• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Dynamic Multi-ary Query Tree Protocol for Passive RFID Anti-collision

    2022-11-11 10:46:16GangLiHaoyangSunZhenbingLiPeiqiWuDanieleInserraJianSuXiaochuanFangandGuangjunWen
    Computers Materials&Continua 2022年9期

    Gang Li,Haoyang Sun,Zhenbing Li,Peiqi Wu,Daniele Inserra,*,Jian Su,Xiaochuan Fang and Guangjun Wen

    1Centre for RFIC and System,School of Information and Communication Engineering,University of Electronic Science and Technology of China,Chengdu,611731,P.R.China

    2Nanjing University of Information Science&Technology,Nanjing,210044,China

    3Queen Mary University of London,London,United Kingdom

    Abstract: In this paper,a dynamic multi-ary query tree(DMQT)anti-collision protocol for Radio Frequency Identification(RFID)systems is proposed for large scale passive RFID tag identification.The proposed DMQT protocol is based on an iterative process between the reader and tags which identifies the position of collision bits through map commands and dynamically encodes them to optimize slots allocation through query commands.In this way,the DMQT completely eliminates empty slots and greatly reduces collision slots,which in turn reduces the identification time and energy costs.In addition and differently to other known protocols, the DMQT does not need to estimate the number of tags, reducing the protocol implementation complexity and eliminating the uncertainty caused by the estimation algorithm.A numerical analysis shows that DMQT has better performance than other algorithms for a number of tags larger than 300.Meanwhile, when the number of tags is 2000 and the tag identity(ID)length is 128 bits,the total identification time is 2.58 s and the average energy cost for a tag identification is 1.2 mJ,which are 16.9% and 10.4% less than those of state-of-the-art algorithms, respectively.In addition, a DMQT extension based on ACK command has also been presented to deal with capture effect and avoid missing identification.

    Keywords:Anti-collision;DMQT;RFID;dynamic multi-ary query;seamless identification

    1 Introduction

    RFID is attracting a lot of attention from both academic research and industrial environment not only because of historical field of applications like assets management and tracking[1]or indoor localization [2,3], but also for other new potential usages like the implementation of tag-sensors for environmental monitoring[4,5].Furthermore,RFID has been recognized as one of the key technology for the implementation of Internet of Things (IoT)and Internet of Everythings (IoE)paradigms[6].In this context where a multitude of RFID tags are simultaneously connected,it is fundamental to develop anti-collision algorithms specifically designed for RFID; in fact, general multiple access algorithms cannot be applied for RFID due to the limited hardware equipment of tags,especially the passive ones.

    The existing anti-collision algorithms are mainly based on Aloha (where the medium access mechanism is random)and tree (based on deterministic search mechanisms)schemes, and many variants have been proposed during the years(Pure Aloha(PA)[7],Slotted Aloha(SA)[8],Framed Slotted Aloha(FSA)[9],Dynamic Frame Slotted Aloha(DFSA)[10],etc.,and Query tree(QT)[11],Tree Splitting(TS)[12]Binary Search(BS)[13], Bitwise arbitration(BTA)[14],etc.).Clearly, if tree anti-collision algorithms are properly designed, they can offer superior efficiency than other nondeterministic methodologies.

    In QT protocols,the reader probes different ID prefixes(starting from one bit and then iteratively concatenating all the others)to identify all the tags population.In Binary QT protocol, only the most significant bit (MSB)of the collided ID part is used, therefore it generates a large number of collision slots and empty slots during the identification process [15].For this reason, some Multiary QT protocols (which probe tag IDs with multiple M bits simultaneously)have been proposed to improve the system’s identification performance.For this reason, some Multi-ary QT protocols(which probe tag IDs with multiple M bits simultaneously)have been proposed to improve the system’s identification performance.[16]proposes a time-and energy-aware protocol based on M-ary collision tree(MCT)for efficient RFID tag identification,the M is a fixed value,and this may cause many idle slots when M is too large,or several collision slots when M is too small,making difficult to find an optimum performance, [17] is similar to [16] in that it has fixed M value.[18] proposed a bit query algorithm based on Multi-ary query tree (BQMT)protocol to eliminate empty slots.However, the algorithm requires to estimate the number of tags of non-idle nodes,which increases the uncertainty and complexity.In[19],authors proposed an adaptive assigned tree slotted Aloha(AdATSA)protocol,which again needs to estimate the number of tags, and its maximum efficiency is only 61.7%.In[20], Self-learning Smart Trend-Traversal (STT)protocol dynamically changes the length and the value of query prefix,which increases the number of empty slots and,therefore,resulting in a longer identification time.In[21],a collision window tree(CwT)protocol used to transmits W bits instead of the whole ID (0<W<K (K is the bit width of ID)), which causes more time slots than other QT-based protocols,resulting in a longer identification time.

    In this paper,a dynamic multi-ary query tree(DMQT)protocol for passive RFID anti-collision is proposed.Differently from[16-18]which use a fixed M value,the proposed DMQT exploits a dynamic multi-ary tree structure to eliminate the number of empty slots with the consequent minimization of the identification time and required tag energy, and it does not require any number of tags estimation algorithm as in[18,19],avoiding estimation uncertainties and the consequent identification time stretching.Moreover,it employs multi-ary Map command to reduce the transmission overhead similarly to[21],which further reduces the identification time.

