• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    High Performance Priority Packets Scheduling Mechanism for Big Data in Smart Cities

    2022-08-24 12:57:46FawazAlassery
    Computers Materials&Continua 2022年7期

    Fawaz Alassery

    Department of Computer Engineering, College of Computers and Information Technology, Taif University, Taif, 21944,Saudi Arabia

    Abstract: Today, Internet of Things (IoT) is a technology paradigm which convinces many researchers for the purpose of achieving high performance of packets delivery in IoT applications such as smart cities.Interconnecting various physical devices such as sensors or actuators with the Internet may causes different constraints on the network resources such as packets delivery ratio, energy efficiency, end-to-end delays etc.However, traditional scheduling methodologies in large-scale environments such as big data smart cities cannot meet the requirements for high performance network metrics.In big data smart cities applications which need fast packets transmission ratio such as sending priority packets to hospitals for an emergency case, an efficient scheduling mechanism is mandatory which is the main concern of this paper.In this paper, we overcome the shortcoming issues of the traditional scheduling algorithms that are utilized in big data smart cities emergency applications.Transmission information about the priority packets between the source nodes (i.e., people with emergency cases) and the destination nodes(i.e., hospitals) is performed before sending the packets in order to reserve transmission channels and prepare the sequence of transmission of theses priority packets between the two parties.In our proposed mechanism, Software Defined Networking (SDN) with centralized communication controller will be responsible for determining the scheduling and processing sequences for priority packets in big data smart cities environments.In this paper, we compare between our proposed Priority Packets Deadline First scheduling scheme (PPDF) with existing and traditional scheduling algorithms that can be used in urgent smart cities applications in order to illustrate the outstanding network performance parameters of our scheme such as the average waiting time, packets loss rates, priority packets end-to-end delay, and efficient energy consumption.

    Keywords: Packets transmission; scheduling scheme in IoT; software defined networking; big data smart cities; applications for priority packets

    1 Introduction

    The technology scene has been dominated for years by the term“Smart Cities”, which seek to provide a digital environment that stimulates learning and creativity that promotes a sense of happiness and health.There is more than one definition of this term, and sometimes more than one designation,such as“Digital Cities”and“Ecological Cities”, and they disagree according to the goals set by those responsible for developing them [1].

    The term smart cities and big data have long been of particular interest in the world of technology,and the use of these technologies is no longer a matter of technical luxury in many fields, but rather a necessity that is required by the need to control devices and equipment remotely based on the data that been recorded immediately on the one hand, and the need to process huge data that helps to make decisions automatically and instantly on the other hand.The merging of these two terms has led to the creation of new applications in promising smart environments, which are based on solving problems, facilitating matters, and enhancing the decision-making process, so that smart cities collect information between information technology and operational infrastructure, and big data plays its role in managing and analyzing large data with high-speed via sensors, applications, and devices to collect, share and transfer data in real time [1].

    In order to manage this data, there is a need to distinguish three levels: collection level, management and processing level, and application level, which this paper [2] focuses on data processing level that aims to analyze and manage the data generated by the collection level before archiving by representing the design and implementation of a smart city Big Data Processing platform.

    The IoT and big data technologies play an important role in the development of smart cities.The Internet of Things allows to connect disparate devices and communicate over networks and data that is potentially meant to be shared.IoT and Big Data technologies help smart cities to manage large amounts of data generated using technologies like Hadoop, Spark, Hbase and big data analytics tools like machine learning, data mining, data analytics, etc.The information collected has a great impact in various areas of the smart city such as security to ensure the safety of people;Transportation to reduce traffic jams; Urban planning identifies areas in need of improvement and modernization;Sustainability to provide sustainable development needs to be renewed [3].

    The integration of the Internet of Things and Big Data has become the backbone of smart city initiatives to connect human resources, social capital, and ICT infrastructure to respond to public challenges, achieve sustainable development, and raise the standard of living of individuals [4].

    In general,“Smart Cities”work on developing the economic and social levels and their purpose is to provide an environmentally friendly digital environment that stimulates learning and creativity so that if you are able to carry out your business and carry out your activities from your current place based on technology, which in turn helps improve the efficiency of resource consumption and improve the standard of living, the availability of good and fast services, easy mobility, and a safe and less polluted environment.All these are indicators that you live in a city that has the main characteristics of smart cities.New technological developments have helped governments realize the dream of smart cities, as developments in the Internet of things based on connecting devices, exchanging data and launching central control systems have contributed to saving energy consumption and improving the traffic management system in addition to artificial intelligence applications that analyze a large database of data to enrich the process of making the decision, and has already been relied upon in many areas, including the environment, agriculture, financial institutions, health and educational facilities [4].

    ‘Smart city’has various definitions.Some are tech savvy; others emphasize the ideological aspect.However, at the heart of the concept is the desire to use technology to better serve cities and urban communities [5].With the rise of the smart city concept, information technology and interdisciplinary approaches aim to help improve the use of city services and infrastructure, balancing the sustainability of social, economic, and environmental impacts.Technological cities apply information technology and advanced analytical tools to provide citizen-oriented services rather than having citizens be at the center of change that the main beneficiaries of the new city paradigm need to make.You need to develop an approach.To begin the transition to smart cities, we need to establish a metric model to set goals to improve the quality of life of our citizens [6].

    Smart cities is a new concept for inserting the technology in environment using different electronic devices, sensors and interaction methods between terminals for the purpose of collecting data.These data are used to manage resources and provide services to end users [7].Smart cities contains multiple components starting from infrastructure elements (e.g., smart transport networks, smart office facilities, smart houses and etc.) or behavioral elements (e.g., smart politics, smart people,smart living and etc.) [8].It is an integration between communications, information technology and smart devices in order to build IoT networks that connect people with each other or facilitate providing end users services.Applications of smart cities are developed in order to deal with real-time responses.For example, sending data packets from a source node to a destination node to inform hospitals or police stations about emergency in specific area [8].In other words, IoT is defined as the idea of connecting various physical devices to the Internet, as well as the concept of computers that express the ability of each device to identify itself with respect to other devices to form a virtual network that combines several distinct electronic devices, software, and sensors to connect them via the internet.These things can exchange data with each other [9].

    Originally, the main idea of the IoT is to interconnect multiple analog and digital electronic devices so that information can be communicated efficiently.IoT is a growing field, and it is something that is growing exponentially over the next few years [9].Despite the simplicity of this concept, the world of IoT is very complex and difficult to define in a specific sentence.On a technical level, it means the process of collecting huge amounts of random data from various things connected to the Internet, analyzing it, and then predicting its behavior in the future.This includes many protocols and programming languages.Thanks to IoT, most electronic devices will become autonomous and do not need any human intervention.These devices will be able to report their malfunctions and fix them on their own, starting with self-driving cars, lighting system in the home, and other various IoT application.

    So, in one of IoT applications, if a person is watching TV, and a sensor installed in the refrigerator finds that the water bottle in the refrigerator needs to be refilled because the water level has get down,the refrigerator will turn on all the sensors that installed in the rooms of the house to detects that if there is someone in the house who can go to the refrigerator and refill the water bottle, conveying the information by broadcasting the message“Search”to all of these sensors that have close to a transmission range of 8-10 meter, which overlaps each other, allowing them to freely communicate and share messages with each other.Also, The IoT can be very useful in solving the problems of people with physical or special disabilities in their daily lives [9].

    The IoT field is a comprehensive concept that includes integrating several devices, software and networks together to obtain the desired results and achieve the optimal meaning of IoT.Which an integrated IoT system includes four main components which are sensors (or any other type of physical device), Internet connection, data processing software and a user interface.

    One of the features of IoT is that it has the potential to accelerate the‘sharing economy’.So, by introducing new technologies for managing and tracking small objects, new auxiliary and economical items can be shared outside of society, airplanes, cars and motorcycles.As the trend continues, it exclusively introduces new applications that drive new business models and revenue prospects.It takes devices and sensors to a more precise level, enabling the creation of new uses, new applications, new services, and new business models that were previously uneconomical.It is also dangerous for many established industries.According to Gartner’s chart today, it is one of the top 5 IoT technologies in the world.This means that it is widely used in a variety of roles in various fields such as smart home,vehicle tracking, monitoring of children and the elderly, and daily work.However, the reality is that the sector currently employs many IoT-enabled devices [10].

    As for the mechanism of IoT, it starts with sensors that start collecting data from their environment in which they are located, and then this data is sent to the Cloud, which is a huge network of super servers that provide different services to individuals and companies, where the sensors are connected to the servers in different ways that may constitute: Smartphones, satellites, Wi-Fi, Bluetooth, etc.Once the data reaches the cloud, it is processed using a data analysis software.The process of processing this data may be simple or complex, depending on the amount and type of data obtained.Finally, the results are sent to the end user in the form of a specific alert, so that the user changes or adjusts the sensor settings, and sometimes the sensors are modified automatically without the need for human intervention [10].

