• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Energy Efficient Clustering Protocol to Enhance Network Lifetime in Wireless Sensor Networks

    2021-12-14 06:05:38NanthiniNithyaKalyaniandSudhakarSengan
    Computers Materials&Continua 2021年9期

    S.Nanthini,S.Nithya Kalyani and Sudhakar Sengan

    1Department of Computer Science and Engineering,Sri Ramakrishna College of Engineering,Perambalur,621113,India

    2Department of Information Technology,K.S.R College of Engineering,Tiruchengode,637215,India

    3Department of Computer Science and Engineering,PSN College of Engineering and Technology,Tirunelveli,627152,India

    Abstract:In this paper,the energy conservation in the ununiform clustered network field is proposed.The fundamental reason behind the methodology is that in the process of CH election,nodes Competition Radius(CR)task is based on not just the space between nodes and their Residual Energy (RE),which is utilized in Energy-Aware Distributed Unequal Clustering(EADUC)protocol but also a third-degree factor,i.e.,the nearby multi-hop node count.In contrast,a third-factor nearby nodes count is also used.This surrounding data is taken into account in the clustering feature to increase the network’s life span.The proposed method,known as Energy Conscious Scattered Asymmetric Clustering (ECSAC),self-controls the nodes’energy utilization for equal allotment and un-equal delivery.Besides,extra attention is agreed to energy consumption in the communication process by applying a timeslot-based backtracking algorithm for increasing the network’s lifetime.The proposed methodology reduces the clustering overhead and node communication energy consumption to extend the network’s lifetime.Our suggested method’s results are investigated against the classical techniques using the lifetime of the network,RE,alive hop count and energy consumption during transmission as the performance metric.

    Keywords:Wireless sensor networks;energy conservation;lifetime enhancement;clustering;cluster head

    1 Introduction

    Wireless Sensor Networks (WSNs) are unique with more source restrictions like energy,the power to process,accumulation and communication range.Among the criteria,sensor energy is the critical resource limitation of the WSNs.Many research types have been studied to fix this issue [1,2].Nodes in WSN are placed very close to collect data in applications that require huge areas like farming,jungle,mining,monitoring rail tunnels,the solar cell in a grid etc.They need information from all positions [3-5].

    In most cases,the Base Station (BS) is located faraway from the detecting area.In those networks,BS regularly collects the information.To get consistent monitoring networks,it is very fruitful to cluster them with classified topology.It was shown that the clustering of the network provides more life for the network than the one with transmitting information straight away.It was seen that the network shelf life becomes better twice or thrice with clustering [6,7].In clustering,the sleep times of the usual SNs (Sink Node) are defined,whereas Cluster Heads (CHs) organize the fellow nodes’action,once again leading to control of energy consumption [4,8,9].

    Moreover,clustering aids’collection of information at CH by reducing the count of data packets being transmitted,aids in minimizing the consumption of energy in sensor nodes[10,11].This process is done in a couple of stages,(1) intra-cluster,which means clustering within itself,(2) inter-cluster,which means clustering amid cluster and BS.Besides,the WSN clustering scheme’s exchange of messages is assimilated either with an SH transmission or MH routing.For the exchange of messages within-cluster,the majority of the clustering protocols use Single-Hop(SH) communication because,within the cluster,the space amid sensors is comparatively shorter,e.g.,LEACH-DT [8],LEACH [12],HEED [13-15],etc.Previous studies show that multi-hop interaction amid the SNs and the CH is highly economical in energy compared to the single hop interaction while losing the broadcast.

    The Multi-Hop (MH) communication works well in handling the downfalls in signal propagation because the radio loses energy not just while transmitting but also while receiving messages;transmitting straight away is even helpful.Yet,the occurrence of restriction is present here.It is fair to utilize it up to some distance only [16,17].Because of the reason being,when it comes to the extent of transmitting above the saturation point,the usage of energy raises based on the 4th power of the distance [8].Hence,to increase the network’s expansion,MH communication is most sought over [18,19].When it comes to communication from the CH node to the BS and if BS is at a distance from the sensor field,it is improved by utilizing MH neighbourhood node communication.A CH is severely overloaded with clustering protocol because it has to do different work like forming clusters,aggregating information,transmitting information and relaying.CHs,hence use more energy than other non-CH nodes.While sending inter-clusters for the two modes of communication viz.,SH and MH,there is an unavoidable energy issue,not balancing amid SNs.For SH communication,CHs placed at a distance from BS use most of their energy primarily due to longer transmission.

    Losing the sensing coverage and dividing the network happen,finally influencing the functioning of the network.In the literature [20],it has been shown that when sensors get arranged consistently in the area of concern,they leave around 90% of the sensors’total energy not used until the first Node is dead.The inevitability of the ununiform decrease in energy among the entire sensors in WSNs was confirmed in [21,22]as the many-to-one transmission model.To get a maximum lifetime of the network,energy consumption must be balanced amid all network nodes.Many research studies have been done to fix the unequal energy and simulate the energy deficit issue for clustered WSNs.Schemes like using node mobility,mobile sink,hierarchical deployment,non-uniform clustering,data compression,traffic aggregation,node distribution etc.,were suggested to fix the energy deficit issue.

    The surrounding information is taken into account as the clustering parameter to improve the network’s life span.The proposed method,ECSAC,self-controls the energy usage by the nodes in the network for equal distribution and un-equal delivery.Besides,extra attention is given to energy consumption in the communication process by applying a timeslot-based backtracking algorithm for increasing the network’s lifetime.Ultimately,the suggested algorithms minimize the transceiver’s energy expenditure consumption by fixing the issues mentioned above.Our methodology reduces the clustering overhead and node communication consumption to extend the network’s lifetime.The output of our suggested method is analyzed against the classical techniques under various performance metrics.

    2 Literature Review

    Zhu et al.[23]put forth a tree-cluster-based information collecting algorithm with a mobile sink.The tree is designed for every sensor node by considering the mean leftover energy,location concerning the sink,and nodes count in the location.Djenouri et al.[24]suggested a trustworthy estimator algorithm for enhancing the Packet Reception Ratio (PRR)of the link relaying Nodevito nodevj.The PRR specifies the probable positive delivery over the link.Badia et al.[25]have chosen the joint link scheduling and routing algorithm for delivering the packets under the time limit with actual intrusions amid nodes.On the contrary,the genetic algorithm increases throughput,fine-tunes transmission power,channel assignment and route path selection in Jia et al.[26].The algorithms,as mentioned earlier,are not taking into account the sensor node energy and the network lifetime enhancement.

