• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Deployment of Edge Computing Nodes in IoT:Effective Implementation of Simulated Annealing Method Based on User Location

    2024-02-29 10:35:10JunhuiZhaoZiyangZhangZhenghaoYiXiaotingMaQingmiaoZhang
    China Communications 2024年1期

    Junhui Zhao ,Ziyang Zhang ,Zhenghao Yi ,Xiaoting Ma ,Qingmiao Zhang

    1 School of Electronic and Information Engineering,Beijing Jiaotong University,Beijing 100044,China

    2 School of Information Engineering,East China Jiaotong University,Nanchang 330013,China

    Abstract: Edge computing paradigm for 5G architecture has been considered as one of the most effective ways to realize low latency and highly reliable communication,which brings computing tasks and network resources to the edge of network.The deployment of edge computing nodes is a key factor affecting the service performance of edge computing systems.In this paper,we propose a method for deploying edge computing nodes based on user location.Through the combination of Simulation of Urban Mobility(SUMO)and Network Simulator-3(NS-3),a simulation platform is built to generate data of hotspot areas in IoT scenario.By effectively using the data generated by the communication between users in IoT scenario,the location area of the user terminal can be obtained.On this basis,the deployment problem is expressed as a mixed integer linear problem,which can be solved by Simulated Annealing (SA) method.The analysis of the results shows that,compared with the traditional method,the proposed method has faster convergence speed and better performance.

    Keywords: deployment problem;edge computing;internet of things;machine learning

    I.INTRODUCTION

    With the large scale deployment of 5th Generation Mobile Communication Technology (5G) networks,the information society has been rapidly changing from the pure Internet to the Internet of Things(IoT),and human society has gradually entered the mode of interconnection of all things [1,2].The advanced communication and bandwidth capabilities of 5G can meet the requirements of high-reliability connections for IoT applications and contribute to the development of the IoT[3,4].IoT gives access devices the ability to see,listen,and think through communication technologies,Internet protocols,and applications,turning these physical devices into intelligent objects.With the help of cloud computing big data and mobile Internet,the combination of digital and physical world is realized [5].According to the Cisco Report Visual Network Index (VNI),the number of global mobile devices will grow to 13.1 billion by 2023,of which 1.4 billion will support 5G,and the number of 5G devices and connections will account for more than 10 percent of global mobile devices and connections [6].More and more physical devices and virtual devices are connected to the network at an unprecedented speed,and information is exchanged in the network to achieve information sharing,which is also the ultimate concept of IoT[7].

    With the ultra density access of IoT devices,the IoT has ushered in arduous challenges in terms of low latency and highly reliable connections [8,9].For example,the smart medical system based on IoT puts forward higher requirements for reducing system delay and ensuring network security,so that the effect of telemedicine is closer to traditional medical treatment.Moreover,the relay protection of the smart grid requires a minimum delay of 15 milliseconds;industrial control requires a delay of 1 to 10 milliseconds;and automatic driving technology requires a minimum delay of 3 to 5 milliseconds.Therefore,as the basic guarantee conditions for the construction of smart cities,communication networks are faced with upgrades and transformations in terms of reducing delays and improving the reliability of network connections.Due to the increasing number of devices and growing diverse demands of different services,achieving efficient use of resources remains challenging,and methods must be developed to meet the emerging needs of IoT [10].Improving hardware is a proper method to reduce delay [11],but we usually sink business functions located on the network cloud to the edge of the network,and as close as possible to the data source location.Besides,big data can be used to effectively standardize and optimize edge computing nodes,improve the system capacity and operating efficiency of IoT systems,and reduce data processing delays.

