• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Contract theory based incentive mechanism design for buffer resource in wireless caching networks ①

    2020-07-12 02:34:16LiuTingting劉婷婷TangLeiZhuHaoBaoYongqiangGuoYajuan
    High Technology Letters 2020年2期

    Liu Tingting(劉婷婷) , Tang Lei, Zhu Hao, Bao Yongqiang, Guo Yajuan

    (*School of Information and Communication Engineering, Nanjing Institute of Technology, Nanjing 211167, P.R.China) (**Institute of Electric Power Science, Jiangsu Electric Power Co. Ltd., Nanjing 210024, P.R.China)

    Abstract

    Key words: contract theory, buffer resource allocation, wireless caching network, incentive mechanism design

    0 Introduction

    Due to the surge of duplicated transmissions in wireless networks, wireless caching technology has been proposed in order to release the transmission redundancy on backhaul channels[1-4]. The advantages of wireless caching technology have been provided as releasing traffic pressures on backhaul channels, reducing the transmission latency and improving the overall network energy efficiency, etc. The recent researches on wireless caching technology can be roughly classified into 2 aspects: content placement[5,6]and content delivery[7,8]. Most of these works have assumed that the popular files can be pre-cached into the edge nodes. However, due to the limited caching capacity, or the inaccurate estimation on user preference profiles, the requested files may not be cached or only be partially cached in the edge nodes. The transmissions of the un-cached files/parts may still induce the duplicated transmissions on backhaul channels or lead to transmission latency.

    In order to further enhance the performance of wireless caching, researchers begin to investigate the joint buffer and cache allocations in wireless caching networks. Cache resource can be considered as a long-term memory to pre-cache the popular files during off-peak time. The pre-cached files can be directly transmitted upon requesting without triggering traffic on backhaul channels. Buffer resource is a kind of short-term memory. It can be used to store the fetched files from the remote servers or from the cache memory. Thus, it can be utilized to enable buffer-aided relay to improve the delivery performance of the un-cached files. Buffer usually has a high input/output (I/O) speed, and therefore, it is allocated with an expensive primary memory. In practice, due to the limited battery capacity, users usually have their personal use purposes or privacy concerns[9]. It is impossible for the edge node to contribute all its buffer resource. Generally, it will devote a limited buffer capacity to help transmissions. It is known that, due to users’ unbalanced data arrival and service rates, there may be some backlogs inside an edge or a relay node. In this paper, the edge node also acts as a relay node. The term ‘relay node’ is used for the ease of discussions. Backlogs may lead to queueing delay, and backlog overflow which is induced by the limited buffer capacity, and even induce re-transmissions over backhaul channels. How to allocate the limited buffer capacity to maximize relay node’s utility has become a critical issue in realizing the buffer-aided relay in wireless caching networks. At the same time, users are willing to utilize the buffer-aided relay scheme to enhance its transmission performance. How to design a proper incentive scheme to incentivize users in participating buffer-aided relay communications has also become an important issue. In order to solve the above 2 issues, 2 problems need to be figured out.

    First, the relationship among the arrival rate, the service rate, the backlogs, and the buffer capacity should be determined. In this way, the buffer capacity on relay node’s side can be linked to each user’s backlogs which are determined by this user’s arrival and service rates. The effective bandwidth theory is a useful framework to analyze the backlog performance of broad classes of arrivals[10,11]. However, it may lead to loose estimation for non-Poisson processes, and it is not realistic to assume user’s arrival or service data follow Poisson processes. At the same time, the martingale theory is proposed as an alternative in analyzing the backlogs, which is flexible and suitable for any kind of arrival and service processes[12]. A lot of works have demonstrated that the martingale theory can provide a tight bound compared with the real data trace. Moreover, the derived bound can be used as an objective function or as a constraint to further optimize the network performance[13-16]. Thus, in this work, the martingale theory will be used to determine the relationship among the arrival rate, the service rate, the backlogs, and the buffer capacity.

    Second, in the concerned wireless caching networks, user’s specific parameters cannot be fully observed by the relay node. Information asymmetry exists in this scenario. The relay node only knows the set of user’s parameters, but it cannot observe the specific value of each user. Contract theory is known as a powerful tool in solving this kind of information asymmetry problem[17]. Most of the existing works on contract theory can be classified into 2 categories: one is adverse selection[18-21], and the other one is moral hazard[22,23]. The existing works have highlighted that solving the problem of asymmetric information in resource allocation is the major advantage of contract theory.

    In this work, an incentive mechanism for buffer resource based on the contract theory in the wireless caching networks is designed. The proposed scheme can provide proper economic incentives to users. The main contributions of this paper are summarized as follows.