    A low-complexity distributed clustering scheme was proposed by [27]for Machine-to-Machine(M2M) interactions in Long Term Evolution (LTE) networks for increasing the battery life of nodes.The location of the BS is crucial in optimizing the network.Therefore,[28]analyzed the chances for several BSs and locations of BSs,which could increase the life of WSNs.Here,the sensor nodes probably minimize energy consumption.Likewise,low-complexity solutions for enhancing network performance are suggested by [29],taking into account the available information during routing,planning,and frequency band allotments link.The density of Node influences the shelf life of the network.A cross-layer mathematical model was created by [30]to find the best node density for maintaining correct energy usage for every bit transmission.Augmentation of network life is possible by saving the source node’s position and ignoring the hot-spot Node.A routing algorithm created by [31]has various routes overlooking hot spot regions by attaining network life increment and generating repeated distracting routes in non-hotspot places with excess energy.

    The Energy-Driven Unequal Clustering protocol (EDUC) methods [32]for a scattered nonuniform Clustering Algorithm (CA) and a dynamic adaptive CH alternation technique.Here,CH alternation’s energy utilization is reduced by permitting a node to be CH once in the network’s lifetime.Therefore,when the energy spent in CH alternation is minimized,energy efficacy is attained.Nevertheless,there is a restriction here,which is beneficial for SH networks only.In the technique named Unequally Clustered Multi-hop Routing protocol (UCMR) proposed by [33],every cluster comes in various dimensions according to the radii and Dijkstra’s shortest path algorithm that aides in the communication of within and outside the cluster.UCMR is quite different from others as it depends on accurate place information.The disparity in energy issues through energy-and proximity-based unequal CA (EPUC) is discussed in [34].Excess energy and closeness to BS determine the selection of CHs.Attention is more on the zone close to BS to tackle the disparity in energy as the region requires more energy due to relaying activity.

    HEED and EEDC,a couple of energy-efficient distributed CAs,were put forth in [35]and [36].In this algorithm,sensor nodes are chosen as CHs.Yet,both of them do not consider the “energy hole”issue.As a solution to this issue,Soro et al.[37]suggested an unequal CA where the network zone is separated into cirques.Clusters in one cirque have similar dimensions,whereas unlike clusters in several cirques have,unlike aspects.High energy nodes usage for handling the CH role,thereby controlling the process of network,assures that the energy consumption of these CHs is controlled.This,in turn,enhances the lifetime of the network.Nevertheless,this requires specific high-energy nodes as CHs he placement of CHs is to be ascertained in advance.EEUC [38]is yet another distributed unequal CA.It chooses CHs according to the Node’s unwanted energy.There is a possibility for every Node to develop into a CH with a probabilityT.These probable CHs utilize uneven competition ranges for building unequal dimensions.Distance from the BS determines the cluster size.Closer is smaller than the ones at a distance.This results in the energy-saving by the CHs,which is closer to BS for the data communication between clusters.This leads to the balancing of energy consumption amid CHs.Taffects the efficiency of collected CHs;hence,the presence of “isolate points” in EEUC.[39]proposed Enhanced Hybrid Multipath Routing (EHMR) to ensure energy efficiency and enhance fast failure recovery.Reliability is ensured in terms of maximum data rate and the minimum end-to-end delay.

    3 Preliminaries

    3.1 Network Model

    The network used in this model has ‘Nd’no.of SNs arranged haphazardly in anS×Ssensor field.Once the arrangement is made,the nodes and the stations turn immobile—the Node’s different energy ranges,i.e.,the nodes used with various primary energy.The BS is placed at a distance from the sensor field,and its position is taken to aware of every Node.The nodes use power regulation for adjusting the power required for transmitting based on the distance.The views are not known to the nodes,but the nodes capable of calculating the space between two nodes are formed on the signal’s strength;the links are considered symmetric.The CHs are capable of transmitting their information straight away to the BS.The data (DMsg) and control(CMsg) are sent via wireless links.

    Moreover,we presume that the information detected by the nodes is strongly related.Once the cluster has been formed,DG gives the election of Cluster Head in WSN=(Sn,Ed).Here,Sn means that ‘N’wireless SNs are along with the CH.Not including the Node acting as sinkSns.,every SN Sni regularly produces size k.In Ed,(Sni,Snj) is the pair of guided edges,whereSni,Snjas the child and the parent node.The edge’s direction Sni→Snjindicates that in which way the information is being forwarded.The edges represent the information that performs the transmission of a spanning tree with the Sink Node (SN) as an origin.It assumes that backing of various radio frequencies for simultaneous interactions sans intrusion is performed by manufacturing,technical,health care band,etc.Allotting RF channels for a bunch of synchronous communications is NPHard.Therefore,the suggested method presumes that the network is present with the highest S RF channels.The following Fig.1 indicates a routing graph of an SN with 25 SNs.

    3.2 Energy Model

    The transmitter used energy to run and transmit the radio electronics circuit,but the energy of the recipient was in the component of the radio electronics alone.Furthermore,the free space φf(shuō)sand the multipath fading φmpmodel channels are used depending on the propagation’s significant degree.The open space model is used or the multi-route model used if the travel time is less than the limit.The transmitter spends energy based on Eq.(1) during transmission of the n-bit data to the rangek.

    The transmitter then spends energy for receiving n-bit of data based on the following Eq.(2)

    Figure 1:Network routing graph

    3.3 Time Slot Information

    In this suggested methodology,the TDMA method categories into a group of small timeslots of uniform distance end to end.Every cluster node is allotted a timeslot that regularly forwards a combined data packet to the CH in the allocated time.

    As per Fig.2,the same timeslot is employed for the forwarding node for theTrxprocess when utilized for the Rex functioning in the respective gathering (parent) Node.With a channel alteration time,the timeslot starts,and for forwarding,it is kept as the minimum time to swap the channel to a different channel assigned.Meantime,a device cannot transmit or receive any packet.Apart from this,Trxoperation consists of synchronization margin time (Sync),Carrier Sensing Time (CST),Trxdata interval (the time needed for the huge data packet to be received),andRxAck interval (requirement of time for obtaining back from the parent,an acceptance packet).

    3.4 Data-Appending Forwarding

    Researchers have detailed the accumulation methodologies for a couple of strong cases of compressing without the information (raw-data forwarding) in addition to compressing complete data (aggregated forwarding).They are compressing without information forwards data packets created by every Node separately.On the other hand,in the other type,the data obtained from every Node of the sub-tree is combined into a uniform size packet by the root node.Later,just a combined packet from the sub-tree’s root node is transmitted.Once a robust geological correlation is obtained by the data,the combined forwarding is used or gathering brief data like the highest,lowest or mean is the aim.In our research work,we suggest a novel combination method in which the root node of every sub-tree joins the sensing information obtained from every Node in the sub-tree with its data.In our methodology,the parent node is assigned by a routing protocol to the extent that the following limitation is fulfilled.Let every Node make a‘l’sized sensing data,and‘hd’be the header’s size.Next,Eq.(3) calculates the combination of the gathered packet’s data size for any node‘sn’.

