• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Improved Enhanced Dbtma with Contention-Aware Admission Control to Improve the Network Performance in Manets

    2019-08-13 05:54:06SivaramYuvarajAminSalihMohammedManikandanPorkodiandYuvaraj
    Computers Materials&Continua 2019年8期

    M.Sivaram,D.Yuvaraj ,Amin Salih Mohammed,V.Manikandan,V.Porkodi and N.Yuvaraj

    Abstract: DBTMA relies entirely on RTS/CTS dialogue for un-collided transmission of data.The purpose is to improve the QoS at MAC layer by developing it over 802.11e standard.However,DBTMA does not guarantee real-time constraints without efficient method for controlling the network loads.The main challenges in MANETs include prediction of the available bandwidth,establishing communication with neighboring nodes and predicting the consumption of bandwidth flow.These challenges are provided with solutions using Contention-Aware Admission Control (CACP) protocol.In this paper,the EDBTMA protocol is combined with CACP protocol that introduces bandwidth calculation using admission control strategy.The calculation includes certain metrics like:admission control and bandwidth consumption.To compute the bandwidth of channel,bandwidth utilization and traffic priority is distinguished through dual busy tone is proposed.This operates distinctly on its own packet transmission operation.This CACP mechanism defends the conventional traffic flows from new nodes and based on the measured status information of the channel,it QoS of the admitted flows is maintained.This ensures maximum amount of bandwidth flows accommodated by resources and determines the resources in a system meet the new flow requirements while maintaining existing bandwidth flow levels.

    Keywords: Edbtma,cacp protocol,mac layer,manets.

    1 Introduction

    The IEEE 802.11e MAC protocol improves the 802.11 CSMA/CA standard’s contention technique that allows adjustment in previously fixed MAC parameters.IEEE 802.11e protocol is studied extensively in literatures and the present study almost confines to critical and simulation studies,which compares EDCA with proposed DBTMA.Due to severe lack of hardware devices,the experimental study could be conducted in evaluating the comparison performance of the 802.11 protocol with the proposed one.However,with available hardware,investigations over 802.11e EDCA protocol are done in real-time environment.

    EDCA provides prioritized QoS that further enhances the contention based DCF.This offers a segregated and distributed access to all the wireless communicating medium for QoS stations that uses 8 dissimilar priorities of users.Formerly,each data packet that is received from the respective higher layer is been assigned with a specific values of user priority,before the packet enters the MAC layer.There is an issue during implementation,when the priority value is set for each packet.The EDCA technique provides 4 varied queuing namely first-in first-out (FIFO) queues.This is referred as access categories(ACs) that helps in supporting the traffic delivery with UP over the QoS stations.The data packet obtained from higher layer provided with specific value of user priority is mapped to its respective ACs.

    A relative prioritization is used to root specifications from the bridge specification of IEEE 802.1d [Wietholter and Hoene (2003)].Various types of applications (e.g.,best effort traffic,background traffic,voice and video traffic) is directed over to ACs in the network.Each AC possess an enhanced DCF variant,named as enhanced distributed channel access function (EDCAF) that resists TXOPs in using EDCA parameter’s set from the Set element of EDCA Parameter.Otherwise,the default parameter values are taken into consideration when there is no EDCA Parameter Set element is received.Additionally,there are certain issues in EDCA protocol over MAC layer,which is discussed in following section.

    1.1 Issues in EDCA over MAC layer

    EDCA possess two different collision types:first is classical collision/real collision that ensures two or more ACs that are active within two or more QoS stations.The selected Qos Stations are different,and they access the communication medium at same intervals.The second category of collision is a virtual or internal collision,which occurs when two ACs within same QoS station access the communication medium at the simultaneous intervals [El Masri and Abdellatif (2009)].

    The IEEE 802.11 Wireless LANs (WLANs) is employed widely that ensures universal networking.This is completely due to its easier installation,flexible nature and robustness against node failures.Despite its broad dissemination,the IEEE 802.11 MAC protocol does not support real-time applications that are specific characteristics like timing jitter and packet delay.

    This wireless MAC possess multi-data rate with routers and clients possessing varying data rates.The performance (throughput) of the IEEE 802.11 channel access behaves very poor or it degrades during channel access in multi-rate and overall networks [Li,Pal,and Yang (2008)].The major problem essential in IEEE 802.11s communication is the fairness problem in EDCA multihop networks at MAC channel access protocol.The unfairness is evident in busty conditions and it is not resolved totally in multiple radios that is tuned on multiple access channels.

    The IEEE 802.11 provides long transmission opportunities in each contending nodes of the wireless network.Additionally,it provides channel share proportionate with the data rate of the channel.In actual fact,the IEEE 802.11MAC adopts a fixed contented channel access schema that is termed as Distributed Coordination Function or DCF.This is based purely on CSMA/CA protocols that cannot provide definite networking services.These limitations could be overridden through certain innovations of 802.11e working group.The innovations include Hybrid Coordination Function or HCF that is otherwise an enhanced access method.HCF specifies signaling of messages over certain service request and QoS negotiations and 4 ACs using various priorities that maps the QoS requirements of the users.Especially,HCF assigns Transmission Opportunities (TXOP) over each ACs for satisfying the needs of QoS.This takes place where TXOP is distinct as the time interval during which a station can transmit.This in turn is categorized based on the starting time and the total duration.

    The design of QoS fairness possesses severe several disadvantages that specifically signify during diverse flow in traffic.The applications of diverse traffic flow include video,VoIP and TCP traffic that are active concurrently in the cell.Since,network is incapable in providing them the essential guaranteed service guarantees that includes constant bandwidth for real-time traffic flows.The unfairness problem is insignificant in IEEE 802.11s EDCA communication due to its severe dissimilarity in traffic load among clients and routers.

    1.2 Impact of EDCA over MAC protocol

    The MAC protocol is accountable for the distribution of transmission opportunities in channel.The transmission tries to deliver fair access or same channel share for all active nodes.This is considered without segregating the mobile stations (STAs) and access point (AP).Even though,the performance of EDCA protocol is found in MANETs,it is found that there is a limitation in its packet-level metrics.This includes various factors like delay;throughput and entire focus of EDCA behavior/impact over MAC behavior includes collision and transmission probabilities.

    1.3 Impact of EDCA with DBTMA

    Furthermore,the EDCA could be used with simple and RTS/CTS- channel access methods.The mathematical investigations are accomplished for both channel access with diverse limits on retransmission [Kosek Szott,Natkaniec and Pach (2011)].However,the use of traditional CSMA/CA system provides hidden and exposed terminal problem that concedes the channel access with reduced capacity in network performance.The loss in chancel utilization is address in terms of various systems that includes RTS/CTS network.Hence the present study moves its concentration over a new MAC protocol that should accompany the RTS/CTS based channel access and considers the hidden and exposed terminal problems.Hence,Dual Busy Tone Multiple Access (DBTMA),a multiple access technique in MANETs for packet radio networks is considered for the current study.

    2 Problem statement

    Quality of Service is an important parameter that decides the trusted immediate nodes or hops.Routing through such nodes or hops should be efficient enough to deliver the packets to destination without intrusion.Certain defence,search and rescue operations required a better QoS,however,the availability of such QoS services is inhibited due to several constraints in MANETs.Here the present study discusses the major issues in MANETs namely:hidden terminal problem and exposed terminal problem [Jayasuriya,Perreau,Dadej et al.(2004)],which affects significantly the QoS performance MANETs.

