• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Mathematical Model Validation of Search Protocols in MP2P Networks

    2021-12-11 13:29:58AjayArunachalamVinayakumarRaviMoezKrichenRoobaeaAlroobaeaandSaeedRubaiee
    Computers Materials&Continua 2021年8期

    Ajay Arunachalam,Vinayakumar Ravi,Moez Krichen,Roobaea Alroobaea and Saeed Rubaiee

    1Centre for Applied Autonomous Sensor Systems(AASS),?rebro University,?rebro,Sweden

    2Center for Artificial Intelligence,Prince Mohammad Bin Fahd University,Khobar,Saudi Arabia

    3Faculty of CSIT,Al-Baha University,Saudi Arabia ReDCAD Laboratory,University of Sfax,Tunisia

    4Department of Computer Science,College of Computers and Information Technology,Taif University,P.O.Box 11099,Taif,21944,Saudi Arabia

    5Department of Industrial and Systems Engineering,College of Engineering,University of Jeddah,Jeddah,Saudi Arabia

    Abstract: Broadcasting is a basic technique in Mobile ad-hoc network(MANET), and it refers to sending a packet from one node to every other node within the transmission range.Flooding is a type of broadcast where the received packet is retransmitted once by every node.The naive flooding technique, floods the network with query messages, while the random walk technique operates by contacting the subsets of every node’s neighbors at each step, thereby restricting the search space.One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about locating the queried resource.Many earlier works have mainly focused on the simulation-based analysis of flooding, and its variants under a wired network.Although, there have been some empirical studies in peer-to-peer(P2P)networks,the analytical results are still lacking,especially in the context of P2P systems running over MANET.In this paper, we describe how P2P resource discovery protocols perform badly over MANETs.To address the limitations, we propose a new protocol named ABRW (Address Broadcast Random Walk),which is a lightweight search approach,designed considering the underlay topology aimed to better suit the unstructured architecture.We provide the mathematical model,measuring the performance of our proposed search scheme with different widely popular benchmarked search techniques.Further,we also derive three relevant search performance metrics, i.e.,mean no.of steps needed to find a resource, the probability of finding a resource,and the mean no.of message overhead.We validated the analytical expressions through simulations.The simulation results closely matched with our analyticalmodel,justifyingour findings.Our proposed search algorithmunder such highly dynamic self-evolving networks performed better,as it reduced the search latency,decreased the overall message overhead,and still equally had a good success rate.

    Keywords: Search protocols; random walk; MANET; P2P networks; P2P MANET; mathematical model; peer-to-peer; wireless ad hoc network;flooding; mobile P2P; unstructured; P2P; NS-2; network simulator

    Abbreviations

    DHT:Distributed Hash Table

    CAN:Content Addressable Network

    NS-2:Network Simulator-2

    P2P:Peer-to-Peer

    MANET:MobileAd hocNetwork

    RW:Random Walk

    TTL:Time To Live

    1 Introduction

    MANETs are dynamic mobile ad-hoc wireless networks that use multi-hop routing.The nodes in such networks can communicate using layer-3 (Network Layer) routing in case they are not connected at layer-2 (Data Link Layer) directly.The resource discovery process also referred to as content discovery/resource search is very challenging in such networks as there is a continuous movement of nodes.It is the process to find or locate information resources/objects.Previously,traditional search techniques like random walk and flooding were extensively employed for the resource discovery process.In flooding, the source node transmits the packet to all the other nodes in the network.Contrary to this, the packet is randomly transmitted to a few nodes in the network in the random walk approach.Although, both approaches have some disadvantages,they are used in MANETs as it suits the self-organizing nature of the network.Several previous research works have studied the effectiveness of peer-to-peer (P2P) resource discovery approaches for wired networks.The effectiveness of several content searching techniques is tested for the P2P network.But, due to problems related to energy consumption, mobility, infrastructure deficiency,and churn their performance is not validated against MANETs.The design of the resource discovery technique should be based on the characteristics of the environment where it is intended to work.In short, a resource discovery approach intended for wired context may not always scale well in a wireless environment and vice versa.To design an effective resource discovery scheme,one must consider the following features as given in Tab.1.

    Service discovery in MANETs is also another challenging issue.Service discovery in layman terms is the automatic detection of devices, and services offered by these devices on a network.Authors in [1] studied the effectiveness of the random walk approach for MANETs and they have discussed its issues like unicast transmission disadvantage, multiple query walk, valid termination check parameter, next-hop selection criteria, etc.A brief survey of various searching techniques is given in [2].P2P networks are very common, and they constitute a majority of internet traffic [3].They are known for their flexibility and distributive network properties and P2P based systems are employed over the internet for services like video conferencing applications, torrent applications, information retrieval systems, telephony, file sharing, etc.A P2P network can be classified based on the structural and behavioral characteristics as purely decentralized architecture(which can be structured or unstructured) and hybrid architecture (that can be centralized indexing or decentralized indexing).In structured P2P systems the arrangement of the peers are based on strict well organized rules, while in the unstructured P2P systems the peers connect to each other in a random fashion.The hybrid architecture is a mixture of peer-to-peer and client-server models.The centralized indexed hybrid P2P systems maintain a central index server, wherein the files and user information are stored in directory-based order.Each peer maintains a connection to the index server.In the decentralized indexed hybrid P2P systems there is no centralized index server,but here some nodes are given a more important role than the others called the super nodes,which maintain the indexes for the information shared by their local connections.The super nodes themselves are connected through a pure P2P network.We compare the different architectures of peer-to-peer systems based on features like scalability, flexibility, robustness, and manageability.We provide a schematic analysis as shown in Tab.2.The unstructured pure P2P system where the blind search techniques are used is not scalable, due to the overwhelming message exchanges.While, in a structured system, one can overcome the scalability limitation with intelligent DHTbased search strategies.The other important feature in a pure P2P system is the joining and leaving of the peers, i.e., the flexibility.The unstructured systems lack manageability as each peer is its own controller.But then such systems are robust since failure of any particular node doesn’t impact the overall system.

