• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    An Efficient Connectivity Restoration Technique(ECRT)for Wireless Sensor Network

    2021-12-10 11:56:32MahmoodulHassanShahzadAliKhalidMahmoodMuhammadKashifSaeedAminAlAwadyKamranJavedandAnsarMunirShah
    Computers Materials&Continua 2021年10期

    Mahmood ul Hassan,Shahzad Ali,Khalid Mahmood,Muhammad Kashif Saeed,Amin Al-Awady,Kamran Javed and Ansar Munir Shah

    1Department of Computer Skills,Preparatory year,Najran University,Najran,66241,Saudi Arabia

    2Department of Computer Science,Jouf University,Tubarjal,74769,Saudi Arabia

    3Department of Information Systems,College of Science and Arts,King Khalid University,Mahayil Asir,63317,Saudi Arabia

    4Department of Computer Science,Community College Mahayil Asir,King Khalid University,Mahayil,63718,Saudi Arabia

    5Department of Computer Engineering,National University of Technology(NUTECH),Islamabad,44000,Pakistan

    6Department of Computer Science,Institute of Southern Punjab,Multan,60000,Pakistan

    Abstract:Node failure in Wireless Sensor Networks(WSNs)is a fundamental problem because WSNs operate in hostile environments.The failure of nodes leads to network partitioning that may compromise the basic operation of the sensor network.To deal with such situations,a rapid recovery mechanism is required for restoring inter-node connectivity.Due to the immense importance and need for a recovery mechanism,several different approaches are proposed in the literature.However,the proposed approaches have shortcomings because they do not focus on energy-efficient operation and coverage-aware mechanisms while performing connectivity restoration.Moreover,most of these approaches rely on the excessive mobility of nodes for restoration connectivity that affects both coverage and energy consumption.This paper proposes a novel technique called ECRT(Efficient Connectivity Restoration Technique).This technique is capable of restoring connectivity due to single and multiple node failures.ECRT achieves energy efficiency by transmitting a minimal number of control packets.It is also coverage-aware as it relocates minimal nodes while trying to restore connectivity.With the help of extensive simulations,it is proven that ECRT is effective in connectivity restoration for single and multiple node failures.Results also show that ECRT exchanges a much smaller number of packets than other techniques.Moreover,it also yields the least reduction in field coverage,proving its versatility for connectivity restoration.

    Keywords:Cut-vertex;failure recovery;network connectivity;node relocation;wireless sensor network;node failures

    1 Introduction

    WirelessSensor Networks(WSNs)consist of various sensor nodes dispersed for monitoring different phenomena.Each node in a sensor network can be equipped with a diverse range of sensors capable of monitoring a wide variety of phenomena.For some applications like wildfire detection or deep-ocean exploration,sensor nodes deployed in a region stay unattended for a long period without any human intervention[1].For this reason,sensor networks should have self-healing,self-organization,and fault tolerance capabilities for successful operation[2].

    Other than the environmental challenges,one of the major challenges in sensor networks originated from the design and characteristics of the sensor node.Generally,sensor nodes are quite small in size and have limited resources in processing power and memory.Sensor nodes use a battery as a central power source[3].One or more sensors can be attached to a sensor node for measuring different phenomena from the environment.Sensor nodes detect desired phenomena in the environment and can transmit this information to other nodes via radio transceivers.

    In general,sensor nodes are often deployed in harsh environments where human access is restricted;therefore,the replacement of node batteries is not possible.After deploying nodes into a network of sensors,those nodes communicate with each other to establish a network.This network coordinates the sensor nodes and transmits the detected information to the enduser[3].As a sensor network covers a fairly large area,not all sensor nodes are within the transmission range of the end-user.Nodes must rely on multi-hop communications for sending information toward the end user[4–6].The reliability of the collected information can be increased by increasing the node density in an area.During the period,battery exhaustion of the sensor nodes occurs as a result of message transmission and information processing.

    When the battery of a node is fully depleted,this sensor node is considered a dead node.As network nodes begin to disappear during the operation of a sensor network,connectivity holes appear within the network.A connectivity hole is referred to as an area where the nodes are no longer connected.Connectivity holes lead to loss of inter-node connectivity,leading to the inability to send the end-users sensed information.The first step is to detect a failure if a node in the network has failed/died to address such a situation.

    Once such a failed node is identified,the next step is to notify the nodes adjacent to the failed node about repositioning.The disconnected nodes become connected again[7].However,it is possible for network nodes to die at any time due to battery exhaustion or physical damage due to difficult environmental factors.

    A failed node may disrupt network connectivity,and the network may develop multiple isolated segments or partitions.This scenario results in a failure of the flow of information between the sensor nodes and the end-user terminal.This scenario may compromise the basic operation of the sensor network and to prevent this,network connectivity should be restored.One potential connectivity solution is the deployment of redundant nodes in place of dead nodes.However,this process is slow and often impracticable,particularly in environments where nodes are more susceptible to physical damage.The connectivity restoration process should be selforganized using existing living nodes within the network.The recovery mechanism needs to be robust,and the overhead on the sensor nodes involved in the recovery process should be minimal because of the resource constraints.

    Failure of nodes in a sensor network results in different types of connectivity problems.This work categorized the connectivity problems into four different cases:

    1)cut-vertex failure,2)end node failure,3)two cut-vertex node failures,and 4)multiple end node failures.Details of such cases are provided in Section 3.

    Dealing with the above cases is a challenging task.This paper proposes a novel connectivity restoration technique called An Efficient Connectivity Restoration Technique(ECRT)to handle the issues associated with network connectivity.Our work’s major focus is to propose a technique capable of restoring connectivity using the existing nodes in the network;therefore,there is no need to re-deploy new nodes for restoring connectivity.Moreover,ECRT does not substantially reduce the network coverage as observed by the other connectivity restoration techniques.As energy efficiency is one of the major concerns in sensor networks;therefore,ECRT does not rely on the exchange of large amounts of messages for its operation.ECRT can also detect all the identified four connectivity problems and effectively find the solution for each case.

    The rest of the paper is organized as follows.In Section 2,we describe the most relevant related work.Section 3 consists of the research method used for our research work,and we also elaborate on the four different cases related to connectivity restoration.Section 4 presents the simulation results,and subsequently,Section 5 concludes this paper.

    2 Related Work

    Connectivity restoration in wireless sensor networks is an area that has been thoroughly studied by researchers[8–11].Some solutions are based on relocation on-demand,while other solutions rely on post-deployment relocation.The applications requiring sensor nodes to be deployed over large geographic areas use aerial deployment of the nodes[12].Due to this,node density throughout is not uniform,and some areas may have a higher density of nodes than some other areas.To achieve a uniform distribution of nodes,relocation of sensor nodes is desired so that connectivity can be established between the sensor nodes and the end-user and coverage area can be maximized.