    Mobile Edge Computing(MEC)can bring network service business to the edge of the network,establish a server between the service user and the service host,and complete network tasks[12].Edge computing nodes are usually deployed in remote data centers and close to clients.In IoT systems,it is unquestionable that the tasks need to be offloaded to the edge of network.In addition,critical communications that are sensitive to delay and interference from the surrounding environment add much complexity because they require top-notch reliability and availability while ensuring ultra-low latency.As is shown in Figure 1,MEC can be applied to various scenarios such as IoT,smart cities,and smart transportation.The service delay of communication channels can be minimized by setting the network service facilities to the edge of the network,and thus MEC becomes the core solution to these problems.

    Figure 1. Mobile edge computing deployment diagram.

    MEC technology attempts to build a computing resource environment close to the user,which is the Radio Access Network(RAN).RAN has the advantages of high performance,high bandwidth,high reliability,and low latency for some IoT applications.To ensure the complex data processing and low-latency communication requirements of the future cellular IoT,how to scientifically and reasonably deploy edge computing nodes is an urgent problem needed to be tackled.Therefore,it is necessary to use big data analysis to learn the interference,load,traffic,and the number of daily access devices in the edge computing nodes of the existing cellular IoT micro base stations in a certain area.Under the criterion of delay,the deployment requirements of edge computing nodes in a certain area can be modeled.The established edge computing deployment requirement model is more accord with the communication demands of the cellular IoT in the set area,in which the communication delay of the entire system can be greatly reduced.Besides,it is necessary to reduce communication costs and communication resource occupation in edge computing [13].Due to the distributed nature of edge computing,a certain number of edge computing nodes need to be deployed in a certain cellular IoT network area,the deployment costs and operating costs have become the key issues.By optimizing the selection of edge computing nodes,deployment and maintenance costs can be greatly reduced.However,due to the large number of trade-offs involved,such as the communication needs of hot spots in the cellular IoT,deployment solutions are usually difficult to obtain.Therefore,a method for deploying edge computing nodes based on user location is proposed in this paper.The main contributions of this paper are summarized as follows:

    ? Based on the prediction information and user node movement model,a general edge computing node deployment scheme is designed,which can dynamically adjust the layout strategy according to the changes of end user nodes.

    ? In the proposed edge computing nodes deployment scheme,the changes in communication scenarios and models of connection costs,operating costs,and delay costs are considered to make the results more realistic and reliable.

    ? Using the regional positioning prediction model,the main parameters of the optimal configuration strategy for edge computing nodes are realized,and the dynamic allocation of edge nodes to computing resources is realized.

    ? Based on the prediction parameters,a set of edge computing node deployment algorithms based on Simulated Annealing (SA) is proposed to ensure the optimal layout strategy of edge computing nodes,including the location of edge computing nodes and the resource allocation of each edge computing node.

    This article is organized as follows: Section II introduces related work and problems faced.In Section III,the system model of this paper is proposed.Section IV mainly introduces the preparations for experimental simulation and summarizes the framework scheme with its main features,Section V presents the evaluation results of edge computing node deployment,and the conclusion is summarized in Section VI.

    II.RELATED WORK AND FACED PROBLEMS

    The deployment of IoT edge computing nodes is the basic condition for completing the research on key technologies for future communication networks with low-latency,high-reliability IoT technologies.User terminals in the IoT have strong mobility,randomness,periodicity,non-stationarity,and spatial correlation,which not only causes changes in network topology,but also puts forward stricter requirements for low latency and high reliability of network connections.At the same time,when considering the distributed characteristics of edge computing and the large number of edge computing nodes which to be deployed,cost of deployment and operations is also a key issue to be faced with.In this case,research on deployment schemes of edge computing nodes becomes crucial.In this part,we summarize the existing research work.

    Cloud computing is one of the most effective methods for processing big data.However,cloud computing resources are usually concentrated in mainframe computers of data centers which is away from most cellular IoT terminals.Therefore,there could be high latency between the IoT terminal and the cloud,reducing the processing rate of the data,and consuming a lot of bandwidth resources.In order to solve these problems,Satyanarayanan et al.in[14]proposed edge computing so that the edge access network can compute and store resources.In[15–17],researchers had pointed out that edge computing can be used to shift workloads from a centralized cloud to the edge of network,improve response time and save network resources.