    2.1 Hidden terminal problem

    Fig.1 Illustrates the hidden terminal problem in MANETs.If a node that is hidden outside the range of transmission of a sender,however,it lies within the receiver range is considered as hidden terminal.Since the transmission of mobile node range is limited,multiple transmitters within the same receiver range could not have known about the existence of other transmissions.In this way,the nodes are hidden from each other.The nodes transmit in/around at the same time and the real problem is that they don’t recognize that there is a collision in its transmissions on the way to receiver.

    Consider that there exist four nodes A,B,C,and D (Fig.1).The communication range of each node is shown in dotted circle.Consider that the A node is in communication with B node.Assume,there exist a node C and that needs to transmit packets to D node.If the C Node senses that the channel as free,it could start its transmission,however,at node B,there exist a collision.This is considered as hidden terminal problem that significantly degrades the throughput performance in MANETs.

    Figure1:Problem identification - hidden terminal problem

    2.2 Exposed terminal problem

    Fig.2 shows the exposed terminal problem in MANETs.Exposed terminal/nose is one,which lies in the transmission range and lies outside the reception range.The exposed node leads to underutilization of network bandwidth/capacity.

    Consider that there exit four nodes in a network namely,A,B,C,and D (Fig.2).Here,the node C wants to communicate with node D.If node B transmits the packets to node A and if Node B finds that the channel is busy,then it fails to transmit to node A.Although the transmissions that happened cannot causes collision at node D,however,node B is allowed to stop its transmission.From this it could be inferred that the node B is considered as an Exposed Node.This probably leads to inefficient utilization of bandwidth at B node.Hence,the problem of inefficient bandwidth utilization due to B node is considered as exposed terminal problem.

    Figure2:Problem identification-exposed terminal problem

    The Hidden terminal and exposed terminal problems frequently occur in MANET that significantly degrades the throughput of the network.To overcome the hidden terminal and exposed node problem in MANETs,modified RDTMA and EDBTMA protocols are proposed.

    3 Related works

    The hidden terminal and exposed terminal problem are regarded as major concern in MANETs.Conventional methods provide various opportunities for the networks to get rid of such terminal issues.However,there are certain disadvantages associated with the conventional methods.This chapter provides a detailed insight on collision avoidance,hidden terminal and exposed terminal problems and fairness problem in conventional EDCA and DBTMA protocols.The comparison between EDCA and DBTMA is considered since,they are basis protocols in IEEE 802.11e suite.The IEEE 802.11e standard provides an ultimate powerful supporting platform for QoS in Wireless networks.Hence,EDCA protocol is chosen for the comparison purposes.

    3.1 Dbtma techniques on hidden and exposed terminal problem

    The main aims of the MAC protocol are to provide synchronized multiple nodes access over shared communication medium.This maintains higher utilization network.Here,hidden and exposed terminal problem in conventional literatures tries solving or improve the performance in MAC scheme over single/multi-hop networks.

    Deng et al.[Deng and Haas (1998)] proposed Dual Busy Tone Multiple Access (DBTMA)technique in packet radio networks.They tried to solve the hidden and exposed terminal problem in MAC protocol to improve the bandwidth utilization.To achieve these RTS/CTS dialogues are used,however,such schemes possess higher performance degradation basic access method.Henceforth,degradation in utilization,propagation and long transmission delays could lead to poorer performing network.In addition to RTS/CTS,dual busy tones separate the usage of forward and reverse communication.The performance results of dual busy tone are twice the time effective as RTS/CTS signaling method.

    Haas et al.[Haas,Deng and Tabrizi (1999)] proposed a scheme where each node uses dual out band busy tone signals along with RTS/CTS dialogues.The dual out band tones work for notification purpose over entire node within the range of transmission and reception.The assurance of hidden and exposed back-off terminals,however,does not defer.The dual busy tones are regarded as narrow band signals with extra hardware requirements are limited in this literature.Dual busy tones are sensed as meek and implemented using narrow band comparator and filter.The use of busy tones in MAC protocol,possibly helps in using variable packet length for transmission purpose.

    Haas et al.[Haas and Deng (1999)] proposed the DBTMA scheme to operate in a decentralized network like Packet Radio Networks.The usage of RTS/CTS dialogue reserves DBTMA channel.Additionally,two busy tones are used for notifying the neighboring nodes with effective channel reservation in current packet transmission and reception.The performance analysis proved that the DBTMA protocol delivers higher utilization of network that is 100% more than RTS/CTS dialogue schemes.

    Haas et al.[Haas and Deng (1999)] designed DBTMA scheme for multi-hop distributed networks with RTS/CTS dialogue mechanism.This protocol reserves the channel to be shared in multi-hop environment.Nodes in transmitter and receiver range cannot hear the successful RTS/CTS exchange of message.This leads to destruction of data and data access collisions.Thus,two busy tones with narrow bandwidth are used and that notifies neighboring nodes with current channel transmissions.The capacity of channels is analyzed using DBTMA protocol.Various network utilization parameters over multihop networks provides analysis on the DBTMA performance with RTS/CTS dialogue schemes.The DBTMA scheme proved with better collisions prevention than other schemes.

    Haas et al.[Haas and Deng (2002)] address again the problem of hidden and exposed terminals and proposed a modified RTS dialogue scheme.The MAC schemes that use RTS/CTS cannot solve terminal problems,hence the MAC schemes are considered to be fully in-secured in connected wireless networks.Hence,a MAC protocol with DBTMA scheme is proposed and its operation on RTS packet with 2 narrow bandwidth and outband busy tones is used.The RTS packet is installed using the receiver along with a busy tone.The busy tone set up by transmitter completely provides full protection for RTS packets and it increases the successful RTS reception probability.Consequently,this has increased the network throughput.Simulation provided the analytical results and the DBTMA protocol performs superior than other RTS/CTS schemes over one channel and that rely over single busy tone.

    Zhai et al.[Zhai,Wang,Fang et al.(2004)] studied the inefficiency of networks due to hidden and exposed terminal problem,blocking problem of receiver and an intra-flow contention problem.These problems lead to detonation in control packets providing very poor throughput performance.Thus,MAC protocol for IEEE 802.11 wireless network is proposed.The proposed MAC protocol with features includes an architecture with a two communication wireless channels and outband busy tone.Along with this the control and data frames are included.The procedure for exchanging the message provides inclusive solution to these four problems.This scheme provides a better performance over the four problems that could improve greatly the spatial reuse and eliminate the data packet collisions.A stable link layer that possess few control overheads proved well the performance with less routing failures.Consequently,the throughput of the system is improved well than the 802.11 MAC system.

    [Yeh (2004)] identified multiple unique problems over multihop wireless networks.An interference aware multiple access scheme MAC in multihop adhoc and wireless LAN networks.Depending on the CTS (triggered),dialogues-detached and object to sending mechanisms,these schemes are used.The interference aware multiple access is a distributed MAC scheme that solves the additive interference problem using common channel that is shared by data packets and control messages.The distributed MAC scheme achieves the interference that does not rely on busy tone with a dual transceiver.Interference aware multiple access solves the heterogeneous hidden terminal or exposed terminal problem with adjustable power that does not rely on hardware for signal strength measuring and supports the multiple access and interference in directional antennas.