    Big data is a collection of large and complex data sets that are difficult to process using data management tools.Assignments include capturing, curating, storing, retrieving, sharing, sending,analyzing, and visualizing.Big data is moved more frequently and at larger sizes across networks across the four dimensions of volume, speed, diversity, and reliability [11].It is huge data that cannot be processed by conventional methods because big data analysis and processing takes time, effort and huge cost technicians have been forced to rely on artificial intelligence systems with the ability to learn, reason and process.In addition to using cloud computing technology to complete tasks, it uses complex algorithms to respond to situations that are not programmed into the computer.

    Big data provides a deeper understanding of customer requirements, so if it can be processed profitably, it provides the enterprise with a highly competitive advantage and makes the right and appropriate decisions within the enterprise.Based on the information extracted from the customer database, it will improve efficiency and profit in a more effective way and reduce losses.Therefore,scientists regularly face limitations due to large datasets in many areas, including genetics, phylogeny,meteorology, complex physics simulations, biology, and environmental studies.All of this is huge and fast data.Some workflows require the ability to transfer a single 100TB dataset within hours.In today’s packet networks, data is transmitted over the network as a set of packets that are transmitted one at a time without looking at the entire data with associated Quality of Service (QoS) requirements.Therefore, it is difficult to provide QoS for bidirectional big data applications, the usefulness of the network is low, and the enhancement of the forwarding protocol is very urgent.Whether optical networks operating in circuit-switched patterns have a new role for this [11].

    Big data is receiving widespread attention in developing business applications such as IoT, and one of these service-based services is the efficient delivery of entity data that is currently designed based on end-to-end communication on the Internet [12].That said, most of them are implemented on a central server/cloud, and big data from remote servers/clouds should probably be distributed to users via the same route [12].Therefore, the current big data provisioning is highlighted by massive redundant traffic and significant latency.Network design of big data is essential to support the provision of large amounts of big data, and an architecture that supports data provision in networks such as Information-Centric Network (ICNs) [13] and Named- Data Network (NDNs) [14] is required.It is suggested for content-oriented applications.These networks reduce latency and excessive bandwidth consumption near users where data is cached on intermediate physical entities (IPEs) such as routers.

    The processing of big data currently requires massively parallel processing on thousands of servers,all of which must be directly connected to each other.With the advent of large data sets, there is an ongoing demand for additional data exchange capacity in data centers.Ultra-wideband data center network operators face the daunting challenge of scaling their networks (bandwidth) to a hitherto unimaginable size, maintaining a seamless connection between any two points in their network.

    In current data networks, data is a packet from an application before it enters the network and passes on the network packet by packet until all the pieces reach their destination.This simplifies the interaction between applications and the network, as packet processing and transport are the only functions that the network must perform, but it also comes with the disadvantage of increasing the amount of traffic and data [15].Application architects find it difficult to move big data from one side of the network to another, especially in the context of big data.Without the use of concurrent TCP streams or other transport-level improvements, moving gigabytes of data files across congested networks is difficult, if not impossible.Additionally, it is difficult for network operators to deploy new services over shared packet-switched networks, which always experience unpredictable congestion[15].

    The rest of this paper is organized as follows.In Section 2, we discuss some related works regarding the scheduling algorithms in big data smart cities.In Section 3, we give our problem statement.Section 4 details our proposed Priority Packets Deadline First (PPDF) scheme with Software Defined Networks (SDN) technique, and explains all related algorithms (i.e., connecting the source nodes with the SDN controllers algorithm, filtering data packets algorithm, and forwarding priority packets algorithm).Section 5 illustrates the simulation results and evaluates the performance of the proposed PPDF scheme with SDN technique and compare PPDF with existing well known scheduling algorithms utilized in big data smart cities.Finally, we conclude the paper in Section 6.

    2 Related Works

    The term IoT refers to the network of devices capable of collecting and sharing data with other devices on the same network.This allows objects to be sensed and controlled remotely through the existing network infrastructure.When the devices are able to communicate with each other, this leads to Creating a platform where automation can be programmed, for example a smart house is one of the best examples of how the Internet of Things can be used well, where every piece of office equipment can be monitored, whether it is smart locks installed on every door, a smart coffee machine or a unit Air conditioning or smart refrigerator, controlled remotely.All of these services need to be scheduled in several ways that will be based on reducing costs, improving safety and automation,improving workers’efficiency, and also reducing the level of electricity consumption and improving the mechanism of communication of devices with each other.

    IoT is about designing optimal scheduling algorithms, which should maximize CPU usage and throughput and minimize latency and power consumption [16].In general, IoT applications can shorten the life of the network due to the high sensing cost of repeatedly performing tasks on various sensor nodes.Some approaches can solve this problem by assigning similar tasks in a specific area to a single machine.However, choosing to run a single machine was a difficult matter.In addition,efficient scheduling of tasks prevents repetition of the same task and leads to unnecessary inter-node communication [17].

    2.1 Priority Based Adaptive Scheduling Algorithm for IoT Sensor Systems

    Authors in [18] proposed a priority based adaptive scheduling algorithm (PASA) for IoT sensor systemswhich is the traditional scheduling approaches do not meet the various quality of service (QoS) requirements and requirements of heterogeneous applications.The proposed PASA takes into account the requirements of heterogeneous applications, such as data rate, minimum delay transmit power,remaining energy, and remaining buffer size of the device [18].The proposed algorithm considers IoT sensors with different applications.The base station allocates a collision-free time slot to each node based on the priority of the traffic.The duty cycle (ST) of each node is adaptively fixed based on the remaining buffer size (RBS), the remaining energy (RE), and the required transmit power (TP) of the priority queue level of the traffic.

    2.2 Scheduling Services on an IoT Device Under Time-Weighted Pricing

    The authors presented an IoT network device that contains an interface with one specific computational resource available.Efficient use of available IoT resources improves the quality of service (QoS) of IoT networks that serve smart cities [19].All resource allocations must be completed within a given fixed window, and all services are parameterized by a price weighting function to indicate the margin of error provided at the start of a given window.

    At the same time, they provided a method of mathematical optimization to minimize the total cost of allocating all demand in the scheduling window, taking into account the tolerance level of each service.It also proves that their problem is computationally difficult and provides numerical results to gain insight into the impact of the various price weighting features of the allocation distribution within the scheduling window.

    Several sets of simulations were run to evaluate how using a different set of price weighting functions affects the distribution of allocations over time.If the mixture consists of tolerant services over generous services, the former takes precedence and thus at least most of the former are provided as early as possible.Conversely, if the mixture consists of tolerant services rather than intolerant services,and if the needs of the latter are fully met at the beginning of the reservation window, then, the latter will be fully served as soon as possible.Overall, the numerical results demonstrate the ability of the formulation to model acceptance levels of smart city services.

    2.3 Energy Efficient Scheduling for Networked IoT Device Software Update

    This system proposed a mechanism to schedule updates via the IoT network to minimize energy consumption while meeting the constraints of the deadline for updating all devices.It mathematically formulates the energy efficiency update scheduling problem as an optimization problem using a new energy model of the update process and propose an algorithm to estimate the optimal schedule for updating all devices in the network.And by examining the proposed algorithm on three network instances,including the tree-part-mesh-full-mesh topology.Simulation results show that this algorithm can achieve near-optimal values.This is a difference of only 3.2% from the minimum in the best case [20].

    It focuses on the IoT network model, which includes many connected IoT devices and gateways.All gateway devices are considered “nodes” in the chart.The device receives the component at both the gateway and other devices.You can download from multiple nodes at the same time or send to multiple nodes, but you can only download up to one component on one node at a time.They proposed an algorithm called ESUS, which uses step P1 to create an energy efficient schedule without taking into account the time limit Tmax.

    2.4 Optimal Resource and Task Scheduling for IoT

    Based on [21] task scheduling poses a number of challenges in IoT.Scheduling work in an IoTaware environment uses sensors and RFID in particular, so resource usage needs to be reduced.And should be a method that used to extends the life of the network and reduces communication between nodes.And the authors find that by combining the non-priority, non-occupancy algorithm and Ant Colony Optimization (ACO), they proposed a hybrid resource and job scheduling algorithm that finds the optimal path to guide the sensor node in order to prioritize and execute the work.Here, there are no real-time requirements, and you can focus on the tasks that you can save to the job queue of your IoT device and perform later.The proposed algorithm consists of two types of modules:

    2.4.1 TPP (Task PreProcessor)

    The preprocessing of individual tasks based on user queries is executed by the first module Task PreProcessor that works within the IoT gateway.The main role of an IoT gateway is to create a workgroup and identify the virtual object that leads the workgroup.Creating a task group requires a task preprocessing that the task preprocessor does.The TPP is responsible for splitting user queries into multiple tasks and specifying the appropriate sensor to perform the task [21].

