• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Performance Analysis of DEBT Routing Protocols for Pocket Switch Networks

    2021-12-16 06:41:02KhairolAmalibinAhmadMohammadNazmulHasanMdSharifHossenandKhaleelAhmad
    Computers Materials&Continua 2021年3期

    Khairol Amali bin Ahmad,Mohammad Nazmul Hasan,Md.Sharif Hossen,* and Khaleel Ahmad

    1Department of Electrical&Electronics Engineering,National Defence University of Malaysia,Malaysia

    2Department of Information and Communication Technology,Comilla University,Cumilla,Bangladesh

    3Department of Computer Science&Information Technology,Maulana Azad National Urdu University,India

    Abstract: Pocket Switched Networks (PSN) represent a particular remittent network for direct communication between the handheld mobile devices.Compared to traditional networks, there is no stable topology structure for PSN where the nodes observe the mobility model of human society.It is a kind of Delay Tolerant Networks (DTNs) that gives a description to circulate information among the network nodes by the way of taking the benefit of transferring nodes from one area to another.Considering its inception,there are several schemes for message routing in the infrastructure-less environment in which human mobility is only the best manner to exchange information.For routing messages,PSN uses different techniques such as Distributed Expectation-Based Spatio-Temporal (DEBT) Epidemic (DEBTE),DEBT Cluster(DEBTC),and DEBT Tree(DEBTT).Understanding on how the network environment is affected for these routing strategies are the main motivation of this research.In this paper,we have investigated the impact of network nodes,the message copies per transmission,and the overall carrying out of these routing protocols.ONE simulator was used to analyze those techniques on the basis of delivery,overhead, and latency.The result of this task demonstrates that for a particular simulation setting,DEBTE is the best PSN routing technique among all,against DEBTC and DEBTT.

    Keywords: Pocket switched networks; routings; distributed cluster detections;delay tolerant networks; mobility in network

    1 Introduction

    In Delay Tolerant Networks (DTNs), the communicative nodes are associated sparsely with one another without any face to face link among the devices which are affected by social and geographic constraints [1-3].In these networks, nodes are connected intermittently and use a store-plus-forward technique for message passing.Nodes use this approach by keeping copies in their buffer and send the message whenever they get the opportunity to an available path under the constraints of limited bandwidth [4-6].Depending on the method of transmission and communication scenario, DTNs are grouped either as flooding, forwarding, or social category;where the last category is based on human relationships, behavior, and pattern in society.From the social-based DTN, pocket switch network (PSN) has been introduced.Hence PSN is a part of DTNs [7-10].The term “pocket” here is employed rather than “packet” to mean that information is transferring from one mobile in the pocket to another.It uses humans and their motion to transfer information.Mobile phones are all over the place and since these devices are placed in pockets, hence the term PSN.It is a network where mobile devices handheld by people are the key to share messages [11-14].It was first introduced by Crowcroft in 2005 to build the complex links among the people [15-17].It gives a particular quality of service for these mobile networks which are dynamically changeable and helps to apply “people-oriented universal mobile computing.”Fig.1 represents such a network where people share their messages until the connection lasts among the mobile phones within certain regions when they move around [18-21].

    Figure 1: A PSN where dashed lines and solid arrows show the message forwarding and the movement of device holders, respectively

    In relation to such concept, cluster detection methods have been used to ensure effective message delivery in such networks.Hierarchical connections of such networks are made by forming clusters of nodes, which can be used to efficiently transfer messages between the nodes.Cluster-based message delivery techniques show effective data transmission.In this paper, we study distributed cluster detection methods and investigate the related routing protocols for message transmission in PSN [22-24].The paper is shaped as follows.In Section 2, routing approaches in PSNs with the concept of DTNs are discussed.Then, distributed clustering techniques are described in Section 3.The results and discussion are presented in Section 4.Finally, the summary with future work is concluded in Section 5.

    2 Routings in Pocket Switched Network(PSN)

    In PSN, several routing methods have been projected to increase the performance of message routing.Like DTN, generally, there are two types of routing methods in PSN: forwarding and replicating [19].The first technique delivers only a message to its target node.It works well in a network that has the knowledge to decide the routing path and has good connectivity between the nodes.First contact and Direct delivery are examples of this type of routing.The second approach creates many duplicates of the actual message to increase the message delivery probability.By duplicating the messages, there are higher delivery ratio and lower average latency.An opportunistic network such as PSN uses this type of approach.Unfortunately, there are a lot of redundant messages, which consume network resources, like energy, bandwidth, and buffer space [25-27].Examples of routing protocols using the second approach are epidemic, maxprop,prioritized epidemic (PREP), prophet, and so on.A variation of this method is based on a quota that ensures the proper utilization of resources.Examples of such protocols are encounter-based,SNW, SNF, ORWAR, etc.

