• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Traffic Queuing Management in the Internet of Things:An Optimized RED Algorithm Based Approach

    2021-12-14 03:49:12AbdulWaheedNailaHabibKhanMahdiZareeiShahabUlIslamLatifJanArifIqbalUmarandEhabMahmoudMohamed
    Computers Materials&Continua 2021年1期

    Abdul Waheed,Naila Habib Khan,Mahdi Zareei,Shahab Ul Islam,Latif Jan,6,Arif Iqbal Umar and Ehab Mahmoud Mohamed

    1Department of Information Technology,Hazara University,Mansehra,21120,Pakistan

    2School of Electrical and Computer Engineering,Seoul National University,Seoul,08826,Korea

    3Department of Computer Science,Institute of Management Sciences,Peshawar,25000,Pakistan

    4Tecnologico de Monterrey,School of Engineering and Sciences,Zapopan,45201,Mexico

    5Department of Computer Science,IQRA National University,Peshawar,25124,Pakistan

    6Department of Electrical Engineering,University of Engineering Technology,Peshawar,25120,Pakistan

    7Electrical Engineering Department,College of Engineering,Prince Sattam Bin Abdulaziz University,Wadi Addwasir,11991,Saudi Arabia

    8Electrical Engineering Department,Faculty of Engineering,Aswan University,Aswan,81542,Egypt

    Abstract:Congestion control is one of the main obstacles in cyberspace traffic.Overcrowding in internet traffic may cause several problems;such as high packet hold-up,high packet dropping,and low packet output.In the course of data transmission for various applications in the Internet of things,such problems are usually generated relative to the input.To tackle such problems,this paper presents an analytical model using an optimized Random Early Detection(RED)algorithm-based approach for internet traffic management.The validity of the proposed model is checked through extensive simulation-based experiments.An analysis is observed for different functions on internet traffic.Four performance metrics are taken into consideration,namely,the possibility of packet loss,throughput,mean queue length and mean queue delay.Three sets of experiments are observed with varying simulation results.The experiments are thoroughly analyzed and the best packet dropping operation with minimum packet loss is identified using the proposed model.

    Keywords:Random early detection(RED);active queue management(AQM);quality of service(QOS);throughput

    1 Introduction

    Internet of Things(IoT)refers to direct communication between the physical and digital world[1].IoT is the collection of two words:“Internet” and “Thing”;the internet is the communication among computers based on TCP/IP protocols while the thing is any object that is not accurately recognizable.Thus,IoT semantically means a network of interconnected objects uniquely addressable,based on TCP/IP.IoT can also be defined as that the communication among things and people at any place/time through any service and path[2].Since the day of its development,it has got massive identification and consideration for potential IoT applications.The IoT was firstly introduced in 1999 for inter-communication of information,however,today it serves as a key facilitator in different fields such as the smart grids,smart cities,precision medicine and intelligent transportation systems,etc.Furthermore,IoT is creating innovative distinct applications,business models and markets with the emergence of its 5G technology,which observes delay performance and high data rate[3].IoT is one of the limelight innovations which has this capability to provide infinite benefits to our society.IoT technology enhances the quality of critical operations in terms of attaining efficient collaboration.However,one condition that needs to be guaranteed for such applications,i.e.,the response time and QoS requirements[4].

    Formerly,the IoT was designed to use different types of sensors to gather data from the environment to store and process it automatically and reduce human efforts[5].The future of IoT is to grasp the phase at which many of the objects in the world will have the ability to get connected with the internet for communication without any human interference.Currently,IoT is the main powerful force behind modernizing all aspects of the technology,since,it is a very challenging task for the continuous integration of all the technologies.The research in the next-generation IoT covers the current development areas like 5G spectrum potential for intelligent IoT,the coexistence of wireless technologies,Device to Device(D2D)Communications,Vehicular to Everything(V2X),caching techniques in cellular networks,and congestion management in the networks.The development of IoT technologies ourishing the remote accessibility and connectivity,availability at the lowest prices and the adaptation of standards are very necessary for IoT for the communication between these heterogeneous networks[6].To evaluate an analytical model,the best dropping operation should generate the following results using the performance metrics as given below:

    -Achievement of lowest packet dropping possibility:It can be achieved when the optimum function is increased by the threshold value.It is expected to generate minimum packets drop possibility in comparison to other functions.

    - Highest throughput in the network delayed due to achievement of minimum proliferation:The best possible operation should attain a low delay of the network at the highest throughput in comparison to other operations.

    - Discover the best possible size of the average queue:The computed mean of the size of the queue should consider being the best perspectives to the highest threshold in comparison to other operations.

    Recently,there is a huge demand for application services that operate at immensely high speed on the Internet.Additionally,this high speed is desired to be delivered while accommodating all of the Quality-of-Service(QoS)parameters.The principal significance is to ensure the QoS in certain delay-sensitive applications in the network of smart devices.The memory capacity of the existing switches and routers is limited.Therefore,usually,incoming web traffic goes beyond the extrovert buffer size.When the buffer is over own congestion takes place that leads to network collapse and loss of packets.Congestion also causes packet delays during the transmission.Hence,insufficient information is retrieved and it drastically degrades the standard of internet services.Therefore,an efficient traffic queue management model is required to overcome the net-work congestion.