    2.4.2 TPS (Task Path Selection)

    The virtual leader node is responsible to lead the workgroup.Therefore, it keeps track of all the nodes that have joined the workgroup.Therefore, it is the virtual reader’s responsibility to choose the route that forwards the task’s packets between task groups to complete the task.The virtual reader makes a work path selection to reach the sensor node determined using the ACO algorithm.Issues that cannot be negotiated are directly assigned to the TPS, issues that can be negotiated are divided into groups, and only the issues of the leader of each group are assigned to the TPS.TPS schedules tasks based on delay parameters.Jobs with the lowest time delay are reserved first from the run queue,followed by scheduled tasks with the highest delay [21].

    2.5 Scheduling Method for Collaborative Detection Traffic in the Bottom of IOT

    For the purpose of fast scheduling of joint detection traffic in IoT, a joint detection scheduling model on the bottom of the IoT is designed in this model [22].The model prioritizes the detection layer traffic data through a local scheduler in the collaborative layer, then schedules the traffic data using an enhanced weighted round robin (IWRR) method, and the IWRR method optimizes real-time and non-real-time mixed traffic scheduling borrowed priority.Data by building a temporary queue in the rank.The simulation results show that, compared with the conventional WRR method, the IWRR method can transmit real-time traffic data continuously and timely, while the average transmission delay of the traffic data is low.

    Many cities are now seeking to make use of Big Data, and emerging technologies such as:Artificial Intelligence, Machine Learning, IoT etc., to facilitate the daily lives of residents.So that there is a relationship between LoT in smart cities and big data.LoT can tackle most of the challenges related to big data.Since the technologies of LoT will spread within most sectors, this will lead to the flow of very large volumes of data and new methods will be established to collect this data, analyze it and benefit from its information.

    2.6 Big Data Processing Platform for Smart City

    According to the paper [23], smart cities have vast amounts of value information and visions extracted from big data generated by sensor applications, devices and people.Creating big data modeling is essential to overcome this problem.Paying special attention to creating a multi-layered smart city approach, the authors will propose a big data processing design for a smart city that uses the collected data by adding a data modeling approach that handles both transmissions.The authors are interested in data management and processing layer using big data processing tools and big data transmission tools.Then, after the process of comparing the effectiveness of the tool and the results from various aspects, the platform requirements are determined and the proposed structure is connected to the proposed structure of a data processing platform Smart City with many advantages such as reliability, scalability, high error etc., resistance and high efficiency.

    2.7 Network Experience Scheduling and Routing Approach for Big Data Transmission in the Internet of Things

    According to the authors [24] recent advances in Internet-related technologies in things have led to the transition to smart applications such as smart cities, smart homes, and online applications for business management.This, in turn, added significant additional load to the existing network infrastructure.Also, these applications use big data and require relatively short response times.Therefore, the researchers have introduced new scheduling and routing mechanisms to improve the end-user experience and provide increased throughput for big data applications.The results obtained demonstrate the efficiency of this new mechanism over other competitive methods in terms of delay in the network, network throughput and packet deletion.

    They proposed new centralized routing and scheduling algorithms and evaluated the new approach using extensive simulations with other centralized routing and scheduling algorithms,resulting in better quality of service (QoS) measurements than traditional methods.It shows excellent performance.The results also show that the performance of the entire network,which uses the previous network environment to determine the routing path of packets, can be significantly improved.Largescale applications, such as IoT heterogeneous networks, high-load networks, network environment approaches can use network resources to improve network performance and have a significant impact on end-user experience.

    2.8 Big Data in Motion: A Vehicle-Assisted Urban Computing Framework for Smart Cities

    According to the vast number of these devices used in smart cities, the efficient management of IoT resources and the data generated by these resources is one that has brought about unprecedented growth in big data.Causes previously related capacity issues on the device.Existing networks are not sufficient to support this huge amount of data transfer, so the authors [25] proposed an efficient data transfer frame based on volunteer vehicles which used to carry data in the direction of their destination.This framework promotes independence, social awareness and energy saving through urban computing.Also allows the research community to easily benchmark their own path selection algorithms.And the result is that the energy consumed by the vehicle is significantly less than the energy consumed by transmission over the Internet; thus, reducing carbon dioxide emissions, which demonstrates the efficiency of the proposed data transfer framework.The results also provide some insight into the optimal configuration of the vehicle’s data transmission network, based on latency,energy consumption, and data spot utilization analysis.

    Software-Defined Networking (SDN) is a new concept that transforms the way networking hardware works with software and transforms networks toward virtualized services.Technological advances in virtualization services, distributed systems architecture, big data, and cloud computing require fast and resilient networks that adapt quickly when using centralized smart technologies and SDNs are changing both the role of networks and where the control is located.SDN technologies can be deployed on virtual machines that can be installed on servers, such as VMware NSX, or run-in new switches that accept advanced network operating systems such as Big Switch or Cumulus.

    Because IoT devices are internet-based and contain sensitive information, security concerns are being raised and it needs to find ways to improve security between these types of devices (SDN) is a promising computer network technology that introduces a central program named‘SDN Controller’that enables network-wide control.Therefore, using SDN is a solid solution for improving IoT networking performance and overcoming the shortcomings that currently exist [26].

    2.9 CORAL-SDN: A Software-Defined Networking Solution for the Internet of Things

    According to [27], SDN solutions have been provided for wireless sensor networks (WSNs) that will use an intelligent central control mechanism to dynamically adjust protocol functions to support resilience to the difficult requirements of WSNs, maintain a scalable architecture, and exhibit improved shows network management and operations in terms of performance and resource utilization.They feature CORALSDN protocol manipulations in real testbeds, providing an environment suitable for hands-on experiments, highlighting the improvements SDN brings to the IoT.The results show that a software-defined method can provide a robust solution for improving network control of IoT networks.

    2.10 Securing Internet of Things System Using Software Defined Network Based Architecture

    In IoT systems, these low-power devices are a protection challenge for IoT systems because they are highly vulnerable to cyberattacks, which reduces the stability of the system.Software-Defined Networks (SDN) aims to greatly facilitate policy enforcement and dynamic network reconfiguration.This white paper describes several architectures for improving network and system security of IoT integration via SDN [28].A secure location can be based on a variety of reasons, such as application and network topology.Thus, according to the author he provides a multiple IoT-based SDN architecture to improve network security.The main feature of SDN is that the SDN controller is flexible and allows you to see the behavior of the entire network.There are more advanced methods for the security of IoT SDN systems such as network slices, but they have not yet been thoroughly explored.Therefore, including SDN in your existing IoT platform can not only provide the efficiency of data storage and analysis, but also improve security.

    2.11 The Method of Controlling Traffic Paths in IoT-Based Software Defined Network

    The authors provide a network management method applicable to the configuration of traffic routes and the functioning of nodes included in software-defined network routes.In other words, the advanced functions of each switch node can be utilized as network resources and as a result, users can provide a traffic path that efficiently supports customized services [29].

    Which, If the user can select the data path to the IoT service and configure the configuration(encryption,security,QoS,etc.),it will be convenient for the IoT service to provide efficient service and management.When a user using an IoT terminal requests the setting of a path for a communication service,SDN’s central control system provides the user with a list of configurable paths.And because of that proposed method from a list of user-configurable routes, the user can choose the most appropriate route for the service as he requires.In addition, the central control plane can provide users with information about the node functions supported by each switch node composing the path in the form of a selectable menu, and as a result, which of each switch node composing the path can provide the user.At least one node function can be selected for at least one service the user wants.Therefore,the quality of service can be improved because the route can be easily configured to suit the user’s requirements [29].

    2.12 ID-Based SDN for the Internet of Things

    Based on [30] IoT, big data not only brings convenience to people’s daily lives, but also increases the potential attack surface of cybercriminals.At the same time, given the resource constraints and heterogeneity characteristics, existing network security solutions can be difficult to achieve ideal results in an IoT environment, a challenge facing IoT big data security.In this case, the benefits introduced by software defined networking (SDN) may solve the problem of IoT security risks.For this reason, the author proposes an identity-based SDN security network architecture called IBSDN.Unlike existing SDN solutions, IBSDN is dedicated to providing reliable and intrinsic services to the IoT from the network side, which includes non-forgery terminal IDs in the data stream.This network-level reliable service prevents IoT devices from consuming limited resources for security and provides greater scalability and manageability for monitoring network security.Firstly, they analyze the characteristics of IoT big data and potential security attacks.Then proposed the following identitybased SDN security architecture: This architecture uses the powerful representation of IPv6 addresses while including terminal identity information.Original address verification technology ensures a trusted and traceable device identity in the management domain.Finally, the security capabilities of the IBSDN architecture are analyzed and key future challenges and opportunities are discussed.

    Packet Forwarding Priority (PFP) has been available in off-the-shelf routers for a long time, and support is provided by various models from popular brands such as Cisco and Juniper Networks.Network operators have come to rely on these mechanisms to manage their networks.For example,as a way to rate-limit certain classes of applications (peer-to-peer), PFPs can have a significant impact on the performance of applications beyond what administrators target.PFP can also seriously affect the accuracy of the output of measurement tools and the effectiveness of network troubleshooting procedures [31].