    The main contribution of this paper can be summarized as follows:

    1.A DMQT protocol which uses Map command to identify collision bits quantity and position and dynamically group certain portions of tags to minimize the collision probability,and Query command to complete the identification of the grouped tags.The dynamic selection ofMand the Map/Query mechanism is fundamental to eliminate empty slots and minimize collision slots,with the consequent reduction of the identification time.

    2.The DMQT does not rely on any number of tags estimation algorithm, therefore greatly reducing the implementation complexity if compared with[18](which requires such estimation process),and eliminating the uncertainty caused by the estimation algorithm(which in many cases increase the identification time).

    3.An extensive numerical analysis is performed to benchmark the performance of the proposed DMQT and compare it with other existing algorithms,confirming the validity of the proposed algorithm.Moreover, a simple algorithm extension is proposed for coping with the capture effect,whose performance is also numerically verified.

    2 Preliminaries:Bit Tracking and ID Query

    In this paper, we mainly focus on large RFID systems, i.e., the identification of a large number of passive tags.Readers have no prior knowledge of the distribution of tags around them (they do not know the number of tags and their ID information), and adopt the reader-talk-first model to work.Tags respond to commands issued by readers.As the number of tags in RFID system may reach thousands to tens of thousands and all tags share the same communication channel, tag collisions easily happen which increases the collision time slot and identification time.How to quickly identify a large number of tags is a big challenge for RFID system[22-27].

    In RFID systems,Manchester encoding is often used to identify collision information.Manchester Encoding is a line code,in which every bit of data will have a transition in the middle of the data bit after coding [28].In general, the transition from high to low level (down edge)in the middle of the data represents data 1,and the transition from low to high level(up edge)represents data 0.If the receiver receives two tags returning different information at the same time, this will cause the rising edge and falling edge to cancel each other,resulting in the appearance of an illegal symbol,which the receiver can consider as a collision[29].As shown in Fig.1,it is assumed that the IDs of the two tags are“10101101”and“11101011”,respectively.

    Figure 1:Manchester coding

    The ID of the two tags is encoded using Manchester code, and sent to the receiver at the same time,resulting in the received code“1x101xx1”,where“x”represents the collision bit.As a result,the receiver can detect collisions with 3 bits of data.The receiver can estimate the number of tags around it according to the collision information and some tag number estimation algorithms,thus improving the identification efficiency of RFID system[30].Finally,due to the very low modulation signal rate of the tag and the commands issued by the reader,bit-wise synchronization of tag responses is assumed[18,31,32].

    3 Proposed DMQT Description

    For the sake of a better comprehension and to make the paper more readable,Tab.1 summarizes the notation employed in this work.

    Table 1: Notation used in this work

    The proposed DMQT protocol is composed of a multi-ary Map command and a Multi-tags query command.The Map command is used to sound the distribution of collision bits, while the Query identifies tags and/or obtains collision information.Fig.2 describes the timing logic of DMQT.Except for the first Map command(M=0),there is a one-to-one correspondence between Map commands and Query commands.The Map command can obtain ID distribution of matched tags, and then perform targeted group identification in Query to eliminate empty slots.The DMQT can continuously identify multiple tags or obtain collision information of multiple groups of tags using Query,reducing the identification time and power consumption.WhereTMis the time when the reader sends the Map command,T1is the tag response time,T2is the reader response time,T3is the tag response interval in the adjacent sub-slots in Query command,TRis the duration of the tag response signal,and‘reps’is the response of tag.

    As shown in Fig.2, the DMQT algorithm has no empty slots, and only the success slots and collision slots.The Query command has multiple sub-slots.The sub-slots are the success slots without collision,and the sub-slots are the collision slots with collision.

    Figure 2:DMQT algorithm timing

    The proposed DMQT protocol is based on a“map and query”iteration process.A Map command is firstly executed to locate the collision bits,select one portion of these bits,and identify the number of collided bit patterns,while the query command is employed to splits the tag ID patterns into different slots.This operation is executed iteratively until no collisions are identified within slots.The length of the collided patterns and the number of slots is updated dynamically to minimize the required identification time.The DMQT identification process is shown in Fig.3, where the number of tagsNtag=9.

    Figure 3:Proposed DMQT protocol

    3.1 Multi-ary Map Command

    The structure of the Map command(simply Map in the follows)is shown in Tab.2.The fieldLenindicates the length of the fieldInfowhich is the portion of ID before the most significant collision bit;Mindicates the number of fields~present which denote the position of the firstM-1 collided bits(the first collided bitis at positionLen+1 therefore is not included).

    Table 2: Structure of Multi-ary Map

    At the beginning,the reader sends a Map withM=0 and waits for tag response.When the reader receives the tag response,it determines the newMvalue and all the other fields required to generate the new Map,which is then sent to tags.the newMvalue as

    Here, theLindicates the number of collision bits received by the reader (the maximum value is the length of tag ID,ID_length),andis rounded down.According to Formula(1),whenx=2 andL=128,the maximum value ofMis 7;Whenx >2,M <7.The choice of the logarithmic function in(1)has been inspired by the common sense.Nevertheless,the parameterxhas been left free to provide a certain degree-of-freedom to the logarithmic function,as it will be shown in Section 4.

