• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    High Performance Priority Packets Scheduling Mechanism for Big Data in Smart Cities

    2022-08-24 12:57:46FawazAlassery
    Computers Materials&Continua 2022年7期

    Fawaz Alassery

    Department of Computer Engineering, College of Computers and Information Technology, Taif University, Taif, 21944,Saudi Arabia

    Abstract: Today, Internet of Things (IoT) is a technology paradigm which convinces many researchers for the purpose of achieving high performance of packets delivery in IoT applications such as smart cities.Interconnecting various physical devices such as sensors or actuators with the Internet may causes different constraints on the network resources such as packets delivery ratio, energy efficiency, end-to-end delays etc.However, traditional scheduling methodologies in large-scale environments such as big data smart cities cannot meet the requirements for high performance network metrics.In big data smart cities applications which need fast packets transmission ratio such as sending priority packets to hospitals for an emergency case, an efficient scheduling mechanism is mandatory which is the main concern of this paper.In this paper, we overcome the shortcoming issues of the traditional scheduling algorithms that are utilized in big data smart cities emergency applications.Transmission information about the priority packets between the source nodes (i.e., people with emergency cases) and the destination nodes(i.e., hospitals) is performed before sending the packets in order to reserve transmission channels and prepare the sequence of transmission of theses priority packets between the two parties.In our proposed mechanism, Software Defined Networking (SDN) with centralized communication controller will be responsible for determining the scheduling and processing sequences for priority packets in big data smart cities environments.In this paper, we compare between our proposed Priority Packets Deadline First scheduling scheme (PPDF) with existing and traditional scheduling algorithms that can be used in urgent smart cities applications in order to illustrate the outstanding network performance parameters of our scheme such as the average waiting time, packets loss rates, priority packets end-to-end delay, and efficient energy consumption.

    Keywords: Packets transmission; scheduling scheme in IoT; software defined networking; big data smart cities; applications for priority packets

    1 Introduction

    The technology scene has been dominated for years by the term“Smart Cities”, which seek to provide a digital environment that stimulates learning and creativity that promotes a sense of happiness and health.There is more than one definition of this term, and sometimes more than one designation,such as“Digital Cities”and“Ecological Cities”, and they disagree according to the goals set by those responsible for developing them [1].

    The term smart cities and big data have long been of particular interest in the world of technology,and the use of these technologies is no longer a matter of technical luxury in many fields, but rather a necessity that is required by the need to control devices and equipment remotely based on the data that been recorded immediately on the one hand, and the need to process huge data that helps to make decisions automatically and instantly on the other hand.The merging of these two terms has led to the creation of new applications in promising smart environments, which are based on solving problems, facilitating matters, and enhancing the decision-making process, so that smart cities collect information between information technology and operational infrastructure, and big data plays its role in managing and analyzing large data with high-speed via sensors, applications, and devices to collect, share and transfer data in real time [1].

    In order to manage this data, there is a need to distinguish three levels: collection level, management and processing level, and application level, which this paper [2] focuses on data processing level that aims to analyze and manage the data generated by the collection level before archiving by representing the design and implementation of a smart city Big Data Processing platform.

    The IoT and big data technologies play an important role in the development of smart cities.The Internet of Things allows to connect disparate devices and communicate over networks and data that is potentially meant to be shared.IoT and Big Data technologies help smart cities to manage large amounts of data generated using technologies like Hadoop, Spark, Hbase and big data analytics tools like machine learning, data mining, data analytics, etc.The information collected has a great impact in various areas of the smart city such as security to ensure the safety of people;Transportation to reduce traffic jams; Urban planning identifies areas in need of improvement and modernization;Sustainability to provide sustainable development needs to be renewed [3].

    The integration of the Internet of Things and Big Data has become the backbone of smart city initiatives to connect human resources, social capital, and ICT infrastructure to respond to public challenges, achieve sustainable development, and raise the standard of living of individuals [4].

    In general,“Smart Cities”work on developing the economic and social levels and their purpose is to provide an environmentally friendly digital environment that stimulates learning and creativity so that if you are able to carry out your business and carry out your activities from your current place based on technology, which in turn helps improve the efficiency of resource consumption and improve the standard of living, the availability of good and fast services, easy mobility, and a safe and less polluted environment.All these are indicators that you live in a city that has the main characteristics of smart cities.New technological developments have helped governments realize the dream of smart cities, as developments in the Internet of things based on connecting devices, exchanging data and launching central control systems have contributed to saving energy consumption and improving the traffic management system in addition to artificial intelligence applications that analyze a large database of data to enrich the process of making the decision, and has already been relied upon in many areas, including the environment, agriculture, financial institutions, health and educational facilities [4].

    ‘Smart city’has various definitions.Some are tech savvy; others emphasize the ideological aspect.However, at the heart of the concept is the desire to use technology to better serve cities and urban communities [5].With the rise of the smart city concept, information technology and interdisciplinary approaches aim to help improve the use of city services and infrastructure, balancing the sustainability of social, economic, and environmental impacts.Technological cities apply information technology and advanced analytical tools to provide citizen-oriented services rather than having citizens be at the center of change that the main beneficiaries of the new city paradigm need to make.You need to develop an approach.To begin the transition to smart cities, we need to establish a metric model to set goals to improve the quality of life of our citizens [6].

    Smart cities is a new concept for inserting the technology in environment using different electronic devices, sensors and interaction methods between terminals for the purpose of collecting data.These data are used to manage resources and provide services to end users [7].Smart cities contains multiple components starting from infrastructure elements (e.g., smart transport networks, smart office facilities, smart houses and etc.) or behavioral elements (e.g., smart politics, smart people,smart living and etc.) [8].It is an integration between communications, information technology and smart devices in order to build IoT networks that connect people with each other or facilitate providing end users services.Applications of smart cities are developed in order to deal with real-time responses.For example, sending data packets from a source node to a destination node to inform hospitals or police stations about emergency in specific area [8].In other words, IoT is defined as the idea of connecting various physical devices to the Internet, as well as the concept of computers that express the ability of each device to identify itself with respect to other devices to form a virtual network that combines several distinct electronic devices, software, and sensors to connect them via the internet.These things can exchange data with each other [9].

    Originally, the main idea of the IoT is to interconnect multiple analog and digital electronic devices so that information can be communicated efficiently.IoT is a growing field, and it is something that is growing exponentially over the next few years [9].Despite the simplicity of this concept, the world of IoT is very complex and difficult to define in a specific sentence.On a technical level, it means the process of collecting huge amounts of random data from various things connected to the Internet, analyzing it, and then predicting its behavior in the future.This includes many protocols and programming languages.Thanks to IoT, most electronic devices will become autonomous and do not need any human intervention.These devices will be able to report their malfunctions and fix them on their own, starting with self-driving cars, lighting system in the home, and other various IoT application.

    So, in one of IoT applications, if a person is watching TV, and a sensor installed in the refrigerator finds that the water bottle in the refrigerator needs to be refilled because the water level has get down,the refrigerator will turn on all the sensors that installed in the rooms of the house to detects that if there is someone in the house who can go to the refrigerator and refill the water bottle, conveying the information by broadcasting the message“Search”to all of these sensors that have close to a transmission range of 8-10 meter, which overlaps each other, allowing them to freely communicate and share messages with each other.Also, The IoT can be very useful in solving the problems of people with physical or special disabilities in their daily lives [9].

    The IoT field is a comprehensive concept that includes integrating several devices, software and networks together to obtain the desired results and achieve the optimal meaning of IoT.Which an integrated IoT system includes four main components which are sensors (or any other type of physical device), Internet connection, data processing software and a user interface.

    One of the features of IoT is that it has the potential to accelerate the‘sharing economy’.So, by introducing new technologies for managing and tracking small objects, new auxiliary and economical items can be shared outside of society, airplanes, cars and motorcycles.As the trend continues, it exclusively introduces new applications that drive new business models and revenue prospects.It takes devices and sensors to a more precise level, enabling the creation of new uses, new applications, new services, and new business models that were previously uneconomical.It is also dangerous for many established industries.According to Gartner’s chart today, it is one of the top 5 IoT technologies in the world.This means that it is widely used in a variety of roles in various fields such as smart home,vehicle tracking, monitoring of children and the elderly, and daily work.However, the reality is that the sector currently employs many IoT-enabled devices [10].

    As for the mechanism of IoT, it starts with sensors that start collecting data from their environment in which they are located, and then this data is sent to the Cloud, which is a huge network of super servers that provide different services to individuals and companies, where the sensors are connected to the servers in different ways that may constitute: Smartphones, satellites, Wi-Fi, Bluetooth, etc.Once the data reaches the cloud, it is processed using a data analysis software.The process of processing this data may be simple or complex, depending on the amount and type of data obtained.Finally, the results are sent to the end user in the form of a specific alert, so that the user changes or adjusts the sensor settings, and sometimes the sensors are modified automatically without the need for human intervention [10].