    The connectivity aspect is thoroughly studied in the literature,and several approaches are presented[8–12].Some works are more focused on maximizing the coverage of nodes without affecting connectivity.In[13],a distributed algorithm for the restoration of network connectivity in node failure is proposed.This algorithm relies on the mobility of nodes for restoring connectivity in case of failure of a node,and the algorithm also strives to improve the coverage of the area.In[14],the authors considered robot networks,and a technique similar to[13]is introduced for the process of connectivity restoration.A 2-connected network concept is introduced,meaning that there should exist a minimum of two pathways among each pair of nodes in the network.This approach achieves 2-degree connectivity.For dealing with a node’s failure,the algorithm strives to achieve 2-connectivity by moving a pair of sensor nodes.In this way,connectivity is restored.In[15],the authors proposed a technique called C2AP.In this technique,postdeployment of nodes is used for improving coverage and connectivity.A hierarchical architecture is proposed by the authors called COCOLA in[16],where coverage is maximized without forwarding data path to 1-tier node by the incremental relocation of higher-tier nodes.However,both the proposed solutions,C2AP and COCOLA,are incapable of dealing with the failed nodes’implications.

    In[17],a solution based on node’s cascaded movement is introduced for connectivity restoration due to failed nodes.According to this technique,a nearby node replaces a failed node,which is then replaced by another node,and this process continues until finding a redundant node.C3R(Coverage Conscious Connectivity Restoration)[18],RIM(Recovery through Inward Motion)[19],and AUR(Autonomous Repair)[20]are techniques that have a similar focus as our work.C3R addresses connectivity restoration in case of one or more failed nodes.Once a failed node is detected,then it is substituted by each neighbor node temporarily for a limited amount of time.After a specified time,the neighbor node gets back to its original position.The other neighbors repeat this process.The main issue with this approach is that it involves much movement of neighboring nodes to tackle a node’s failure.It results in a large overhead in energy consumption as sensor node movement consumes a substantial amount of energy[21].In[13],the authors proposed a new method called DARA.DARA uses a scheme based on probability for detecting cut vertices and selecting an appropriate neighbor node to the failed node for relocation.The appropriateness of the neighbor is decided based on the number of communication links.In[19],the authors proposed another technique called RIM.RIM is based on recovery by the inward motion,and the neighboring nodes of a failed node take part to relocate the failed node temporarily.

    RIM requires all nodes in the network to have 1-hop information.Once a failed node is detected,the neighbors of that failed node move inward toward its position.Inward movement is to ensure that the neighbors will stay in the range of each other.The main idea is that as these neighbors are directly affected by the node’s failure,therefore,after inward movement,if they can reach each other again,the network connectivity would be restored to its pre-failure state.This relocation procedure is applied recursively for handling any node that gets disconnected due to one of their neighbors’movements.Through extensive simulations,it was proved that RIM is effective for connectivity restoration.However,in the case of a highly dense network,RIM suffers because it tends to move a large number of neighboring nodes,resulting in a substantial increase in the total traveled distance overhead.This also results in high energy usage,decreasing the network lifetime.

    In[20],the authors proposed an approach called Autonomous Repair(AuR).It uses a concept similar to electrostatic interaction based on Coulomb’s law between modeling connectivity charges among neighboring nodes.For the recovery process,only localized information about the immediate neighboring nodes is used.Neighbors initiate the recovery process by first detecting the failed nodes.Then,the neighbors start to move toward the failed nodes,causing the intrasegment topology to be stretched.If connectivity is still unrestored,the segment is then moved as a block toward the deployment area’s center.Moving all segments close to the center increases node density in the center point’s vicinity,leading to an increase in the probability of connectivity getting reestablished.Geometric Skeleton based Reconnection(GSR)is proposed in[22].GSR employs a geometrical skeleton-based approach to logically partition networks into different segments.A group of nodes having maximum connectivity becomes the geometrical skeleton backbone.Each segment keeps track of all skeletal backbone nodes because it plays an important part in network partitioning.In the case of network partitioning,each segment tries to join the geometrical skeleton backbone.This process leads to the restoration of connectivity.However,GSR assumes that each node knows the locations of all other nodes in the network.Second,it is also a pre-requisite that all nodes in the network must be aware of all nodes present in the geometrical skeleton backbone.These assumptions are impractical,particularly for large networks,because keeping all this information in a network with mobile nodes can cause massive overhead.Another problem that may arise during the network’s operation is that the skeleton backbone may exhaust its energy soon,decreasing such nodes.After a while,the lack of presence of such nodes may result in compromising the recovery mechanism.All the above-mentioned works do not consider connectivity,coverage,and energy efficiency collectively.Our proposed work can be distinguished from the above-mentioned works because it addresses connectivity restoration,better coverage,and efficient energy use in an integrated manner.

    An energy-efficient technique,Intelligent On-Demand Connectivity Restoration for Wireless Sensor Networks(IDCRWSN)[23],has been presented that efficiently uses the sensor nodes’residual energy.IDCRWSN restores the connectivity through redundant nodes,which are managed by Slave Keeper nodes.The Slave Keeper nodes are managed and controlled by the Master Keeper nodes.The Permanent Relocation Algorithm for Centralized Actor Recovery(PRACAR)and Self-Route Recovery Algorithm(SRRA)[24]addresses the connectivity restoration of failed actor nodes.The PRACAR restores failed actor nodes’connectivity,and SRRA provides an optimal path to the relocated sensor nodes.

    Efficient Solution for Connectivity Restoration(ESCR)[25]is an energy-efficient technique.The technique restores the network with an efficient consumption of residual energy and least node movement.Only such node can participate in network restoration,which is near the faulty node and has more energy.It stopped unnecessary cascade movement of the nodes during the restoration process.ESCR consists of two algorithms,i.e.,Assigning Backup Nodes(ABN)and Connectivity Restoration Process(CPR)are designed to handle actor node failure and connectivity problems in wireless sensor and actor networks.ESCR compared with other well-known techniques and found better than others.It is evaluated in the environment where sensor nodes are stationary,and only actor nodes can move.Its result can be varied if we consider the mobility of sensor nodes as well.

    3 Research Method

    We identified different cases that may come up if single or multiple nodes in a network die.Our work’s objective is to propose a solution capable of recognizing all of the identified cases and then taking necessary actions to restore connectivity.For our proposed algorithm,we assume that all sensor nodes are randomly deployed in the deployment area.After their deployment,all nodes discover their neighbors by exchanging HELLO beacon messages.For the initial relocation of nodes,the mechanism used in[18]is used.Algorithm 1 presents the steps that are used for initial node relocation.Fig.1 shows the initial relocation scenario.It is assumed that all network nodes are homogenous and have the same processing and communication capabilities.For each node,it is assumed that the sensing range and communication range are equal.In this paper,we use Rc for representing the sensing and communication range.

