• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Data Concurrent Transmission MAC Protocol for Application Oriented Underwater Acoustic Sensor Networks

    2022-10-27 04:49:20XiaoxiaoZhuoHongYangMeiyanLiuYanWeiGuandingYuFengzhongQu
    China Communications 2022年10期

    Xiaoxiao Zhuo,Hong Yang,Meiyan Liu,Yan Wei,Guanding Yu,Fengzhong Qu,*

    1 The Key Laboratory of Ocean Observation-Imaging Testbed of Zhejiang Province,Zhejiang University,Zhoushan 316021,China

    2 The Engineering Research Center of Oceanic Sensing Technology and Equipment,Ministry of Education,Zhejiang University,Zhoushan 316021,China

    3 The College of Information Science and Electronic Engineering,Zhejiang University,Hangzhou 310027,China

    *The corresponding author,email:jimqufz@zju.edu.cn

    Abstract: With the increasing demand for marine exploration,underwater acoustic sensor networks(UASNs)are prone to have the characteristics of largescale,long term monitoring,and high data traffic load.Underwater media access control(MAC)protocols,which allow multiple users to share the common medium fairly and efficiently,are essential for the performance of UASNs.However,the design of MAC protocols is confronted with the challenges of spatial unfairness,data eruption,and low energy efficiency.In this paper,we propose a novel data concurrent transmission(DCT)MAC protocol,which is able to exploit long propagation delay and conduct concurrent transmission.Specifically,we present the theoretical performance analysis of the proposed MAC protocol in detail and give an analytical solution of the success concurrent transmission probability between nodes.In addition,simulation results are provided to demonstrate that our proposed protocol is appropriate for UASNs and can significantly improve the performance in terms of network throughput and energy consumption.Finally,we give some typical future applications of UASNs and discuss the demands on MAC protocol design.

    Keywords:underwater acoustic sensor networks;MAC protocols;data concurrent transmission

    I.INTRODUCTION

    Over the past few years,humans have never stopped trying to explore the mysterious marine world,which leads to the increasing demand for advanced underwater communication networks.Since electromagnetic waves and light waves are greatly attenuated under sea,they might only be suitable for short-distance underwater information transmission[1–3].Sound waves have been envisioned as the most suitable paradigm for reliable long-distance communications under sea benefiting from its less propagation attenuation and longer transmission distance[4].

    Different from terrestrial radio wireless communications,underwater acoustic communications have some unique characteristics,such as low spread speed,high bit error rate,and narrow frequency band[5,6].With the development of acoustic modems over the past few years,current underwater acoustic communications can provide reliable links between smart underwater objects,such as underwater sensors,autonomous underwater helicopters(AUH),autonomous underwater vehicles(AUV),unmanned underwater vehicles(UUV),and surface buoys.Furthermore,these developments encourage the application of underwater acoustic sensor networks(UASNs),which can be widely used in marine environmental monitoring and disaster warning,submarine resource exploration,real-time control of underwater nodes,and military operational command[7–9].However,due to the sophisticated application demand onlarge-scale,longterm monitoring,and high data traffic load,establishing real-time Internet of underwater things(IoUT)based on UASNs is urgently needed[3,10,11].Media access control(MAC)protocols,which allow multiple users to share the common medium fairly and efficiently,are generally acknowledged as significant schemes for UASNs.As such,the notably expanded network poses new difficulties in the design of underwater MAC protocols,such as spatial unfairness,data eruption,and low energy efficiency.

    1)Spatial unfairness.To monitor large-scale underwater networks,UASNs are deemed to be sparse and partitioned,leading to different spatial distances among nodes.Propagation delays are proportional to the spatial distances.In some cases,the source node which is closer to the destination node has more opportunities to access the channel,resulting in spatial unfairness.Thus,it means that not only long propagation delays could not be omitted,but also the discrepancy of propagation delays should be taken into account when designing MAC protocols.Novel methods should be proposed to consider the effect of spatial unfairness.

    2)Data eruption.As UASNs expand,interoperability between nodes becomes ubiquitous,leading to a dramatic increase in data traffic load.Accordingly,the probability of packet collisions would increase.Thus,it is important to develop appropriate schemes to avoid packet collisions and increase network throughput,especially in the networks with high data traffic load.

    3)Low energy efficiency.Due to limited battery capacity and difficulty of battery refilling under sea,the energy consumption of underwater facilities are expected to be minimal.Especially,for large-scale underwater networks,nodes are far away from each other leading to excessive attenuation.These characteristics increase the transmission power burden on large scale underwater acoustic communications.Thus,when designing MAC protocol,reducing redundant packet transmissions is an imperative strategy to improve energy efficiency.

    Due to these unprecedented challenges and difficulties mentioned above,most existing MAC protocols are far from satisfactory to meet the performance requirement of UASNs with the characteristics of largescale,long term monitoring,and high data traffic load.Some existing protocols have poor performance due to low channel utilization or high packet collision rate leading to low throughput.Especially,the strategy of frequently sending and receiving control packets in some protocols is a major factor that cause low channel utilization and large energy consumption.

    To enhance the performance of UASNs,this paper proposes a MAC protocol named data concurrent transmission(DCT)protocol.This protocol provides an effective solution to solve these challenges mentioned above.It exploits inherent long propagation delay to carry out the concurrent transmission,which improves the channel efficiency and the network throughput.And it also allows different source nodes to transmit data packet concurrently with only once handshaking,which improves the energy efficiency.In addition,since nodes with different propagation delays could transmit packets concurrently,nodes with different distance could have more equal chances to access the channel.As a result,the spatial unfairness could be alleviated.Our proposed protocol has the following three advantages:1)reducing energy consumption by decreasing the number of handshakes;2)alleviating packet collisions and improving network throughput by making use of long propagation delay to transmit data packets concurrently;3)giving the analytical solution of the success probability of concurrent transmission between nodes,which has not been found in the existing literature.

    The rest of this paper is organized as follows.In Section II,we provide a comprehensive overview of existing underwater MAC protocols,with a special focus on dealing with challenges of spatial unfairness,data eruption,and low energy efficiency.We then elaborate the proposed DCT protocol in Section III and analyze the theoretical performance in detail in Section IV.Simulation results are presented and analyzed in Section V to show the performance improvement on network throughput,energy consumption,and end-to-end delay.Furthermore,we give some future applications for UASNs and discuss demands on the MAC protocol design in Section VI.Finally,we conclude the whole article in Section VII.

    II.OVERVIEW OF UNDERWATER MAC PROTOCOLS

    In the past years,various MAC protocols have been developed to improve the performance of UASNs.In this section,we provide an overview of MAC protocols from the perspective of their applications and techniques for handling the challenges mentioned above.Due to the limited bandwidth in underwater acoustic communications,code-division multiple access(CDMA)and frequency-division multiple access(FDMA)protocols are not suitable for large-scale and high data traffic load networks.Thus,here we mainly introduce time-division multiple access(TDMA)protocols.As listed in Table 1,we classify TDMA protocols into two categories,the direct access protocols and the reservation-based access protocols.