    Big data is a collection of large and complex data sets that are difficult to process using data management tools.Assignments include capturing, curating, storing, retrieving, sharing, sending,analyzing, and visualizing.Big data is moved more frequently and at larger sizes across networks across the four dimensions of volume, speed, diversity, and reliability [11].It is huge data that cannot be processed by conventional methods because big data analysis and processing takes time, effort and huge cost technicians have been forced to rely on artificial intelligence systems with the ability to learn, reason and process.In addition to using cloud computing technology to complete tasks, it uses complex algorithms to respond to situations that are not programmed into the computer.

    Big data provides a deeper understanding of customer requirements, so if it can be processed profitably, it provides the enterprise with a highly competitive advantage and makes the right and appropriate decisions within the enterprise.Based on the information extracted from the customer database, it will improve efficiency and profit in a more effective way and reduce losses.Therefore,scientists regularly face limitations due to large datasets in many areas, including genetics, phylogeny,meteorology, complex physics simulations, biology, and environmental studies.All of this is huge and fast data.Some workflows require the ability to transfer a single 100TB dataset within hours.In today’s packet networks, data is transmitted over the network as a set of packets that are transmitted one at a time without looking at the entire data with associated Quality of Service (QoS) requirements.Therefore, it is difficult to provide QoS for bidirectional big data applications, the usefulness of the network is low, and the enhancement of the forwarding protocol is very urgent.Whether optical networks operating in circuit-switched patterns have a new role for this [11].

    Big data is receiving widespread attention in developing business applications such as IoT, and one of these service-based services is the efficient delivery of entity data that is currently designed based on end-to-end communication on the Internet [12].That said, most of them are implemented on a central server/cloud, and big data from remote servers/clouds should probably be distributed to users via the same route [12].Therefore, the current big data provisioning is highlighted by massive redundant traffic and significant latency.Network design of big data is essential to support the provision of large amounts of big data, and an architecture that supports data provision in networks such as Information-Centric Network (ICNs) [13] and Named- Data Network (NDNs) [14] is required.It is suggested for content-oriented applications.These networks reduce latency and excessive bandwidth consumption near users where data is cached on intermediate physical entities (IPEs) such as routers.

    The processing of big data currently requires massively parallel processing on thousands of servers,all of which must be directly connected to each other.With the advent of large data sets, there is an ongoing demand for additional data exchange capacity in data centers.Ultra-wideband data center network operators face the daunting challenge of scaling their networks (bandwidth) to a hitherto unimaginable size, maintaining a seamless connection between any two points in their network.

    In current data networks, data is a packet from an application before it enters the network and passes on the network packet by packet until all the pieces reach their destination.This simplifies the interaction between applications and the network, as packet processing and transport are the only functions that the network must perform, but it also comes with the disadvantage of increasing the amount of traffic and data [15].Application architects find it difficult to move big data from one side of the network to another, especially in the context of big data.Without the use of concurrent TCP streams or other transport-level improvements, moving gigabytes of data files across congested networks is difficult, if not impossible.Additionally, it is difficult for network operators to deploy new services over shared packet-switched networks, which always experience unpredictable congestion[15].

    The rest of this paper is organized as follows.In Section 2, we discuss some related works regarding the scheduling algorithms in big data smart cities.In Section 3, we give our problem statement.Section 4 details our proposed Priority Packets Deadline First (PPDF) scheme with Software Defined Networks (SDN) technique, and explains all related algorithms (i.e., connecting the source nodes with the SDN controllers algorithm, filtering data packets algorithm, and forwarding priority packets algorithm).Section 5 illustrates the simulation results and evaluates the performance of the proposed PPDF scheme with SDN technique and compare PPDF with existing well known scheduling algorithms utilized in big data smart cities.Finally, we conclude the paper in Section 6.

    2 Related Works

    The term IoT refers to the network of devices capable of collecting and sharing data with other devices on the same network.This allows objects to be sensed and controlled remotely through the existing network infrastructure.When the devices are able to communicate with each other, this leads to Creating a platform where automation can be programmed, for example a smart house is one of the best examples of how the Internet of Things can be used well, where every piece of office equipment can be monitored, whether it is smart locks installed on every door, a smart coffee machine or a unit Air conditioning or smart refrigerator, controlled remotely.All of these services need to be scheduled in several ways that will be based on reducing costs, improving safety and automation,improving workers’efficiency, and also reducing the level of electricity consumption and improving the mechanism of communication of devices with each other.

    IoT is about designing optimal scheduling algorithms, which should maximize CPU usage and throughput and minimize latency and power consumption [16].In general, IoT applications can shorten the life of the network due to the high sensing cost of repeatedly performing tasks on various sensor nodes.Some approaches can solve this problem by assigning similar tasks in a specific area to a single machine.However, choosing to run a single machine was a difficult matter.In addition,efficient scheduling of tasks prevents repetition of the same task and leads to unnecessary inter-node communication [17].

    2.1 Priority Based Adaptive Scheduling Algorithm for IoT Sensor Systems

    Authors in [18] proposed a priority based adaptive scheduling algorithm (PASA) for IoT sensor systemswhich is the traditional scheduling approaches do not meet the various quality of service (QoS) requirements and requirements of heterogeneous applications.The proposed PASA takes into account the requirements of heterogeneous applications, such as data rate, minimum delay transmit power,remaining energy, and remaining buffer size of the device [18].The proposed algorithm considers IoT sensors with different applications.The base station allocates a collision-free time slot to each node based on the priority of the traffic.The duty cycle (ST) of each node is adaptively fixed based on the remaining buffer size (RBS), the remaining energy (RE), and the required transmit power (TP) of the priority queue level of the traffic.

    2.2 Scheduling Services on an IoT Device Under Time-Weighted Pricing

    The authors presented an IoT network device that contains an interface with one specific computational resource available.Efficient use of available IoT resources improves the quality of service (QoS) of IoT networks that serve smart cities [19].All resource allocations must be completed within a given fixed window, and all services are parameterized by a price weighting function to indicate the margin of error provided at the start of a given window.

    At the same time, they provided a method of mathematical optimization to minimize the total cost of allocating all demand in the scheduling window, taking into account the tolerance level of each service.It also proves that their problem is computationally difficult and provides numerical results to gain insight into the impact of the various price weighting features of the allocation distribution within the scheduling window.

    Several sets of simulations were run to evaluate how using a different set of price weighting functions affects the distribution of allocations over time.If the mixture consists of tolerant services over generous services, the former takes precedence and thus at least most of the former are provided as early as possible.Conversely, if the mixture consists of tolerant services rather than intolerant services,and if the needs of the latter are fully met at the beginning of the reservation window, then, the latter will be fully served as soon as possible.Overall, the numerical results demonstrate the ability of the formulation to model acceptance levels of smart city services.

    2.3 Energy Efficient Scheduling for Networked IoT Device Software Update

    This system proposed a mechanism to schedule updates via the IoT network to minimize energy consumption while meeting the constraints of the deadline for updating all devices.It mathematically formulates the energy efficiency update scheduling problem as an optimization problem using a new energy model of the update process and propose an algorithm to estimate the optimal schedule for updating all devices in the network.And by examining the proposed algorithm on three network instances,including the tree-part-mesh-full-mesh topology.Simulation results show that this algorithm can achieve near-optimal values.This is a difference of only 3.2% from the minimum in the best case [20].

    It focuses on the IoT network model, which includes many connected IoT devices and gateways.All gateway devices are considered “nodes” in the chart.The device receives the component at both the gateway and other devices.You can download from multiple nodes at the same time or send to multiple nodes, but you can only download up to one component on one node at a time.They proposed an algorithm called ESUS, which uses step P1 to create an energy efficient schedule without taking into account the time limit Tmax.

    2.4 Optimal Resource and Task Scheduling for IoT

    Based on [21] task scheduling poses a number of challenges in IoT.Scheduling work in an IoTaware environment uses sensors and RFID in particular, so resource usage needs to be reduced.And should be a method that used to extends the life of the network and reduces communication between nodes.And the authors find that by combining the non-priority, non-occupancy algorithm and Ant Colony Optimization (ACO), they proposed a hybrid resource and job scheduling algorithm that finds the optimal path to guide the sensor node in order to prioritize and execute the work.Here, there are no real-time requirements, and you can focus on the tasks that you can save to the job queue of your IoT device and perform later.The proposed algorithm consists of two types of modules:

    2.4.1 TPP (Task PreProcessor)

    The preprocessing of individual tasks based on user queries is executed by the first module Task PreProcessor that works within the IoT gateway.The main role of an IoT gateway is to create a workgroup and identify the virtual object that leads the workgroup.Creating a task group requires a task preprocessing that the task preprocessor does.The TPP is responsible for splitting user queries into multiple tasks and specifying the appropriate sensor to perform the task [21].