    The goal of this research is to investigate the efficient routing for sending the messages in the inter and intra-cluster scenarios based on the distributed expectation based (DEBT) clustering techniques.The three routing techniques are DEBT Epidemic (DEBTE), DEBT Clustering(DEBTC), and DEBT Trees (DEBTT).The first two routing methods, namely DEBTE and DEBTC use the branch information in the local cluster tables for forwarding the messages to the next neighbour nodes as a non-hierarchical approach.The final technique which is DEBTT takes the routing information using a tree-based data structure.It is also capable to find out the routing loops by doing some additional processing in the network.

    2.1 Epidemic Based DEBT Forwarding(DEBTE)

    This protocol makes the best use of the branch and neighbour data to take decisions in propagating messages in a network.If the destination of a message is in the cluster table of an encountered personal mobile wireless device (PMWD), then a device forwards a message copy to the PMWD.From Fig.2, ifvidesires to transmit a message tovland encountered withvj, at firstviwill send the message tovjsincevjhas a link to thevlsomewhere in the local cluster table.The message forwarding methods for DEBTE create a lot of duplicate messages which may result in loss of bandwidth and energy of the network [25].

    Figure 2: Cluster table for the node vi, and the corresponding diagram of the local cluster.(a)Local cluster table for vi.(b) Local cluster of vi

    2.2 Cluster Based DEBT Forwarding(DEBTC)

    To decrease the number of redundant messages, the cluster-based routing method called DEBTC takes more protective decisions for transmitting messages from the sender device to the destined one.It will not forward a message to an encountered PMWD if there is a transmitting PMWD of the encountered PMWD in a similar line of its local cluster.From Fig.2,viintends to send a message forvlbut it will not copy tovjbecausevjhas a link with bothvlandviin the same row.Another reason for limiting duplication of the messages withinviandvjis thatvjmay get the information about the destination nodevlfrom the transmitting nodevi.So, a message will not be transferred if there exists any routing loop in the local cluster.On the other hand,preventing routing loops may also result in less message delivery.To remove this problem, the final routing method that uses a tree-based approach named Tree-based DEBT (DEBTT) is considered.

    2.3 Tree Based DEBT Forwarding(DEBTT)

    This method reduces the difficulty of DEBTC where even when there may be a path to send information to the final node, it will not send the message as there may exist a message routing loop in the local cluster.If the messages are processed as a non-hierarchical structure, it is impossible to accurately identify the routing loop in the branch data.So, DEBTT uses a treebased approach by taking the information received from the local cluster table.The same example ofvitrying to transmit a message tovlviavjis shown in Fig.3.There is a path between the transmitting vertexvjand the target vertexvlin the branch column that doesn’t hold any loop and so the message will be sent fromvitovj.The methodology is the same as the other routing techniques, but the local cluster tables are tree-based in DEBTT.Since the clusters are transferred as tree-based on DEBTT, and joined to other trees, there need several parameter measurements so that trees do not extend indefinitely.

    Figure 3: An example of a local cluster table for vi using DEBTT and image showing the corresponding cluster.(a) Local cluster table for vi (b) Local cluster of vi

    3 Distributed Based Clustering Techniques

    A cluster is defined as a set of tightly or loosely connected communicating devices that operate simultaneously so that they can act as a single unit.There is a node-set for every cluster to perform the same job, which is maintained and supervised by software.There are different types of techniques which suited to different purposes while dealing with clustering:

    ? Clustering for ensuring good performance

    ? Clustering for reducing duplication

    ? Storage cluster

    The fundamental concept of clustering is to group n nodes to k several clusters.It is possible to separate a cluster from a group of vertices that contain more edges among themselves.There are several types of cluster detection techniques that can be used for network analysis.

    3.1 Types of Clustering

    There are several types of clustering techniques namely partitioned, density, spatial and budget based.In partitioned based clustering, vertices are directly decomposed within incoherent clusters that utilize several partition standards.Density based clustering creates an arbitrary shape cluster depending on the density of nodes in the network, such as clusters discovered by OPTICS.This method is also capable of producing data points that are not associated with any cluster called outliers.Spatial based clustering is usually applied in grid data structures and spatial data mining.It uses Euclidean distance in the clustering methods.Budget based clustering creates clusters for a specific network by applying different agglomerative clustering techniques including an upper bound which represents the maximum cluster size.In distributed based clustering methods for PSNs, network nodes are accountable for clustering except accessing the central data source.They dynamically create a cluster for message forwarding.

    Figure 4: Illustration of local clusters associated with vi and vj [25]

    3.2 Distributed Clustering Characteristics

    There are some distinct features for distributed clustering.Let a PSN network hasnPMWDs and is using a distributed clustering technique.Then, every PMWD will create a map containing up to n-1 PMWDs in a local cluster set.

    If there are n PMWDs in a network, it will create n non-empty and very similar local clusters.These local clusters are being one of the 2n-1 possible local clusters.If the cardinality is less than of a single local clusterCi, thenCiwill overlap with |Ci|-1 other local clusters.