    Table 3: Tag response to Map

    The structure of tag replies to Map is instead depicted in Tab.3.When a tag receives a Map, it checks whether itsLenmost significant bits(MSB)of ID matchInfo;in this case,it setsMask_flag=‘1’,Anti_tagID={bit1,bit2,...,bitM},andTag_mdas

    It is worth noting that for each tag only one bit of(2)will be‘1’,and its position withinTag_mdwill be the correspondent decimal value ofAnti_tagIDplus 1=bin2dec(Anti_tagIDk)+1,k∈{1,...,N}(whereNis the number of replying tags),e.g.,ifM=3 andAnti_tagID={‘101’},then=5 andTag_md= {‘00100000’}.In this way, the reader can useTag_mdto fully recover bit1,bit2,...,bitMvalues which will be used to generate the query command.If the ID prefix does not matchInfo,the tag remains silent and setsMask_flag=‘0’.

    When reader receives theNtag replies,it checks the number of collision bits ofTag_md,n,and their positions,In this way,the reader can recover(i)the originalMbits of theNtags ID with the inverse function of(2),i.e.,

    and(ii)the number of replied differentAnti_tagIDpatternsn.It is worth noting thatn≤Nbecause more than one tag may share the sameAnti_tagIDpattern, and these tag IDs will be discriminated successively.

    3.2 Multi-tag Query Command

    The structure of the query command(simply Query in the follows)is shown in Tab.4.The Query divides the Map matched tags intonsubsets corresponding tonslots,ordered according to[which is determined by the reader from the result of(2)].

    When a tag receives the Query, it firstly checks whetherMask_flag= ‘1’and, if not, it stays silent; otherwise, the tag (i)locates its correspondent reply slot within Query, i.e., the subset with{bit1,bit2,..,bitM}=Anti_tagID,and(ii)it sends back its Remnant ID(except the portion included inInfo)within the correspondent slot according to the reply structure in Tab.5.Obviously, when only one tag replies within one slot, this tag will be identified by the reader.Otherwise, the reader will detect new collisions,and it will generate one new Map for each collision slot based on the collided bits information,pushing these Map commands into a stack,which will be executed at the end of the Query.

    Table 4: Structure of the Multi-ary Query

    Table 5: Tag response to Query

    Note that since the tag responds to the remnant ID,the generatedInfomust include theInfofrom the previous Map command.The newInfois as follows:

    Here,Info(old)comes from the previous Map command, andInfo(rem)is generated based on the remnant ID.In the same way,the newlyLenshould be added theLen(old)from the Map command:

    Here,is generated based on the remnant ID.If the remnant ID received by the reader in a subslot is“010x11xx01”,thenInfo(rem )=“010”and=3.

    The time duration of each slot will be

    Therefore,thei-th slot will be delayed by

    The reader can calculate the total time of executing the Query command as:

    The reader calculates the execution time required by Query according to Eq.(8).When the Query is completed, the reader will pop a Map from the stack executing the Map-Query process until the stack is empty,and updating theLenvalue at each step as the previousLenplus the length of the newInfofield.

    4 Numerical Analysis

    A numerical analysis of the average and total identification time and average energy cost of the proposed DMQT protocol is now presented (simulations have been carried out according to parameters listed in Tab.6).

    Table 6: Simulation parameters

    The average energy consumption has been introduced in[16]by estimating the total reader energy required for performing the identification of a tag population,divided by the number of tags under the assumption of constant power(only the RF signal transmission required energy has been taken into account which is the largest energy contribution[33]).During the identification process(of durationTtotal),in fact,the reader should always transmit signals,and therefore the reader employs a total energy ofPtx×Ttotal.For what tags concern, instead, the reader consumes an extra energy contribution to receive and process tag replies, and therefore this extra energy is estimated asPrx×TR,tot.For this reason,the average energy cost has been estimated as:

    Eq.(9)shows that it is not only important to reduceTtotal, but also theTR.totto the end of reducing the average energy consumption.The proposed DMQT algorithm can minimize both the total identification durationTtotal(because of the elimination of the empty slots and the reduction of the collision slots)and the tag replies timeTR.tot(because of the reduced number of reader-tag interactions and the transmission overhead).Nevertheless,becausePtxis larger thanPrx[16],andTtotalis longer thanTR.tot,Ptx×Ttotal/Ntag=Ptx×Tavgplays a dominant role in(9).Moreover,becausePtxis constant,Eavgfollows the same trend ofTavg.For this reason,DMQT performanceTavghas been firstly investigated as a function of the parameterx,i.e.,the base of the logarithm in(1),and simulation results are shown in Fig.4.Becausexis too small will produceM=8 or more,leading to tag the returnedTag_mdis too long,make the Query command to produce too much of the time slot,and affect the synchronization between tag and reader.So, the paper sets the maximumMto 7, which makes the response data of tags(M2)do not exceed the length of tag ID,consistent with the other papers[18].

    As it can be seen,Tavgis minimized forx=2.1 or 2.2 when the number of tags is within the range 400-1300,when the number of tags is greater than or equal to 1300,Tavgis minimized forx=1.9.Here,theTavgof somexare very similar because the maximumMvalues generated according to thesexare the same(as in Eq.(1),Mis rounded down).For example,the maximumM=6 forx=2.1 andx=2.2,and the maximumM=5 forx=2.3 tox=2.6.In addition,thexdetermines the maximum value ofM.Whenxis smaller,there will be a larger value of M,which is applicable to the case of a large number of tags.On the contrary,whenxis larger,there is a smaller value ofM,which is applicable to the case of a small number of tags,as proved in Fig.4.Therefore,the subsequent simulation analysis ofx=2.2(for conventional application scenarios)andx=1.9(for scenarios with a large number of tags)is mainly carried out.Meanwhile,the proposed DMQT protocol(withx=1.9 andx=2.2)has been compared with other existing algorithms described above,and simulation results are reported in Fig.5,showing the superiority of the proposed scheme when the number of tags is more than 300.In particular,when the number of tags is 2000(withx=1.9),the total identification time is less than 2.58 s,and it corresponds to an average energy costs less than 1.2 mJ,which are 16.9%and 10.4%less than those of state-of-the-art algorithms,respectively.