    Some researchers have realized that the generated data can be hosted on the edge network to achieve low-latency data processing in the Internet of Vehicles.Mach et al.in[18]introduced the framework of MEC and proposed how to balance low-latency user requirements and reducing power consumption.In [19],the authors solved the problem of effective deployment of edge computing nodes in smart cities,and introduced a mixed integer linear programming formula that can minimize the deployment cost of edge devices by meeting the goals of network coverage and computing user traffic requirements.The proposed method can accurately model a complex urban environment with many buildings and a large number of vehicles.In [20],the authors proposed a flexible and mature edge computing architecture to support Internet of Vehicles services with strict latency requirements.At the same time,it focuses on the extended virtual sensing service,which aims to use the data collected by the network infrastructure to enhance the sensor measurement on the vehicle,and use this information to obtain better safety and improve the comfort of passengers or drivers.

    However,these studies have not considered the diversity of user node traffic data types in edge computing.The business types and requirements of the existing user nodes mostly depend on the probability distribution of user nodes.There is no comprehensive analysis of the characteristics of user traffic data.Besides,the parameter assumptions are ideal in those papers,and it would be better to built system model for the real scenarios.Simultaneously,with the increase of the feature variable of user node data,the existing user node traffic model is difficult to reasonably classify and process these data,thus the high reliability and low delay communication can not be guaranteed.

    In [21],the author proposed a solution for edge server deployment,with the goal of optimizing the service performance and operating cost of the edge infrastructure.The main difference from traditional server deployment methods is that the proposed method can find unpredictable edge deployment locations,thereby reducing the cost of edge configuration more comprehensively and efficiently.In[22],the author considered an MEC system with multiple users,which combines 5G and MEC.In the proposed solution,a base station with an MEC server can not only provide computing offloading services,but also provide data caching services.In[23],the authors solved the problem of effectively deploying a limited number of edge nodes in urban scenarios under a limited budget.They used a 5G architecture edge computing paradigm,in which storage,computing,and network resources are brought to the edge of the network.The effectiveness of vehicle applications is directly related to the correct deployment of edge nodes.The authors in[24]proposed an edge computing node deployment scheme with dynamic virtual functions,which can generate edge node deployment strategies based on prediction information.The proposed layout plan uses cloud computing pay-as-you-go and competitive instance models,which can easily and flexibly allocate service resources with low cost.In [25],the author optimized the system cost by considering the calculation price,energy consumption and delay together.By minimizing the system cost,an intelligent shunting strategy based on ant colony optimization algorithm was proposed,in which the ants randomly visit computational access points to obtain the final result.

    The above research results all reflect the superiority of edge computing,but when it is specifically applied to IoT,the existing node deployment schemes lack the optimization analysis of the Internet of Things user data.According to the business needs of IoT users in different industries,it is necessary to obtain accurate user types and behavior portraits by analyzing user data,and then obtain the deployment requirements of edge computing nodes.Since the edge network is closer to the terminal of IoT,the real data of the terminal can be obtained in real time,and these data have full dimensions,including parameters such as location,time,and behavior.After analyzing these more reliable data,accurate information such as the time and distribution of various behaviors of IoT terminals can be obtained,and then implement customized service with low-latency and high reliability through customized edge computing node deployment.

    In order to ensure that the future IoT can handle complex data and meet the requirements of low latency and high reliable communication,edge computing nodes need to be deployed scientifically and reasonably.In this paper,big data analysis is applied to learn the interference,load,traffic and daily average number of access devices in a certain area.Under the guidelines of maximizing throughput and minimizing communication delay,the deployment requirements of edge computing nodes in a certain area are modeled based on the real scenarios.The established edge computing deployment requirement model is more in line with the communication requirements of the cellular IoT in the set area,which greatly reduces the communication delay of the entire system.