    Let there be a set of local clusters that are created from PSN and named natural cluster (N).

    N={x: A local cluster x which belongs to a network P}

    If these n clusters are separate from each other, then |N| = n.There are several unique characteristics of natural clusters such as each PMWD is created has to be a natural cluster, and these clusters may be associated with different natural clusters.

    To include dynamic encounters in a local cluster, two parameters need to be calculated in the distributed cluster detection technique.These parameters are cumulative encounter duration and baseline calculation.Because of the frequent movement of nodes, it is a very complex task to meaningfully add new nodes in a cluster than to calculate cumulative encounter duration.For example, the cumulative encounter duration for the nodeviwith the nodevjin the time frame t2as shown in Fig.5 isEq.(1) shows the mean cumulative encounter calculation methods for nodeviduring t2time frame.The calculation of mean cumulative encounter duration also referred to as the metric m, and it has to use the baselines calculation.

    Using the previous time series values, there needs to calculate expected values for metrics called baselines.So there is no necessity to set the threshold value manually when selecting nodes to the cluster.Baseline calculation for a particular time frame is done at the closing point of the preceding time frame.

    Figure 5: Example of a dynamic graph between time frames t1 and t3

    To describe the method easily, let there be a time frame whose length is l and it is divided into different time frames labeled by t1, t2, t3,...,t(n-1),tn, where t1is first, t2is second, andtnis the current time frame.The baseline for the present time frametnfor the vertexviis estimated by measuring the mean values of m.To calculate m, it uses previous w complete time frames,which is shown in Eq.(2).

    After the expected baseline calculation for the present time frame is obtained, it is used to compare with cumulative value for a particular node within the present time module.There is no strongly linked subgraph constrain in distributed cluster detection techniques.It can continuously keep track of the cumulative meeting duration with the other devices in the network and takes the necessary decision to involve neighbour nodes in the cluster as their cumulative value gets the baseline.

    For example, let there are two vertices namelyviandvjin a network.If vertexviwants to includevjin its local cluster, the cumulative value x between the nodesviandvjwithin a particular time frametnmust be greater than a coefficient value,gup, which is multiplied with the baseline value for the vertexvias demonstrated in Eq.(3).To monitor the cluster size in the distributed clustering mechanism of a network, two parameters are introduced namelygupand gdown.For example, we consider the baseline value of the vertex,vi, is 20, and the cumulative value between the vertexviandvjin the time frametnis 30.Then, if we use parameter valuegup=1, Eq.(3)will be satisfied with the condition that the vertexviwill add the vertexvjin its local cluster.On the other hand, if we considergup= 2, then Eq.(3) will not be satisfied, and the vertexvjwill not be added in the cluster.

    4 Results and Discussion

    Here, we focus on the analysis of DEBT techniques, i.e., DEBTE, DEBTC, and DEBTT in PSN using ONE simulator.In this section, we explain the environment modeling parameters,performance metrics, and simulated results.

    4.1 Opportunistic Networking Environment(ONE)

    It is an event-driven network simulator that was developed using java programing language.Using various types of movement modes, it can generate node movement, route messages using various routing techniques between the nodes, and visualize both message passing and mobility in its GUI.It can also import real-world traces of data.Collecting the analyzed result, the routing performance is done through reports and visualization [28,29].The key operations of this tool are the simulating of network routing, nodes motion, message handling, and contact between intermediate nodes using various interfaces.Network nodes can change their location according to the movement models.The nodes can keep their connectivity on the basis of their communication distance, present location, and data rate.Message sending is routed by the analyzed methods that take the decision when and how to send messages over a network link.Event generators generate the messages to trace the network.It generates random messages between the nodes.It is also possible to generate traffic using applications based on application interactions.There are source and destination nodes for these unicast messages inside the simulation range.The report module receives events and generates simulation results during the simulation that are collected through the reports.It is also capable of visualizing the simulation result showing the mobility, active contacts, locations, and messages passing in the real scenario by the nodes [30,31].

    4.2 Parameter Setup

    Simulation parameters and related protocols are specified in Tab.1.It exhibits the outline of the simulation using random waypoint as mobility and shortest path map-based movement as movement model with update interval 1s for analyzing the performance metrics with the different values of the message (Msg) copies per minutes (MCPM), and the number of nodes (NN) in the network.

    Table 1: Simulation characteristics with values

    4.3 Comparing the Performance of Routing Methods with Metrics

    Here, we investigate the performance analysis of DEBT routing strategies, i.e., DEBTE,DEBTC, and DEBTT using ONE simulator with different values of Msg copies per minutes, and the number of nodes with three metrics as discussed below.

    4.3.1 Delivery Probability(DP)

    It is determined as the ratio of the number of successful data arrived at the target node sent by source nodes [32].Fig.6, illustrates that DEBTE routing has the highest message delivery probability than DEBTC and DEBTT for each generation rate of the message since it sends the messages to all possible nodes.On the other hand, DEBTT has the lowest delivery probability since it does not allow any looping nodes in the network before transferring messages.DEBTE also shows the highest DP than DEBTC and DEBTT for the changes of nodes while DEBTT has the lowest DP for every node (Fig.7).