    2.1 Direct Access Protocols

    UW-Aloha protocol[12],a well-known direct access MAC protocol,enabled nodes to get access to the channel randomly.However,it could not solve spatial unfairness because it did not consider the difference in propagation delays.Moreover,the network throughput would significantly decrease in the scenario of high data traffic load due to increased collision probability.To reduce the collision probability,Slotted-Aloha protocol[13]took the strategy of deferring packet transmissions to the beginning of each time slot.In this way,this protocol can successfully avoid ongoing packets being interfered by a new attempt and therefore improve network throughput to some extent.Later,delay tolerant MAC(DTMAC)protocol[14]was put forward to overcome long propagation delays especially in high traffic scenario.It established a probability-based model for throughput to calculate the transmission probability and repeated transmission time.Without channel reservation and acknowledgment,the throughput of DTMAC would not be influenced by propagation delay.Furthermore,other protocols,such as delay-aware probability based MAC(DAP-MAC)protocol[15]and traffic-adaptive receiver-synchronized(TARS)underwater MAC protocol[16],suggested to conduct concurrent transmission by leveraging the long propagation delay.However,when the network traffic became heavy,they would have low channel utilization and high collision probability due to packet collisions caused by spatial uncertainty.In addition,to avoid packets collisions at receivers,the work in[17]derived collision probabilities of ALOHA-based protocols to calculate the annulus interference region.Then it proposed an optimal scheduling protocol for space-time coupling based periodical transmissions.This work provided a potential solution to avoid collisions in random access MAC protocols.

    Although direct access protocols have the advantage of low energy consumption because there are no extra reservation packets required,they generally suffer from severe packet collisions when the network traffic becomes enormously heavy.In addition,they have not considered the spatial unfairness resulting in packet collisions and unfair communication efficiency.

    2.2 Reservation-Based Access Protocols

    The reservation-based access mechanisms,such as handshaking and scheduling,were devised to address the problem of hidden terminal,exposed terminal,and spatial unfairness.Multiple access with collision avoidance(MACA)protocol[18]required a series of handshaking before each data transmission and only allowed one pair of nodes to transmit data packet after a successful handshaking.Although this protocol worked well in terrestrial radio networks,it still suffered from high collision probability due to long propagation delay in UASNs and high energy consumption resulting from frequent handshaking.To improve the handshaking efficiency and success probability,the MACA-like protocols such as MACA-MCP[19],MACA-MN[20],MACA-U[21],FI-MACA[22]were proposed.Besides,to eliminate packet collisions,Slotted-FAMA protocol[23]based on require-to-send(RTS)/clear-to-send(CTS)handshaking mechanism was developed,in which time was divided into several slots and packets could only be transmitted at the beginning of each slot.Although this strategy could avoid data packet collisions,its frequent handshaking between nodes not only greatly reduced network throughput,but also caused high energy consumption.Compared with Slotted-FAMA,multi-session FAMA(M-FAMA)[24]and Slotted-FAMA based protocol with data train called SFAMADT[25]allowed multiple sessions for different pairs,which could increase network throughput.

    Moreover,to compensate for long propagation delay,a series of scheduling mechanisms have been proposed in several literatures.The famous protocol named staggered TDMA underwater MAC protocol(STUMP)[26]collected the information of nodes’po-sitions and scheduled the neighbors’transmission to avoid packet collisions.To match the performance of an ideal STUMP,a series of transmit delay allocation MAC(TDA-MAC)[27–29]protocols were designed to improve the network throughput but without the need for clock synchronization.Besides,the delayaware opportunistic transmission scheduling(DOTS)MAC protocol[30]was implemented to reduce the collision probability as well.But if a node detected any conflict,it would resume its transmission after a random period of time.This incurred energy waste.Similarly,a dynamic channel negotiation MAC mechanism(DCN-MAC)[31]firstly applied channel negotiation by exchanging network information and then scheduled packets transmission based on dynamic single node wake-up.In the handshake-based ordered scheduling(HOSM)protocol[32],packet transmissions were well ordered and scheduled by receivers to reduce the number of control packets.Multiple source nodes were allowed to send data packets after only one reservation,which can effectively improve channel utilization and decrease the energy consumption.Furthermore,the DCO-MAC[33]proposed a hybrid MAC protocol with a receiver-based MAC protocol in heavy traffic load and contention-based MAC protocol in light traffic load.This strategy was implemented to improve the network throughput and decrease the end-to-end delay.The delay and queue aware adaptive scheduling-based medium access control(DQA-MAC)[34]protocol took three actions,adaptive scheduling transmission,reduction of handshaking packets,and concurrent transmission,to improve the network performance.In addition,some protocols[35–37]have been proposed to reduce the handshake overhead and allocate time slots ahead of time.They formulated collisions among nodes as the vertex coloring problem in a spatial-temporal conflict graph,which could highly improve the spatial reuse efficiency.

    Table 1.The categories and properties of MAC protocols in UASNs.

    In summary,the reservation access protocols can remarkably alleviate packet collisions.However,most protocols would take long time for reservation and thereby consume considerably more energy.

    Our proposed DCT protocol combines the advantage of handshaking protocols and scheduling protocols.It effectively takes advantage of long propagation delay and at the same time implements collision-free data concurrent transmission.In addition,with only once handshaking,two or more nodes could transmit data packets concurrently.Therefore network throughput of the proposed protocol will be increased and the energy consumption will be decreased.

    Figure 1.The operation of DCT protocol.

    III.DATA CONCURRENT TRANSMISSION(DCT)MAC PROTOCOL

    In this section,we first discuss the condition of data concurrent transmission to ensure that data packets from different nodes can be transmitted concurrently without packet collisions.Then the structure of DCT protocol is outlined followed by the elaboration of its two phases.

    3.1 Condition of Data Concurrent Transmission

    As shown in figure 1,the condition of data concurrent transmission is illustrated in DCT protocol.Source node 1 and source node 2 send DATA packets simultaneously at the beginning of time slot.It can be perceived that the propagation delay difference between source node 1 and source node 2 should be at least larger than the transmission time of a DATA packet.Under this condition,their DATA packets could be received one after another at the receiver without collisions.Therefore,the expression of data concurrent transmission condition is yielded,i.e.

    wheretiandtjmeans the propagation delay of source nodeiandjrespectively,tDATAstands for the transmission delay of a DATA packet,andtgis the guard time.

    When the propagation delays difference between two nodes satisfy the concurrent transmission condition,they can transmit data packets concurrently to the same destination node in the same time slot without collisions.In this way,not only can the propagation delay be effectively utilized to increase network throughput,but also the number of RTS/CTS handshaking packets can be reduced to further save energy.

    3.2 Overview of DCT MAC Protocol

    In our proposed DCT MAC protocol,the transmission process is divided into two phases.The first phase is to establish a delay table and a concurrent transmission table to meet the requirement of concurrent communications.And the second phase is to conduct collisionfree concurrent transmission based on RTS/CTS handshaking mechanism.The detailed procedures of DCT protocol are shown in figure 1,which will be explained in the following.

    It is worth noting that although DCT protocol is a handshaking based MAC protocol that divides time into multiple time slots,it is able to permit different nodes to send data packets concurrently at the same slot without any collisions.To achieve this goal,we should first find the corresponding concurrent transmission nodes for each node based on the propagation delay.Thus,a delay table is established to store the propagation delay between the source node and thedestination node,and then a concurrent transmission table is built for nodes satisfying the concurrent transmission condition based on the information stored in the delay table.

    Table 2.An example of delay table and concurrent transmission table.

    After the completion of these procedures,data transmission based on RTS/CTS handshaking starts.When the destination node receives RTS packets from different source nodes,it looks up the concurrent transmission table to see whether the other source nodes of RTS packets are in the concurrent transmission table of the earliest arriving source node(also called the handshaking node).If yes,the node will be specified as the concurrent transmission node of the handshaking node.Otherwise,the destination node would select a corresponding concurrent transmission node for the handshaking node from the concurrent transmission table.In the next time slot,the destination node will send CTS packet to inform both the handshaking node and concurrent transmission node to transmit DATA packet simultaneously.After the data packets are received,the destination node will send an acknowledgment(ACK)packet to notice the source node if they are successfully received.