    Yu et al.[Yu and Yin (2005)] presented a joint Physical layer MAC design in a wireless adhoc networks.This syndicates the DBTMA integrated with physical system with modifications over orthogonal frequency division multiplexing system that is proposed in 802.11a.The performance analysis indicates that this scheme provides better performance than 802.11 MAC protocol with lesser complexity than other solutions.Additionally,the system is made compatible with 802.11a wireless networks.

    Leng et al.[Leng,Zhang and Chen (2005)] proposed a dual MAC schemes for solving the hidden terminal and exposed problem in the wireless adhoc networks.This method possesses a larger range of interference.Further,the usage of dual busy tones in a single scheme is provides an improvement toward 802.11 networks.The second scheme signifies exactly the range of interference that adjusts the busy tones’ transmission power.These two schemes prevent the data packet or acknowledgement packet collision.The results proved that the two schemes enhance significantly the throughput (saturation) of 802.11 wireless networks.The method further provides a balance between or a trade-off between collision avoidance and spatial reuse.

    Wang et al.[Wang,Jiang and Zhuang (2006)] proposed a busytone MAC scheme that supports the data or voice traffic address the problems of hidden terminal and exposed terminal problem.Dual busy tone narrowband separate channels with varied ranges of carrier sensing resolves completely the hidden and exposed terminal problems.Additionally,the extension of busy tones over the busy tone transmitter channel,the scheme guarantees the voice traffic independent priority access over delay sensitive schemes over certain user locations.The long and short term QoS performance to required data traffic over multi hop wireless environment has improved greatly than 802.11e MAC schemes.

    Wang et al.[Wang and Zhuang (2006)] enhanced the conventional busytone dialogues for resolving the collisions in RTS occurs due to hidden terminals.The addition of two separated busytone and setting of various ranges of carrier sensing over different channels avoids collisions completely.This includes the data packets and RTS collisions that is caused due to hidden terminal problem.The carrier sensing range setting of transmitter busy tone is twice the carrier sensing range of receiver channels and avoids 100% collision due to hidden terminals.

    Wang et al.[Wang and Ali (2006)] studied the modeling of MAC protocol for wireless adhoc networks.DBTMA is considered to solve the hidden terminal and exposed terminal problem.The conventional evaluation performance of DBTMA failed in considering the hidden terminal problem.Hence to improve the performance analysis,hybrid MAC protocol of Channel Reservation and Busy Tone technique is proposed to consider the aforementioned problem.The performance evaluation failed to provide higher throughput results than the conventional DBTMA model.

    Yuan et al.[Yuan,Zhu,Liu et al.(2007)] proposed Combined DBTMA protocol that uses a single busy tone channel for implementing the entire functions the DBTMA possess.This significant does not losses the system performance.The hidden terminal and exposed terminal problems with less capacity wastage is considered.However,end to end delay is longer than DBTMA technique because of additional delaying parameter.Hence,this technique is considered useless for impending wireless LAN without terminal problems.

    Yeh [Yeh (2007)] proposed the detached busytone method as a solution to get rid of receiver busy tone self-interference.The busytone is transmitted in the form of outband narrow tone signals that helps in transmission of associated data packets.Hence,an advanced busytone multiple access method (ABTMA) is proposed with dual busytone.Additionally,several such advanced subclasses protocol that includes pure ABTMA,collision avoidance ABTMA and RTS-ABTMA with its respective gains.Specifically,the shortened busytone method reduces significantly the identified overhead problem occurring due to induced idleness dialogues.This exists in RTS/CTS dialogue-based MAC for 802.11 or 802.11e protocols with control channels.Also,a self-interference busy tone cancelation method for inband and mixed approach coexist in CSMA or 802.11 or 802.11e wireless networks or busy toneless frequency hopping networks.The busytone detached,busytone shortened,and self-interference busytone cancelation provides better performance throughput than PCMA and DBTMA.However,DBTMA performs well with the use of RTS/CTS signaling.

    Kalfas et al.[Kalfas,Papadimitriou,Nicopolitidis et al.(2007)] studied the extremely vulnerability in adhoc networks due to hidden terminal and exposed terminal problems.This results in subsequent reduction of network capacity.The lack of knowledge over surrounding scenario,an in-wrought characteristic over with wireless adhoc networks,is the major purpose for the performance degradation in MANETs.To problems are addressed effectively using Wireless Medium Access Record Keeping methods that combines the table-driven busy tone with power control protocols.Here,each node has local matrix relation that stores the on-going condition of adjacent nodes.The matrix records are updated periodically using status messages of transmission that possess RTS dialogue that initiates the transmission of data packets.The status messages get secured with busy tones for getting highest priority and maximize the probability of successful transmission.Finally,the power control scheme assures the allocation of best possible bandwidth allocation for wireless networks with maximum throughput.

    Wang et al.[Wang,Jiang and Zhuang (2008)] proposed a busytone MAC scheme that supporting data and voice traffic for address the hidden and exposed terminal problems.A two-narrow band busytone separated channels possessing varied carrier sensing ranges resolves the terminal problems.Besides,the use of busy tones for transmitter node with a back-off method,ensures the priority guaranteed access over delay sensitive traffic networks like voice over data traffic networks.The priority is locations independent depending on the user and it solves the problem of reverse priorities.The performance of fairness indications over data traffic is not connected fully with the scenarios that are improved greatly than 802.11e MAC protocol.This does not need an additional information to exchange packets between the neighbouring nodes.

    Liu et al.[Liu,Leng,Fu et al.(2009)] combatted the exposed terminal problem and the phenomenon of accumulating interference over wireless network channel.To resolve this issues,asymmetrical dual busy tones MAC protocol was proposed.The introduction of busy tone CTS dialogue mechanism along with the use of interfering node estimation algorithm solves the problems of exposed terminal and hidden terminal in large interference environment/ range.Further,the effects due to phenomenon of accumulating interference for busy tones is relieved through power adjustment method.

    Chen et al.[Chen and Li (2011)] proposed Hybrid Channel Reservation and Busy Tone protocol that is treated as a solution for the hidden terminal and exposed terminal problem.This responds well to the real-time transmission systems using reservation of channels and dual busy tone.Typically,the information about channel reservation is transmitted in the form of linked packets.Though,the proposed technique uses busy toneto overcome hidden terminal and exposed terminal problems and broadcasts the information about channel reservation.The performance results proved that the proposed protocols provide higher stability while reserving a channel.This has improved significantly since the reception of the information about channel reservation provides serious effects the existence of hidden terminal and exposed terminals problems.

    Poudyal et al.[Poudyal,Bhattacharjee,Panigrahi et al.(2012)] studies the lack of infrastructure,hidden terminal and exposed terminal problem,dynamic topology and other challenges in MAC wireless networks.The behaviour of two MAC protocols namely multiple access collision avoidance for wireless and DBTMA is studied.The performance evaluation is considered in terms of QoS via bandwidth utilization.The results provide suitable various network topologies for MAC protocol and provides guidelines for robust and efficient MAC protocols design.