    (1) A commercial wireless caching network is constructed, where user’s backlog violation probability is derived based on the martingale theory. Then, the utility functions of the relay node and the users are formulated.

    (2) Contract theory is proposed to design the buffer resource allocation scheme between the relay node and the users. The users are classified into different types according to their distances from the relay node. Correspondingly, the relay node divides its devoted buffer resource into different portions, defined as quality. The optimal contract problem is then constructed in maximizing the utility of the relay node.

    (3) Next, the conditions of a feasible contract are developed, and they are considered as constraints in the constructed optimization problem. In order to obtain the optimal contract, the constraints need to be reduced by several steps, which are also elaborated.

    (4) Numerical results are provided to demonstrate effectiveness of the proposed contract theory scheme. Also, it can be found that in terms of maximizing the relay node’s utility, the proposed scheme is superior to the equally allocated scheme.

    The remainders of this paper are organized as follows. The system model and the backlog violation probability derived from the martingale theory, as well as the utility functions of the relay node and users are presented in Section 1. The detailed incentive mechanism design steps based on the contract theory are elaborated in Section 2. Numerical results are presented in Section 3, and finally conclusions are drawn in Section 4.

    1 System model

    In a wireless caching network, instead of direct transmitting files from the base station (BS) to the users, as shown in Fig.1, a nearby node will be employed as a relay to enhance the delivery performance.

    1.1 User’s data arrival model

    A userUirequires a file. Data are transmitted using the buffer-aided relay scheme. Assuming that the bursty file amountai(k) for userUiarriving at the relay node at timekfollows a Markov-modulated on off (MMOO) process which has 2 static status [Π0, Π1]. On state Π0, there is no data arriving, i.e.,a(k)=0, while on state Π1,ai(k)=Rbits/s, andR>0. The corresponding state transition matrixTrais defined as

    Fig.1 System model of a wireless caching network and the details inside a relay node

    (1)

    where,Tαrepresents the transition probability from state Π0to state Π1,Tβrepresents the transition probability from Π1to Π0. Accordingly, the steady state distribution ofai(k) is calculated as

    (2)

    Therefore, the cumulative arrival data over time interval [m,n] is represented as

    (3)

    where the unit of time interval is one second, andAi(m,n) can be regarded as a bivariate arrival process. Ifm=0,Ai(0,n)=Ai(n) is used for brevity.

    1.2 Data service model

    Assuming that the relay node devotes a buffer capacityCBto help the surroundingNusers relay their data. The transmission bandwidth isB. TheNusers equally share the bandwidth. A constant transmission powerPtris utilized for each user. According to Shannon’s channel capacity theorem[24], the service rate, i.e., the transmission rate, from the relay node to the user can be written as

    (4)

    (5)

    Note that when the user’s location is known, the service rate is irrelevant to timek.siis used for brevity.

    Also, the following assumption is provided to make the analysis non-trivial.

    E[ai(k)]

    (6)

    Eq.(6) means that the service rate is larger than the average arrival rate, and it is smaller than the peak arrival rate. In this way, there will be some backlogs inside a relay node’s buffer.

    1.3 Backlog violation probability

    Since there are some backlogs inside a relay node’s buffer, i.e.,

    (7)

    Definition1Backlog violation probability is the probability that a userUi’s allocated bufferαiCBis overflowed, i.e., Pr(Qi≥(αiCB)).

    (8)

    (9)

    The scheduling policy is first in first out (FIFO). Many works have contributed to derive the backlog violation probability. Here, it is provided directly in Theorem 1.

    Theorem1The backlog violation probability is calculated as

    (10)

    ProofPlease refer to Refs[12,14] for the rigorous deduction.

    (11)

    and Eq.(10) can be rewritten as

    (12)

    1.4 Users’ utility

    Assuming that a userUirents anαiportion, it needs to pay πito the relay node. If the data is overflowed, the overflowed data will be re-transmitted through the cellular link, and this will cost the userUiwith some extra money. The utility of the userUiis shown as follows.

    (13)

    (14)

    1.5 Relay node’s utility

    Relay node will make profits by renting out its buffer resource to the surrounding users. The relay node rents out anαiportion to the userUi, and correspondingly the userUiwill pay πito the relay node. Thus, the utility function of the relay node is represented as

    (15)

    2 Incentive mechanism design based on contract theory

    The relay node designs the optimal contracts {αi,πi},i={1,…,N} to maximize its own profits. The optimal contracts also need to comply with the following 2 constraints: individual rationality (IR) and incentive compatibility (IC) for all intended users. The definitions of the IR and IC constraints are as follows.