    Figure 2:Allotment of timeframe into time slots

    As per Eq.(4),the aggregated packet’s dimension must not go beyond the largest packet maxl that could be conveyed in the Trx information of one timeslot gap.

    4 Proposed Mechanism

    4.1 Cluster Formation Using Energy-Conscious Scattered Asymmetric Clustering(ECSAC)

    The nodes’distance from BS is first calculated once they are placed.To accomplish this,an indication is transmitted by BS,and the entire nodes could hear it.Every Node consolidates the distance of sits with BStn by the obtained indicator’s power.Every round contains a cluster establishment stage and a firm-state stage,where data diffusion happens.To have a clustering topology,the establishment stage is categorized into three sub-stages:fellow node spec gathering phase,CH selection phase and cluster creation stage.In the information forwarding stage,cluster members gather information within the surroundings and transmit the collected information to the CHs that receive and combine the data from their fellow clusters and then forward the combined information to the next-hop nodes according to the routing tree designed in this model.

    Table 1:Narrative of node state messages

    Table 2:Narrative of control messages

    The data transmission,which is a firm-state phase,must be longer than the establishment phase for preserving the algorithm’s overhead and extending the network lifetime.The state message of every Node is mentioned in Tab.1.Many control messages are required,and the explanation of these messages is shown in Tab.2.

    4.2 Cluster Establishment Stage

    4.2.1 In the NETWORK Deployment Stage

    The BS transmits a signal at a particular power range.Every Node can work out its position corresponding to the BS according to the strength of the signal received.There are three substages in cluster setup phases:fellow node spec gathering stage,where duration isT1;CH choosing stage,where the period isT2;cluster formation stage,where the period isT3.

    In theFellow node spec gathering stage,every Node transmitsNodeinformation within radiorwith the below mentioned two values:the nodeidand its remaining energyRnrg.Simultaneously,it gets theNode_ information’s from the nearby nodes,based on which every Node determines the avg.and the remaining energy of its nearby nodesRnrgavgusing the following Eq.(5):

    whereniddenotes one of the adjacent nodes,nid×Rnrgmeans the RE ofnidandkis the No.of neighbour nodes.For every node,the below Eq.(6) is used for calculating its waiting timeTwfor propagatingHead-information message:

    whereRnrgis the RE of the Node,Riis a real integer arbitrarily arranged between [0.9,1]that is brought in to decrease the possibility of two nodes sendingHead_information simultaneously.OnceT1 expires,it starts theCH selection phase.

    For any nodenidhere,it gets noHead_information whenTcexpires,and it transmits theHead_information within radio rangeRRito showcase that it will be a CH.Or else,it retires from the competition.To not create such equal clusters,every Node has to compute its CRRR.The formula ofRRin Li et al.[38]is given in Eq.(7):

    where maxd and minds are the max and min space between the nodes in the network and the BS,d(nid,BS) is the distance from nodenidto the BS,ω is a weighted factor whose value is in[0,1]andR0ris the max value of CR.

    The ECSAC system is according to the improved EADUC methodology,but contrary to the EASAC scheme,for producing unequal clusters,it uses a different CR rule.Only the distance between nodes and BS are taken into account in the original EADUC protocol for the expression of CR and the RE of nodes.Therefore,the suggested scheme addresses,apart from the latter two considerations,the amount of neighbors and calculates the radii rivalry to compensate the costs involved in the aggregation.The strategic range is the distance from the BS,CH’s remaining strength,and adjacent nodes’count.The suggested scheme nodes with comparatively more remaining power,a total distance of nodes from the BS,few neighbouring nodes,etc.,should have a more comprehensive broader range of competition and the formula given in Eq.(8) is used to accomplish this.

    In heterogeneous networks,nodes have different initial energy.Here,every Node has equal energy consumption,and the nodes with minimal initial energy fall off early,thereby decreasing the lifetime of the network.To have the full benefits of the high-energy nodes,the high-energy nodes must accept more tasks.Hence,taking into account the gap amid nodes,the BS and the RE of nodes,we derive the formula ofRr:

    whered(nid,BS)is the space between the Nodenidand the BSωandδare the weighted factors in [0,1],Rnrgis the RE of the NodenidandRMRnrgis the highest value of CR.With the help of this formula,we observe that the rivalry radius of the Node is ascertained byd(nid,BS)andRnrg.Significantd(nid,BS)andRnrgproduce ca largeRr,indicating that CHs with more RE and distantly placed from the BS will regulate more significant cluster areas.In one way,CHs near to BS can preserve energy for information transmission,and in another way,CHs with less RE control smaller clusters for ignoring their early expiry and extend the lifetime of the network.

    (i)Cluster Construction Phase.It is the last sub-phase of the cluster association phase.Every non-cluster-head Node selects the closest CH and transmits theJoin_information with theidand leftover energy.According to the received Join,every CH generates a node plan list and sends it to the fellow members by transmittingSchedule Msg.

    (ii)Data Transmission Phase.The stage during which information is transmitted has numerous significant slots.Each primary slot has many rounds,a CH alternation and an alteration route.Two stages create them:(a) intra-clustered forwarding of information and (b) inter-clustered forwarding of information

    (a)Intra-cluster forwarding of information

    In the intra-cluster communication process,all the nodes present within the cluster sense their local environment and collect it.Each Node then forwards the gathered information to their corresponding CHs.The CH sums up the received message and transmits the packet to the SN with the help of inter-cluster communication

    (b)Inter-cluster forwarding of information

    The CHs aggregate the data that had been obtained from its nodes.The aggregated data are then forwarded to the SN.The management of inter-cluster communication is essential as it alone utilizes the central part of any sensor network’s aggregate RE level.

    In this model,a backtrack-based channel allocation is employed to ensure better energy management among the CHs.The scheduling algorithm presented here discovers maximum possible ways with the help of backtracking—the algorithm CATUB receives an allocation solution with less energy consumption.A pseudo-code CATUB is depicted by Algorithm 1.The algorithm inputs are G=(V,E),the directed routing graph and S,the maximum No.of channels available.For each sensor node,the algorithms produce a communication Allocate [T][C].Here,the Node assigned with an ith timeslot and the jth channel is represented by the values in Allocate [i][j].To gather the sensing information from entire nodes at the sink (root) node atone time,Child node timeslots should be allocated before their origin node timeslot.Therefore,the algorithms begin by assigning the schedule in a bottom-up style from the leaf nodes towards the SN.

    4.2.2 Channel and Timeslot Allocation using Backtracking(CATUB)

    CATUB preserves the lowest energy solution in Allocate [T][C]available post recursive function calls.Backtracking tree schedule’s present situation is hoarded in PrsnSolu [T][C].For memorization,the plan of the present example’s cost metric is hoarded by the algorithm in NrSolu.Allocate [T][C]’s minimum energy cost is hoarded in Nrmin.Eq.(9) shows the obtained cost metric about the aggregate of the forwarding,getting and stagnant power consumed for every Node network.