    Figure 4: Comparison of the proposed DMQT simulations results for different x values for average identification time

    Figure 5:Comparison of DMQT simulation results with other referred algorithms.(a)Total identification time,and(b)Average energy costs

    5 Discussion

    In a passive RFID system,when multiple tags reply to the reader simultaneously,it is possible that one tag’s signal is much stronger than other signals,leading to the so-called capture effect[34].If the capture effect occurs,the original collision slot will be turned into a singleton slot,which accelerates the identification process [17].However, the capture effect may cause missing identification [34-38].Although the most part of the published papers ignore the capture effect [33,39-41], in order to improve the robustness of the DMQT algorithm, this effect shall be considered.When the capture effect exists,it may be possible that some tags uninterruptedly reply to the reader’s inventory disturbing the communication with weak signal tags(seamless identification phenomenon).Therefore,DMQT can be optimized by adding a response mechanism based on the ACK command to avoid the replies of tags already identified,i.e.,when the reader recognizes one tag,it sends an ACK command.When receiving an ACK command, the identified tag enters the identification state and does not respond to subsequent identification commands.At the same time, when the reader detects that the stack is empty,it continues a new identification process until there is no tag response in the new identification process.The format of the ACK command is shown in Tab.7,it does not require the tag to return a response signal.

    Table 7: Structure of the ACK command

    When receiving an ACK command,the tag matching Remnant ID setsRecognized_flag=1,then the tag will not respond to the reader identification command.In order to ensure that the reader and tag can correctly generate and process ACK command,some improvements should be made to DMQT Query timing to meet the requirements of the reader and tag processing timing.The timing logic of Query after adding ACK command is shown in Fig.6.Before adding an ACK,the tag does not need to care about whether the sub-slot is a collision slot or not, and only needs to return the response information in the allocated sub-slot.However,the timing logic adding ACK differs from Fig.2.In fact,the fixedT3cannot be used as the guard time between two continuous sub-slots.Here,T2is still used to represent the time between the end of the tag response and the ACK sent by the reader,andT3is replaced byT4(1.5T2)to ensure that the reader has enough time to generate the ACK command.

    Figure 6:Query timing logic with ACK command

    Since the ACK does not occur in every slot, the tag must be delayed according to the time slot status.The matching tag(Mask_flag=1)will record the number of successful time slotsSCN,and tag setsSCN= 0 at the start of each Query.According to Fig.6,in the success time slot,the reader will send an ACK,and the extra time consumed is as follows:

    Therefore,after the Ack is added,the delay time of the i-th sub-slot of the Query is:

    According to Fig.6,the reader can calculate the total time of executing Query as:

    After adding an ACK,the identified tag enters the identification state.If no further processing is performed,the tag in the identification state may not respond to subsequent identification commands.To improve system reliability,the tag must be removed from the identification state under the control of the reader.This function can be achieved through different combinations ofMandLenvalues in the Map.Its combined functions are shown in Tab.8.To prevent tag missing identification under capture effect, DMQT will continue to send a “seamless identification”command when the stack is empty,that is,send Map(M=0,Len=1)for a new identification round.If the reader does not receive any reply after sending the seamless identification,the identification process is complete.

    The need of the ACK command makes the identification longer, also because more than one inventory is necessary to identify all tags(in fact,stronger signal tags are initially identified during the first inventory round,and weaker signal tags are identified in successive inventories).Performance of the proposed modified DMQT in the presence of the capture effect has been simulated similarly to[17],and results are shown Fig.7(pis herein used to represent the probability of capture effect occurrence).

    Table 8: The function represented when M and Len take different values

    Figure 7:Modified DMQT simulation results for different capture effect probabilities

    As it can be seen,TtotalandEavgslightly increase with the increase ofpbecause at the end of one inventory, another one is executed to verify the presence or not of other weaker signal tags.Nevertheless, the use of the ACK command and theRecognized_flagcan effectively extend the use of the DMQT algorithm to cases in which capture effect occurs.

    6 Conclusions

    This paper presents a dynamic multi-ary query tree collision protocol for RFID systems which can completely eliminate empty slots and greatly reduce collision slots.The proposed scheme is based on an iterative process between reader and tags which aims at locating all collision bits and dynamically encoding them to optimize slots allocation, which reduces the identification time and energy costs.Particularly, simulation results have revealed that the total identification time and the average energy costs are less than 2.58 s and 1.2 mJ,respectively,when the number of tags is from 300 to 2000,both lower than those of other existing algorithms,making the DMQT protocol very suitable for improving the anti-collision state-of-the-art performance of passive RFID systems.Finally, the DMQT is extended with the use of ACK command to cope with the capture effect,showing excellent identification performance.