    Algorithm 1:Initial nod Ni: Sensor Nodes,Nbrj Input: Area,Ni,Rc e relocation for ECRT: Neighboring Nodes of Ni,Rc: Communication Range Output:Initial node relocation successfully done 1 BEGIN 2SET Ni 3FOR EACH Node Ni DO 4 SET DSi ←Distance between the Sink and Ni 5 IF(DSi ≥Rc/2 && DSi

    891 0 11 12//Do not move ELSE//this node is present outside the range of the Sink FOR EACH Neighbouring Node Nbrj of Ni SET DNi ←Distance between Ni and Nbrj 13IF(DNi>Rc/2)14MoveTowardsNeighbor(Nbrj,DNi)15ELSE 16//Do not move 17END 18MoveTowardsSink(Ni,DSi)19BEGIN 20While(DSi>Rc/2)21Keep moving towards Sink 22Update position and notify neighbors via HEARTBEAT message 23SET DSi ←Distance between Ni and Sink 24END 25MoveTowardsNeighbor(Nbrj,DNi)26BEGIN 27While(DNi>Rc/2)28Keep moving towards the node 29Update position and notify neighbors via HEARTBEAT message 30SET DNi ←Distance between Ni and Nbrj 31END

    Figure 1:Network topology after initial relocation

    Once the nodes are deployed in an area,each node will broadcast HELLO beacon messages with a transmission range of RC/2 for providing its location information to other nodes in the network[18].Each node share information,including its ID and current position in acknowledgment(ACK),to all the neighboring nodes.The transmission range of Rc/2 is used for the transmission of ACK.Also,each node periodically sends a broadcast message for synchronization called SYN message.The transmission range used for transmitting SYN messages is also Rc/2.SYN messages are used for the identification of failed nodes.For example,let us consider the scenario presented in Fig.1.If the node S7 has failed,nodes S5,S6,and S8 will not receive SYN messages from S7.The absence of a SYN message means the failure of a node.Upon detecting a failed node,nodes S5,S6,and S8 will send a HELLO message with a transmission range Rc toward the failed node direction.Upon receiving the HELLO message,in reply,each node transmits an ACK message.In this way,each node updates the list of neighbors,and they initiate mobility to restore the network,as depicted in Fig.2.

    Upon detecting the failure,it is important to understand the impact of failure on the network topology.In this work,we have categorized four scenarios that can occur due to single or multiple node failure.

    Figure 2:Single cut-vertex failure

    3.1 Scenario 1:Single Cut-Vertex Failure

    The cut-vertex scenario is illustrated in Fig.2.This happens when a node’s failure divides the connected network into multiple disjoint partitions[21].In Fig.2,it can be observed that the failure of node F divides the network into two partitions resulting in cut-vertex failure.Failure of node F is detected by nodes S5,S6,and S8 due to the absence of SYN messages from node F.Algorithm 2 illustrates the single cut-vertex failure detection and restoration process.For connectivity restoration by our proposed algorithm,nodes S5,S6,and S8 send a broadcast HELLO(also known as Heartbeat)message with a communication range of Rc.If each node receives an ACK from another neighboring node,node’s mobility needs to restore network connectivity.Upon receiving the ACK from neighboring nodes,and all nodes update the routing list.The solutions presented in[13,17,22]rely on the cascaded relocation of neighboring nodes in the given scenario.It is proven that cascaded relocation of nodes leads to more energy consumption leading to a quick drainage of sensor node’s batteries[4].Cascaded relocation also leads to the shrinking of network coverage.Our proposed algorithm improves energy efficiency by avoiding the un-necessary mobility of neighboring nodes and improving network coverage.Essentially,this algorithm also prefers coverage;therefore,these coverage holes will be fulfilled by the neighbors by measuring overlapped distance according to[18].

    Algorithm 2:Single c N(SNi): Sensor No ut-vertex failure detection and restoration des,N(CV): Cut ?Vertex Nodes,Nbr(CV): Neighboring Nodes of CV,ACK: Acknowledgement,Rc: Communication Range Input: Area,N(SNi),N(CV),Nbr(CV),Rc Output:Single cut-vertex failure detection and restoration 1 BEGIN 2SET N(SNi),N(CV)3FOR EACH cut-vertex node in N(CV) do 4IF(Nbr(CV)detects that N(CV)has failed)THEN 5Nbr(CV)braodcast HEARTBEAT with a range equals to Rc 6IF(Nbr(CV)received ACK)THEN 7Update_Routing_Table(N(SNi));8//As connectivity is maintained under range Rc,therefore,no need for movement 9ELSE 10Cascaded_Movement();11Update_Routing_Table(N(SNi));12END IF 13END IF 14 END

    3.2 Scenario 2:Single End Node Failure

    End nodes are also referred to as leaf nodes.These are nodes normally present at the edge of the network.Failure of end-nodes does not affect inter-node connectivity.However,their failure affects the coverage area.Upon detecting end node failure(due to the absence of HELLO messages),the neighboring nodes will calculate the overlapped coverage area with the failed node using the mechanism presented in[18].A neighboring node with more overlapping distance with the failed node is a suitable candidate for moving toward a failed node.During the movement,the node will continue to send HELLO messages and receive ACK messages to neighboring nodes with a communication range of Rc.This process ensures that the node mobility by a suitable candidate node does not cause network disconnectivity.For further illustration of this process,let us consider Fig.3a.Let us assume that node S4 has failed.The failure of S4 will be detected by its neighbors,i.e.,S3,and S6 due to the absence of SYN messages from S4.Both the neighbors S3 and S6 will compute the relative overlapped sensing area with the failed node S4.Node S3 has more overlap areas with the failed node than S6.Therefore,S3 will be selected as a suitable neighbor responsible for moving toward the failed node S4.According to[18],S3 will move a maximum distance of Rc/4 toward the direction of S4.This process is illustrated in Fig.3b,and the steps are presented in Algorithm 3.During the movement,S3 will continue sending and receiving HELLO and ACK messages with Rc’s transmission range with neighbors to ensure connectivity.End nodes are also referred to as leaf nodes.These are nodes normally present at the edge of the network.Failure of end-nodes does not affect the inter-node connectivity[26–28].