    The valuesNrTrxnRexnIn Eq.(9),the energy is spent by node n in broadcast,response and idle mode,respectively,in a timeframe.

    In every resolution,the algorithm gets a schedule and channel provision to the entire nodes before the algorithm attained the SN.It is done when the current answer has a small cost metric compared to the former top solution (Nrsolu<Nrmin) and the algorithm stores both costNrsoluand scheduling outcome PrsnSolu[T][C]into Nrmin

    Input:

    1.A directed graph,Dg=(Sn,Ed),whereSnis the vertices that represent the representing SN andEdrepresent the edges of the directed graph.

    2.Set of maximum available channelsCmax.

    3.The least found energy solution available recently,Nrmin.

    4.A 2D array Allocate [T][C]that could store the results.The Allocate[t][c]represents that a node is allotted a timeslot t to transmit the aggregated data through the given channel c.

    5.Nrsolu,the current energy consumption level.

    6.Prsnsolu[T][C]stores the scheduling parameter for the current energy consumption levelNrsolu.

    7.ReadyQ holds the list of nodes that are available to be scheduled in the next timeslot.

    8.IdleQ holds the record of nodes in idle mode waiting in the present time slot.

    9.Timeslot,the implementation of present timeslot.

    Output:

    1.Allocate [T][C],which specifies the transmission-schedule for all the nodes inSn.

    Initialization:

    and Schedule [T][S],correspondingly.It explains that the present clarification offers a minimum consumption compared to former schemes (Nrsolu<Nrmin).CATUB at first lines up every branching node into the (s ∈S|s.children==0) into queue ReadyQ that accumulates the nodes,which are ready for getting planned with the setting:(1) the leaf nodes (without child nodes)and (2) priorly scheduled nodes with child nodes.By inviting the Recursive function (RF) from the timeslot 0,the CATUB algorithm begins.RF’s input has two queues:ReadyQ and IdleQ.At first,IdleQ begins as a queue without any nodes.As the branch node is without children,they start quickly in their broadcasting schedule.In every timeslot,the algorithm looks into every possible subset of nodes fulfilling the application limitations.C gives a large-sized subset.In the timeslot,for every queued subset,the algorithm recurrently performs the other nodes that are not in the queue for the following timeslots.Finally,the algorithm comes back to the minimum energy schedule Allocate [T][C].

    As a sample,in the network of Fig.1,the enqueuing of the leaf nodes Sn5,Sn18,Sn1,Sn6,Sn7,Sn10,Sn3,Sn20,Sn21and Sn9to ReadyQ is commenced by CATUB for timeslot T0to get ready.There is an emptiness in IdleQ,the queue for idle nodes.CATUB finds all likely,probable subsection of nodes,which fulfil the highest channel constraint C=4 in timeslot T0.Such subsections are (Sn3,Sn9,Sn6,Sn7),(Sn6,Sn7,Sn5,Sn18).The algorithm computes the cost for every subsection and performs with the recent criteria,the recursive job ALLOCATE_SLOT for timeslot T1.The algorithm adds up scheduled Node’s parents to the queue Ready If subsection(Sn3,Sn9,Sn6,Sn7) for timeslot T0is chosen.

    Nodes Sn5,Sn18,Sn1,Sn23,Sn11,Sn10,Sn17,Sn20,Sn21and Sn22are the latest queue ReadyQ.To queue IdleQ,the parents of the scheduled nodes,Sn17,Sn22,Sn23,Sn11,are too restructured.When the latest consumption is greater than the former least consumption (1 is the initial minimum cost) value in the T1 timeslot,CATUB performs backtracking to timeslot T0,and the remaining subsets are discovered.When lesser is the latest cost than the legal best cost,the execution of CATUB in the timeslot T1is done in a similar manner to the one in the timeslot T0.The other timeslots also once again go through a similar process.Tab.1 details the individual Node’s energy consumption and the duration of a single timeslot.79.52mJis the energy spent on CATUB.

    5 Simulation Scenarios

    Three conditions were selected for imitations:

    Scenario 1:100 nodes are consistently placed around an area of 300 × 300 m2as exposed in Fig.3a.

    Scenario 2:100 nodes are inconsistently placed with more SNs collated together in the area on the right side of the sensor field,i.e.,near the BS,around an area of 300 × 300 m2as depicted in Fig.3b.

    Scenario 3:100 nodes are inconsistently placed with more SNs and are assembled on the left side of the sensor field,i.e.,off from BS,about an area of 300 × 300 m2,as shown in Fig.3c.

    Scenario 4:100 nodes are inconsistently placed with more SNs brought together in the region in the middle of the sensor field,i.e.,little away from BS,around an area of 300×300 m2as proved in Fig.3d.

    In the methodology put forth in our study,the count of alive nodes,the avg.of network energy and network stability,First Node Death (FND),Half Node Death (HND),destruction of 10% and 20% of nodes (PND) and Last Node Death (LND) in the entire imitation duration were all assessed.The reproduction was performed in 50 periods.

    Few are explained below:

    ·Network Life Span:The period that is the beginning of the network functions to the last node death.

    ·Network Stability:The period from the beginning of the network functions to first node death.

    ·Throughput:The No.of data packets.A network transmitted it to the BS.Efficiency enhancement directly links with improved network stability and the network lifetime.

    ·Load Balancing:Traffic load distribution.Its gain being the load is well-disseminated across the nodes,leading to a balanced consumption of energy.Also,nodes’unexpected downfall because of their over-usage is avoided,resulting in an enhanced network’s enhanced lifetime.

    Figure 3:Network topology in the four scenarios.(a) Scenario 1.(b) Scenario 2.(c) Scenario 3.(d) Scenario 4

    6 Simulation Parameters

    The factors responsible for replication are shown in Tab.3.The best No.of some of the parameters (for x.:RLmax) was calculated from different replication outcomes.

    The simulations are repeated many times for finding round No.in a significant slot and many slots in the data transmission stage.Replication factors,like the nodes’positions,are seen as the same for every Node so that the outcomes are reliable and trustworthy.This simulation has got a significant part to play in the suggested method.Here,the simulation could be done more accurately by reducing round count,leading to increased overhead,energy consumption and reduced network lifetime.The project’s critical aim is to raise the life span of the network by removing almost all of the regulation messages and decreasing the overhead,thereby resulting in reduced energy consumption of nodes.As per the simulation results,it is observed that every information forwarding stage has seven parts of the vital slot that has six rounds,one cluster head rotation,and one adjustment route.In general,in the information forwarding stage,information was forwarded in 42 rounds,and our objective was to eliminate most of the network overhead.