    Funding Statement:The authors received funding for this study from the National Key R&D Program (https://chinainnovationfunding.eu/national-key-rd-programmes/), project contract No.2018YFB1802102(G.W.)and 2018AAA0103203(W.T,F.X,G.W.),from the National Natural Science Foundation of China(https://www.nsfc.gov.cn/),project contracts No.61971113(G.W.)and 61901095(D.I.), from the Guangdong Provincial Research and Development Plan in Key Areas (https://chinainnovationfunding.eu/funding-programmes-guangdong-province-2/), project contracts No.2019B010141001(G.W.)and 2019B010142001(G.W.),from the Sichuan Provincial Science and Technology Planning Program (https://www.sc.gov.cn/10462/10758/10759/10763/2010/10/28/10147629.shtml), project contracts No.2020YFG0039 (G.W.), 2021YFG0013 (G.W.), and 2021YFH0133(D.I.), from the Ministry of Education (http://en.moe.gov.cn/)and China Mobile (http://www.chinamobileltd.com)Joint Fund Program, project contract No.MCM20180104 (G.W., G.L.), and from the fundamental research funds for the Central Universities (managed by Department of Finance,https://www.fmprc.gov.cn/mfa_eng/wjb_663304/zzjg_663340/cws_665320/),project contract no.YGX2019Z022(G.W.,G.L.,D.I.).

    Conflicts of Interest:The authors of this paper declare that there are no conflicts of interest regarding the publication of this paper.

