• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Analyzing and Enabling the Harmonious Coexistence of Heterogeneous Industrial Wireless Networks

    2022-11-10 02:31:52BilalKhanDanishShehzadNumanShafiGaYoungKimandMuhammadUmarAftab
    Computers Materials&Continua 2022年10期

    Bilal Khan,Danish Shehzad,Numan Shafi,Ga-Young Kimand Muhammad Umar Aftab

    1Department of Computer Science,National University of Computer and Emerging Sciences,Islamabad,Chiniot-Faisalabad Campus,Chiniot,35400,Pakistan

    2Faculty of General Education,Kangnam University,Korea

    Abstract:Nowadays multiple wireless communication systems operate in industrial environments side by side.In such an environment performance of one wireless network can be degraded by the collocated hostile wireless network having higher transmission power or higher carrier sensing threshold.Unlike the previous research works which considered IEEE 802.15.4 for the Industrial Wireless communication systems (iWCS) this paper examines the coexistence of IEEE 802.11 based iWCS used for delay-stringent communication in process automation and gWLAN(general-purpose WLAN)used for non-real time communication.In this paper,we present a Markov chain-based performance model that described the transmission failure of iWCS due to geographical collision with gWLAN.The presented analytic model accurately determines throughput,packet transaction delay,and packet loss probability of iWCS when it is collocated with gWLAN.The results of the Markov model match more than 90% with our simulation results.Furthermore,we proposed an adaptive transmission power control technique for iWCS to overcome the potential interferences caused by the gWLAN transmissions.The simulation results show that the proposed technique significantly improves iWCS performance in terms of throughput,packet transaction,and cycle period reduction.Moreover,it enables the industrial network for the use of delay critical applications in the presence of gWLAN without affecting its performance.

    Keywords:Round robin;distributed coordination function;interference;csma;ieee 802.11;factory automation;process automation

    1 Introduction

    The recent advances in wireless networks have motivated the research community to adopt the high speed wireless technology for the industrial automation which is essential to the implementation of Industry 4.0[1].In industrial automation,wireless technology is used to cope with the urgent requirements of the real-time control communications.Real-time control communication requires lownetwork latency,reliability and deterministic sequence of transmissions.These requirements have been achieved by the deployment of a number of enhanced wireless systems such as Wireless Hart based on the IEEE 802.15.4 which is based on the carrier-sense multiple access with collision avoidance(CSMA/CA),an approach to resolve collisions among the collided wireless nodes.However,this wireless technology only gives satisfactory performance when the network size is small as access to wireless medium becomes very slow when the number of nodes increases.

    Wireless local area network based on IEEE 802.11 may provide high capacity,but is not suitable for delay-stringent industrial applications as it also uses CSMA/CA.To deal with the nondeterministic sequence of transmissions and high latency caused by the CSMA/CA based wireless technologies,some researches have proposed TDMA (time division multiple access) based MAC protocol for medium access in which all the transmitters in the network access the medium in roundrobin fashion[2-4].In this protocol,a master device controller or point coordinator controls the sequence of transmissions among the associated devices.This centrally managed procedure is called point coordination function (PCF).All the devices associated with the point coordinator transmits critical data to the controller within the bounded delay.

    In contrast to iWCS which may be used for control and monitoring purposes in industry for process automation,a conventional general-purpose wireless local area network (gWLAN) is ubiquitous and maybe used for general-purpose and non-real-time communication.iWCS delivers promising results even in highly saturated traffic conditions and fulfills the requirements of industrial automation.However,the challenge is that when iWCS is collocated with gWLAN,the performance of the former will be degraded[5].A scenario of the collocation of iWCS used for industrial automation and gWLAN used for the general-purpose best-effort traffic is shown in Fig.1.

    Figure 1:Industrial wireless control and monitoring applications using iWCS collocated with gWLAN

    The performance degradation of iWCS can be measured using several techniques,e.g.,experimental,simulation-based and analytical.Recently,there have been considerable research efforts put in place to model the performance analysis of wireless networks when they are collocated with one or more different types of wireless networks.This research area tends to increasingly attract attention since more heterogeneous wireless networks continue to be redundantly deployed in a small area with an aim of supporting various types of wireless devices running a variety of applications.In these densely overlapped heterogeneous networks,wireless nodes are forced to contend with others in the same network and simultaneously with nodes of different networks which may run either the same MAC protocol or different ones.The most typical example of overlapped heterogeneous networks is the case where gWLANs based on IEEE 802.11 coexist with wireless personal area networks(WPANs)based on IEEE 802.15.4 and they share the same frequency band in a contention-based manner.Besides the gWLAN and WPAN overlapping some researches addressed the problems yield from the coexistence of Bluetooth and WLAN and Bluetooth and WPAN(Zigbee).However,there is a lack of research on the performance analysis when a iWCS overlaps geographically with the gWLAN,namely,the coexistence of two types of wireless systems running different MAC algorithms to obtain access to the shared wireless channel.In next paragraph at first we briefly explain the operation of gWLAN in DCF(Distributed Coordination Function)and iWCS.

    Fig.2 shows the operation of IEEE 802.11 based gWLAN in DCF mode[6].All devices initially choose a backoff counter randomly from the minimum contention window and starts counting down after sensing the channel idle for DIFS (DCF InterFrame Spacing) time period.A device makes transmission attempt when its backoff counter reaches zero and all other devices hearing transmission freeze their counters and set network allocation vector (NAV) for the time of transmission.The transmission is successful when no other device’s backoff counter reaches zero simultaneously.In this case the sender device receives ACK frame from the destination device otherwise collision happens.In case of collision contention window is increased according to the binary exponential backoff(BEB)algorithm and the station again starts decreasing its counter.The same process is repeated unless the transmission is successful or the number of retries reaches the predefined retry limit in which case the frame is discarded and the upper layers of the protocol stack are notified of the transmission failure.

    Figure 2:Operation of IEEE 802.11 based gWLAN using DCF

    In contrast to gWLAN,transmissions in iWCS happen in round-robin fashion[6].Fig.3 shows the operation of iWCS which operates only in infrastructure-based network.Device Coordinator or Device Controller (DC) transmits a beacon frame initially which is received by all the associated devices in the network.All transmissions are in a sequential fashion,i.e.,all associated devices are served one by one if they have a frame waiting at the DC thus avoiding collision.DC proceeds to next transmission after an ACK frame is received from the previous transmission.Transmission is not failed due to collision;however,it can be failed due to the channel error.In case of transmission failure iDevice will not receive ACK frame from the DC for the uplink traffic and hence information is retransmitted until the transmission is successful or the retry limit is reached as shown in Fig.3.Such failures due to channel error degrade the performance of network.While in this study we consider the MAC operations for gWLAN and iWCS as shown in Figs.2 and 3,they are not much different than those proposed by various IEEE 802.11 based standards as shown in Fig.4.The taxonomy in Fig.4 shows the already established and recently emerged IEEE standards which has suggestions for the enhancements of MAC protocols for WiFi.