    2.13 Modified MAC for Priority Traffic with Slow Decrease of Contention Window and Reservation Based Packet Forwarding in IEEE 802.11 for QoS Provisioning

    The authors demonstrate a simple method for enhancing multimedia real-time performance in 802.11 WLANs [32] by implementing Quality of Service Manager (QoSM) for distinguishing services with two queues on an 802.11 media access controller.Contention window (SD) and reservationbased packet transmissions are slowly decreasing.The proposed scheme improves the performance of multimedia real-time service in infrastructure-based WLAN by coexistence of non-real-time traffic,verified with the help of ns-2.They consider a software upgrade-based deployment method to provide limited QoS for real-time multimedia service extension via MAC controller in 802.11 WLAN.The scheme needs to scale further to support voice traffic.

    2.14 Integrated Services to Differentiated Services Packet Forwarding: Guaranteed Service to Expedited Forwarding PHB

    Authors id this paper [33], outlines the design and simulation of packet transport algorithms between the Integrated Services network domain and the Differentiated Services network domain.The algorithm for sending packets in guaranteed class of service flows first to the transport PHB.This algorithm is assumed to be implemented in a pipeline processor configuration that separates the input packet processing function and the output packet processing function.The remaining jitter values are used to prioritize packet transmission.Measures of throughput and packet loss rates are shown.From simulations, they have found that this algorithm can yield good packet throughput and acceptable packet loss.

    3 Problem Statement

    In IoT applications for smart cities, a large number of shot messages need to be sent from a source node to a destination node with high level of network performancemetrics such as the power efficiency, the transmission time, the delay etc.One of the main challenges of IoT in smart cities is how to schedule the access to the communication channelwhile the network nodes become inactive most of the time and regularly send their packets when needed without human interaction.However, some urgent packets in smart city applications such as informing a hospital about emergency cases occurred in a specific location needs fast packets delivery to the destination node, and giving this prioritize packet all permission in order to ensure high transmission ratio with low latency.To address this issue in big data smart cities, many scheduling algorithms have been proposed recently for big data smart cities.All of these algorithms focus on how to ensure high scheduling network efficiency and appropriate allocation of network resources.For example, scheduling algorithms such as Earliest deadline First (EDF) [34], or First Come First Served (FCFS) [35], use data packets for differentiation between priority and nonpriority packets [36],while other studies proposed algorithms that give the priority packets a higher permission for single node transmission that preempt packets with low priority [37].Quality of Service (QoS) approaches have been used extensively as scheduling methods in big data smart cities.In QoS approaches, three factors affect the priority packets transmission which are the type the transmission node (i.e., the source node), the type of data and the timeline constrains for transmitted packets which cause difficulties in traffic management for large packets transmission environment such as big data smart cities.In our paper, we try to simplify the class-based packets transmission in big data smart cities.In other words, we proposed high performance calss-based priority packets scheduling mechanism for emergency application of big data smart cities.The main contributions of this paper are the following:

    ?The proposed scheduling algorithm is class-based algorithm which enable the destination node to explore information about the source node data packets.The priority packets will be transmitted first based on a threshold factor for the packet deadline.We call our proposed mechanism as Priority Packet Deadline First (PPDF).Packets that their deadline are expired will be dropped from the network channels in order to achieve high efficiency of network resources and low transmission overhead.In smart cities, depending on a packet deadline threshold instead of the threshold of packet transition time will lead to better utilization on the network bandwidth.

    ?We take the advantages of using centralized communication scenario based on SDN controller to handle all the required transmission for priority packets to the final destination node.The main idea behind the SDN controller is SDN to enhance the delivery of priority packets and ignoring the nonpriority packets (reduce the number of packets transmitted to the destination node).In addition, SDN controller can reduce the power consumption for IoT nodes and hence enhancing the smart cities network lifetime.

    ?In the network module for the proposed PPDF as well as SDN techniques, we proposed three algorithms, that are the broadcasting data packets algorithm at source nodes, determining priority packets algorithm at SDN controllers, and scheduling/forwarding priority packets algorithm at SDN controllers.

    ?We compare our proposed PPDF scheduling algorithm with existing scheduling schemes used in big data smart cities in order to demonstrate how the proposed PPDF algorithm achieve high performance metrics in terms of average waiting time, priority packets loss rate, priority packets end-to-end delay and the average energy consumption.

    4 Priority Packet Deadline First (PPDF) with SDN Controller

    In the proposed PPDF algorithm, static nodes are distributed randomly in the sensing area.We have source nodes, intermediate nodes and master nodes (the SDN controllers).Three different types of data packets are generated by source nodes.First, high priority data packets, which are the packets need to be sent correctly (quickly) to the SDN controllers.These data packets preempt both medium priority data packets and nonpriority data packets.High priority data packets (level 1) such as packets that contains data about fire or emergency situations in a specific location.Second, medium priority data packets (level 2), which are the packets that can preempt the nonpriority data packets.These data packets need to be sent to the SDN controller in order to carry information about the network capabilities in the presence of the fire or the emergency location.Third, nonpriority data packets (level 3) which are the packets that have very long deadline, and they can be delivered to the SDN controller or not depending on the heavy traffics of the network.

    Named Data Networking (NDN) in IoT can use the main feature of broadcast scenario of data packets to the SDN controllers where the source nodes broadcast data packets to all their neighbors.These neighbor nodes or intermediate nodes forward data packets to the SDN controllers or provide them from their cash memories.Thus, the probability of correctly delivering the data packets based on broadcast scenario to the SDN controllers increased dramatically.Redundant data packets with different priority levels (i.e., level 1, 2 and 3) can be delivered to the SDN controllers, which take the responsibilities for data packets scheduling, and the access the Medium Access Control (MAC)channel in order to forward the data packets to the final destination nodes.

    4.1 The Network Model of PPDF Algorithm

    The network model of the proposed PPDF algorithm with SDN controller in shown in Fig.1.The green nodes represent the source nodes that detect the emergencies and send their level 1 data packets through the yellow intermediate nodes that broadcast the level 1 data packets to the red SDN controllers.The orange source nodes are the nodes that send the level 2 and level 3 data packets.Here,the intermediate nodes forward (broadcast) the receiving data packets in their broadcast ranges, so the redundantdata packets are delivered correctly to the SDN controllers (red nodes) in IoT environment.The SDN controllers organize the access to the control channel where the level 1 data packets with short deadline will be sent first to the destination nodes (blue nodes).The destination nodes represent the final destinations for the data packets delivery such as the hospitals or the police stations.

    Figure 1: Network model for the proposed PPDF algorithm with SDN controllers

    All nodes in the proposed network model have specific tables, and data packets are distributed into slots as shown in Fig.2.In this figure, the source nodes have the source structure which includes the Content of Data Packets (CDT), the Waiting Table (WT), the Forwarding Table (FT), and the Neighborhood Table (NhT), while the SDN controllers utilize controllers’structure which have the Network Table (NT) that contains the whole network information.This networks table includes the Routing Table (RT) to the destination nodes based on the shortest path algorithm (i.e., Dijkstra algorithm) and the Forwarding Table (FT_SDN).The data packets are divided into slots which contains information such as node ID number, SDN controller ID number, neighbor node ID number,content name, the deadline timer (i.e., our proposed threshold to distinguish between the three levels of data packets) and the energy threshold.

    Figure 2: Nodes’structure and data packet frames

    4.2 PPDF Algorithm Architecture

    Data packets will be broadcasted from the source nodes to the SDN controllers through the intermediate nodes in the proposed PPDF algorithm.The PPDF algorithm has four main architectures,which are explained in the following subsections.These four architectures include connecting source nodes with SDN controllers, access control mechanism, filtering data packets and forwarding data packets (see in Fig.3.

    Figure 3: Four architectures of the proposed PPDF algorithm

    4.2.1 Connecting Source Nodes with SDN Controllers

    The SDN controller sends its location information via broadcast messages (Discover_Packet)to all Source Nodes (SN) in the network.At SN, when the broadcast messages arrive correctly, the SN checks if the locations information of SDN controller didn’t store before in the Neighborhood Table (NhT), then the SN will update its own NhT and connect to the registered SDN (i.e., the SDN controller ID number).The information that is updated in NhT include node ID number, SDN controller ID number, neighbor node ID number, content name, and the deadline timer.After that,the SC sends broadcast message (Registered_Packet) toward registered SDN controller.Therefore,intended SDN controller will pick up the Registered_Packet for further processing.Once the exact SDN controller receives the Registered_Packet, the Network Table (NT) which includes information about the whole network nodes will be updated at the SDN controller (i.e., see in Algorithm 1).