    精品久久久久久电影网| xxx大片免费视频| 午夜久久久久精精品| 美女高潮的动态| 91精品伊人久久大香线蕉| 在线观看美女被高潮喷水网站| 免费看美女性在线毛片视频| 国产成人福利小说| 国产亚洲最大av| 国产精品人妻久久久影院| 欧美精品国产亚洲| 九色成人免费人妻av| 亚洲av福利一区| or卡值多少钱| 久久精品久久精品一区二区三区| 日韩欧美精品免费久久| 夫妻午夜视频| 舔av片在线| 午夜亚洲福利在线播放| 一区二区三区乱码不卡18| 亚洲精品成人av观看孕妇| 日韩欧美国产在线观看| 午夜免费观看性视频| 波野结衣二区三区在线| 国产成人精品福利久久| 亚洲精品aⅴ在线观看| 三级男女做爰猛烈吃奶摸视频| av.在线天堂| 国产av在哪里看| 国产一区二区三区av在线| 自拍偷自拍亚洲精品老妇| 汤姆久久久久久久影院中文字幕 | 在线天堂最新版资源| 久久久久国产网址| 看十八女毛片水多多多| av天堂中文字幕网| 黄色配什么色好看| 午夜福利网站1000一区二区三区| 91aial.com中文字幕在线观看| 亚洲精品日韩av片在线观看| 97超视频在线观看视频| 国产乱人视频| 免费观看a级毛片全部| av又黄又爽大尺度在线免费看| av在线天堂中文字幕| 最近视频中文字幕2019在线8| 成人特级av手机在线观看| www.色视频.com| 亚洲怡红院男人天堂| av国产免费在线观看| 99热网站在线观看| 国产一区二区亚洲精品在线观看| 我的女老师完整版在线观看| 日本av手机在线免费观看| 亚洲精品国产av成人精品| 97精品久久久久久久久久精品| 极品少妇高潮喷水抽搐| 成年av动漫网址| 天堂√8在线中文| 亚州av有码| 搡老妇女老女人老熟妇| 免费观看的影片在线观看| 99热全是精品| 国产黄色视频一区二区在线观看| 久久精品夜夜夜夜夜久久蜜豆| 国产精品无大码| 国产高潮美女av| 精品国产一区二区三区久久久樱花 | 亚洲国产欧美在线一区| 亚洲av.av天堂| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 简卡轻食公司| 最后的刺客免费高清国语| 精品欧美国产一区二区三| 日本爱情动作片www.在线观看| 免费看光身美女| 最近中文字幕2019免费版| 自拍偷自拍亚洲精品老妇| 久久久国产一区二区| 欧美另类一区| 麻豆国产97在线/欧美| 亚洲精品久久午夜乱码| 亚洲人与动物交配视频| 国产 一区 欧美 日韩| 久久亚洲国产成人精品v| 插阴视频在线观看视频| 国产69精品久久久久777片| 夫妻午夜视频| 精品人妻偷拍中文字幕| 免费看不卡的av| 少妇熟女aⅴ在线视频| 人妻夜夜爽99麻豆av| 精品一区二区免费观看| 国产免费视频播放在线视频 | 九草在线视频观看| 欧美三级亚洲精品| 久久精品人妻少妇| 国产毛片a区久久久久| 九九爱精品视频在线观看| 国产成人精品一,二区| .国产精品久久| 亚洲精品视频女| 日韩不卡一区二区三区视频在线| 久久久成人免费电影| av在线播放精品| 久99久视频精品免费| 国产麻豆成人av免费视频| 日本一本二区三区精品| 成年版毛片免费区| av国产免费在线观看| 亚洲av一区综合| 亚洲婷婷狠狠爱综合网| 如何舔出高潮| 亚洲精华国产精华液的使用体验| 黄色一级大片看看| 亚洲激情五月婷婷啪啪| 免费电影在线观看免费观看| 欧美zozozo另类| 成人鲁丝片一二三区免费| 中文字幕久久专区| 色5月婷婷丁香| 在线天堂最新版资源| 国产乱人视频| 菩萨蛮人人尽说江南好唐韦庄| 最近视频中文字幕2019在线8| 亚洲精品影视一区二区三区av| 国产黄色视频一区二区在线观看| 最近最新中文字幕大全电影3| 欧美一级a爱片免费观看看| 亚洲性久久影院| 欧美区成人在线视频| 久久国产乱子免费精品| 最近视频中文字幕2019在线8| 在现免费观看毛片| 亚洲成人久久爱视频| 韩国高清视频一区二区三区| 国产91av在线免费观看| 精品久久久噜噜| 国产午夜精品论理片| 观看美女的网站| 色播亚洲综合网| 亚洲精品日本国产第一区| 久久精品夜夜夜夜夜久久蜜豆| 国产精品一及| 国产成人一区二区在线| 赤兔流量卡办理| 国产成人午夜福利电影在线观看| 日本av手机在线免费观看| 日韩亚洲欧美综合| 干丝袜人妻中文字幕| 日韩欧美一区视频在线观看 | 欧美成人午夜免费资源| 中国美白少妇内射xxxbb| 日日啪夜夜撸| 色吧在线观看| 91av网一区二区| 国产毛片a区久久久久| 午夜福利高清视频| 日韩三级伦理在线观看| 亚洲国产最新在线播放| 亚洲人成网站在线播| 国产精品99久久久久久久久| 日韩人妻高清精品专区| 777米奇影视久久| 午夜免费激情av| 高清在线视频一区二区三区| www.av在线官网国产| 国产精品福利在线免费观看| 噜噜噜噜噜久久久久久91| 能在线免费观看的黄片| 精品久久久噜噜| 免费观看av网站的网址| 亚洲国产精品专区欧美| 亚洲高清免费不卡视频| 精品99又大又爽又粗少妇毛片| 国产精品99久久久久久久久| 国产黄频视频在线观看| 搡老乐熟女国产| 麻豆乱淫一区二区| 国产伦在线观看视频一区| 亚洲精品日韩在线中文字幕| 91aial.com中文字幕在线观看| 久久久久久久久久黄片| 日本免费在线观看一区| 一区二区三区高清视频在线| 国产亚洲91精品色在线| 午夜福利在线观看吧| 久久久久久久久久久丰满| 日韩,欧美,国产一区二区三区| 国产 一区精品| 久久97久久精品| 女的被弄到高潮叫床怎么办| 伦精品一区二区三区| 2022亚洲国产成人精品| 嫩草影院精品99| 日韩一区二区三区影片| 国产伦理片在线播放av一区| 又大又黄又爽视频免费| 亚洲av.av天堂| 免费大片18禁| 日本欧美国产在线视频| 嘟嘟电影网在线观看| 午夜精品一区二区三区免费看| 人妻一区二区av| 亚洲精品亚洲一区二区| 色吧在线观看| 美女内射精品一级片tv| 亚洲av电影不卡..