• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Genetic Algorithm Routing Protocol for Mobile Ad Hoc Network

    2021-12-14 10:28:54RaedAlsaqourSaifKamalMahaAbdelhaqandYazanAlJeroudi
    Computers Materials&Continua 2021年7期

    Raed Alsaqour,Saif Kamal,Maha Abdelhaq and Yazan Al Jeroudi

    1Department of Information Technology,College of Computing and Informatics,Saudi Electronic University,93499,Riyadh,Saudi Arabia

    2Department of Computer Technology Engineering,Iraq University College(IUC),Basra,Iraq

    3Department of Information Technology,College of Computer and Information Sciences,Princess Nourah bint Abdulrahman University,84428,Riyadh,Saudi Arabia

    4Department of Mechanical Engineering,International Islamic University Malaysia,Jalan Gombak,53100,Selangor,Malaysia

    Abstract:Mobile ad hoc network (MANET)is a dynamically reconfigurable wireless network with time-variable infrastructure.Given that nodes are highly mobile,MANET’s topology often changes.These changes increase the difficulty in finding the routes that the packets use when they are routed.This study proposes an algorithm called genetic algorithm-based location-aided routing(GALAR)to enhance the MANET routing protocol efficiency.The GALAR algorithm maintains an adaptive update of the node location information by adding the transmitting node location information to the routing packet and selecting the transmitting node to carry the packets to their destination.The GALAR was constructed based on a genetic optimization scheme that considers all contributing factors in the delivery behavior using criterion function optimization.Simulation results showed that the GALAR algorithm can make the probability of packet delivery ratio more than 99%with less network overhead.Moreover,GALAR was compared to other algorithms in terms of different network evaluation measures.The GALAR algorithm significantly outperformed the other algorithms that were used in the study.

    Keywords: Mobile ad hoc network; location-aided routing protocol;location information; genetic algorithm

    1 Introduction

    Mobile ad hoc network (MANET) allows users to stay connected via wireless communication known as infrastructure-less network of mobile devices.This network has a series of mobile wireless nodes that travel in every direction and position independently [1].In MANET, nodes are arranged in different ways; they can travel in any direction and speed, enabling contact across routing protocols with one another.In MANET, several hops are required to begin data transmission between nodes when considering limited transmission distance.Despite many proposed solutions, room for improvement of routing protocols remains [2].

    The most challenging task for MANET is to identify the most efficient route between nodes because of dynamic topology changes and battery drain rate.Establishing the routes in the shortest time possible is the most crucial step because it reduces the delay of data delivery and helps achieve faster convergence [3].

    MANET topology’s rapid and frequent changes cause the nodes’free movement with no restriction in direction or mobility (i.e., speed and pause time).The problems that arise especially for nodes running at high speed and at different directions are data routing and packet dissemination.These issues emerge because of high mobility and regular topology changes.Wireless connections between such nodes can also break or expire.Consequently, the wireless connection must be re-established.When this occurs, the network is flooded with many control packets and route error packets.

    Link breakages are frequently experienced in MANET with high node mobility.For example,one of the key limitations is that a node that is part of a path loses communication with its neighbors; it loses the ability to interact with the other nodes.The disconnected node then relays its disconnection message to the source node and consequently demands a new path exploration session.This event creates additional overhead on the network, slows the packets’delivery time,and causes the broadcasting storm issue [4,5].

    This work presents an analytical study that examines the location-aided routing (LAR) protocol in MANET.This well-known location-based routing method uses the information of the location of a mobile node via the global position system technique [6].This protocol’s approach decreases the overhead cost of route discovery as it utilizes location information of the mobile host.The LAR protocol uses location information and the notion of the request and expected zones.When limited flooding of LAR occurs, a request is sent by a node to another node in a request zone, given that the coverage of the request zone includes the expected zone and its surrounding areas.The demand will cover only the request zone [2].

    The rest of this paper is structured as follows.Section 2 addresses the research background and related studies.Section 3 describes the suggested GALAR strategy.Section 4 assesses and analyzes the efficiency of the GALAR.Section 5 summarizes the analysis and outlines the future work.

    2 Background and Related Studies

    2.1 LAR Protocol

    In this study, the LAR protocol, a well-known position-based protocol, is a mechanism that seeks to minimize the overhead control message of the ad-hoc on-demand distance vector routing protocol by flooding only a portion of the network that is likely to contain the destination route.

    According to [7], LAR is one of the first adopted routing protocols that consider location information when routing in MANET.The procedure involves a source node S with location details from the destination node D.As shown in Fig.1, this process gives an estimation of the expected zone, which is the expected destination region for the presence of the destination node D.Node S is aware that node D is located (Xd, Yd) with time (t0), and the average moving speed for D is V.

    Figure 1:LAR scheme 1

    In LAR, flooding happens when the forwarding packets to the nodes do not enter the destination inside the request zone.Thus, for LAR to operate, nodes must know whether they are in the request zone to either drop or begin to flood the packet.Researchers who have undertaken LAR studies suggest two separate node schemes to assess whether they are in the requested region.

    The first scheme includes a sender who sends a request for a route with the rectangle coordinates in the request zone.A node that receives this request for the route may discard the request for the route if it is not within the rectangle and forward it to the endpoint if it is inside the rectangle.When the route request (RREQ) has reached its destination, it will respond with the route reply (RREP) message.

    As shown in Fig.1, when nodes I and K receive a request for a route for node D originating from node S, they can forward a request for a route given that nodes I and K are inside a rectangular request zone.Conversely, when node N receives a request for a route, it discards the request because N is beyond the rectangular request zone.However, this situation can save the routing costs.It is considered more efficient and effective than the practice of a blind search by traditional flooding algorithms for the whole network area.When the source node S fails to identify the target node D’s location, the expected zone is set to the entire network region.

    The second scheme does not explicitly identify the request zone when sending a request for a route.Instead, it forwards a packet depending on the distance from the destination of the sending node that is used in the RREQ.Thus, in Fig.2, only nodes I and K forward the RREQ to their neighbors if nodes N, I, and K obtain the RREQ from node S, given that nodes I and K are closer to (Xd, Yd) than node S.As node N receives the RREQ from node S, node N discards the RREQ because node N is further from (Xd, Yd) than nodes I and K.

    Figure 2:LAR scheme 2

    2.2 Overview of Genetic Algorithm(GA)

    GA is a type of adaptive stochastic optimization algorithm that uses natural evolution concepts for searching and optimization [8].It is used as an optimization method to calculate the optimal or close optimal solutions to the search’s problems.