    III.SYSTEM MODEL

    In this section,an innovative point of deploying edge computing nodes in the IoT is based on the data generated by user nodes in a network scenario.Data mining technology is used to mine the business needs of different industries and different IoT terminals in the network.This learning method obtains accurate user types and behavior trajectories,and obtains hot spot distribution of user nodes’communication areas in the IoT,which provides a foundation for the deployment of edge computing nodes.

    In this part,we first build a cellular IoT network.Then,according to the Signal Interference plus Noise Ratio(SINR)value between the user node and the base station,a neural network is used to train the location area.The obtained training model can locate the user equipment in the location area,thereby determining the number of edge computing node devices in the IoT network.Finally,an optimization model for edge computing nodes is proposed,and the optimal deployment area is determined by SA algorithm[26].

    3.1 Cellular IoT System Model

    The accurate IoT terminal network model can not only improve the authenticity of the prediction model,but also help the smooth completion of the deployment of edge computing nodes.We set Beijing,China as the target area for the deployment of MEC services,because it has a complex network environment,diverse user business types and a large amount of communication data.From OpenStreetMap,we get a map of the center of Beijing,which contains information such as roads and buildings.It provides a good simulation environment for user nodes with multiple business functions.We select a part of XiDan commercial district covering an area of 1.5 times 0.8 square kilometers as our simulation area.After that,we use the tools provided by Simulation of Urban Mobility (SUMO)to extract road networks and buildings to generate a simulation environment.In SUMO simulation platform,the impact of buildings is not considered.The area surrounded by red lines in Figure 2 shows the map of the considered deployment area.In the simulation area,user terminals such as pedestrians and vehicles send communication data to the nearby base station,and then access the core network after processing by the MEC server.

    Figure 2. Traffic models of user terminals with different business functions.

    Then in the Network Simulator 3 (NS-3),the user node behaviors generated by SUMO are combined to build a cellular IoT network model.This model takes into account the communication obstacles caused by the existence of the building,and considers the material,structure,height and other factors of the building,which is ideally suited for the dense structure of the deployment area.NS-3 can bind traffic trajectories generated from SUMO to user nodes,and can edit the messaging protocol standards of user nodes.In the network environment,the type and size of buildings can be added to affect the transmission of communication,so as to be closer to the real scene.In addition,NS-3 can simulate events such as signal transmission conflicts and low signal strength,which will cause information loss.

    In the simulation,the communication between the vehicle and the eNB refers to the IEEE 802.11p standard.The eNB transmit power level is set to 23 dBm.The communication vehicle and user terminal send a message every second with a payload of 1040 bytes.The key parameters and related values used in the NS-3 simulation are shown in Table 1.

    Table 1. NS-3 network parameters.

    3.2 Positioning System Model

    We use NS-3 platform for communication simulation.In the simulation process,we will consider the interference of the complex environment,such as the occlusion of buildings and the fading type of the selected channel,which will lead to a large uncertainty in the signal strength received by the user node.SINR can measure the quality of the connection link between the user node and the base station,so the value of the SINR can be selected as a parameter for locating the user node.After setting the network environment according to the parameters in Table 1,the SINR values collected by NS-3 are initially processed and used as the input of the neural network training model,and the actual location area of the user node is used as the output result of the neural network training model.After three layer neural network training,the positioning model is obtained.

    We use feed-forward neural networks to train the localization model [27].The neural network collects a large number of known inputs and outputs and selects a learning process to train these data.Generally,a certain learning algorithm can be used to find the nonlinear relationship between input and output.Then,use this relationship to build a neural network learning model.Finally,use the trained model to predict the output based on the new input,and judge the effect of the model based on the output result.

    According to the amount of data collected by user nodes and the complexity of the communication network environment,we have added three hidden layers to the Hiddenlayer of the neural network.The nodes of each layer are called neurons in the neural network.