    Figure 3:Operation of iWCS with bounded delay

    Figure 4:Various established and recently emerged IEEE 802.11-based MAC protocols for generalpurpose and real-time traffic

    In this paper,we consider the collocation of the time-stringent industrial network(iWCS)based on TDMA MAC with the contention based general purpose wireless network(gWLAN).We evaluate the performance degradation of iWCS due to gWLAN using our proposed analytical model.Furthermore,to enhance the performance of iWCS in the presence of gWLAN we propose an adaptive transmission power control mechanism(ATPC).

    The rest of the paper is organized as follows:Section 2 describes the literature review.In Section 3,we formulated the coexistence scenario.The proposed performance model is presented in Section 4 and Section 5 and validation is performed in Section 6.An adaptive transmission power control mechanism is proposed and evaluated in Section 7 and finally Section 8 concludes the paper.

    2 Related Work

    A study conducted by Fotis et al.,discussed the dependability of wireless communications for IIoT(Industrial Internet of Things)to provide new solutions[7].This study also discussed the recent efforts in benchmarking the IIoT protocols and systems and highlighted the challenges that the research community is facing.The IoT devices,however,they considered for their study are based on the low power,low range Bluetooth and IEEE 802.15.4 protocols which unfortunately provide low data rate,too.

    Many recent articles focus on the improvement of the WLAN performance in the Industrial setup in terms of reliability and determinism.For example,Karaca et al.in[8]proposed algorithms for fixed and dynamic scheduling duration.The network is divided into groups,where there will be fixed number of users whose transmissions will be scheduled.To improve determinism,in realtime industrial communication,in[9]authors propose a framework that provide seamless link-level redundancy and redundant WLAN equipment assuming that all WLAN devices are dual band and AP supports simultaneous dual band operations as well.[10]proposes a hybrid channel access mechanism along with temporal redundancy techniques to provide deterministic and reliable connectivity for the industrial real-time communication.These previously stated solutions,however,are only suitable when the industrial communication network is the only wireless network operational in the factory shop.The real challenge is when the industrial wireless network is collocated with the another wireless network having different MAC layer mechanism for the channel access.Because when wireless networks of different types are deployed in the same geographical location they interfere each other and therefore degrades each other performance.For example,it was reported in[11]that an IEEE 802.15.4 network suffered approximately 90% throughput drop when it was placed close by IEEE 802.11 networks.In another study,authors demonstrated that the performance of IEEE 802.11 networks dropped as much as 60% when they are placed within the proximity of IEEE 802.15.4 networks,implying that the signal of the former would be overwhelmed by even the weak signal transmission of the latter[12].In[13]an analytical model was presented by Zhang &Shin to predict the effect of interaction between contention free period (CFP) of ZigBee and Wi-Fi networks on their performance.Their proposed model,however,makes an unrealistic assumption that Wi-Fi stations stay in an unsaturated condition so that they always keep the minimum CW.In[14],Park et al.studied the coexistence of contention based WLAN and WMAN(wireless metropolitan area networks)in which they found that the latter network significantly degrades the performance of the former network.In their study,both the networks are used for the general-purpose communication with no critical delay considerations.They proposed a negative ack (NACK) based signaling mechanism through which WLAN notifies WMAN of its presence.In[15]authors proposed an analytic model for the performance analysis of WLAN when it is in CFP mode and transmission failure occurs only due to the erroneous channel.The research,however,lacks simulation and does not take into account the possibility of transmission failure due to the transmission from a collocated wireless network.Sikdar in[16]presented an analytic model to find delay in PCF based medium access.Their work,however,does not take into account transmission failure either due to channel error or due to the collocated DCF traffic.In[17,18],authors proposed a TDMA(time division multiple access)based mechanism for the real-time communication and proved that their proposed mechanism performs better than the conventional 802.11e EDCA when the high priority traffic competes for the shared channel access with the lowpriority traffic.Their work,however,is based on simulations only and an analytic model is not proposed.Furthermore,stations transmitting high priority traffic can sense the channel occupation by the stations transmitting low priority traffic and vice versa.In[19],authors provided an analytical model to evaluate the performance measurement of a wireless network which is collocated with ‘N’generic number of wireless networks of the same type.Their proposed model is only applicable when all the collocated networks uses the same CSMA/CA based MAC protocol.In[20],authors evaluated the energy efficiency of a wireless network when all the nodes transmit to the same access point using CSMA mechanism.Their proposed mechanism,however,assumes that all the nodes use the same access mechanism for transmission.In[21],Kanjanavapastit et al.presented a modified PCF(Point Coordination Function) which is based on the collision resolution technique.The modified PCF is proposed to reduce the effect of hidden stations in the network.The PCF in this work,however,considers that nodes contend the channel using Polling frames for the uplink transmission which may incur higher transmission delay and are not suitable for the timing stringent tasks in industrial setup.In[22],Guo et al.studied the impact of TDMA(time division multiple access)based Wi-Fi on CSMA based Wi-Fi.when they are collocated in industrial setup.However,they did not take into account the real scenario in which CSMA(Wi-Fi)networks impact the performance of TDMA(Wi-Fi).Their results are also based on the custom made C++simulator and not the well-known network simulator ns-2 or ns-3.Furthermore,the Wi-Fi standard(IEEE 802.11b)that they have used is obsolete now.In contrast to the above studies our work addresses the real issues that arises from the coexistence iWCS and gWLAN,where the devices in former network transmit with lower transmission power and are susceptible to interference from the transmissions of devices associated with the later network.

    In[4],authors studied the suitability of rate adaptation algorithm for the reliable real-time communication in the Wi-Fi based industrial networks.To be more specific,their work focused on assessing the computational complexity of various rate adaptation algorithms based on the experiments.While the obtained results from their experiments are encouraging,their work does not consider the coexistence of wireless industrial networks with other heterogeneous networks.

    In[2],author proposed a novel medium access control protocol and provided hardware implementation for Industrial networks.The results they obtained from the experiments are although encouraging,however,the packet error rate due to erroneous channel that they have considered is very low,i.e.,10-9.More specifically the packet error rate due to the heterogeneous wireless network that we considered in this work is higher than the one they have considered.

    In[3],authors provided comprehensive survey for the use of IEEE 802.11 MAC enhancements for the real-time industrial networks.The survey concluded that the contention-based MAC protocols are easy to deploy and implement but are not suitable for the wireless industrial networks whereas the contention-free protocols are more suitable for time-stringent industrial applications.The survey also explored the newly introduced enhancements in the MAC e.g.,retransmission management and rate adaptation.All the surveyed researches considered a standalone wireless network.In contrast,we considered the collocation of the time-stringent industrial network based on TDMA MAC with the contention based general purpose wireless network.