    Definition3IR constraint: each user is assumed to be rational, and it will not accept a contract entry which produces a negative utility for its type. Therefore, IR constraint is provided as follows.

    (16)

    IR constraint means that the savings must compensate the payment. In the case ofUi<0, the user will not purchase the buffer portion.

    Definition4IC constraint: The incentive compatibility constraint means thatVvcannot gain more utility by accepting a contract entry which is not designed for its type. That is

    In other words, user with typeishould obtain the maximum utility if and only if it chooses the contract {αi, πi} designed for its type.

    The optimal contract problem aims to maximize the relay node’s utility, and also complies with the IR and IC constraints. Thus, the optimal contract problem is formulated as follows.

    (18)

    Contract theory is a kind of economical tool that can provide enough incentives to the users that motivate them choose the intended contract entry. This mechanism is guaranteed by the IR and IC constraints. That is to say, if users are not interested in paying anything, they will gain nothing, and if they do not choose the intended contract entry, they will not obtain the maximum profits.

    2.1 Constraints reduction

    Since in Eq.(18), there areNIR constraints andN×(N-1) IC constraints. It is not tractable to solve an optimization problem with so many constraints. First, the number of constraints should be reduced by the following lemmas.

    2.1.1 IR constraint reduction

    Lemma 1 is provided to reduce the IR constraint.

    (19)

    (20)

    2.1.2 IC constraint reduction

    First, in order to make the analysis consistent with the contract theory. ‘Quality’ is defined in this paper.

    Definition5Since the buffer resource is considered as trading goods, the buffer portionαi,?i, is defined as quality.

    The IC constraints can be reduced by the following lemmas.

    ProofLemma 2 is demonstrated from 2 aspects, i.e., sufficient condition and necessary condition.

    (22)

    and

    (23)

    Observing Eq.(22) and Eq.(23), then

    (24)

    Substituting Eq.(20) into Eq.(24), and after some manipulations, then

    (25)

    Eq.(25) can be rewritten as

    (26)

    (27)

    (28)

    (29)

    (30)

    This completes the proof.

    Moreover, if user’s utility function satisfies the local downward incentive constraint (LDIC) and the local upward incentive constraint (LUIC) simultaneously, the IC constraints will be satisfied. Furthermore, the LUIC can be derived from the LDIC, and vice versa. The IC constraints can be replaced by

    (31)

    By integrating the above lemmas, the original problem will be reduced to the following formulation.

    (32)

    2.2 Optimal solution

    By iterating IR and IC constraints shown in Eq.(32), the summation of πican be written as a general equation, i.e.,

    (33)

    Substituting Eq.(33) into Eq.(32), the problem will be further reduced to the following brief formulation.

    (34)

    where,

    (35)

    It can be seen that eachCiin Eq.(34) is only related toαi. In other words, it is not coupled with otherαi. The first and second derivations ofCiare

    (36)

    and

    (37)

    respectively.

    It is easy to verify that Eq.(36)≥0, and Eq.(37)<0, Eq.(34) is a typical convex optimization problem. The optimal solution can be obtained by the interior point method. The numerical results are provided in the next section.

    3 Numerical results

    In this section, numerical simulation results are presented to demonstrate effectiveness of the proposed scheme. The simulation settings are listed in Table 1. Some simulation parameters are assumed, for example,Tα,Tβ, user numbers,Ri, total bandwidth and buffer resource capacity. Some simulation parameters are commonly used, for example, the noise density and path loss exponent. The specific simulation settings will be elaborated if the simulation scenario is changed.

    Table 1 System parameters

    Fig.2 plots the variation of user’s utility when the user chooses different contract entries. It can be seen that each user will obtain the maximum utility when it chooses the contract entry intended for its type. For instance, user 1 will obtain the maximum utility when it chooses the 1st contract entry. User 2 can achieve the maximum utility in the 2nd contract entry. The 3rd contract entry can make user 3 get the maximum utility. Similarly, contract entry 4th, 5th, and 6th will provide user 4, 5, and 6 with the maximum utility, respectively. The incentive compatibility can be verified from Fig.2 that users cannot gain more utility by accepting a contract entry which is not designed for its type.