    Figure 3:(a)End node failure(b)Recovery from end node failure

    Algorithm 3:Single-end N(SNi): Sensor Nodes,Communication Range Input: Area,N(SNi),Output:Single-end node 1 BEGIN 2SET N(SNi),N(E 3FOR EACH end node failure detection and restoration N(ENi): End Nodes,Nbr(ENi): Neighboring Nodes of ENi,Rc:N(EN),Nbr(EN),Rc failure detection and restoration Ni) node in N(ENi) do 4IF(Nbr(ENi) detects that N(ENi) has failed)THEN 5Calculate_Overlapped_Area(Nbr(ENi),Nbrimages/BZ_986_1294_2326_1313_2372.pngENj))6IF(Overlapped_Area(Nbr(ENi))>Overlapped_Areaimages/BZ_986_1436_2381_1454_2427.pngNbrimages/BZ_986_1536_2381_1554_2427.pngENj))) THEN 7Nbr(ENi)moves towards Nbrimages/BZ_986_989_2436_1007_2482.pngENj) with a distance Rc/4 from its origin 8// Broadcast HEARTBEAT message to all neighboring nodes 9Relocation();10Update_Routing_Table(N(SNi));11END IF 12END IF 13 END

    3.3 Scenario 3:Two Cut-Vertex Node Failure

    Two cut-vertex node failure is shown in Fig.4,where multiple nodes fail simultaneously causing a network partition.The implications of two cut-vertex node failures are substantial.In this case,merely broadcasting HELLO messages with a transmission range of Rc will not be received by the nodes toward a failed node as the distance between nodes is greater than Rc(as illustrated in Fig.4a).The absence of ACK will mean no immediate neighbors of the failed node in the Rc range.Dealing with this problem,a new type of message called coordination message will be broadcast with a transmission range of Rc/2 among the neighbors as they start to move toward the failed node.The coordination message ensures that no moving node goes out of range of its neighbor,causing further disruption in the network which shows simultaneous node failure.These moving nodes will continue to transmit HELLO messages and wait for ACK messages.Receiving the ACK message will mean a node in the failed node’s vicinity capable of restoring connectivity.This process is illustrated in Fig.4b,and the steps are presented in Algorithm 4.Fig.4b shows the original position of the relocated nodes as well as the position after relocation.

    Figure 4:(a)Two cut-vertex nodes fail.(b)Recovery of two cut-vertex node

    Algorithm 4:Two cut-vertex failure detection and restoration N(SNi): Sensor Nodes,N(CV): Cut ?Vertex Nodes,Nbr(CV): Neighboring Nodes of CV,Rc: Communication Range Input: Area,N(SNi),N(CV),Nbr(CV),Rc Output:Two cut-vertex failure detection and restoration 1 BEGIN 2SET N(SNi),N(CV)3FOR EACH cut-vertex node in N(CV) do

    4IF(Nbr(CVi) &&5Nbr(CVi)and N(Nbrimages/BZ_988_860_347_879_393.pngCVj) detects that N(CVi) and Nimages/BZ_988_1542_384_1565_430.pngimages/BZ_988_1551_347_1570_393.pngCVj) has failed)THEN brimages/BZ_988_804_402_823_448.pngCVj)will move toward N(CVi) and Nimages/BZ_988_1612_402_1631_448.pngCVj)with respect to Rc/2 to its origin 6Nbr(CVi)and Nbrimages/BZ_988_804_510_823_556.pngCVj)will broadcast HEARTBEAT message 7Cascaded_Movement();8Update_Routing_Table(N(SNi));9END IF 10 END

    3.4 Scenario 4:Multiple End Node Failure

    Multiple end node failure is illustrated in Fig.5.As WSNs operate in harsh environments,therefore multiple end node failure is a possibility.Multiple end node failure can cause a big coverage hole,and for various applications,it is undesirable.To deal with such a situation,the failed nodes’neighbors start to move toward the failed nodes and exchange SYN messages for reporting the change in location to all neighbors.The maximum movement toward the failed nodes by neighbor nodes is Rc/4(as assumed in most baseline works such as[13,17,18]).Fig.5b illustrates the movement of nodes toward the failed nodes to cope with multiple node failures.Multiple end node failure detection and recovery process are presented in Algorithm 5.

    Figure 5:(a)Shows the multiple end nodes failure(b)Shows the recovery of multiple end nodes failure

    Algorit N(SNihm 5:Multiple end node failure detection and restoration): Sensor Nodes,N(ENi): End Nodes,Nbr(ENi): Neighboring Nodes of ENi,Rc:Communication Range Input: Area,N(SNi),N(EN),Nbr(EN),Rc Output:Multiple end node failure detection and restoration 1 BEGIN 2SET N(SNi),N(ENi)3FOR EACH end node in N(ENi) do 4 IF(Nbr(ENi) detects that N(ENi) have failed)THEN 5 Nbr(ENi)will move towards N(ENi) with respect to Rc/4 to its origin 6 Nbr(ENi)will broadcast heartbeat message 7 Coverage_Enhancement();8 Update_Routing_Table(N(SNi));9END IF 10 END

    3.5 Energy Model

    The proposed technique ECRT transmits and receives aβ-bit data packet over distancedby using the energy model described in[29].While transmitting aβ-bit data packet over distanced,the sensor node’s energy depletion is calculated as:

    where?_fsis the required energy in free space at the Radio Frequency(RF)amplifier and?_mpis the required energy in multipath at the Radio Frequency(RF)amplifier.E_elecis the energy depletion per bit for the sender or receiver circuit.

    While receiving aβ-bit data packet over distanced,the energy depletion of a sensor node is calculated as:

    where E_Rx?elecis the energy consumed per bit by the receiver circuitry.

    The remaining residual energy of a sensor node is given by:

    4 Results and Discussion

    For the simulations,we have used NS2(Network Simulator 2).During all simulations,at time T = 0,sensor nodes are randomly deployed in a field with dimensions of 950 × 950 m2.The communication range is varied between 25 and 150 m.Node density is varied in the simulation area by varying the number of nodes between 100 and 250.Tab.1 illustrates the simulation parameters.Each point in the graph is calculated by running simulations with random seeds ten times.The results for the proposed algorithm are compared with baseline algorithms RIM[18],C3R[19],GSR[22],and AUR[20].The following sections explain the results obtained by doing extensive simulations.

    Table 1:Simulation parameters

    4.1 Total Distance Moved During Relocation

    Fig.6 shows the effect of increasing the number of nodes on the total distance moved by nodes for connectivity restoration.It can be observed that our proposed protocol ECRT performs well compared to all the other baseline algorithms.The major reason behind this is that ECRT moves just the critical nodes near the failed nodes.Alternatively,all the other baseline algorithms rely on non-critical nodes’movement,resulting in cascaded relocation.Therefore,the average distance moved by all baseline protocols is much more as compared to our proposed algorithm.Cascaded relocation increases the average distance moved by the nodes during recovery and average energy consumption.As ECRT reduces cascaded relocation compared to other protocols,therefore it proves to be more efficient.