    3 Coexistence Scenario

    In this section we present the coexistence scenario of iWCS and gWLAN as shown in Fig.5.It shows that both networks are physically located closer to each other.More specifically,iWCS is under the influence of gWLAN transmission.Both networks,as stated earlier,are using different rules to access the shared medium.In iWCS,a device coordinator or controller(DC)communicates with its associated devices and in gWLAN the gUsers communicate with the access point (AP).The larger circle around the gWLAN shows that every gUser can sense each other’s transmission as long as they remain in this area.The smaller oval shape around the iWCS shows that iDevices and DC have weaker signals that may reach only to each other.In addition,there exists asymmetry between the two networks in terms of transmission powers and carrier sensing while accessing the same shared wireless channel.iDevices transmit without carrier sensing with low transmission power whereas gUsers transmit with higher transmission power having higher carrier sensing threshold since the gUsers are scattered geographically over a wide area and may compete with each other to access the shared medium.On the other hand,the signal strength of the AP and gUsers are strong to may interfere the transmission going on in iWCS.iDevices and DC are non-mobile and pose no serious threat to the communication going on in gWLAN.

    Figure 5:A scenario of collocation of gWLAN and iWCS

    Fig.6 shows the timeline diagram when both iWCS and gWLAN are operating in parallel.Contention free interval in iWCS starts with the transmission of beacon frame from the DC.All the iDevices start sequentially sending receiving frames from the DC after listening to the short beacon frame.gUsers may be oblivious to the short beacon frame due to its low signal strength and therefore may transmit its data assuming the shared channel is idle.This transmission from the fellow gUser when the channel has already been occupied by the iWCS causes the later transmission to be interfered.Resultantly the iDevice has to retransmit that frame causing the indeterministic delay to the real-time communication.Besides the fluctuating delay iWCS also suffers from degraded performance when it is geographically collocated with the gWLAN.To measure the delay incurred by the iWCS due to the interference from the gWLAN,in next section we present an analytic model.

    Figure 6:Overlap of iWCS and gWLAN transmissions

    4 Performance Model for the iWCS Collocated with gWLAN

    This section explains an analytic model to determine the performance of iWCS that shares the same frequency band and is geographically collocated gWLAN on a factory floor.In this work gWLAN having higher transmission power interferes transmissions of the iWCS that transmits without carrier sensing.The rationale behind this assumption is that the gWLAN users are scattered on the factory floor and may therefore need higher transmission power in order for their respective signals to reach to the associated AP.

    Fig.7 shows a Markov chain for network operating in contention-free mode.“Start”and“Finish”represent the start and finish states of a transaction.Similarly,“RS i”represents the ithretry stage of the DC for transmitting a frame to a particular station.There are two cases when transmission of iWCS is failed.They are:(i) when DC has already occupied the channel and the transmission of gWLAN arrives in the middle of CF (Contention-Free) data or ACK frame,thus interfering data or ACK frame (ii) when gWLAN has occupied the channel and a CF transmission arrives which causes the latter transmission being failed.

    Figure 7:Markov chain for iDevice operating in iWCS in round-robin fashion

    PdataandPackare the probabilities when gWLAN station transmits while the channel has already been occupied by data and ACK frame with which a transmission to an iWCS station fails and the state of the DC shifts from one state to the other shown by an arrow,representing the first case.In second case DC starts transmission while the channel has already been occupied by the gWLAN with probabilityPbusythus interfering the contention-free transmission of iWCS.DC retries a failed transmission up tomtimes wheremis the retry limit as shown in Fig.7.We calculatePdata,PackandPbusyin Section 4.We assume an ideal channel and therefore the only reason of transmission failure is the interference caused by the transmission from the collocated gWLAN network.DC transmits a beacon frame followed by Data frame.Note that unlike Data and ACK frames,beacon frame has small size and is broadcasted using the lowest rate and is therefore not interfered[23].Each transmission is in sequential order for those associated iDevces having a frame buffered for them at the DC.DC receives ACK frame for a successful transmission from the associated iDevice otherwise DC retransmits Data frame to the iDevice that has not acknowledged the preceding transmission.DC also retransmits if the ACK frame is lost due to interference.Each transmission is separated by SIFS time.We denote Data and ACK transmission time asTDandTA,respectively.A successful transmission occurs with probabilityPidle (1-Pdata)(1-Pack)and takes 2SIFS+TD+TA,wherePidleis the probability that gWLAN channel is idle when iWCS starts its transmission.In contrast if a transmission is failed,DC retries with probabilityPidle Pdata,Pidle(1-Pdata)PackorPbusydepending on the two cases mentioned above.Thus the time wasted in both cases is 2SIFS+TD+TA.iDevice will retry till the transmission is successful or the retry limit is reached.A retry state (i.e.,RSi) is reached either from Start or any other retry state with probabilityPR.A transmission can be successful either from the Start state or a retry state,i.e.,RS 1,RS 2,..,RS m with probabilityPS.PFis the probability with which DC reaches Finish state from the mthstate.

    With a finite retry limit,a transaction always finishes after m retries.The transitional delaysDR,DSandDFrepresent the delays to reach a retry state from any other state,to reach Finish state from the Start orRS1~RSm-1,and to reach Finish fromRS m,respectively.These transitional delays are given as:

    Length of a transaction,represented as T,is determined by calculating the weighted sum of the delays in every possible path from the Start state to the Finish state with the transitional probability as the weight for an associated transition in Fig.7.

    The length of contention free interval of a iWCS havingnnumber of associated iDevices isDcf=Tb+nT+TCE,whereTbandTCEare the transmission times of a beacon and contention free end(CFE)frames,respectively.Hence the throughput,S,of iWCS is

    here L is the size of data frame andEcis the bandwidth loss due to the interference from the coexisting gWLAN running in CSMA mode and is given as.

    5 Calculating Interference Probabilities

    In this section,we calculate the interference probabilities of data and ACK frames.Both interference probabilities depend on the number of stations in the collocated gWLAN and the frame sizes.LetnCbe the number of stations in the gWLAN,then the transmission probabilityτaccording to[24]is given as

    where p is the collision probability when more than one gWLAN stations transmit with probabilityτin the same time slot and is given asp= 1 -(1 -τ) nc-1.Furthermore,W in(5)is the initial contention window of a station in gWLAN.LetVdataandVackare the number of time slots required for the iWCS data and ACK frames to be transmitted,respectively,then the probability of interference of data and ACK frames are given as

    HereVdataandVackare calculated asTD/σandTA/σ,respectively,σ=9us and is the duration of the time slot for the IEEE 802.11a.SubstitutingPdata,PackandPbusycalculated from(6),(7)and(8)in(1)and(2),throughput‘S’of iWCS in(4)can be calculated.

    6 Model Validation

    In this section,we validate our analytic model via simulations and discuss the results.For simulations we use ns-2 simulator[25].The default ns-2 distribution only has IEEE 802.11 DCF module.For iWCS we modified the WLAN Power Management Extension for ns-2[26].