    Table 1:Features required for the resource discovery method and their definition

    Table 2:P2P architecture comparison

    Centralized architecture is used for most mobile communication even today and the bottleneck issue created by them can be overcome by employing the P2P platform [4].This P2P based approach suits wired and wireless networks including MANETs.Combining P2P network properties in mobilead hocnetworks is coined as P2P MANETs or Mobile P2P networks.The first mobile peer-to-peer service was a dating client.The main idea was that people with the same interest in meeting other people could specify their interests and needs by using a mobile application.Recently the trend is shifting towards social mobile networking and cooperative networking which are being implemented in this field.The MP2P encompasses different architectures such as point to point, meshed networks, and cooperative networks.Some of the key research areas for MP2P networks include data retrieval, service discovery, caching, data dissemination, query processing, routing, network architectures, resource discovery, etc.Efficient P2P application and schemes for cellular environment is still an open research area.Due to similarities in P2P and MANETs, a P2P overlay can easily be formed over MobileAd hocNetwork.An overlay network is formed by communication between the peers wherein each link of overlay corresponds to a path in an underlay physical network.But, at the same time, their direct combination also poses difficulties due to differences in the operating layer, transmission mechanism, and rapid mobility in MANETs [5-7].

    To clearly understand these networks (P2P, MANETs, P2P MANETs) we compare their similarities and differences.We summarize the differences and similarities of these networks in detail as given in Tabs.3 and 4 respectively.

    Table 3:Differences between P2P, MANET and MP2P network

    Table 4:Similarities between P2P, MANET and MP2P network

    In such a distributed environment, resource discovery is a key issue.Unstructured P2P networks mostly rely on the flooding technique.As a preliminary study, we evaluated the unstructured P2P searching techniques over MANET [8,9].According to our study, the pure random walk approach consumes more battery power, increases network overhead, has high search latency,and lowered hit rate when compared to other unstructured protocols.It is essential to take the underlay topology into consideration to improve the efficiency of the random walk protocol over the mobilead hocnetwork [10].To reduce the overhead in the classic random walk protocol, we proposed cross-layered 1-hop addressed resource discovery architecture that is more suitable for P2P-MANETs as shown in Fig.1.

    Figure 1:Cross-layered addressed search architecture

    For resolving the node neighbors & its density, we proposed a method for P2P application over MANETs, and the source code for which is publicly available in SourceForge1https://sourceforge.net/projects/neighbordiscovery/& the corresponding P2P network resource discovery simulation over MANETs with our proposed node discovery technique is made publicly available in GitHub2https://github.com/ajayarunachalam/Neighbor-Discovery.

    The rest of this paper is structured as follows.In Section 2, we review the existing work related to analytical based analysis for P2P and MANETs.Section 3 discusses the problem statement of mathematical modeling under mobile P2P networks.Analysis of flooding-based search procedures, and our proposed scheme are introduced in Section 4, and their corresponding performance measures are derived.In Section 5, we summarize our theoretical results, along with simulation-based validation, and finally, conclude in Section 6.

    2 Related Works

    In this section, we discuss the various relevant works that estimate the performance of resource discovery protocols analytically.Although there are many empirical studies and simulation-based analyses of flooding-based schemes and its variants, the mathematical results are still lacking especially in the context of P2P networks over MANET.Quickly and efficiently locating a resource is a major issue in unstructured and decentralized P2P networks.Techniques such as probabilistic forwarding, random walk, and flooding are extensively used in such unstructured architecture.Barjini et al.[11] analytically review many search techniques that are based on a flooding approach for an unstructured P2P network.They measure the coverage growth rate and traffic loads for each scheme.They introduce a metric, i.e., the critical value which is the ratio of the number of redundant messages over the coverage growth rate.According to their study and simulation results, the probabilistic limit-based flooding schemes (i.e., teeming,modified breadth-first search, random walk, etc.) have better performance than the TTL limitbased flooding schemes (such as local indices, expanding ring, iterative deepening, etc.).Bisnik et al.[12] present an analytical expression to measure the performance metrics of random walk protocol in unstructured P2P networks in terms of TTL of walkers, count of walkers, and demand of the resource.Their work focuses on a wired P2P network.Dimakopoulos et al.[13] study the performance of teeming, random path, and flooding search schemes, in P2P systems.Their study considers two scenarios, i.e., resource requests in the presence of popular and unpopular resources.Further, they assume that a cache is used to store the details of the resources and their corresponding resource providers at each node.To overcome the drawbacks observed in flooding and random walk techniques, Lin et al.[14] propose a technique that is the combination of both schemes.In the context of searching, it performs flooding for a short-term search and follows the random walk technique for a long-term search.They use Newman’s work [15] for the random graph and adopt generating functions to model distribution degrees.An alternative to the flooding scheme is the gossip protocol, where every node transmits the message to a subset of its neighbors in a random fashion based on some probability.In [16], costs of Gnutella’s flooding-based broadcasting and the classic gossip protocol are studied by varying network size and the average number of neighbors.Further, they calculate the bandwidth required for each node while using the flooding technique.They propose a deterministic gossip-based protocol and compare their performance with the flooding technique.Ferretti [17] proposes a mathematical model for the gossip-based resource discovery protocol in unstructured P2P overlay networks.Their analysis is based on complex network theory.They analyze and evaluate the count of nodes receiving the query and the amount of query hits.Specific work to model and optimize random walk protocol over MANET is presented in [18].They modeled their method using a queuing system called G-network which has positive & negative kinds of customers.Further, they used the gradient descent method to optimize their method which uses three parameters such as consumption of energy, response time, and hit rate as part of the cost function.In the above work,they justify their findings with theoretical results but haven’t simulated and evaluated the protocol in a realistic environment.Most of the aforementioned works are evaluated over a wired and fixed scenario.Further, in the case of analysis and evaluation of P2P content searching techniques under MANET, there is a lack of empirical study that considers the underlay network topology.Most of the earlier contributions are limited to the experimental/simulation based algorithmic evaluations only.This was the primary motivation behind the inception of this study especially in context to P2P MANETs.In this paper, unstructured P2P resource discovery protocols under the MANET are modeled by applying the probability and queuing theory concept.Further, our theoretical results are also validated through simulation.

    3 Mathematical Modeling

    An Overlay GraphOG=(V,E)is used to represent a P2P overlay network, whereVis the count of nodes, andEis the count of links.The vertices and the edges of this graph represent the participating peers and virtual links, respectively.Therefore,OGcan be explicitly defined as,OG=(V,E)where |V|=p andlink(i,j)∈Eifiis a neighbour ofj, and vice versa, andpis the count of peers.The underlay structure is formed by ad-hoc and peer nodes.In MANETs, the P2P platform is implemented as an overlay network at the application layer, formed by communications between the peers wherein each link of the overlay is supported by a path in the underlay physical network.In our analysis, the underlay structure is considered as a connected graphCG=(V,E)where |V|=WNandlink(i,j)∈Eif and only ifDij≤TxwhereWNis the count of wireless nodes, andDijis the Euclidean distance between them.If the Euclidean distance between 2 nodes is less thanTx(transmission range of the node), then it means that they are in the transmission range of each other.Fig.2.depicts the above explanation, where each virtual link of the overlay network is supported by a path in the underlying physical network.