在线观看| 国产亚洲精品av在线| av在线观看视频网站免费| 国产高清国产精品国产三级 | 大香蕉久久网| 国产午夜精品久久久久久一区二区三区| 午夜激情久久久久久久| 好男人在线观看高清免费视频| 欧美成人精品欧美一级黄| 色5月婷婷丁香| 久久久久久九九精品二区国产| 亚洲国产欧美人成| 亚洲一区高清亚洲精品| 麻豆成人av视频| 亚洲自拍偷在线| 欧美性猛交╳xxx乱大交人| 亚洲精品成人av观看孕妇| 亚洲在线自拍视频| 不卡视频在线观看欧美| freevideosex欧美| 国产高清有码在线观看视频| 亚洲国产成人一精品久久久| 女人久久www免费人成看片| 免费播放大片免费观看视频在线观看| 国产综合精华液| 97精品久久久久久久久久精品| 日韩视频在线欧美| 1000部很黄的大片| 久久久国产一区二区| av在线播放精品| 麻豆av噜噜一区二区三区| 秋霞伦理黄片| 22中文网久久字幕| 嫩草影院精品99| 免费在线观看成人毛片| 欧美高清成人免费视频www| 亚洲成人av在线免费| 亚洲欧美精品专区久久| 一级a做视频免费观看| 日韩亚洲欧美综合| 精品99又大又爽又粗少妇毛片| 国产伦一二天堂av在线观看| 天天躁夜夜躁狠狠久久av| 国产av不卡久久| 午夜福利在线观看吧| av线在线观看网站| 黄色日韩在线| 亚洲av.av天堂| 视频中文字幕在线观看| 51国产日韩欧美| 青春草视频在线免费观看| 亚洲av日韩在线播放| 亚洲熟妇中文字幕五十中出| 国产片特级美女逼逼视频| 午夜视频国产福利| 国产黄频视频在线观看| 亚洲精品国产成人久久av| 久久精品国产亚洲网站| 欧美日本视频| 亚洲精品成人久久久久久| 国产高清有码在线观看视频| 一级av片app| 亚洲av二区三区四区| 亚洲精品乱久久久久久| 久久人人爽人人片av| 人人妻人人澡人人爽人人夜夜 | 亚洲aⅴ乱码一区二区在线播放| 中文在线观看免费www的网站| 黄色一级大片看看| 高清日韩中文字幕在线| 少妇人妻精品综合一区二区| 少妇高潮的动态图| 最新中文字幕久久久久| 一本一本综合久久| 99re6热这里在线精品视频| 七月丁香在线播放| 简卡轻食公司| 色5月婷婷丁香| 亚洲欧洲国产日韩| 少妇人妻精品综合一区二区| 在线a可以看的网站| 国产一区亚洲一区在线观看| 国产黄色视频一区二区在线观看| 日韩在线高清观看一区二区三区| 国产av在哪里看| 免费观看性生交大片5| 免费黄网站久久成人精品| 在线a可以看的网站| 97超视频在线观看视频| 亚洲国产精品成人久久小说| 欧美97在线视频| 日韩av不卡免费在线播放| 日韩成人av中文字幕在线观看| 国产91av在线免费观看| 亚洲国产高清在线一区二区三| 亚洲国产欧美在线一区| 午夜老司机福利剧场| 99久国产av精品国产电影| 免费看不卡的av| 精品一区二区三区人妻视频| 色吧在线观看| 午夜激情福利司机影院| 成年版毛片免费区| 在线免费观看的www视频| 国产精品伦人一区二区| 少妇人妻一区二区三区视频| 成人二区视频| 中文欧美无线码| 水蜜桃什么品种好| 日韩一本色道免费dvd| 大香蕉97超碰在线| 亚洲国产高清在线一区二区三| 亚洲高清免费不卡视频| 国产男女超爽视频在线观看| 一区二区三区免费毛片| 国产老妇女一区| 毛片一级片免费看久久久久| 国产白丝娇喘喷水9色精品| 午夜亚洲福利在线播放| 日本熟妇午夜| 国产黄片视频在线免费观看| 亚洲最大成人中文| 丝袜美腿在线中文| 亚洲经典国产精华液单| 国产成人a∨麻豆精品| 少妇熟女aⅴ在线视频| 亚洲av一区综合| 日韩成人伦理影院| 国产精品精品国产色婷婷| 一级二级三级毛片免费看| 青春草视频在线免费观看| 99久久精品热视频| 天堂影院成人在线观看| 免费av毛片视频| 亚洲人成网站在线播| 五月伊人婷婷丁香| 精品久久久久久成人av| 日韩制服骚丝袜av| 国产乱人偷精品视频| 在线观看一区二区三区| 中文字幕免费在线视频6| av免费观看日本| 亚洲精品中文字幕在线视频 | 色播亚洲综合网| 国产毛片a区久久久久| 69人妻影院| 国产精品99久久久久久久久| 国产高清有码在线观看视频| 亚洲色图av天堂| 午夜福利视频精品| 国产黄片美女视频| 欧美日韩国产mv在线观看视频 | 搞女人的毛片| av在线播放精品| 成人高潮视频无遮挡免费网站| 午夜亚洲福利在线播放| 国产成人精品福利久久| 嫩草影院入口| 夫妻性生交免费视频一级片| 丰满少妇做爰视频| 免费观看av网站的网址| 在线免费十八禁| 国产精品综合久久久久久久免费| 免费黄色在线免费观看| av播播在线观看一区| 欧美丝袜亚洲另类| 久久99蜜桃精品久久| 日本黄色片子视频| 美女大奶头视频| 一级av片app| 亚洲精品日韩av片在线观看| 蜜桃久久精品国产亚洲av| 搡女人真爽免费视频火全软件| 久久精品国产亚洲av天美| 国内揄拍国产精品人妻在线| 亚洲精品一区蜜桃| 国产欧美另类精品又又久久亚洲欧美| 国产欧美日韩精品一区二区| av一本久久久久| 日韩在线高清观看一区二区三区| 天美传媒精品一区二区| 国产黄片美女视频| 美女cb高潮喷水在线观看| 欧美日韩一区二区视频在线观看视频在线 | 日韩av免费高清视频| av专区在线播放| 男女国产视频网站| 欧美人与善性xxx| 免费观看性生交大片5| 国产精品一区二区三区四区免费观看| 欧美成人一区二区免费高清观看| 亚洲欧美一区二区三区黑人 | 国产三级在线视频| 国产精品久久久久久久久免| 国内揄拍国产精品人妻在线| 观看免费一级毛片| 国产亚洲午夜精品一区二区久久 | 蜜臀久久99精品久久宅男| 久久精品久久久久久久性| 久久国产乱子免费精品| 亚洲图色成人| 又大又黄又爽视频免费| 成年免费大片在线观看| 国产精品一区二区性色av| 亚洲美女视频黄频| 青青草视频在线视频观看| 