    3.3 First Phase of DCT MAC Protocol

    3.3.1 Generate Delay Table

    In the first phase of the proposed DCT MAC protocol as depicted in figure 1,all nodes in the network send a short frame(SF),which includes its sending time,to the destination node.After receiving the SF,the destination node can calculate the propagation delaytibetween itself and each source node according to the sending timetsiand receiving timetri,i.e.ti=tri-tsi.The MAC address of the source node and its propagation delay is stored in the delay table by the destination node.An example of a delay table with 5 source nodes is presented in Table 2.Since the delay table only needs to be updated when the position of one node is changed,the first phase could be conducted once in a long time duration while the second phase should be implemented continuously.So for a long time duration in the network,the impact of time overhead of the first phase could be ignored.Furthermore,in the first phase,only sensor nodes need to transmit SF packets,and the central nodes do not need to respond with any packets.So the energy consumption is too low to make impact on the total energy consumption of the network.

    3.3.2 Generate Concurrent Transmission Table

    After getting the delay table,the destination node will compare the propagation delays of all source nodes.If the discrepancy between any two propagation delays is greater than the transmission delay of the data packet,the concurrent transmission condition is satisfied.In this case,the corresponding two nodes can transmit concurrently,and one of them will be stored in the table as the concurrent transmission node of the other.As an example depicted in figure 1,the source node 2 is the concurrent transmission node of the source node 1.The algorithm of generating concurrent transmission table is shown in Algorithm 1.The generated concurrent transmission table is displayed in Table 2.A source node and any of its concurrent transmission nodes stored in the Table 2 can send data packets concurrently in the same time slot.At this point,the first phase of communications is completed.

    3.4 Second Phase of DCT MAC Protocol

    3.4.1 Send RTS Packets and Select Concurrent Transmission Node

    Algorithm 1.Generate concurrent transmission table.1:if the SF packet is for this node then 2:calculate the propagation delay between this node and its source node 3:if this node receives more than one SF packet from different source node then 4: for node i∈the source nodes of the SF packets do 5: for node j∈the source nodes of the SF packets do 6: compare the propagation delays with each other 7: if satisfy the data concurrent transmission condition then 8: the two source nodes are the concurrent transmission node with each other,and store the MAC address of the concurrent transmission node in the concurrent transmission table 9: else 10: the two nodes are not the concurrent transmission node with each other 11: end if 12: end for 13: end for 14:else 15: the node has no concurrent transmission node 16:end if 17:else 18:drop the SF packet 19:end if

    When a node has data packets to send,it first sends an RTS packet to the destination node at the beginning of a time slot as shown in the second phase of figure 1.The node whose RTS packet first arriving at the destination node is considered as the handshaking node.In the same time slot,the destination node may receive other RTS packets from the remaining source nodes in the network.It will look up the concurrent transmission table to determine whether the other RTS sending nodes are the concurrent transmission nodes of the handshaking node.If the concurrent transmission nodes do exist,among them the one whose RTS packet arriving earlier would be selected as the corresponding concurrent transmission node of the handshaking node.Otherwise,the destination node will randomly select a concurrent transmission node from the concurrent transmission table,as displayed in the third column of the Table 2(b).The algorithm of selecting concurrent transmission node is given in Algorithm 2.Next,the destination node embeds the MAC address of the concurrent transmission node and handshaking node into the CTS packet and sends it at the beginning of the next time slot.The CTS frame is transmitted as probe to:1)inform the handshaking node to send data packet;2)inform the concurrent transmission node to send data packet;and 3)notify the other nodes in the network to back off for avoiding collisions.

    Algorithm 2.Select a concurrent transmission node.1:if the RTS packet arrives earliest then 2:its corresponding source node is the handshaking node and its MAC address is embedded in the CTS packet 3:else 4:for node i∈the source nodes of the RTS packets do 5: if node i is the concurrent transmission node of the handshaking node then 6: embed its MAC address in the CTS packet 7: else 8: if the concurrent transmission table of the source node is not empty then 9: find a concurrent transmission node for this handshaking node from the table and embed its address in the CTS packet 10: else 11: no concurrent transmission node 12: end if 13: end if 14:end for 15:end if

    3.4.2 Send Concurrent Transmission DATA Packets

    After receiving the CTS packet,the handshaking node sends DATA packet at the beginning of the next time slot.When the other nodes in the network receive this CTS packet,they will first judge whether their own MAC addresses match the MAC address of the concurrent transmission node embedded in the CTS packet.If the MAC address matches,the node will send DATA packet at the beginning of the next time slot.Note that the DATA packet sent by the concurrent transmission node are named as OTHERDATA packet in order to distinguish it from the DATA packet sent by the handshaking node to the same destination node.In this case shown in figure 1,since the propagation delay difference of source node 1 and source node 2 is larger than the DATA packet transmission delay,the OTHERDATA sent by the concurrent transmission node will be received by the destination node before the DATA packet arrives and they would not conflict with each other.However,if the node in the network is neither the destination node of the CTS packet nor the sending node,it will back off until ongoing transmission round is completed,like the source node 3 shown in figure 1.The algorithm of sending concurrent transmission DATA packets is shown in Algorithm 3.

    3.4.3 DATA and OTHERDATA Packets Receiving Confirmation

    After receiving OTHERDATA and DATA packets,the destination node sends an ACK or NACK packet at the beginning of the next time slot to inform the handshaking node whether the DATA packet has been successfully received.However,the concurrent transmission node cannot discover whether its transmitted OTHERDATA packet is successfully received.Therefore,in this protocol,we embed a flag in the ACK/NACK packet to make a judgment for the OTHERDATA packet.If the OTHERDATA packet has been successfully received,the concurrent transmission node will prepare for the next transmission task.Otherwise,it will keep the OTHERDATA packet and wait for the next retransmission.

    Figure 2.Network model.

    IV.APPROXIMATE PERFORMANCE ANALYSIS

    4.1 Analysis of the Network Throughput

    In this section,network throughput of the proposed DCT protocol is elaborated.To derive and evaluate the performance of network throughput,we consider a specific sensor network withNcentral networks in a set ofC={C1,...Cn,...,CN}as depicted in figure 2.Note that the DCT protocol could be applied not only in central networks,here we just take this type of network as an example.In this network,each central networkCncontains a central nodecn,Mnsensor nodesMn={c1n,...,cMnn}andIninterference nodesIn={c1n,...,cInn}.Sensor nodes collect data and then transmit data tocn,while interference nodes are in the communication range ofcnbut their central nodes are notcn.In the network model,we make some assumptions.First,the communication distance of all nodes is limited withind0.Second,the distance between any two central nodes is assumed to be larger than the communication range limitd0,which is reasonable in large-scale networks.In addition,the sensor nodes are randomly deployed in a circle according to the uniform distribution.The center of the circle is assumed to be nodecnand the radius isd0.Finally,the generation of data packets follows a Poisson distribution with averageλpackets per second.

    According to the flow model[38],the average channel utilization could be calculated as the ratio of data transmission time and total transmission time,which is

    Figure 3.Markov chain model for state of data transmission.

    To calculate above three time durations respectively,we define three data transmission statesSincluding the fail statef,the success states,and the idle statei.For any data transmission round,its current data transmission state only depends on its previous data transmission state,thus the process could be defined as a Markov chain depicted in figure 3.According to the property of Poisson distribution,we assume that the probability that one node has no data packet to transmit in a time durationtis

    Then in a central network containingMnsensor nodes,the number of nodes with no data packets to send follows binomial distribution,i.e.X~B(Mn,p(t)).Thus,the probability thatknodes have no data packets to send is

    In the idle state,all theMnnodes in one central network have no packets to send during the time duration of the last state.Thus,the probability of idle state in a time duration could be calculated as

    wheretimeans the time duration of the last stateS∈{i,s,f}.