    2.4.2 TPS (Task Path Selection)

    The virtual leader node is responsible to lead the workgroup.Therefore, it keeps track of all the nodes that have joined the workgroup.Therefore, it is the virtual reader’s responsibility to choose the route that forwards the task’s packets between task groups to complete the task.The virtual reader makes a work path selection to reach the sensor node determined using the ACO algorithm.Issues that cannot be negotiated are directly assigned to the TPS, issues that can be negotiated are divided into groups, and only the issues of the leader of each group are assigned to the TPS.TPS schedules tasks based on delay parameters.Jobs with the lowest time delay are reserved first from the run queue,followed by scheduled tasks with the highest delay [21].

    2.5 Scheduling Method for Collaborative Detection Traffic in the Bottom of IOT

    For the purpose of fast scheduling of joint detection traffic in IoT, a joint detection scheduling model on the bottom of the IoT is designed in this model [22].The model prioritizes the detection layer traffic data through a local scheduler in the collaborative layer, then schedules the traffic data using an enhanced weighted round robin (IWRR) method, and the IWRR method optimizes real-time and non-real-time mixed traffic scheduling borrowed priority.Data by building a temporary queue in the rank.The simulation results show that, compared with the conventional WRR method, the IWRR method can transmit real-time traffic data continuously and timely, while the average transmission delay of the traffic data is low.

    Many cities are now seeking to make use of Big Data, and emerging technologies such as:Artificial Intelligence, Machine Learning, IoT etc., to facilitate the daily lives of residents.So that there is a relationship between LoT in smart cities and big data.LoT can tackle most of the challenges related to big data.Since the technologies of LoT will spread within most sectors, this will lead to the flow of very large volumes of data and new methods will be established to collect this data, analyze it and benefit from its information.

    2.6 Big Data Processing Platform for Smart City

    According to the paper [23], smart cities have vast amounts of value information and visions extracted from big data generated by sensor applications, devices and people.Creating big data modeling is essential to overcome this problem.Paying special attention to creating a multi-layered smart city approach, the authors will propose a big data processing design for a smart city that uses the collected data by adding a data modeling approach that handles both transmissions.The authors are interested in data management and processing layer using big data processing tools and big data transmission tools.Then, after the process of comparing the effectiveness of the tool and the results from various aspects, the platform requirements are determined and the proposed structure is connected to the proposed structure of a data processing platform Smart City with many advantages such as reliability, scalability, high error etc., resistance and high efficiency.

    2.7 Network Experience Scheduling and Routing Approach for Big Data Transmission in the Internet of Things

    According to the authors [24] recent advances in Internet-related technologies in things have led to the transition to smart applications such as smart cities, smart homes, and online applications for business management.This, in turn, added significant additional load to the existing network infrastructure.Also, these applications use big data and require relatively short response times.Therefore, the researchers have introduced new scheduling and routing mechanisms to improve the end-user experience and provide increased throughput for big data applications.The results obtained demonstrate the efficiency of this new mechanism over other competitive methods in terms of delay in the network, network throughput and packet deletion.

    They proposed new centralized routing and scheduling algorithms and evaluated the new approach using extensive simulations with other centralized routing and scheduling algorithms,resulting in better quality of service (QoS) measurements than traditional methods.It shows excellent performance.The results also show that the performance of the entire network,which uses the previous network environment to determine the routing path of packets, can be significantly improved.Largescale applications, such as IoT heterogeneous networks, high-load networks, network environment approaches can use network resources to improve network performance and have a significant impact on end-user experience.

    2.8 Big Data in Motion: A Vehicle-Assisted Urban Computing Framework for Smart Cities

    According to the vast number of these devices used in smart cities, the efficient management of IoT resources and the data generated by these resources is one that has brought about unprecedented growth in big data.Causes previously related capacity issues on the device.Existing networks are not sufficient to support this huge amount of data transfer, so the authors [25] proposed an efficient data transfer frame based on volunteer vehicles which used to carry data in the direction of their destination.This framework promotes independence, social awareness and energy saving through urban computing.Also allows the research community to easily benchmark their own path selection algorithms.And the result is that the energy consumed by the vehicle is significantly less than the energy consumed by transmission over the Internet; thus, reducing carbon dioxide emissions, which demonstrates the efficiency of the proposed data transfer framework.The results also provide some insight into the optimal configuration of the vehicle’s data transmission network, based on latency,energy consumption, and data spot utilization analysis.

    Software-Defined Networking (SDN) is a new concept that transforms the way networking hardware works with software and transforms networks toward virtualized services.Technological advances in virtualization services, distributed systems architecture, big data, and cloud computing require fast and resilient networks that adapt quickly when using centralized smart technologies and SDNs are changing both the role of networks and where the control is located.SDN technologies can be deployed on virtual machines that can be installed on servers, such as VMware NSX, or run-in new switches that accept advanced network operating systems such as Big Switch or Cumulus.

    Because IoT devices are internet-based and contain sensitive information, security concerns are being raised and it needs to find ways to improve security between these types of devices (SDN) is a promising computer network technology that introduces a central program named‘SDN Controller’that enables network-wide control.Therefore, using SDN is a solid solution for improving IoT networking performance and overcoming the shortcomings that currently exist [26].

    2.9 CORAL-SDN: A Software-Defined Networking Solution for the Internet of Things

    According to [27], SDN solutions have been provided for wireless sensor networks (WSNs) that will use an intelligent central control mechanism to dynamically adjust protocol functions to support resilience to the difficult requirements of WSNs, maintain a scalable architecture, and exhibit improved shows network management and operations in terms of performance and resource utilization.They feature CORALSDN protocol manipulations in real testbeds, providing an environment suitable for hands-on experiments, highlighting the improvements SDN brings to the IoT.The results show that a software-defined method can provide a robust solution for improving network control of IoT networks.

    2.10 Securing Internet of Things System Using Software Defined Network Based Architecture

    In IoT systems, these low-power devices are a protection challenge for IoT systems because they are highly vulnerable to cyberattacks, which reduces the stability of the system.Software-Defined Networks (SDN) aims to greatly facilitate policy enforcement and dynamic network reconfiguration.This white paper describes several architectures for improving network and system security of IoT integration via SDN [28].A secure location can be based on a variety of reasons, such as application and network topology.Thus, according to the author he provides a multiple IoT-based SDN architecture to improve network security.The main feature of SDN is that the SDN controller is flexible and allows you to see the behavior of the entire network.There are more advanced methods for the security of IoT SDN systems such as network slices, but they have not yet been thoroughly explored.Therefore, including SDN in your existing IoT platform can not only provide the efficiency of data storage and analysis, but also improve security.

    2.11 The Method of Controlling Traffic Paths in IoT-Based Software Defined Network

    The authors provide a network management method applicable to the configuration of traffic routes and the functioning of nodes included in software-defined network routes.In other words, the advanced functions of each switch node can be utilized as network resources and as a result, users can provide a traffic path that efficiently supports customized services [29].

    Which, If the user can select the data path to the IoT service and configure the configuration(encryption,security,QoS,etc.),it will be convenient for the IoT service to provide efficient service and management.When a user using an IoT terminal requests the setting of a path for a communication service,SDN’s central control system provides the user with a list of configurable paths.And because of that proposed method from a list of user-configurable routes, the user can choose the most appropriate route for the service as he requires.In addition, the central control plane can provide users with information about the node functions supported by each switch node composing the path in the form of a selectable menu, and as a result, which of each switch node composing the path can provide the user.At least one node function can be selected for at least one service the user wants.Therefore,the quality of service can be improved because the route can be easily configured to suit the user’s requirements [29].

    2.12 ID-Based SDN for the Internet of Things

    Based on [30] IoT, big data not only brings convenience to people’s daily lives, but also increases the potential attack surface of cybercriminals.At the same time, given the resource constraints and heterogeneity characteristics, existing network security solutions can be difficult to achieve ideal results in an IoT environment, a challenge facing IoT big data security.In this case, the benefits introduced by software defined networking (SDN) may solve the problem of IoT security risks.For this reason, the author proposes an identity-based SDN security network architecture called IBSDN.Unlike existing SDN solutions, IBSDN is dedicated to providing reliable and intrinsic services to the IoT from the network side, which includes non-forgery terminal IDs in the data stream.This network-level reliable service prevents IoT devices from consuming limited resources for security and provides greater scalability and manageability for monitoring network security.Firstly, they analyze the characteristics of IoT big data and potential security attacks.Then proposed the following identitybased SDN security architecture: This architecture uses the powerful representation of IPv6 addresses while including terminal identity information.Original address verification technology ensures a trusted and traceable device identity in the management domain.Finally, the security capabilities of the IBSDN architecture are analyzed and key future challenges and opportunities are discussed.