    Figure 6:Nodes vs.distance moved

    4.2 Number of Nodes Moved

    The number of nodes moved by the considered protocols by increasing the total number of nodes in the network is presented in Fig.7.As the number of nodes increases;the number of nodes moved by all protocols increases.However,our proposed protocol ECRT outperforms all the considered baseline protocols as the increase in the number of nodes moved is lesser.Cascaded relocation is the main reason for more nodes moving on average for all considered baseline algorithms.

    4.3 Reduction in Field Coverage

    The percentage reduction in field coverage concerning different communication range is shown in Fig.8.Two factors contribute to the reduction in field coverage.First,the nodes that die due to complete drainage of their batteries;second,the node movement to restore connectivity.Our proposed protocol aims to achieve connectivity restoration by reducing the number of exchanged messages(for achieving energy efficiency)and moving only critical nodes(for the restoration of connectivity and improving field coverage in case of failed nodes).It is evident from the figure that with an increase in the communication range of nodes,the percentage reduction in the field coverage decreases for all considered protocols.The percentage reduction in the field coverage by our proposed protocol ECRT is lesser than all other baseline protocols.Among all considered protocols,RIM yields the largest percentage reduction in the field.The major reason behind this observation is using excessive cascaded relocation for connectivity restoration.Other protocols also move non-critical nodes for connectivity restoration,leading to the increased energy consumption of nodes due to movement leading to the failure of more nodes in the network.This ultimately decreases the coverage area.

    Figure 7:The average number of nodes moved during recovery

    Figure 8:Percentage reduction in field coverage

    4.4 Number of Exchanged Packets

    The average number of packets exchanged by all considered protocols is illustrated in Fig.9.For the working of each protocol,several different types of packets are transmitted.For Fig.9,the communication range is varied between 25 to 150 m.It can be observed from the figure that with the increase in the communication range,the number of packets exchanged increases for all considered protocols.The operational details of each protocol impact the number of packets that need to be exchanged.Moreover,the decisions made regarding the movement of nodes also play a key role.Whenever a node is relocated,it needs to exchange different control packets with its neighboring nodes.The more nodes a protocol relocates,the more packets are exchanged.It can be seen from the figure that RIM exchanges the maximum number of packets compared to all other protocols.Cascaded relocation is one of the major factors resulting in increased packets for all baseline protocols.As our protocol moves just the critical nodes;therefore,it avoids unnecessary relocation of nodes.This results in a lower number of exchanged packets.Due to this,our proposed protocol exchanges the least number of packets.Exchanging the least number of packets also makes our proposed protocol more energy efficient as packets’exchange requires energy.Therefore,ECRT proves to be the most energy-efficient protocol among all considered protocols.

    Figure 9:Total number of exchanged packets

    For the continuous operation of sensor networks,connectivity restoration is of immense importance,and a technique capable of restoring the connectivity is crucial for smooth operation.A connectivity restoration technique should be self-organizing,coverage-aware,and energyefficient.By studying the literature,it was observed that most of the solutions for connectivity restoration focused on only one of the above features but not all of them collectively.This research aimed to design a novel connectivity restoration mechanism that effectively restores connectivity by moving fewer nodes than existing techniques.Another focus was to keep the connectivity restoration technique energy efficient by exchanging a minimal number of control messages.Last but not least,the technique should minimize the reduction in field coverage.Our proposed connectivity restoration mechanism achieves all the above objectives.Extensive simulations proved the effectiveness of our proposed protocol.

    5 Conclusion

    Due to Wireless Sensor Networks(WSN)’s inherent characteristics,network partitioning is one of the fundamental problems.It is important to have an efficient connectivity restoration mechanism capable of restoring connectivity in single or multiple node failures.In this paper,we proposed a novel connectivity restoration technique called ECRT.ECRT can detect single and multiple node failures and efficiently restore connectivity by relocating a minimal number of nodes.It does not face the problem of cascaded relocation,and by doing extensive simulations,it is proved that it achieves an energy-efficient operation by exchanging a minimal number of packets.Moreover,it moves much lesser nodes on average compared to the other baseline approaches.It also improves the field coverage as it results in a minimum percentage reduction in the field coverage compared to the other approaches.

    Future work can be extended in two possible dimensions.The first dimension involves developing an analytical model for the proposed solution under different mobility models.The second dimension involves implementing the proposed solution on real sensor nodes and doing extensive performance evaluations.

    Acknowledgement:The authors extend their appreciation to the Jouf University for funding this work through Research Groups under Grant Number(40/117).

    Funding Statement:This research is funded by Jouf University Saudi Arabia,under the research Project Number 40/117.URL:www.ju.edu.sa.