    We consider an underlay network ofNnodes with varying degrees, i.e., each node has a different number ofdneighbors.Our model focuses on a flat topology without any hierarchy, i.e.,not requiring any super node or caching mechanism.To simplify the model, we assume that there is only one type of resourcexwith one node holding it, and there is only one querying node.But this situation may be more complex where the network can have different types of resources with many nodes holding it and many querying nodes.In short, the resource discovery process is how a nodeSthat needsxfinds the respective node that holds the resource.

    We assume a random network topology ofNmobile nodes where only one node provides the resourcex, and there is a single nodeSsearching for that resource.Each node knows itsdneighbors.We use the work done in [13] as the starting point for further investigation.Tab.5.contains the summary of the notations along with their descriptions that will be used in the model.

    Figure 2:P2P overlay formations

    Table 5:Notations used & derived

    To limit the broadcast storm, the search is bounded to the maximumtnumber of steps (i.e.,TTL value).Let us assume thatFis the probability of resourcexbeing known to a specific node.A node can know a resource only when it holds that resource.

    Letnxbe the count of nodes offering the resource “x”.Since a resourcexis offered by only one node, we havenx=1.

    Letabe the probability that a node is not aware of the resource.So,a=1 ?F.LetQtbe the probability of finding a resource withintsteps.We assume that withintsteps, a resource can be located.Hence, the mean of steps needed to find the resourcexis given as,

    The derivation of Eq.(3) is given at the end of the section.In the equation,Qtdepends on the searching strategy.We consider flooding, random walk and our proposed addressed random walk methods which are depicted as a d-ary tree that unfolds as the search progresses, shown in Fig.3.A tree representation may not be perfect for representing such wireless network topology as many nodes may overlap each other’s range and, multiple nodes may communicate with a single node.Yet, the tree representation can visualize the search scenario pictorially.

    Figure 3:Comparison of different flooding-based search strategies, and our proposed scheme(a) flooding (b) random walk (c) addressed random walk

    The focus of this article is on studying many decentralized resource discovery schemes.In flooding, when a resource is required by a node, it will communicate with its neighboring nodes and further those nodes will communicate with their neighbors & so on.This process will be repeated until every node in the network is communicated as shown in Fig.3a.The flooding method can find a resource without any hierarchy or prior specific information about the system,thus an ideal candidate in such dynamically evolving networks.One of the disadvantages of this pure flooding method is that it increases the network traffic exponentially.Therefore, another variation of flooding called random walk is considered.This method restricts the search space by restricting the node to communicate only one of its neighbors in a random fashion as presented in Fig.3b.The limitation of this method is that it takes more steps to find a resource.Both the above-discussed schemes have their drawbacks and limitations.From our preliminary study [4,5],we observe that the random walk scheme under MANET increases the network overhead, battery power consumption, bandwidth usage, search latency, etc.To overcome these issues, we propose a simple and lightweight resource discovery technique to suit well under MANET where the node propagates the inquiring message to exactly one of their neighbors at each hop, but at the same time end up unfolding different virtual paths concurrently, as shown in Fig.3c.

    Derivation of Eq.(3):Letsiis the probability of finding a resource inith step exactly.The probability of finding it withint≥1 steps is formulated as:

    This implies thatst=Qt?Qt?1.Under the assumption that withintsteps, the resource is found, the probability of finding it inith step exactly is given byand the mean of steps is given by:

    Substituting forst, we obtain:

    Letthe recurrence takes the following form:gt=gt?1+tQt?tQt?1, with the boundary ofg0=S0Q0=0

    Evaluatinggtwe get,

    Since,Eq.(3).follows,

    4 Performance Analysis

    4.1 Flooding Resource Discovery Algorithm

    In flooding, a node that requires the resource will flood the message to its neighbors which in turn retransmits it to their neighbors (Refer Algorithm 1).This will continue until the node that is holding the required resource is found or the TTL expires.For better understanding, the nodes in the network are represented as a d-ary tree.To visualize the situation, refer to Fig.4., where the resource requesting nodeSis the root and nodeDholds the resource being searched.Fig.4a shows a sample network where flooding technique is used while its corresponding rough d-ary tree representation is shown in Fig.4b.Within consecutive search steps, the tree will contact at mostdidifferent nodes in theith level.

    Algorithm 1:Flooding in P2P applications running over MANETs Pr ocedur e flooding(m) {querying node floods the message m message m received for the first time broadcast(m)}

    Figure 4:Resource discovery using na?ve flooding technique.(a) Searching using broadcast by flooding technique (b) d-ary tree representation

    Letbe the probability to find the resourcexwithintsteps for the flooding algorithm.Fis the probability that a resource is known to a node and ‘a(chǎn)’is the probability that a resource is not known to a node.Hence,a=1 ?F.

    At ‘0’step, the probability of not locating the resourcexis given as,

    Similarly,

    Probability of not locating in Step 2 Continuing this way, if we unfold the subsequent inquiring node’s neighbors until thetsteps,then the probability of not locating resourcexis generated as,

    From Eq.(4), it is clear than the initial boundary condition is= 1 ?a=F.The probabilityQt?1occurs only if it finds the required resource until thet?1 levels of the subtree.

    Therefore,

    Now replace 1 ?asqt, so Eq.(6) becomes,qt=a?(qt?1)d.Solving further we get,

    Now evaluating for different values oft,

    Therefore, generalized as,

    Hence Eq.(7) becomes,

    Next, we determine the average number of steps required to locate the resource.In general,the average steps needed are given as in Eq.(3).Now substituting Eqs.(8) in (3), we get the average number of steps required to find the resource withintsteps for the flooding algorithm fort≥1.