    This section provides an insight of various techniques and its performance level in terms of the problems that are in existence with EDCA and DBTMA protocols.Additionally,the usage of RTS/CTS dialogue mechanism in EDCA motivated the study to consider the problems associated with EDCA and to provide a relationship with the DBTMA protocol.

    3.2 Throughput and delay analysis of DBTMA

    For an active node,the probability of packet transmission (RTS) over a node in a dedicated time slot is a.The probability of collision of the packet transmission with other packets is p.When the probability of packets,a and p interacts with one another.If the value of a is larger,then the probability of collision,p is increased and if the value of p is larger,then the nodes increases the durations that makes the value of a to reduce further.In steady state,assume a and p of a tag node is constant.Consider the network to be homogeneous,i.e.,the total number of neighboring nodes for each individual node is a constant one.Then assume a and p possess same value for all individual nodes.Hence,to understand the performance of the network,the value of a and p are found to be in steady state.

    4 Proposed method

    The throughput of a channel over a single transmission area with total number of nodes using DBTMA is considered as an analytical model with following assumptions:

    · The transmission time of DATA packet,the transmission time of RTS/CTS control packet and time of propagation:δ,γ and τ.

    · Consider,N similar nodes located over a single transmission area.Each node generates DATA packets with Poisson arrival distribution.

    · The complete traffic load with arrivals,λover each unit time,δ.Henceforth,the DATA packets arrival rate of each individual node is denoted asλ=/N.

    · The arrival of each individual node while processing a packet or blocked by the node is discarded.

    To calculate the throughput of a channel,a busy period signaling over a channel with transmissions within a period is considered in between two successive periods.However,a busy period signal may also possess successful transmission of DATA or collisions of packets.

    4.1 Packet transmission probability

    Consider a node that transmits a RTS packet form transmitter to the intended receiver.The receiver waits over a longer time long to acquire CTS packet.Hence,each request blocks the node that accepts the newer arrivals for the timet=2y+τ seconds.The probability of idle node is represented as:

    Pi=(λ+1)/(λ-1+t)

    Since,entire nodes are located within same area,RTS is successful and BTs is setup,then transmission of DATA packets is treated to be collision resistant.The probability of successful RTS packet at the time is similar to the probability of sending only the RTS packets for transmission,provided that there exists a single channel for transmission:

    Ps=-λNt/1-(λt+1)N

    A busy period defines the channel transmission that can be either unsuccessful or successful and calculated as:

    B=Ts Ps+Tf(1-Ps)

    Tsrepresents the expected time period of successful transmission andTfrepresents the expected time period of unsuccessful transmission.

    4.2 Collision probability

    A successful transmission period possesses transmission time of RTS packet,CTS packet and DATA packet,which monitored by τ.The successful cycle length is thus given as:

    Tc=δ+2γ+3τ Unsuccessful transmission periods possess multiple collided RTS packets.Since,the collision probability of RTS packets >2 is smaller than RTS packets =2,the packets >2 is neglected.The RTS packet transmission is similar to pure ALOHA transmission protocol.Since the assumption of Poisson arrival distributions (like memoryless and exponentially distributed inter arrival times),informs starting time of RTS packet collision to be distributed uniformly throughout the first RTS packet duration.Hence,the collision(average) duration is:

    The average utilization period (U) and idle period (I) over uniform time interval is expressed as:

    U=δ .PsandI=λ-1

    4.3 Throughput analysis

    The analysis of throughput is defined in terms of average duration between the effective packet transmission and unsuccessful packet reception or packet collisions.The DBTMA protocol in IEEE 802.11 communication is possess RTS/CTS dialogue mechanism.The Fig.3 shows the timing duration of successful transmission of packet,a packet collided in transmission of RTS packet and packet collided in transmission during CTS period.

    Figure3:Packet transmission in the presence of hidden-terminals

    The ACK,RTS and CTS denotes the timing duration of acknowledgement packets,ready to send packets and clear to send packets.The inter-frame timing,SISandDISdenotes specifically the short and distributed inter-frame space,respectively.TheTsdenotes the average time wasted by the channel,which senses the channel to be busy after the successful packet transmissions.TheTxdenotes the time wasted due to collision of packets during the transmission of RTS packets.TheThdenotes the time wasted by packets collision due to the availability of hidden terminals.Hence,

    E[T] = RTS + SIS + δ + CTS + SIS + δ + H + E[P] + SIS + δ+ ACK + DIS + δ

    where,

    δ-Propagation delay.

    H-Timing duration of PHY and DBTMA packet header

    P-Timing duration of payload packet.

    Tx=RTS+DIS+δ (3.10)

    Th=RTS+SIS+δ+CTS+DIS+δ (3.11)

    For simplicity,the value ofThis considered as the worst case criteria,where the hidden node of the network collides with CTS transmission packet.The periodvis given by:

    v=T+RTS+SIS+δ

    The complete solution is obtained by considering a criteria situation where RTS/CTS dialogue mechanism is casted-off.Such situation is shown in Fig.4.

    Figure4:Packet transmission and collision

    E[T]=SIS+δ+DIS+δ+H+E[P]+ACK

    E[Tx]=DIS+δ+H+E[P]

    E[Th]=DIS+δ+H+E[P]

    Hence,the periodvis expressed as:

    v=SIS+δ+H+E[P]+T

    Finally,THrepresents a per hop link node throughput that is considered as the percentage of transmitting time of a node (tagged),

    TH=ts/(ti+ts+to+tc)

    where,

    ts-time spent after a successful transmission by node (tagged),

    ti-time when channel being sensed as idle around the node (tagged),

    to-time of channel being used by other nodes,

    tc-time of node (tagged) facing collisions.

    ts=a· E[T] ·pn(1-p).

    ti=(1-pn) +Pi(1-a)-Pi(1-pn)(1-a)

    to=pn((1-Pi) (1- p)(1-a) · E[T]+(1-Pi)(1-a)(px· E[Tx]+ph· E[Th]-px ph· E[Th]))

    tc=a·pn(ph· E[Th]+px· E[Tx]-px ph· E[Th])

    Here,

    pn-probability of finding nodes of tagged node inside the transmission range withA=πλR2

    Pi-is the probabilitytchannel being sensed as idle around the node (tagged),

    pn=1-(1+A)e-A

    Pi=e-aA-(1+A-aA)e-A/(1-a) ·pn

    Finally,throughput of a single hop is defined as:

    TH_hop=(TH×E[P])/E[T]

    4.4 Delay analysis

    The delay analysis in MANETs requires the probability of successfully transmitted node that has achieved after multiple unsuccessful attempts say ‘n’.The probability of which is given as:ps(n)=pn(1-p)

    The average value of unsuccessful attempts is:

    Figure5:Rounds of transmission attempts

    where m-limit of retransmission.