    This research article presents an optimized analytical model for traffic queue management in a network.The main objective is to obtain a mathematical solution that is optimum and results in enhanced performance metrics.This objective is fulfilled by taking into consideration and observing two tasks.(1)Decreasing the mean queuing delay and increasing the throughput after its execution in the proposed analytical model.Similarly,its evaluation and comparison to other operations in Sharma et al.[7].(2)The proposed model is inferred from the earlier analytical model.Therefore,in performance modeling,the derivation of the finest operation will serve as a new entry.The rest of the paper is organized as follows:Section 2 provides the existing related studies and algorithms for the congestion control in internet traffic.The analytical model proposed by Sharma et al.[7]is also presented which is to be used as a reference model for the proposed study.In Section 3 the proposed analytical model is discussed in detail.The performance metrics derivation is also reported in detail using different equations.Next,in Section 4 the experimental simulations and results for the proposed model are explored in detail.The performance of the proposed model is reviewed and is supported by several simulation results produced using MATLAB.Finally,Section 5 contains the concluding remarks.

    2 Literature Review

    This section provides a detailed review of the existing algorithms and techniques such as the Tail Drop(TD)and RED methods that are used for internet traffic congestion control.Similarly,a detailed overview is provided for the analytical model presented in Sharma et al.[7].Illustration for the analytical model is given for the distinct-time limited queue using the L1 threshold in the STD(State Transition Diagram).

    2.1 Existing Algorithms

    Over the year’s researchers have proposed several techniques to manage the congestion in the internet traffic.One of the classic buffer management approaches is known as TD technique.The TD approach was developed to overcome the gridlock and was applied on routers[8–9].The TD approach is unable to detect congestion until the queue is full.The highest congestion sign is introduced to inform the source when the queue becomes full;all the remaining packets that arrive are subsequently dropped.RED was initiated to overcome the pitfalls of TD technique,[9–11,12–14].RED is one of the Active Queue Management(AQM)plans approach[15].The Internet Engineering Task Force(IETF)has approved it to be used for overcrowding control in internet traffic.It was recommended to be a superior approach in comparison to the TD system and is executed extensively in router these days[16].

    RED method recognizes the congestion in advance and gives a response to the transmitter by either dropping or marking packets even if the space of buffer is ready for use[9,13].Likewise,RED doorways for the overcrowding control approach in packet-switched Networks are suggested in Betzler et al.[10].The doorways identify the congestion about to happen by calculating the mean size of the queue,calculated by utilizing a low-pass filter.The filter allows signals having a frequency below a chosen cutoff-frequency along with Exponential Weighted Moving Average(EWMA)[15].Two different RED algorithms for gateway were utilized in their scheme.The primary algorithm was used to calculate the mean size of the queue to find out the robustness level permit-ted in the doorway line.The secondary algorithm was used to compute the packet-dropping/marking possibility to find how mostly the gateway drops/marks packets and provides the congestion level.The algorithms of two RED gateways that are mentioned above are efficiently implemented as a grid-lock control system to acquire aims like gridlock avoidance,appropriate time scales,fairness and parameter sensitivity.Similarly,in Sharma et al.[7]the performance was re-implemented using queuing threshold congestion control.These models were based on the RED method,which is approved by Internet society[16].In each of the two executed models,the RED method against thresholds compared the performance metrics parameters.In Priscilla et al.[17]for congestion control,a new AQM algorithm is proposed which is dependent on RED.By modifying the RED,the AQM algorithm among the two thresholds was executed and issuing a bendable way of adjusting the highest possibility of packets dropping[15],upgrading throughput and delay contrast to RED.Similarly,in Huang et al.[18],the authors presented a Random Early Drop algorithm,IRED,based on the queuing theory and hierarchical system framework.The IRED employs the immediate queue length to compute the drop rate of the systems.The performance metrics of IRED are Average delay,average queue length and total loss of probability.The only drawback of IRED is that it’s incapable to contemplate the packets coming from multiple sources.Likewise,the authors in Suwannapong et al.[19]proposed a congestion control mechanism that is based on the back off algorithms and buffer management to decrease the transmitted packets’congestion.The mechanism is named as Congestion Control Random Early Detection.In the case of high traffic,it predicts and detects congestion before the packet loss.The efficiency of the algorithm is checked by the authors using the Cooja simulator using two scenarios i.e.,the burst traffic and continuous traffic scenarios.The CoCo-RED algorithm is useful since it reduces packet loss,however,problems arise in acknowledgment time of network communication.