    We now compute the average number of messages that will be generated for the flooding technique.In flooding, the messages are flooded through the network.A 1-hop broadcast with the message will be transmitted by the nodeS.Once the message is received by the 1-hop neighbors,the processed messages list will be updated with the newly received message’s sequence ID.This is done to avoid retransmitting the same message again in case if the message is received again through a different path.Now, if the required resource is held by a neighboring nodeD, an exclusive multi-hop reply will be transmitted by nodeDthrough the path resolved by routing protocol to the sourceS.However, even after the transmission of the resource reply message,the request message may be forwarded meaninglessly by all the other nodes that have received the request until every node in the network is reached.So, under MANETs, “d” messages will be generated by “d” neighboring nodes of the root, plus for the internal subtrees of those neighboring nodes.Thus,

    where,m(t?1)denotes the transmission along the subtreeTwith(t?1)levels.In a subtreeT,if the resourcexis located at the root, a response will be sent to the querying node or elsedmessages will be generated by the child nodes plus the generated messages internally for each respective child subtreesTwith(t?2)levels.

    Symbolically it means,

    which has initial boundary condition ofm(0)=1.After evaluating the recurrence, we get,

    Now substituting Eq.(12) in Eq.(11) and evaluating further we have,

    4.2 Random Walk Resource Discovery Algorithm

    In the random walk algorithm under MANET, the querying node transmits the message to a specific neighboring nodenthat is selected in a random fashion from a list of neighbors resolved from the routing layer information over a unicast transmission (Refer Algorithm 2).For such a random walk scenario, beprandomly unfolding paths to reach the destination, i.e., the node sends the request top≥1 of its neighboring nodes and each of those neighboring nodes will unfold a random path of which one possibility is shown in Fig.5.

    Algorithm 2:Random walk in P2P applications running over MANETs Procedure randomwalk(m) {querying node resolves neighbours from routing layer select random node n fro m the neighbour list message m received for the first time unicast(m)}

    Figure 5:Resource discovery using random walk technique.(a) Searching the network using classic random walk protocol (b) d-ary tree representation

    Letbe the probability of finding a resource withintsteps for the random walk algorithm wherepis one of the randomly unfolding paths of lengtht?1.Fis the probability that a resource is known to a node andais a probability that a resource is not known to a node.Hence,a=1 ?F.At “0”, step the probability of not locatingxis given as,

    where(1 ?F)is the probability that a resource is not known to a given node and(1 ?qt?1)is the probability of not finding the resource in one of the “p” randomly unfolding paths of lengtht?1.

    After further evaluation we get,

    The average number of steps needed in general to locate the resourcexis given in Eq.(3).Now substituting Eq.(15) in Eq.(3) we get the average number of steps needed to find a resource withintsteps for the random walk algorithm forp≥1,t≥1.

    which further is evaluated to,

    Finally, we compute the avg.generated messages in the random walk scheme under MANET which is different from that as in the wired network.The unicast transmission uses the routing layer information in a standard random walk algorithm under MANET.But the issue is that the nodes move continuously in MANETs.Therefore, there will be a rapid change of neighbors of all nodes over time.So, such transmission may often lead to failure since the topology of the network changes rapidly.Also, this leads to frequent re-route discovery which increases the message overhead.Hence, the overall message generated will be much more than the normal for each path due to the failure thereby incurring frequent re-route discovery at every hop.In such a dynamic scenario, there will bepmessages generated bydneighbors for everypof its children,plus the messages generated in each of theppaths.

    where,m(t?1)denotes the transmissions that take place along a pathpoft?1 nodes.

    For such a pathp, the reply will be unicasted through the path resolved by the routing protocol if resourcexis located at the root node.Further, the query will be terminated at that moment since the received message also contains the addressSand the process will get terminated or else a message will be generated while forwarding to next node of the path plus the message generated inside the subpathp′witht?2 nodes rooted at the next node.This gives the recurrence relation:

    where,m(0)=1.On solving the recurrence relation, we get:

    Now substituting Eq.(18) in Eq.(17) it gives:

    4.3 Addressed Broadcast Random Walk(ABRW)Resource Discovery Algorithm

    To reduce the overhead in the classic random walk protocol, we proposed a cross-layered 1-hop addressed random walk resource discovery protocol [10] which is more suitable for P2P MANETs as shown in Fig.1.Our technique is based on the addressed broadcast transmission mechanism in which the querying node will pass the request to a particular random node over a 1-hop addressed broadcast transmission, i.e., the request is forwarded to that node, while the neighboring nodes within the hop range can overhear and receive the request, but only the addressed node will process the request further and continue the resource discovery (Refer Algorithm 3).The P2P agent at the application layer will process it differently based on the message content.In short, every neighbor node will receive the message at its application layer, but inside the message, there will be the nodeID for which that message is addressed to.So, that node will only try to forward the message again.For our addressed random walk algorithm also, there will be aprandomly unfolding paths that can be followed to reach the destination.Our scheme is different from the standard random walk protocol as even thedoverhearing neighbors can also see or receive the message, and hence there is a high probability of reaching the destination as the intermediate nodes can also reply if they have the resourcexalong the pathp.And onlypmessages will be generated for itspchildren, as the addressed node will only continue with the resource discovery process further, i.e., the node transmits the message top≥1 of its neighbors where each such neighbor unfolds a sub-tree withdneighbors of lengtht?1 where everydneighbors can also overhear the message.Letbe the probability of locating a resource withintsteps for our proposed scheme wherepis one of the randomly unfolding paths and for every suchpchildren it unfolds a sub-tree of lengtht?1 with theirdneighbors shown in Fig.6.

    Algorithm 3:Addressed broadcast random walk in P2P applications running over MANETs Proce dure a ing noddressedrandomwalk(m) {queryde resolves neighbours from routing layer select random node n from the neighbour list message m received for the first time 1-hop addressedbroacast(m)}

    LetFbe the probability that a resource is known to a node, andais the probability that a resource is not known to a node.Hence,a=1 ?F.At step “0”, the probability of not locatingxis given as,

    Figure 6:Resource discovery using addressed broadcast random walk technique.(a) Searching the network using addressed broadcast random walk technique (b) corresponding d-ary tree representation

    Now,

    1 ?= Probability that ‘x’is not found in ‘t’step

    1?= (Probability that ‘x’is not found in ‘0’step) * (Probability that ‘x’is not occur in‘1’to ‘t’step)

    where, 1 ?Pt?1is the probability of not locating the resource in one ofprandomly unfolding sub-tree of lengtht?1 withdneighbors.

    Now substituting Eqs.(21) in (20) we have,

    Hence,

    In our proposed random walk technique, the probability of findingxis high at eachpchildren along the path, as even thedneighbors can respond immediately.Hence, the number of steps required to find the resource will be minimal when compared to the other discussed techniques.