    We considered back propagation (BP) neural network,which is a neural network learning algorithm with supervised learning.In this neural network,each neuron is only connected to neurons in adjacent layers.The BP neural network will analyze the error between each training result and the expected result,and then modify the weight and threshold iteration to obtain a model that can gradually output consistent with the expected result.

    The algorithm learning process is mainly divided into neural transmission and weight update.

    In the process of neural transmission,the input signal is connected to the output node through the hidden layer,and the output signal is generated after the nonlinear transformation.When the actual output does not match the set output,the actual output will be compared with the expected output to generate an error,and then the error will be propagated back.Given the training set [(x1,y1),(x2,y2),...,(xn,yn)],where xi∈RI,yk∈RK.It means that the input example consists of I attributes,and the output is a K dimensional variable.The hidden layer is denoted by[h1,h2,...,hJ].Then the jth hidden layer neuron hjand the kth output layer neuron ykare computed by

    The activation function introduces a nonlinear factor to the neuron,so that the neural network can approach any nonlinear function arbitrarily.In this paper,we used the Sigmod function,which can transform the input signal between negative infinity and positive infinity into an output between 0 and 1.The activation function is defined as

    In the process of the update of the weights,the output errors are gradually transferred back to the input layer through the hidden layer,and these errors are distributed to all neurons in each layer.The weight adjustment is based on the size of the error value obtained in each layer.In a training example (xn,yn),the threshold of the kth neuron in the output layer is represented by θk.Suppose the training output of the neural network is,where

    Then the error of this prediction result can be expressed by the least square method:

    The next step is to adjust the values of the parameters of each layer according to this error,and reduce Enstep by step.In summary,we can know thatfirst affects βk,then,and finally En,so we can get:

    where η is training speed,

    Using the same method,update the weights of the input layer and hidden layer.The neural network training ends when the error reaches an acceptable range.

    3.3 Edge Computing Node Optimization Model

    In order to formulate an edge computing node deployment plan restricted by low latency and high reliability,user nodes with different service types distributed in a given area are modeled as traffic generators as shown in Figure 3.Edge computing node locations are set to a Mixed Integer Linear Problems (MILP),which is the main goal of optimizing the invest of the entire edge network network.Table 2 summarizes the notation used in the optimization model.

    Table 2. Simulation parameters.

    Figure 3. Map describes service user locations and hot spots.

    This model requires some assumptions to simulate various display challenges.First of all,the transmission delay is assumed to be the transmission delay between the serving user and the base station,and the processing delay can be obtained from the trance file generated during the NS-3 simulation process.Secondly,because the nature of the problem is combinatorial,in order to reduce the calculation time and make the MILP formula solvable,we assumed that the initial edge nodes are randomly generated and the position coordinates are known.And then,in the simulation process,the data transmission rate and the amount of data to be transmitted are different for each user.We use the NS-3 LTE module to configure the parameters.Finally,according to the requirements of 5G,a delay of 10ms is selected as the maximum coverage of the edge node (i.e.,LM=10ms).For the tasks with lower latency,we take another restriction.Our optimization goal is to minimize the deployment cost of edge computing nodes under the condition that the terminals can communicate well with edge computing nodes in the IoT scenario.Therefore,the optimization problemP1is formulated as:

    The optimization objective function in (10a) represents the cost to be considered for deploying edge computing servers.The first term is the fixed cost of deploying edge computing servers,which is mainly related to the number of edge computing servers.We determine the number of edge computing servers based on the number of users in the hotspot area.The second term represents the cost required for each user to connect to the edge computing server serving him,which is mainly related to the delay of data transmission and processing.The data can be obtained through the trace command of NS-3.The third term is the service level demand cost,which is mainly related to the business type of user nodes.For example,for vehicle user nodes and mobile device nodes in the IoT scenario,the corresponding k values are different,and the service Sj,kprovided by edge computing nodes are also different.The fourth term is the cost of edge computing node resource configuration,which is mainly determined by the type of user node and the amount of data transmission.In the communication data simulation stage,use the LTE module in NS-3 to configure different data transmission rates for mobile device nodes or vehicle user nodes,and use trace commands to obtain processed data.