    For a node (tagged),the time interval between the transmissions is divided into failed and successful rounds (Fig.3).When the node fails,the channel spends time in idle state,successful transmissions and in collision.Hence,the total duration of failure round of tagged node is defined as:

    E[f]=(ti+tc+to)/a (1-a (1-p))

    The numerator operator defines the unsuccessful transmission time and denominator defines the probability of unsuccessful attempts.However,channel with successful attempts in idle states,successful attempts of other nodes and collision with other nodes and leads to channel with successful attempts.Hence,the successful duration of tagged node is:

    E[s]=(ti+tc+to)/a (1- ap))

    The numerator operator defines the successful transmissions without collision and denominator defines the probability of successful attempts without collision.The node(tagged) gets repeating itself over average of na rounds and then it delivers the packet.The packet waiting time (average) before successful transmissions is:

    w=E[f] na

    Finally,the packet delay (average) before each successful delivery is expressed as:

    d=E[s]+w

    4.5 Collision detection

    In MANETs,a node is unable to transmit and receive packets concurrently,since the signal strength of the node is weaker than another nodes’ signal.The receiver detects collisions through Cyclic Redundancy Check (CRC) and that fails due to noise in channel,hidden nodes and same back-off intervals.Since,failures with different causes possess varied solutions and the receiver node recognizes the failure reason through CRC.Conversely,the receiver fails in differentiating various failure types in MANETs.The access points reject the available packet and stops transmitting the ACK signal.

    The detection accuracy over hidden collision is increased using following solution:Consider an access point that exploits a preamble in packet at its physical layer.The Pseudo-Random Noise (PRN) is made associated with the preamble in MANET communications that possess fixed pulse sequence.This pulse sequence is a deterministic periodic signal with an optimal solution,where the statistical properties look similar to Gaussian White Noise.The preamble does not dependent of other signals due the fact that it follows PRN properties.The preamble is detected in any situations i.e.,during signal overlaps.Each time a signal is received at receiver,preamble correlation is done in order to whether the signal is correlated with the packet.When the preamble correlation exceeds the threshold time,then the detection of packet by receiver signals sets the value of the flag to 1.Thus,the access points identify the collisions in hidden nodes collisions,when a preamble is detected during the reception of a packet.

    Here in this faster retransmission strategy,the access points decode the frame i.e.,collided regardless of the hidden collisions.If the second frame arrives once the MAC header of first frame is received successfully,then the access point obtains the information on MAC,frame type and first frame duration.The proposed faster retransmission scheme exploits information for providing a fast retransmission strategy to the nodes that are getting collided.

    5 Performance evaluation

    Simulations are performed using Network Simulator-version 2.3 (NS-2.3) that uses parameters like route discovery delay and time,packet loss ratio,throughput and other related metrics etc.,between the EDCA,DBTMA,RDBTMA and EDBTMA.Simulation results are given using NS-2.3 by comparing the parameters like delay,packet loss ratio,throughput,etc.between the DBTMA,RDBTMA and EDBTMA.Each simulation results signifies an average value over 50 random runs.The considered data rate of channel is 1 Mbps and nodes of 1000*1000 is used to simulate all the four protocols at MAC layer.

    This section provides a clear comparison of various parameters related to the performance evaluation of proposed DBTMA protocols in MANETs.The quality of service (QoS) parameter guarantees the successful delivery of network traffic in MANETs.The requirements QoS classically refers to standard metrics that includes packet loss,packet delivery ratio,network throughput,route discovery delay,jitter,packet dropping ratio and so on.The dynamic change in network topology,bandwidth limited constraints,bandwidth quality and link variation pose additional constraints in MANETs to achieve the QoS required for the specific system.

    The proposed method takes into account,the most important criteria that decides the QoS of MANETs i.e.,control overhead.The presence of control message increases the consumption of bandwidth resource.Since,bandwidth is a premium resource for a network,the careful design should be made to maintain the control messages at minimum level.However,the use of control messages increases twice the consumption of bandwidth during transmission than reception.Hence,the reduction of control overhead will impact on energy consumption in the network.

    The present study involves the comparison of various parameters associated with routing protocols of MANET.The standard metrics for comparison includes:total number of nodes,number of packets sent,number of packets received,packet delivery ratio,control overhead,normalized routing overhead,route discovery delay,network throughput,jitter,number of packets dropped dropping ratio,total energy consumption,average energy consumption,overall residual energy and average residual energy.The standard metrics are thus considered for QoS measurement in MANETs.

    Minimal Control Overhead Control messaging consumes bandwidth,processing resources,and battery power to both transmit and receive a message.Because bandwidth is at a premium,routing protocols should not send more than the minimum number of control messages they need for operation,and should be designed so that this number is relatively small.While transmitting is roughly twice as power consuming as receiving,both operations are still power consumers for the mobile devices.Hence,reducing control messaging also helps to conserve battery power.

    Quality of Service.A quality of service (QoS) guarantee is essential for successful delivery of multimedia network traffic.QoS requirements typically refer to a wide set of metrics including throughput,packet loss,delay,jitter,error rate,and so on.Wireless and mobile ad hoc specific network characteristics and constraints described above,such as dynamically changing network topologies,limited link bandwidth and quality,variation in link and node capabilities,pose extra difficulty in achieving the required QoS guarantee in a mobile ad hoc network.

    Table1:Results of various metrics

    Figure6:Packet delivery ratio

    Figure7:Route discovery delay

    Figure8:Throughput

    Figure9:Aggregated bandwidth

    6 Discussions

    The comparison of standard QoS metrics is taken into consideration for evaluating the Enhanced DBTMA with CACP protocol.Total number of nodes is varied for evaluating the performance to prove dynamic nature of the protocol.The nodes are varied from 100,125,150,175 and 200 for different evaluations,where the total packets sent on each 100,125,150 and 200 are 1602,and for 175 it is 3202.The total packets received for 100 nodes is 1596,for 125 it is 1557,150 received 1594 packets,175 with 3199 and finally 200 nodes in the network received 1513 packets.The transmission took place between two nodes in a network of nodes.The corresponding packet delivery ratio ranges from 94% to 99%,which is quite higher than RDBTMA protocol and the packet dropping ratio varies from 0.09% to 5.6%,which is lesser than RDBTMA.

    This proves the effectiveness of the proposed protocol with lesser dropping of packets than RDBTMA in MANETs.However,the control overhead of the network seems decremented drastically,due to reduced control packets using CACP procedure.The routing overheads varying in range from 0.4 to 8%,which is lesser than RDBTMA.Additionally,it could be proved that the system could perform with lesser delay i.e.,for 100 nodes,the route discovery delay is 0.071385 and so on.The total energy and overall residual consumption of the mobile nodes is reduced due to CACP and reduced control overhead.The throughput of the EDBTMA protocol seems promising with higher throughput rate than RDBTMA.The entire data on routing performance of Enhanced DBTMA is shown in Tab.1.

    The performance of the proposed schemes includes three concerns to be addressed:1.Network throughput,2.Bandwidth allocation,3.Collision avoidance.Addressing these concerns using proposed protocols improves the metrics associated with it e.g.,route discovery time,route discovery delay and faster transmission.The concerns are addressed through the modified DBTMA scheme resulted in following results:

    · The Delay in DBTMA is inversely proportional to the scalability of route discovery.Here the scalability of the network increases by 1.46% using Retransmission DBTMA and 2.80% using Enhanced DBTMA.

    · Secondly the throughput of proposed to Retransmission DBTMA increases to 1.60%than DBTMA and Enhanced DBTMA increases to 3.05% than DBTMA.

    · When collision occurs in DBTMA,the fast retransmission strategy is used for improving the network performance using RDBTMA

    ·The interfacing DBTMA with Contention aware admission control (CACP) strategy effects in admission control that improves the bandwidth efficiency using EDBTMA.