    Packet Forwarding Priority (PFP) has been available in off-the-shelf routers for a long time, and support is provided by various models from popular brands such as Cisco and Juniper Networks.Network operators have come to rely on these mechanisms to manage their networks.For example,as a way to rate-limit certain classes of applications (peer-to-peer), PFPs can have a significant impact on the performance of applications beyond what administrators target.PFP can also seriously affect the accuracy of the output of measurement tools and the effectiveness of network troubleshooting procedures [31].

    2.13 Modified MAC for Priority Traffic with Slow Decrease of Contention Window and Reservation Based Packet Forwarding in IEEE 802.11 for QoS Provisioning

    The authors demonstrate a simple method for enhancing multimedia real-time performance in 802.11 WLANs [32] by implementing Quality of Service Manager (QoSM) for distinguishing services with two queues on an 802.11 media access controller.Contention window (SD) and reservationbased packet transmissions are slowly decreasing.The proposed scheme improves the performance of multimedia real-time service in infrastructure-based WLAN by coexistence of non-real-time traffic,verified with the help of ns-2.They consider a software upgrade-based deployment method to provide limited QoS for real-time multimedia service extension via MAC controller in 802.11 WLAN.The scheme needs to scale further to support voice traffic.

    2.14 Integrated Services to Differentiated Services Packet Forwarding: Guaranteed Service to Expedited Forwarding PHB

    Authors id this paper [33], outlines the design and simulation of packet transport algorithms between the Integrated Services network domain and the Differentiated Services network domain.The algorithm for sending packets in guaranteed class of service flows first to the transport PHB.This algorithm is assumed to be implemented in a pipeline processor configuration that separates the input packet processing function and the output packet processing function.The remaining jitter values are used to prioritize packet transmission.Measures of throughput and packet loss rates are shown.From simulations, they have found that this algorithm can yield good packet throughput and acceptable packet loss.

    3 Problem Statement

    In IoT applications for smart cities, a large number of shot messages need to be sent from a source node to a destination node with high level of network performancemetrics such as the power efficiency, the transmission time, the delay etc.One of the main challenges of IoT in smart cities is how to schedule the access to the communication channelwhile the network nodes become inactive most of the time and regularly send their packets when needed without human interaction.However, some urgent packets in smart city applications such as informing a hospital about emergency cases occurred in a specific location needs fast packets delivery to the destination node, and giving this prioritize packet all permission in order to ensure high transmission ratio with low latency.To address this issue in big data smart cities, many scheduling algorithms have been proposed recently for big data smart cities.All of these algorithms focus on how to ensure high scheduling network efficiency and appropriate allocation of network resources.For example, scheduling algorithms such as Earliest deadline First (EDF) [34], or First Come First Served (FCFS) [35], use data packets for differentiation between priority and nonpriority packets [36],while other studies proposed algorithms that give the priority packets a higher permission for single node transmission that preempt packets with low priority [37].Quality of Service (QoS) approaches have been used extensively as scheduling methods in big data smart cities.In QoS approaches, three factors affect the priority packets transmission which are the type the transmission node (i.e., the source node), the type of data and the timeline constrains for transmitted packets which cause difficulties in traffic management for large packets transmission environment such as big data smart cities.In our paper, we try to simplify the class-based packets transmission in big data smart cities.In other words, we proposed high performance calss-based priority packets scheduling mechanism for emergency application of big data smart cities.The main contributions of this paper are the following:

    ?The proposed scheduling algorithm is class-based algorithm which enable the destination node to explore information about the source node data packets.The priority packets will be transmitted first based on a threshold factor for the packet deadline.We call our proposed mechanism as Priority Packet Deadline First (PPDF).Packets that their deadline are expired will be dropped from the network channels in order to achieve high efficiency of network resources and low transmission overhead.In smart cities, depending on a packet deadline threshold instead of the threshold of packet transition time will lead to better utilization on the network bandwidth.

    ?We take the advantages of using centralized communication scenario based on SDN controller to handle all the required transmission for priority packets to the final destination node.The main idea behind the SDN controller is SDN to enhance the delivery of priority packets and ignoring the nonpriority packets (reduce the number of packets transmitted to the destination node).In addition, SDN controller can reduce the power consumption for IoT nodes and hence enhancing the smart cities network lifetime.

    ?In the network module for the proposed PPDF as well as SDN techniques, we proposed three algorithms, that are the broadcasting data packets algorithm at source nodes, determining priority packets algorithm at SDN controllers, and scheduling/forwarding priority packets algorithm at SDN controllers.

    ?We compare our proposed PPDF scheduling algorithm with existing scheduling schemes used in big data smart cities in order to demonstrate how the proposed PPDF algorithm achieve high performance metrics in terms of average waiting time, priority packets loss rate, priority packets end-to-end delay and the average energy consumption.

    4 Priority Packet Deadline First (PPDF) with SDN Controller

    In the proposed PPDF algorithm, static nodes are distributed randomly in the sensing area.We have source nodes, intermediate nodes and master nodes (the SDN controllers).Three different types of data packets are generated by source nodes.First, high priority data packets, which are the packets need to be sent correctly (quickly) to the SDN controllers.These data packets preempt both medium priority data packets and nonpriority data packets.High priority data packets (level 1) such as packets that contains data about fire or emergency situations in a specific location.Second, medium priority data packets (level 2), which are the packets that can preempt the nonpriority data packets.These data packets need to be sent to the SDN controller in order to carry information about the network capabilities in the presence of the fire or the emergency location.Third, nonpriority data packets (level 3) which are the packets that have very long deadline, and they can be delivered to the SDN controller or not depending on the heavy traffics of the network.

    Named Data Networking (NDN) in IoT can use the main feature of broadcast scenario of data packets to the SDN controllers where the source nodes broadcast data packets to all their neighbors.These neighbor nodes or intermediate nodes forward data packets to the SDN controllers or provide them from their cash memories.Thus, the probability of correctly delivering the data packets based on broadcast scenario to the SDN controllers increased dramatically.Redundant data packets with different priority levels (i.e., level 1, 2 and 3) can be delivered to the SDN controllers, which take the responsibilities for data packets scheduling, and the access the Medium Access Control (MAC)channel in order to forward the data packets to the final destination nodes.

    4.1 The Network Model of PPDF Algorithm

    The network model of the proposed PPDF algorithm with SDN controller in shown in Fig.1.The green nodes represent the source nodes that detect the emergencies and send their level 1 data packets through the yellow intermediate nodes that broadcast the level 1 data packets to the red SDN controllers.The orange source nodes are the nodes that send the level 2 and level 3 data packets.Here,the intermediate nodes forward (broadcast) the receiving data packets in their broadcast ranges, so the redundantdata packets are delivered correctly to the SDN controllers (red nodes) in IoT environment.The SDN controllers organize the access to the control channel where the level 1 data packets with short deadline will be sent first to the destination nodes (blue nodes).The destination nodes represent the final destinations for the data packets delivery such as the hospitals or the police stations.

    Figure 1: Network model for the proposed PPDF algorithm with SDN controllers

    All nodes in the proposed network model have specific tables, and data packets are distributed into slots as shown in Fig.2.In this figure, the source nodes have the source structure which includes the Content of Data Packets (CDT), the Waiting Table (WT), the Forwarding Table (FT), and the Neighborhood Table (NhT), while the SDN controllers utilize controllers’structure which have the Network Table (NT) that contains the whole network information.This networks table includes the Routing Table (RT) to the destination nodes based on the shortest path algorithm (i.e., Dijkstra algorithm) and the Forwarding Table (FT_SDN).The data packets are divided into slots which contains information such as node ID number, SDN controller ID number, neighbor node ID number,content name, the deadline timer (i.e., our proposed threshold to distinguish between the three levels of data packets) and the energy threshold.

    Figure 2: Nodes’structure and data packet frames

    4.2 PPDF Algorithm Architecture

    Data packets will be broadcasted from the source nodes to the SDN controllers through the intermediate nodes in the proposed PPDF algorithm.The PPDF algorithm has four main architectures,which are explained in the following subsections.These four architectures include connecting source nodes with SDN controllers, access control mechanism, filtering data packets and forwarding data packets (see in Fig.3.

    Figure 3: Four architectures of the proposed PPDF algorithm

    4.2.1 Connecting Source Nodes with SDN Controllers

    The SDN controller sends its location information via broadcast messages (Discover_Packet)to all Source Nodes (SN) in the network.At SN, when the broadcast messages arrive correctly, the SN checks if the locations information of SDN controller didn’t store before in the Neighborhood Table (NhT), then the SN will update its own NhT and connect to the registered SDN (i.e., the SDN controller ID number).The information that is updated in NhT include node ID number, SDN controller ID number, neighbor node ID number, content name, and the deadline timer.After that,the SC sends broadcast message (Registered_Packet) toward registered SDN controller.Therefore,intended SDN controller will pick up the Registered_Packet for further processing.Once the exact SDN controller receives the Registered_Packet, the Network Table (NT) which includes information about the whole network nodes will be updated at the SDN controller (i.e., see in Algorithm 1).