    The values assigned to PHY/MAC parameters of wiresless networks that is assumed to be employed by both iWCS and gWLAN are given in Tab.1.First of all,Fig.8 shows that the results obtained from ns-2 simulation[25]closely follow the results obtained from the proposed analytical model for various number of iDevices and hence validate the mathematical model.Furthermore,Fig.8 shows iWCS throughput in the absence and presence of gWLAN.iWCS throughput is obtained when the number of iWCS devices vary from 5 to 20 for the fixed payload size of 100 bytes.As shown in Fig.8 iWCS performs better in the absence of gWLAN users i.e.,whennC=0.Furthermore,the lowest iWCS throughput is obtained when there are two gWLAN users are present in the vicinity of iWCS,i.e.,whennC=2.

    Table 1:Parameters for simulation

    Table 1:Continued

    Figure 8:Throughput Comparison of iWCS in the presence and absence of the gWLAN

    Fig.9 shows the packet loss probability with respect to the payload size and number of gUsers present.It can be seen from the figure that the packet loss probability is lowest when the payload size is 50 bytes in the presence of only one gUser.In contrast,packet loss probability reaches highest when the payload size is maximum and the number of gUsers are two.Hence,the packet loss probability reaches high when the vulnerable period is large.Furthermore,iWCS does not suffer any packet loss when there is no gUser in the vicinity,i.e.,whennC=0 and assuming there is no channel error.

    Figure 9:Data frame loss probability of iWCS in coexistence of gWLAN

    Fig.10 shows the transaction length(in milliseconds)against the payload size.Transaction length can be defined as the time when a single packet gets through from the iDevice to the DC.Transaction length is evaluated in the presence of collocated gUsers.It can be seen that transaction takes minimum time when the payload is minimum,i.e.,50 bytes and there is no collocated gUser.In contrast,the transaction time reaches highest when the payload size is 200 bytes and the number of interfering gUsers are two.Hence,Transaction time increases with the increase in interference.The larger the payload size and the number of interfering gUsers the higher will be the transaction time.Fig.10 also validates the accuracy of the mathematical model.

    Figure 10:iWCS Transaction length against varying size of payload

    Fig.11 shows the length of cycle (in other words contention free interval) in milliseconds for various payload sizes and the number of interfering gUsers when the number of iDevices is 10.Contention free period (CFP) is the total time spent to serve each associated iDevice,beacon transmission time and the contention-free end (CFE) frame transmission time.From Fig.11 it is evident that the length of CFP is small when there is no interfering gUser,however,it increases as the size of the payload and the number of interfering gUsers increase.For example,length of CFP is only around 2.7 ms when there are 10 associated iDevices with payload size of 200 bytes and only one interfering gUser,however,the length of CFP reaches almost 3.6 ms when the number of gUsers are increased to two for the same payload size and same number of iDevices.This is almost 33%increase in the total length of the cycle when the number of interfering gUsers increases from one to two.

    Fig.12 shows relationship between frame loss probability and retry limit.It can be seen that frame loss probability decreases with the increase in the retry limitmfor the same payload size.The reason is that interference probabilityPdatais same for the same payload size whereas frame loss probability is an exponential function of retry limit,i.e.,.Although higher retry limit reduces the frame loss probability but it also increases the contention free period thus deteriorating the overall performance of the network.

    Figure 11:Length of contention free period

    Figure 12:Relationship between frame loss probability and frame retry limit

    7 Proposed Adaptive Transmission Power Control (ATPC) Mechanism to Enable the Harmonious Coexistence of iWCS and gWLAN

    In this section,we present our proposed solution to enhance the performance of iWCS when it is collocated with gWLAN.The proposed solution is based on the adaptive transmission power control(ATPC).According to ATPC,an iWCS node sending frame at first try will transmit using default transmission power level as shown in Tab.2 and Fig.13.If transmission is successful,it will receive ACK,otherwise it will select the next transmission power level available on the next retransmission of the frame.Note that the iWCS node adaptively increments power levels which have already been defined.The default transmission power level is the lowest transmission power,i.e.,10.54 dBm,available.Assume that the transmission of the iWCS node is successful at nth retry using the(n-1)th transmission power level,then it will immediately downgrades its transmission power level.In our proposed technique the total number of transmission power levels are equal to the maximum number of retries,i.e.,m which is 10 as shown in Fig.13.

    Table 2:Transmission power levels for adaptive transmission power control

    Figure 13:Gradual increase of transmission power levels with retransmissions

    The adaptive increase in transmission power serves at least one purpose:(i)iWCS transmission is heard by the gWLAN user who will freeze its backoff before transmission,giving a safe transmission opportunity to the former.(ii)Both transmissions overlap in time but physical capture occurs at the respective receivers instead of collision,i.e.,the receiving power of the receiving signal at DC for iDevice is usually higher than that coming from the gWLAN user,thus making physical capture successful.Similarly,the opposite happens at the AP,where gWLAN signal overpowers iWCS.Simulations shows that ATPC does not have significant adverse effect on the performance of gWLAN but it can significantly improve the performance of iWCS.We define four subtypes of ATPC,(i)Slow Increase Slow Decrease(SISD)(ii)Slow Increase Fast Decrease(SIFD)(iii)Fast Increase Slow Decrease (FISD) (iv) Fast Increase Fast Decrease (FIFD).Transmitter will adapt the transmission power upon transmission success or failure according to one of the four mentioned subtypes of ATPC.For example,the iDevice increases its transmission power slowly(additively)for the next transmission attempt when its current transmission is failed.Upon each transmission failure the transmission power is increased till the transmission retry is reached.iDevice may also increase its transmission power fast (exponentially) upon current transmission failure for the next transmission attempt.This slow or fast increase in transmission power level is decided upon which ATPC subtype is used.Similarly,iDevice reduces its transmission power level slowly(additively)or quickly(exponentially)upon each successful transmission till basic(or default)transmission power is reached.Again,whether to reduce transmission power level slowly or quickly depends on the subtype of the ATPC that is used.