    The average number of steps needed to find the resource “x”can be found using Eq.(3), now substituting Eqs.(22) in (3) we have,

    which further evaluates to,

    Next, we compute the average number of generated messages for our proposed algorithm.In our resource discovery scenario, the nodes reply directly to the querying node.Ifxis not offered by the addressed node then there will be one fixed message generated while forwarding to every addressed child node and the message generated in each of theppaths.

    where,m(t?1)are the transmission occurring along the pathpoft?1 nodes.

    For such a pathp, if resourcexis found in its addressed node or any of itsdneighbors of the broadcasting node then it will generate a reply to the querying node which is unicasted back using the path resolved by the routing protocol, and the query gets terminated only if the reply was from the addressed node or else a message will be generated while forwarding to next addressed node of the path plus the message generated inside the subpathp′witht?2 nodes rooted at the next node.This gives the recurrence relation:

    where,m(0)=1, since the last node receiving the message will always reply to the querying node whether it knowsxor not.On solving the recurrence relation, we get:

    Now substituting Eq.(25) in Eq.(24) it gives:

    5 Theoretical Analysis&Model Validation

    We compare the three search strategies analytically with the following settings.The network consists ofN=100 nodes, andnx=1 (as only one node holds the resource “x”).We consider for two different node degrees, i.e., sparse (d=4) and dense (d=6) scenarios.We evaluate withp=1 andp=4 paths for both the random walk protocol and our proposed method.We measure the probability of not finding the resource within “t” steps (1 ?Qt), the average number of steps required (), and the number of messages generated within “t” steps () for each of the algorithms.The results are shown in Fig.7.

    The mathematical results are summarized in Tab.6.for each of the compared search techniques with our proposed protocol.

    We validate the search strategy models by comparing the theoretical analysis and simulation results.To verify the proposed theoretical analysis, we perform a series of simulations using NS-2.In the simulation, upon initialization a network area is set withNnodes, each havingdrandom neighbors.The maximum speed of the nodes is set to 20 m/s.The resourcexis assigned to a random node.The transmission range is set at 250 m, and the simulation time is 200 sec.A node randomly initiates a resource request for the resource.Pause time is set to 20 s.We verify for the varying node degrees, i.e., sparse (d=4) and dense (d=6) scenarios.Fig.8 shows the comparisons between the simulation results (patterned lines) and analytical results (unpatterned lines) for the number of messages generated, the number of steps required, and the probability of resource being not found, i.e., the flag denoting the status of unsuccessful search.For each of the search schemes, an average of 30 scenarios is considered.The simulation results closely match the analytical results in most of the cases.

    Table 6:Performance Measures (t ≥1,p ≥1,Q0=1 ?a)

    As a part of our future work, it would be interesting to investigate adapting the P2P communication design for mobile intelligence of things as an alternative to internet access.Security is very critical in such intelligence of things architectures [19-22].As of now, we have not focused on the security attacks scenario within the discovery process in general.As a part of our continued research effort, we will certainly investigate this dimension as part of our future works.

    Figure 7:Comparisons of the search techniques using the metrics:probability of not finding the resource, average number of steps to locate the resource, and average number of messages generated

    Figure 8:Simulation (dotted lines) and analytical (plain lines)

    6 Conclusion

    The contributions of this article are as follows:- 1) Theoretical modeling of the popular search algorithms, and deriving key analytical measures for evaluating their performances are done.2) Mathematical modeling of our proposed addressed broadcast resource discovery protocol is done, focused towards optimizing random walk algorithm over MANETs.Such, evaluation in context to mobile Peer-to-Peer networks is not done before.3) Simulation based validation of the analytical/theoretical estimations is done, for justifying the theoretical results.This paper largely focuses on the general issues of resource discovery under a highly dynamic mobile P2P network.Specifically, the performance of well-known and widely used benchmark techniques, i.e., random walk, and flooding algorithms are studied.Flooding scheme tries to locate the resource in an aggressive manner by visiting almost all the nodes and thereby suffers from scalability issues due to the generation of an enormous amount of query messages.On the contrary, the random walk scheme searches conservatively, but it still generates a huge amount of query messages at each hop, and consumes more power under MANETs, while further increasing the search latency.To alleviate these problems, we propose an improved random walk scheme suitable for P2P MANETs,i.e., an addressed random walk protocol which is a hybrid cross-layered strategy of flooding and random walk techniques aimed to suit well for such highly dynamic self-evolving networks.We present an analytical model to estimate the performance of each strategy based on the metrics that include the probability of finding a resource, the mean no.of steps needed to locate a resource,and the mean no.of messages generated during the resource discovery process.We further validate the mathematical models through simulations.The results justify our findings, as our proposed scheme reduces the search latency, decreases the message overhead, and equally has a good hit rate.To further verify the robustness of our proposed technique, as future work, we plan to test the algorithm under different mobility models especially the Reference Point Group Mobility(RPGM) with sparse & dense network scenarios, to reaffirm the efficacy.

    Acknowledgement:We are thankful to all the collaborating partners.

    FundingStatement:Taif University Researchers Supporting Project number (TURSP-2020/36), Taif University, Taif, Arabia Saudi.

    Conflicts of Interest:The authors declare that they have no conflicts of interest.