观看免费一级毛片| 搡女人真爽免费视频火全软件| 少妇熟女欧美另类| 寂寞人妻少妇视频99o| 91精品伊人久久大香线蕉| 国产成人一区二区在线| 亚洲国产欧美人成| 日本一本二区三区精品| 国产精品av视频在线免费观看| 青春草国产在线视频| ponron亚洲| 国产在视频线精品| 三级经典国产精品| 校园人妻丝袜中文字幕| 80岁老熟妇乱子伦牲交| 亚洲精品乱久久久久久| av线在线观看网站| 美女主播在线视频| 色视频www国产| 久久久亚洲精品成人影院| 午夜精品在线福利| 黄色日韩在线| av在线播放精品| 伦精品一区二区三区| 激情五月婷婷亚洲| 中文字幕久久专区| 美女黄网站色视频| 精品人妻一区二区三区麻豆| 亚洲国产精品sss在线观看| 97精品久久久久久久久久精品| 国产精品一区二区在线观看99 | 国精品久久久久久国模美| 久久久久久久久中文| 亚洲熟妇中文字幕五十中出| 亚洲天堂国产精品一区在线| 久久国产乱子免费精品| 一级黄片播放器| 中文字幕av成人在线电影| 丰满少妇做爰视频| 女人久久www免费人成看片| 嫩草影院精品99| 国产色婷婷99| 精品一区二区免费观看| 国产91av在线免费观看| 亚洲国产精品sss在线观看| 亚洲精品成人av观看孕妇| 91久久精品电影网| 老司机影院成人| av.在线天堂| 性色avwww在线观看| 人体艺术视频欧美日本| 国产精品美女特级片免费视频播放器| 伦精品一区二区三区| 校园人妻丝袜中文字幕| 欧美日韩一区二区视频在线观看视频在线 | 校园人妻丝袜中文字幕| 插逼视频在线观看| 最近2019中文字幕mv第一页| 3wmmmm亚洲av在线观看| 免费少妇av软件| 亚洲av电影在线观看一区二区三区 | 亚洲成人av在线免费| 简卡轻食公司| 3wmmmm亚洲av在线观看| 天堂网av新在线| 欧美性猛交╳xxx乱大交人| 女人久久www免费人成看片| 午夜精品在线福利| 91aial.com中文字幕在线观看| 国产在线一区二区三区精| 国产国拍精品亚洲av在线观看| 中文资源天堂在线| 丰满少妇做爰视频| 神马国产精品三级电影在线观看| 欧美成人午夜免费资源| 有码 亚洲区| 少妇熟女aⅴ在线视频| 免费观看的影片在线观看| 2022亚洲国产成人精品| 亚洲精品一区蜜桃| a级毛片免费高清观看在线播放| 成人高潮视频无遮挡免费网站| 男插女下体视频免费在线播放| 久久久亚洲精品成人影院| 久久久久久久大尺度免费视频| 国产精品一及| 街头女战士在线观看网站| 亚洲人成网站在线播| 又粗又硬又长又爽又黄的视频| 麻豆成人av视频| 一级毛片我不卡| 中文天堂在线官网| 欧美极品一区二区三区四区| 国产av不卡久久| 十八禁网站网址无遮挡 | 日韩精品青青久久久久久| 精品99又大又爽又粗少妇毛片| 国产亚洲91精品色在线| 亚洲欧美日韩东京热| 99久国产av精品国产电影| 国产精品福利在线免费观看| 老女人水多毛片| 听说在线观看完整版免费高清| 国产精品一区二区三区四区免费观看| 麻豆成人午夜福利视频| 欧美日韩精品成人综合77777| 国产成人a区在线观看| 亚洲18禁久久av| 老女人水多毛片| 日韩av在线免费看完整版不卡| 国产精品日韩av在线免费观看| 午夜视频国产福利| 麻豆国产97在线/欧美| 亚洲丝袜综合中文字幕| 亚洲欧美成人综合另类久久久| 在线观看美女被高潮喷水网站| 国产又色又爽无遮挡免| 一级二级三级毛片免费看| 少妇熟女aⅴ在线视频| 国产成人a∨麻豆精品| 高清午夜精品一区二区三区| 欧美xxxx黑人xx丫x性爽| 身体一侧抽搐| 日韩一区二区三区影片| 五月伊人婷婷丁香| 亚洲国产精品国产精品| 亚洲熟妇中文字幕五十中出| 国产探花在线观看一区二区| 丰满乱子伦码专区| 高清视频免费观看一区二区 | 国产色婷婷99| 国产一区二区亚洲精品在线观看| 亚洲av中文字字幕乱码综合| 日韩大片免费观看网站| 日韩视频在线欧美| 久久久精品94久久精品| 国产午夜精品一二区理论片| 亚洲av一区综合| 看十八女毛片水多多多| 婷婷色综合www| 亚洲av日韩在线播放| 亚洲国产精品成人久久小说| 欧美日韩一区二区视频在线观看视频在线 | 欧美不卡视频在线免费观看| 欧美成人a在线观看| 夫妻性生交免费视频一级片| 欧美日韩国产mv在线观看视频 | 性色avwww在线观看| 在线a可以看的网站| 国内精品宾馆在线| 精品熟女少妇av免费看| 大香蕉97超碰在线| 我的老师免费观看完整版| 99久久精品国产国产毛片| 欧美区成人在线视频| 一区二区三区免费毛片| 免费av不卡在线播放| av国产久精品久网站免费入址| 波野结衣二区三区在线| 18禁在线无遮挡免费观看视频| 亚洲成人av在线免费| 能在线免费看毛片的网站| 九草在线视频观看| 在线观看美女被高潮喷水网站| 亚洲在久久综合| 成人午夜高清在线视频| 免费大片黄手机在线观看| 两个人视频免费观看高清| 久久久久国产网址| 91精品伊人久久大香线蕉| 伦理电影大哥的女人| 一二三四中文在线观看免费高清| 欧美不卡视频在线免费观看| 国产免费视频播放在线视频 | 视频中文字幕在线观看| 中文资源天堂在线| 欧美性感艳星| 色5月婷婷丁香| 69人妻影院| 国产男女超爽视频在线观看| 最近手机中文字幕大全| 国产精品一区二区性色av| 国产成人aa在线观看| 国产精品国产三级专区第一集| 成人鲁丝片一二三区免费| 国产不卡一卡二| 日韩欧美国产在线观看| 97超视频在线观看视频| 啦啦啦韩国在线观看视频| 91久久精品国产一区二区三区| 亚洲,欧美,日韩| videossex国产| av网站免费在线观看视频 | kizo精华| 免费观看性生交大片5| kizo精华| 午夜亚洲福利在线播放| av天堂中文字幕网| 能在线免费观看的黄片| 欧美日韩精品成人综合77777| 国产精品麻豆人妻色哟哟久久 | 国产久久久一区二区三区|