    Fig.2 The variation of users’ utility values when the user chooses different contract entry

    Table 2 The set of the parameter

    Fig.3 The optimal contract entry which is a combination of the optimal portion and the optimal price

    Fig.4 compares the utility of the relay node and the users between the contract theory scheme and the equally allocated scheme. The equally allocated scheme evenly divides the buffer capacity. It can be seen from Fig.4 that, the proposed contract theory scheme can achieve a larger utility compared to the benchmark scheme from the perspective of relay node. User’s utility decreases as user’s index increases when contract theory scheme is used. While this kind of trend cannot be observed when the equally allocated scheme is employed. Moreover, the user with index 1 has the maximum utility. This observation is consistent with the intuition that user 1 purchases the maximum portion and pays the most to the relay node, it should gain the most utility. On the other hand, as shown in Fig.4, the proposed scheme is superior to the equally allocated scheme from the perspective of relay node. The relay node who designs the mechanism will choose to use the proposed contract scheme. At the same time, users can obtain the positive utility by using the proposed contract scheme. Therefore, users would also be willing to participate in the proposed scheme.

    Fig.4 Comparison between the contract theory approach and the equally allocated scheme from the perspective of utility

    4 Conclusion

    In this paper, the incentive mechanism incentivizing users in participating buffer-aided relay is investigated in wireless caching networks. Because of the information asymmetric environment, contract theory is utilized to design the incentive mechanism. Specifically, considering the limited buffer capacity, the backlog violation probability, i.e., the buffer overflow probability, is first provided based on the martingale theory. Based on the backlog violation probability, the utilities of relay node and users are formulated. Then, the optimal contract problem is modeled in order to maximize the utility of relay node, while the utilities of users are considered as IR and IC constraints. The feasibility of the contract is also demonstrated. Next, the optimal solution can be obtained by the interior point method. Numerical results are illustrated to demonstrate effectiveness of the proposed scheme. The proposed contract theory scheme has a better utility performance compared to the benchmarks.