    We have defined 10 transmission power levels and have been arranged in ascending order as shown in Tab.2.Now let’s discuss the operation and performance of each subtype.(i)Increase in Transmission Power Level:In SISD,transmission power level is increased slowly when transmission is failed and decreased slowly when transmission becomes successful.Since there is no contention in iWCS and transmission failure due collision is not possible,therefore the only reason of transmission failure is interference due to transmission from the geographically collocated gWLAN nodes.Hence,ATPC is invoked whenever iDevice does not receive ACK in response to its transmission,i.e.,transmission power level is increased additively in SISD.This slow(additive)increase in transmission power level is also used in SIFD.(ii)Decrease in Transmission Power Level:The transmission power decrementing function is invoked at the time of successful transmission.Transmission power level is decremented upon successful transmission,i.e.,when the transmitting iDevice receives ACK frame in response to the transmission.In SISD,this transmission power level is decremented slowly,i.e.,additively till the default transmission power is reached.For example,when the current transmission is successful and the current transmission power level is 5,then it will be decremented to 4.In FIFD,on the other hand,transmission power level decrements fast or in other words,exponentially.For instance,for the 3rd transmission attempt iDevice used the 8th transmission power level and successfully received ACK frame.Now for the next transmission attempt the transmission power level will be reduced exponentially resulting in the 4th transmission power level.Below we discuss the simulation results that have been obtained using the four subtypes of our proposed ATPC scheme.At first we compare the results obtained from using the four proposed approaches when the number of gUsers are only one and compare it with the baseline approach in which transmission power remains default regardless of the success or failure of the transmission.Fig.14a shows that all the four proposed approaches give better throughput compared to the baseline approach.Furthermore,it can be seen that out of the four proposed approaches,FISD outperforms the remaining three adaptive TPC approaches,whereas the throughput obtained from SIFD is just closer to the baseline approach.In FISD,the iDevice increases the transmission power level aggressively but uses a very laid-back approach in reducing the transmission power level when the transmission is successful.It means iDevice retains higher transmission power for comparatively longer duration.In contrast,SIFD uses a laid-back approach in increasing its transmission power level when its transmission is failed and reduces its transmission power level more abruptly upon successful transmission.The remaining two approaches,i.e.,SISD and FIFD give almost average performance.It takes several transmission failures for SISD to set its transmission power to higher level and then slowly reduces its transmission power level on the receipt of ACK control frame from the Point Coordinator.Similarly,using FIFD iDevice increases its transmission power aggressively when it does not receive ACK frame within the defined ACK timeout duration making its transmission successful on the next retransmission attempt.However,using FIFD iDevice does not retain a higher transmission power level for longer time and reduces its transmission power level abruptly upon successful transmission.

    Simulation results for the performance of iWCS when it is collocated with two users of gWLAN is shown in Fig.14b.The performance curve shown in Fig.14b follows almost the same trend shown in Fig.14a.The overall performance of the iWCS when it is collocated with two users is lower than when it is collocated with one gWLAN user regardless of the ATPC scheme being used.However,like the case with one gWLAN user,here too the four proposed ATPC schemes perform better than the baseline mechanism where none of the ATPC scheme is operating.It is also shown in Fig.14b that FISD gives the best performance,whereas SISD and FISD gives above average (Good) performance and SIFD gives the lowest(Average)throughput.After observing the results obtained from the extensive simulations,we place the proposed scheme in one of the following categories:Best,Good and Average,as shown in Tab.3.

    Figure 14:Comparison between four different adaptive transmission power schemes in the presence of(a)one coexisting gWLAN user and(b)two coexisting gWLAN users

    Table 3:Grouping adaptive transmission power control schemes based on performance

    7.1 .Impact of ATPC Employed in iWCS on the Performance of gWLAN

    In previous Section,it was shown that all the ATPC schemes were showing promising results.However,it is important to analyses the impact of ATPC on the performance of the collocated gWLAN as well.In this Section,we show how ATPC impacts the performance of gWLAN.Please note that all the bars show the throughputs of the gWLAN only but maps to the different scenarios.Let us first discuss the throughput obtained by one gWLAN user when it is collocated with iWCS as shown in Fig.15.gWLAN throughput is obtained in both cases when iWCS is not employing any ATPC(Baseline)and when it is employing ATPC(FISD,SISD,FIFD or SIFD).It can be seen that the Baseline scenario achieves highest throughput,i.e.,4.15Mbps) while it achieves approximately 4.10 Mbps throughput when the collocated iWCS is employing the ATPC scheme.This drop in gWLAN throughput is,although,obvious but is not very significant.The reason behind this not so significant performance drop is that the gWLAN user occasionally waits for the iDevice transmission when the latter is transmitting with higher transmission power which exceeds the gWLAN carrier sense threshold forcing it to freeze its backoff.This freezing of the gWLAN backoff also depends on the relative positions of the two users,e.g.,gWLAN and iDevice.In our simulation if the gWLAN user is located within 50meters of the iDevice and the latter is transmitting using ATPC with higher transmission power,the gWLAN can listen iDevice transmission.However,not all iDevices fall in the carrier sense range of the gWLAN user.Furthermore,when iDevice and gWLAN transmit simultaneously,the PHY captures of their respective transmission happen at the respective receivers,giving a higher successful transmission opportunity to the iWCS without impacting the transmission of the gWLAN.

    Figure 15:Impact of ATPC schemes employed in iWCS on the Performance of gWLAN

    From Fig.15,it can be seen that gWLAN throughput is effected differently with different ATPC scheme.For example,it is less effected when iWCS is using SIFD scheme.The reason is that using SIFD,iWCS retains higher transmission power level for small duration and would quickly downgrades its transmission power level immediately after successfully transmission.In contrast,gWLAN performance is not much different when iWCS is using either SISD or FIFD.Finally,gWLAN performance when iWCS is using FISD is more impacted as compared to the situation when iWCS employs one of the remaining three ATPC schemes (such as SISD,FIFD,and SIFD).The reason is that when iWCS transmits using FISD,it quickly acquires higher transmission power level and will retain it for more time.For as long as iDevice transmits with higher transmission power,it will win the PHY capture in case its transmission is overlapped with the gWLAN particularly when the distance between the two heterogeneous devices is less than 50.

    Now that it is obvious from the previous simulation results that FISD outperforms all other adaptive transmission schemes,next we find out the transaction delay and the cycle length,i.e.,CFP.The evaluation of these two parameters are important for the delay critical applications of the industrial network.For both types of delay evaluations,we used only FISD as shown in Fig.16.Firstly,from Fig.16a,it is evident that the transaction time is reduced in both cases,i.e.,when the number of coexisting gWLANs users are one and two,respectively.Transaction time of iWCS in the presence of one and two gWLAN users is reduced from 0.30 ms and 0.4640 ms to 0.25 ms and 0.41 ms,respectively.Secondly,Fig.16b shows complete contention free interval in which all the 10 iDevices in iWCS are served,in the presence of one and two gWLAN users.It is found that the cycle length duration is reduced from 3.7 ms and 5.96 ms to 3.1 ms and 5.1 ms,respectively,in the presence of one and two interfering gWLAN users.Consequently,the overall reduction in delay is approximately 13~15%.

    Figure 16:(a)iWCS transaction delay(b)iWCS cycle length in the presence of gWLAN Users

    8 Conclusion

    In this paper,we proposed an analytic model for the performance analysis of industrial wireless communication system when it shares the wireless medium with the general purpose WLAN(gWLAN) while the later is frequently interfering the former’s transmissions due to its higher transmission power and carrier sense threshold.We found that the performance of the iWCS is severely degraded when collocated with the gWLAN.Our model accurately predicts the performance degradation of iWCS by the collocated gWLAN.The presented model is validated via results obtained from ns-2 simulations.Then,we proposed an adaptive transmission power control(ATPC)mechanism for iWCS to overcome the interference caused by the collocated gWLAN.Results from extensive simulations show that our proposed ATPC scheme outperforms the baseline approach in terms of throughput and delay.In our future work,we will devise an analytical model for the coexistence of wifi-based industrial networks with low-power wireless technologies such as Bluetooth and Zigbee to investigate the performance degradation they cause to each other.

    Funding Statement:This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (No.2018R1D1A1B07049758).