    Now, the connection between the SDN controllers and the SN is discovered by Algorithm 1.The SDN controller will take the responsibility to manage data packet transmission to the final destinations.Once the data packets (i.e., packets indicate emergency situations that are occurred in specific locations) arrive to the SDN controllers, they will be processed by entering three main stages,which are the filtering data packets access control, and forwarding data packets.

    Algorithm 1: Broadcasting Data Packets Algorithm at Source Nodes to Build Connection Input: Source Nodes (S), SDN Controllers (SC)Output: Update Network Table (NT) at SDN Controllers 1.SC.SendBroadcast (Discover_Packet)2.if BP_Packet.NotStored.in.S( )3.Connect_S_To_SC ( )4.Update_ NhT ( )5.S.SendBroadcast (Registered_Packet)6.do 7.SC_Update_NT ( )8.while (Registered_Packet received by SC)9.else 10.S.Drop (Discover_Packet)11.end if

    4.2.2 Access Control Mechanism

    In the access control mechanism, the source node distinguishes between data packets based on their types.As mentioned earlier, there are three different types of data packets with various priorities(i.e., level 1, 2 and 3 priority data packets).Once the source node has data packet needs to be sent to the SDN controller and the conditional access control will check the frames of the data packet.The deadline timer in the packet frame will be checked in order to compare the priorities of various data packets of the source node or the neighbor nodes which are located in its range.Every source node can send data packets and access to the control channel through three different types of access channels.Therefore, queue 1 (Q1) will handle the level 1 data packets that have the highest priorities, queue 2(Q2) will handle the level 2 data packets that have the medium priorities, and queue 3 (Q3) will handle the level 3 data packets that have the lowest priorities.

    Thus, data packets will be stored in the control channel based on the deadline timer (i.e., data packets with shortest deadline first access to the control channel).In Fig.4, two source nodes have different data packets that have various priority levels.The figure shows how the data packets with shortest deadline enter the access channel and located in the front of the queue for two source nodes located in the same transmission range.

    Figure 4: Two source nodes in the same transmission range access to the control channel and how to priorities the data packet in the channel queue

    4.2.3 Filtering Data Packets

    In filtering data packets architecture, data packets need to be sent to the final destination must be compared based on their deadline which is the threshold that determine which packets can access to the communication channel.In this proposed PPDF algorithm, there are two scenarios for the data packets that compete to access two the communication channel (see in Algorithm 2).

    First scenario, multiple source nodes have multiple data packets compete to access to the communication channel which have the same priority.In filtering data packets architecture, suppose the packets priorities are denoted aspr1=pr2=pr3= ...prk; wherepr1is the priority for the first data packet needs to be accessed to the communication channel.Then,deadl1,deadl2,deadl3...deadlkmust be compared;deadl1is the deadline timer for the first data packet need to be accessed to the communication channel.If the nodexhas a data packet with deadline timer which is lower than the threshold levelt, then this packet is level 1 emergency packet..ifdeadl1=deadl2=deadl3= ...deadlk,then the control channel will pick up any level 1 data packet from nodes 1, 2, 3, orkto access to the communication channel because all of their packets are level 1 data packets with the same priority.

    Second scenario: multiple source nodes have multiple data packets compete to access to the communication channel which have different priorities.Suppose that aspr1<pr2<pr3<...prk, that is the data packets for the node 1 has lower priority than the data packet of node 2.Here, we compare the deadline for these data packets wheredeadl1<deadl2<deadl3<...deadlk, then the packet which has the lowest deadline timer among nodes will be picked to be entered in the front of the communication channel.(i.e.,S1<tcompared withSk<t; whereSis the source node andtis the threshold level).

    Now, either scenario filters the data packet need to be entered the communication channel.Time Division Multiple Access (TDMA) MAC protocol are utilized to push the filtered data packets into the communication channel in order to deliver these priority packets to the SDN controller for further processing.Once the SDN controllers receive the data packets, they will follow the shortest path algorithm in order to deliver the data packets to the final destinations as we will explained in the forwarding subsection (i.e., Subsection 4.2.4).

    Algorithm 2: Filtering Data Packets Input: Connected Source Nodes (S) with SDN Controllers (SC)Output: Filtering Data Packets based on Priorities 1.S.Send (Data_Packet)2.if (Data_Packet==1)3.call.First_Scenario ( )4.call.TDMA (Data_Packet)5.SC.Receive (Data_Packet)6.else 7.call.Second_Scenario ( )8.call.TDMA (Data_Packet)9.SC.Receive (Data_Packet)10.end 11.call.First_Scenario ( )12.for i=1 to k 13.if ( pri=prk)14.check(deadli)15.if (deadli=deallk)16.Randomly select Data_Packet 17.if (deadli≤t1)18.Put (Data_Packet=Q1)19.else if (t1<deadli<t2)20.Put (Data_Packet=Q2)21.else 22.Put (Data_Packet=Q3)23.end if 24.end if 25.end if 26.end for 27.Return_to_line 4 28.call.Second_Scenario ( )29.for i=1 to k 30.if ( pri≤prk)31.check(deadli)32.if (deadli≤deallk)33.select Data_Packet i 34.if (deadli≤t1)35.Put (Data_Packet=Q1)36.else if (t1<deadli<t2)37.Put (Data_Packet=Q2)38.else 39.Put (Data_Packet=Q3)40.end if 41.end if(Continued)

    42.end if 43.end for 44.Return_to_line 8

    4.2.4 Forwarding Data Packets

    After completing the connection between the source nodes and the SDN controller, and perpetrating the access control stage with distinguishing between priority and nonpriority data packets, data packets will follow TDMA MAC protocol in order to be delivered to the SDN controllers.Once the data packets arrived to the corresponding SDN controller, the SDN controller will check the NT table for matching with the received data packets.If the match is applicable, then the SDN controller will follow the Dijkstra shortest path algorithm in order to deliver the data packets to the final destination.If the match is inapplicable, then the data packets will be dropped.Hence, the redundancy of data packets will be reduced as well as saved the network resources.In addition, in our PPDF algorithm,we also use the energy threshold level (El) (i.e., nodes with remaining energy level which are greater than 20%) in order to determine which nodes can be selected as members in the shortest path between the SDN controllers and the final destinations.We assumed 20% as the threshold level of the remaining energy.However, it can be tuned as required by the network designer (See in Algorithm 3).

    Algorithm 3: Forwarding Data Packets Input: Connected Source Nodes (S) with SDN Controllers (SC)Output: Forwarding Data Packets to Final Destination 1.SC.Receive (Data_Packet)2.SC.check (NT)3.for Data_Packet=1 to j 4.if (Data_Packet=NT)5.if (El>20% )6.SC.Compute_Dijkstra_Algorithm ( )7.if (Dijkstra_calculated)8.SC.send_to_Destination (Data_Packet)9.else 10.SC.Drop (Data_Packet)11.else 12.SC.Drop (Data_Packet)13.else 14.SC.Drop (Data_Packet)15.end if 16.end if 17.end if 18.end for

    5 Simulation Results and Performance Analysis

    In this section, we conduct the simulation results to evaluate our proposed PPDF algorithm in comparison with similar algorithms utilized in big data smart cities of IoT.The proposed PPDF algorithm is compared with Dynamic Multilevel Priority packet scheduling algorithm (DMP) [38],normal NDN flooding mechanism in IoT (NDN_Flooding), and First-Come, First-Served (FCFS)algorithm [35] in terms of average waiting time, packet loss rate, end-to-end delay and average energy consumption.Based on NS2 simulator, we conduct a scenario where priority packets are needed to be sent to the final destination (hospital) in order to request an imbalance for cars accident located in specific location in a geographical area of IoT.Twenty source nodes, which are located in coverage area of the cars’accident, send level 1 (high priority data packets) through the intermediate nodes to be delivered to the closest SDN controller using TDMA MAC protocol.The corresponding SDN controller sends the received priority packets to the hospital which is located far away in the geographical area.The SDN controller follows the proposed PPDF algorithm for the priority data packets transmission.In the simulation, the normal data packets (level 2 and 3) are generated every 10 min randomly, but the level 1 data packets are sent once the cars accidents are occurred in the sensing area.The simulation settings are demonstrated in Tab.1.

    Table 1: Simulation parameters

    For the first performance metric (i.e., the average waiting time), the simulation results show that when generating various data packets from source nodes with different transmission rate, the network conditions can ensure different data packets transmission to the SDN controllers and then to the final destination node without collisions that consume network resources.In other words, the simulation network model can be tuned from sending high priority data packets to low priority data packets easily.Fig.5 illustrates the average waiting time for the proposed PPDF algorithm against DMP,NDN_flooding and FCFS algorithms.The figure shows how the average waiting time can increase when increasing the packets sizes.The figure also demonstrates that the data packets with priority level 1 (i.e., Fig.5a) has lower average waiting time than the data packets with priority level 2 and 3 (i.e.,Figs.5a and 5b).Thus, the level 1 data packets are delivered to the destination nodes faster than the level 2 and 3 data packets due to the fact that the competition to access to the communication channel is depended on the shortest deadline first.In addition, the proposed PPDF algorithm outperforms the existing DMP, NDN_flooding, and FCFS algorithms in term of the average waiting time.The normal flooding NDN algorithm has longer waiting time and packets are competed difficulty to access to the communication channel.