    Figure 6: DP with different values of Msg/min

    Figure 7: DP with different values of nodes

    4.3.2 Average Latency(AL)

    AL is the duration time obtained on average between the creation of messages and the acceptance of those messages successfully by target node [13,32].If there is low average latency in any network, then it can be considered a good performance.From Fig.8, AL of DEBTE is higher than DEBTC and DEBTT for every message generation rate.In Fig.9, we see that the average latency of DEBTE increases while for DEBTC and DEBTT decreases with the increase of network nodes.When we use less than 50 nodes, DEBTC showed the highest delay (Fig.9) while DEBTE had the best performance as indicated by the lowest latency than DEBTC and DEBTT.

    Figure 8: AL with different values of Msg/min

    Figure 9: AL with different values of nodes

    4.3.3 Overhead Ratio(OR)

    It is determined by the calculation of the number of duplicate copies sent redundantly to successfully reach the destined node [32].It is directly related to the transmission cost in a network.Good network performance has a less overhead ratio.Fig.10 depicts that OR decreases for different values of msg/min where DEBTE shows slightly higher OR than DEBTC and DEBTT.In comparing the OR against the number of nodes, DEBTT clearly demonstrated lower OR compared to DEBTC and DEBTE (Fig.11).Meanwhile, DEBTE showed the highest OR in both Figs.10 and 11.

    Figure 10: OR with different values of Msg/min

    5 Conclusion and Future Works

    Pocket switched network (PSN) represents a particular remittent network for direct communication between mobile nodes.Its existence comes from the delay-tolerant networks that work in a challenging environment like terrorist attacks, hurricanes, and other natural disasters.It enables message communication when traditional cellular networks are not applicable because of geographical position.PSN can be very useful in real-life scenarios.Since it can operate without any infrastructure when any geographical location or country gets hit by any natural disaster, namely tsunami, earthquake, etc., it can help the rescuers to find out the people who are trapped inside buildings.Under such scenarios, we analyze the performance of different routings, namely, Distributed Expectation-Based Spatio-Temporal (DEBT) Epidemic (DEBTE),DEBT Cluster (DEBTC), and DEBT Tree (DEBTT) in PSNs.The performance evaluation is done using ONE simulator.The simulation outcome exhibits the performance comparison of these approaches for average latency, delivery, and overhead calculation with various values of message copies (msg/min) and network nodes per group, respectively.From these results, we can conclude that DEBTE performed the best.In the near future, we would like to extend this task by comparing these routing protocols with other available routings.

    Acknowledgement:Authors would like to thank anonymous reviewers and the Journal Editor.