    A simple and effective GA is composed of three operators, namely, reproduction, crossover,and mutation.The first process is a reproduction, which initializes the start of a population.Reproduction is the main evolutionary loop that evaluates each individual’s fitness function based on the fitness score.By using one of the methods of selection, individuals from a population are chosen.The more desirable a candidate is, the better its odds of being chosen.Nature performs its function as the chosen individuals are partnered to experience the mating crossover phase to create one or more children from each pair.

    The second approach is the crossover, which attempts to incorporate strategies to enable the child to inherit its parents’features.It typically consists of one parent copying half of the genotype and filling another parent with the remaining genes.

    The mutation is the third phase.Each child is granted the ability to experience a mutation phase in which certain parts of their genotype spontaneously change.This stage may have the randomness factor of the method to expand the search space.As a substitute for the older population, all new children serve the new generation.The whole process is replicated before one of the stopping conditions is met.

    The evolution and natural selection processes in GA are measured on the sample of candidate solutions (individuals).Each individual (offspring) in the population is a specific solution to the problem; each individual is a series of traits written in the individual’s chromosome or genotype as in nature.Depending on the genotype, each individual is then evaluated on a fitness function.This function calculates the individual’s score on the nature of the issue in solving a specified study problem.The problem can be either a case of minimization, where low scores are preferred or a problem of maximization, whereby high scores are preferred [9].Algorithm 1 outlines GA’s key stages.

    Algorithm 1:GA [10]1:Procedure GA 2:Generate the initial population of solutions randomly 3:Evaluate the initial population through fitness function 4:repeat until (A stop condition is reached) do

    ?

    2.3 Related Studies

    This section contains related works, which present diverse classes of ad hoc directing conventions and evaluations of a few areas based on a routing protocol.To generate location information, the overwhelming majority of position-based routing protocols presume a necessary process known as location service.Location services are categorized into proactive and reactive levels [11].

    A mobile node that uses a proactive protocol exchanges its position data regularly with multiple mobile nodes [12].Meanwhile, the position information is exchanged on-demand between the mobile nodes through a reactive protocol, ensuring that the location information is delivered simply upon request.The reactive location service (RLS) carries on to request the location information needed for each mobile node in the RLS [13].The sections in area tables are cleansed in particular interims depending on the time of location information.

    In [14], the authors proposed a GA-based secure and energy-aware routing (GASER) protocol for sparse MANETs.The GASER protocol selects the best route for routing packets between the source and the destination by combining GAs with other approaches, such that the selected path is the shortest.Among the other network nodes, the chosen route nodes have the most significant probability of message routing and have adequate energy to accept and then forward messages.GASER prevents the nodes from inducing network greyhole and blackhole attacks when it prefers the next hop with more likelihood of message forwarding, thereby rendering the routing protocol secure.In terms of packet delivery ratio (PDR), average residual resources, overhead ratio, and number of deceased nodes, the simulation findings revealed that GASER outperforms other protocols.

    In [15], the authors suggested a GA-bacterial optimization algorithm for foraging to perform the optimum routing selection.The pathways are initialized after checking several routes to the destination node, and the GA is initiated.The location of the maximum likelihood of optimal routes, which are the initial locations of bacteria for the optimization of bacteria foraging (BFO)algorithm, is easily found by this algorithm.To compensate for the low precision of the GA,utilizing the BFO algorithm can easily determine the extreme value and the best direction.Without altering the complexity of dynamic source routing, the suggested streamlined approach strengthens the routing selection algorithm.It shows the algorithm’s integration with the desired global solution.The simulation showed that the proposed algorithm is feasible and relevant and has positive experimental results.

    In [16], the authors proposed a scheme called GADA-LEACH.The scheme uses evolutionary GAs to boost cluster head selection in the legacy LEACH routing protocol in sensor networks.To facilitate coordination between the cluster head and base station, the concept of the relay node is implemented, which serves as an intermediary between the cluster head and the base station.The findings obtained from the simulation results confirmed the proposed scheme’s performance in terms of network lifespan.

    The authors in [17] suggested a new LAR protocol called DALAR to enhance the efficiency of the route discovery phase.When a node sends an RREQ message, it does not unconditionally forward the message; when the message has to be retransmitted depends on the number of adjacent nodes and the location information.The simulation findings showed that the length of the constructed route in the suggested method is the same as the flooding methods currently used;however, the nodes involved in forwarding the RREQ messages are decreased by 1%–4%.

    The authors in [18] proposed an algorithm to enhance the LAR protocol.Improving the use of LAR1 and LAR2 is essential to find the best routing path.The authors studied LAR1 and LAR2, ran simulations, analyzed the data, and found weaknesses in specific parameters.The authors decided to combine LAR1 and LAR2 in one algorithm, which they called LAR WHYM.They compared LAR1, LAR2, and LAR WHYM.The comparison results showed that LAR WHYM has a less end-to-end (E2E) delay than LAR1 and LAR2.Moreover, LAR WHYM is better at finding the best routing path with fewer hubs.The results also showed that LAR WHYM has a good PDR, routing overhead, throughout, and normalized routing load.The results showed that the algorithm was successful because it delivered the best performance and was proven better than LAR1 and LAR2.

    In [19], the authors proposed a predictive LAR (PLAR) for mobility models in which the target of motion is known.This protocol proposes that for each node, new location services provide location information.Location information is used to predict the destination node’s orientation, such as geographic coordination, current velocity, and direction of motion.Moreover,the introduction of “information lifetime”in the location service, as a major factor in determining the freshness of location data, has contributed to more precise predictions in the routing process.The simulation results revealed that the PLAR protocol overhead is less than the overhead found in LAR.

    In [20], the authors considered the efficient utilization of the bandwidth in LAR (EUBLAR),which can calculate the available bandwidth of all the intermediate nodes between the source and the destination.In this proposed protocol, the authors found the minimum available bandwidth of all the intermediate nodes between the source and the destination.On the basis of the bandwidth,the authors sent the data packets over that path.EUBLAR can effectively utilize bandwidth wastage, and every single bandwidth that can be used for data transfer can be used over an entirely configured network.Thus, the quality of service (QoS) of the ad hoc network is increased in terms of bandwidth.EUBLAR helps handle one of MANET’s most important performance factors (i.e., bandwidth).However, given that all the nodes were selected without considering any threshold value, it slowed down the data rate because of the increase in time to send data from the source to the destination because the bandwidth of some intermediate nodes was low.Data were sent based on the node with the minimum bandwidth.