    To control the network congestion,several researchers have also focused on using other algorithms such as the Decentralized Traffic Aware Scheduling(DeTAS)algorithm,Constrained Application Protocol(CoAP)and Technique for Order Preference by Similarity to Ideal Solution(TOPSIS)methods.In Accettura et al.[20]the authors have worked on the DeTAS,which is installed in multi-hop lossy and low-power networks.In DeTAS,the Internet Engineering Task Force’s Routing Protocol for Low-Power and Lossy Networks(RPL)is used for the Internet of things.In a decentralized manner,the master node technique is used to compute the optimum multi-hop schedule for the whole network;this helps in controlling the queue congestion.This logic reduces the over-heads using a very low amount of signaling messages.The authors in Bhalerao et al.[21]proposed a system in which the traditional IETF congestion control mechanisms are not suitable for low data-volume application protocols like CoAP.They suggested maintaining an assessment of the Round-Trip Time(RTT)for any destination with which it’s interconnected.Else to assume a conservative fixed value of 3 seconds when no RTT estimate can be achieved(e.g.,unidirectional communication),controlling the transmission behavior by not sending more than one User Datagram Protocol(UDP)datagram per RTT on average to a destination.Also perceiving packet loss and exponentially backing off the retransmission timer when a loss event occurs.In another research[22],it defines the CoAP as a basic method for congestion control with exponential back off.This basic congestion control mechanism does not consider the actual estimate of RTT values acquired from previous transactions.Dashkova et al.[23]argue that more advanced queue management control mechanisms are required to limit the energy resources of other nodes(that may need to re-transmit multiple times because of congestion),damage on the network and obtain high throughput consecutively.On the contrary,in Bhandari et al.[24]the authors worked on the congestion-aware routing mechanism that properly senses the congestion based on the present and past traffic trends.In this work,the congestion is improved by using the resource control method.For solving the parent selection problem,the author presented the TOPSIS method framework as the multi-criteria decision-making problem.The congestion detection mechanism ensures the affected nodes to avoid the temporary congestion position.The only drawback is that CoAR improves the PRR,packet loss ratio,end-to-end delay,energy consumption and throughput.The authors in Islam et al.[25]stated the design and implementation details of the CoAP handler for the POINT architecture.It allows CoAP and CoAP extensions to IoT devices through the ICN operator network.The authors also exhibit how the CoAP traffic over an Information-Centric Networking(ICN)network can release the full probable of CoAP,shifting both complexity and overhead from the endpoints to the ICN network.Therefore,the resource-constrained IoT device does not need to distribute more resources for an IP multicast and DNS client implementation.However,this approach does not reduce the communication overhead immensely.The authors in Yin et al.[26]explored developing an Aggregation Tree(AT)that achieved fewer communication costs for complex queries.First,the data pruning power and the aggregation cost were formalized to maximize the aggregation gain.Next,the set of aggregation operations were connected with the maximum aggregation gain to construct the AT.In Huang et al.[27],the authors explored and proposed software-defined networking,Software-defined Energy Harvesting Internet of Things(SEANET).Concerning the centralized ow control,the data plane,energy plane and control plane were decoupled.The Nash bargaining game was investigated to resolve the benefit allocation problem for feasible energy trading in the SEANET.The proposed method reduced packet loss and optimized energy.The experimental results report improvements in the data traffic.Likewise,a novel analytical model based on the queueing theory was proposed for performance evaluation of the OpenFlow network in Xiong et al.[28].The proposed controller model was compared and contrasted with the Clench model.Through experiments,it was observed that the proposed model provided improved approximation for the performance of the SDN controller.

    2.2 Overview of Existing Analytical Model

    To evaluate the performance of the proposed model,it is necessary to compare it to an existing model.The model presented in Sharma et al.[7]was a distinct-time queuing technique.It is derived using presumption from the Markov chain state transition procedure;quitting takes place on all occasions before entrance in whichever unit time frame(See Fig.1).

    Figure 1:Distinct-Time limited queue with L1 threshold state transition diagram

    Every entrance accompanies an individualistic Bernoulli procedure to a limited buffer capacity(L1+j).The system had alone server,furthermore,the queuing rule was First-come First-serve(FCFS).Moreover,L1is the single thresh-old value in the model.Before and after the threshold,the arrivals of the packets are α1 and α2 respectively.The packet exit is β.When packets number thrust out to the threshold valueL1,so at the entrance rate of α1 to α2 there is a step cut-back.Consequently,it means that the sender is continuously sending the packets at α1 rate but the probability of dropped packets is at the rate of 1-α2/α1[7].The probabilities of zero packet departure are represented by(1-β)and zero packet arrivals are represented by(1-α1).Similarly,it is also shown that no packets arrival at threshold value equal to or greater thanL1is represented by(1-α2).

    3 Proposed Analytical Model

    The analytical model proposed by Sharma et al.[7]is taken as a reference model used for the proposed analytical model.This section discusses in detail the proposed analytical model and how it is different from the existing models.The overall working of the model has been explained.The process of derivation of different performance metrics has also been provided.Tab.1 describes various symbols used in the proposed model.

    3.1 Model Overview

    As already stated the model proposed in this research paper is based on the model presented in Sharma et al.[7],after initiating divergent mathematical operations for recording loss of packet at the threshold value equal to or extensive than Γ1in the STD.In the proposed model,before and after the threshold value Γ1the possibility of packets arrival is shown by ?1and ?2respectively.Whereas,is used for the probability of packet exit.With one server,the major volume of the system is shown by Γ1+k.The probabilities of zero packet departure are represented by(1-δ)and zero packet arrivals are represented by(1-?1).In Fig.2 it is shown that the no packets arrival at the threshold value equal to or greater than Γ1is represented by.

    Several of the packets are dropped,the probability is taken such that the threshold value equal to or greater than Γ1,while the ability of the buffer-level to hold the packets.Mathematical function capture this dropped packet and it is denoted byP.In the new analytical model,the rate at which packets arrive is ?2,and is represented by a term which is equal to ?1(1-P).This implicates that in the arrival speed from ?1to ?2there is a steep reduction.With probability,the dropped packets and packets loss is confined with a term which is shown in Fig.3.

    Table 1:Parameters with description

    Figure 2:One analytical model of threshold

    Figure 3:Loss happening in the single-threshold analytical model

    3.2 Performance Metrics:Derivation

    Suppose that the proposed model utilized a discrete-time queuing system,dependent on a specific unit of time to obtain performance metrics equations,called a slot.The finite buffer space(Γ1+k)is the capacity of the model,which contains packets in the once-over.Also,the entrance process which(an),suppose the model is identically and autonomously disseminated Bernoulli process which signify a packet entrance at slot n.Then the queuing order is supposed to be FCFS[7].

    1)The following sequence of steps is used to find the STD measuring expression using virtual mathematics to obtain the performance metrics and balanced equation from the new model.The symmetry probability equations given below are obtained under the supposition ?1<δ from the new model STD:

    Generally,the equations can be represented as,

    For i=1,2,3,...,Γ1-2

    4 Experimental Simulations,Results and Evaluation

    Experimental simulations are carried out to analyze and observe the performance metrics expression resulting in the four typical packets dropping functions already discussed earlier.