    Funding Statement:This research is fully supported by UPNM Grant J0117-UPNM/2016/GPJP/5/ICT/2.The authors fully acknowledged Ministry of Higher Education (MOHE) and National Defence University of Malaysia for the approved fund which makes this important research viable and effective.The authors also would like to thank University Grant Commission of Bangladesh,Comilla University for the financial support.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产精品一区www在线观看| 青春草视频在线免费观看| 久久人人爽人人爽人人片va| 午夜免费男女啪啪视频观看| 久久精品国产亚洲网站| 欧美少妇被猛烈插入视频| 亚洲电影在线观看av| 国产精品蜜桃在线观看| 国产亚洲最大av| 五月开心婷婷网| 精品亚洲成国产av| 国产精品一区www在线观看| 日本猛色少妇xxxxx猛交久久| 欧美亚洲 丝袜 人妻 在线| 尤物成人国产欧美一区二区三区| 日本vs欧美在线观看视频 | 日本一二三区视频观看| 久久久欧美国产精品| 亚洲婷婷狠狠爱综合网| 菩萨蛮人人尽说江南好唐韦庄| 99国产精品免费福利视频| 国产在视频线精品| 精品午夜福利在线看| 久久女婷五月综合色啪小说| 老师上课跳d突然被开到最大视频| 国产综合精华液| 国产精品无大码| 新久久久久国产一级毛片| 国产精品三级大全| 女人久久www免费人成看片| 欧美xxxx性猛交bbbb| 一区二区av电影网| 国产精品.久久久| 亚洲成人一二三区av| 又粗又硬又长又爽又黄的视频| 肉色欧美久久久久久久蜜桃| 美女中出高潮动态图| 日本av手机在线免费观看| 亚洲第一区二区三区不卡| 男人添女人高潮全过程视频| 少妇人妻精品综合一区二区| 国产亚洲最大av| 国产成人精品福利久久| 国产欧美日韩一区二区三区在线 | 日韩中字成人| 久久女婷五月综合色啪小说| 高清毛片免费看| 一级毛片久久久久久久久女| 黄片无遮挡物在线观看| 国产黄片美女视频| 妹子高潮喷水视频| av卡一久久| 日韩大片免费观看网站| 亚洲av男天堂| 免费av不卡在线播放| 亚洲精品中文字幕在线视频 | 99热这里只有是精品50| 国产精品熟女久久久久浪| 国产一区亚洲一区在线观看| 久久av网站| 在线亚洲精品国产二区图片欧美 | 成年av动漫网址| 美女cb高潮喷水在线观看| 国产欧美另类精品又又久久亚洲欧美| 亚洲三级黄色毛片| 又粗又硬又长又爽又黄的视频| 交换朋友夫妻互换小说| 大又大粗又爽又黄少妇毛片口| 六月丁香七月| 国产午夜精品久久久久久一区二区三区| 国产欧美日韩精品一区二区| a级毛色黄片| 丰满迷人的少妇在线观看| 久久热精品热| www.av在线官网国产| 精品人妻一区二区三区麻豆| 日本欧美国产在线视频| 男男h啪啪无遮挡| 99热网站在线观看| 天堂中文最新版在线下载| av黄色大香蕉| 少妇熟女欧美另类| 激情 狠狠 欧美| 久久99热这里只有精品18| 亚洲精品亚洲一区二区| 国产精品一区二区三区四区免费观看| 又黄又爽又刺激的免费视频.| 欧美3d第一页| 国产免费视频播放在线视频| 国产男人的电影天堂91| 亚洲真实伦在线观看| 美女脱内裤让男人舔精品视频| 中文字幕久久专区| 蜜桃亚洲精品一区二区三区| 91精品国产国语对白视频| 精品久久久久久电影网| 国产精品一区二区性色av| 80岁老熟妇乱子伦牲交| 婷婷色av中文字幕| 国产精品熟女久久久久浪| 校园人妻丝袜中文字幕| 国产一区二区在线观看日韩| av福利片在线观看| 久久精品熟女亚洲av麻豆精品| 精品人妻一区二区三区麻豆| av不卡在线播放| 欧美成人a在线观看| 日日摸夜夜添夜夜爱| 亚洲av男天堂| 免费观看在线日韩| 在线观看免费视频网站a站| 一级av片app| 最后的刺客免费高清国语| 亚洲国产欧美在线一区| 哪个播放器可以免费观看大片| 美女脱内裤让男人舔精品视频| 亚洲三级黄色毛片| 国产欧美日韩精品一区二区| 婷婷色av中文字幕| 久久久久久久精品精品| 少妇人妻 视频| 2022亚洲国产成人精品| 小蜜桃在线观看免费完整版高清| 欧美xxxx性猛交bbbb| 大香蕉97超碰在线| 日本av手机在线免费观看| 最新中文字幕久久久久| .