    Figure 5: Average waiting time.(a) Level 1 data packets, (b) Level 2 data packets, (c) Level 3 data packets

    For the second performance metric (i.e., packets loss rate), Fig.2a illustrates how the level 1 data packets loss rate increase slowly when increasing the packets sizes.However, in the proposed PPDF, the packet loss rate is not obvious as it can reach 6.80% when the packet length is 1000 byte.It is followed by the DMP and FCFS algorithms while the NDN flooding algorithm has the highest packets loss rate(i.e., around 40.10% when the packet size is 1000 byte).In addition, Figs.6b and 6c still demonstrate that the proposed PPDF algorithm outperforms the existing algorithms, and has lower packets loss rates for both the level 2 and 3 data packets.Also, increasing the packet lengths causes increasing in the packets loss rates gradually.The network conditions in FCFS algorithm have an affect on the packets retransmission due to the collision possibilities.Packets access to the communication channel suffer from the MAC layer collision which means that the packets will be dropped before they are arrived to the final destinations.The same scenario is occurred in DMP algorithm, that is when the communication channel solves the collision to handle packets transmission, the data packets will be dropped before arriving to the final destinations due to the deadline expiration possibilities.In normal NDN flooding algorithms, packets loss rates are high due to both collision and inefficient MAC protocol that flood the network with heavy traffic without distinguishing between high and low priority packets.Thus, from previous figures, we can conclude that in PPDF algorithm the average waiting time for our proposed algorithm is low in comparison with the existing algorithms, so the packet loss rate will be low too due to that fact that data packets will be arrived to the final destination(the hospital) before the deadline expiration.Even if the data packets with priority level 2 and 3, the proposed PPDF still has high efficiency packets loss rates which make this algorithm is the right choice for scheduling in heavy traffic IoT environment.

    Figure 6: Packets loss rate: (a) Level 1 data packets, (b) Level 2 data packets, (c) Level 3 data packets

    For the third performance metric (i.e., end-to-end delay), Fig.7a illustrates how the end-toend delay of the proposed PPDF algorithm is low in comparison with the other algorithms.When the packet length is short, the PPDF algorithm has almost the same end-to-end delay of the DMP algorithm.Around 5.3 ms is the end-to-end delay for the proposed PPDF when the packet length is 200 bytes.This delay increased to 17.6 when the packet size is 1000 bytes.The DPM algorithm has 6.2 ms end-to-end delay for when the packet length is 200 bytes, while it has 30.6 end-to-end delay when the packet size is 1000 bytes.In DPM algorithm, the TDMA is the MAC protocol that seems suitable for scheduling access to the communication channel when the packet length is short.However,when increasing the packet size, the time frame for packets scheduling will be increased too resulting in increasing the end-to-end delay.Figs.7b and 7c show that the proposed PPDF algorithm still allocate network resources for level 2 and 3 data packets.

    Figure 7: End-to-end delay.(a) Level 1 data packets, (b) Level 2 data packets, (c) Level 3 data packets

    For the fourth performance metric (i.e., energy consumption), Fig.8 illustrates how the energy level for the proposed PPDF outperform the existing algorithms due to the fact that every node has its own energy threshold that control the selection of intermediate nodes which involve in the transmission processes.The figure shows that the energy consumption will be decreased when increasing the number of SDN controllers as they considered to be the master nodes with high features for packets transmission.The highest number for SDN controllers in our simulation is 50 controllers.When the SDN controller is 50, the energy consumption for the proposed PPDF algorithm is 4 joules, while the energy consumption for the DMP algorithm, FCFS algorithm and NDN_flooding algorithm are 6,10 and 22 joules, respectively.Thus, the highest energy preserving algorithm is the proposed PPDF algorithm followed by DMP algorithm, FCFS algorithm and NDN_flooding algorithm respectively.

    Figure 8: Energy consumption (joules)

    6 Conclusion

    In this paper, the researchers proposed PPDF scheduling algorithm for emergency applications of big data smart cities.The proposed PPDF preserves network resources via transferring the priority information between source nodes and destinations.Source nodes with high priority data packets, that represent emergency situations indications, will be delivered through high priority communication channels, while packets with low priority information will be delivered through low priority data channels.Nodes compete to access to the communication channel by using TDMA MAC protocol in the transmission path between the source nodes and the SDN controllers.However, packets follow the earliest deadline first in the transmission path between the SDN controllers and the destination nodes.In our paper, the authors proposed four architectures for the PPDF algorithm which are connecting the source nodes with SDN controllers, the access control mechanism, determining priority packets stage and forwarding process.The proposed PPDF algorithm is compared with existing well known algorithms used in big data smart cities, and the simulation results shows how our proposed algorithm has high performance efficiency in terms of the average waiting time, the packet loss rate, the end-toend delay and the energy consumption.In the future work, we will increase the flexibility of the PPDF algorithm via increasing the number of static nodes and adding mobile nodes in the network model.More simulation performance metrics can be measured with mobile nodes which are moving from one location to another to be closed to the SDN controllers.

    Acknowledgement:We deeply acknowledge Taif University for supporting this study through Taif University Researchers Supporting Project Number (TURSP-2020/150), Taif University, Taif, Saudi Arabia.

    Funding Statement:This study is supported through Taif University Researchers Supporting Project Number (TURSP-2020/150), Taif University, Taif, Saudi Arabia.

    Conflicts of Interest:The author declare that he has no conflicts of interest to report regarding the present study.