    One of the essential parameters in clustering is finding the radius.Thus,in Eq.(10),the primary level is equal to 1,in the 2nd and 3rd levels is 1.25,and in the 4th level is 1.75.Therefore,the clusters placed near the BS are smaller,and the cluster head can get additional energy for transmitting and routing other Cluster Head packets to the BS.

    For finding theRMRnrgparameter in Eq.(10),many practice tests are done using variousRMRnrgvalues for getting the correct value for theRMRnrgsetting.Among the various vital factors,wireless nodes,the No.of CH and the cluster dimensions rely on Node’s radio.The outcome of the simulated runs for multiple situations is presented below.

    Table 3:Simulation parameters

    7 Performance Assessment

    7.1 CH Distribution Evaluation

    In this proposed model,the right CH count is calculated to be equivalent to 5% of the network’s entire nodes.Every Node has a distance that has to be such that the No.of clubs in the network must be appropriate.In this case,the parameter’s valueRMRnrgwas estimated to be equivalent to 100 m,Which implies that CH is around 5.Fig.4 indicates in every case the mean No.of CHs.The CHs are allocated,and there is also power over the No.of CHs.The below figure shows the EASAC protocol that generates a stable No.2.This is because of the presence of just one CH in every competition by the competitive radius.For scenarios 1 and 4,i.e.,containing standardized dispersed sensors and clustered sensors,4-5 cluster head Nos.are produced and possibly during each protocol round.Six clusters No.heads are more probable in scenario 3,whereas 4 CHs are more common in scenario 2.The nodes close to BS are allocated smaller competitive radii during the protocol process.As in scenario 2,additional nodes are positioned near BS;more CHs than in scenario 3 are likely to be created in the region near BS.

    Figure 4:Average number of cluster heads created in dissimilar scenarios

    7.2 Estimation of Energy Utilization

    The ECSAC,EADUC and HUCL protocol’s mean energy consumption is calculated for the four situations included here.Fig.5 depicts the mean energy consumed in each round in the network when each protocol is functioning until it dies for the 3 types of situations.Energy spent in a round consists of the energy utilized in clustering topography creation and forwarding of information.The low energy consumed in the HUCL process is lower than the EADUC process and is weaker when it comes to the ECSAC process.Moreover,we notice the mean energy consumption of the network in the scenario.

    Figure 5:Energy utilization against each scenario

    Three is just more than scenario 2;like in scenario 3,the area near the BS vicinity is scarcely organized.Therefore,there is more possibility of a long-distance between the last transmit Node and BS than scenario 2.It is thickly arranged.

    7.3 Network Stability and Network Lifetime

    To increase the quality and throughput,additional information to the BS has to be transmitted,and here,it is essential to avoid the Node’s downfall.Hence,efficiency and performance can be enhanced by raising the steadiness of the network.In Tabs.4 to 7,the output of the stability period and the network lifetime consisting of FND (100 Nodes),10% PND (90 Nodes),20% PND(80 Nodes),HND (50 Nodes) and LND (0 Node) of the methodologies were calculated for the primary and secondary situations,where the suggested method performed better than the HUCL and EADUC algorithms.The recommended protocol showed better output with more excellent stability in a range of spaces.ECSAC receives aide from data obtained from the nearby nodes for grouping and uses inter-cluster and intra-cluster as along with MH forwarding correctly.In Tabs.4 to 7,the outcomes are shown,which explains that the suggested methodology can enhance certain factors and transmit extra packets when there is an incidence of parameters.

    Table 4:Simulation outcome of the stability and lifetime for scenario 1

    Table 5:Simulation outcome of the stability and lifetime for scenario 2

    Table 6:Simulation outcome of the stability and lifetime for scenario 3

    It was stressed that these nodes without perfect energy levels could not be a CH as they require much energy.Hence,it leads to the division of energy consumption uniformly amid the nodes at simulation time.The protocol put forth assistance in bringing down the energy spent in the network by removing abnormal regulating information and minimizing overhead;hence,it leads to a stretched network lifetime.

    Table 7:Simulation outcome of the stability and lifetime for scenario 4

    7.4 No.of Living Nodes

    Tab.8 shows the mean no.of live nodes.We can ascertain from this that the mean no.of live nodes went across 38% of all node counts,confirming the sustained network stability suggested by our algorithm.As per our results,ECSAC showcased good results than the rest of the procedures and also raised live nodes to count in simulation.It is all because of the stability amid the energy consumption in various nodes as suggested by preventing node expiry.

    Table 8:Average number of living nodes

    7.5 Energy Utilization Throughout the Transmission Stage

    Post the completion of the forwarding of the collected information packet and every SN changes to the eternity sleep mode until the expected information collection duration.The energy spent in sleep mode is insignificant and not taken into account.The outcome shows that the CATUB algorithm employed in the ECSAC model spends minimum energy.The energy consumption raises proportionately with the network size.The results of the competing models and the proposed model’s energy consumption during the transmission phase are indicated in the following Fig.6a to 6d.

    When it comes to our methodology,the rate at which energy is spent is polynomial.The outcomes also show that the energy spent by CATUB is the least compared to other algorithms as it finds the best method amid various probable methodologies with effective backtracking.Meantime,the job done by HUCL is at par with CATUB considering tiny networks;CATUB outdoes for the more extensive networks,resulting in the prevention of loss of energy and its conservation around 24% in a data collection period.As per the outcomes,we agree that in the suggested methodology,the energy consumption was minimized by minimizing the network overhead.

    8 Conclusion

    Figure 6:(a) Energy consumption during the transmission phase scenario 1.(b) Energy consumption during the transmission phase Scenario 2.(c) Energy consumption during the transmission phase Scenario 3 (d) Energy consumption during the transmission phase Scenario 4