    ·The impact of modified DBTMA MAC routing protocol over AODV protocol increases the network responsiveness in terms of collision avoidance,faster transmission,higher throughput and reduced delay.

    7 Conclusions

    In this paper,an Enhanced Dual Busy-tone Multiple Access (EDBTMA) protocol for 802.11 communications in MANETs is proposed.The proposed EDBTMA protocol avoids or reduces the impacts due to hidden terminal and exposed terminal problems using busy tone out band signals.Contention aware Admission Control Protocol performs the admission control inside and outside the transmission range of the nodes.The CACP possess local resource information and admission of new flows of the neighboring nodes.This enhances the broadcast and multicast reliability transmission and provides a better control function for admission control.The EDBTMA with CACP improves well the QoS of MANETs by providing better bandwidth allocation with network delay and jitter.

    1024手机看黄色片| 中文字幕精品亚洲无线码一区| 亚洲精品色激情综合| 日日摸夜夜添夜夜添av毛片| 桃色一区二区三区在线观看| 性插视频无遮挡在线免费观看| 亚洲一级一片aⅴ在线观看| av国产免费在线观看| 插逼视频在线观看| 成年版毛片免费区| 波多野结衣巨乳人妻| 国产单亲对白刺激| 国产精品美女特级片免费视频播放器| 日韩av在线大香蕉| 少妇裸体淫交视频免费看高清| 国产亚洲91精品色在线| 看片在线看免费视频| 卡戴珊不雅视频在线播放| 免费高清视频大片| 日韩欧美一区二区三区在线观看| 少妇丰满av| 亚洲精品日韩在线中文字幕 | 亚洲av成人精品一区久久| 中文字幕免费在线视频6| 如何舔出高潮| 午夜激情福利司机影院| 久久九九热精品免费| 搡老妇女老女人老熟妇| 国产精品人妻久久久影院| 久久精品国产自在天天线| 国内精品美女久久久久久| 特大巨黑吊av在线直播| 一区二区三区四区激情视频 | 亚洲精品日韩av片在线观看| 日韩精品青青久久久久久| 我的老师免费观看完整版| 变态另类成人亚洲欧美熟女| 三级经典国产精品| 成年版毛片免费区| 99热精品在线国产| 真实男女啪啪啪动态图| 欧美中文日本在线观看视频| 最后的刺客免费高清国语| 床上黄色一级片| www.色视频.com| 亚洲av中文av极速乱| 色综合色国产| 久久久欧美国产精品| av在线老鸭窝| 免费黄网站久久成人精品| 午夜爱爱视频在线播放| 99久久精品国产国产毛片| 久久6这里有精品| 露出奶头的视频| 国内揄拍国产精品人妻在线| 亚洲真实伦在线观看| 亚洲电影在线观看av| .国产精品久久| 国产伦在线观看视频一区| 国产精品电影一区二区三区| 欧美最黄视频在线播放免费| 亚洲第一电影网av| 色av中文字幕| 久久精品国产99精品国产亚洲性色| 男人和女人高潮做爰伦理| 免费人成视频x8x8入口观看| 亚洲婷婷狠狠爱综合网| 两个人视频免费观看高清| 97碰自拍视频| 中文字幕免费在线视频6| 亚洲图色成人| 久久久a久久爽久久v久久| 在线免费观看不下载黄p国产| 国产人妻一区二区三区在| a级毛色黄片| 一区二区三区免费毛片| 黄色视频,在线免费观看| 寂寞人妻少妇视频99o| 不卡一级毛片| av福利片在线观看| 高清午夜精品一区二区三区 | 看黄色毛片网站| 老女人水多毛片| 久久精品国产99精品国产亚洲性色| 啦啦啦啦在线视频资源| 最新在线观看一区二区三区| 久久99热6这里只有精品| 如何舔出高潮| 免费人成在线观看视频色| 国产在线男女| 一级毛片aaaaaa免费看小| 赤兔流量卡办理| 国产精品一区二区三区四区免费观看 | 中文字幕av成人在线电影| av在线蜜桃| 国产精品久久久久久亚洲av鲁大| 精品福利观看| 精品久久久久久久久久免费视频| 成人鲁丝片一二三区免费| 亚洲一区高清亚洲精品| 简卡轻食公司| 一级黄片播放器| 99久国产av精品| 内地一区二区视频在线| 亚洲丝袜综合中文字幕| 午夜日韩欧美国产| 久久久久国产精品人妻aⅴ院| 身体一侧抽搐| 女同久久另类99精品国产91| 免费av观看视频| 欧美极品一区二区三区四区| 丝袜美腿在线中文| 69人妻影院| 欧美xxxx黑人xx丫x性爽| 一本久久中文字幕| 亚洲欧美日韩高清专用| 最近2019中文字幕mv第一页| 能在线免费观看的黄片| 欧美xxxx性猛交bbbb| 国内精品宾馆在线| 一区二区三区免费毛片| 可以在线观看的亚洲视频| 国产真实乱freesex| 天天躁日日操中文字幕| 国产精品一及| or卡值多少钱| 亚洲七黄色美女视频| 日韩高清综合在线| 国产精华一区二区三区| 久久九九热精品免费| 成年免费大片在线观看| 国产日本99.免费观看| 91精品国产九色| 精品久久久久久成人av| 国产在视频线在精品| 精品久久久噜噜| 日韩一区二区视频免费看| 人人妻人人看人人澡| 国产精品亚洲美女久久久| 精品国内亚洲2022精品成人| 99久久成人亚洲精品观看| 日韩一区二区视频免费看| 搞女人的毛片| 色综合色国产| 国产极品精品免费视频能看的| 麻豆久久精品国产亚洲av| 精品人妻偷拍中文字幕| www日本黄色视频网| 深夜a级毛片| 91麻豆精品激情在线观看国产| 免费在线观看影片大全网站| 91av网一区二区| 99热只有精品国产| 九九热线精品视视频播放| 99热网站在线观看| 99热精品在线国产| 国产女主播在线喷水免费视频网站 | 变态另类成人亚洲欧美熟女| 亚洲人成网站在线播放欧美日韩| 国产精品一区二区性色av| 国产av在哪里看| www.