    国产高清不卡午夜福利| 岛国在线免费视频观看| 色视频www国产| 99热这里只有是精品50| 日本黄色视频三级网站网址| 国产蜜桃级精品一区二区三区| 精品久久国产蜜桃| 麻豆成人午夜福利视频| 亚洲丝袜综合中文字幕| 99视频精品全部免费 在线| 亚洲乱码一区二区免费版| 欧美精品国产亚洲| 日本一二三区视频观看| 国产亚洲av片在线观看秒播厂 | 女人被狂操c到高潮| 成人综合一区亚洲| 成人特级黄色片久久久久久久| 少妇丰满av| 在线观看美女被高潮喷水网站| 久久久国产成人免费| 乱码一卡2卡4卡精品| www.av在线官网国产| 久久久午夜欧美精品| 在线免费观看的www视频| 欧美成人a在线观看| 亚洲一区高清亚洲精品| 日韩,欧美,国产一区二区三区 | 国产成人精品婷婷| 国产精品嫩草影院av在线观看| 亚洲国产精品久久男人天堂| 国语自产精品视频在线第100页| 91精品国产九色| 91精品一卡2卡3卡4卡| 国内少妇人妻偷人精品xxx网站| 99热只有精品国产| 欧美成人a在线观看| 欧美丝袜亚洲另类| 亚洲欧美成人精品一区二区| 91aial.com中文字幕在线观看| 综合色av麻豆| a级毛色黄片| 欧美变态另类bdsm刘玥| 亚洲自拍偷在线| 色综合站精品国产| 99热这里只有是精品在线观看| 精品99又大又爽又粗少妇毛片| 精品少妇黑人巨大在线播放 | 色吧在线观看| 一本一本综合久久| 免费一级毛片在线播放高清视频| 亚洲av中文av极速乱| 国产一区二区亚洲精品在线观看| 韩国av在线不卡| 波多野结衣巨乳人妻| 国产高潮美女av| 亚洲国产欧洲综合997久久,| 可以在线观看的亚洲视频| 青春草视频在线免费观看| 国产极品精品免费视频能看的| 日韩欧美一区二区三区在线观看| 久久九九热精品免费| 久久人妻av系列| 黄色日韩在线| 久久久久久伊人网av| 亚洲五月天丁香| 成年av动漫网址| 国产毛片a区久久久久| 日本免费一区二区三区高清不卡| 久久久精品欧美日韩精品| 久久精品夜色国产| 赤兔流量卡办理| 大型黄色视频在线免费观看| 18禁在线播放成人免费| 一卡2卡三卡四卡精品乱码亚洲| 欧美不卡视频在线免费观看| 高清日韩中文字幕在线| 日韩亚洲欧美综合| 少妇的逼水好多| 蜜臀久久99精品久久宅男| 久久久精品欧美日韩精品| 国产视频内射| 欧美激情久久久久久爽电影| 成人国产麻豆网| 国产成人a∨麻豆精品| 99久久成人亚洲精品观看| av福利片在线观看| 免费av毛片视频| 一边摸一边抽搐一进一小说| 亚洲美女搞黄在线观看| 少妇的逼水好多| 男人舔奶头视频| 精品久久久久久久久亚洲| 免费看美女性在线毛片视频| 别揉我奶头 嗯啊视频| 国产精品一区二区在线观看99 | 欧美区成人在线视频| 菩萨蛮人人尽说江南好唐韦庄 | 少妇熟女欧美另类| 九草在线视频观看| 久久久久久久久久黄片| 国产麻豆成人av免费视频| 亚洲人成网站在线观看播放| 少妇丰满av| 性插视频无遮挡在线免费观看| 级片在线观看| 22中文网久久字幕| 91在线精品国自产拍蜜月| 高清毛片免费看| 变态另类成人亚洲欧美熟女| 99在线人妻在线中文字幕| 美女 人体艺术 gogo| 亚洲,欧美,日韩| 91av网一区二区| 欧美在线一区亚洲| 欧美最黄视频在线播放免费| 美女大奶头视频| 成人午夜高清在线视频| 观看免费一级毛片| 国产精品久久久久久亚洲av鲁大| 亚洲aⅴ乱码一区二区在线播放| 午夜精品国产一区二区电影 | 69人妻影院| 99热这里只有精品一区| 国产午夜福利久久久久久| 九色成人免费人妻av| 日韩一区二区三区影片| 网址你懂的国产日韩在线| 国产蜜桃级精品一区二区三区| 99久久精品国产国产毛片| 国产探花在线观看一区二区| www日本黄色视频网| 一个人观看的视频www高清免费观看| 亚洲天堂国产精品一区在线| 欧美+亚洲+日韩+国产| 国产精品精品国产色婷婷| 成人二区视频| 亚洲欧美精品自产自拍| 18禁在线播放成人免费| 老师上课跳d突然被开到最大视频| 高清午夜精品一区二区三区 | 欧美激情久久久久久爽电影| av免费在线看不卡| 国产人妻一区二区三区在| 欧美高清成人免费视频www| 久久人人精品亚洲av| 夜夜爽天天搞| 美女被艹到高潮喷水动态| 亚洲欧美精品专区久久| 中国美女看黄片| 成人美女网站在线观看视频| 日本与韩国留学比较| 国产高清有码在线观看视频| 久久久精品大字幕| 