    WSNs come with certain restrictions like energy sources for energy consumption as they are directly connected to the transmission.Fine-tuning energy consumption in routing protocols is an essential process for increasing the lifetime of the network.This work has been expanded to improve the life of the WSN by EADUC.This research also used the non-uniform approach to clustering.Based on unequal competitive ranges,the shaped clusters are of uneven scale.There are smaller clusters nearer to the BS compared to the ones away from the BS.By using several factors,the nodes are assigned an uneven radius of competitiveness.It increases energy spent within the CH nodes.The outcome indicates that ECSAC can efficiently augment the network’s steadiness and lifetime compared to ECDC,HUCL and EADUC.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    免费播放大片免费观看视频在线观看| 成人无遮挡网站| 婷婷色综合www| 成年av动漫网址| 国内精品一区二区在线观看| 国产精品福利在线免费观看| 又粗又硬又长又爽又黄的视频| 亚洲国产精品成人综合色| 欧美xxxx性猛交bbbb| 国产成人精品一,二区| 色综合色国产| 亚洲欧美成人综合另类久久久| 日本免费a在线| 少妇人妻精品综合一区二区| 亚洲av中文字字幕乱码综合| 男女边摸边吃奶| 亚洲内射少妇av| 国内精品宾馆在线| 国产欧美日韩精品一区二区| 日韩av不卡免费在线播放| av免费在线看不卡| 亚洲精品国产av成人精品| 亚洲精品乱码久久久v下载方式| 不卡视频在线观看欧美| 3wmmmm亚洲av在线观看| 69人妻影院| 少妇熟女欧美另类| 色5月婷婷丁香| 日韩av在线免费看完整版不卡| 久久人人爽人人爽人人片va| 最近2019中文字幕mv第一页| 日韩欧美一区视频在线观看 | 国产黄色视频一区二区在线观看| 午夜视频国产福利| 亚洲精品,欧美精品| 国产成人免费观看mmmm| 高清欧美精品videossex| 色尼玛亚洲综合影院| 色综合色国产| 色吧在线观看| 久久久久九九精品影院| videos熟女内射| 国产黄片美女视频| 国产成人91sexporn| 一个人观看的视频www高清免费观看| 如何舔出高潮| 久久久久久久久久久免费av| av免费观看日本| 观看美女的网站| 日本黄色片子视频| 国产伦一二天堂av在线观看| 男女下面进入的视频免费午夜| 成人午夜高清在线视频| 国产v大片淫在线免费观看| 国产伦理片在线播放av一区| 男人舔女人下体高潮全视频| 日日摸夜夜添夜夜爱| 午夜精品国产一区二区电影 | 久久鲁丝午夜福利片| 久久99蜜桃精品久久| 国产综合精华液| 韩国高清视频一区二区三区| 国内精品一区二区在线观看| 七月丁香在线播放| 午夜爱爱视频在线播放| 中文资源天堂在线| 美女大奶头视频| 一级毛片久久久久久久久女| 色视频www国产| 亚洲精品一二三| 在线观看av片永久免费下载| 综合色av麻豆| 18禁动态无遮挡网站| 日韩国内少妇激情av| 街头女战士在线观看网站| 偷拍熟女少妇极品色| 色视频www国产| 一个人看视频在线观看www免费| 国产午夜精品久久久久久一区二区三区| 99九九线精品视频在线观看视频| 韩国高清视频一区二区三区| 久久精品国产亚洲av涩爱| 国产一区二区三区av在线| 天美传媒精品一区二区| 中文字幕亚洲精品专区| 国产熟女欧美一区二区| 精品久久国产蜜桃| 国产v大片淫在线免费观看| 少妇高潮的动态图| 成人国产麻豆网| 欧美日韩国产mv在线观看视频 | 国产v大片淫在线免费观看| 九草在线视频观看| 丰满人妻一区二区三区视频av| 禁无遮挡网站| 免费看不卡的av| 汤姆久久久久久久影院中文字幕 | 免费观看精品视频网站| 亚洲精品,欧美精品| 69人妻影院| 丝瓜视频免费看黄片| 国产男女超爽视频在线观看| 床上黄色一级片| 欧美xxxx性猛交bbbb| av在线亚洲专区| 精品人妻视频免费看| 日日干狠狠操夜夜爽| 蜜桃久久精品国产亚洲av| 久久久久久久久久人人人人人人| 日本猛色少妇xxxxx猛交久久| 国产麻豆成人av免费视频| 免费看不卡的av| 少妇人妻一区二区三区视频| 欧美日韩国产mv在线观看视频 | 亚洲精品一区蜜桃| 国内精品美女久久久久久| 一级毛片电影观看| 成人亚洲精品av一区二区| 人人妻人人澡人人爽人人夜夜 | 蜜桃久久精品国产亚洲av| 人体艺术视频欧美日本| 久久久精品94久久精品| 高清毛片免费看| 夜夜看夜夜爽夜夜摸| 2018国产大陆天天弄谢| 免费看日本二区| 三级经典国产精品| 五月玫瑰六月丁香| 欧美丝袜亚洲另类| 99视频精品全部免费 在线| 亚洲av免费在线观看| 能在线免费观看的黄片| 亚洲经典国产精华液单| 久久精品综合一区二区三区| 久热久热在线精品观看| 欧美最新免费一区二区三区| 综合色av麻豆| 日日啪夜夜爽| 国产黄频视频在线观看| 毛片一级片免费看久久久久| 在线观看人妻少妇| 国产黄色免费在线视频| 一级毛片我不卡| 美女被艹到高潮喷水动态| av播播在线观看一区| 日日摸夜夜添夜夜爱| 最近最新中文字幕大全电影3| 国产永久视频网站| 嫩草影院入口| 国产午夜精品一二区理论片| 亚洲美女视频黄频| 少妇人妻精品综合一区二区| 欧美区成人在线视频| 国产亚洲午夜精品一区二区久久 | 高清视频免费观看一区二区 | 男女那种视频在线观看| av网站免费在线观看视频 | 成人欧美大片| 