国产精品久久| 久久久精品免费免费高清| 国产久久久一区二区三区| 亚洲欧美清纯卡通| 一级二级三级毛片免费看| 欧美精品一区二区免费开放| 天堂中文最新版在线下载| 亚洲人成网站在线观看播放| 激情 狠狠 欧美| 婷婷色综合大香蕉| 男的添女的下面高潮视频| www.av在线官网国产| 日韩电影二区| 久久久久久久久久久丰满| 国产无遮挡羞羞视频在线观看| 在线观看美女被高潮喷水网站| 日本wwww免费看| 亚洲精品日韩在线中文字幕| 一级毛片黄色毛片免费观看视频| 国产成人精品一,二区| 国产精品久久久久久精品古装| 久久午夜福利片| 精品一区在线观看国产| 波野结衣二区三区在线| 久久婷婷青草| 精品99又大又爽又粗少妇毛片| 麻豆乱淫一区二区| 51国产日韩欧美| 老司机影院成人| 国产人妻一区二区三区在| 久久人人爽人人片av| 国产69精品久久久久777片| 国产精品伦人一区二区| av线在线观看网站| 国产视频内射| 特大巨黑吊av在线直播| 欧美高清性xxxxhd video| 久久精品国产a三级三级三级| 在线观看人妻少妇| 亚洲国产毛片av蜜桃av| 精品亚洲成a人片在线观看 | 国产免费一级a男人的天堂| 我的老师免费观看完整版| 久久久亚洲精品成人影院| 国产精品国产三级专区第一集| 少妇人妻久久综合中文| 免费久久久久久久精品成人欧美视频 | 免费不卡的大黄色大毛片视频在线观看| 五月伊人婷婷丁香| 国产亚洲5aaaaa淫片| 国产午夜精品久久久久久一区二区三区| 久久99精品国语久久久| 91午夜精品亚洲一区二区三区| 成人毛片60女人毛片免费| 午夜福利在线观看免费完整高清在| 夜夜看夜夜爽夜夜摸| 免费观看av网站的网址| 欧美区成人在线视频| 寂寞人妻少妇视频99o| 亚洲国产高清在线一区二区三| 国产精品一区二区性色av| 九九在线视频观看精品| 欧美三级亚洲精品| 成人毛片a级毛片在线播放| 男女免费视频国产| 高清黄色对白视频在线免费看 | 尾随美女入室| 日本黄色日本黄色录像| 国产在线视频一区二区| 99re6热这里在线精品视频| 亚洲最大成人中文| 久久精品国产亚洲av涩爱| 国产伦在线观看视频一区| 国产成人精品福利久久| 夫妻性生交免费视频一级片| 免费大片黄手机在线观看| 国产成人精品一,二区| 亚洲不卡免费看| 亚洲精品国产av蜜桃| 如何舔出高潮| 女的被弄到高潮叫床怎么办| 直男gayav资源| 亚洲av在线观看美女高潮| 欧美一级a爱片免费观看看| 午夜免费观看性视频| 国产午夜精品一二区理论片| 国产在线男女| 不卡视频在线观看欧美| 大香蕉久久网| 免费av不卡在线播放| 三级国产精品欧美在线观看| 边亲边吃奶的免费视频| 日韩一本色道免费dvd| 黄片无遮挡物在线观看| 亚洲av欧美aⅴ国产| 汤姆久久久久久久影院中文字幕| 日韩中字成人| 爱豆传媒免费全集在线观看| 欧美精品国产亚洲| 丰满乱子伦码专区| 91精品国产国语对白视频| 免费观看的影片在线观看| 日韩成人av中文字幕在线观看| 黄片无遮挡物在线观看| 99久久精品热视频| av又黄又爽大尺度在线免费看| 一级毛片电影观看| 日本爱情动作片www.在线观看| 午夜免费鲁丝| 精品久久久久久久末码| 一本一本综合久久| 麻豆乱淫一区二区| 国产久久久一区二区三区| 国产精品麻豆人妻色哟哟久久| 国产欧美日韩精品一区二区| 久久毛片免费看一区二区三区| 黄色一级大片看看| 人妻夜夜爽99麻豆av| 久久久久精品久久久久真实原创| 国产精品福利在线免费观看| 亚洲精品亚洲一区二区| 精品久久久久久久久亚洲| 国产精品秋霞免费鲁丝片| 2018国产大陆天天弄谢| 国产av国产精品国产| 夜夜骑夜夜射夜夜干| 麻豆精品久久久久久蜜桃| 亚洲人与动物交配视频| 18禁动态无遮挡网站| 久久精品熟女亚洲av麻豆精品| 看免费成人av毛片| 最近中文字幕2019免费版| 亚洲精品日韩在线中文字幕| www.色视频.com| 青春草亚洲视频在线观看| 精品久久久久久久末码| 欧美精品亚洲一区二区| 国产一级毛片在线| 久久精品国产亚洲av天美| 欧美变态另类bdsm刘玥| 黄色日韩在线| 男女边摸边吃奶| 国产精品秋霞免费鲁丝片| 狂野欧美激情性xxxx在线观看| 国产av国产精品国产| 水蜜桃什么品种好| 亚洲av在线观看美女高潮| 国产精品不卡视频一区二区| 人妻制服诱惑在线中文字幕| 三级国产精品欧美在线观看| 街头女战士在线观看网站| 国产亚洲午夜精品一区二区久久| 91在线精品国自产拍蜜月| 国产黄色视频一区二区在线观看| 老熟女久久久| 蜜桃在线观看..