    Conflicts of interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    免费av毛片视频| 国产97色在线日韩免费| 脱女人内裤的视频| 国产乱人伦免费视频| 99国产极品粉嫩在线观看| 他把我摸到了高潮在线观看| 99国产精品一区二区蜜桃av| 国产麻豆成人av免费视频| 亚洲国产精品久久男人天堂| 久久久久国产精品人妻aⅴ院| 久久久久久九九精品二区国产| 国产蜜桃级精品一区二区三区| 中文字幕熟女人妻在线| 在线免费观看不下载黄p国产 | 亚洲精品美女久久久久99蜜臀| 午夜亚洲福利在线播放| aaaaa片日本免费| 日本在线视频免费播放| 网址你懂的国产日韩在线| 天天躁狠狠躁夜夜躁狠狠躁| 国产伦人伦偷精品视频| 亚洲第一欧美日韩一区二区三区| 黑人操中国人逼视频| 国产午夜福利久久久久久| 久久婷婷人人爽人人干人人爱| 91在线精品国自产拍蜜月 | 国产熟女xx| 黄色 视频免费看| 国产欧美日韩一区二区三| 免费观看人在逋| 中文字幕精品亚洲无线码一区| 中文字幕久久专区| 动漫黄色视频在线观看| 国产欧美日韩一区二区三| 成人午夜高清在线视频| 熟女少妇亚洲综合色aaa.| 特级一级黄色大片| 国产真人三级小视频在线观看| 精品国产乱码久久久久久男人| 国产成人一区二区三区免费视频网站| 日本一本二区三区精品| 免费在线观看影片大全网站| 99热只有精品国产| 亚洲精品久久国产高清桃花| 九色国产91popny在线| 又紧又爽又黄一区二区| 99热只有精品国产| 又大又爽又粗| 99久久成人亚洲精品观看| 亚洲专区字幕在线| 最好的美女福利视频网| 成人特级av手机在线观看| 欧美日韩一级在线毛片| 国产激情偷乱视频一区二区| 国产三级中文精品| 久久久国产精品麻豆| 狂野欧美白嫩少妇大欣赏| 99精品在免费线老司机午夜| 两个人的视频大全免费| 天堂动漫精品| a在线观看视频网站| 欧美极品一区二区三区四区| 国产黄片美女视频| 美女黄网站色视频| 99在线视频只有这里精品首页| 国产aⅴ精品一区二区三区波| 婷婷亚洲欧美| 少妇丰满av| 两个人视频免费观看高清| 中文字幕精品亚洲无线码一区| 久久久国产成人精品二区| 99久国产av精品| 99久久综合精品五月天人人| 成人三级做爰电影| www.熟女人妻精品国产| 真人做人爱边吃奶动态| 国产成+人综合+亚洲专区| 日韩精品中文字幕看吧| 欧美日韩综合久久久久久 | 国产精品亚洲美女久久久| 黄色日韩在线| 国内少妇人妻偷人精品xxx网站 | 一个人看视频在线观看www免费 | 色播亚洲综合网| 91麻豆av在线| 免费一级毛片在线播放高清视频| 国产av一区在线观看免费| 蜜桃久久精品国产亚洲av| 人妻丰满熟妇av一区二区三区| 亚洲人成网站高清观看| 国产激情欧美一区二区| 婷婷亚洲欧美| 国产伦精品一区二区三区视频9 | 国产麻豆成人av免费视频| 9191精品国产免费久久| 精品久久久久久,| 成在线人永久免费视频| 一卡2卡三卡四卡精品乱码亚洲| 亚洲午夜精品一区,二区,三区| 一区福利在线观看| 久久精品亚洲精品国产色婷小说| 2021天堂中文幕一二区在线观| 五月玫瑰六月丁香| 国产一区二区激情短视频| 一个人免费在线观看的高清视频| 露出奶头的视频| 国产黄色小视频在线观看| 日日干狠狠操夜夜爽| 性色avwww在线观看| 国内精品久久久久久久电影| 国产高清videossex| 中文资源天堂在线| 亚洲熟女毛片儿| 亚洲乱码一区二区免费版| 色吧在线观看| 天天添夜夜摸| 亚洲色图 男人天堂 中文字幕| 91麻豆av在线| 9191精品国产免费久久| 国产一区二区三区视频了| 成人三级黄色视频| 性色avwww在线观看| 一级毛片女人18水好多| 此物有八面人人有两片| 国产精品久久久久久人妻精品电影| 一卡2卡三卡四卡精品乱码亚洲| 精品不卡国产一区二区三区| 综合色av麻豆| 久久精品国产99精品国产亚洲性色| 欧美日韩精品网址| 一二三四社区在线视频社区8| 操出白浆在线播放| 成年版毛片免费区| 91麻豆精品激情在线观看国产| 久久午夜亚洲精品久久| 脱女人内裤的视频| 搡老岳熟女国产| 精品久久久久久久末码| 看片在线看免费视频| 亚洲 国产 在线| 亚洲性夜色夜夜综合| 久久久久性生活片| 亚洲欧美精品综合一区二区三区| 变态另类丝袜制服| 特大巨黑吊av在线直播| 99久久久亚洲精品蜜臀av| 女生性感内裤真人,穿戴方法视频| 在线观看日韩欧美| 中文字幕高清在线视频| 日韩成人在线观看一区二区三区| 在线观看午夜福利视频| 国产激情欧美一区二区| 美女大奶头视频| 欧美zozozo另类| 日韩欧美国产在线观看| www.自偷自拍.com| 在线观看美女被高潮喷水网站 | 欧美日韩乱码在线| 亚洲国产精品久久男人天堂| 不卡一级毛片| 亚洲精品美女久久久久99蜜臀| 成人无遮挡网站| 高潮久久久久久久久久久不卡| 免费看a级黄色片| 亚洲精品中文字幕一二三四区| 91麻豆av在线| 欧美三级亚洲精品| 免费观看人在逋| 级片在线观看| 麻豆久久精品国产亚洲av| 综合色av麻豆| 久久伊人香网站| 麻豆成人av在线观看| 久久精品影院6| 精品无人区乱码1区二区| 亚洲自偷自拍图片 自拍| 国产精品av视频在线免费观看| 国产亚洲精品久久久com| 国产亚洲精品av在线| 国产精品香港三级国产av潘金莲| 国产淫片久久久久久久久 | 色视频www国产| 亚洲va日本ⅴa欧美va伊人久久| 国产精品av视频在线免费观看| 麻豆成人午夜福利视频| 亚洲自偷自拍图片 自拍| 18禁国产床啪视频网站| 少妇的丰满在线观看| 亚洲成人免费电影在线观看| 亚洲av日韩精品久久久久久密| 首页视频小说图片口味搜索| 夜夜看夜夜爽夜夜摸| 成人特级av手机在线观看| 午夜福利成人在线免费观看| 国产伦在线观看视频一区| 麻豆久久精品国产亚洲av| av国产免费在线观看| 19禁男女啪啪无遮挡网站| 国产精品久久久久久人妻精品电影| 国产麻豆成人av免费视频| 国内精品久久久久精免费| 欧美日韩黄片免| 