黄片wwwwww| 最后的刺客免费高清国语| 国产av麻豆久久久久久久| 国产亚洲5aaaaa淫片| 免费看美女性在线毛片视频| 国产精品麻豆人妻色哟哟久久 | 夜夜看夜夜爽夜夜摸| 久久久久久国产a免费观看| 国产单亲对白刺激| 成年女人看的毛片在线观看| 99视频精品全部免费 在线| 亚洲欧洲日产国产| 国产精品久久久久久久久免| 国产免费一级a男人的天堂| 国产视频首页在线观看| 别揉我奶头 嗯啊视频| 悠悠久久av| 丰满乱子伦码专区| 九九爱精品视频在线观看| 免费观看在线日韩| 搡老妇女老女人老熟妇| 亚洲三级黄色毛片| 久久精品久久久久久噜噜老黄 | 一级毛片aaaaaa免费看小| 日产精品乱码卡一卡2卡三| 在线观看美女被高潮喷水网站| 日本在线视频免费播放| 波多野结衣高清无吗| 99久久无色码亚洲精品果冻| 午夜精品一区二区三区免费看| 此物有八面人人有两片| 一级毛片我不卡| 午夜免费男女啪啪视频观看| 国产精品久久久久久精品电影| 国产黄色视频一区二区在线观看 | 精品国产三级普通话版| 久久久色成人| av在线亚洲专区| 久久久久久伊人网av| 在线免费观看不下载黄p国产| 亚洲欧美日韩东京热| 亚洲自偷自拍三级| 午夜精品国产一区二区电影 | 亚洲精品久久国产高清桃花| 久久久久免费精品人妻一区二区| 免费电影在线观看免费观看| 国产精品伦人一区二区| 悠悠久久av| 日日干狠狠操夜夜爽| 观看免费一级毛片| avwww免费| 欧美色视频一区免费| 国产成人freesex在线| 免费电影在线观看免费观看| 久久久国产成人精品二区| 国产老妇女一区| 久久久久久久午夜电影| 精品久久久久久久久久久久久| 日韩欧美 国产精品| 日韩成人av中文字幕在线观看| 日韩欧美国产在线观看| 亚洲乱码一区二区免费版| 男人的好看免费观看在线视频| 国产精品人妻久久久久久| 成人国产麻豆网| 国产美女午夜福利| 三级男女做爰猛烈吃奶摸视频| 国产一区二区在线av高清观看| 蜜桃亚洲精品一区二区三区| 精品人妻偷拍中文字幕| 给我免费播放毛片高清在线观看| 亚洲性久久影院| 色吧在线观看| 欧洲精品卡2卡3卡4卡5卡区| 国产三级在线视频| 精品一区二区三区视频在线| 美女脱内裤让男人舔精品视频 | av专区在线播放| 26uuu在线亚洲综合色| 麻豆成人午夜福利视频| 国产精品.久久久| АⅤ资源中文在线天堂| 亚洲第一电影网av| 亚洲国产精品sss在线观看| 麻豆国产av国片精品| 老熟妇乱子伦视频在线观看| 成人漫画全彩无遮挡| 国产又黄又爽又无遮挡在线| 少妇被粗大猛烈的视频| 中文字幕精品亚洲无线码一区| .国产精品久久| 国产精品精品国产色婷婷| 久久久久久久亚洲中文字幕| 日韩精品有码人妻一区| 久久精品久久久久久久性| 亚洲电影在线观看av| 青青草视频在线视频观看| 日韩欧美国产在线观看| 久久这里只有精品中国| 老司机福利观看| 午夜福利高清视频| 日韩欧美精品免费久久| www.av在线官网国产| 久久久久久久午夜电影| 久久人妻av系列| eeuss影院久久| 熟女人妻精品中文字幕| 成人特级黄色片久久久久久久| 嫩草影院新地址| 大又大粗又爽又黄少妇毛片口| 黄片wwwwww| 秋霞在线观看毛片| 日本免费一区二区三区高清不卡| 国产精华一区二区三区| 黄色日韩在线| 少妇猛男粗大的猛烈进出视频 | 卡戴珊不雅视频在线播放| 精品久久久久久久人妻蜜臀av| 国产精品av视频在线免费观看| 一级黄片播放器| 熟女电影av网| 男女视频在线观看网站免费| 日韩国内少妇激情av| 一级毛片电影观看 | 赤兔流量卡办理| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 亚洲欧美精品自产自拍| 插阴视频在线观看视频| 三级经典国产精品| 色播亚洲综合网| 在线国产一区二区在线| 97在线视频观看| 十八禁国产超污无遮挡网站| 亚洲av.av天堂| 亚洲精品456在线播放app| 男的添女的下面高潮视频| 亚洲高清免费不卡视频| 亚洲最大成人中文| 亚洲av第一区精品v没综合| 小蜜桃在线观看免费完整版高清| 成年女人永久免费观看视频| 日韩一区二区视频免费看| 国产成人91sexporn| 婷婷色av中文字幕| 亚洲真实伦在线观看| 国产老妇伦熟女老妇高清| 女同久久另类99精品国产91| 在线观看午夜福利视频| 国产高清不卡午夜福利| 欧美xxxx黑人xx丫x性爽| 