    The constraint in (10b) allows an edge computing server to be deployed at location i only if there is at least one user in UL within its coverage range,which is determined by the location of edge computing nodes in the previous work.As any user node in UL can be covered by one or more edge computing nodes in PL,the constraint condition (10c) reflects that the sum of the computing resource allocation provided by all the covered edge computing nodes must be equal to the total computing resources of the user node demand.After that,the edge computing node in PL which provides computing resources to user nodes in UL meets the constraint (10d),the computing resources allocated by edge computing node at i to user node at j cannot exceed the maximum capacity that i can provide.The constraint (10e) describes the relationship between the computing resources required by the user node at j and the edge computing node deployed at i,which is restricted by yi,j.Moreover,in the constraint(10f),if the user node at j is not covered by the edge computing node at i,the computing resource demand between i and j is forced to zero.Similarly,in constraint(10g),if edge computing node is not placed at i,then there is no computing resource demand for any user nodes at this location.When the user node at j is connected to the edge computing server at i,the delay between them is determined by constraint(10h).User node constraints are restricted by formula(10i).(10j)limits the value range of the parameters and expresses the decision variables as binary integer variables.

    IV.EXPERIMENTAL SIMULATION AND FRAMEWORK OVERVIEW

    This section first collects and preprocesses the data as an input part of the entire system model.Then the data evaluation method is introduced.Finally,we make a reasonable analysis of the simulation results.Figure 4 outlines the specific processes used to solve the rational deployment of edge computing nodes and the methods for evaluating their performance.

    Figure 4. Overview of methods for evaluating the performance of edge computing server deployment.

    4.1 Simulation of Cellular IoT in NS-3

    NS-3 is a network simulator composed of discrete events.It has the advantages of open source code and wide applicability.We can build more realistic and more diverse scenarios in it,and can consider a variety of interference buildings that affect communication transmission to meet the needs of this research.

    In this part,we collected the SINR values in scenarios with sparse user nodes and scenarios with dense user nodes.Prepare for the next experiment to get the localization model by training the SINR value in different scenarios through neural network.

    Based on the LTE module of NS-3 platform,we modify the corresponding parameters and build a cellular IoT scenario to meet the need of experimental.

    We considered the Friis spectrum propagation loss model as the channel fading model for simulation.This model has the characteristic that the power of the wireless signal exhibits a regular attenuation as the distance increases.The path-loss function PRX(d) is defined as a Friis transmission equation:

    where GTXand GRXare gains of the transmitting and receiving antennas respectively,transmission power is expressed as PTX,and the wavelength is expressed as λ.The distance between the base station and the user node is d.In general,the index α is chosen form 2 to 5.

    We use the constant A to replace the invariant in(11).It can be seen that the power of the received signal changes with distance.Then the SINR value has a certain non-linear relationship with the distance from the base station to the user node.Therefore,the SINR value of multiple base stations can be used to determine the area where the user node is located.

    In order to collect enough data,we divide the network scenario into 9 areas and select four base stations near the middle of the network as the base stations for collecting SINR.In summary,the value of SINR between the ith base station and one of the user nodes is

    where diis the distance between the user node and the ith base station.The interference power is denoted by Pi,which is mainly affected by the interference of the signal power of the surrounding base stations and user equipment.The power of noise is expressed as Pn,and its expression is

    where N0is the one-sided spectral density of additive white Gaussian noise,B is the value of bandwidth.

    We can use the callback command in NS-3 to get the SINR trace file,as shown in Table 3.

    Table 3. Trace of SINR.