国产欧美日韩一区二区三| 舔av片在线| 日韩有码中文字幕| 精品久久久久久久久久免费视频| 国产精品亚洲一级av第二区| 日韩 欧美 亚洲 中文字幕| 十八禁人妻一区二区| 99久久99久久久精品蜜桃| 男女做爰动态图高潮gif福利片| 久久久国产成人免费| 亚洲成av人片在线播放无| 亚洲美女视频黄频| 老司机午夜十八禁免费视频| 一区二区三区激情视频| 亚洲aⅴ乱码一区二区在线播放| 久久热在线av| 日韩成人在线观看一区二区三区| 精品欧美国产一区二区三| 亚洲专区字幕在线| 亚洲av成人av| 亚洲精品456在线播放app | 国产真实乱freesex| 手机成人av网站| 亚洲熟妇熟女久久| 老司机福利观看| 国内精品美女久久久久久| 国产高清有码在线观看视频| 日日摸夜夜添夜夜添小说| 少妇人妻一区二区三区视频| 非洲黑人性xxxx精品又粗又长| 亚洲专区国产一区二区| 岛国在线免费视频观看| 欧美日本视频| 久久中文看片网| 99精品久久久久人妻精品| 日韩国内少妇激情av| 亚洲,欧美精品.| 欧美黄色淫秽网站| 国产精品影院久久| 桃红色精品国产亚洲av| 亚洲va日本ⅴa欧美va伊人久久| 欧美午夜高清在线| 成人特级av手机在线观看| av片东京热男人的天堂| 在线观看舔阴道视频| 欧美日韩精品网址| 国产精品久久久人人做人人爽| 亚洲成av人片免费观看| 曰老女人黄片| 极品教师在线免费播放| 精品久久久久久成人av| 欧美+亚洲+日韩+国产| 亚洲国产欧美一区二区综合| 国产伦一二天堂av在线观看| 中文字幕人妻丝袜一区二区| 亚洲欧洲精品一区二区精品久久久| 色在线成人网| 好男人在线观看高清免费视频| 婷婷亚洲欧美| 国产一区二区三区在线臀色熟女| 国产av麻豆久久久久久久| 久久99热这里只有精品18| 桃色一区二区三区在线观看| 国产极品精品免费视频能看的| 性色av乱码一区二区三区2| 日日摸夜夜添夜夜添小说| 久久亚洲精品不卡| 色av中文字幕| 嫩草影视91久久| 国产成人影院久久av| 国产成+人综合+亚洲专区| 深夜精品福利| svipshipincom国产片| 亚洲乱码一区二区免费版| av女优亚洲男人天堂 | 久久久色成人| 老司机在亚洲福利影院| 国产精品av久久久久免费| 亚洲av成人精品一区久久| 男女下面进入的视频免费午夜| 99久久精品国产亚洲精品| 亚洲中文字幕日韩| 18禁裸乳无遮挡免费网站照片| 日本熟妇午夜| 嫩草影院精品99| 亚洲欧洲精品一区二区精品久久久| 久久久国产欧美日韩av| 女警被强在线播放| 久久精品91蜜桃| 叶爱在线成人免费视频播放| 国产激情偷乱视频一区二区| 免费电影在线观看免费观看| 成熟少妇高潮喷水视频| 午夜福利在线在线| 非洲黑人性xxxx精品又粗又长| 不卡一级毛片| 一个人观看的视频www高清免费观看 | av福利片在线观看| 国内毛片毛片毛片毛片毛片| 精品一区二区三区av网在线观看| 日韩欧美一区二区三区在线观看| 欧美中文日本在线观看视频| 日韩免费av在线播放| 国模一区二区三区四区视频 | 欧美乱妇无乱码| 欧美精品啪啪一区二区三区| 国产精品女同一区二区软件 | 一个人免费在线观看电影 | 99国产精品一区二区蜜桃av| 99久久99久久久精品蜜桃| 久久久水蜜桃国产精品网| 久久伊人香网站| 久久久国产欧美日韩av| 欧美3d第一页| 此物有八面人人有两片| 精品无人区乱码1区二区| 精品国产超薄肉色丝袜足j| 麻豆av在线久日| 欧美激情久久久久久爽电影| 最近最新中文字幕大全免费视频| 波多野结衣巨乳人妻| 久久精品影院6| 精品久久久久久久久久久久久| 国产不卡一卡二| 欧美日韩福利视频一区二区| 每晚都被弄得嗷嗷叫到高潮| 国产精华一区二区三区| 国语自产精品视频在线第100页| 51午夜福利影视在线观看| 香蕉久久夜色| 久久久久久久午夜电影| 国产伦精品一区二区三区四那| 亚洲国产欧洲综合997久久,| 亚洲人成网站高清观看| 亚洲国产欧洲综合997久久,| 中文字幕久久专区| 麻豆国产97在线/欧美| 国内精品久久久久精免费| 宅男免费午夜| 国产aⅴ精品一区二区三区波| 亚洲成人中文字幕在线播放| 久久久国产成人精品二区| 最好的美女福利视频网| 老司机午夜十八禁免费视频| 最好的美女福利视频网| 97超级碰碰碰精品色视频在线观看| 12—13女人毛片做爰片一| 十八禁人妻一区二区| 精品不卡国产一区二区三区| 久久久久九九精品影院| 又紧又爽又黄一区二区| 男人的好看免费观看在线视频| 久久久久免费精品人妻一区二区| 热99在线观看视频| 一个人观看的视频www高清免费观看 | 国产视频内射| 曰老女人黄片| 国产av不卡久久| 精品日产1卡2卡| 亚洲精品一卡2卡三卡4卡5卡| 欧美黑人欧美精品刺激| 国产麻豆成人av免费视频| 老司机深夜福利视频在线观看| 国产主播在线观看一区二区| 这个男人来自地球电影免费观看| 一区二区三区国产精品乱码| 国产一区二区在线观看日韩 | 国产高清videossex| 色综合亚洲欧美另类图片| 在线播放国产精品三级| 国产高清激情床上av| 又爽又黄无遮挡网站| 亚洲国产精品999在线| 精品无人区乱码1区二区| ponron亚洲| 麻豆国产av国片精品| 亚洲成人久久性| 黄片大片在线免费观看| 小说图片视频综合网站| 欧美成狂野欧美在线观看| 日本黄大片高清| 麻豆国产av国片精品| 国产高清视频在线播放一区| 精品一区二区三区视频在线 | 麻豆国产97在线/欧美| 99久久精品一区二区三区| 99在线人妻在线中文字幕| 久久久久精品国产欧美久久久| 精品久久久久久,| 日本撒尿小便嘘嘘汇集6| 精品电影一区二区在线| 啪啪无遮挡十八禁网站| 日韩精品中文字幕看吧| 老鸭窝网址在线观看| 久久国产精品影院| 欧美乱妇无乱码| 熟女电影av网| 精品欧美国产一区二区三| 一进一出抽搐gif免费好疼| bbb黄色大片| av天堂在线播放| 日韩三级视频一区二区三区| 国产 一区 欧美 日韩| 男女床上黄色一级片免费看| 国产精品野战在线观看| 露出奶头的视频| 日韩欧美在线乱码| 91在线精品国自产拍蜜月 | 