    久久久久久久大尺度免费视频| 人体艺术视频欧美日本| 91aial.com中文字幕在线观看| 少妇的丰满在线观看| 中文字幕av电影在线播放| 亚洲精品第二区| 久久狼人影院| 精品福利永久在线观看| 夫妻午夜视频| 午夜激情av网站| 在线观看一区二区三区激情| 久久久久久久久久人人人人人人| 国产国语露脸激情在线看| av一本久久久久| 中文乱码字字幕精品一区二区三区| 伊人久久国产一区二区| 亚洲国产看品久久| 蜜桃在线观看..| 中文天堂在线官网| 黑人猛操日本美女一级片| 丝袜美足系列| 国产爽快片一区二区三区| 久久av网站| 日产精品乱码卡一卡2卡三| 日本猛色少妇xxxxx猛交久久| 大香蕉97超碰在线| 国产淫语在线视频| 国产永久视频网站| 一边亲一边摸免费视频| 免费黄色在线免费观看| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 内地一区二区视频在线| 亚洲久久久国产精品| 超色免费av| 免费av中文字幕在线| 曰老女人黄片| 亚洲精华国产精华液的使用体验| 视频在线观看一区二区三区| 久久影院123| 亚洲五月色婷婷综合| 精品人妻在线不人妻| 人成视频在线观看免费观看| 91久久精品国产一区二区三区| 丝袜脚勾引网站| 久久久久久久亚洲中文字幕| 一级片免费观看大全| 国产精品免费大片| a级毛色黄片| 亚洲精品一二三| 国产精品国产三级专区第一集| 欧美精品av麻豆av| 香蕉精品网在线| 久久久久精品人妻al黑| 日韩不卡一区二区三区视频在线| 亚洲欧美清纯卡通| 国产色婷婷99| 一级,二级,三级黄色视频| 亚洲欧洲日产国产| 亚洲国产色片| 欧美激情 高清一区二区三区| 免费高清在线观看视频在线观看| av在线播放精品| 久久久久久久大尺度免费视频| 九草在线视频观看| 国产精品国产三级国产av玫瑰| 人妻人人澡人人爽人人| 久久精品熟女亚洲av麻豆精品| 国产免费一级a男人的天堂| 午夜激情久久久久久久| 久久人人爽人人片av| 午夜免费男女啪啪视频观看| 日本午夜av视频| av在线播放精品| 久久久久久人妻| 国产白丝娇喘喷水9色精品| 视频区图区小说| 99久久综合免费| 亚洲国产精品国产精品| 午夜福利网站1000一区二区三区| 激情五月婷婷亚洲| 久久久久久久国产电影| 欧美最新免费一区二区三区| 又粗又硬又长又爽又黄的视频| 在现免费观看毛片| 宅男免费午夜| 久久久久精品久久久久真实原创| 我要看黄色一级片免费的| 亚洲欧美色中文字幕在线| 满18在线观看网站| 国产精品三级大全| 97精品久久久久久久久久精品| 热99久久久久精品小说推荐| 久久久久精品久久久久真实原创| 免费日韩欧美在线观看| 亚洲,欧美精品.| 国产精品成人在线| 王馨瑶露胸无遮挡在线观看| 久久狼人影院| 大香蕉久久成人网| 18禁在线无遮挡免费观看视频| 高清在线视频一区二区三区| 男女边摸边吃奶| 欧美精品av麻豆av| 老熟女久久久| 男的添女的下面高潮视频| 一级毛片电影观看| 在线亚洲精品国产二区图片欧美| 免费观看在线日韩| 夫妻午夜视频| 国产爽快片一区二区三区| 成人亚洲欧美一区二区av| 爱豆传媒免费全集在线观看| 少妇熟女欧美另类| videosex国产| 日本猛色少妇xxxxx猛交久久| 侵犯人妻中文字幕一二三四区| 免费在线观看完整版高清| 日本午夜av视频| 久久午夜福利片| 久久国产精品男人的天堂亚洲 | 国产精品久久久久久精品古装| 成年人免费黄色播放视频| 久久这里只有精品19| 99久久精品国产国产毛片| 美女中出高潮动态图| 男女边摸边吃奶| 校园人妻丝袜中文字幕| 99久久人妻综合| 国产成人精品久久久久久| √禁漫天堂资源中文www| 韩国高清视频一区二区三区| 成人亚洲欧美一区二区av| 一级片'在线观看视频| 狂野欧美激情性bbbbbb| 色94色欧美一区二区| 亚洲一级一片aⅴ在线观看| a级毛片黄视频| 国产不卡av网站在线观看| 亚洲熟女精品中文字幕| 国产精品熟女久久久久浪| 80岁老熟妇乱子伦牲交| 日本色播在线视频| 欧美国产精品va在线观看不卡| 国产午夜精品一二区理论片| 观看av在线不卡| 91精品国产国语对白视频| 午夜福利视频在线观看免费| 黄片无遮挡物在线观看| 2021少妇久久久久久久久久久| 午夜免费男女啪啪视频观看| 看非洲黑人一级黄片| 午夜老司机福利剧场| 日韩一区二区视频免费看| av播播在线观看一区| 亚洲高清免费不卡视频| 女性生殖器流出的白浆| 中文字幕人妻熟女乱码| 曰老女人黄片| 久久精品人人爽人人爽视色| 亚洲欧洲精品一区二区精品久久久 | 成人亚洲欧美一区二区av| 2018国产大陆天天弄谢| 久久久精品区二区三区| 看十八女毛片水多多多| 国产高清国产精品国产三级| 在线观看人妻少妇| 亚洲色图 男人天堂 中文字幕 | 日本黄色日本黄色录像| 又粗又硬又长又爽又黄的视频| 国产精品一二三区在线看| 大香蕉久久网| 中文字幕最新亚洲高清| 久久久a久久爽久久v久久| freevideosex欧美| av不卡在线播放| kizo精华| 亚洲伊人久久精品综合| 欧美丝袜亚洲另类| 亚洲一码二码三码区别大吗| 亚洲情色 制服丝袜| 久久精品国产a三级三级三级| 人成视频在线观看免费观看| av国产久精品久网站免费入址| 日韩精品免费视频一区二区三区 | 男人爽女人下面视频在线观看| 熟女av电影| 国产精品秋霞免费鲁丝片| 黄色视频在线播放观看不卡| 99国产综合亚洲精品| 免费av中文字幕在线| 男人舔女人的私密视频| 亚洲精品aⅴ在线观看| 色视频在线一区二区三区| av在线app专区| 婷婷色麻豆天堂久久| videossex国产| 另类亚洲欧美激情| 精品国产一区二区久久| 超碰97精品在线观看| 成人亚洲精品一区在线观看| 精品久久国产蜜桃| 女的被弄到高潮叫床怎么办| 久久久亚洲精品成人影院| 久久韩国三级中文字幕| 国产又色又爽无遮挡免| 