    Conflicts of Interest:The authors declare that they have no conflict of interest to report regarding the present study.

    俺也久久电影网| 欧美三级亚洲精品| 男人狂女人下面高潮的视频| 久久久久性生活片| 久久久国产成人免费| av视频在线观看入口| 免费电影在线观看免费观看| 97超视频在线观看视频| 国产av不卡久久| 久久久精品94久久精品| 一级毛片久久久久久久久女| 亚洲七黄色美女视频| 男人的好看免费观看在线视频| 熟女人妻精品中文字幕| 91精品国产九色| 老师上课跳d突然被开到最大视频| 国产aⅴ精品一区二区三区波| 日韩欧美精品免费久久| 亚洲五月天丁香| 免费观看的影片在线观看| 可以在线观看的亚洲视频| 免费在线观看成人毛片| 成人漫画全彩无遮挡| 国产乱人视频| 日韩一区二区视频免费看| 久久草成人影院| 国产精品爽爽va在线观看网站| av中文乱码字幕在线| 老师上课跳d突然被开到最大视频| 国产一区二区三区在线臀色熟女| 看十八女毛片水多多多| 国产人妻一区二区三区在| 舔av片在线| 久久韩国三级中文字幕| 91久久精品国产一区二区成人| av在线天堂中文字幕| 亚洲自偷自拍三级| 国产一区二区亚洲精品在线观看| 看非洲黑人一级黄片| 国内精品美女久久久久久| 精品少妇黑人巨大在线播放 | 3wmmmm亚洲av在线观看| 秋霞在线观看毛片| 九九热线精品视视频播放| 久久精品人妻少妇| 啦啦啦韩国在线观看视频| 国产精品一区二区三区四区久久| ponron亚洲| 亚洲人成网站高清观看| 国产不卡一卡二| 久久久欧美国产精品| 欧美bdsm另类| 亚洲精品国产av成人精品 | 国产高清三级在线| 国产熟女欧美一区二区| 久99久视频精品免费| 精品人妻视频免费看| 亚洲美女搞黄在线观看 | 久久精品国产亚洲网站| 精华霜和精华液先用哪个| 精品人妻一区二区三区麻豆 | a级毛片免费高清观看在线播放| 国产午夜精品论理片| 国产精品久久久久久av不卡| 不卡一级毛片| 免费看av在线观看网站| 久久久成人免费电影| 免费一级毛片在线播放高清视频| 黄色视频,在线免费观看| 大香蕉久久网| 99riav亚洲国产免费| 日本免费一区二区三区高清不卡| 色视频www国产| 色噜噜av男人的天堂激情| 国内精品久久久久精免费| av在线天堂中文字幕| 精品福利观看| 1024手机看黄色片| 国产 一区精品| 国产精品一区二区免费欧美| 99九九线精品视频在线观看视频| 99久久九九国产精品国产免费| 99在线视频只有这里精品首页| 欧美日韩在线观看h| 国产大屁股一区二区在线视频| 精品久久久久久久久av| 欧美激情久久久久久爽电影| 久久久午夜欧美精品| 一本久久中文字幕| 久久人人精品亚洲av| 国产在视频线在精品| 成人特级av手机在线观看| 校园春色视频在线观看| 日本成人三级电影网站| 美女黄网站色视频| 国产欧美日韩一区二区精品| 免费一级毛片在线播放高清视频| 日本免费一区二区三区高清不卡| 91久久精品国产一区二区三区| 免费在线观看成人毛片| 成人永久免费在线观看视频| 国产精品av视频在线免费观看| 欧美成人a在线观看| 日本一本二区三区精品| 激情 狠狠 欧美| .国产精品久久| 99热这里只有是精品在线观看| 在线看三级毛片| 亚洲精品粉嫩美女一区| av福利片在线观看| 啦啦啦啦在线视频资源| 波多野结衣高清作品| 欧美不卡视频在线免费观看| 中文字幕精品亚洲无线码一区| 草草在线视频免费看| 中文资源天堂在线| 国产淫片久久久久久久久| a级毛色黄片| 亚洲人成网站在线播| 国产在线精品亚洲第一网站| 精品久久久久久久人妻蜜臀av| 国产精品久久视频播放| 久久国产乱子免费精品| 成人一区二区视频在线观看| 欧美xxxx黑人xx丫x性爽| 久久久午夜欧美精品| 国产伦精品一区二区三区四那| 久久国内精品自在自线图片| av在线观看视频网站免费| 午夜精品一区二区三区免费看| 非洲黑人性xxxx精品又粗又长| 精品免费久久久久久久清纯| 大型黄色视频在线免费观看| 亚洲精华国产精华液的使用体验 | 久久久久久久亚洲中文字幕| 精品久久久久久久久久免费视频| 亚洲欧美日韩东京热| 亚洲一区二区三区色噜噜| 午夜福利在线在线| 婷婷六月久久综合丁香| 亚洲最大成人av| 91久久精品国产一区二区成人| 好男人在线观看高清免费视频| 亚洲四区av| 性色avwww在线观看| 国模一区二区三区四区视频| 日韩 亚洲 欧美在线| 亚洲国产精品久久男人天堂| 亚洲无线观看免费| 精品少妇黑人巨大在线播放 | 久久久国产成人免费| 亚洲欧美日韩高清专用| 亚洲五月天丁香| 美女黄网站色视频| 91久久精品国产一区二区三区| 国产精品精品国产色婷婷| 日本欧美国产在线视频| 久久精品夜色国产| 久久久久精品国产欧美久久久| 色5月婷婷丁香| 亚洲经典国产精华液单| 日本黄色视频三级网站网址| 国产精品福利在线免费观看| 男女下面进入的视频免费午夜| 国产成人福利小说| 性色avwww在线观看| 午夜久久久久精精品| 婷婷亚洲欧美| 国产一级毛片七仙女欲春2| 精品一区二区三区视频在线观看免费| 日韩欧美一区二区三区在线观看| 中国国产av一级| 一个人观看的视频www高清免费观看| 午夜福利视频1000在线观看| 麻豆成人午夜福利视频| 人妻久久中文字幕网| 在线播放国产精品三级| 成人精品一区二区免费| 日日摸夜夜添夜夜添小说| 精品福利观看| 国内揄拍国产精品人妻在线| 亚洲最大成人av| 熟女人妻精品中文字幕| 99热精品在线国产| 伦理电影大哥的女人| av.