色视频.com| 欧美一区二区亚洲| 观看美女的网站| 性色avwww在线观看| 成人鲁丝片一二三区免费| 99热这里只有是精品50| 亚洲中文日韩欧美视频| 女同久久另类99精品国产91| 久久欧美精品欧美久久欧美| 日韩欧美一区二区三区在线观看| 亚洲性夜色夜夜综合| 在线观看美女被高潮喷水网站| 99riav亚洲国产免费| 一级黄片播放器| 蜜桃久久精品国产亚洲av| 联通29元200g的流量卡| 国产高清不卡午夜福利| 天天躁夜夜躁狠狠久久av| 草草在线视频免费看| 久久精品国产清高在天天线| 国产黄a三级三级三级人| 男女之事视频高清在线观看| 亚洲高清免费不卡视频| 少妇熟女欧美另类| 精品久久久久久久久久久久久| 久久久欧美国产精品| 在线观看免费视频日本深夜| 午夜福利高清视频| 欧美bdsm另类| 亚洲熟妇中文字幕五十中出| 免费搜索国产男女视频| 桃色一区二区三区在线观看| 久久精品国产亚洲av天美| 亚洲国产日韩欧美精品在线观看| 中文资源天堂在线| 国产精品国产高清国产av| 一区二区三区高清视频在线| 波多野结衣高清无吗| 亚洲美女黄片视频| 一a级毛片在线观看| 精品久久国产蜜桃| videossex国产| 成熟少妇高潮喷水视频| 成人美女网站在线观看视频| 午夜视频国产福利| 久久欧美精品欧美久久欧美| av免费在线看不卡| 中文字幕熟女人妻在线| 最后的刺客免费高清国语| 女人被狂操c到高潮| 精品一区二区三区av网在线观看| 大香蕉久久网| 亚洲自拍偷在线| 最近视频中文字幕2019在线8| 国产成人影院久久av| 色av中文字幕| 日韩成人伦理影院| 亚洲中文字幕一区二区三区有码在线看| 久久久成人免费电影| 嫩草影院精品99| 中文字幕精品亚洲无线码一区| 一级毛片aaaaaa免费看小| 成年女人看的毛片在线观看| 欧美日本亚洲视频在线播放| 久久久精品欧美日韩精品| 99国产精品一区二区蜜桃av| 极品教师在线视频| 亚洲中文日韩欧美视频| 成人毛片a级毛片在线播放| 一a级毛片在线观看| 精品免费久久久久久久清纯| 老司机影院成人| 午夜久久久久精精品| 少妇高潮的动态图| 欧美+亚洲+日韩+国产| 精品午夜福利在线看| 老司机影院成人| 丝袜喷水一区| 老熟妇乱子伦视频在线观看| 91av网一区二区| 丰满乱子伦码专区| 日韩亚洲欧美综合| 亚洲天堂国产精品一区在线| 亚洲精品一卡2卡三卡4卡5卡| 婷婷精品国产亚洲av在线| 成年女人永久免费观看视频| 日韩亚洲欧美综合| 午夜久久久久精精品| 欧美最新免费一区二区三区| av国产免费在线观看| 91在线精品国自产拍蜜月| 久久草成人影院| 大香蕉久久网| 五月伊人婷婷丁香| 日本免费a在线| a级毛色黄片| 麻豆一二三区av精品| 1000部很黄的大片| 久久久久久久久久黄片| 性色avwww在线观看| 在线播放国产精品三级| 看免费成人av毛片| 国产精品福利在线免费观看| 中文字幕熟女人妻在线| 精品无人区乱码1区二区| 久久久精品大字幕| 熟女电影av网| 精品一区二区免费观看| 校园人妻丝袜中文字幕| 三级毛片av免费| 午夜视频国产福利| 97碰自拍视频| 听说在线观看完整版免费高清| 国内精品宾馆在线| 亚洲在线观看片| 不卡一级毛片| 国产成年人精品一区二区| 99riav亚洲国产免费| 亚洲人成网站高清观看| 国产视频一区二区在线看| 99久久精品热视频| 97热精品久久久久久| 老女人水多毛片| 人妻夜夜爽99麻豆av| 国产国拍精品亚洲av在线观看| 国产成人影院久久av| 亚洲天堂国产精品一区在线| 三级经典国产精品| 五月伊人婷婷丁香| 亚洲欧美日韩卡通动漫| 三级毛片av免费| 久久久欧美国产精品| 人人妻人人澡欧美一区二区| 国产精品精品国产色婷婷| 久久人人爽人人片av| 免费人成在线观看视频色| 老熟妇仑乱视频hdxx| a级毛片免费高清观看在线播放| 简卡轻食公司| 精品久久久噜噜| 国产高清视频在线播放一区| 国产欧美日韩精品亚洲av| 好男人在线观看高清免费视频| 国产综合懂色| 网址你懂的国产日韩在线| 免费av毛片视频| 亚洲va在线va天堂va国产| 级片在线观看| 亚洲国产高清在线一区二区三| 久久精品久久久久久噜噜老黄 | 亚洲精品456在线播放app| 又黄又爽又免费观看的视频| 男人舔女人下体高潮全视频| 国产精品久久视频播放| 中文字幕免费在线视频6| 搡老熟女国产l中国老女人| www日本黄色视频网| 久久久久性生活片| 国产欧美日韩精品一区二区| 欧美又色又爽又黄视频| 色综合站精品国产| 久久精品国产亚洲网站| 国产精品不卡视频一区二区| 日韩一本色道免费dvd| 长腿黑丝高跟| 亚洲国产精品成人久久小说 | 真实男女啪啪啪动态图| 国产极品精品免费视频能看的| 国产国拍精品亚洲av在线观看| 午夜激情欧美在线| 亚洲国产日韩欧美精品在线观看| 少妇丰满av| 免费人成视频x8x8入口观看| 九九爱精品视频在线观看| 小说图片视频综合网站| 国产av不卡久久| 可以在线观看的亚洲视频| 伊人久久精品亚洲午夜| 亚洲欧美成人综合另类久久久 | 精品熟女少妇av免费看| 亚州av有码| 日本撒尿小便嘘嘘汇集6| 看片在线看免费视频| 亚洲国产精品sss在线观看| 日韩成人av中文字幕在线观看 | 草草在线视频免费看| 亚洲av免费高清在线观看| 国产激情偷乱视频一区二区| 又粗又爽又猛毛片免费看| 免费大片18禁| 老司机福利观看| 白带黄色成豆腐渣| 久久精品夜夜夜夜夜久久蜜豆| 国产亚洲av嫩草精品影院| 亚洲在线观看片| 2021天堂中文幕一二区在线观| а√天堂www在线а√下载| 国产精品永久免费网站| 欧美区成人在线视频| 国产欧美日韩精品亚洲av| 在线看三级毛片| 伊人久久精品亚洲午夜| 高清日韩中文字幕在线| 最近2019中文字幕mv第一页| 熟妇人妻久久中文字幕3abv| www日本黄色视频网| 精品久久久久久久末码| 淫妇啪啪啪对白视频| 国产高清视频在线播放一区| 男女之事视频高清在线观看| 最近最新中文字幕大全电影3| 12—13女人毛片做爰片一| 校园人妻丝袜中文字幕| 日本一本二区三区精品| av.