| 女性生殖器流出的白浆| 2022亚洲国产成人精品| 精品午夜福利在线看| 美女xxoo啪啪120秒动态图| 欧美日韩国产mv在线观看视频 | 高清视频免费观看一区二区| 日本-黄色视频高清免费观看| 亚洲欧美日韩无卡精品| 五月玫瑰六月丁香| 欧美zozozo另类| 日本欧美国产在线视频| 国产精品伦人一区二区| 国产欧美日韩精品一区二区| 亚洲经典国产精华液单| 欧美亚洲 丝袜 人妻 在线| 在线观看三级黄色| 欧美成人a在线观看| 国产精品国产三级国产专区5o| 国产一区有黄有色的免费视频| 不卡视频在线观看欧美| 国内少妇人妻偷人精品xxx网站| 国产成人91sexporn| 天美传媒精品一区二区| 国产视频内射| 观看免费一级毛片| www.av在线官网国产| 亚洲精品乱码久久久久久按摩| 99久久精品热视频| 精品久久国产蜜桃| 日韩欧美精品免费久久| 晚上一个人看的免费电影| 国产精品国产av在线观看| 国产毛片在线视频| 国产成人精品久久久久久| 久久久久精品久久久久真实原创| 舔av片在线| 亚洲精品第二区| 一个人免费看片子| av天堂中文字幕网| 日本午夜av视频| 国产视频首页在线观看| 毛片女人毛片| 久久精品国产a三级三级三级| 蜜桃在线观看..| 欧美变态另类bdsm刘玥| 夫妻性生交免费视频一级片| 高清视频免费观看一区二区| 国产免费福利视频在线观看| 日日撸夜夜添| 久久97久久精品| 日韩一区二区三区影片| 99热这里只有是精品50| 十八禁网站网址无遮挡 | 亚洲无线观看免费| 久久精品人妻少妇| 丰满乱子伦码专区| 欧美丝袜亚洲另类| 国产免费又黄又爽又色| 美女脱内裤让男人舔精品视频| 日韩欧美精品免费久久| 欧美变态另类bdsm刘玥| 日韩制服骚丝袜av| 精品人妻一区二区三区麻豆| 国产精品国产三级国产av玫瑰| 精品亚洲乱码少妇综合久久| 最近最新中文字幕免费大全7| 国产乱人偷精品视频| 成人国产麻豆网| 在线亚洲精品国产二区图片欧美 | 欧美xxⅹ黑人| 在线 av 中文字幕| av网站免费在线观看视频| 亚洲国产色片| 91午夜精品亚洲一区二区三区| 黄色视频在线播放观看不卡| 亚洲一区二区三区欧美精品| 日本黄色片子视频| 国产精品福利在线免费观看| 国产精品久久久久久久久免| 在线观看一区二区三区| 国产久久久一区二区三区| 少妇人妻 视频| 欧美高清性xxxxhd video| 一区二区三区精品91| 日韩一区二区三区影片| 深夜a级毛片| 乱系列少妇在线播放| 欧美精品人与动牲交sv欧美| 97精品久久久久久久久久精品| av网站免费在线观看视频| 人妻少妇偷人精品九色| 最近中文字幕2019免费版| 欧美日韩视频高清一区二区三区二| 如何舔出高潮| 久久久久精品性色| 久久毛片免费看一区二区三区| 99热国产这里只有精品6| 欧美日韩国产mv在线观看视频 | 日本色播在线视频| 亚洲欧美清纯卡通| 亚洲精华国产精华液的使用体验| 精品久久久久久电影网| 国产亚洲一区二区精品| 插逼视频在线观看| 日韩成人av中文字幕在线观看| 亚洲三级黄色毛片| 又大又黄又爽视频免费| 国产中年淑女户外野战色| 女性被躁到高潮视频| 精品酒店卫生间| 噜噜噜噜噜久久久久久91| videos熟女内射| 一区在线观看完整版| 久久久久国产精品人妻一区二区| 在线天堂最新版资源| 免费观看性生交大片5| 男女无遮挡免费网站观看| 在线观看一区二区三区| 日韩 亚洲 欧美在线| 国产高清不卡午夜福利| 精品少妇久久久久久888优播| 亚洲三级黄色毛片| 国产精品秋霞免费鲁丝片| 欧美成人精品欧美一级黄| 日日啪夜夜撸| 简卡轻食公司| 免费人妻精品一区二区三区视频| 蜜桃亚洲精品一区二区三区| 久久久成人免费电影| 一个人免费看片子| 97在线视频观看| 久久亚洲国产成人精品v| 天美传媒精品一区二区| 夫妻性生交免费视频一级片| 久久久色成人| 久久精品人妻少妇| 91精品国产九色| 日韩伦理黄色片| 日日啪夜夜爽| 99久久中文字幕三级久久日本| 国产成人a区在线观看| 国产男女内射视频| 人妻一区二区av| 亚洲色图综合在线观看| 插逼视频在线观看| 熟女人妻精品中文字幕| 深夜a级毛片| 内地一区二区视频在线| av又黄又爽大尺度在线免费看| 成年女人在线观看亚洲视频| 国产精品女同一区二区软件| 人人妻人人澡人人爽人人夜夜| 一区二区三区乱码不卡18| 高清黄色对白视频在线免费看 | 国产成人精品一,二区| 午夜激情久久久久久久| 久久av网站| 国产免费视频播放在线视频| 午夜福利在线观看免费完整高清在| 97在线人人人人妻| 久久99蜜桃精品久久| 欧美成人精品欧美一级黄| 日韩制服骚丝袜av| 成人一区二区视频在线观看| 青青草视频在线视频观看| 国产探花极品一区二区| 亚洲国产最新在线播放| 