字幕精品一区二区三区 | 夫妻性生交免费视频一级片| 日韩高清综合在线| 午夜福利在线观看免费完整高清在| 国产淫片久久久久久久久| 精品人妻偷拍中文字幕| 国产乱来视频区| 97人妻精品一区二区三区麻豆| 亚洲不卡免费看| 黑人高潮一二区| 久久这里有精品视频免费| 国产精品精品国产色婷婷| 久久精品国产亚洲av涩爱| 一个人观看的视频www高清免费观看| 国产老妇女一区| 亚洲国产色片| 只有这里有精品99| 男人狂女人下面高潮的视频| 精品人妻视频免费看| 中文字幕免费在线视频6| 九九久久精品国产亚洲av麻豆| 久久久a久久爽久久v久久| 国产私拍福利视频在线观看| 国产精品蜜桃在线观看| 蜜臀久久99精品久久宅男| 亚洲国产精品成人久久小说| 三级经典国产精品| 日本免费a在线| 人人妻人人看人人澡| 亚洲精品色激情综合| 别揉我奶头 嗯啊视频| 91aial.com中文字幕在线观看| 亚洲国产色片| 熟女电影av网| 国产成人a∨麻豆精品| 亚洲av中文字字幕乱码综合| 美女国产视频在线观看| 色视频www国产| 欧美区成人在线视频| 深爱激情五月婷婷| av专区在线播放| 亚洲综合色惰| 蜜桃久久精品国产亚洲av| 久久欧美精品欧美久久欧美| 午夜免费激情av| 九草在线视频观看| 久久久久久大精品| 插逼视频在线观看| 一级二级三级毛片免费看| 精品久久久久久久人妻蜜臀av| 97在线视频观看| 国产亚洲精品av在线| 在线观看美女被高潮喷水网站| 麻豆成人av视频| 亚洲aⅴ乱码一区二区在线播放| 中文字幕av在线有码专区| 久久人人爽人人爽人人片va| 久久精品熟女亚洲av麻豆精品 | 国产免费男女视频| 岛国在线免费视频观看| 大香蕉久久网| 午夜福利在线观看吧| 欧美日韩综合久久久久久| 国语对白做爰xxxⅹ性视频网站| 午夜福利在线观看免费完整高清在| 99在线视频只有这里精品首页| 永久免费av网站大全| 狂野欧美白嫩少妇大欣赏| 波多野结衣高清无吗| 亚洲精品456在线播放app| 亚洲av成人精品一二三区| 国产色爽女视频免费观看| 国产一区二区在线av高清观看| 亚洲人成网站在线观看播放| 一个人免费在线观看电影| 黄色配什么色好看| 能在线免费看毛片的网站| 永久免费av网站大全| 51国产日韩欧美| 日韩中字成人| 国产在线男女| 亚洲欧美清纯卡通| 精品久久久久久久久亚洲| 国产淫语在线视频| 亚洲精品影视一区二区三区av| 日本五十路高清| 男女那种视频在线观看| 女人十人毛片免费观看3o分钟| 成人毛片a级毛片在线播放| 亚洲久久久久久中文字幕| 中文字幕熟女人妻在线| 日本-黄色视频高清免费观看| 亚洲国产成人一精品久久久| 好男人在线观看高清免费视频| 日韩人妻高清精品专区| 成人鲁丝片一二三区免费| 亚洲美女视频黄频| 欧美97在线视频| 偷拍熟女少妇极品色| 在线观看66精品国产| 午夜爱爱视频在线播放| 汤姆久久久久久久影院中文字幕 | 大香蕉97超碰在线| 男人舔奶头视频| 国产精品久久电影中文字幕| 五月玫瑰六月丁香| 亚洲无线观看免费| 精品久久久久久久末码|