    This analysis is observed in MATLAB for numerical and graphical simulations.The input values of the RED parameters,?1= 0:27,system capacity,max queue length = 20,packet departure,δ = 0:30,and threshold,Γ11 =[1,2,...,max queue length]are applied for calculating and measuring the performance metrics for the arrival of the packet.There are three sets of experimental simulations are carried out and the results are represented using graphical line charts:

    - Simulation Experiments 1:These simulation experiments are for the Dropping Functions Analysis.In this set of simulation experiments,each of the four performance metrics are analyzed for four different types of dropping functions.To evaluate the proposed model,the dropping functions analysis utilizes the performance metrics of,(1)Probability of Packet Loss(2)Through-put(3)Average Queue Length(4)Average Queue De-lay.Whereas,the four dropping functions observed are termed F1,F2,F3 and F4.

    - Simulation Experiments 2:These simulation experiments are for the Power of Function and Exponential Operation Analysis.In this set of simulation experiments,each of the four performance metrics are analyzed for two functions of power and exponential.To evaluate the proposed model,the power of function and exponential analysis utilizes the performance metrics of,(1)Probability of Packet Loss(2)Throughput(3)Average Queue Length and(4)Average Queue Delay.Whereas,the two functions observed are termed F1 and F2.Where F1 represents a power function and F2 represents an exponential function.

    - Simulation Experiments 3:These simulation experiments are for the Exponential Function Analysis with Different Parameters.In this set of simulation experiments,each of the four performance metrics is analyzed for four exponential functions with different parameters taken as base.To evaluate the proposed model,the power of function and exponential analysis utilizes the performance metrics of,(1)Probability of Packet Loss(2)Throughput(3)Average Queue Length and(4)Average Queue Delay.Whereas the four exponential functions observed are termed F1,F2,F3 and F4.Where F1 has a parameter value of 0.01,F2 has a parameter value of 0.20,F3 has parameter value of 0.40 and F4 has a parameter value of 0.60.

    4.1 Simulation Experiments 1:Results and Observations

    The Figs.4a,4b,4c and 4d show the results for the performance metrics using four different dropping functions.The following observations are extracted from the detailed observations of the simulation experiments:

    - In Fig.4a it can be observed that when the threshold value 1 increases,the packet loss for each of the function decreases.Low packet loss may be obtained using a high value of threshold 1;the aforementioned are reliable to the system that is normal.

    - In Fig.4b it is observed,the increase in the threshold value of 1 the throughput value is increasing for each of the functions(F1,F2,F3 and F4).

    - In Figs.4c and 4d,it is observed,increasing the threshold values increases the throughput,mean delay,and mean queue length for each function.Whereas,values of performance metrics are increasing sensibly and the router’s effort to avoid congestion is decreasing.The graphical and numerical results show that among the four different functions,the exponential function ax and the power of a functionxareveal higher throughput,lower delay,and lower probability of packet loss in comparison to the other two.

    Figure 4:Simulation experiments for dropping functions analysis.(a)Probability of packet loss vs.threshold.(b)throughput vs.threshold.(c)Average queue length vs.threshold.(d)Average queue delay vs.threshold

    4.2 Simulation Experiments 2:Results and Observations

    To detect the best possible operation from the power of a functionxa,and exponential operationax,experimental analysis is carried out.The figures,Figs.5a,5b,5c,and 5d shows the results for the performance metrics using two functions.The following observations are extracted from the detailed observations of the simulation experiments:

    Figure 5:Simulation experiments for power of a function xa and exponential operation of ax.(a)Possibility of packet loss vs.threshold.(b)throughput vs.threshold.(c)Average queue length vs.threshold.(d)Average queue delay vs.threshold

    - In Fig.5a it can be observed that when the threshold value is increased,the possibility of packet loss decreases as expected.

    - In Figs.5b,5c and 5d it can be observed that the average delay,the throughput and average queue length for the two operations are increasing when the threshold value is increased.This is compatible with a general system.

    - The graphical and numerical outcomes visibly illustrate that out of the two operations,exponential function,ax,attained the least possibility of packet loss,maximum throughput,and lowest delay in comparison to the power of a functionxa.

    4.3 Simulation Experiments 3:Results and Observations

    Finally,to draw a general conclusion,a tentative analysis is carried out using different parameter values of a,about the exponential function,ax.Figs.6a,6b,6c and 6d show the results for the performance metrics using four functions with different parameters.The following observations are extracted from the detailed observations of the simulation experiments:

    Figure 6:Simulation experiments for exponential function analysis with different parameters.(a)Possibility of loss of packet vs.threshold.(b)throughput vs.threshold.(c)Mean queue length vs.threshold.(d)Mean queue delay vs.threshold

    - Figs.6a,6b,6c,and 6d illustrate that when the parameter values reach 0:01 the exponential operation attained minimum probabilities of packets loss,maximum throughput and lowest delay as the threshold values increases.

    - These parameter settings may be utilized for various applications of data service.Whereas,for realtime applications that need minimum delay such a setting should be utilized where the parameter should be reaching 1.

    - All the results are compatible with a typical system.The exponential operation depends on the input values and setting of the parameter for AQM method.Therefore,this analysis is a handout for the performance modeling.