    国产在线男女| 大香蕉97超碰在线| av在线app专区| 尾随美女入室| 日韩人妻高清精品专区| 一边亲一边摸免费视频| 免费观看的影片在线观看| 久久精品国产亚洲网站| 久久婷婷青草| 久久热精品热| 黑人猛操日本美女一级片| 最后的刺客免费高清国语| 九九爱精品视频在线观看| 国产精品99久久久久久久久| 深夜a级毛片| 亚洲欧洲精品一区二区精品久久久 | 日本av免费视频播放| 国国产精品蜜臀av免费| 少妇猛男粗大的猛烈进出视频| 国产片特级美女逼逼视频| 涩涩av久久男人的天堂| 欧美日韩一区二区视频在线观看视频在线| 黑人高潮一二区| 亚洲欧美日韩卡通动漫| 亚洲精品一区蜜桃| 一级毛片黄色毛片免费观看视频| 国产一区亚洲一区在线观看| 免费观看的影片在线观看| 精品人妻一区二区三区麻豆| 大话2 男鬼变身卡| √禁漫天堂资源中文www| 国内精品宾馆在线| 男女无遮挡免费网站观看| 亚洲电影在线观看av| 极品人妻少妇av视频| 亚洲色图综合在线观看| 三上悠亚av全集在线观看 | 王馨瑶露胸无遮挡在线观看| 丁香六月天网| 大话2 男鬼变身卡| 丰满乱子伦码专区| 久久精品久久久久久久性| 久久毛片免费看一区二区三区| 两个人的视频大全免费| 欧美精品国产亚洲| 久久精品夜色国产| 色5月婷婷丁香| 亚洲精品久久久久久婷婷小说| 97在线视频观看| 成年人午夜在线观看视频| 国产成人精品一,二区| 夜夜看夜夜爽夜夜摸| 桃花免费在线播放| 亚洲va在线va天堂va国产| 精品人妻一区二区三区麻豆| 国产女主播在线喷水免费视频网站| 爱豆传媒免费全集在线观看| 欧美精品亚洲一区二区| 午夜福利,免费看| 免费人妻精品一区二区三区视频| 日韩成人av中文字幕在线观看| 天堂俺去俺来也www色官网| 国产成人午夜福利电影在线观看| 亚洲精品久久久久久婷婷小说| 日韩强制内射视频| 久热久热在线精品观看| 波野结衣二区三区在线| 黑人高潮一二区| 五月天丁香电影| 美女中出高潮动态图| 国产免费一级a男人的天堂| 大码成人一级视频| 国产精品一区www在线观看| 国产欧美日韩精品一区二区| 亚洲激情五月婷婷啪啪| 日本爱情动作片www.在线观看| 婷婷色av中文字幕| 看十八女毛片水多多多| 亚洲国产欧美在线一区| 下体分泌物呈黄色| 人妻一区二区av| 欧美亚洲 丝袜 人妻 在线| 一级二级三级毛片免费看| a级毛色黄片| 高清视频免费观看一区二区| 这个男人来自地球电影免费观看 | 一本一本综合久久| 色婷婷久久久亚洲欧美| 99热6这里只有精品| 免费看日本二区| 在线观看人妻少妇| 精品一品国产午夜福利视频| 色5月婷婷丁香| 熟女电影av网| 2022亚洲国产成人精品| 日韩不卡一区二区三区视频在线| 中文精品一卡2卡3卡4更新| 狂野欧美激情性xxxx在线观看| 国产精品久久久久久av不卡| 蜜桃久久精品国产亚洲av| 欧美最新免费一区二区三区| 丰满人妻一区二区三区视频av| 99久久精品国产国产毛片| 成人美女网站在线观看视频| 久久99精品国语久久久| 热re99久久国产66热| 丁香六月天网| 只有这里有精品99| 最后的刺客免费高清国语| 久久国产精品男人的天堂亚洲 | av福利片在线观看| 一本色道久久久久久精品综合| 热99国产精品久久久久久7| 日韩电影二区| 国产黄色免费在线视频| 美女福利国产在线| h视频一区二区三区| 亚洲精品亚洲一区二区| 啦啦啦视频在线资源免费观看| 内地一区二区视频在线| 国产av精品麻豆| 在线观看三级黄色| 热re99久久精品国产66热6| 日本黄色日本黄色录像| 五月玫瑰六月丁香| 日韩一区二区三区影片| 欧美最新免费一区二区三区| 精品久久久久久久久av| 亚洲av不卡在线观看| 亚洲av二区三区四区| 中国三级夫妇交换| 国产黄色视频一区二区在线观看| 岛国毛片在线播放| 五月玫瑰六月丁香| 女的被弄到高潮叫床怎么办| 大话2 男鬼变身卡| av国产精品久久久久影院| 国产深夜福利视频在线观看| 老司机影院毛片| 亚洲自偷自拍三级| 特大巨黑吊av在线直播| 久久99一区二区三区| 欧美国产精品一级二级三级 | 亚洲怡红院男人天堂| 春色校园在线视频观看| 欧美老熟妇乱子伦牲交| 精品久久久久久久久亚洲| 精品卡一卡二卡四卡免费| 在线观看一区二区三区激情| 在线观看人妻少妇| 久久久亚洲精品成人影院| 欧美日韩视频高清一区二区三区二| 一级av片app| 国产精品一区二区在线观看99| 国产成人精品婷婷| 亚洲国产成人一精品久久久| 两个人的视频大全免费| 一级毛片久久久久久久久女| 丝瓜视频免费看黄片| 欧美xxⅹ黑人| 久久人人爽av亚洲精品天堂| 国产亚洲av片在线观看秒播厂| 久久人妻熟女aⅴ| 欧美国产精品一级二级三级 | 五月玫瑰六月丁香| 欧美成人精品欧美一级黄| 黑丝袜美女国产一区| 久久人人爽人人爽人人片va| 99热这里只有精品一区| 91午夜精品亚洲一区二区三区| 一级毛片久久久久久久久女| 国产精品一二三区在线看| 国产在线视频一区二区| 中文精品一卡2卡3卡4更新| 另类精品久久| 寂寞人妻少妇视频99o| 亚洲情色 制服丝袜| 欧美成人午夜免费资源| 亚洲精品久久久久久婷婷小说| 人人妻人人添人人爽欧美一区卜| 久久久久久久精品精品| 少妇人妻 视频| 日日爽夜夜爽网站| 午夜激情福利司机影院| 亚洲av成人精品一区久久| 女人久久www免费人成看片| 少妇丰满av| 啦啦啦视频在线资源免费观看| 中文字幕制服av| 大香蕉久久网| 22中文网久久字幕| 成人国产麻豆网| 一级二级三级毛片免费看| 国产免费一区二区三区四区乱码| 久久精品久久久久久久性| 大又大粗又爽又黄少妇毛片口| 午夜福利在线观看免费完整高清在| 国产视频首页在线观看| 欧美成人午夜免费资源| 中文欧美无线码| 国产在视频线精品| 亚洲国产日韩一区二区| 亚洲精品国产色婷婷电影| 自线自在国产av| 日韩人妻高清精品专区| 精品卡一卡二卡四卡免费| av视频免费观看在线观看| 久久精品久久久久久噜噜老黄| 女性被躁到高潮视频| 久久久久久久久久成人| 男女边吃奶边做爰视频| av黄色大香蕉| 国产真实伦视频高清在线观看| 黄色毛片三级朝国网站 | 久久久久久伊人网av| 在线免费观看不下载黄p国产| 国产精品一区二区三区四区免费观看| 欧美少妇被猛烈插入视频| 国产91av在线免费观看| 亚洲第一区二区三区不卡| 搡女人真爽免费视频火全软件| 亚洲国产精品999| 久久久久久久久久成人| 一区二区三区精品91| 王馨瑶露胸无遮挡在线观看| 不卡视频在线观看欧美| 国产视频首页在线观看| 免费人成在线观看视频色| 最黄视频免费看| 男人爽女人下面视频在线观看| 欧美激情极品国产一区二区三区 | 亚洲一区二区三区欧美精品| 午夜老司机福利剧场| kizo精华| √禁漫天堂资源中文www| 亚洲精品乱码久久久v下载方式| 男人舔奶头视频| 精品国产国语对白av| kizo精华| 日韩av免费高清视频| 少妇 在线观看| tube8黄色片| 看十八女毛片水多多多| 欧美bdsm另类| 一级黄片播放器| 肉色欧美久久久久久久蜜桃| 毛片一级片免费看久久久久| 欧美+日韩+精品| 一级片'在线观看视频| 亚洲av不卡在线观看| 男女边摸边吃奶| 国产在视频线精品| 老司机影院毛片| 国产综合精华液| 久久国产精品男人的天堂亚洲 | 一区二区三区精品91| 大香蕉97超碰在线| 欧美区成人在线视频| 一级毛片久久久久久久久女| 国产又色又爽无遮挡免| 少妇的逼好多水| 免费黄网站久久成人精品| 亚洲精品自拍成人| 成年人午夜在线观看视频| 免费av不卡在线播放| 中国国产av一级| 国产色爽女视频免费观看| 免费人妻精品一区二区三区视频| 亚洲人与动物交配视频| 成人毛片a级毛片在线播放| 99九九在线精品视频 | 丰满少妇做爰视频| 岛国毛片在线播放| 久久精品久久精品一区二区三区| 国产伦在线观看视频一区| 午夜久久久在线观看| 新久久久久国产一级毛片| 哪个播放器可以免费观看大片| 国产精品99久久99久久久不卡 | 亚洲自偷自拍三级| 免费黄频网站在线观看国产| 精品久久久久久电影网| 亚洲人成网站在线播| av在线观看视频网站免费| 国产精品久久久久久精品电影小说| 日韩熟女老妇一区二区性免费视频| 一级二级三级毛片免费看| 成年女人在线观看亚洲视频| 精品午夜福利在线看| 99热这里只有精品一区| 观看av在线不卡| 少妇人妻精品综合一区二区| 永久网站在线| 亚洲四区av| 黄色日韩在线| 亚洲久久久国产精品| 一区在线观看完整版| 韩国av在线不卡| 在线看a的网站| 美女内射精品一级片tv| kizo精华| 大片电影免费在线观看免费| tube8黄色片| 国产伦精品一区二区三区视频9| 色视频www国产| 亚洲精品aⅴ在线观看| av国产久精品久网站免费入址| 中文资源天堂在线| 亚洲内射少妇av| 又黄又爽又刺激的免费视频.