    As exhibited in the table,the trace file mainly contains four key parameters.The simulation running time in seconds represents the simulation situation between the base station and the user node at that moment.CellId is the cell number of the collected data.International Mobile Subscriber Identity (IMSI) is an identification code that is used to distinguish different users in a cellular network and is not repeated in all cellular networks.The SINR value reflects the linearaverage of all resource blocks (RB) between the ith base station and the jth user node.In order to collect valid SINR data and make the positioning model accurate,a threshold value will be set for the collected SINR value.We reserve the data where the SINR value exceeds the threshold value.For those values below the threshold,it will be artificially modified to 0.

    At the same time,based on the selected actual area,we use the building module of NS-3 platform to build buildings.Building construction takes into account the height of the floor,the size of the floor plan and the construction materials,because these are the factors that affect the signal transmission.

    NS-3 contains three kinds of fadingtrace,namely Extended Pedestrian A model (EPA),Extended Vehicular A model (EVA) and Extended Typical Urban model (ETU).Considering the diversity of user node types,we mainly considered the EPA and EVA scenarios,and their moving speeds are 3 kmph and 60 kmph respectively.As shown in Figure 5,we have selected the change graph of SINR value under different scenarios and different numbers of user nodes.It is a simulation result of a unified two dimensional value grid,which represents the strongest SINR signal value of the base station at each point in the down link under different conditions.

    4.2 Training Experiment of Positioning Model

    Figure 5a shows the distribution of SINR values without considering scene fading.It changes linearly with the distance from the base station.In the case of adding the fading trajectory,considering the interference of the user equipment to the received and transmitted signals,the value of SINR will not decrease fixedly as the distance increases,but will show irregular changes with time and location.Therefore,the signal scene of Figure 5a is no longer considered,which has no reference for the prediction of the regional position.

    Combined with the content of the Section III,we considered a neural network model with three hidden layers.The input data is a four dimensional matrix of SINR values containing four base stations.After three layers of hidden layer training with 10 neurons in each layer,the output is a nine dimensional matrix containing nine location regions.We use random 80 percent of the collected data as the training set,and the remaining 20 percent as the test set.It is set that when the accuracy of the test set prediction exceeds 90 percent,the training of the neural network is stopped,and a regional positioning model based on SINR is obtained.Collect the data of the new user node in the simulation platform again,and use these data as the verification set.The performance is measured by comparing the predicted user node location with the corresponding value of the validation set data.We consider the mean square error for performance measurement.The following equations give the definitions:

    where Stestis the amount of data in the validation set,t(i)is the location of the ith user node predicted by the neural network regional positioning model,and y0(i)is the actual location of the ith user node.

    After the training of the neural network training model is completed,we use the simulation platform to regenerate a large amount of data to verify the model.The result is shown in Figure 6.

    Figure 6. The relationship between MSE and user nodes in EVA and EPA scenarios.

    As can be seen from Figure 6,compared with the result of[28],our experimental results have a greater improvement.This is due to the different divided areas and the different number of base stations selected for positioning.In[28],a hexagon is equally divided into 6 areas with the same area.The closer to the center,the closer the user node receives the SINR value from each base station,which will cause a prediction error.In this research,we divided the selected network scenario into 9 less crowded areas.The user node receives the SINR value from each base station to have a better discrimination,so the prediction effect will be better.From the results in Figure 6,it can be found that under the two channel fading trace,the results of position prediction are similar.This shows that the training model has good adaptability to the environment,and the change of the environment has little effect on the prediction of regional positioning.When the number of user nodes increases in the network environment,its prediction performance will decrease.This is because the interference signal in the network increases with the increase in the number of users,which leads to larger prediction errors.

    4.3 Introduction of Edge Computing Node Deployment Framework

    The main goal of this section is to output the ranking of potential edge computing nodes in order to minimize costs by choosing the best deployment location.The optimized deployment framework of edge computing nodes is shown in Figure 7.We determine the specific parameters of the area generated by SUMO and establish a coordinate system according to the simulation requirements.At the beginning of the simulation,the delay threshold,potential node deployment location,data transmission delay,number of edge computing nodes,computing resources,and user node requirements are limited.In order to adapt our framework to the need of cellular IoT,we modify the LTE module in NS-3 and adjust the parameters according to the 5G technical requirements and currently determined technologies.