    5 Conclusion

    This paper presents an analytical model to investigate the best possible packet dropping operation that utilizes virtual mathematical approaches.The performance modeling of the proposed model has also been discussed.The proposed modeling technique is derived from Random Early Detection techniques of AQM methods.The discrete-time queuing system,single threshold,departures and independently distributed packets arrivals maintain the process of Markov chain state transition and are based on the Bernoulli process.Performance metrics such as throughput,the average length of the queue,average delay of queuing,the possibility of packet loss and threshold are derived for divergent functions.These metrics are analyzed for the precision of the model by performing a wide variety of simulation experiments.The preset input values for packets arrival and departure,when the variable threshold values are used to compare the parameters at the stable state.Finally,it is concluded by analyzing the results that the exponential operation is the best possible operation which attained the lowest probability of losing packet,maximum throughput and minimum delay in comparison to other operations when the threshold value is increased.

    Acknowledgement:The authors would like to thank Dr.M.Amin and Dr.Waqar assistant professors whose constructive comments helped in the improvement of the presentation of this project.

    Funding Statement:The author(s)received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no con icts of interest to report regarding the present study.

    十八禁人妻一区二区| 2018国产大陆天天弄谢| 99久久99久久久精品蜜桃| 亚洲精品在线美女| 久久毛片免费看一区二区三区| 国产亚洲精品久久久久5区| 三级毛片av免费| 人人澡人人妻人| 一边摸一边抽搐一进一出视频| 人人妻,人人澡人人爽秒播| 国产伦理片在线播放av一区| 在线观看免费日韩欧美大片| 久久人人爽av亚洲精品天堂| 超碰97精品在线观看| 欧美变态另类bdsm刘玥| 亚洲av欧美aⅴ国产| 爱豆传媒免费全集在线观看| 在线 av 中文字幕| av欧美777| 精品久久久久久久毛片微露脸 | 亚洲精品国产av成人精品| 91字幕亚洲| 捣出白浆h1v1| 日本一区二区免费在线视频| 亚洲av片天天在线观看| 国产亚洲精品第一综合不卡| 国产精品一区二区在线观看99| 69精品国产乱码久久久| 午夜福利视频精品| 97在线人人人人妻| 黄频高清免费视频| 国产区一区二久久| 老司机亚洲免费影院| 男女午夜视频在线观看| 99国产综合亚洲精品| 人人妻人人澡人人看| av在线播放精品| 亚洲精品中文字幕在线视频| 久久精品人人爽人人爽视色| 日本一区二区免费在线视频| 搡老熟女国产l中国老女人| 亚洲伊人色综图| 国产一区二区激情短视频 | 久久久国产欧美日韩av| 国产在线免费精品| 两人在一起打扑克的视频| 色播在线永久视频| 亚洲国产毛片av蜜桃av| 纵有疾风起免费观看全集完整版| www.