    Specifically,the idle time duration contains only an idle time slot to wait for possible RTS packets,which is

    whereTis the time slot length,i.e.T=tCTS+d0/v+tg,tCTSis the CTS packet transmission time,vis the sound wave propagation speed,andtgis the guard time.Note that since the first phase of the protocol is only implemented when the position of one node is changed,so it only needs to be conducted once in a long time duration.In addition,in the first phase,only sensor nodes need to transmit SF packets,and the central nodes do not need to response with any packets.The time duration for one node to transmit a SF packet istSF+d0/v,which is roughly as long as a time slotT.The more the number of nodes is,the longer the time duration of the first phase is.For the worst case,all nodes send SF packets at different time slots.Then the total time duration of the first phase could be roughly calculated byMn(tSF+d0/v)=MnT,which is the same as several time duration of the time slot.However,for a long time duration in the network,the first phase is only implemented once after amount of rounds of the second phase.As a result,the time duration of the first phase could be roughly ignored in the whole communication process.

    In the success state,the second phase of the protocol could be processed successfully if there are packets to be sent during the time duration of the last state as well as RTS packets could be transmitted successfully.Then two cases would happen.Case(i)is that only one node transmits RTS packet and case(ii)is that two or more concurrent nodes transmit RTS packets.Then the successful probability of one central network containingMnsensor nodes andIninterference nodes could be expressed as

    wheretsis the time duration of the last state,Pcon(d)is the concurrent transmission probability of RTS packets,dis the transmission time of RTS packets,i.e.d=tRTSv,PIis the concurrent transmission probability of RTS packets for interference nodes,i.e.

    Lemma 1.The probability of concurrent transmission for two nodes randomly deployed in a circle could be given by

    where d is the distance that satisfies the concurrent condition,specifically here d is the distance between two nodes that achieve RTS packets concurrent transmission,i.e.d=tRTSv;d0is the maximum communication distance as well as the radius of the circle.

    Proof.Please refer to Appendix A.

    Then the success time duration contains two time slots to transmit RTS packet and CTS packet,and some time slots to transmit DATA packet and ACK packet,which could be calculated as

    whereTdatais the successful data packets transmission time containing the time from the start of a DATA packet to the successful reception of the ACK packet,soTdatacan be written as

    wheretdatais the number of slots occupied by the transmission of a DATA packet and could be calculated bytdata=「(tDATA+d0/v),tDATAis the DATA packet transmission time delay,tACKis the ACK packet transmission time slot,i.e.tACK=T,and thePeis the packet error rate withLbits per packet and bit error rateBER,and it can be calculated asPe=1-(1-BER)L≈L×BER[23][39].

    In the fail state,the central node fails to receive the RTS packet and needs to wait a RTS packet and a CTS packet transmission time slot before the new protocol process starts.The probability of data transmission in fail state is given by

    Then the fail time duration contains two time slots for the RTS packet transmission and the CTS packet transmission,which could be expressed as

    Based on the above formulation and the Markov chain depicted in figure 3,the state transition probability of the Markov chain could be expressed as

    According to(13)-(21),the steady-state probability matrix of the Markov chain could be calculated by(22)-(23),wherePi,Ps,andPfis the steady-state probability of idle state,success state,and fail state,respectively.

    Based on above,the busy time duration is the total time when data transmission state is in success state or fail state,which is

    Similarly,the idle time duration is

    In addition,the time duration for DATA packet transmission and OTHERDATA packet transmission could be expressed as

    Therefore,substituting(24),(25),and(26)into(2),the average channel utilization can be calculated as:

    Based on the above,the theoretical network throughput of DCT protocol,which means the number of bits of data packets that are successfully received per second,is given by

    whereRis the bit rate.From this equation,we can find that the theoretical network throughput of DCT protocol is determined byλ,N,Mn,d0,BER,L,R,tDATA,tCTS,andtRTS.

    4.2 Analysis of the Computational Complexity

    The computational complexity of the proposed DCT protocol consists of the generation of the delay table and the concurrent transmission table,the selection of the concurrent transmission node,and sending SF/RTS/CTS/DATA/ACK packets.Then in the proposed network model shown in figure 2,the worst case of computational complexity could be calculated as Θ(Nmax(Mn)+Nmax(M2n)/2+Nmax(Mn)+cN),i.e.the computational complexity isO(Nmax(M2n)).For the Slotted-FAMA protocol,the computational complexity isO(1).For the DOTS protocol,the computational complexity isO(Nmax(M2n))since the transmission scheduling process in the DOTS protocol needs to calculate the interference among nodes based on the delay map.Therefore,the computational complexity of the proposed DCT protocol is the same as the DOTS protocol and worse than the Slotted-FAMA protocol.

    V.PERFORMANCE EVALUATION

    In this section,the performance of the proposed DCT protocol is evaluated and demonstrated in Aqua-sim simulator,an NS2 based simulator for UASNs[40].The simulation results of DCT protocol are compared with those of the representative MAC protocols,i.e.Slotted-FAMA protocol[23]and DOTS protocol[30].

    5.1 Simulation Setup

    In the simulations,nodes are randomly distributed in a square area of 3 km by 3 km.Each node generates data packets following a Poisson process with the same rateλ.For comparison,λvaries from 0.01 pkt/s to 0.1 pkt/s with step 0.01 pkt/s and the size of the DATA packetpDATAis assumed to be the same,i.e.pDATA=tDATAR.Note that the offered traffic is defined as the number of packets generated by each node per second.Moreover,power settings are 1 W for transmission,0.75 W for reception,and 0.008 W in idle state[41].The sound wave propagates at the speed of 1500 m/s.The bit rateRis 10 kbps.

    The following performances are evaluated with different number of nodes and different sizes of DATA packets:

    1.Throughput,denoted as the number of bits successfully received per second,i.e.

    wherenDATAis the number of received DATA packets,Ttotalis the total simulation time.

    2.Energy consumption,denoted as the average energy consumption of transmitting a DATA packet,is calculated by the total energy consumption divided by the total number of received DATA packets,i.e.

    whereEtotalis the total consumed energy including the transmission energy,the reception energy,and the idle energy.Etis the transmission energy.It can be calculated by the transmission power times the transmission time,which is related to the number of transmitted packets,containing DATA packets,RTS packets,CTS packets,OTHERDATA packets,and ACK packets.Eris the reception energy.It can be given by the receiving power times the receiving time,which is related to the number of received packets.Eiis the idle energy associated with the idle time when there is no packet to be transmitted or be received.

    3.Average end-to-end delay,denoted as average time duration from the time the packet is generated to the time it is successfully received,i.e.

    whereDtotalis the total end-to-end delay,including the waiting delayDw,the transmission delayDt,and the propagation delayDp.

    Figure 4.Network throughput with different traffic load and different size of data packet.

    Figure 5.Network throughput with different number of nodes.

    5.2 Simulation Results

    5.2.1 Throughput

    Figure 4 and figure 5 show network throughput with different size of DATA packets and different number of nodes.The number of nodes in the network varies from 10 to 60 with 50 bytes per DATA packet.For the DATA packet size,both 50 bytes and 100 bytes per DATA packet are simulated with 6 nodes in the network.In general,the throughput of DCT protocol is higher than that of Slotted-FAMA protocol and DOTS protocol with the same offered traffic.The throughputs of all protocols become stable after climbing up to given thresholds.

    Figure 6.Theoretical and simulated normalized network throughput of DCT protocol.