    In [21], the authors were able to map out a plan that enhances the proficiency of LAR.First,for route discovery, they selected a common baseline, which is the line between the source and the destination hub.The request packet broadcasts while considering the baseline for targeting the next broadcasting hub in the request zone.The neighboring hub with the briefest separation to the pattern is the next broadcasting hub.Moreover, they looked at the execution of the GALAR algorithm and LAR.During the simulations, they directed the control overhead, the routing lifetime, and the PDR with diverse mobility speeds.The simulation results showed that the suggested GLAR would decrease the overhead control and build up the lifespan of the route more than LAR.

    In [22], the request zone was assumed to be the smallest triangle found in the source and expected zone nodes.The route increases the triangle region’s angle and repeats the flooding in a given area if the first discovery of the route cannot be identified.However, the request zone becomes convenient in an area of heavy congestion due to the limited size of the request zone in this algorithm.Thus, the repetitive incremental route discovery zone increases the overhead on the nodes and the routing time for areas with fewer nodes.

    In [7], by benefiting from the geographical location information to confine the flooding environment, LAR was proposed to improve the reactive execution.LAR starts with the flooding of the RREQ message to obtain the destination’s geographic position.For subsequent route discoveries, this restricts the flooding of control packets to the direction in which the destination is supposed to be situated.If no destination information persists in LAR, the sender does not become an expected zone.LAR is then forced to increase the request zone to flood the entire network.In [7,17–22], different surveys were proposed to optimize LAR-1 by merely forming the point of view of reducing the request zone, where the suggested concept of the reduction of the request zone was similar in both cases.

    Most approaches enhance the LAR protocol from narrowing the search region of the candidate nodes and limiting the number of candidate nodes that carry the packets.Many methods rely on the position table that contains the nodes’information location while they are in movement.This table is built by adding information about the sending node’s position to the header of the packet.However, the information displayed on the information table about the node’s position may not be exact because the node has moved to the current position.Thus, the earlier information of its location has expired.Therefore, any geometric-based expectation of the request and expected zones based on the single observation of the node’s location (even though it is the most recent one in the packet updates) can be misleading.Given that maintaining the information displayed on the table is impossible, sending the separate packets is the updated method because this may allocate a significant part of the bandwidth.

    Despite all the developments of LAR, two main limitations exist in literature approaches.First, mobility is based on the assumption that the nodes operate at a constant speed, which is invalid all the time in MANET networks.Second, either the definition of the request zone is geometrical or ignores many other contributing variables in the nodes’routing capability.

    3 GALAR Algorithm

    The proposed approach adds two main concepts of the LAR procedure.First, determining the destination node’s current position becomes more accurate because the position information of the transmitting node is added to the packet even if the transmitting node is only a routing node.Moreover, any node that receives a packet updates either the packet location information or its location table information to the most recent one.Second, selecting the contributing variables in the routing process and their significance is performed automatically based on genetic optimization.Genetic optimization is appropriate for avoiding local minima and determining the most accurate formula for the request zone.This formula is used to select the candidate nodes from a transmitting node’s coverage zone to carry a request packet to its destination for finding an optimum route for transmission between a source node and a destination node.The procedure for a developed LAR protocol consists of three sections, namely, route discovery using an RREQ packet), genetic optimization of criterion function, and GALAR algorithm operations.

    3.1 Route Discovery

    In GALAR, an RREQ packet includes the information provided in Fig.3.Source node S broadcasts RREQ packets to its neighboring nodes.The nodes are selected based on a predefined threshold of a criterion function.GA determines the criterion function.Each node updates the information table and the four and five parts in the RREQ packet with the most recent location information.Moreover, the transmitting node’s location information is updated in the node information table.The node decides whether they can send the packet by re-evaluating the criterion function with the updated location information.If the value is more than the provided threshold, then the node is deemed eligible and replies with an RREP packet to the transmitting node.Otherwise, the node discards the packet and checks the information of the route sequence.If the packet has been received beforehand, then the node will discard the packet without replying to the transmitting node with the RREP packet.The transmitting node counts how many RREP it has received.The packets are broadcasted with a lower value of the threshold if the number of RREP is less than the remaining RREQ.Once the destination node has received the RREQ,it will reply with the RREP.

    Figure 3:RREQ packet format

    3.2 Genetic Optimization of Criterion Function

    The criterion function of selecting the eligible node to carry the RREQ packet is related to six variables, as shown in Fig.4.In the figure,DisSdenotes the distance to the source node,DisDdenotes the distance to the destination node,DistBIdenotes the distance to the baseline,DistdSDTrepresents the distance between the source and the destination nodes,NodeSpeeddenotes the node, speed andCovRaddenotes the node coverage zone.

    The six variables are used with their inverse in the criterion function.Thus, the criterion function contains 12 variables.The formula for this criterion function is

    Figure 4:Criterion function variables

    Figure 5:Algorithm for sending an RREQ buffer

    Figure 6:Algorithm for an RREQ buffer

    The coefficientswnare combined in a vector of chromosomes as

    When a chromosome is enabled, the value of the criterion function is evaluated for its parameters with respect to each node in the coverage zone, and a threshold is applied to select a node from the coverage zone to be eligible for routing.To select the elite among the whole population for performing the mutation and crossover for generating the offspring, the fitness function value is calculated concerning three evaluation measures, namely, the length of the shortest route, the delay for obtaining the shortest route, and the number of routes that are generated from this criterion function.The variables are being minimized in this optimization.Thus, the elite is selected with the low value of the shortest route, its corresponding delay, and the number of routes generated from this chromosome.Once the elite is selected, 0.8/0.2 crossovers are performed, and 20% mutation is applied to maintain other solutions that may lead to the optimal one.The GA is enabled in two scenarios:the nodes are stationary (static), and the nodes are moving within 2 s interval (dynamic).Two criterion functions are found for each.

    Figure 7:Algorithm for a received RREQ buffer

    If the problem has been identified, then the candidate alternatives will follow the steps of a GALAR as follows.

    Step 1:Randomly generate chro (w1,w2,...,wn) coefficients for the criterion function defined in Formula 1.

    Step 2:Calculate the fitness functionf(x1),f(x2),...,f(xn)for each chro (w1,w2,...,wn).Use the fitness function to determine each string’s fitness in the population (i.e., the length of the shortest route, the delay for obtaining the shortest route, and the number of routes generated from this criterion function).

    Step 3:While nonoffspring has been produced,

    ? Select two parent chromosomes (two possible solutions of the criterion function) based on the selection probability.

    ? The crossover operator produces two offspring:crossover and multipoint crossover probability (Pc).