熟女人妻精品国产| 日韩一区二区三区影片| 一本一本久久a久久精品综合妖精| 这个男人来自地球电影免费观看| 精品一区二区三区av网在线观看 | 自线自在国产av| 岛国毛片在线播放| 操美女的视频在线观看| 欧美国产精品va在线观看不卡| 丁香六月天网| 纵有疾风起免费观看全集完整版| 久久影院123| 亚洲欧美日韩另类电影网站| 欧美黑人欧美精品刺激| 国产国语露脸激情在线看| 免费一级毛片在线播放高清视频 | 三上悠亚av全集在线观看| 天天躁狠狠躁夜夜躁狠狠躁| 日韩熟女老妇一区二区性免费视频| 欧美日韩福利视频一区二区| 丰满少妇做爰视频| 成年动漫av网址| 亚洲黑人精品在线| 法律面前人人平等表现在哪些方面 | 涩涩av久久男人的天堂| 亚洲av欧美aⅴ国产| 国产精品欧美亚洲77777| 97人妻天天添夜夜摸| 国产精品香港三级国产av潘金莲| 午夜福利在线观看吧| 久久久久精品国产欧美久久久 | 亚洲精品中文字幕一二三四区 | 亚洲国产精品成人久久小说| 男女无遮挡免费网站观看| 亚洲国产欧美一区二区综合| av一本久久久久| 亚洲欧美日韩另类电影网站| 大香蕉久久网| 日韩中文字幕视频在线看片| 国产老妇伦熟女老妇高清| 久久狼人影院| 国产精品久久久久久人妻精品电影 | av天堂久久9| 亚洲熟女毛片儿| 日本精品一区二区三区蜜桃| tocl精华| 成人三级做爰电影| 日韩三级视频一区二区三区| 亚洲国产看品久久| 精品人妻1区二区| 99国产极品粉嫩在线观看| 欧美国产精品一级二级三级| 制服人妻中文乱码| 一区二区三区精品91| 十八禁网站网址无遮挡| 男女午夜视频在线观看| 曰老女人黄片| 久久综合国产亚洲精品| 欧美日韩亚洲国产一区二区在线观看 | 国产成+人综合+亚洲专区| tube8黄色片| 欧美精品一区二区大全| 亚洲欧洲精品一区二区精品久久久| 在线观看免费高清a一片| 亚洲精品中文字幕在线视频| 亚洲国产日韩一区二区| 视频在线观看一区二区三区| 真人做人爱边吃奶动态| 午夜福利乱码中文字幕| 亚洲人成电影免费在线| 天天躁日日躁夜夜躁夜夜| 天天躁狠狠躁夜夜躁狠狠躁| 两性夫妻黄色片| 美女福利国产在线| 午夜福利乱码中文字幕| 18禁黄网站禁片午夜丰满| 搡老熟女国产l中国老女人| 丁香六月天网| 日本黄色日本黄色录像| 亚洲国产日韩一区二区| 999久久久精品免费观看国产| 少妇的丰满在线观看| 91麻豆精品激情在线观看国产 | 日本91视频免费播放| 新久久久久国产一级毛片| 满18在线观看网站| 免费在线观看日本一区| 国产精品久久久av美女十八| 国产欧美日韩一区二区精品| 男人爽女人下面视频在线观看| 欧美午夜高清在线| 午夜精品久久久久久毛片777| 91九色精品人成在线观看| 巨乳人妻的诱惑在线观看| 亚洲激情五月婷婷啪啪| 在线观看舔阴道视频| 日韩 欧美 亚洲 中文字幕| 这个男人来自地球电影免费观看| 咕卡用的链子| 久热这里只有精品99| 麻豆av在线久日| 精品一区二区三区av网在线观看 | 亚洲精品久久成人aⅴ小说| 国产精品成人在线| 国产成人a∨麻豆精品| 天天躁狠狠躁夜夜躁狠狠躁| 后天国语完整版免费观看| 色播在线永久视频| 黄色 视频免费看| 999精品在线视频| 亚洲情色 制服丝袜| 视频在线观看一区二区三区| av欧美777| 青青草视频在线视频观看| 久久精品成人免费网站| 丝袜人妻中文字幕| 国产精品秋霞免费鲁丝片| 国产人伦9x9x在线观看| 国产精品熟女久久久久浪| 老熟女久久久| 啦啦啦 在线观看视频| 午夜福利在线观看吧| 成人国语在线视频| 久久 成人 亚洲| 妹子高潮喷水视频| 考比视频在线观看| 男女下面插进去视频免费观看| 国产一区二区在线观看av| xxxhd国产人妻xxx| 国产亚洲一区二区精品| 亚洲成人国产一区在线观看| 别揉我奶头~嗯~啊~动态视频 | 亚洲激情五月婷婷啪啪| 亚洲欧美清纯卡通| 日韩,欧美,国产一区二区三区| 欧美黄色淫秽网站| 亚洲精品国产区一区二| 国产成人精品无人区| 91老司机精品| 久久精品aⅴ一区二区三区四区| 69av精品久久久久久 | 国产在线观看jvid| 日本91视频免费播放| 国产无遮挡羞羞视频在线观看| av国产精品久久久久影院| 后天国语完整版免费观看| 在线观看免费午夜福利视频| 亚洲精品日韩在线中文字幕| 可以免费在线观看a视频的电影网站| av国产精品久久久久影院| 亚洲精品第二区| 人妻 亚洲 视频| 99国产综合亚洲精品| 精品国产乱码久久久久久男人| 国产不卡av网站在线观看| 精品国产一区二区三区久久久樱花| 国产黄色免费在线视频| 可以免费在线观看a视频的电影网站| 国产日韩一区二区三区精品不卡| 秋霞在线观看毛片| 亚洲欧美精品自产自拍| 国产成人精品久久二区二区免费| 亚洲男人天堂网一区| av片东京热男人的天堂| 国产一卡二卡三卡精品| 久久久久久亚洲精品国产蜜桃av| 成人av一区二区三区在线看 | 久久人人爽av亚洲精品天堂| 欧美成人午夜精品| 欧美 亚洲 国产 日韩一| 国产熟女午夜一区二区三区| 免费观看av网站的网址| 男女床上黄色一级片免费看| av在线老鸭窝| 美女视频免费永久观看网站| 一级黄色大片毛片| 一边摸一边做爽爽视频免费| 国产高清视频在线播放一区 | 久久九九热精品免费| 大香蕉久久网| 91成年电影在线观看| 欧美日韩成人在线一区二区| 欧美中文综合在线视频| 欧美日韩国产mv在线观看视频| 国产一级毛片在线| 久久天堂一区二区三区四区| 亚洲一码二码三码区别大吗| 日韩大片免费观看网站| 亚洲欧美清纯卡通| 搡老岳熟女国产| 国产免费福利视频在线观看| 成人三级做爰电影| 