在线观看一区二区三区| 国产成人aa在线观看| 国产成人freesex在线| 国产成人91sexporn| 人妻少妇偷人精品九色| 欧美激情国产日韩精品一区| 精品午夜福利在线看| 青春草国产在线视频| 精品酒店卫生间| 日韩欧美三级三区| 麻豆乱淫一区二区| 最近中文字幕2019免费版| 2018国产大陆天天弄谢| 色尼玛亚洲综合影院| 国内少妇人妻偷人精品xxx网站| 一夜夜www| videos熟女内射| 亚洲av中文av极速乱| 丝袜美腿在线中文| 国产又色又爽无遮挡免| 亚洲av男天堂| 免费看日本二区| 亚洲国产高清在线一区二区三| 国产视频首页在线观看| 国产一区有黄有色的免费视频 | 久久久色成人| 九草在线视频观看| 噜噜噜噜噜久久久久久91| 欧美极品一区二区三区四区| 男女啪啪激烈高潮av片| 国模一区二区三区四区视频| 伊人久久精品亚洲午夜| 欧美另类一区| 中文字幕人妻熟人妻熟丝袜美| 日韩精品青青久久久久久| 在线观看免费高清a一片| 青春草视频在线免费观看| 日本色播在线视频| 熟女人妻精品中文字幕| 国产精品.久久久| 又粗又硬又长又爽又黄的视频| 亚洲精品456在线播放app| 免费观看在线日韩| 欧美zozozo另类| 国产免费又黄又爽又色| 久久久成人免费电影| 国产精品一区www在线观看| 亚洲在久久综合| 日韩欧美三级三区| 欧美成人精品欧美一级黄| 日本-黄色视频高清免费观看| 免费大片18禁| 成人欧美大片| 亚洲av免费在线观看| 超碰97精品在线观看| 国产一级毛片七仙女欲春2| 亚洲精品久久午夜乱码| 午夜精品一区二区三区免费看| 91av网一区二区| 免费观看的影片在线观看| 尾随美女入室| 夫妻午夜视频| 99热这里只有是精品50| 99久久精品热视频| 蜜桃亚洲精品一区二区三区| 午夜福利在线在线| 日韩亚洲欧美综合| av天堂中文字幕网| 99九九线精品视频在线观看视频| 欧美潮喷喷水| 国产精品人妻久久久影院| 又爽又黄无遮挡网站| 免费观看在线日韩| av国产久精品久网站免费入址| 午夜免费男女啪啪视频观看| 天堂√8在线中文| 中文字幕亚洲精品专区| 中文欧美无线码| 春色校园在线视频观看| .国产精品久久| av在线天堂中文字幕| av在线老鸭窝| 久久这里只有精品中国| 欧美 日韩 精品 国产| 两个人的视频大全免费| 婷婷色综合www| 天天一区二区日本电影三级| 激情 狠狠 欧美| av在线老鸭窝| 亚洲综合色惰| 久久久久久久国产电影| 婷婷色麻豆天堂久久| 最近手机中文字幕大全| 国产精品.久久久| 乱人视频在线观看| 赤兔流量卡办理| av免费在线看不卡| 久久久久久久久久久丰满| 国产黄频视频在线观看| 亚洲国产精品成人久久小说| 亚洲第一区二区三区不卡| 啦啦啦中文免费视频观看日本| 美女被艹到高潮喷水动态| 亚洲伊人久久精品综合| 蜜桃久久精品国产亚洲av| 亚洲真实伦在线观看| 2021少妇久久久久久久久久久| 天天一区二区日本电影三级| 一级毛片久久久久久久久女| 亚洲精品一二三| 亚洲熟妇中文字幕五十中出| 内地一区二区视频在线| av国产免费在线观看| 水蜜桃什么品种好| 亚洲精品aⅴ在线观看| 能在线免费看毛片的网站| 日本熟妇午夜| 天美传媒精品一区二区| 伦精品一区二区三区| 日韩av免费高清视频| 精品人妻一区二区三区麻豆| 久久久成人免费电影| 久久草成人影院| 亚洲精品日韩在线中文字幕| 最近2019中文字幕mv第一页| 国产爱豆传媒在线观看| 亚洲国产精品成人久久小说| 国内精品美女久久久久久| 亚洲高清免费不卡视频| 岛国毛片在线播放| 中国国产av一级| 成人欧美大片| 国产成人福利小说| 成人一区二区视频在线观看| 亚洲av成人av| 日本一本二区三区精品| 在线免费观看的www视频| 熟妇人妻不卡中文字幕| 日韩精品有码人妻一区| 亚洲人成网站在线播| 国产黄色免费在线视频| 三级毛片av免费| 国内精品美女久久久久久| 91aial.com中文字幕在线观看| 水蜜桃什么品种好| 午夜福利高清视频| 熟女人妻精品中文字幕| 三级国产精品欧美在线观看| 老司机影院成人| 老司机影院毛片| 国精品久久久久久国模美| 午夜免费男女啪啪视频观看| 男女国产视频网站| 日韩欧美一区视频在线观看 | 欧美潮喷喷水| 精品久久久久久久久av| 联通29元200g的流量卡| 免费电影在线观看免费观看| av黄色大香蕉| 国产精品一及| 午夜久久久久精精品| 日韩伦理黄色片| 免费看日本二区| 国产黄频视频在线观看| 中文乱码字字幕精品一区二区三区 | 七月丁香在线播放| 中文字幕人妻熟人妻熟丝袜美| 成人国产麻豆网| 欧美日韩亚洲高清精品| 精华霜和精华液先用哪个| 韩国高清视频一区二区三区| 午夜福利在线在线| 国产精品一二三区在线看| 男女啪啪激烈高潮av片| 秋霞在线观看毛片| 免费看a级黄色片| 国产中年淑女户外野战色| 国产女主播在线喷水免费视频网站 | 国产伦一二天堂av在线观看| 少妇裸体淫交视频免费看高清| kizo精华| 欧美性感艳星| 国产探花极品一区二区| 亚洲精品久久午夜乱码| 大香蕉久久网| 欧美成人a在线观看| 一个人看视频在线观看www免费| 一级二级三级毛片免费看| 国产成人午夜福利电影在线观看| 乱人视频在线观看| 国产精品99久久久久久久久| 少妇裸体淫交视频免费看高清| 国产精品不卡视频一区二区| 久久综合国产亚洲精品| 免费看光身美女| 一夜夜www| 精品少妇黑人巨大在线播放| 久久6这里有精品| 人妻制服诱惑在线中文字幕| 男女视频在线观看网站免费| 成人亚洲欧美一区二区av| 亚洲高清免费不卡视频| 全区人妻精品视频| 毛片女人毛片| 91久久精品电影网| 在线免费观看不下载黄p国产| 国产爱豆传媒在线观看| 国产中年淑女户外野战色| 日韩av在线免费看完整版不卡| 亚洲欧美一区二区三区国产| 男女啪啪激烈高潮av片| 建设人人有责人人尽责人人享有的 | 亚洲国产成人一精品久久久| 亚洲成人中文字幕在线播放| 极品教师在线视频| 国产精品av视频在线免费观看| 亚洲人成网站在线播| 又大又黄又爽视频免费| 欧美成人午夜免费资源| 久久久久久久久大av| 久久精品国产鲁丝片午夜精品| 亚洲欧洲国产日韩| 老师上课跳d突然被开到最大视频| 七月丁香在线播放| 成人综合一区亚洲| 91久久精品国产一区二区三区| 国产伦精品一区二区三区四那| 国产精品日韩av在线免费观看| 国产激情偷乱视频一区二区| 欧美性感艳星| 少妇高潮的动态图| 性色avwww在线观看| 