    Now, the connection between the SDN controllers and the SN is discovered by Algorithm 1.The SDN controller will take the responsibility to manage data packet transmission to the final destinations.Once the data packets (i.e., packets indicate emergency situations that are occurred in specific locations) arrive to the SDN controllers, they will be processed by entering three main stages,which are the filtering data packets access control, and forwarding data packets.

    Algorithm 1: Broadcasting Data Packets Algorithm at Source Nodes to Build Connection Input: Source Nodes (S), SDN Controllers (SC)Output: Update Network Table (NT) at SDN Controllers 1.SC.SendBroadcast (Discover_Packet)2.if BP_Packet.NotStored.in.S( )3.Connect_S_To_SC ( )4.Update_ NhT ( )5.S.SendBroadcast (Registered_Packet)6.do 7.SC_Update_NT ( )8.while (Registered_Packet received by SC)9.else 10.S.Drop (Discover_Packet)11.end if

    4.2.2 Access Control Mechanism

    In the access control mechanism, the source node distinguishes between data packets based on their types.As mentioned earlier, there are three different types of data packets with various priorities(i.e., level 1, 2 and 3 priority data packets).Once the source node has data packet needs to be sent to the SDN controller and the conditional access control will check the frames of the data packet.The deadline timer in the packet frame will be checked in order to compare the priorities of various data packets of the source node or the neighbor nodes which are located in its range.Every source node can send data packets and access to the control channel through three different types of access channels.Therefore, queue 1 (Q1) will handle the level 1 data packets that have the highest priorities, queue 2(Q2) will handle the level 2 data packets that have the medium priorities, and queue 3 (Q3) will handle the level 3 data packets that have the lowest priorities.

    Thus, data packets will be stored in the control channel based on the deadline timer (i.e., data packets with shortest deadline first access to the control channel).In Fig.4, two source nodes have different data packets that have various priority levels.The figure shows how the data packets with shortest deadline enter the access channel and located in the front of the queue for two source nodes located in the same transmission range.

    Figure 4: Two source nodes in the same transmission range access to the control channel and how to priorities the data packet in the channel queue

    4.2.3 Filtering Data Packets

    In filtering data packets architecture, data packets need to be sent to the final destination must be compared based on their deadline which is the threshold that determine which packets can access to the communication channel.In this proposed PPDF algorithm, there are two scenarios for the data packets that compete to access two the communication channel (see in Algorithm 2).

    First scenario, multiple source nodes have multiple data packets compete to access to the communication channel which have the same priority.In filtering data packets architecture, suppose the packets priorities are denoted aspr1=pr2=pr3= ...prk; wherepr1is the priority for the first data packet needs to be accessed to the communication channel.Then,deadl1,deadl2,deadl3...deadlkmust be compared;deadl1is the deadline timer for the first data packet need to be accessed to the communication channel.If the nodexhas a data packet with deadline timer which is lower than the threshold levelt, then this packet is level 1 emergency packet..ifdeadl1=deadl2=deadl3= ...deadlk,then the control channel will pick up any level 1 data packet from nodes 1, 2, 3, orkto access to the communication channel because all of their packets are level 1 data packets with the same priority.

    Second scenario: multiple source nodes have multiple data packets compete to access to the communication channel which have different priorities.Suppose that aspr1<pr2<pr3<...prk, that is the data packets for the node 1 has lower priority than the data packet of node 2.Here, we compare the deadline for these data packets wheredeadl1<deadl2<deadl3<...deadlk, then the packet which has the lowest deadline timer among nodes will be picked to be entered in the front of the communication channel.(i.e.,S1<tcompared withSk<t; whereSis the source node andtis the threshold level).

    Now, either scenario filters the data packet need to be entered the communication channel.Time Division Multiple Access (TDMA) MAC protocol are utilized to push the filtered data packets into the communication channel in order to deliver these priority packets to the SDN controller for further processing.Once the SDN controllers receive the data packets, they will follow the shortest path algorithm in order to deliver the data packets to the final destinations as we will explained in the forwarding subsection (i.e., Subsection 4.2.4).

    Algorithm 2: Filtering Data Packets Input: Connected Source Nodes (S) with SDN Controllers (SC)Output: Filtering Data Packets based on Priorities 1.S.Send (Data_Packet)2.if (Data_Packet==1)3.call.First_Scenario ( )4.call.TDMA (Data_Packet)5.SC.Receive (Data_Packet)6.else 7.call.Second_Scenario ( )8.call.TDMA (Data_Packet)9.SC.Receive (Data_Packet)10.end 11.call.First_Scenario ( )12.for i=1 to k 13.if ( pri=prk)14.check(deadli)15.if (deadli=deallk)16.Randomly select Data_Packet 17.if (deadli≤t1)18.Put (Data_Packet=Q1)19.else if (t1<deadli<t2)20.Put (Data_Packet=Q2)21.else 22.Put (Data_Packet=Q3)23.end if 24.end if 25.end if 26.end for 27.Return_to_line 4 28.call.Second_Scenario ( )29.for i=1 to k 30.if ( pri≤prk)31.check(deadli)32.if (deadli≤deallk)33.select Data_Packet i 34.if (deadli≤t1)35.Put (Data_Packet=Q1)36.else if (t1<deadli<t2)37.Put (Data_Packet=Q2)38.else 39.Put (Data_Packet=Q3)40.end if 41.end if(Continued)

    42.end if 43.end for 44.Return_to_line 8

    4.2.4 Forwarding Data Packets

    After completing the connection between the source nodes and the SDN controller, and perpetrating the access control stage with distinguishing between priority and nonpriority data packets, data packets will follow TDMA MAC protocol in order to be delivered to the SDN controllers.Once the data packets arrived to the corresponding SDN controller, the SDN controller will check the NT table for matching with the received data packets.If the match is applicable, then the SDN controller will follow the Dijkstra shortest path algorithm in order to deliver the data packets to the final destination.If the match is inapplicable, then the data packets will be dropped.Hence, the redundancy of data packets will be reduced as well as saved the network resources.In addition, in our PPDF algorithm,we also use the energy threshold level (El) (i.e., nodes with remaining energy level which are greater than 20%) in order to determine which nodes can be selected as members in the shortest path between the SDN controllers and the final destinations.We assumed 20% as the threshold level of the remaining energy.However, it can be tuned as required by the network designer (See in Algorithm 3).

    Algorithm 3: Forwarding Data Packets Input: Connected Source Nodes (S) with SDN Controllers (SC)Output: Forwarding Data Packets to Final Destination 1.SC.Receive (Data_Packet)2.SC.check (NT)3.for Data_Packet=1 to j 4.if (Data_Packet=NT)5.if (El>20% )6.SC.Compute_Dijkstra_Algorithm ( )7.if (Dijkstra_calculated)8.SC.send_to_Destination (Data_Packet)9.else 10.SC.Drop (Data_Packet)11.else 12.SC.Drop (Data_Packet)13.else 14.SC.Drop (Data_Packet)15.end if 16.end if 17.end if 18.end for

    5 Simulation Results and Performance Analysis

    In this section, we conduct the simulation results to evaluate our proposed PPDF algorithm in comparison with similar algorithms utilized in big data smart cities of IoT.The proposed PPDF algorithm is compared with Dynamic Multilevel Priority packet scheduling algorithm (DMP) [38],normal NDN flooding mechanism in IoT (NDN_Flooding), and First-Come, First-Served (FCFS)algorithm [35] in terms of average waiting time, packet loss rate, end-to-end delay and average energy consumption.Based on NS2 simulator, we conduct a scenario where priority packets are needed to be sent to the final destination (hospital) in order to request an imbalance for cars accident located in specific location in a geographical area of IoT.Twenty source nodes, which are located in coverage area of the cars’accident, send level 1 (high priority data packets) through the intermediate nodes to be delivered to the closest SDN controller using TDMA MAC protocol.The corresponding SDN controller sends the received priority packets to the hospital which is located far away in the geographical area.The SDN controller follows the proposed PPDF algorithm for the priority data packets transmission.In the simulation, the normal data packets (level 2 and 3) are generated every 10 min randomly, but the level 1 data packets are sent once the cars accidents are occurred in the sensing area.The simulation settings are demonstrated in Tab.1.