亚洲午夜精品一区,二区,三区| 巨乳人妻的诱惑在线观看| 亚洲精品中文字幕一二三四区 | 十分钟在线观看高清视频www| 亚洲国产欧美网| 丁香六月天网| 亚洲欧美一区二区三区黑人| 视频区图区小说| 精品少妇久久久久久888优播| 欧美激情久久久久久爽电影 | 青青草视频在线视频观看| 一级黄色大片毛片| av欧美777| 欧美在线一区亚洲| 大片电影免费在线观看免费| 美国免费a级毛片| 男女午夜视频在线观看| 黄频高清免费视频| 午夜激情久久久久久久| 老司机亚洲免费影院| 一区二区日韩欧美中文字幕| 欧美亚洲 丝袜 人妻 在线| 黑人欧美特级aaaaaa片| 伊人久久大香线蕉亚洲五| 亚洲七黄色美女视频| 国产av国产精品国产| 日本91视频免费播放| 欧美精品人与动牲交sv欧美| 亚洲欧美成人综合另类久久久| 搡老乐熟女国产| 99国产精品一区二区三区| 91字幕亚洲| 男女床上黄色一级片免费看| 69精品国产乱码久久久| 少妇猛男粗大的猛烈进出视频| 老熟女久久久| 免费观看av网站的网址| 两人在一起打扑克的视频| 日日爽夜夜爽网站| 国产日韩欧美亚洲二区| 亚洲七黄色美女视频| 午夜成年电影在线免费观看| 欧美精品亚洲一区二区| 蜜桃在线观看..| 亚洲天堂av无毛| 久久青草综合色| 日韩欧美国产一区二区入口| 天堂中文最新版在线下载| av又黄又爽大尺度在线免费看| 好男人电影高清在线观看| 久久精品亚洲av国产电影网| 日韩 亚洲 欧美在线| 国产亚洲精品久久久久5区| 久久国产亚洲av麻豆专区| 人妻一区二区av| 多毛熟女@视频| 日本91视频免费播放| 女警被强在线播放| 男人舔女人的私密视频| 中文字幕人妻熟女乱码| 女人被躁到高潮嗷嗷叫费观| tocl精华| 黄色 视频免费看| a在线观看视频网站| 下体分泌物呈黄色| 啪啪无遮挡十八禁网站| 亚洲国产精品成人久久小说| 99国产精品一区二区蜜桃av | 久久 成人 亚洲| 人妻一区二区av| 国产片内射在线| 精品视频人人做人人爽| 熟女少妇亚洲综合色aaa.| 日本91视频免费播放| 日本wwww免费看| 成人av一区二区三区在线看 | 涩涩av久久男人的天堂| 桃花免费在线播放| 久久久国产欧美日韩av| 各种免费的搞黄视频| 99久久人妻综合| 久久精品久久久久久噜噜老黄| 国产无遮挡羞羞视频在线观看| 又大又爽又粗| 一边摸一边做爽爽视频免费| 一区二区三区精品91| 狂野欧美激情性bbbbbb| 又大又爽又粗| 丰满饥渴人妻一区二区三| 男女边摸边吃奶| 一边摸一边抽搐一进一出视频| av有码第一页| 三级毛片av免费| 俄罗斯特黄特色一大片| 国产成人一区二区三区免费视频网站| 熟女少妇亚洲综合色aaa.| 大片免费播放器 马上看| 超碰成人久久| 女性被躁到高潮视频| 一级黄色大片毛片| 新久久久久国产一级毛片| 久久天堂一区二区三区四区| 丝袜美腿诱惑在线| 亚洲一卡2卡3卡4卡5卡精品中文| 欧美另类亚洲清纯唯美| 国产在线观看jvid| 欧美另类亚洲清纯唯美| 80岁老熟妇乱子伦牲交| 欧美大码av| 在线永久观看黄色视频| 久久国产精品人妻蜜桃| 高清视频免费观看一区二区| 脱女人内裤的视频| 日韩,欧美,国产一区二区三区| 色视频在线一区二区三区| 一本一本久久a久久精品综合妖精| 制服人妻中文乱码| 99精品欧美一区二区三区四区| 黑人欧美特级aaaaaa片| 久久久久精品人妻al黑| 免费一级毛片在线播放高清视频 | 交换朋友夫妻互换小说| 日韩 亚洲 欧美在线| 老鸭窝网址在线观看| www日本在线高清视频| 黄频高清免费视频| 曰老女人黄片| 18在线观看网站| 国产精品国产三级国产专区5o| 天天操日日干夜夜撸| 在线十欧美十亚洲十日本专区| 日本a在线网址| 免费日韩欧美在线观看| 欧美在线一区亚洲| 丝袜脚勾引网站| 伊人亚洲综合成人网| 水蜜桃什么品种好| 大香蕉久久成人网| 亚洲国产欧美日韩在线播放| 国产成人一区二区三区免费视频网站| 一边摸一边做爽爽视频免费| 性色av乱码一区二区三区2| 午夜成年电影在线免费观看| 午夜两性在线视频| 亚洲av成人不卡在线观看播放网 | 少妇的丰满在线观看| 看免费av毛片| a 毛片基地| 极品少妇高潮喷水抽搐| 午夜福利在线免费观看网站| 欧美精品一区二区免费开放| 黄色a级毛片大全视频| 乱人伦中国视频| av网站免费在线观看视频| 精品少妇久久久久久888优播| 精品亚洲成a人片在线观看| 精品国产一区二区三区久久久樱花| 黑人猛操日本美女一级片| 天天躁夜夜躁狠狠躁躁| 亚洲国产欧美一区二区综合| 亚洲中文日韩欧美视频| 国产不卡av网站在线观看| 国产区一区二久久| 99热全是精品| 久久人妻福利社区极品人妻图片| 久久热在线av| 在线观看一区二区三区激情| 中文字幕人妻熟女乱码| 亚洲欧美日韩另类电影网站| 一个人免费在线观看的高清视频 | 欧美黑人精品巨大| 9色porny在线观看| 欧美日韩中文字幕国产精品一区二区三区 | 国产成人啪精品午夜网站| 欧美变态另类bdsm刘玥| 精品少妇久久久久久888优播| 女人久久www免费人成看片| 欧美日韩国产mv在线观看视频| 免费观看av网站的网址| 黄色毛片三级朝国网站| 久久av网站| 99久久精品国产亚洲精品| 国产视频一区二区在线看| 成在线人永久免费视频| 在线观看免费日韩欧美大片| 国产精品一区二区在线不卡| 曰老女人黄片| 国产精品麻豆人妻色哟哟久久| 