    Simulation results of data packet with different size are shown in figure 4.When the number of nodes is fixed,and the data packet sizes are either 50 bytes or 100 bytes,DCT protocol outperforms both Slotted-FAMA protocol and DOTS protocol.Figure 4 shows that the up-bound throughput of DCT protocol is higher than that of DOTS protocol by 26.40% with 50 bytes per packet and 9.18% with 100 bytes per packet while it exceeds that of Slotted-FAMA protocol by 38.40%and 15.00%respectively.These results demonstrate explicitly that the bigger the size of data packets is,the smaller the probability for nodes to satisfy the concurrent transmission condition becomes.Thereby,the performance gain of the network with 50 bytes per data packet is larger than that of the network with 100 bytes.Furthermore,for the same protocol in figure 4,when the data packet size changes from 50 bytes to 100 bytes,the up-bound throughput can increase by 34.94%,56.22%,62.41% for DCT,DOTS,and Slotted-FAMA protocols,respectively.Apparently,the throughput of DCT protocol increases the least.This is because the packet size could influence the probability of concurrent transmission in DCT protocol,which is in accordance with the protocol’s setting in(1).

    In terms of the simulation results with different number of nodes shown in figure 5,when the number of nodes varies from 10 to 60 with fixed size of data packets,the throughput of DCT protocol is better than that of Slotted-FAMA protocol and DOTS protocol as well.Specifically,when the number of nodes in the network gets bigger,the throughput would change little.This is because whenλis set as 0.1 pkt/s,the network throughput has reached the upbound.So when the number of nodes increases,the throughput would not be improved.

    Figure 7.Average energy consumption with different size of data packet.

    In addition,based on figure 6,the theoretical throughput of the proposed DCT protocol agrees well with the trend of simulation results with different size of data packets.Besides,when the traffic load is low,the throughput of simulation results is a little bit higher than that of theoretical results.This is because when the traffic load is low,the collision probability among nodes in simulation tests may be lower than the statistical results leading to the higher throughput of simulation results.

    In conclusion,compared with Slotted-FAMA protocol and DOTS protocol,the proposed DCT protocol has better throughput performance.The corresponding performance gain gets larger when data packet size becomes smaller or network becomes bigger.Thus,it is suitable to be applied in UASNs with large-scale and high data traffic load.

    5.2.2 Average Energy Consumption

    From the perspective of average energy consumption of each data packet,DCT protocol exhibits better performance than Slotted-FAMA protocol and DOTS protocol as well.Energy consumption is associated with the number of received data packets and total energy.In the simulation,we have set long enough time to run out the battery energy,so the average energy consumption of these protocols performs similarly with the throughput.Figure 7 shows that performance of average energy consumption with 50 bytes per packet and 100 bytes per packet with 6 nodes in the network.Figure 8 shows the performance of average energy consumption with 10 to 60 nodes in the network,respectively.The result indicates that the average energy consumption of DCT protocol is less than that of Slotted-FAMA protocol and DOTS protocol in these different scenarios.

    Figure 8.Average energy consumption with different number of nodes.

    Overall,at the same offered traffic load,figure 7 shows that the energy consumption becomes higher when the size of data packet increases from 50 bytes to 100 bytes.Furthermore,the energy consumption of DCT protocol is less than that of Slotted-FAMA protocol and DOTS protocol with these two different data packet sizes.The reason is that DCT protocol requires less control packets and thereby consumes less energy.

    In terms of different number of nodes in the network,the energy consumption increases obviously.With the network getting larger,although more nodes send the RTS packets,only limited nodes can transmit data packets.Thus,the energy to send and receive RTS packets is wasted.

    In conclusion,the simulation results demonstrate the superiority of DCT protocol in terms of energy consumption performance in various scenarios.Thus,the DCT protocol could be applied for the long term monitoring.

    5.2.3 Average End-to-End Delay

    Figure 9.Average end-to-end delay with different size of data packet.

    From the results shown in figure 9,we can see that the average end-to-end delay of DCT is longer than that of the Slotted-FAMA protocol and the DOTS protocol when the offered traffic load is low.However,when the offered traffic load is higher,the DCT exhibits a shorter average end-to-end delay.This is because when the offered traffic load is low,unlike the Slotted-FAMA protocol and the DOTS protocol not requiring the first phase communications,the DCT protocol needs to perform the first phase communications to establish the delay table and the concurrent transmission table.When the offered traffic load increases,for the DCT protocol,the number of transmitted data packets during the same time is much more than that of both the Slotted-FAMA protocol and the DOTS protocol,thereby the average end-to-end delay would be reduced.From this figure,it can be also found that when the offered traffic load is large,the average endto-end delay of the DCT protocol is close to that of the DOTS protocol,and is much smaller than that of the Slotted-FAMA protocol.This is because with the network traffic load getting large,the nodes need to wait more time to have the chance to send data packets,though they may have attempted to send the RTS packets.

    In terms of different data packet size,the end-toend delay of all these protocols changes only a little when the size of data packets increases from 50 bytes to 100 bytes.This is because when the size of data packets changes,only the transmission delay and waiting delay would change.The transmission delay would only changes from 0.005s to 0.01s.The waiting delay would change because the number of sending data packets would decrease due to sending less concurrent data packets when the size of data packets increases from 50 bytes to 100 bytes.However,these delay changes are all very short compared with the long propagation delay and long time slots.As a result,the end-to-end delay changes only a little in a long simulation time.In addition,when the offered traffic changes from 0.01 pkts/s to 0.03 pkts/s,the end-to-end delay changes little.This is because when the offered traffic is low,the nodes have little packets to be transmitted and at the same time packets generated in the nodes would be transmitted quickly.As a result,the end-toend delay is very short and changes little.For the DCT protocol,the end-to-end delay is long when the traffic load is low.This is because in the DCT protocol,nodes have to perform the first phase communications to establish the delay table and the concurrent transmission table.Packets generated in the nodes could be transmitted after the end of the first phase.As a result,the end-to-end delay is long although there are little packets to be transmitted.

    VI.FUTURE WORK

    The development of MAC protocol is closely related to oceanic exploration applications and it caters to the demands for the quality of service(QoS).We take four typical applications with different demands on network range and data traffic load as examples:marine ranching,disaster forecasting and warning,equipment monitoring and control,and Internet of underwater things,shown in figure 10.

    1)Marine ranching.In recent years,the emerging application of UASNs to marine ranching has become an important trend.Thousands of sensors are laid in the farming area or carried by living creatures.The application range is usually not too far and the data traffic load is heavy.To reduce the cost of data collection and prolong the life time of nodes,marine ranching requires low energy consumption.Thus,MAC protocols have to be energy efficient and in the meantime can achieve high throughput.

    2)Disaster forecasting and warning.A lot of cabled sea floor observatories have been applied in disaster forecasting and warning.Wireless communication and networks are also indispensable to support observatory demands on large scale area.Observation networks are generally large while nodes only need to transmit data periodically.Thus,MAC protocols have to orchestrate data transmission time and collaborate channel access of nodes with various distances and data traffic loads.

    Figure 10.Future trends and typical applications for UASNs.

    3)Equipment monitoring and control.The development of underwater vehicles encourages the promotion of communications between mobile nodes.To control the equipment,networks are required to have low latency.The MAC protocols are expected to achieve real-time information feedback and support the access of mobile nodes.

    4)Internet of underwater things.In the future,the Internet of underwater things is envisioned to be in reality.At that time,smart underwater things are all combined and aggregated together to collect information of the oceanic world.The network range and data traffic load would be unprecedentedly large.Great efforts should be taken to tackle the challenges in applications.Thus,sophisticated MAC protocols should be designed to meet the demands on frequent data transmission and the access of large number of nodes.