    Table 1: Simulation parameters

    For the first performance metric (i.e., the average waiting time), the simulation results show that when generating various data packets from source nodes with different transmission rate, the network conditions can ensure different data packets transmission to the SDN controllers and then to the final destination node without collisions that consume network resources.In other words, the simulation network model can be tuned from sending high priority data packets to low priority data packets easily.Fig.5 illustrates the average waiting time for the proposed PPDF algorithm against DMP,NDN_flooding and FCFS algorithms.The figure shows how the average waiting time can increase when increasing the packets sizes.The figure also demonstrates that the data packets with priority level 1 (i.e., Fig.5a) has lower average waiting time than the data packets with priority level 2 and 3 (i.e.,Figs.5a and 5b).Thus, the level 1 data packets are delivered to the destination nodes faster than the level 2 and 3 data packets due to the fact that the competition to access to the communication channel is depended on the shortest deadline first.In addition, the proposed PPDF algorithm outperforms the existing DMP, NDN_flooding, and FCFS algorithms in term of the average waiting time.The normal flooding NDN algorithm has longer waiting time and packets are competed difficulty to access to the communication channel.

    Figure 5: Average waiting time.(a) Level 1 data packets, (b) Level 2 data packets, (c) Level 3 data packets

    For the second performance metric (i.e., packets loss rate), Fig.2a illustrates how the level 1 data packets loss rate increase slowly when increasing the packets sizes.However, in the proposed PPDF, the packet loss rate is not obvious as it can reach 6.80% when the packet length is 1000 byte.It is followed by the DMP and FCFS algorithms while the NDN flooding algorithm has the highest packets loss rate(i.e., around 40.10% when the packet size is 1000 byte).In addition, Figs.6b and 6c still demonstrate that the proposed PPDF algorithm outperforms the existing algorithms, and has lower packets loss rates for both the level 2 and 3 data packets.Also, increasing the packet lengths causes increasing in the packets loss rates gradually.The network conditions in FCFS algorithm have an affect on the packets retransmission due to the collision possibilities.Packets access to the communication channel suffer from the MAC layer collision which means that the packets will be dropped before they are arrived to the final destinations.The same scenario is occurred in DMP algorithm, that is when the communication channel solves the collision to handle packets transmission, the data packets will be dropped before arriving to the final destinations due to the deadline expiration possibilities.In normal NDN flooding algorithms, packets loss rates are high due to both collision and inefficient MAC protocol that flood the network with heavy traffic without distinguishing between high and low priority packets.Thus, from previous figures, we can conclude that in PPDF algorithm the average waiting time for our proposed algorithm is low in comparison with the existing algorithms, so the packet loss rate will be low too due to that fact that data packets will be arrived to the final destination(the hospital) before the deadline expiration.Even if the data packets with priority level 2 and 3, the proposed PPDF still has high efficiency packets loss rates which make this algorithm is the right choice for scheduling in heavy traffic IoT environment.

    Figure 6: Packets loss rate: (a) Level 1 data packets, (b) Level 2 data packets, (c) Level 3 data packets

    For the third performance metric (i.e., end-to-end delay), Fig.7a illustrates how the end-toend delay of the proposed PPDF algorithm is low in comparison with the other algorithms.When the packet length is short, the PPDF algorithm has almost the same end-to-end delay of the DMP algorithm.Around 5.3 ms is the end-to-end delay for the proposed PPDF when the packet length is 200 bytes.This delay increased to 17.6 when the packet size is 1000 bytes.The DPM algorithm has 6.2 ms end-to-end delay for when the packet length is 200 bytes, while it has 30.6 end-to-end delay when the packet size is 1000 bytes.In DPM algorithm, the TDMA is the MAC protocol that seems suitable for scheduling access to the communication channel when the packet length is short.However,when increasing the packet size, the time frame for packets scheduling will be increased too resulting in increasing the end-to-end delay.Figs.7b and 7c show that the proposed PPDF algorithm still allocate network resources for level 2 and 3 data packets.

    Figure 7: End-to-end delay.(a) Level 1 data packets, (b) Level 2 data packets, (c) Level 3 data packets

    For the fourth performance metric (i.e., energy consumption), Fig.8 illustrates how the energy level for the proposed PPDF outperform the existing algorithms due to the fact that every node has its own energy threshold that control the selection of intermediate nodes which involve in the transmission processes.The figure shows that the energy consumption will be decreased when increasing the number of SDN controllers as they considered to be the master nodes with high features for packets transmission.The highest number for SDN controllers in our simulation is 50 controllers.When the SDN controller is 50, the energy consumption for the proposed PPDF algorithm is 4 joules, while the energy consumption for the DMP algorithm, FCFS algorithm and NDN_flooding algorithm are 6,10 and 22 joules, respectively.Thus, the highest energy preserving algorithm is the proposed PPDF algorithm followed by DMP algorithm, FCFS algorithm and NDN_flooding algorithm respectively.

    Figure 8: Energy consumption (joules)

    6 Conclusion

    In this paper, the researchers proposed PPDF scheduling algorithm for emergency applications of big data smart cities.The proposed PPDF preserves network resources via transferring the priority information between source nodes and destinations.Source nodes with high priority data packets, that represent emergency situations indications, will be delivered through high priority communication channels, while packets with low priority information will be delivered through low priority data channels.Nodes compete to access to the communication channel by using TDMA MAC protocol in the transmission path between the source nodes and the SDN controllers.However, packets follow the earliest deadline first in the transmission path between the SDN controllers and the destination nodes.In our paper, the authors proposed four architectures for the PPDF algorithm which are connecting the source nodes with SDN controllers, the access control mechanism, determining priority packets stage and forwarding process.The proposed PPDF algorithm is compared with existing well known algorithms used in big data smart cities, and the simulation results shows how our proposed algorithm has high performance efficiency in terms of the average waiting time, the packet loss rate, the end-toend delay and the energy consumption.In the future work, we will increase the flexibility of the PPDF algorithm via increasing the number of static nodes and adding mobile nodes in the network model.More simulation performance metrics can be measured with mobile nodes which are moving from one location to another to be closed to the SDN controllers.

    Acknowledgement:We deeply acknowledge Taif University for supporting this study through Taif University Researchers Supporting Project Number (TURSP-2020/150), Taif University, Taif, Saudi Arabia.

    Funding Statement:This study is supported through Taif University Researchers Supporting Project Number (TURSP-2020/150), Taif University, Taif, Saudi Arabia.

    Conflicts of Interest:The author declare that he has no conflicts of interest to report regarding the present study.