久久精品人人爽人人爽视色| 99香蕉大伊视频| 日日爽夜夜爽网站| 亚洲精品第二区| 国产精品一区二区在线观看99| 亚洲国产中文字幕在线视频| 黄网站色视频无遮挡免费观看| 国内毛片毛片毛片毛片毛片| 久久人人爽av亚洲精品天堂| 久久久国产欧美日韩av| 亚洲 欧美一区二区三区| 久久久精品免费免费高清| 免费不卡黄色视频| 欧美日韩亚洲高清精品| 性少妇av在线| 久久精品aⅴ一区二区三区四区| 两个人看的免费小视频| 美女高潮到喷水免费观看| 国产成人a∨麻豆精品| 肉色欧美久久久久久久蜜桃| 亚洲欧美精品综合一区二区三区| 一区在线观看完整版| 日本五十路高清| av又黄又爽大尺度在线免费看| 国产av一区二区精品久久| 亚洲情色 制服丝袜| 视频区欧美日本亚洲| 精品久久久精品久久久| av网站免费在线观看视频| 丰满饥渴人妻一区二区三| 最新的欧美精品一区二区| 丝袜脚勾引网站| 老司机影院毛片| 淫妇啪啪啪对白视频 | 美女脱内裤让男人舔精品视频| 亚洲综合色网址| 亚洲欧美激情在线| 国产精品自产拍在线观看55亚洲 | 美女午夜性视频免费| 亚洲欧美成人综合另类久久久| av免费在线观看网站| 成人免费观看视频高清| 中文字幕最新亚洲高清| 天天躁夜夜躁狠狠躁躁| 黄片大片在线免费观看| 女性被躁到高潮视频| 女性生殖器流出的白浆| 欧美另类一区| 一个人免费看片子| 日本一区二区免费在线视频| 韩国高清视频一区二区三区| 香蕉丝袜av| 少妇猛男粗大的猛烈进出视频| 亚洲国产精品999| 法律面前人人平等表现在哪些方面 | 女性生殖器流出的白浆| 亚洲欧美日韩高清在线视频 | 欧美xxⅹ黑人| 亚洲精品在线美女| 久久久久久亚洲精品国产蜜桃av| 国产欧美日韩一区二区三 | 免费在线观看完整版高清| 日日摸夜夜添夜夜添小说| 免费观看av网站的网址| 韩国高清视频一区二区三区| 夜夜夜夜夜久久久久| 国产精品国产av在线观看| 91精品国产国语对白视频| 久热这里只有精品99| av在线播放精品| 51午夜福利影视在线观看| 日韩中文字幕欧美一区二区| 两人在一起打扑克的视频| 日韩欧美一区二区三区在线观看 | 精品福利观看| 美女高潮到喷水免费观看| 日本猛色少妇xxxxx猛交久久| 12—13女人毛片做爰片一| 亚洲欧美精品自产自拍| 搡老乐熟女国产| 涩涩av久久男人的天堂| 青草久久国产| 曰老女人黄片| 亚洲性夜色夜夜综合| 啦啦啦视频在线资源免费观看| 欧美变态另类bdsm刘玥| svipshipincom国产片| 国产精品久久久人人做人人爽| 免费一级毛片在线播放高清视频 | 黄色视频,在线免费观看| 丰满少妇做爰视频| 91av网站免费观看| 狂野欧美激情性bbbbbb| 日本wwww免费看| 国产av一区二区精品久久| 在线观看免费高清a一片| 啪啪无遮挡十八禁网站| 91字幕亚洲| 午夜成年电影在线免费观看| videosex国产| 777久久人妻少妇嫩草av网站| 久9热在线精品视频| 欧美在线黄色| 一级毛片精品| 老鸭窝网址在线观看| 男人舔女人的私密视频| 免费av中文字幕在线| 成人亚洲精品一区在线观看| 久久久久国产精品人妻一区二区| 国产一区二区在线观看av| 他把我摸到了高潮在线观看 | 日本91视频免费播放| 国产日韩一区二区三区精品不卡| 香蕉丝袜av| 亚洲精品在线美女| 大码成人一级视频| 啦啦啦 在线观看视频| 手机成人av网站| bbb黄色大片| 日韩欧美一区视频在线观看| 热re99久久国产66热| 1024视频免费在线观看| 女人高潮潮喷娇喘18禁视频| 亚洲av电影在线观看一区二区三区| 亚洲九九香蕉| 欧美日韩黄片免| 自拍欧美九色日韩亚洲蝌蚪91| 在线天堂中文资源库| 美女国产高潮福利片在线看| 99久久国产精品久久久| h视频一区二区三区| 国产高清videossex| 欧美变态另类bdsm刘玥| 免费av中文字幕在线| 久久久欧美国产精品| 大片电影免费在线观看免费| 亚洲国产看品久久| 婷婷丁香在线五月| 亚洲国产毛片av蜜桃av| 免费不卡黄色视频| 国产深夜福利视频在线观看| 国产熟女午夜一区二区三区| 老汉色∧v一级毛片| 如日韩欧美国产精品一区二区三区| 激情视频va一区二区三区| 91国产中文字幕| 久久久精品区二区三区| 嫁个100分男人电影在线观看| 免费在线观看影片大全网站| 99久久国产精品久久久| 丁香六月天网| 中文字幕色久视频| 国产在线观看jvid| 丰满人妻熟妇乱又伦精品不卡| 美女高潮喷水抽搐中文字幕| 我的亚洲天堂| 视频区欧美日本亚洲| 中文字幕精品免费在线观看视频| 亚洲国产精品一区二区三区在线| 亚洲va日本ⅴa欧美va伊人久久 | 欧美精品av麻豆av| 日韩,欧美,国产一区二区三区| 中文字幕高清在线视频| 欧美xxⅹ黑人| 又紧又爽又黄一区二区| 久久香蕉激情| 免费黄频网站在线观看国产| www.精华液| 99国产精品免费福利视频| 午夜日韩欧美国产| 天天操日日干夜夜撸| 热re99久久精品国产66热6| 亚洲国产av影院在线观看| 日韩精品免费视频一区二区三区| 亚洲av成人一区二区三| 中文欧美无线码| 成年动漫av网址| 搡老熟女国产l中国老女人| 国产熟女午夜一区二区三区| 欧美变态另类bdsm刘玥| 国产精品久久久久成人av| bbb黄色大片| 深夜精品福利| 欧美日韩av久久| 国产97色在线日韩免费| 亚洲精品国产精品久久久不卡|