    VII.CONCLUSION

    In this paper,we propose a MAC protocol called DCT protocol to enhance the network throughput and reduce the energy consumption in UASNs.The proposed protocol first establishes a delay table and a concurrent transmission table to find two concurrent transmission nodes,and then starts to transmit data concurrently.On the basis of the concurrent transmission condition,the packet transmission will not collide at the destination node.Performance analyses are given in detail,and the concurrent transmission probability is derived.The simulation results further verify the performance of DCT protocol.DCT protocol mainly provides a possible solution to cope with the challenges of spatial unfairness,data eruption,and low energy efficiency.There are still some constrains in DCT protocol.This protocol has not considered about the fast mobility of nodes.In addition,it is designed for star networks,and multi-hop networks have not been considered so far.As a future work,we could also broaden the network coverage by deploying multiple star networks.

    APPENDIX

    Proof of Lemma 1

    To prove Lemma 1,we define two sensor nodes randomly and independently distributed following the uniform distribution in a circle with the central node as the center andd0as the radius.Then in the polar coordinate,the angle is uniformly distributed everywhere in a circle and the probability density function of the radiusrcould be expressed as

    The distance between the central node and the sensor node is exactly the radius of the sensor node in the polar coordinate.So the distance differencerdbetween two sensor nodes and the central node isrd=|r1-r2|.Then based on(32),the probability distribution function ofrdcould be given by

    To realize the concurrent transmission,the difference in the distance between the sensor nodes and the central nodes should larger than the length of RTS packets or DATA packets,which is

    wheredisdRTS=tRTSvordDATA=tDATAvfor the concurrent transmission of RTS packets or DATA packets respectively.

    ACKNOWLEDGEMENT

    This work was supported in part by the National Natural Science Foundation of China under Grant 62171405 and in part by the National Science Fund for Distinguished Young Scholars under Grant 62225114.