    kizo精华| 赤兔流量卡办理| 天天躁夜夜躁狠狠久久av| 人妻一区二区av| 欧美日韩综合久久久久久| 免费观看av网站的网址| 日韩人妻精品一区2区三区| 高清黄色对白视频在线免费看| 亚洲精品久久久久久婷婷小说| 菩萨蛮人人尽说江南好唐韦庄| 国产综合精华液| av女优亚洲男人天堂| 亚洲伊人色综图| 久久av网站| 成人毛片a级毛片在线播放| 国产成人91sexporn| 日本av手机在线免费观看| 9热在线视频观看99| 亚洲av在线观看美女高潮| 欧美人与善性xxx| 大话2 男鬼变身卡| 国产成人精品婷婷| 亚洲国产色片| 亚洲国产看品久久| 中文天堂在线官网| 2018国产大陆天天弄谢| 又黄又粗又硬又大视频| 九九爱精品视频在线观看| 亚洲成av片中文字幕在线观看 | 亚洲,欧美精品.| 纵有疾风起免费观看全集完整版| 自拍欧美九色日韩亚洲蝌蚪91| 男男h啪啪无遮挡| 如何舔出高潮| 捣出白浆h1v1| 欧美人与性动交α欧美精品济南到 | 国产在线一区二区三区精| 99国产精品免费福利视频| 亚洲一区二区三区欧美精品| 制服人妻中文乱码| 青春草国产在线视频| 秋霞伦理黄片| 国产永久视频网站| 伦理电影免费视频| 久久精品久久久久久久性| 少妇被粗大的猛进出69影院 | 99九九在线精品视频| 中文字幕制服av| 深夜精品福利| 国产 一区精品| 亚洲国产精品一区三区| 另类精品久久| 国产探花极品一区二区| 日韩中字成人| 91精品国产国语对白视频| 超碰97精品在线观看| 国产日韩欧美在线精品| h视频一区二区三区| 午夜激情av网站| 五月伊人婷婷丁香| 男女国产视频网站| 精品视频人人做人人爽| 少妇的逼水好多| 久久鲁丝午夜福利片| 国产免费福利视频在线观看| 一区二区三区精品91| 久久久久精品久久久久真实原创| 高清av免费在线| 在线观看国产h片| 在线观看免费高清a一片| 最近手机中文字幕大全| 又黄又粗又硬又大视频| 99热全是精品| 超碰97精品在线观看| 国产爽快片一区二区三区| 日日啪夜夜爽| 久久久精品免费免费高清| 尾随美女入室| 国产有黄有色有爽视频| 九九在线视频观看精品| 国产精品一国产av| 777米奇影视久久| 91在线精品国自产拍蜜月| av电影中文网址| 妹子高潮喷水视频| av在线app专区| 在线观看一区二区三区激情| 欧美97在线视频| 伦精品一区二区三区| 九草在线视频观看| 大陆偷拍与自拍| 亚洲av日韩在线播放| 日韩一本色道免费dvd| 最近最新中文字幕大全免费视频 | 免费高清在线观看视频在线观看| 哪个播放器可以免费观看大片| 看非洲黑人一级黄片| 精品一区二区三区四区五区乱码 | 99香蕉大伊视频| 久久久久精品久久久久真实原创| 草草在线视频免费看| 多毛熟女@视频| 91精品国产国语对白视频| 亚洲综合精品二区| 日韩欧美精品免费久久| 中文字幕精品免费在线观看视频 | 国产成人精品在线电影| 天堂中文最新版在线下载| 亚洲激情五月婷婷啪啪| 亚洲欧洲国产日韩| 亚洲精品乱久久久久久| 久久97久久精品| 99九九在线精品视频| 亚洲精品成人av观看孕妇| 国产爽快片一区二区三区| 国产亚洲精品第一综合不卡 | 精品国产一区二区久久| 亚洲av.av天堂| www.熟女人妻精品国产 | 热99久久久久精品小说推荐| 久久精品人人爽人人爽视色| 欧美xxⅹ黑人| 久久99一区二区三区| 成人黄色视频免费在线看| 日韩av免费高清视频| 国产精品女同一区二区软件| 美女xxoo啪啪120秒动态图| 亚洲四区av| 人妻系列 视频| 亚洲国产毛片av蜜桃av| 伦精品一区二区三区| 国产成人精品无人区| 亚洲熟女精品中文字幕| 精品一区二区三区四区五区乱码 | 欧美日本中文国产一区发布| 久久女婷五月综合色啪小说| 一级片免费观看大全| av播播在线观看一区| 日本wwww免费看| 日韩大片免费观看网站| 国产欧美另类精品又又久久亚洲欧美| 国产男女内射视频| 日韩av免费高清视频| 一级a做视频免费观看| xxx大片免费视频| 久久久精品94久久精品| 久久久久久久精品精品| 亚洲欧美清纯卡通| 午夜激情av网站| 飞空精品影院首页| 国产日韩欧美在线精品| 日本免费在线观看一区| 久久久久精品久久久久真实原创| 精品久久久久久电影网| 亚洲熟女精品中文字幕| 欧美日韩视频精品一区| 国产成人精品无人区| 国产一区二区在线观看日韩| 九色成人免费人妻av| 亚洲精品乱久久久久久| 亚洲精品乱久久久久久| 九色成人免费人妻av| 午夜免费鲁丝| 一边摸一边做爽爽视频免费| 午夜免费观看性视频| 免费观看在线日韩| 国产精品秋霞免费鲁丝片| 成人影院久久| 建设人人有责人人尽责人人享有的| 日韩视频在线欧美| 精品人妻偷拍中文字幕| 一级a做视频免费观看| 最后的刺客免费高清国语| 老女人水多毛片| 看十八女毛片水多多多| 精品福利永久在线观看| 91国产中文字幕| 五月玫瑰六月丁香| 亚洲精品国产av成人精品| 在线观看www视频免费| 久久久国产欧美日韩av| 成年人免费黄色播放视频| 中文欧美无线码| 各种免费的搞黄视频| 亚洲国产最新在线播放| 99热6这里只有精品| 男人添女人高潮全过程视频| 99国产综合亚洲精品| 久久精品国产自在天天线| 91久久精品国产一区二区三区| 久久人人爽人人片av| 日韩欧美一区视频在线观看| 国产熟女欧美一区二区| av免费在线看不卡| 91精品国产国语对白视频| 99热这里只有是精品在线观看| 国产高清三级在线| 午夜福利在线观看免费完整高清在| 国产成人免费观看mmmm| 亚洲精品av麻豆狂野| 最近的中文字幕免费完整| 久久久精品免费免费高清| av有码第一页| 99热国产这里只有精品6| 黄片播放在线免费| 超碰97精品在线观看| 精品少妇黑人巨大在线播放| 一区在线观看完整版| 高清av免费在线| av女优亚洲男人天堂| 久久精品熟女亚洲av麻豆精品| 婷婷色麻豆天堂久久| 久久综合国产亚洲精品| 如何舔出高潮| 十八禁网站网址无遮挡| 亚洲一码二码三码区别大吗| 亚洲精品,欧美精品| 国产综合精华液| 婷婷成人精品国产| 久久国产精品大桥未久av| 亚洲成国产人片在线观看| 五月天丁香电影| 午夜影院在线不卡| av在线观看视频网站免费| 黄色怎么调成土黄色| 香蕉精品网在线| av有码第一页| www.色视频.com| 亚洲婷婷狠狠爱综合网| 丝瓜视频免费看黄片| 亚洲av电影在线进入| 精品国产一区二区久久| 高清不卡的av网站| 高清在线视频一区二区三区| 一级毛片黄色毛片免费观看视频| 久久久久视频综合| 曰老女人黄片| 两个人免费观看高清视频| 亚洲精品乱码久久久久久按摩| 黄片播放在线免费| a级毛色黄片| www.av在线官网国产| 少妇人妻 视频| 精品卡一卡二卡四卡免费| 巨乳人妻的诱惑在线观看| 一级片免费观看大全| 丰满乱子伦码专区| 国产日韩欧美视频二区| 久久久欧美国产精品| 免费人妻精品一区二区三区视频| 久久青草综合色| 老熟女久久久| 永久免费av网站大全| 两个人看的免费小视频| 黄网站色视频无遮挡免费观看| 国产毛片在线视频| 亚洲伊人久久精品综合| 人妻少妇偷人精品九色| 欧美老熟妇乱子伦牲交| 亚洲精品久久久久久婷婷小说| 亚洲精品国产色婷婷电影| 欧美丝袜亚洲另类| 欧美激情 高清一区二区三区| 久久久久久久久久久免费av| 精品国产一区二区久久| 国产男女内射视频| 亚洲精品中文字幕在线视频| 看十八女毛片水多多多| 久久久久久伊人网av| 久久久久国产精品人妻一区二区| 大话2 男鬼变身卡| 亚洲高清免费不卡视频| 国产一区二区三区综合在线观看 | 久久午夜福利片| 亚洲,欧美,日韩| 少妇的逼好多水| 极品少妇高潮喷水抽搐| 欧美人与性动交α欧美精品济南到 | 国产欧美日韩综合在线一区二区| 亚洲av综合色区一区| 国产女主播在线喷水免费视频网站| 好男人视频免费观看在线| 亚洲,欧美,日韩| 97在线视频观看| 国产精品久久久av美女十八| 人人妻人人澡人人看| 欧美3d第一页| 街头女战士在线观看网站| 在现免费观看毛片| 天堂中文最新版在线下载| 热re99久久国产66热| 亚洲在久久综合| 免费不卡的大黄色大毛片视频在线观看| 飞空精品影院首页| 成人综合一区亚洲| 国产一区亚洲一区在线观看| 国产亚洲av片在线观看秒播厂| 日本色播在线视频| 国产69精品久久久久777片| 美女大奶头黄色视频| 亚洲综合精品二区| 最近中文字幕2019免费版| av国产精品久久久久影院| 97超碰精品成人国产| 国产精品免费大片| 成人综合一区亚洲| 亚洲精品乱久久久久久| 国产高清三级在线| 日韩中文字幕视频在线看片| 丝袜喷水一区| 亚洲av成人精品一二三区| 亚洲成人一二三区av| 日韩人妻精品一区2区三区| 欧美国产精品va在线观看不卡| 国产男女超爽视频在线观看| 精品少妇内射三级| 亚洲成色77777| 免费观看性生交大片5| 亚洲精品一二三| 国产男女内射视频| 午夜免费观看性视频| 中文精品一卡2卡3卡4更新| 高清毛片免费看| 男人操女人黄网站| 国产精品蜜桃在线观看| 日韩伦理黄色片| 黄色 视频免费看| 亚洲精品久久久久久婷婷小说| 熟女人妻精品中文字幕| 伊人亚洲综合成人网| 久久精品国产综合久久久 | 国产精品熟女久久久久浪| 女性生殖器流出的白浆| 精品久久国产蜜桃| 内地一区二区视频在线| 亚洲,欧美精品.