熟妇人妻久久中文字幕3abv| 欧美性猛交╳xxx乱大交人| 成人欧美大片| 天堂√8在线中文| 直男gayav资源| 亚洲欧美日韩无卡精品| 婷婷色av中文字幕| 国产真实伦视频高清在线观看| 国产精品嫩草影院av在线观看| 亚洲在久久综合| 99热网站在线观看| 简卡轻食公司| 两性午夜刺激爽爽歪歪视频在线观看| 久久中文看片网| 成人亚洲精品av一区二区| 国产精品福利在线免费观看| 日本黄色片子视频| 精品人妻偷拍中文字幕| 国产精品一区www在线观看| 精品不卡国产一区二区三区| 一边摸一边抽搐一进一小说| 欧美日韩综合久久久久久| 校园人妻丝袜中文字幕| 国产亚洲精品av在线| 久久久精品94久久精品| 国产欧美日韩精品一区二区| 长腿黑丝高跟| 国内精品久久久久精免费| 丰满人妻一区二区三区视频av| 国产精品永久免费网站| 亚洲综合色惰| 丝袜喷水一区| 国产精品国产三级国产av玫瑰| 在线播放国产精品三级| 婷婷六月久久综合丁香| 精品久久久久久久久久久久久| 久久精品夜夜夜夜夜久久蜜豆| 一级av片app| 亚洲av中文av极速乱| 人妻少妇偷人精品九色| 亚洲中文字幕一区二区三区有码在线看| 亚洲精品影视一区二区三区av| 岛国毛片在线播放| 国产成人a∨麻豆精品| 九草在线视频观看| 夜夜爽天天搞| 欧美日韩综合久久久久久| 六月丁香七月| 免费av不卡在线播放| 亚洲av熟女| 久久久久久久久久成人| av在线天堂中文字幕| 欧美变态另类bdsm刘玥| 听说在线观看完整版免费高清| 在线国产一区二区在线| 久久综合国产亚洲精品| 伊人久久精品亚洲午夜| av在线播放精品| 国产免费男女视频| 欧美日韩乱码在线| 国内精品一区二区在线观看| 亚洲欧美日韩卡通动漫| 国产精品一区二区在线观看99 | 久久婷婷人人爽人人干人人爱| 精品日产1卡2卡| 3wmmmm亚洲av在线观看| 日本三级黄在线观看| 久久这里只有精品中国| 国产 一区 欧美 日韩| 美女黄网站色视频| 大又大粗又爽又黄少妇毛片口| 国产成人精品婷婷| 午夜视频国产福利| 激情 狠狠 欧美| 亚洲人成网站在线观看播放| 久久综合国产亚洲精品| www.av在线官网国产| 丝袜美腿在线中文| 欧美日韩综合久久久久久| 最后的刺客免费高清国语| 国产精品久久久久久久电影| 日本欧美国产在线视频| 中文字幕av成人在线电影| 日韩 亚洲 欧美在线| 男人舔奶头视频| 欧美色欧美亚洲另类二区| 亚洲欧美精品专区久久| 一卡2卡三卡四卡精品乱码亚洲| 午夜a级毛片| 99久久人妻综合| 日日撸夜夜添| 精品国内亚洲2022精品成人| 国产精品三级大全| 日韩成人伦理影院| 在线观看美女被高潮喷水网站| 啦啦啦韩国在线观看视频| 婷婷色综合大香蕉| 干丝袜人妻中文字幕| 久久久久久九九精品二区国产| 六月丁香七月| 成年版毛片免费区| 男人的好看免费观看在线视频| 成年女人看的毛片在线观看| 国产成人aa在线观看| 日韩人妻高清精品专区| 干丝袜人妻中文字幕| 亚洲精品成人久久久久久| 特大巨黑吊av在线直播| 国产成人91sexporn| 久久久a久久爽久久v久久| 国产男人的电影天堂91| 日韩欧美在线乱码| 狠狠狠狠99中文字幕| 三级经典国产精品| 99久国产av精品国产电影| 三级国产精品欧美在线观看| 亚洲成人久久爱视频| 大型黄色视频在线免费观看| 婷婷色av中文字幕| 九九久久精品国产亚洲av麻豆| 观看免费一级毛片| 色哟哟·www| 亚洲欧美成人精品一区二区| 亚洲欧美日韩卡通动漫| 全区人妻精品视频| 国产黄色视频一区二区在线观看 | 一个人免费在线观看电影| 天天一区二区日本电影三级| 一边摸一边抽搐一进一小说| 国产高潮美女av| 免费在线观看成人毛片| av免费观看日本| 亚洲图色成人| 亚洲av.av天堂| 国产色婷婷99| 欧美性感艳星| 国产精品一区二区三区四区免费观看| 男人的好看免费观看在线视频| 99久久久亚洲精品蜜臀av| 晚上一个人看的免费电影| 亚洲精品日韩av片在线观看| 精品久久久久久久久久久久久| av又黄又爽大尺度在线免费看 | 国产免费男女视频| videossex国产| 人妻夜夜爽99麻豆av| 少妇熟女欧美另类| 成人国产麻豆网| 真实男女啪啪啪动态图| 精品久久久久久久久av| 亚洲无线观看免费| 国产高清有码在线观看视频| 成人特级黄色片久久久久久久| 国产精品一区www在线观看| 日本与韩国留学比较| 中文字幕制服av| 免费av毛片视频| 99热精品在线国产| 午夜亚洲福利在线播放| .