    午夜福利在线在线| 国模一区二区三区四区视频 | 国产欧美日韩一区二区精品| 后天国语完整版免费观看| 午夜精品在线福利| 亚洲人成电影免费在线| 久久久国产成人精品二区| 99热这里只有精品一区 | www国产在线视频色| 天堂影院成人在线观看| 国产激情偷乱视频一区二区| 91九色精品人成在线观看| 亚洲最大成人中文| 亚洲国产高清在线一区二区三| 在线观看www视频免费| 又粗又爽又猛毛片免费看| 国产亚洲精品第一综合不卡| 亚洲乱码一区二区免费版| 色噜噜av男人的天堂激情| 免费电影在线观看免费观看| 黄色视频不卡| 91av网站免费观看| 一级片免费观看大全| 高清毛片免费观看视频网站| 日本一区二区免费在线视频| 91麻豆av在线| 亚洲人成网站高清观看| 久久精品国产综合久久久| 白带黄色成豆腐渣| 色哟哟哟哟哟哟| 村上凉子中文字幕在线| 亚洲美女视频黄频| 19禁男女啪啪无遮挡网站| 日本免费a在线| 18美女黄网站色大片免费观看| 国产欧美日韩一区二区精品| 成人国语在线视频| 丰满人妻熟妇乱又伦精品不卡| 一级毛片精品| 亚洲欧美日韩东京热| 999久久久精品免费观看国产| 午夜福利在线在线| 国产免费av片在线观看野外av| a级毛片a级免费在线| 亚洲黑人精品在线| 亚洲欧美日韩高清专用| 夜夜夜夜夜久久久久| 国产成人啪精品午夜网站| 50天的宝宝边吃奶边哭怎么回事| 亚洲av成人一区二区三| www日本在线高清视频| 999久久久精品免费观看国产| 久久久国产欧美日韩av| 18禁国产床啪视频网站| 最近视频中文字幕2019在线8| av超薄肉色丝袜交足视频| 久99久视频精品免费| 校园春色视频在线观看| 国产成+人综合+亚洲专区| 国产精品一区二区三区四区免费观看 | 亚洲精品中文字幕在线视频| 欧美av亚洲av综合av国产av| 天堂动漫精品| 亚洲七黄色美女视频| 久久久国产成人免费| 欧美一级毛片孕妇| 国产成人av激情在线播放| 日本熟妇午夜| 亚洲va日本ⅴa欧美va伊人久久| 国产伦一二天堂av在线观看| 91在线观看av| 国内精品一区二区在线观看| 男人舔女人的私密视频| 国产精品久久久人人做人人爽| 91成年电影在线观看| 欧美成人一区二区免费高清观看 | 久久伊人香网站| 成人精品一区二区免费| 久热爱精品视频在线9| 欧美日本亚洲视频在线播放| 深夜精品福利| 狠狠狠狠99中文字幕| 在线观看免费午夜福利视频| 国产成人啪精品午夜网站| 99久久99久久久精品蜜桃| 国产亚洲av高清不卡| 午夜福利18| 老汉色av国产亚洲站长工具| 国产成人精品无人区| 精品无人区乱码1区二区| xxx96com| 激情在线观看视频在线高清| 日韩欧美国产一区二区入口| 国产av不卡久久| 69av精品久久久久久| xxxwww97欧美| 脱女人内裤的视频| 久久国产精品影院| 精华霜和精华液先用哪个| 亚洲18禁久久av| 午夜亚洲福利在线播放| 亚洲一卡2卡3卡4卡5卡精品中文| 午夜成年电影在线免费观看| 久久久久免费精品人妻一区二区| 久久久久久免费高清国产稀缺| 国产真人三级小视频在线观看| 久久久久久国产a免费观看| 日韩高清综合在线| 特大巨黑吊av在线直播| 天堂av国产一区二区熟女人妻 | 波多野结衣高清作品| 啪啪无遮挡十八禁网站| 在线看三级毛片| 日韩大尺度精品在线看网址| 国产乱人伦免费视频| 村上凉子中文字幕在线| av有码第一页| 两性夫妻黄色片| 国产精品 欧美亚洲| 熟妇人妻久久中文字幕3abv| 日韩免费av在线播放| 国产高清激情床上av| 免费看美女性在线毛片视频| 日韩有码中文字幕| 成人18禁高潮啪啪吃奶动态图| 欧美性长视频在线观看| 亚洲精品在线观看二区| 长腿黑丝高跟| 国模一区二区三区四区视频 | 精品一区二区三区av网在线观看| 日韩精品中文字幕看吧| 嫩草影视91久久| 欧美黄色片欧美黄色片| 最近最新免费中文字幕在线| 亚洲欧美激情综合另类| 国内精品久久久久精免费| 黑人巨大精品欧美一区二区mp4| 亚洲精品色激情综合| 国产成人av教育| 欧美绝顶高潮抽搐喷水| 国产精品av视频在线免费观看| 禁无遮挡网站| 成人永久免费在线观看视频| 国产91精品成人一区二区三区| 久9热在线精品视频| 好看av亚洲va欧美ⅴa在| 在线观看一区二区三区| 女警被强在线播放| 日韩精品中文字幕看吧| 久久精品综合一区二区三区| 欧洲精品卡2卡3卡4卡5卡区| 天天躁夜夜躁狠狠躁躁| 老鸭窝网址在线观看| 亚洲av成人精品一区久久| 天天躁夜夜躁狠狠躁躁| 亚洲精品久久国产高清桃花| 韩国av一区二区三区四区| 99re在线观看精品视频| 99久久国产精品久久久| 手机成人av网站| 中文字幕人妻丝袜一区二区| 性欧美人与动物交配| 国产精品98久久久久久宅男小说| 舔av片在线| 亚洲精品国产一区二区精华液| 国产午夜福利久久久久久| 亚洲性夜色夜夜综合| 亚洲精品国产一区二区精华液| 身体一侧抽搐| 男女之事视频高清在线观看| 欧美最黄视频在线播放免费| 日本 av在线| 午夜精品久久久久久毛片777| 亚洲一区二区三区不卡视频| www.999成人在线观看| 夜夜夜夜夜久久久久| 精品不卡国产一区二区三区| 香蕉丝袜av| 欧美日韩瑟瑟在线播放| 在线视频色国产色| 麻豆成人午夜福利视频| 不卡av一区二区三区| 亚洲男人天堂网一区| 国产视频内射| 国产午夜福利久久久久久| 亚洲九九香蕉| 日日爽夜夜爽网站| 日韩欧美一区二区三区在线观看| 久久久精品国产亚洲av高清涩受| 婷婷亚洲欧美| 久久久精品欧美日韩精品| 色尼玛亚洲综合影院| 999久久久国产精品视频| 国产成人精品久久二区二区91| 99热这里只有是精品50| 午夜福利18| 国产成人影院久久av| 国产精品电影一区二区三区| 亚洲 国产 在线| 波多野结衣高清作品| 欧美成狂野欧美在线观看| 黑人欧美特级aaaaaa片| 日韩 欧美 亚洲 中文字幕| 成年人黄色毛片网站| 亚洲一区二区三区不卡视频| 久久香蕉国产精品| 三级毛片av免费| 国产精品电影一区二区三区| 波多野结衣高清无吗| 欧美在线黄色| 露出奶头的视频| 精品一区二区三区四区五区乱码| 欧美不卡视频在线免费观看 | 亚洲第一电影网av| 日韩精品中文字幕看吧| 午夜福利18| 亚洲精品中文字幕一二三四区| 99久久综合精品五月天人人| 757午夜福利合集在线观看| 亚洲成人中文字幕在线播放| 黄频高清免费视频| 最新在线观看一区二区三区| 久久久久国产精品人妻aⅴ院| 亚洲国产精品sss在线观看| 亚洲国产欧美人成| 午夜精品在线福利| 欧美大码av| 日韩中文字幕欧美一区二区| 国产91精品成人一区二区三区| 亚洲成av人片免费观看| 99热这里只有是精品50| 黄色 视频免费看| 亚洲熟妇中文字幕五十中出| 别揉我奶头~嗯~啊~动态视频| 国产av麻豆久久久久久久| 亚洲专区中文字幕在线| 国产精品爽爽va在线观看网站| 午夜激情福利司机影院| 欧美日韩国产亚洲二区| 亚洲成人精品中文字幕电影| 精品久久久久久久毛片微露脸| 亚洲人成电影免费在线| 亚洲av片天天在线观看| 波多野结衣高清无吗| 国产精品av久久久久免费| xxxwww97欧美| 岛国在线观看网站| 蜜桃久久精品国产亚洲av| 日日夜夜操网爽| 日本免费一区二区三区高清不卡| 亚洲av成人av| 精品熟女少妇八av免费久了| 国产午夜精品论理片| 久久精品国产综合久久久| 999久久久精品免费观看国产| 亚洲av成人av| 亚洲欧美激情综合另类| 熟妇人妻久久中文字幕3abv| 18禁黄网站禁片免费观看直播| 俄罗斯特黄特色一大片| 国产成人欧美在线观看| 欧美激情久久久久久爽电影| 国产免费av片在线观看野外av| 国产精华一区二区三区| 麻豆成人av在线观看| 亚洲狠狠婷婷综合久久图片| 欧美另类亚洲清纯唯美| 亚洲成人免费电影在线观看| 天堂动漫精品| 99久久精品国产亚洲精品| 国产精品乱码一区二三区的特点| 久久婷婷人人爽人人干人人爱| 久久精品成人免费网站| 丰满人妻熟妇乱又伦精品不卡| 熟女电影av网| 日韩欧美三级三区| 午夜福利在线观看吧| 丰满人妻熟妇乱又伦精品不卡| 久久久久久免费高清国产稀缺| 亚洲精品粉嫩美女一区| 首页视频小说图片口味搜索| 日本黄大片高清| 久久亚洲真实| 老熟妇乱子伦视频在线观看| 黄频高清免费视频| 人人妻人人看人人澡| 国产在线观看jvid| 一级a爱片免费观看的视频| 日本 av在线| 十八禁人妻一区二区| 可以在线观看毛片的网站| 免费看a级黄色片| 男女视频在线观看网站免费 | 午夜影院日韩av| 色综合站精品国产| xxxwww97欧美| 成年版毛片免费区| 欧美黄色片欧美黄色片| 久久久久国内视频| 人成视频在线观看免费观看| 色av中文字幕| av免费在线观看网站| 久久香蕉国产精品| aaaaa片日本免费| 不卡av一区二区三区| 欧美午夜高清在线| 99久久国产精品久久久| 老熟妇乱子伦视频在线观看| 国产欧美日韩精品亚洲av| 亚洲成a人片在线一区二区| 大型黄色视频在线免费观看| 18禁美女被吸乳视频| 国产人伦9x9x在线观看| 12—13女人毛片做爰片一| 精品免费久久久久久久清纯| 久久国产精品人妻蜜桃| 亚洲精品一区av在线观看| 国产精品九九99| 美女 人体艺术 gogo| 国产亚洲精品一区二区www| 免费av毛片视频| 老司机午夜十八禁免费视频| 午夜激情av网站| 国产精品免费一区二区三区在线| 成人国语在线视频| 国产亚洲av高清不卡| 舔av片在线| 成人18禁在线播放| 老熟妇仑乱视频hdxx| а√天堂www在线а√下载| 观看免费一级毛片| 神马国产精品三级电影在线观看 | 日日摸夜夜添夜夜添小说| 国产在线观看jvid| 成人手机av| 欧美乱色亚洲激情| 亚洲成人国产一区在线观看| 免费在线观看成人毛片| 亚洲专区国产一区二区| 国产三级黄色录像| 精品久久久久久久久久久久久| 欧美+亚洲+日韩+国产| 一个人观看的视频www高清免费观看 | 九九热线精品视视频播放| 亚洲av电影不卡..