| 欧美成人午夜免费资源| 在线看a的网站| 久久 成人 亚洲| 久久婷婷青草| 观看av在线不卡| av电影中文网址| 欧美少妇被猛烈插入视频| 亚洲国产色片| 久久精品人人爽人人爽视色| 九色成人免费人妻av| 久久久久久人妻| 亚洲av国产av综合av卡| 一二三四中文在线观看免费高清| 久热这里只有精品99| 一区二区av电影网| 人妻少妇偷人精品九色| 亚洲av电影在线进入| 2018国产大陆天天弄谢| 建设人人有责人人尽责人人享有的| 肉色欧美久久久久久久蜜桃| 国产亚洲午夜精品一区二区久久| 亚洲精品中文字幕在线视频| 成年动漫av网址| 国产成人91sexporn| 国产亚洲一区二区精品| 寂寞人妻少妇视频99o| 视频在线观看一区二区三区| 大码成人一级视频| av女优亚洲男人天堂| 久久精品熟女亚洲av麻豆精品| 如日韩欧美国产精品一区二区三区| 春色校园在线视频观看| 亚洲成av片中文字幕在线观看 | 免费高清在线观看日韩| av一本久久久久| 亚洲国产精品国产精品| 亚洲精品视频女| 国产av国产精品国产| 国产成人精品一,二区| 成人手机av| av电影中文网址| 精品人妻在线不人妻| 亚洲国产av影院在线观看| 亚洲欧美一区二区三区国产| 久久女婷五月综合色啪小说| 国产精品一区二区在线不卡| 九九爱精品视频在线观看| 国产福利在线免费观看视频| 综合色丁香网| 高清在线视频一区二区三区| 天天操日日干夜夜撸| 中文字幕av电影在线播放| 美女中出高潮动态图| 69精品国产乱码久久久| 97精品久久久久久久久久精品| 久久女婷五月综合色啪小说| 黑人欧美特级aaaaaa片| 国产日韩欧美在线精品| 一级a做视频免费观看| av视频免费观看在线观看| 免费av中文字幕在线| 国产午夜精品一二区理论片| 天堂8中文在线网| 在线天堂中文资源库| 在线观看免费高清a一片| 老司机影院毛片| 最后的刺客免费高清国语| 日本-黄色视频高清免费观看| 亚洲av免费高清在线观看| 在线看a的网站| 九色亚洲精品在线播放| 日本与韩国留学比较| 成人二区视频| 国产一区二区在线观看av| 午夜福利视频在线观看免费| 高清av免费在线| 久久毛片免费看一区二区三区| 久久热在线av| 国产在线免费精品| 99九九在线精品视频| 天堂中文最新版在线下载| 下体分泌物呈黄色| 欧美精品一区二区免费开放| 黑人巨大精品欧美一区二区蜜桃 | 蜜桃在线观看..| 国产成人av激情在线播放| 欧美激情极品国产一区二区三区 | 一级片免费观看大全| 国产日韩欧美视频二区| 精品国产乱码久久久久久小说| 乱人伦中国视频| 成人国语在线视频| 秋霞伦理黄片| 天美传媒精品一区二区| 精品酒店卫生间| 日韩欧美精品免费久久| 久久久久久久久久久久大奶| 久久精品久久久久久久性| 欧美人与性动交α欧美精品济南到 | 黄色视频在线播放观看不卡| 久久99精品国语久久久| 九九爱精品视频在线观看| 中国三级夫妇交换| 午夜免费观看性视频| 9色porny在线观看| 亚洲成色77777| 99久国产av精品国产电影| 欧美精品人与动牲交sv欧美| 天堂俺去俺来也www色官网| 五月伊人婷婷丁香| 老女人水多毛片| 色哟哟·www| 人人妻人人爽人人添夜夜欢视频| 18禁在线无遮挡免费观看视频| 制服丝袜香蕉在线| 亚洲精品第二区| 五月伊人婷婷丁香| 又黄又爽又刺激的免费视频.| 国国产精品蜜臀av免费| 精品人妻熟女毛片av久久网站| 91在线精品国自产拍蜜月| 免费av不卡在线播放| 国产精品久久久久成人av| 男女啪啪激烈高潮av片| 久久久久久人人人人人| 一级毛片 在线播放| 久热这里只有精品99| 天美传媒精品一区二区| 香蕉丝袜av| 国产精品一区www在线观看| 街头女战士在线观看网站| 黑人巨大精品欧美一区二区蜜桃 | 久久久久久久久久成人| 午夜91福利影院| 欧美精品人与动牲交sv欧美| 欧美成人精品欧美一级黄| 国产成人91sexporn| 岛国毛片在线播放| 色婷婷久久久亚洲欧美| 亚洲美女黄色视频免费看| 亚洲美女搞黄在线观看| 九色成人免费人妻av| 伦精品一区二区三区| av国产久精品久网站免费入址| 成人毛片60女人毛片免费| 青青草视频在线视频观看| 久久精品国产鲁丝片午夜精品| 免费观看av网站的网址| 精品久久久久久电影网| 日本91视频免费播放| 免费观看在线日韩| 99久国产av精品国产电影| 国产成人精品久久久久久| 中文字幕av电影在线播放| 久久久久国产网址| 亚洲色图综合在线观看| 两个人免费观看高清视频| 制服人妻中文乱码| 国产精品国产av在线观看| 欧美另类一区| 美女视频免费永久观看网站| 一级片免费观看大全| 国内精品宾馆在线| 国产精品不卡视频一区二区| 国产激情久久老熟女| 精品一区二区三卡| videosex国产| 卡戴珊不雅视频在线播放| 精品亚洲成a人片在线观看| 国产麻豆69| 18禁观看日本| 午夜av观看不卡| 久久99热6这里只有精品| 欧美精品一区二区大全| 热99国产精品久久久久久7| 熟女电影av网| 王馨瑶露胸无遮挡在线观看| 国产精品.久久久| 国产免费视频播放在线视频| 国产探花极品一区二区| 午夜免费鲁丝| 宅男免费午夜| 国产视频首页在线观看| 中国美白少妇内射xxxbb| 亚洲av电影在线观看一区二区三区| 亚洲av在线观看美女高潮| 久久久欧美国产精品| 精品久久久久久电影网| 亚洲少妇的诱惑av| 一本—道久久a久久精品蜜桃钙片| 乱人伦中国视频| 国产男人的电影天堂91| 久久鲁丝午夜福利片| www日本在线高清视频| 欧美日韩视频精品一区| 日韩视频在线欧美| 久久99热这里只频精品6学生| 欧美日韩一区二区视频在线观看视频在线| 欧美丝袜亚洲另类| 国产精品人妻久久久影院| 人妻一区二区av| 亚洲欧美清纯卡通| 亚洲色图 男人天堂 中文字幕 | 99精国产麻豆久久婷婷| 国产精品一二三区在线看| 亚洲国产精品专区欧美| 久久亚洲国产成人精品v| 美国免费a级毛片| 国产精品成人在线| 亚洲欧美色中文字幕在线| 校园人妻丝袜中文字幕| 纵有疾风起免费观看全集完整版| 国产精品蜜桃在线观看| 国产亚洲午夜精品一区二区久久| 90打野战视频偷拍视频| 人妻系列 视频| 18禁裸乳无遮挡动漫免费视频| 亚洲成av片中文字幕在线观看 | 婷婷成人精品国产| 高清av免费在线| 亚洲中文av在线| 最近的中文字幕免费完整| 亚洲国产精品专区欧美| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 五月天丁香电影| 日韩伦理黄色片| 欧美变态另类bdsm刘玥| 人妻人人澡人人爽人人| 街头女战士在线观看网站| 日本欧美视频一区| 国产成人免费无遮挡视频| 亚洲激情五月婷婷啪啪| 91成人精品电影| 久久久久久久精品精品| 伊人亚洲综合成人网| 日日啪夜夜爽| 亚洲情色 制服丝袜| 亚洲欧美精品自产自拍| 中文字幕免费在线视频6| 亚洲精品国产色婷婷电影| 一级毛片黄色毛片免费观看视频| 久热久热在线精品观看| 国产精品欧美亚洲77777| 99精国产麻豆久久婷婷| 国产一级毛片在线| √禁漫天堂资源中文www| 国产男女超爽视频在线观看| 欧美丝袜亚洲另类| 亚洲内射少妇av| 老司机影院毛片| 亚洲成人一二三区av| 午夜久久久在线观看| 最近中文字幕2019免费版| 国产成人欧美| 欧美少妇被猛烈插入视频| 香蕉丝袜av| 中文字幕亚洲精品专区| 黑人猛操日本美女一级片| 国产av精品麻豆| 超碰97精品在线观看| 国产亚洲午夜精品一区二区久久| 99国产综合亚洲精品| 女人被躁到高潮嗷嗷叫费观| 一级片'在线观看视频| 久久久久国产网址| 秋霞在线观看毛片| 亚洲av福利一区| 成人免费观看视频高清| 一边摸一边做爽爽视频免费| 国产一区亚洲一区在线观看| 国产白丝娇喘喷水9色精品| 性色av一级| 亚洲内射少妇av| 精品国产露脸久久av麻豆| 女的被弄到高潮叫床怎么办| 97在线视频观看| 成年美女黄网站色视频大全免费| 午夜精品国产一区二区电影| 制服人妻中文乱码|