在线天堂| 亚洲精品成人久久久久久| 国产成人福利小说| 18禁裸乳无遮挡免费网站照片| 亚洲第一电影网av| av在线亚洲专区| 悠悠久久av| 男女下面进入的视频免费午夜| 国产成年人精品一区二区| 女生性感内裤真人,穿戴方法视频| 一区二区三区四区激情视频 | 午夜福利成人在线免费观看| 久久久a久久爽久久v久久| 国产精品99久久久久久久久| 亚洲精品日韩在线中文字幕 | 亚洲精品成人久久久久久| 亚洲国产欧洲综合997久久,| 美女内射精品一级片tv| 久久久精品欧美日韩精品| 国产精品免费一区二区三区在线| 欧美一区二区亚洲| 国产真实乱freesex| 人妻丰满熟妇av一区二区三区| 国产黄片美女视频| 欧美日韩精品成人综合77777| 中国国产av一级| 国产淫片久久久久久久久| 久久精品夜色国产| 亚洲av成人av| 18禁在线播放成人免费| 色播亚洲综合网| 欧美丝袜亚洲另类| 99久久成人亚洲精品观看| 国语自产精品视频在线第100页| 少妇人妻一区二区三区视频| 亚洲国产欧美人成| 六月丁香七月| 在线免费观看不下载黄p国产| 极品教师在线视频| 欧美另类亚洲清纯唯美| 午夜福利在线观看吧| 在线免费观看不下载黄p国产| 99久久成人亚洲精品观看| 久久久久久大精品| 久久6这里有精品| 亚洲国产精品成人久久小说 | 校园人妻丝袜中文字幕| 国产精华一区二区三区| 最近中文字幕高清免费大全6| 国产精品久久久久久精品电影| 一级毛片电影观看 | 99视频精品全部免费 在线| 在线a可以看的网站| 搡老岳熟女国产| 欧美一区二区国产精品久久精品| 国产成年人精品一区二区| 成人亚洲欧美一区二区av| 老女人水多毛片| 国产精品野战在线观看| 久久久国产成人精品二区| 亚洲欧美成人综合另类久久久 | 国产成人影院久久av| 欧美成人免费av一区二区三区| 国产精品99久久久久久久久| 精品人妻视频免费看| 亚洲av第一区精品v没综合| 精品人妻熟女av久视频| 大又大粗又爽又黄少妇毛片口| 国产黄片美女视频| 久久精品国产清高在天天线| 午夜福利在线观看吧| 国产aⅴ精品一区二区三区波| 欧美日韩一区二区视频在线观看视频在线 | 亚洲成人久久性| 国产视频一区二区在线看| www日本黄色视频网| 婷婷六月久久综合丁香| 综合色丁香网| 日韩 亚洲 欧美在线| 18+在线观看网站| 欧美+亚洲+日韩+国产| 俺也久久电影网| 久久精品国产鲁丝片午夜精品| 国产视频一区二区在线看| 丰满的人妻完整版| 嫩草影院入口| 国产精品伦人一区二区| 国产伦一二天堂av在线观看| 亚洲精品日韩在线中文字幕 | 日韩 亚洲 欧美在线| 中文字幕人妻熟人妻熟丝袜美| 亚洲,欧美,日韩| 久久精品人妻少妇| 久久久久久久久大av| 亚州av有码| 国产亚洲av嫩草精品影院| 直男gayav资源| 在线观看66精品国产| 一a级毛片在线观看| 久久韩国三级中文字幕| 亚洲欧美精品综合久久99| 特级一级黄色大片| 国产精品福利在线免费观看| 亚洲内射少妇av| av女优亚洲男人天堂| 久久久精品大字幕| 少妇熟女aⅴ在线视频| 老师上课跳d突然被开到最大视频| 亚洲,欧美,日韩| 亚洲精品日韩av片在线观看| 日韩欧美免费精品| 欧美3d第一页| 国产精品乱码一区二三区的特点| 亚洲美女黄片视频| 黄色视频,在线免费观看| 日韩成人av中文字幕在线观看 | 国产欧美日韩精品一区二区| 看十八女毛片水多多多| 欧美潮喷喷水| 精品一区二区三区视频在线| 秋霞在线观看毛片| 日韩在线高清观看一区二区三区| 日产精品乱码卡一卡2卡三| 黄色视频,在线免费观看| 亚洲欧美精品综合久久99| 免费无遮挡裸体视频| 日韩一本色道免费dvd| 亚洲国产欧洲综合997久久,| 日本撒尿小便嘘嘘汇集6| 国产伦一二天堂av在线观看| 久久精品国产自在天天线| 狠狠狠狠99中文字幕| 亚洲美女搞黄在线观看 | 黄片wwwwww| 天天躁日日操中文字幕| 乱码一卡2卡4卡精品| 日本黄色视频三级网站网址| 男女啪啪激烈高潮av片| 最近视频中文字幕2019在线8| 99riav亚洲国产免费| 国产在线精品亚洲第一网站| 亚洲欧美精品自产自拍| 亚洲精品国产成人久久av| 成人鲁丝片一二三区免费| 小说图片视频综合网站| 国产精品国产三级国产av玫瑰| 精品人妻熟女av久视频| 国产精品不卡视频一区二区| av国产免费在线观看| 久久午夜福利片| 天堂网av新在线| 99热这里只有是精品在线观看| 天堂网av新在线| 日韩精品青青久久久久久| 免费大片18禁| 蜜桃久久精品国产亚洲av| 国产精品久久久久久久电影| 我的女老师完整版在线观看| 亚洲最大成人手机在线| 久久久a久久爽久久v久久| 天天躁夜夜躁狠狠久久av| 校园人妻丝袜中文字幕| 欧美另类亚洲清纯唯美| 日本黄色视频三级网站网址| 嫩草影院精品99| 日本三级黄在线观看| 色哟哟哟哟哟哟| 成年女人永久免费观看视频| 欧美xxxx性猛交bbbb| 亚洲色图av天堂| 丰满的人妻完整版| 国产成人aa在线观看| 午夜日韩欧美国产| 欧美最新免费一区二区三区| 国产欧美日韩精品一区二区| av在线蜜桃| 国产精品三级大全| 欧美xxxx性猛交bbbb| 尾随美女入室| 国产精品无大码| 欧美成人a在线观看| 亚洲av电影不卡..在线观看| 大香蕉久久网| 婷婷色综合大香蕉| 欧美成人一区二区免费高清观看| 欧美另类亚洲清纯唯美| 色哟哟哟哟哟哟| 免费大片18禁| 最近2019中文字幕mv第一页| 国内精品久久久久精免费| 亚洲欧美精品自产自拍| 欧美日韩乱码在线| 人妻久久中文字幕网| 亚洲无线观看免费| 一a级毛片在线观看| 俺也久久电影网| 亚洲无线观看免费| 久久久久久久久大av| 国产视频内射| 高清午夜精品一区二区三区 | 成年女人看的毛片在线观看| 精品熟女少妇av免费看| 老熟妇仑乱视频hdxx| 舔av片在线| 亚洲美女搞黄在线观看 | 精品久久久噜噜| 国产三级中文精品| 亚洲七黄色美女视频| 精品一区二区三区av网在线观看| 亚洲美女黄片视频| 欧美成人a在线观看| 看片在线看免费视频| 亚洲美女黄片视频| 久久国内精品自在自线图片| 观看免费一级毛片| av中文乱码字幕在线| 午夜老司机福利剧场| 成人一区二区视频在线观看| 