在线观看| 国内少妇人妻偷人精品xxx网站 | 毛片女人毛片| 欧美乱色亚洲激情| 亚洲男人天堂网一区| 性欧美人与动物交配| 在线观看www视频免费| 在线观看美女被高潮喷水网站 | 亚洲成a人片在线一区二区| 国产亚洲av高清不卡| а√天堂www在线а√下载| 99热这里只有是精品50| 亚洲乱码一区二区免费版| 狂野欧美白嫩少妇大欣赏| 国语自产精品视频在线第100页| 岛国视频午夜一区免费看| 女人被狂操c到高潮| 中文亚洲av片在线观看爽| 免费高清视频大片| 成年女人毛片免费观看观看9| 精品国产超薄肉色丝袜足j| 日韩欧美免费精品| 精品第一国产精品| 婷婷精品国产亚洲av在线| 好男人在线观看高清免费视频| 757午夜福利合集在线观看| 国产三级黄色录像| 久久久久精品国产欧美久久久| 亚洲一区二区三区色噜噜| 色播亚洲综合网| 精品国内亚洲2022精品成人| 午夜福利欧美成人| 久久香蕉激情| 一二三四在线观看免费中文在| 久久久国产精品麻豆| 九色国产91popny在线| 亚洲自拍偷在线| 精品欧美国产一区二区三| 亚洲午夜精品一区,二区,三区| 最近视频中文字幕2019在线8| 精品国内亚洲2022精品成人| 91麻豆精品激情在线观看国产| 国产v大片淫在线免费观看| 国产一区二区三区视频了| 麻豆av在线久日| 人人妻人人看人人澡| 精品乱码久久久久久99久播| 亚洲人成伊人成综合网2020| 夜夜看夜夜爽夜夜摸| 51午夜福利影视在线观看| 丁香六月欧美| 国产欧美日韩一区二区三| 国产69精品久久久久777片 | 天天躁狠狠躁夜夜躁狠狠躁| 日本一区二区免费在线视频| 国产亚洲av高清不卡| 国产精品 国内视频| 女同久久另类99精品国产91| 欧美成狂野欧美在线观看| 12—13女人毛片做爰片一| 99久久国产精品久久久| 国产成人系列免费观看| 成人18禁在线播放| 亚洲av成人av| 韩国av一区二区三区四区| 黄频高清免费视频| 变态另类成人亚洲欧美熟女| 国产亚洲av嫩草精品影院| 日韩欧美 国产精品| 非洲黑人性xxxx精品又粗又长| 国产av在哪里看| 国产区一区二久久| 在线观看一区二区三区| 两个人看的免费小视频| 亚洲国产欧美人成| 老司机深夜福利视频在线观看| 亚洲aⅴ乱码一区二区在线播放 | 很黄的视频免费| 精品久久久久久,| 熟女少妇亚洲综合色aaa.| 丰满的人妻完整版| 可以在线观看毛片的网站| 最近视频中文字幕2019在线8| 日本熟妇午夜| 99riav亚洲国产免费| 999精品在线视频| bbb黄色大片| 99国产极品粉嫩在线观看| 老司机午夜福利在线观看视频| 男女下面进入的视频免费午夜| 精品久久久久久久久久久久久| 中文字幕人妻丝袜一区二区| 9191精品国产免费久久| 精品免费久久久久久久清纯| 精品不卡国产一区二区三区| 操出白浆在线播放| 精品久久久久久,| 日本三级黄在线观看| 深夜精品福利| 韩国av一区二区三区四区| 国产成人精品久久二区二区91| 国产视频一区二区在线看| 国产熟女午夜一区二区三区| 国产三级中文精品| 老司机福利观看| 国产精品,欧美在线| 国产精品电影一区二区三区| 日韩精品中文字幕看吧| 啪啪无遮挡十八禁网站| 亚洲中文字幕一区二区三区有码在线看 | 国产成人精品久久二区二区91| 国产精品亚洲美女久久久| 岛国视频午夜一区免费看| 欧美国产日韩亚洲一区| 丁香欧美五月| 狂野欧美激情性xxxx| 欧美日本亚洲视频在线播放| 精品一区二区三区四区五区乱码| 身体一侧抽搐| 毛片女人毛片| 动漫黄色视频在线观看| 黄片大片在线免费观看| 色av中文字幕| 在线观看免费视频日本深夜| 日韩av在线大香蕉| 超碰成人久久| 波多野结衣高清作品| 精品久久久久久久久久久久久| 国产不卡一卡二| 人妻久久中文字幕网| 国产久久久一区二区三区| 少妇被粗大的猛进出69影院| 欧美大码av| 长腿黑丝高跟| 一级毛片高清免费大全| 一个人免费在线观看的高清视频| 啦啦啦韩国在线观看视频| 日本精品一区二区三区蜜桃| 最近最新中文字幕大全电影3| 精品乱码久久久久久99久播| 久久久久久久久中文| 大型av网站在线播放| 国产99白浆流出| e午夜精品久久久久久久| 五月伊人婷婷丁香| 50天的宝宝边吃奶边哭怎么回事| 我要搜黄色片| 亚洲 欧美 日韩 在线 免费| 国产97色在线日韩免费| 亚洲激情在线av| 亚洲中文日韩欧美视频| 免费搜索国产男女视频| 欧美一区二区精品小视频在线| 精品欧美一区二区三区在线| 亚洲18禁久久av| 成人永久免费在线观看视频| 日韩大码丰满熟妇| 午夜免费成人在线视频| 午夜成年电影在线免费观看| 国产精品日韩av在线免费观看| 日韩精品中文字幕看吧| 国产真实乱freesex| www日本黄色视频网| 欧美一级a爱片免费观看看 | 男男h啪啪无遮挡| 亚洲国产精品成人综合色| 欧美三级亚洲精品| 国产97色在线日韩免费| 黄片小视频在线播放| 搡老熟女国产l中国老女人| 麻豆av在线久日| 神马国产精品三级电影在线观看 | 亚洲中文av在线| 在线观看舔阴道视频| 精品国产乱码久久久久久男人| 国产精品电影一区二区三区| 亚洲午夜精品一区,二区,三区| cao死你这个sao货| 久久国产精品影院| 禁无遮挡网站| 日韩欧美 国产精品| 日本一区二区免费在线视频| 男女午夜视频在线观看| 狂野欧美激情性xxxx| 巨乳人妻的诱惑在线观看| 欧美极品一区二区三区四区| 男人舔女人下体高潮全视频| 色尼玛亚洲综合影院| 岛国视频午夜一区免费看| 欧美一级a爱片免费观看看 | 欧洲精品卡2卡3卡4卡5卡区| 亚洲美女视频黄频| 精品第一国产精品| 欧美日韩中文字幕国产精品一区二区三区| 国产成人精品久久二区二区免费| 露出奶头的视频| 无限看片的www在线观看| 男女之事视频高清在线观看| 国产精品一区二区三区四区免费观看 | 久久精品91无色码中文字幕| 亚洲电影在线观看av| 欧美成人一区二区免费高清观看 | 亚洲国产精品合色在线| 母亲3免费完整高清在线观看| 久久国产精品影院| 两性夫妻黄色片| 男人舔女人的私密视频| 亚洲成a人片在线一区二区| 搡老岳熟女国产| 国产精品永久免费网站| 一进一出好大好爽视频| 成人一区二区视频在线观看| 国产精品日韩av在线免费观看| 欧美日本视频| 国产成人精品久久二区二区91| 三级男女做爰猛烈吃奶摸视频| 日韩高清综合在线| 不卡一级毛片| 美女 人体艺术 gogo| 国产成人系列免费观看| 亚洲国产精品久久男人天堂| 国产精品久久久久久精品电影| 亚洲人成网站高清观看| 亚洲中文av在线| 特级一级黄色大片| 最近最新免费中文字幕在线| 亚洲中文字幕一区二区三区有码在线看 | 亚洲精品国产精品久久久不卡| 午夜日韩欧美国产| 日本a在线网址| 国产精品免费视频内射| 成年人黄色毛片网站| 国产av在哪里看| 人妻久久中文字幕网| 精品国产美女av久久久久小说| 99热这里只有是精品50| 亚洲av日韩精品久久久久久密| 亚洲中文日韩欧美视频| 51午夜福利影视在线观看| 变态另类成人亚洲欧美熟女| 国产熟女午夜一区二区三区| 无遮挡黄片免费观看| 色尼玛亚洲综合影院| АⅤ资源中文在线天堂| 国产亚洲精品一区二区www| 免费人成视频x8x8入口观看| 亚洲精品一卡2卡三卡4卡5卡| 亚洲欧美日韩高清专用| 国产男靠女视频免费网站| 国产v大片淫在线免费观看| 久久99热这里只有精品18| 黄色a级毛片大全视频| 少妇裸体淫交视频免费看高清 | 五月伊人婷婷丁香| 精品第一国产精品| 亚洲狠狠婷婷综合久久图片| 免费在线观看视频国产中文字幕亚洲| 日韩欧美免费精品| 久热爱精品视频在线9| 一级作爱视频免费观看| 亚洲自拍偷在线| 精品久久久久久久久久久久久| 日韩三级视频一区二区三区| 老司机深夜福利视频在线观看| 一本久久中文字幕| 欧美又色又爽又黄视频| 色av中文字幕| 长腿黑丝高跟| 老司机深夜福利视频在线观看| 日韩高清综合在线| 日韩精品青青久久久久久|