在线天堂| 丰满乱子伦码专区| 热99re8久久精品国产| 亚洲成av人片在线播放无| 国产真实伦视频高清在线观看| 露出奶头的视频| 国产精品伦人一区二区| 欧美区成人在线视频| 亚洲综合色惰| 美女 人体艺术 gogo| 一个人看视频在线观看www免费| 高清日韩中文字幕在线| 国产中年淑女户外野战色| 亚洲经典国产精华液单| 波多野结衣高清作品| 午夜激情福利司机影院| 国产精品99久久久久久久久| 99久久精品热视频| 美女 人体艺术 gogo| 久久久久国产网址| АⅤ资源中文在线天堂| 老司机午夜福利在线观看视频| 波野结衣二区三区在线| 女生性感内裤真人,穿戴方法视频| 午夜福利成人在线免费观看| 黄色一级大片看看| 亚洲熟妇中文字幕五十中出| 又爽又黄无遮挡网站| 老司机午夜福利在线观看视频| 亚洲三级黄色毛片| 亚洲精品日韩在线中文字幕 | 深夜精品福利| 免费看日本二区| 日韩欧美 国产精品| 校园人妻丝袜中文字幕| 黄色欧美视频在线观看| 色噜噜av男人的天堂激情| 亚洲国产精品成人久久小说 | 女同久久另类99精品国产91| 综合色av麻豆| 日本三级黄在线观看| 日韩av不卡免费在线播放| 在线观看午夜福利视频| 国产在线男女| 国产成人91sexporn| 欧美丝袜亚洲另类| 亚洲av五月六月丁香网| 少妇的逼好多水| 国产精品久久久久久久久免| 九九在线视频观看精品| 亚洲国产欧美人成| 九九爱精品视频在线观看| 成人av一区二区三区在线看| 嫩草影院新地址| 人妻丰满熟妇av一区二区三区| 欧美bdsm另类| 亚洲人与动物交配视频| 一个人看的www免费观看视频| 日韩强制内射视频| 国产 一区 欧美 日韩| 自拍偷自拍亚洲精品老妇| 99国产精品一区二区蜜桃av| 日本一本二区三区精品| 精华霜和精华液先用哪个| 国产淫片久久久久久久久| 成年版毛片免费区| 噜噜噜噜噜久久久久久91| 午夜福利成人在线免费观看| 大型黄色视频在线免费观看| 美女内射精品一级片tv| 午夜免费男女啪啪视频观看 | 亚洲成a人片在线一区二区| 伦理电影大哥的女人| 亚洲精品色激情综合| 久久久国产成人精品二区| 九九在线视频观看精品| 欧美性感艳星| 亚洲欧美日韩高清在线视频| 国产精品伦人一区二区| 国产精品一区二区性色av| 男女视频在线观看网站免费| 日本一本二区三区精品| www日本黄色视频网| 人妻少妇偷人精品九色| 亚洲国产精品合色在线| 舔av片在线| 国产综合懂色| 97人妻精品一区二区三区麻豆| 99在线视频只有这里精品首页| 国产综合懂色| 亚洲四区av| 国产大屁股一区二区在线视频| 人妻制服诱惑在线中文字幕| 少妇被粗大猛烈的视频| 一区二区三区四区激情视频 | 欧美日韩乱码在线| 国产精品美女特级片免费视频播放器| 成人综合一区亚洲| 12—13女人毛片做爰片一| 国产欧美日韩精品亚洲av| 最近2019中文字幕mv第一页| 日日摸夜夜添夜夜添小说| 国产乱人视频| 久久精品综合一区二区三区| 欧美色视频一区免费| 中文字幕久久专区| 在线观看av片永久免费下载| 99在线人妻在线中文字幕| 1024手机看黄色片| 亚洲av五月六月丁香网| 中国国产av一级| 亚洲天堂国产精品一区在线| 无遮挡黄片免费观看| 日韩 亚洲 欧美在线| 人妻制服诱惑在线中文字幕| 亚洲无线在线观看| 精品一区二区三区av网在线观看| av国产免费在线观看| 一级毛片我不卡| 婷婷亚洲欧美| 久久精品综合一区二区三区| 中文在线观看免费www的网站| 91av网一区二区| 一级黄片播放器| 午夜福利高清视频| 日本一二三区视频观看| 精品福利观看| 女人十人毛片免费观看3o分钟| 亚洲中文日韩欧美视频| 免费av毛片视频| 亚洲图色成人| 国产 一区精品| 最新在线观看一区二区三区| 成人亚洲欧美一区二区av| 亚洲七黄色美女视频| 国产成人一区二区在线| 久久久久久国产a免费观看| 午夜精品一区二区三区免费看| 国内揄拍国产精品人妻在线| 国产精品一二三区在线看| 久久热精品热| 久久韩国三级中文字幕| 久久精品国产亚洲av涩爱 | 亚洲av美国av| 亚洲人成网站在线播| 久久精品夜夜夜夜夜久久蜜豆| 欧美成人免费av一区二区三区| 午夜福利18| 麻豆成人午夜福利视频| 亚洲人成网站在线播放欧美日韩| 卡戴珊不雅视频在线播放| 中国美白少妇内射xxxbb| 欧美一区二区国产精品久久精品| 久久久精品大字幕| 日韩中字成人| 桃色一区二区三区在线观看| 日本免费一区二区三区高清不卡| 欧美成人a在线观看| 赤兔流量卡办理| 丰满人妻一区二区三区视频av| 午夜福利成人在线免费观看| 人人妻人人澡欧美一区二区| 精品一区二区三区视频在线| 亚洲最大成人中文| 九九热线精品视视频播放| 啦啦啦观看免费观看视频高清| 我的女老师完整版在线观看| 男人狂女人下面高潮的视频| 神马国产精品三级电影在线观看| 三级毛片av免费| 99久久久亚洲精品蜜臀av| 亚洲av熟女| 国产伦在线观看视频一区| 床上黄色一级片| 观看免费一级毛片| av天堂在线播放| 国产精品久久久久久av不卡| 国产又黄又爽又无遮挡在线| 波多野结衣高清无吗| 久久天躁狠狠躁夜夜2o2o| 成人综合一区亚洲| 色在线成人网| 午夜老司机福利剧场| 亚洲三级黄色毛片| 亚洲真实伦在线观看| 亚洲精品影视一区二区三区av| 啦啦啦韩国在线观看视频| 国产真实伦视频高清在线观看| 性色avwww在线观看| 亚洲精华国产精华液的使用体验 | 久久久久久久久久成人| 久久这里只有精品中国| 国产黄色视频一区二区在线观看 | 亚洲精品日韩在线中文字幕 | 日韩精品有码人妻一区| 可以在线观看的亚洲视频| 少妇熟女aⅴ在线视频| 五月玫瑰六月丁香| 国产探花在线观看一区二区| 国产私拍福利视频在线观看| 日本三级黄在线观看| 久久久久久久久大av| 亚洲不卡免费看| 国产精品免费一区二区三区在线| 老女人水多毛片| 哪里可以看免费的av片| av在线老鸭窝| 国产亚洲91精品色在线| 国产欧美日韩精品一区二区| 亚洲一级一片aⅴ在线观看| 亚洲在线观看片| 久久精品久久久久久噜噜老黄 | 久久精品国产清高在天天线| 亚洲久久久久久中文字幕| 国产精品一及| 精品久久久久久久久久免费视频| 变态另类丝袜制服| 国内精品美女久久久久久| 亚洲va在线va天堂va国产| 国内精品美女久久久久久| 成人性生交大片免费视频hd| 又粗又爽又猛毛片免费看| 少妇人妻精品综合一区二区 | 日日摸夜夜添夜夜添av毛片| 男女做爰动态图高潮gif福利片| 简卡轻食公司| 日韩精品青青久久久久久| 久久久久性生活片| 美女免费视频网站| 欧美另类亚洲清纯唯美| 亚洲欧美日韩无卡精品| 女的被弄到高潮叫床怎么办| 最新中文字幕久久久久| 最近最新中文字幕大全电影3| 国产精品人妻久久久影院| 美女被艹到高潮喷水动态| a级毛片a级免费在线| 国产成人一区二区在线| 日本爱情动作片www.在线观看 | 国产不卡一卡二|