    ? All offspring are mutated at each locus operator using the mutation given a defined mutation probability (Pm).The subsequent genes for children are incorporated into the population.

    ? If n is odd, then a discard function is highly likely to discard a less fit chromosome.

    Step 4:Substitute the existing population with a new one.

    Step 5:Return to Step 2 until a match is found for the solution or untilwhas several iterations.

    Figure 8:Algorithm for an ACK buffer

    3.3 GALAR Algorithm Operations

    For GALAR algorithm operations, this study has modified the mechanism of algorithms for sending an RREQ buffer, an RREQ buffer, a received RREQ buffer, and an ACK buffer.The GALAR algorithm detail operations are shown in Figs.5–8.

    4 Results and Evaluation

    4.1 Simulation Model and Assumption

    This section presents the simulation environment.The performance of the proposed GALAR algorithm was compared with that of LARwith, which is a development of the classical LAR by embedding the position information of the transmitting node in the RREQ packet where the information table is updated frequently about the other nodes’positions than LAR.Moreover,GALAR was compared with Heuristics, which indicates designing the criterion function based on experience about how the variables of the embedded factors should influence the routing process.The criterion function’s coefficients should be guessed based on the nature of the corresponding term’s variable in the criterion function and compared with the standard protocol LAR, which has been proposed in [7].Moreover, GALAR compared with DALAR, as a benchmark routing protocol, which has been proposed in [17].The GALAR algorithm was simulated using MATLAB.

    In this study, 10, 20, 30, 40, 50, 60, 70, 80, 90, and 100 nodes were simulated to allow for the nodes’arbitrary movement.The nodes have a fixed speed of 0.4 m/s for each node to avoid dealing with the high change of network dynamics and be suitable with the environment dimensions of 20 m2× 20 m2.Each node’s communication range was placed at 5 m as an allowance for encountering the worst-case scenario, in which each node has a low energy and a short range of distance.Other simulation unchanged parameters are specified in Tab.1.Finally,the result of the criterion function is presented, and detailed analysis and discussion of the result are given.

    Table 1:Simulation parameters

    The following are the performance metrics used in the simulation experiments.

    a.PDRis the ratio of a delivered data packet to the destination.The PDR is computed as follows:

    b.Packet loss ratio(PLR)is the ratio between the number of transmitted data packets and the number of received data packets.The E2E is calculated as follows:

    c.E2E delay.The E2E delay refers to the average time consumed in ms to transfer a data packet successfully from the source to the destination across the network.The E2E delay is calculated as follows:wherenis the number of data packets transmitted successfully across the network,iis the unique packet ID,Riis the time to receive a packet with unique IDi, andSiis the time it takes to send a packet with a unique IDi.

    d.RREQ overheadis the ratio of the number of RREQ packets divided by the number of packets sent.The RREQ overhead is computed as follows:

    e.Performance indexis the performance measure that has been designed to express more than one aspect of the routing protocol performance.This index includes the delay factor,efficiency, and reliability, all of which are needed for evaluating the overall performance of the proposed GALAR algorithm.

    This study enabled GA in two scenarios.The nodes were maintained at a stationary (static)position, and the nodes were made to move within a 2 s interval (dynamic).Two criterion functions were found for each.To determine which of the two functions is better; the PDR between them was compared.The results of the comparison are shown in Fig.9.The graph shows that enabling genetic optimization in the dynamic scenario yields better PDR.

    Figure 9:Comparison of PDR between dynamic-and static-based genetics

    The graph shows that the network performs well when the movement of the nodes has been considered.The average value of PDR in a dynamic-node situation was 94.81%, whereas in a stationary-node situation, it was 88.14%.The efficient optimization scheme interprets this for establishing the route while tuning the criterion function in the dynamic situation.The reason is the great capability of capturing the dynamics of the environment and the moving nodes.Thus,the criterion function of a dynamic situation was used in the next experiments.The values of coefficients after tuning are as follows:

    Experimental results indicate that the maximum weight observed was 1.3513, and the minimum weight was 0.3335.After tuning the criterion function coefficients, this study aims to prove that the proposed GALAR algorithm outperforms the traditional LAR algorithm.Thus, the PDR,PLR, E2E delay, RREQ overhead, and performance index were compared with an enabling GA for tuning the weights, GALAR.

    4.2 PDR

    Fig.10a shows the PDR in the GALAR algorithm with time simulation.The graphs in the figure show that the proposed GALAR algorithm outperformed the other methods.The algorithm also improved the PDR of the network.To test the efficiency and consistency and achieve a certain level of validity of the proposed GALAR algorithm, the authors made a round of 10 experiments while changing the number of nodes and computing the average of PDR, the average required time for constructing a route between a source node and a destination node,and the average required time from generating a new data packet to the sending the packet.The proposed GALAR algorithm achieved an average PDR value of 99.87%, whereas Heuristics achieved an average PDR value of 88.34%.LAR, LARwith, and DALAR achieved an average PDR value of 73.23%, 65.65%, and 74.32%, respectively.

    Fig.10b shows the PDR in the GALAR algorithm with the number of nodes.The proposed GALAR algorithm achieved an average PDR value of 99.76%.By contrast, Heuristics achieved an average PDR value of 82.98%.LAR, LARwith, and DALAR achieved an average PDR value of 84.82%, 88.90%, and 80.73%, respectively.

    Figure 10:PDR via (a) time and (b) number of nodes

    4.3 PLR

    Fig.11a shows the PLR in the GALAR algorithm with time simulation.The figure shows that the proposed GALAR outperformed the other methods again.It also improved the PLR of the network.The proposed GALAR algorithm achieved an average PLR value of 0.12%, whereas Heuristics achieved an average PLR value of 11.65%.LAR, LARwith, and DALAR achieved an average PLR value of 26.76%, 34.34%, and 25.67%, respectively.

    Fig.11b shows the PLR in the GALAR with the number of nodes.The proposed GALAR achieved an average PLR value of 0.2362%, whereas Heuristics achieved 17.01%.LAR, LARwith,and DALAR achieved an average PLR value of 15.18%, 11.09%, and 19.26%, respectively.This superiority of the proposed GALAR algorithm over the other protocols is interpreted because the GALAR is the only protocol that considers all factors that contribute to efficient routing.

    Figure 11:PLR via (a) time and (b) number of nodes

    4.4 E2E Delay

    The proposed GALAR algorithm acquired the least time to reach the data packet to the destination.The time at which the first packet was transmitted from the source was subtracted from the time where the first data packet arrived at the destination.