日韩中文字幕视频在线看片| 亚洲美女搞黄在线观看| 一区二区三区精品91| 午夜老司机福利剧场| 亚洲精品一二三| 如日韩欧美国产精品一区二区三区| 国产在视频线精品| 久久鲁丝午夜福利片| 大码成人一级视频| av线在线观看网站| 欧美日韩视频精品一区| 欧美xxxx性猛交bbbb| 看十八女毛片水多多多| 综合色丁香网| 国产亚洲精品第一综合不卡 | 自线自在国产av| 天天躁夜夜躁狠狠久久av| 91精品国产国语对白视频| 两个人免费观看高清视频| 精品一区二区免费观看| 亚洲国产欧美日韩在线播放| 免费高清在线观看视频在线观看| 下体分泌物呈黄色| 免费女性裸体啪啪无遮挡网站| 在线观看美女被高潮喷水网站| 国产色爽女视频免费观看| av在线观看视频网站免费| 亚洲精品国产av成人精品| 99re6热这里在线精品视频| 亚洲av男天堂| 春色校园在线视频观看| 欧美丝袜亚洲另类| 人人澡人人妻人| 丝袜脚勾引网站| 中国美白少妇内射xxxbb| 精品人妻偷拍中文字幕| 日韩大片免费观看网站| 99久久综合免费| 熟妇人妻不卡中文字幕| 精品酒店卫生间| 99热国产这里只有精品6| 国产免费一区二区三区四区乱码| 中文字幕亚洲精品专区| 欧美最新免费一区二区三区| 国产男女内射视频| 在线免费观看不下载黄p国产| 国产伦理片在线播放av一区| 中文欧美无线码| 91精品国产国语对白视频| 亚洲伊人色综图| 你懂的网址亚洲精品在线观看| 国产亚洲欧美精品永久| 午夜91福利影院| 成年av动漫网址| 性高湖久久久久久久久免费观看| 草草在线视频免费看| 最后的刺客免费高清国语| 亚洲欧美色中文字幕在线| 日产精品乱码卡一卡2卡三| 免费观看性生交大片5| 久久久久久人妻| 日本免费在线观看一区| 亚洲伊人久久精品综合| 99久国产av精品国产电影| 极品少妇高潮喷水抽搐| 亚洲欧美精品自产自拍| 色哟哟·www| 亚洲成人一二三区av| videosex国产| 国产精品人妻久久久影院| 亚洲欧美一区二区三区国产| 捣出白浆h1v1| 色视频在线一区二区三区| 午夜视频国产福利| 国产精品三级大全| 成年动漫av网址| 一级毛片 在线播放| 18禁动态无遮挡网站| 丝袜人妻中文字幕| 侵犯人妻中文字幕一二三四区| 国产免费福利视频在线观看| 又黄又粗又硬又大视频| 99视频精品全部免费 在线| 亚洲精品久久午夜乱码| 高清视频免费观看一区二区| 欧美性感艳星| 欧美激情 高清一区二区三区| 一边亲一边摸免费视频| 亚洲国产看品久久| 国产成人精品婷婷| 日本欧美视频一区| 极品人妻少妇av视频| 美女视频免费永久观看网站| 如日韩欧美国产精品一区二区三区| 国产黄色视频一区二区在线观看| 交换朋友夫妻互换小说| 成年人午夜在线观看视频| 久久国产精品大桥未久av| 亚洲精品久久午夜乱码| 日本黄色日本黄色录像| 免费观看性生交大片5| 久久亚洲国产成人精品v| 免费久久久久久久精品成人欧美视频 | 午夜影院在线不卡| 久久久国产精品麻豆| 在线观看国产h片| 久久这里有精品视频免费| 18禁裸乳无遮挡动漫免费视频| 国产欧美日韩一区二区三区在线| 日本午夜av视频| 天堂俺去俺来也www色官网| 天天操日日干夜夜撸| 亚洲欧美清纯卡通| 亚洲第一区二区三区不卡| 午夜福利视频精品| a级片在线免费高清观看视频| 午夜激情久久久久久久| 成年动漫av网址| 大码成人一级视频| 亚洲国产看品久久| 国产男女内射视频| 久久久精品免费免费高清| 自拍欧美九色日韩亚洲蝌蚪91| 精品亚洲成a人片在线观看| 成人国产麻豆网| 女的被弄到高潮叫床怎么办| 免费在线观看黄色视频的| 一二三四在线观看免费中文在 | 亚洲高清免费不卡视频| 国产高清不卡午夜福利| 91精品国产国语对白视频| 精品少妇黑人巨大在线播放| 人人妻人人添人人爽欧美一区卜| 十八禁网站网址无遮挡| 精品少妇久久久久久888优播| 免费在线观看完整版高清| 欧美精品av麻豆av| 国产伦理片在线播放av一区| 人人妻人人添人人爽欧美一区卜| 亚洲精品美女久久av网站| 色视频在线一区二区三区| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 黑人欧美特级aaaaaa片| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 欧美另类一区| kizo精华| 国产成人av激情在线播放| 亚洲精华国产精华液的使用体验| 9色porny在线观看| 欧美+日韩+精品| 美女xxoo啪啪120秒动态图| 97超碰精品成人国产| 黑人猛操日本美女一级片| 亚洲精品久久成人aⅴ小说| 搡女人真爽免费视频火全软件| 人妻少妇偷人精品九色| 精品国产国语对白av| 日韩欧美一区视频在线观看| 18在线观看网站| 亚洲婷婷狠狠爱综合网| 99国产精品免费福利视频| 国国产精品蜜臀av免费| 亚洲精品一区蜜桃| 22中文网久久字幕| 天堂8中文在线网| 亚洲少妇的诱惑av| 国产极品天堂在线| 亚洲婷婷狠狠爱综合网| 国产av一区二区精品久久| 亚洲美女视频黄频| 免费黄色在线免费观看| 插逼视频在线观看| 美女xxoo啪啪120秒动态图| 99久久人妻综合| 男女下面插进去视频免费观看 | 麻豆精品久久久久久蜜桃| 国产免费现黄频在线看| 国产亚洲欧美精品永久| 激情视频va一区二区三区| 波野结衣二区三区在线| 亚洲欧洲日产国产| 在线 av 中文字幕| 18禁国产床啪视频网站| 日韩大片免费观看网站| 精品亚洲成国产av| 日韩三级伦理在线观看| 亚洲国产毛片av蜜桃av| 777米奇影视久久| 国产一区有黄有色的免费视频| 亚洲伊人久久精品综合| 日日啪夜夜爽| 男人操女人黄网站| 亚洲av综合色区一区| 欧美亚洲 丝袜 人妻 在线| 在线免费观看不下载黄p国产| 亚洲精品自拍成人| 美女视频免费永久观看网站| 搡女人真爽免费视频火全软件| 亚洲伊人色综图| 十分钟在线观看高清视频www| 