少妇人妻一区二区三区视频| 午夜老司机福利剧场| 色吧在线观看| 国产欧美日韩一区二区精品| 日日摸夜夜添夜夜添av毛片| 我的女老师完整版在线观看| 夜夜夜夜夜久久久久| 国产午夜福利久久久久久| 俄罗斯特黄特色一大片| 日韩欧美国产在线观看| 色在线成人网| 天天躁日日操中文字幕| 在线播放无遮挡| 亚州av有码| 久99久视频精品免费| 精品国内亚洲2022精品成人| 精品久久久久久久久亚洲| 1024手机看黄色片| 亚洲经典国产精华液单| 成年女人永久免费观看视频| 亚洲国产精品国产精品| 婷婷精品国产亚洲av在线| videossex国产| 在线播放无遮挡| 日韩三级伦理在线观看| 成人亚洲精品av一区二区| 国产精品综合久久久久久久免费| 亚洲aⅴ乱码一区二区在线播放| 欧美潮喷喷水| 日日撸夜夜添| 成人二区视频| 91久久精品电影网| 久久久久国内视频| 国产成人freesex在线 | 欧美丝袜亚洲另类| 日本成人三级电影网站| 观看美女的网站| 日韩一区二区视频免费看| 久久中文看片网| 午夜激情欧美在线| 丝袜美腿在线中文| 91在线观看av| 搡女人真爽免费视频火全软件 | 久久久色成人| 免费看光身美女| av免费在线看不卡| 一级黄片播放器| 亚洲中文字幕日韩| 大香蕉久久网| 男人舔奶头视频| 久久精品国产自在天天线| 丰满乱子伦码专区| 又爽又黄a免费视频| 此物有八面人人有两片| 午夜老司机福利剧场| 日韩成人伦理影院| 国产高清视频在线观看网站| 可以在线观看的亚洲视频| 国产成人aa在线观看| 亚洲av五月六月丁香网| 亚洲av.av天堂| 欧美成人免费av一区二区三区| 国产午夜福利久久久久久| 少妇猛男粗大的猛烈进出视频 | 欧美日本亚洲视频在线播放| av在线播放精品| 99热这里只有精品一区| av在线蜜桃| 日日摸夜夜添夜夜爱| 国产亚洲精品综合一区在线观看| 97超视频在线观看视频| 欧美中文日本在线观看视频| 久久久久久九九精品二区国产| 免费观看的影片在线观看| 欧美激情久久久久久爽电影| 久久精品国产自在天天线| 亚洲精品一区av在线观看| 亚洲精品影视一区二区三区av| 亚洲精华国产精华液的使用体验 | 日本-黄色视频高清免费观看| 在线观看美女被高潮喷水网站| 成人一区二区视频在线观看| 免费av毛片视频| 国产中年淑女户外野战色| 不卡一级毛片| 91在线精品国自产拍蜜月| 久久久欧美国产精品| 少妇的逼好多水| 欧美另类亚洲清纯唯美| 亚洲精品成人久久久久久| 成人鲁丝片一二三区免费| 波多野结衣高清无吗| 俺也久久电影网| 欧美绝顶高潮抽搐喷水| 亚洲内射少妇av| 亚洲国产精品国产精品| 国产真实伦视频高清在线观看| 18禁在线无遮挡免费观看视频 | 色综合亚洲欧美另类图片| 美女高潮的动态| 99国产极品粉嫩在线观看| 能在线免费观看的黄片| 国产精品久久久久久久电影| av在线播放精品| 91在线观看av| 男女边吃奶边做爰视频| 又黄又爽又刺激的免费视频.| 一个人观看的视频www高清免费观看| 大又大粗又爽又黄少妇毛片口| 久久亚洲精品不卡| 亚洲一区高清亚洲精品| 91av网一区二区| 成年免费大片在线观看| 中文字幕av成人在线电影| 国产欧美日韩一区二区精品| 国产熟女欧美一区二区| 菩萨蛮人人尽说江南好唐韦庄 | 男插女下体视频免费在线播放| 国产色婷婷99| 3wmmmm亚洲av在线观看| 亚洲一区高清亚洲精品| av在线观看视频网站免费| 春色校园在线视频观看| 欧美最新免费一区二区三区| av在线天堂中文字幕| 国产精品电影一区二区三区| 亚洲18禁久久av| 级片在线观看| 99热网站在线观看| 欧美国产日韩亚洲一区| 3wmmmm亚洲av在线观看| 午夜福利在线在线| 国产亚洲精品久久久com| 波野结衣二区三区在线| 99在线人妻在线中文字幕| 人妻久久中文字幕网| 人人妻,人人澡人人爽秒播| 麻豆国产av国片精品| av天堂中文字幕网| 两个人视频免费观看高清| 一本精品99久久精品77| 国产精品亚洲美女久久久| 久久久久国产精品人妻aⅴ院| 免费不卡的大黄色大毛片视频在线观看 | 日韩精品中文字幕看吧| 日产精品乱码卡一卡2卡三| 久久久久九九精品影院| 精品福利观看| 天天躁日日操中文字幕| 欧美不卡视频在线免费观看| 嫩草影院新地址| 色5月婷婷丁香| 精品人妻视频免费看| 免费看日本二区| 一a级毛片在线观看| 别揉我奶头 嗯啊视频| 久久久久久伊人网av| 老司机福利观看| 精品国产三级普通话版| 亚洲天堂国产精品一区在线| 久久久久久久久久黄片| 乱码一卡2卡4卡精品| 亚洲av美国av| 男人狂女人下面高潮的视频| 天堂影院成人在线观看| 热99在线观看视频| 免费看日本二区| 亚洲精品日韩在线中文字幕 | 亚洲国产欧美人成| 成人精品一区二区免费| 有码 亚洲区| 人人妻人人看人人澡| а√天堂www在线а√下载| 在线观看66精品国产| 一本久久中文字幕| 色哟哟哟哟哟哟| 亚洲成人久久爱视频| 男女啪啪激烈高潮av片| 国内精品美女久久久久久| 国产精品精品国产色婷婷| 亚洲性久久影院| 日韩成人av中文字幕在线观看 | 亚洲美女黄片视频| 国产亚洲91精品色在线| 精品日产1卡2卡| 18禁黄网站禁片免费观看直播| 三级毛片av免费| 久久热精品热| 1024手机看黄色片| 22中文网久久字幕| 国产高清视频在线观看网站| 国产v大片淫在线免费观看| 国内揄拍国产精品人妻在线| 精品久久久久久久久久久久久| 久久久久久伊人网av| 精品久久久噜噜| 国产国拍精品亚洲av在线观看| 中文字幕人妻熟人妻熟丝袜美| 99热只有精品国产| 啦啦啦韩国在线观看视频| a级毛片免费高清观看在线播放| 中文资源天堂在线| 久久6这里有精品| 插逼视频在线观看| 国产精品嫩草影院av在线观看| 人妻夜夜爽99麻豆av| 欧美xxxx性猛交bbbb| 午夜影院日韩av| 成年av动漫网址| 精品乱码久久久久久99久播| 成人综合一区亚洲| 听说在线观看完整版免费高清|