一级a爱片免费观看的视频| 国产69精品久久久久777片 | 欧美最黄视频在线播放免费| 精品久久久久久久毛片微露脸| 成人精品一区二区免费| 最近视频中文字幕2019在线8| 99久久99久久久精品蜜桃| 我要搜黄色片| 国产黄片美女视频| 一本一本综合久久| 又粗又爽又猛毛片免费看| 国产成人aa在线观看| 亚洲专区中文字幕在线| 国产视频内射| 色噜噜av男人的天堂激情| 亚洲第一电影网av| 十八禁网站免费在线| 99热精品在线国产| 国内毛片毛片毛片毛片毛片| 国内精品一区二区在线观看| 夜夜爽天天搞| 在线观看免费视频日本深夜| 禁无遮挡网站| 久久久久久九九精品二区国产| 热99re8久久精品国产| 91字幕亚洲| 欧美黄色淫秽网站| 国产蜜桃级精品一区二区三区| 亚洲欧洲精品一区二区精品久久久| 88av欧美| 99久久精品一区二区三区| 国产一区二区三区在线臀色熟女| 岛国在线观看网站| 母亲3免费完整高清在线观看| 国内少妇人妻偷人精品xxx网站 | 国产主播在线观看一区二区| 亚洲国产精品久久男人天堂| www.999成人在线观看| 丁香六月欧美| 亚洲av第一区精品v没综合| 亚洲va日本ⅴa欧美va伊人久久| 51午夜福利影视在线观看| 亚洲专区国产一区二区| 欧美日韩一级在线毛片| 97人妻精品一区二区三区麻豆| 精品99又大又爽又粗少妇毛片 | 中文字幕av在线有码专区| 俄罗斯特黄特色一大片| 又黄又粗又硬又大视频| a级毛片在线看网站| 一区二区三区激情视频| 亚洲人成伊人成综合网2020| 少妇人妻一区二区三区视频| 久久午夜综合久久蜜桃| 亚洲国产欧美人成| 757午夜福利合集在线观看| 99久久无色码亚洲精品果冻| 国产极品精品免费视频能看的| 午夜激情福利司机影院| 男人舔女人下体高潮全视频| 亚洲天堂国产精品一区在线| 欧美性猛交黑人性爽| 欧美精品啪啪一区二区三区| 这个男人来自地球电影免费观看| 91字幕亚洲| 特大巨黑吊av在线直播| 美女高潮喷水抽搐中文字幕| 日日摸夜夜添夜夜添小说| 最近视频中文字幕2019在线8| 国产精品一区二区三区四区免费观看 | 亚洲色图 男人天堂 中文字幕| 欧美又色又爽又黄视频| 欧美日韩亚洲国产一区二区在线观看| 午夜免费观看网址| 人妻丰满熟妇av一区二区三区| 久久久国产精品麻豆| 欧美日韩瑟瑟在线播放| 欧美成人一区二区免费高清观看 | 欧美一级毛片孕妇| 午夜免费观看网址| 日日摸夜夜添夜夜添小说| av在线天堂中文字幕| 国产精品1区2区在线观看.| 欧美乱妇无乱码| 国产三级中文精品| 欧洲精品卡2卡3卡4卡5卡区| 国产精品一区二区三区四区久久| 成人永久免费在线观看视频| 午夜福利在线观看吧| 国产一级毛片七仙女欲春2| 在线免费观看不下载黄p国产 | 高潮久久久久久久久久久不卡| av在线天堂中文字幕| 国产精品1区2区在线观看.| 男人和女人高潮做爰伦理| 亚洲乱码一区二区免费版| 99久久成人亚洲精品观看| 欧美一区二区国产精品久久精品| 免费无遮挡裸体视频| 午夜精品久久久久久毛片777| 日韩欧美国产一区二区入口| 欧美极品一区二区三区四区| 亚洲熟妇熟女久久| 国产精品99久久久久久久久| 青草久久国产| 在线视频色国产色| 高清在线国产一区| 久久久久久国产a免费观看| 亚洲自偷自拍图片 自拍| 午夜福利视频1000在线观看| 嫩草影视91久久| 午夜成年电影在线免费观看| 亚洲18禁久久av| 国产免费男女视频| 久久久久九九精品影院| 男人舔奶头视频| 久久伊人香网站| 亚洲熟妇熟女久久| 免费看光身美女| 后天国语完整版免费观看| 97人妻精品一区二区三区麻豆| 91老司机精品| 91在线精品国自产拍蜜月 | 亚洲精品美女久久av网站| 国产成+人综合+亚洲专区| 午夜福利在线观看吧| 日本免费一区二区三区高清不卡| 色综合欧美亚洲国产小说| 久久精品影院6| 无限看片的www在线观看| 毛片女人毛片| 97人妻精品一区二区三区麻豆| 亚洲欧美日韩高清在线视频| 免费观看人在逋| 欧美日韩黄片免| 99久国产av精品| 亚洲精品美女久久av网站| 欧美激情久久久久久爽电影| 操出白浆在线播放| 草草在线视频免费看| 国产成人精品久久二区二区免费| 亚洲精华国产精华精| 悠悠久久av| 国产精品久久电影中文字幕| 变态另类丝袜制服| 国语自产精品视频在线第100页| 无人区码免费观看不卡| 99re在线观看精品视频| 欧美一级a爱片免费观看看| 欧美日韩乱码在线| 精品一区二区三区视频在线观看免费| 老司机午夜福利在线观看视频| 久久精品国产清高在天天线| 国产亚洲精品综合一区在线观看| a在线观看视频网站| 99国产极品粉嫩在线观看| svipshipincom国产片| 国产一区二区三区在线臀色熟女| 亚洲中文字幕日韩| 国产v大片淫在线免费观看| 亚洲精品粉嫩美女一区| 曰老女人黄片| 精品无人区乱码1区二区| 久久久成人免费电影| 欧美高清成人免费视频www| 嫁个100分男人电影在线观看| 亚洲精品一区av在线观看| 中文在线观看免费www的网站| 成在线人永久免费视频| 国产一区二区三区视频了| 亚洲精品456在线播放app | 欧美乱色亚洲激情| 十八禁人妻一区二区| 国产成人系列免费观看| 一级毛片女人18水好多| 亚洲欧美日韩卡通动漫| 18禁观看日本| www.熟女人妻精品国产| 免费观看人在逋| 久久久久久人人人人人| 精品久久久久久久久久久久久| 免费观看人在逋| 老熟妇仑乱视频hdxx| 国产精品久久电影中文字幕| 欧美日韩中文字幕国产精品一区二区三区| 欧美日韩瑟瑟在线播放| 欧美日韩福利视频一区二区| 国产欧美日韩一区二区三| 亚洲成av人片在线播放无| 欧美成狂野欧美在线观看| 午夜a级毛片| 99久久精品一区二区三区| 99riav亚洲国产免费| 色在线成人网| 夜夜躁狠狠躁天天躁| 亚洲欧美日韩卡通动漫| 欧美又色又爽又黄视频| 淫妇啪啪啪对白视频| 成人午夜高清在线视频| 国产精品影院久久| 最新美女视频免费是黄的| 少妇裸体淫交视频免费看高清| 12—13女人毛片做爰片一| 国产成人啪精品午夜网站| 久久中文字幕人妻熟女|