    Fig.12a shows the average E2E delay in the GALAR algorithm with time simulation.The figure shows how the proposed GALAR algorithm outperformed the other methods, and the average E2E delay of the network improved.The proposed GALAR algorithm achieved an average E2E delay value of 0.4 ms, whereas that of Heuristics, LAR, LARwith, and DALAR was 0.6, 0.5, 0.7, and 0.56 ms, respectively.

    Fig.12b shows the average E2E delay in the GALAR algorithm with the number of nodes.The proposed GALAR algorithm achieved an average E2E delay value pf 0.4 ms, whereas Heuristics, LAR, LARwith, and DALAR achieved an average E2E delay value of 0.8, 0.7, 3.7,and 0.65 ms, respectively.

    This delayed reduction in the GALAR algorithm is explained by the fact that the GALAR algorithm selects the most suitable node to be a candidate for routing the packets.The efficiency in routing is explained by the criterion function optimized based on a dynamic scenario while considering all factors in successful routing.The selection process caused no computational complexity.

    Figure 12:E2E delay via (a) time and (b) number of nodes

    4.5 RREQ Overhead

    To prove that this GALAR algorithm reduces the network load, the RREQ overhead needed to achieve the connection between nodes was calculated for 10 cases.Figs.14a and 14b show that the network load with packets in a LAR protocol case increases approximately linearly with the number of nodes because LAR depends on flooding.However, the proposed GALAR algorithm depends on the targeted search that reduces the network load regardless of the number of nodes.

    Fig.13a shows the RREQ overhead in the GALAR with time simulation.The proposed GALAR noticeably improved the RREQ overhead of the network.GALAR algorithm achieved an RREQ overhead value of 0.93%, whereas that of Heuristics, LAR, LARwith, and DALAR was 0.991%, 0.993%, 0.995%, and 0.997%, respectively.

    Fig.13b shows the RREQ overhead in the GALAR algorithm with the number of nodes.The proposed GALAR algorithm achieved an RREQ overhead value of 0.85%.Conversely, Heuristics,LAR, LARwith, and DALAR achieved an RREQ overhead value of 0.90%, 0.92%, 0.93%, and 0.95%, respectively.

    4.6 Performance Index

    To evaluate the overall performance of the proposed protocol, the authors calculated the new performance metrics, namely, performance index.The results of the performance index are shown in Figs.14a and 14b.

    Figure 13:RREQ overhead via (a) time and (b) number of nodes

    Fig.14a shows the performance index in GALAR with time simulation.The GALAR algorithm significantly improved the performance index of the network.The proposed GALAR algorithm achieved a performance index value of 65, whereas Heuristics, LAR, LARwith, and DALAR achieved a performance index value of 42, 43, 45, and 35, respectively.

    Fig.14b shows the performance index in GALAR with the number of nodes.The GALAR algorithm achieved a performance index value of 75, whereas that of Heuristics, LAR, LARwith,and DALAR was 55, 60, 50, and 45, respectively.

    Figure 14:Performance index via (a) time and (b) number of nodes

    5 Conclusion and Recommendations

    This work analyzed the performance estimation of LAR protocols, considering the use of location information to enhance ad hoc network routing protocols using two scenarios.First, the likelihood of achieving high accuracy in determining the current position of the destination node was achieved by adding the position information of the transmitting node to the packet even when the transmitting node is only a routing node.Moreover, any node that received a packet updated either the packet location information or its location table information to the most recent one.Second, selecting the contributing variables in the routing process and its significance was performed automatically based on genetic optimization.

    Genetic optimization is appropriate for avoiding the local minima and determining the most accurate formula for the request zone.This formula selected the candidate nodes from a transmitting node’s coverage zone to carry a request packet to its destination to find an optimum route of transmission between a source node and a destination node.Location routing protocols can be improved significantly using an optimization scheme of node selection criteria to pass the packets to their final destination.

    This study has proven that evolutionary genetic optimization can map the request zone to a node selection criterion.Moreover, this selection has converted routing from being geometric region-oriented in past research to being node-oriented.This approach proves and supports the concept that the request zone has nonlinearity due to different protocol natures, environments, and node dynamics.Thus, using an analytical definition of a request zone is a key factor in reducing overhead in the network, improving QoS, and addressing other delay measures.The simulation results show that the GALAR algorithm makes a packet delivery that reaches more than 99%with less RREQ, which poses a good performance with few overheads in the network.Moreover,GALAR was compared with other protocols concerning different evaluation measures, and the GALAR algorithm significantly outperformed the other methods.

    As a future work, the energy level of the nodes should be considered in the selection criterion process.Nodes with less energy should be avoided to maintain the long lifetime of the network.Characterizing the influence of nodes’mobility and dynamics on the performance of the protocol would also be helpful.Thus, more studies may be able to investigate the process of improving the protocols to handle several issues.

    Funding Statement:This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program.