国产精品久久久av美女十八| 欧美另类一区| 十八禁网站网址无遮挡| 好男人视频免费观看在线| 在线天堂最新版资源| av不卡在线播放| 久久久久久久久久久久大奶| 少妇 在线观看| 两性夫妻黄色片 | 全区人妻精品视频| 国产成人a∨麻豆精品| 欧美人与善性xxx| 免费观看无遮挡的男女| 不卡视频在线观看欧美| 欧美性感艳星| 亚洲精品美女久久久久99蜜臀 | 22中文网久久字幕| 热re99久久精品国产66热6| 美女主播在线视频| 精品亚洲成a人片在线观看| 亚洲av福利一区| 少妇被粗大的猛进出69影院 | 精品一区二区三卡| 国产日韩一区二区三区精品不卡| 少妇高潮的动态图| 中文字幕精品免费在线观看视频 | 香蕉精品网在线| 国产极品粉嫩免费观看在线| 91成人精品电影| 日韩av免费高清视频| 免费看不卡的av| 亚洲国产精品一区三区| 岛国毛片在线播放| 国产精品久久久久成人av| 男的添女的下面高潮视频| 三级国产精品片| 美女主播在线视频| 丝袜喷水一区| 中文字幕最新亚洲高清| 国产在线视频一区二区| 99九九在线精品视频| 国产福利在线免费观看视频| 韩国高清视频一区二区三区| 日本wwww免费看| 久久国产精品男人的天堂亚洲 | 黄色配什么色好看| 日韩欧美精品免费久久| 一级片免费观看大全| 妹子高潮喷水视频| 亚洲伊人久久精品综合| 久热这里只有精品99| 人人妻人人添人人爽欧美一区卜| 大陆偷拍与自拍| 国产片特级美女逼逼视频| 国产免费又黄又爽又色| 搡女人真爽免费视频火全软件| 亚洲av在线观看美女高潮| 七月丁香在线播放| 国产精品久久久av美女十八| 有码 亚洲区| 免费看不卡的av| 黄片播放在线免费| 国产一区二区激情短视频 | 久久人人爽人人爽人人片va| 亚洲精品久久成人aⅴ小说| 男女边吃奶边做爰视频| 18+在线观看网站| 9色porny在线观看| 五月开心婷婷网| 日韩欧美精品免费久久| 免费观看性生交大片5| 免费av不卡在线播放| av电影中文网址| 日本黄大片高清| 熟女人妻精品中文字幕| 中文欧美无线码| 亚洲精品国产av蜜桃| 亚洲国产精品专区欧美| 天天影视国产精品| 91久久精品国产一区二区三区| 亚洲,欧美精品.| 久久97久久精品| 国产白丝娇喘喷水9色精品| 国产亚洲精品久久久com| 边亲边吃奶的免费视频| a级毛片黄视频| 亚洲av中文av极速乱| 另类精品久久| 免费播放大片免费观看视频在线观看| 男女午夜视频在线观看 | 午夜视频国产福利| 日韩成人av中文字幕在线观看| 性高湖久久久久久久久免费观看| 亚洲精品国产av成人精品| 亚洲精品aⅴ在线观看| 麻豆乱淫一区二区| 精品国产乱码久久久久久小说| 精品亚洲乱码少妇综合久久| 又粗又硬又长又爽又黄的视频| 久久毛片免费看一区二区三区| 在线观看美女被高潮喷水网站| 免费av不卡在线播放| 日本欧美国产在线视频| 这个男人来自地球电影免费观看 | 免费av中文字幕在线| 亚洲精品美女久久久久99蜜臀 | 夜夜爽夜夜爽视频| 中文字幕最新亚洲高清| 国产一区二区激情短视频 | 夫妻午夜视频| 亚洲,欧美精品.| 国产免费视频播放在线视频| 久久人妻熟女aⅴ| 久久久久国产精品人妻一区二区| 日本与韩国留学比较| 男人舔女人的私密视频| 精品午夜福利在线看| kizo精华| 午夜福利视频精品| 亚洲av日韩在线播放| 热re99久久精品国产66热6| 中国三级夫妇交换| 亚洲性久久影院| 亚洲欧美清纯卡通| 91aial.com中文字幕在线观看| 午夜福利视频在线观看免费| 人人澡人人妻人| 亚洲第一区二区三区不卡| 亚洲成人一二三区av| 精品久久蜜臀av无| 亚洲精品美女久久av网站| 国产精品嫩草影院av在线观看| 一区在线观看完整版| 国产精品麻豆人妻色哟哟久久| 9色porny在线观看| 永久网站在线| 18禁动态无遮挡网站| 免费久久久久久久精品成人欧美视频 | 日本与韩国留学比较| 久久久a久久爽久久v久久| 国产精品女同一区二区软件| 免费观看在线日韩| 亚洲国产欧美日韩在线播放| 国产男女内射视频| 亚洲成色77777| 一二三四在线观看免费中文在 | 女的被弄到高潮叫床怎么办| 有码 亚洲区| 90打野战视频偷拍视频| 国产日韩欧美视频二区| 久久久久视频综合| 精品少妇黑人巨大在线播放| 国产精品久久久久久精品电影小说| 又大又黄又爽视频免费| 午夜免费男女啪啪视频观看| 国语对白做爰xxxⅹ性视频网站| 18在线观看网站| 极品少妇高潮喷水抽搐| 观看美女的网站| 亚洲欧美精品自产自拍| 久久久久久久国产电影| 伦理电影免费视频| 香蕉丝袜av| 啦啦啦啦在线视频资源| 午夜激情av网站| 亚洲一区二区三区欧美精品| 国产亚洲av片在线观看秒播厂| 视频中文字幕在线观看| 狠狠婷婷综合久久久久久88av| 另类精品久久| 亚洲国产欧美在线一区| 九草在线视频观看| 欧美xxxx性猛交bbbb| av免费在线看不卡| 亚洲精品美女久久久久99蜜臀 | 26uuu在线亚洲综合色| 国产av一区二区精品久久| 一级毛片我不卡| 国产 一区精品| 精品一品国产午夜福利视频| 精品国产国语对白av| 国产精品无大码| 久久精品熟女亚洲av麻豆精品| 美女内射精品一级片tv| 久久99蜜桃精品久久| 国产淫语在线视频| videossex国产| 制服诱惑二区| 精品视频人人做人人爽| 嫩草影院入口| 中文欧美无线码| 亚洲丝袜综合中文字幕| 亚洲国产最新在线播放| av免费观看日本| 国产精品国产av在线观看| 婷婷色综合www| 26uuu在线亚洲综合色| 18禁国产床啪视频网站| 五月天丁香电影| 精品一区二区免费观看| 久久精品国产亚洲av涩爱| 欧美xxxx性猛交bbbb| 亚洲精品乱久久久久久| 国产成人精品福利久久| 麻豆精品久久久久久蜜桃| 五月玫瑰六月丁香| 久久久国产精品麻豆| 国产无遮挡羞羞视频在线观看| 免费久久久久久久精品成人欧美视频 | 免费在线观看黄色视频的|