国产精品久久久久久久电影| 国产淫片久久久久久久久| 男的添女的下面高潮视频| 欧美xxxx性猛交bbbb| 神马国产精品三级电影在线观看| 国产精品伦人一区二区| 免费播放大片免费观看视频在线观看| 精品人妻一区二区三区麻豆| 亚洲av成人av| 18+在线观看网站| 一级二级三级毛片免费看| 欧美人与善性xxx| 啦啦啦中文免费视频观看日本| 女人久久www免费人成看片| 亚洲高清免费不卡视频| 永久网站在线| 亚洲人与动物交配视频| 婷婷色麻豆天堂久久| 美女高潮的动态| av国产免费在线观看| 精品久久久久久成人av| 在线免费观看的www视频| 成人综合一区亚洲| 国产高清国产精品国产三级 | 少妇的逼水好多| 99九九线精品视频在线观看视频| 大香蕉久久网| 能在线免费看毛片的网站| 亚洲第一区二区三区不卡| av女优亚洲男人天堂| 日韩av在线免费看完整版不卡| 99热这里只有是精品在线观看| 少妇人妻一区二区三区视频| 亚洲精品国产av蜜桃| 久久久久久伊人网av| 亚洲在线自拍视频| 国产精品日韩av在线免费观看| 91精品一卡2卡3卡4卡| 亚洲av一区综合| 精品酒店卫生间| 18禁裸乳无遮挡免费网站照片| 亚洲av日韩在线播放| 亚洲人与动物交配视频| 久久国产乱子免费精品| 九九爱精品视频在线观看| 亚洲av.av天堂| 国产色婷婷99| 亚洲最大成人av| 天天一区二区日本电影三级| 大片免费播放器 马上看| 99视频精品全部免费 在线| 久久久久网色| 亚洲精品日韩在线中文字幕| 午夜福利成人在线免费观看| 亚洲一级一片aⅴ在线观看| 午夜精品一区二区三区免费看| a级毛片免费高清观看在线播放| 亚洲,欧美,日韩| 一区二区三区四区激情视频| 国产精品久久久久久久电影| 久久精品夜色国产| 3wmmmm亚洲av在线观看| 国产高清三级在线| 色综合站精品国产| 欧美+日韩+精品| 嫩草影院入口| 国产高潮美女av| 久久精品久久久久久久性| 国内揄拍国产精品人妻在线| 黄色欧美视频在线观看| 18禁在线播放成人免费| .国产精品久久| 男人和女人高潮做爰伦理| 久久精品人妻少妇| 亚洲国产成人一精品久久久| 亚洲精品色激情综合| 少妇的逼水好多| 最近中文字幕高清免费大全6| 大陆偷拍与自拍| 国产老妇伦熟女老妇高清| 国产亚洲5aaaaa淫片| 中文字幕制服av| 免费不卡的大黄色大毛片视频在线观看 | 成人国产麻豆网| 亚洲在线观看片| 中文精品一卡2卡3卡4更新| 成人综合一区亚洲| 综合色丁香网| 一级毛片黄色毛片免费观看视频| 少妇人妻精品综合一区二区| 又大又黄又爽视频免费| 精品国内亚洲2022精品成人| 免费看美女性在线毛片视频| 精品国产一区二区三区久久久樱花 | 日本与韩国留学比较| 丝瓜视频免费看黄片| 国产av不卡久久| 色5月婷婷丁香| 午夜福利在线观看吧| 久久久久久九九精品二区国产| 久久久a久久爽久久v久久| 精品久久国产蜜桃| 免费大片黄手机在线观看| 美女cb高潮喷水在线观看| 久久久午夜欧美精品| 内地一区二区视频在线| 麻豆国产97在线/欧美| 伊人久久精品亚洲午夜| 99久国产av精品国产电影| 只有这里有精品99| 99久久人妻综合| 有码 亚洲区| 国产一区二区三区综合在线观看 | 国产免费视频播放在线视频 | 91精品国产九色| 97超视频在线观看视频| 色5月婷婷丁香| 午夜老司机福利剧场| 久久久亚洲精品成人影院| 亚洲国产成人一精品久久久| 天堂√8在线中文| 免费看光身美女| 亚洲四区av| 日韩欧美精品v在线| 国产 一区 欧美 日韩| 色综合站精品国产| 亚洲av二区三区四区| 成人性生交大片免费视频hd| eeuss影院久久| 午夜精品一区二区三区免费看| 青青草视频在线视频观看| 国产有黄有色有爽视频| 日本黄色片子视频| 亚洲精品乱久久久久久| 波多野结衣巨乳人妻| 91精品伊人久久大香线蕉| 国产永久视频网站| 丝瓜视频免费看黄片| 色综合站精品国产| 波野结衣二区三区在线| 在线免费观看不下载黄p国产| 亚洲国产av新网站| 国产午夜精品一二区理论片| 18禁在线无遮挡免费观看视频| 日韩av在线免费看完整版不卡| 国产久久久一区二区三区| 日本猛色少妇xxxxx猛交久久| 大香蕉久久网| 最近2019中文字幕mv第一页| 日韩制服骚丝袜av| 亚洲av中文字字幕乱码综合| 亚洲国产精品成人综合色| 国内少妇人妻偷人精品xxx网站| 亚洲人成网站在线播| 国产亚洲午夜精品一区二区久久 | 久久久成人免费电影| 国产成人午夜福利电影在线观看| 能在线免费看毛片的网站| 2022亚洲国产成人精品| 国产大屁股一区二区在线视频| or卡值多少钱| 你懂的网址亚洲精品在线观看| 成人鲁丝片一二三区免费| 国产一区亚洲一区在线观看| 亚洲在久久综合| 精品一区二区三区视频在线| 久久久久精品久久久久真实原创| 成人午夜精彩视频在线观看| 性插视频无遮挡在线免费观看| 日韩人妻高清精品专区| 欧美高清性xxxxhd video| 男女国产视频网站| 欧美区成人在线视频| 美女高潮的动态| xxx大片免费视频| 久久久久国产网址| 日韩 亚洲 欧美在线| www.色视频.com| 91狼人影院| 国产精品嫩草影院av在线观看| 看非洲黑人一级黄片| 80岁老熟妇乱子伦牲交| 18禁在线无遮挡免费观看视频| av在线观看视频网站免费| 日本一本二区三区精品| 亚洲欧美日韩卡通动漫| 亚洲激情五月婷婷啪啪| 午夜久久久久精精品| 午夜亚洲福利在线播放| 精品一区二区三区人妻视频| 熟妇人妻不卡中文字幕| 我要看日韩黄色一级片| 亚洲欧美精品自产自拍| 狠狠精品人妻久久久久久综合| 国产亚洲午夜精品一区二区久久 | 在线免费观看的www视频| 日本熟妇午夜| 久久精品夜色国产| 日韩欧美三级三区| www.av在线官网国产| 在线免费观看不下载黄p国产| 日韩大片免费观看网站| 国产成人freesex在线| 国产美女午夜福利| 我的女老师完整版在线观看| 天天一区二区日本电影三级| 狂野欧美白嫩少妇大欣赏| 美女黄网站色视频| www.av在线官网国产| 亚洲精品成人av观看孕妇| 国产 亚洲一区二区三区 | 国产又色又爽无遮挡免| 高清欧美精品videossex| 26uuu在线亚洲综合色| 日韩在线高清观看一区二区三区| 一本一本综合久久| 在线观看一区二区三区| 国产精品不卡视频一区二区| 久久久色成人| 99久久精品热视频| 亚洲在久久综合| 51国产日韩欧美| 国产欧美另类精品又又久久亚洲欧美| 白带黄色成豆腐渣| 美女高潮的动态|