    Conficts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    久久久国产精品麻豆| 成人亚洲欧美一区二区av| 欧美丝袜亚洲另类| 久久国产精品男人的天堂亚洲 | 色哟哟·www| 99热这里只有是精品在线观看| .国产精品久久| 国产色婷婷99| 九九在线视频观看精品| 国产午夜精品一二区理论片| 亚洲av免费高清在线观看| 日日摸夜夜添夜夜添av毛片| 丰满少妇做爰视频| √禁漫天堂资源中文www| 久久这里有精品视频免费| 亚洲精品色激情综合| 边亲边吃奶的免费视频| 大又大粗又爽又黄少妇毛片口| 18禁动态无遮挡网站| 亚洲精品av麻豆狂野| 在线免费观看不下载黄p国产| 久久久久久久久大av| 高清午夜精品一区二区三区| 97在线人人人人妻| av黄色大香蕉| 亚洲美女搞黄在线观看| 丰满饥渴人妻一区二区三| 亚洲精品乱久久久久久| 91精品三级在线观看| 纯流量卡能插随身wifi吗| 精品卡一卡二卡四卡免费| 国产精品一区二区在线不卡| 日韩 亚洲 欧美在线| 免费黄频网站在线观看国产| 国产精品久久久久久久电影| 97超视频在线观看视频| 高清欧美精品videossex| 熟妇人妻不卡中文字幕| 成人亚洲精品一区在线观看| 视频区图区小说| 青青草视频在线视频观看| 亚洲人与动物交配视频| 考比视频在线观看| freevideosex欧美| 国产精品女同一区二区软件| 成人二区视频| 亚洲在久久综合| 这个男人来自地球电影免费观看 | 国产深夜福利视频在线观看| 成人亚洲精品一区在线观看| 亚洲国产av新网站| 日韩免费高清中文字幕av| 免费黄网站久久成人精品| 国产一区二区三区综合在线观看 | 成人漫画全彩无遮挡| 人妻少妇偷人精品九色| av专区在线播放| 亚洲欧美一区二区三区黑人 | 3wmmmm亚洲av在线观看| 久久青草综合色| 天堂俺去俺来也www色官网| 赤兔流量卡办理| 天天操日日干夜夜撸| 免费不卡的大黄色大毛片视频在线观看| 热re99久久国产66热| 飞空精品影院首页| 久久久久久久久久久免费av| 国产一区二区在线观看av| 嫩草影院入口| 在线观看人妻少妇| 日本-黄色视频高清免费观看| 精品久久久久久电影网| av电影中文网址| 亚洲国产精品国产精品| 熟女电影av网| 欧美精品国产亚洲| 欧美xxxx性猛交bbbb| 日韩视频在线欧美| 一级,二级,三级黄色视频| 免费av中文字幕在线| 人人澡人人妻人| 街头女战士在线观看网站| 狠狠婷婷综合久久久久久88av| 欧美丝袜亚洲另类| 最近手机中文字幕大全| 大码成人一级视频| 两个人的视频大全免费| 熟妇人妻不卡中文字幕| 下体分泌物呈黄色| 午夜福利影视在线免费观看| 一本一本综合久久| 国产精品麻豆人妻色哟哟久久| 免费观看av网站的网址| 久久久国产一区二区| 亚洲第一区二区三区不卡| 亚洲国产av影院在线观看| 国产免费一区二区三区四区乱码| 久久久久久久亚洲中文字幕| 中文天堂在线官网| 亚洲情色 制服丝袜| 久久99热6这里只有精品| 久久亚洲国产成人精品v| 国产精品国产三级专区第一集| 男女高潮啪啪啪动态图| 国产无遮挡羞羞视频在线观看| 一个人看视频在线观看www免费| 免费观看a级毛片全部| 久久精品久久精品一区二区三区| 亚洲少妇的诱惑av| 亚洲第一区二区三区不卡| 一级片'在线观看视频| 国产 精品1| 80岁老熟妇乱子伦牲交| 如日韩欧美国产精品一区二区三区 | 亚洲欧洲日产国产| 亚洲av综合色区一区| 亚洲性久久影院| av播播在线观看一区| 黄片播放在线免费| 久久精品国产亚洲av天美| 国产精品一区二区在线观看99| 亚州av有码| 丝袜脚勾引网站| kizo精华| 美女国产视频在线观看| 久久久久网色| 免费看不卡的av| 亚洲色图 男人天堂 中文字幕 | 2021少妇久久久久久久久久久| 午夜免费观看性视频| 亚洲精品日韩在线中文字幕| 一区二区三区四区激情视频| 亚洲国产精品国产精品| 亚洲av中文av极速乱| 国产av国产精品国产| 老熟女久久久| 男女啪啪激烈高潮av片| 国产高清有码在线观看视频| 97在线人人人人妻| 亚洲精品,欧美精品| 少妇猛男粗大的猛烈进出视频| 日本91视频免费播放| 纵有疾风起免费观看全集完整版| 黄片播放在线免费| 亚洲欧美色中文字幕在线| 亚洲av中文av极速乱| av国产精品久久久久影院| 99久久人妻综合| 国产女主播在线喷水免费视频网站| 2018国产大陆天天弄谢| 亚洲av不卡在线观看| 免费av不卡在线播放| 国产欧美另类精品又又久久亚洲欧美| 人妻少妇偷人精品九色| 国产在线免费精品| 国产精品三级大全| 国产在线一区二区三区精| 成人亚洲欧美一区二区av| 大码成人一级视频| 纯流量卡能插随身wifi吗| 免费观看av网站的网址| 狂野欧美激情性xxxx在线观看| 国产欧美日韩一区二区三区在线 | 中文乱码字字幕精品一区二区三区| 亚洲人成网站在线观看播放| 国产精品秋霞免费鲁丝片| av不卡在线播放| 国产又色又爽无遮挡免| 少妇人妻久久综合中文| 国产日韩欧美视频二区| 一级毛片黄色毛片免费观看视频| 成人影院久久| 极品少妇高潮喷水抽搐| 日韩一本色道免费dvd| 视频区图区小说| 国产白丝娇喘喷水9色精品| 自拍欧美九色日韩亚洲蝌蚪91| 亚洲精品乱码久久久久久按摩| 我的女老师完整版在线观看| 国产精品人妻久久久影院| 777米奇影视久久| 在线观看美女被高潮喷水网站| 人妻系列 视频| 在线观看免费视频网站a站| 亚洲欧美精品自产自拍| 亚洲美女视频黄频| 国产高清有码在线观看视频| 欧美亚洲日本最大视频资源| 亚洲性久久影院| 黄片无遮挡物在线观看| 青春草亚洲视频在线观看| 热99国产精品久久久久久7| 在线观看人妻少妇| 精品国产露脸久久av麻豆| 日韩不卡一区二区三区视频在线| 黄片播放在线免费| 亚洲五月色婷婷综合| 久久精品国产亚洲av天美| 日日摸夜夜添夜夜添av毛片| 我的老师免费观看完整版| 