国产精品久久| 欧美色视频一区免费| 亚洲真实伦在线观看| 99热这里只有精品一区| 免费不卡的大黄色大毛片视频在线观看 | 毛片一级片免费看久久久久| 不卡一级毛片| 久久精品夜色国产| 在线观看一区二区三区| 男女那种视频在线观看| 亚洲精品国产成人久久av| 亚洲最大成人中文| 久久九九热精品免费| 亚洲精品久久久久久婷婷小说 | 久久久久久久亚洲中文字幕| 国产视频首页在线观看| 久久久久久久久久久免费av| 99久国产av精品国产电影| 亚洲成人久久性| 欧美色欧美亚洲另类二区| 成人国产麻豆网| 国内精品久久久久精免费| 青春草亚洲视频在线观看| 国产毛片a区久久久久| 毛片女人毛片| 日本五十路高清| 人妻久久中文字幕网| av免费在线看不卡| 亚洲欧美成人精品一区二区| 一区二区三区免费毛片| 国产女主播在线喷水免费视频网站 | 丰满乱子伦码专区| 伦理电影大哥的女人| 禁无遮挡网站| 国产精品福利在线免费观看| 中文在线观看免费www的网站| 丰满乱子伦码专区| 国产黄片美女视频| 国产美女午夜福利| 成人国产麻豆网| 99热精品在线国产| av视频在线观看入口| 中文亚洲av片在线观看爽| 99热6这里只有精品| 成人国产麻豆网| 成人一区二区视频在线观看| 校园人妻丝袜中文字幕| 亚洲中文字幕一区二区三区有码在线看| 国产精品一二三区在线看| 色综合亚洲欧美另类图片| 日韩视频在线欧美| 国产一区亚洲一区在线观看| 亚洲av一区综合| 久久午夜亚洲精品久久| 国产精品久久久久久久电影| 久久久国产成人免费| 免费看光身美女| 亚洲aⅴ乱码一区二区在线播放| 伦理电影大哥的女人| 中国美女看黄片| 日本黄色视频三级网站网址| 男人的好看免费观看在线视频| av天堂中文字幕网| 性色avwww在线观看| 亚洲中文字幕一区二区三区有码在线看| 亚洲va在线va天堂va国产| 一级黄色大片毛片| 免费观看的影片在线观看| 国产高潮美女av| 久久精品国产亚洲网站| 亚洲激情五月婷婷啪啪| 1024手机看黄色片| 久久热精品热| 亚洲四区av| 国产午夜福利久久久久久| 欧美3d第一页| av又黄又爽大尺度在线免费看 | 国产av麻豆久久久久久久| 丝袜美腿在线中文| 日韩av不卡免费在线播放| 欧美极品一区二区三区四区| 亚洲国产欧美人成| 国产精品.久久久| 国产黄色视频一区二区在线观看 | 好男人视频免费观看在线| 男人舔奶头视频| 精品久久久久久久久久久久久| or卡值多少钱| 夜夜看夜夜爽夜夜摸| 性欧美人与动物交配| 波多野结衣高清作品| 久久久久国产网址| 99在线视频只有这里精品首页| 久久精品国产自在天天线| 日韩一区二区视频免费看| 毛片一级片免费看久久久久| 神马国产精品三级电影在线观看| 国产精品永久免费网站| av在线天堂中文字幕| 日本-黄色视频高清免费观看| 免费看日本二区| 亚洲内射少妇av| 国产精品一区二区三区四区免费观看| 亚洲成人久久爱视频| 久久久成人免费电影| 亚洲无线观看免费| 精品欧美国产一区二区三| 男人舔女人下体高潮全视频| 午夜免费男女啪啪视频观看| 高清毛片免费观看视频网站| 国产精品福利在线免费观看| 午夜精品一区二区三区免费看| 日日摸夜夜添夜夜爱| 又粗又爽又猛毛片免费看| 99久久人妻综合| 欧美性感艳星| 国产免费一级a男人的天堂| 国产精品久久电影中文字幕| 狂野欧美激情性xxxx在线观看| 小说图片视频综合网站| 成人二区视频| 亚洲精品粉嫩美女一区| 欧美日韩综合久久久久久| 成人鲁丝片一二三区免费| 一边亲一边摸免费视频| 国产精品.久久久| 免费在线观看成人毛片| 国产精品人妻久久久影院| 色综合色国产| 人妻系列 视频| 亚洲国产欧洲综合997久久,| 亚洲色图av天堂| a级毛色黄片| 亚洲熟妇中文字幕五十中出| h日本视频在线播放| 国产亚洲欧美98| 天堂√8在线中文| 波野结衣二区三区在线| 麻豆精品久久久久久蜜桃| 国产亚洲91精品色在线| 亚洲av二区三区四区| 国产日本99.免费观看| 亚洲熟妇中文字幕五十中出| 国产黄片美女视频| 亚洲一区高清亚洲精品| 国产精品三级大全| 国产精品久久久久久久电影| 亚洲av不卡在线观看| 色综合站精品国产| 欧美三级亚洲精品| 欧美高清性xxxxhd video| 美女xxoo啪啪120秒动态图| 成人毛片a级毛片在线播放|