| 少妇人妻一区二区三区视频| 欧美xxxx性猛交bbbb| 人妻夜夜爽99麻豆av| 国产免费视频播放在线视频| 亚洲欧美日韩东京热| 美女xxoo啪啪120秒动态图| 精品视频人人做人人爽| 一边亲一边摸免费视频| 久久精品熟女亚洲av麻豆精品| 亚洲av.av天堂| 亚洲不卡免费看| 精品久久久久久久久亚洲| 欧美3d第一页| 一区在线观看完整版| 韩国高清视频一区二区三区| 天天躁夜夜躁狠狠久久av| av不卡在线播放| 免费av不卡在线播放| 啦啦啦视频在线资源免费观看| 欧美+日韩+精品| 亚洲国产精品一区三区| 欧美+日韩+精品| 青春草亚洲视频在线观看| 日韩一区二区视频免费看| 黑人高潮一二区| 日本91视频免费播放| 国产精品秋霞免费鲁丝片| 美女视频免费永久观看网站| 久久国产乱子免费精品| 如何舔出高潮| 深夜a级毛片| 在线观看www视频免费| 亚洲精品亚洲一区二区| 国产日韩欧美视频二区| 亚洲欧美精品专区久久| 在线观看www视频免费| av在线观看视频网站免费| 99热6这里只有精品| 亚洲精品乱码久久久久久按摩| av女优亚洲男人天堂| 在线看a的网站| 2021少妇久久久久久久久久久| 久久久久久久久久人人人人人人| 好男人视频免费观看在线| h日本视频在线播放| 高清不卡的av网站| 五月开心婷婷网| 精品少妇久久久久久888优播| 久久亚洲国产成人精品v| 91久久精品国产一区二区三区| 在线观看免费视频网站a站| 2018国产大陆天天弄谢| 精品一品国产午夜福利视频| 久久久精品94久久精品| 在线播放无遮挡| 在线观看国产h片| 少妇被粗大的猛进出69影院 | 久久99一区二区三区| 色婷婷久久久亚洲欧美| 在线观看av片永久免费下载| 久久精品夜色国产| 久久99蜜桃精品久久| 啦啦啦啦在线视频资源| 如日韩欧美国产精品一区二区三区 | 国产在视频线精品| 亚洲国产精品一区二区三区在线| 国产片特级美女逼逼视频| 国产女主播在线喷水免费视频网站| 国产片特级美女逼逼视频| 国产女主播在线喷水免费视频网站| 亚洲精品日本国产第一区| 男女免费视频国产| av女优亚洲男人天堂| 免费观看在线日韩| 免费大片18禁| 极品少妇高潮喷水抽搐| 街头女战士在线观看网站| 高清不卡的av网站| 欧美变态另类bdsm刘玥| 哪个播放器可以免费观看大片| 亚洲婷婷狠狠爱综合网| 国产精品偷伦视频观看了| 日韩av不卡免费在线播放| 能在线免费看毛片的网站| 欧美变态另类bdsm刘玥| 日韩大片免费观看网站| 免费黄色在线免费观看| 久久国产精品大桥未久av | 人人妻人人看人人澡| 久久久久视频综合| 婷婷色av中文字幕| 精品熟女少妇av免费看| 人人妻人人添人人爽欧美一区卜| 欧美精品高潮呻吟av久久| 日本色播在线视频| 五月天丁香电影| 久久久国产精品麻豆| 99九九线精品视频在线观看视频| 一级爰片在线观看| 观看av在线不卡| 欧美xxxx性猛交bbbb| 国产熟女欧美一区二区| 免费大片18禁| 国产淫语在线视频| 又大又黄又爽视频免费| 久久人人爽人人片av| 亚洲电影在线观看av| 久久 成人 亚洲| 亚洲精华国产精华液的使用体验| 亚洲欧洲日产国产| 欧美人与善性xxx| 久久99热这里只频精品6学生| 五月开心婷婷网| 日韩欧美精品免费久久| 你懂的网址亚洲精品在线观看| 老司机亚洲免费影院| 久久免费观看电影| 婷婷色av中文字幕| 少妇人妻久久综合中文| 精品久久久噜噜| 免费久久久久久久精品成人欧美视频 | a级毛片免费高清观看在线播放| 欧美老熟妇乱子伦牲交| 国产成人免费无遮挡视频| 亚洲中文av在线| 六月丁香七月| 我的老师免费观看完整版| 少妇人妻精品综合一区二区| 日本色播在线视频| videos熟女内射| 2018国产大陆天天弄谢| 高清视频免费观看一区二区| 精品卡一卡二卡四卡免费| 天堂中文最新版在线下载| 日韩 亚洲 欧美在线| 亚洲真实伦在线观看| 一级av片app| 日本wwww免费看| 国产日韩欧美在线精品| 在线观看国产h片| 亚洲人成网站在线观看播放| 少妇人妻久久综合中文| 亚洲四区av| 免费大片黄手机在线观看| 亚洲高清免费不卡视频| 边亲边吃奶的免费视频| 韩国高清视频一区二区三区| 精品国产一区二区久久| 美女中出高潮动态图| 国产精品一区二区在线不卡| 久久鲁丝午夜福利片| 久久久国产一区二区| 夜夜爽夜夜爽视频| 欧美国产精品一级二级三级 | 日韩av免费高清视频| 国产伦理片在线播放av一区| 91精品伊人久久大香线蕉| 欧美三级亚洲精品| 人妻系列 视频| 日本午夜av视频| 十八禁高潮呻吟视频 | 日本黄色日本黄色录像| 午夜福利影视在线免费观看| 亚洲av中文av极速乱| 婷婷色av中文字幕| 国产熟女午夜一区二区三区 | 国产精品一区二区在线观看99| 亚洲精品久久午夜乱码| 少妇的逼水好多| 国国产精品蜜臀av免费| 韩国高清视频一区二区三区| 精品人妻偷拍中文字幕| 下体分泌物呈黄色| 天天躁夜夜躁狠狠久久av| 老司机影院成人| 国产有黄有色有爽视频| 美女福利国产在线| 五月开心婷婷网| 美女福利国产在线| 国产高清不卡午夜福利| 人人妻人人添人人爽欧美一区卜| 亚洲第一av免费看| 亚洲av.av天堂| 在线亚洲精品国产二区图片欧美 | 一区二区av电影网| 如何舔出高潮| 亚洲熟女精品中文字幕| 91精品国产九色| 日本黄大片高清| 亚洲精品日本国产第一区| 亚洲电影在线观看av| 一本一本综合久久| 边亲边吃奶的免费视频| 高清欧美精品videossex| h日本视频在线播放| 校园人妻丝袜中文字幕| www.av在线官网国产| 久久 成人 亚洲| 女性生殖器流出的白浆| 丰满迷人的少妇在线观看| 国产又色又爽无遮挡免| 亚洲国产欧美在线一区| 一级爰片在线观看| 一级毛片 在线播放| 新久久久久国产一级毛片| 欧美精品一区二区免费开放| 51国产日韩欧美| 人妻夜夜爽99麻豆av| 色婷婷久久久亚洲欧美| 久久99一区二区三区| 免费在线观看成人毛片| 午夜av观看不卡| 亚洲国产精品国产精品| 最近最新中文字幕免费大全7| 99热这里只有精品一区| 日韩精品有码人妻一区| 久久久久久久大尺度免费视频| 自拍偷自拍亚洲精品老妇| 狂野欧美激情性bbbbbb| 在线观看av片永久免费下载| 国产精品一区www在线观看| 中文天堂在线官网| 乱系列少妇在线播放| 中文天堂在线官网| 熟女人妻精品中文字幕| 久久久亚洲精品成人影院| 精品人妻熟女av久视频| 日日啪夜夜撸| 十八禁高潮呻吟视频 | 国产伦在线观看视频一区| 美女cb高潮喷水在线观看| 日日啪夜夜撸| 观看免费一级毛片| 少妇裸体淫交视频免费看高清| 午夜福利在线观看免费完整高清在| 亚洲av综合色区一区| xxx大片免费视频| 欧美激情国产日韩精品一区| 日韩亚洲欧美综合| 日本午夜av视频| 日韩电影二区| 毛片一级片免费看久久久久| 亚洲av国产av综合av卡| 精品亚洲乱码少妇综合久久| 搡老乐熟女国产| 大陆偷拍与自拍| 国内精品宾馆在线| 欧美精品人与动牲交sv欧美| 下体分泌物呈黄色| 亚洲激情五月婷婷啪啪| 99热6这里只有精品| 国产真实伦视频高清在线观看| 国产视频内射| 国产精品国产三级专区第一集| 少妇人妻精品综合一区二区| 日韩一本色道免费dvd| 黄色视频在线播放观看不卡| 男女边摸边吃奶| 秋霞在线观看毛片| 亚洲精品日韩av片在线观看| 观看免费一级毛片| 亚洲精品国产色婷婷电影| 欧美+日韩+精品| 久久6这里有精品| 色94色欧美一区二区| 人妻人人澡人人爽人人| 永久网站在线| 人妻少妇偷人精品九色| 亚洲精品自拍成人| 在线观看www视频免费| 又大又黄又爽视频免费| 新久久久久国产一级毛片| 精品午夜福利在线看| 久久毛片免费看一区二区三区| 校园人妻丝袜中文字幕| av天堂中文字幕网| 成年人午夜在线观看视频| 汤姆久久久久久久影院中文字幕| 超碰97精品在线观看| 国产精品秋霞免费鲁丝片| 国产色婷婷99| 噜噜噜噜噜久久久久久91| 欧美三级亚洲精品| 久久久久久久国产电影| 久久久久人妻精品一区果冻| 亚洲av二区三区四区| 国产亚洲一区二区精品| 自拍欧美九色日韩亚洲蝌蚪91 | 高清欧美精品videossex| 精品久久久久久久久亚洲| 少妇的逼水好多| 99久久精品国产国产毛片| 日韩伦理黄色片| 91精品一卡2卡3卡4卡| 五月天丁香电影| 人妻夜夜爽99麻豆av| 99热这里只有精品一区| 国产日韩一区二区三区精品不卡 | 国产黄频视频在线观看| 男女无遮挡免费网站观看| 国模一区二区三区四区视频| 亚洲精品日韩av片在线观看| 赤兔流量卡办理| 我要看黄色一级片免费的| 又大又黄又爽视频免费|