大香蕉久久成人网| 色吧在线观看| 插阴视频在线观看视频| 久久精品国产a三级三级三级| 国产精品一区二区在线观看99| 欧美亚洲 丝袜 人妻 在线| 观看美女的网站| 老女人水多毛片| 永久免费av网站大全| 精品一区在线观看国产| 乱人伦中国视频| 久久久午夜欧美精品| 精品国产国语对白av| 午夜视频国产福利| 亚洲一级一片aⅴ在线观看| 啦啦啦啦在线视频资源| 免费观看av网站的网址| 久久97久久精品| 日本欧美视频一区| 国产极品粉嫩免费观看在线 | 在线观看一区二区三区激情| 人妻夜夜爽99麻豆av| 亚洲国产精品一区二区三区在线| 日本-黄色视频高清免费观看| 国产精品人妻久久久久久| 99久久精品国产国产毛片| 一个人免费看片子| 国产亚洲精品第一综合不卡 | 久久午夜综合久久蜜桃| 免费av不卡在线播放| 我的老师免费观看完整版| 国产成人91sexporn| 久久精品久久久久久噜噜老黄| 国产一区二区在线观看av| 成人国语在线视频| 大片免费播放器 马上看| 亚洲国产色片| 日韩精品免费视频一区二区三区 | 国产探花极品一区二区| 久久久午夜欧美精品| 丰满迷人的少妇在线观看| 欧美精品亚洲一区二区| 夜夜爽夜夜爽视频| 欧美激情极品国产一区二区三区 | 久久鲁丝午夜福利片| 在线亚洲精品国产二区图片欧美 | 国产精品 国内视频| 精品人妻偷拍中文字幕| 插逼视频在线观看| 亚洲精品亚洲一区二区| a级毛片免费高清观看在线播放| 2021少妇久久久久久久久久久| 日韩欧美一区视频在线观看| 婷婷色麻豆天堂久久| 国产高清国产精品国产三级| 51国产日韩欧美| 在线播放无遮挡| 亚洲精品美女久久av网站| 黑丝袜美女国产一区| 精品少妇黑人巨大在线播放| 亚洲精品一二三| 青春草视频在线免费观看| 午夜福利视频在线观看免费| 欧美日韩亚洲高清精品| 一级毛片我不卡| 国产综合精华液| 亚州av有码| 亚洲国产精品成人久久小说| 人妻 亚洲 视频| 如日韩欧美国产精品一区二区三区 | 久久人人爽av亚洲精品天堂| 久久久久网色| 精品亚洲成a人片在线观看| 亚洲第一av免费看| 亚洲人成网站在线播| 高清在线视频一区二区三区| 欧美97在线视频| 18禁观看日本| 免费人成在线观看视频色| 国产精品久久久久久久电影| 欧美日韩成人在线一区二区| 美女福利国产在线| 在线观看一区二区三区激情| 欧美亚洲 丝袜 人妻 在线| 美女福利国产在线| 大又大粗又爽又黄少妇毛片口| 一区二区三区精品91| 91精品国产国语对白视频| 97在线人人人人妻| 三级国产精品欧美在线观看| 日本与韩国留学比较| 国产成人免费观看mmmm| 国产精品嫩草影院av在线观看| 久久久久久久久久久丰满| 成人亚洲欧美一区二区av| 爱豆传媒免费全集在线观看| 热99国产精品久久久久久7| 日韩视频在线欧美| 在线观看免费日韩欧美大片 | 亚洲,欧美,日韩| 免费观看a级毛片全部| 一区二区三区四区激情视频| 99久久人妻综合| 免费av不卡在线播放| 在线观看三级黄色| 日本欧美国产在线视频| 在线观看一区二区三区激情| 人成视频在线观看免费观看| a级毛片免费高清观看在线播放| 中文字幕制服av| 欧美日韩一区二区视频在线观看视频在线| 精品久久国产蜜桃| 韩国高清视频一区二区三区| 人人妻人人澡人人爽人人夜夜| 国产成人精品婷婷| 日韩 亚洲 欧美在线| 不卡视频在线观看欧美| av播播在线观看一区| 久久人人爽av亚洲精品天堂| 国产亚洲一区二区精品| 三上悠亚av全集在线观看| 两个人免费观看高清视频| 国产免费现黄频在线看| 久久国产精品大桥未久av| 满18在线观看网站| 狠狠婷婷综合久久久久久88av| 交换朋友夫妻互换小说| 日韩人妻高清精品专区| 免费观看a级毛片全部| 国产极品粉嫩免费观看在线 | 成人漫画全彩无遮挡| 另类精品久久| 欧美日韩综合久久久久久| 91久久精品国产一区二区三区| 韩国高清视频一区二区三区| 国产精品麻豆人妻色哟哟久久| 99视频精品全部免费 在线| 亚洲国产精品专区欧美| 亚洲综合色网址| 欧美 亚洲 国产 日韩一| 免费看av在线观看网站| 在线观看免费视频网站a站| 制服丝袜香蕉在线| 草草在线视频免费看| 久久久久人妻精品一区果冻| av国产久精品久网站免费入址| 亚洲国产欧美日韩在线播放| 国产有黄有色有爽视频| 国产极品天堂在线| 中文字幕av电影在线播放| 日韩一区二区视频免费看| 久久久午夜欧美精品| av电影中文网址| 精品少妇黑人巨大在线播放| 午夜激情久久久久久久| 夜夜骑夜夜射夜夜干| 亚洲av不卡在线观看| 亚洲精品久久成人aⅴ小说 | 街头女战士在线观看网站| 免费不卡的大黄色大毛片视频在线观看| 亚洲av免费高清在线观看| 日韩精品免费视频一区二区三区 | 久久久欧美国产精品| 搡女人真爽免费视频火全软件| 亚洲人与动物交配视频| 色网站视频免费| 国精品久久久久久国模美| 黄色配什么色好看| 美女内射精品一级片tv| 日本免费在线观看一区| 中文乱码字字幕精品一区二区三区| 国产免费福利视频在线观看| 国产 精品1| 日韩av不卡免费在线播放| 少妇 在线观看| 亚洲一区二区三区欧美精品| 美女国产高潮福利片在线看| 日韩一本色道免费dvd| 狂野欧美白嫩少妇大欣赏| 久久热精品热| 99热全是精品| 少妇的逼水好多| 亚洲久久久国产精品| 亚洲经典国产精华液单| 3wmmmm亚洲av在线观看| 欧美精品亚洲一区二区| 一级毛片黄色毛片免费观看视频| 美女xxoo啪啪120秒动态图| 一本大道久久a久久精品| 国产视频首页在线观看| 丝袜喷水一区| 日本vs欧美在线观看视频| 九色亚洲精品在线播放| 九九在线视频观看精品| 免费久久久久久久精品成人欧美视频 | 国产成人精品无人区| 美女xxoo啪啪120秒动态图| 久久精品国产亚洲av天美| 男女啪啪激烈高潮av片| 亚洲综合精品二区| 久久av网站| 日韩中文字幕视频在线看片| 国产精品国产三级国产专区5o| 国产免费福利视频在线观看| 久久午夜福利片| 丝袜美足系列| 