久久热精品热| 欧美成人精品欧美一级黄| 日本vs欧美在线观看视频 | av网站免费在线观看视频| 国产视频内射| 久久99热这里只有精品18| 夜夜爽夜夜爽视频| 国产精品女同一区二区软件| 国产男女超爽视频在线观看| 乱系列少妇在线播放| 黄片无遮挡物在线观看| 日日啪夜夜爽| 免费av中文字幕在线| 久久精品国产亚洲av涩爱| 好男人视频免费观看在线| 人妻夜夜爽99麻豆av| 国产视频内射| 亚洲国产精品专区欧美| 久久久精品免费免费高清| 黄色怎么调成土黄色| 欧美日韩综合久久久久久| 国产人妻一区二区三区在| 黄片无遮挡物在线观看| 涩涩av久久男人的天堂| 亚洲精品国产色婷婷电影| 人妻制服诱惑在线中文字幕| 大香蕉97超碰在线| 亚洲精品,欧美精品| 狠狠精品人妻久久久久久综合| 免费不卡的大黄色大毛片视频在线观看| 赤兔流量卡办理| 国产黄片视频在线免费观看| 久久久久久久久久成人| 日本av手机在线免费观看| 国产黄片美女视频| 国产人妻一区二区三区在| 日韩欧美 国产精品| 亚洲四区av| 中文字幕av成人在线电影| 嘟嘟电影网在线观看| 一级毛片 在线播放| 久热这里只有精品99| 色视频在线一区二区三区| 久久久久久久久久人人人人人人| 亚洲人与动物交配视频| 精品国产三级普通话版| 青春草视频在线免费观看| 欧美日韩视频高清一区二区三区二| 黑丝袜美女国产一区| 简卡轻食公司| 日韩伦理黄色片| 精品一区二区三卡| 少妇裸体淫交视频免费看高清| av天堂中文字幕网| 亚洲精品第二区| 亚洲美女视频黄频| 久热这里只有精品99| 日日摸夜夜添夜夜爱| 人妻夜夜爽99麻豆av| 国产中年淑女户外野战色| 国产精品偷伦视频观看了| 国产精品一二三区在线看| 国产精品偷伦视频观看了| 国产高清有码在线观看视频| 亚洲av不卡在线观看| 少妇被粗大猛烈的视频| 18禁动态无遮挡网站| 亚洲伊人久久精品综合| 国产色爽女视频免费观看| 丰满人妻一区二区三区视频av| 免费少妇av软件| 欧美国产精品一级二级三级 | 亚洲精华国产精华液的使用体验| 久久综合国产亚洲精品| 黄色配什么色好看| 一区二区三区免费毛片| 熟女电影av网| 亚洲综合精品二区| 成人毛片a级毛片在线播放| 国产中年淑女户外野战色| 久久精品人妻少妇| 三级国产精品片| 一区在线观看完整版| 免费大片18禁| 三级经典国产精品| 激情五月婷婷亚洲| 精品少妇黑人巨大在线播放| 国国产精品蜜臀av免费| 国产成人午夜福利电影在线观看| 亚洲精品国产色婷婷电影| 国产精品人妻久久久久久| 亚洲av电影在线观看一区二区三区| 免费看光身美女| 久久国产亚洲av麻豆专区| 日本免费在线观看一区| 国产精品久久久久久精品电影小说 | 观看av在线不卡| 亚洲美女搞黄在线观看| 久久久久久伊人网av| 黄色欧美视频在线观看| 国产精品免费大片| 国产午夜精品一二区理论片| 一级二级三级毛片免费看| 内射极品少妇av片p| 视频中文字幕在线观看| 免费大片黄手机在线观看| 久久午夜福利片| 亚洲欧美精品自产自拍| 熟女人妻精品中文字幕| 汤姆久久久久久久影院中文字幕| 婷婷色av中文字幕| 国内揄拍国产精品人妻在线| 精品人妻一区二区三区麻豆| 在线观看三级黄色| 80岁老熟妇乱子伦牲交| 偷拍熟女少妇极品色| 黄色一级大片看看| 国模一区二区三区四区视频| 永久网站在线| 亚洲欧美日韩另类电影网站 | 亚洲色图综合在线观看| 免费av不卡在线播放| 99久久精品国产国产毛片| 亚洲av欧美aⅴ国产| 国产精品一二三区在线看| 精品国产乱码久久久久久小说| av在线app专区| 一级片'在线观看视频| 18+在线观看网站| 色视频在线一区二区三区| 久久久久久久久久久免费av| 国产老妇伦熟女老妇高清| 欧美日韩精品成人综合77777| 亚洲av中文字字幕乱码综合| 一区二区三区乱码不卡18| 国产 一区精品| 日韩一区二区视频免费看| 欧美成人一区二区免费高清观看| 亚洲美女黄色视频免费看| 青春草视频在线免费观看| 欧美成人a在线观看| 在线观看免费日韩欧美大片 | 亚洲av在线观看美女高潮| 深爱激情五月婷婷| 亚洲精品aⅴ在线观看| 内地一区二区视频在线| 18禁在线播放成人免费| 永久免费av网站大全| 久久久久久久久久久丰满| 综合色丁香网| 精品人妻偷拍中文字幕| 国产亚洲av片在线观看秒播厂| 91在线精品国自产拍蜜月| 亚洲激情五月婷婷啪啪| 又黄又爽又刺激的免费视频.| 啦啦啦视频在线资源免费观看| 日日啪夜夜撸| 成人综合一区亚洲| 好男人视频免费观看在线| 91aial.com中文字幕在线观看| 秋霞伦理黄片| 夜夜骑夜夜射夜夜干| 又大又黄又爽视频免费| 色5月婷婷丁香| 黄色视频在线播放观看不卡|