欧美亚洲日本最大视频资源| 国产精品 国内视频| 免费观看的影片在线观看| 国产欧美亚洲国产| 久久影院123| av黄色大香蕉| 一区在线观看完整版| 少妇猛男粗大的猛烈进出视频| 亚洲国产毛片av蜜桃av| 久久久亚洲精品成人影院| 中国国产av一级| 99热网站在线观看| 午夜激情av网站| 午夜福利,免费看| 亚洲av.av天堂| 国产深夜福利视频在线观看| 一区在线观看完整版| 最近2019中文字幕mv第一页| 亚洲中文av在线| 久久鲁丝午夜福利片| 大又大粗又爽又黄少妇毛片口| 国产国语露脸激情在线看| 少妇 在线观看| 狠狠婷婷综合久久久久久88av| 一二三四中文在线观看免费高清| 欧美+日韩+精品| 中文精品一卡2卡3卡4更新| 久久精品国产鲁丝片午夜精品| 伊人亚洲综合成人网| 中文天堂在线官网| 天堂8中文在线网| 国产高清三级在线| 观看av在线不卡| 人妻系列 视频| 日本-黄色视频高清免费观看| 国精品久久久久久国模美| 中文字幕人妻熟人妻熟丝袜美| 亚洲国产成人一精品久久久| 国产精品 国内视频| 美女内射精品一级片tv| 777米奇影视久久| 亚洲精品乱久久久久久| 国模一区二区三区四区视频| 国产免费一区二区三区四区乱码| 亚洲在久久综合| 久久ye,这里只有精品| 少妇的逼水好多| 欧美另类一区| 在线观看一区二区三区激情| 国产伦精品一区二区三区视频9| 国产精品久久久久久久久免| 久久99一区二区三区| 久久99热这里只频精品6学生| 亚洲国产毛片av蜜桃av| 精品国产一区二区久久| 国产无遮挡羞羞视频在线观看| 18在线观看网站| a 毛片基地| 亚洲精品aⅴ在线观看| 人妻人人澡人人爽人人| 国产亚洲精品久久久com| 男女边摸边吃奶| 国产精品一二三区在线看| 成人国产麻豆网| 一级爰片在线观看| 美女xxoo啪啪120秒动态图| 久久精品人人爽人人爽视色| av女优亚洲男人天堂| 久久99蜜桃精品久久| 老熟女久久久| 97在线视频观看| 国产一区二区三区综合在线观看 | 国产精品嫩草影院av在线观看| 最新的欧美精品一区二区| 美女视频免费永久观看网站| 久久久久久久久大av| 日韩欧美一区视频在线观看| 国产高清有码在线观看视频| 制服丝袜香蕉在线| 欧美3d第一页| 18禁裸乳无遮挡动漫免费视频| 99久久精品一区二区三区| 最近中文字幕高清免费大全6| 熟女电影av网| 99热这里只有是精品在线观看| 国产精品秋霞免费鲁丝片| 免费人成在线观看视频色| 人人妻人人添人人爽欧美一区卜| 夜夜看夜夜爽夜夜摸| 久久人人爽人人片av| 亚洲欧洲国产日韩| 秋霞伦理黄片| 一二三四中文在线观看免费高清| 亚洲精品aⅴ在线观看| 亚洲精品456在线播放app| 十分钟在线观看高清视频www| 国产av一区二区精品久久| 日日摸夜夜添夜夜爱| 高清黄色对白视频在线免费看| 成人二区视频| 大码成人一级视频| 国产探花极品一区二区| 国产精品熟女久久久久浪| 国产午夜精品久久久久久一区二区三区| 极品少妇高潮喷水抽搐| 国产精品一区二区在线不卡| 欧美日韩综合久久久久久| 亚洲欧美日韩另类电影网站| 日韩制服骚丝袜av| 久久久欧美国产精品| 精品少妇内射三级| 亚洲一区二区三区欧美精品| 伊人久久国产一区二区| 国产精品一区二区在线不卡| 99视频精品全部免费 在线| 一边摸一边做爽爽视频免费| 亚洲av男天堂| 亚洲无线观看免费| 春色校园在线视频观看| 国产精品无大码| 亚洲欧美色中文字幕在线| 免费大片18禁| 久久人妻熟女aⅴ| 国产无遮挡羞羞视频在线观看| 18禁裸乳无遮挡动漫免费视频| 久久av网站| 一本大道久久a久久精品| 久久99蜜桃精品久久| 丝袜喷水一区| 久久久久久久精品精品| 国产精品无大码| 国产爽快片一区二区三区| 2018国产大陆天天弄谢| 日韩,欧美,国产一区二区三区| 成年人午夜在线观看视频| av免费观看日本| 男女无遮挡免费网站观看| 黄色毛片三级朝国网站| 国产免费福利视频在线观看| 熟女人妻精品中文字幕| 看十八女毛片水多多多| 永久网站在线| 大片免费播放器 马上看| 久久国产精品大桥未久av| 国产成人av激情在线播放 | 久久狼人影院| 国产深夜福利视频在线观看| 男人操女人黄网站| 国产老妇伦熟女老妇高清| 国产有黄有色有爽视频| av电影中文网址| 亚洲欧美精品自产自拍| 老司机亚洲免费影院| 午夜福利在线观看免费完整高清在| 中文乱码字字幕精品一区二区三区| 日韩人妻高清精品专区| 建设人人有责人人尽责人人享有的| 亚洲精品日韩av片在线观看| 高清毛片免费看| 少妇的逼好多水| 国产成人freesex在线| 国产免费一区二区三区四区乱码| 波野结衣二区三区在线| a 毛片基地| 菩萨蛮人人尽说江南好唐韦庄| 国产成人午夜福利电影在线观看| 国产在视频线精品| 国产熟女午夜一区二区三区 | 日韩中文字幕视频在线看片| 久久久久国产网址| 欧美精品亚洲一区二区| 亚洲av.av天堂| 久久精品国产亚洲av涩爱| 下体分泌物呈黄色| 亚洲伊人久久精品综合| 欧美激情 高清一区二区三区| 亚洲av免费高清在线观看| 99热国产这里只有精品6| 人妻 亚洲 视频| 插阴视频在线观看视频| 观看av在线不卡| 久久毛片免费看一区二区三区| 亚洲精品国产av成人精品| 免费观看a级毛片全部| 两个人免费观看高清视频| 人妻人人澡人人爽人人| 69精品国产乱码久久久| 成年女人在线观看亚洲视频| 99九九在线精品视频| 91aial.com中文字幕在线观看| 国产淫语在线视频| 嫩草影院入口| 桃花免费在线播放| 国产日韩欧美在线精品| 国产亚洲最大av| 国产免费又黄又爽又色| 欧美最新免费一区二区三区| 99九九在线精品视频| 欧美三级亚洲精品| 成年人午夜在线观看视频| 男女啪啪激烈高潮av片| 热re99久久精品国产66热6| 久久亚洲国产成人精品v| 美女国产视频在线观看| 黄色欧美视频在线观看| 一级a做视频免费观看| 一区二区日韩欧美中文字幕 | 成人毛片a级毛片在线播放| 亚洲伊人久久精品综合|