    Figure 7. Framework for deploying edge computing nodes based on simulated annealing.

    The simulation of the optimized deployment of edge computing nodes has mainly gone through two stages of data collection and analysis as well as simulation and output.

    In the data collection and analysis stage,the collected data is normalized to meet the need of subsequent simulations.The SceneSelection module builds models of buildings and roads on the map to simulate real world interference,and generates user nodes to simulate demand distribution and user demand levels.In the next module,we will collect data by categories to divide the area of interest.Through the area positioning algorithm,the number of edge computing servers is determined to obtain the distribution of user data hot spots in the service area.When the demand is distributed in a large area with fewer user nodes,it is further optimized by analyzing key information such as the delay threshold and data transmission delay.Check whether there is a user node that needs service in each service area,and determine whether an edge computing node is to be deployed in this area.This stage allows us to simplify the areas where the number of users does not reach the service threshold,deploy a small number of edge computing nodes in these areas,or connect to edge computing nodes in other service areas,so the operating costs and deployment costs can be reduced.When data collection is completed,the normalized processing module is used to meet the simulation requirements of the next stage.

    In the simulation and output stage,the optimization problem of edge computing node deployment is NPhard.Therefore,based on the SA method proposed by the predecessors,it was selected as the solution because it can list the desired results and has the applicability to solve the deployment of edge computing nodes.This is because the Metropolis criterion of the SA algorithm allows to accept a certain degraded solution,which is to accept a non-optimal solution with a certain probability.The Metropolis criterion is the key to the SA algorithm converging to the global optimal solution.And the Metropolis criterion accepts the degraded solution with a certain probability,so that the algorithm jumps from the local optimal trap.The acceptance probability Pais

    where f(Sn) is the optimization result of the deployment cost of edge computing nodes after the nth iteration,T is the temperature during the current optimization process,and rand is a randomly generated random number in the (0,1) interval.Snis accepted as the new current solution when the acceptance probability value is greater than rand,otherwise the current solution Sn?1is retained.After introducing new key constraints,it is necessary to model a new problem of a more comprehensive cost function and obtain a method to solve the cost problem.After obtaining the deployment location of the edge computing node according to this method,it is necessary to check whether each location where the edge computing node is deployed is suitable.In addition,the analysis of user node locations and the differences in service levels bring additional complexity to the solution.

    V.ANALYSIS OF SIMULATION RESULTS

    In this section,we evaluated the performance of the algorithm under simulated real-world conditions to verify that the framework introduced in Section IV has applicability and usability in actual scenarios.

    The SA method has been run and implemented to evaluate the performance of the relationship between the deployment cost of edge computing nodes and the number of user nodes.In (10),the transmission delay parameters of d(i,j)and LMare estimated based on the Euclidean distance between the user node and the edge computing node.The processing delay is obtained from the trace file obtained after NS-3 simulation.The simulation increases the number of user nodes from 100 to 500,and adds 100 users at a time.In the algorithm,the initial temperature is set to 10000,the minimum temperature is set to t,and the number of internal Monte Carlo cycle iterations is set to 100.It can be perturbed by multiple iterations,and multiple experimental simulations are performed before the temperature decreases.At the same time,the rate of change of each temperature is set to 0.95.In order to calculate the cost of the solution,the cost parameter is analyzed based on a common measurement unit after normalizing the data,so that any number of cost units is assumed to be equivalent to one capacity unit.The effectiveness of the numerical results was verified by running the algorithm multiple times.In addition,the solution cost,running time,and number of users of the optimal solution found by each method are estimated by periodically increasing the number of edge computing nodes (determined by the threshold of the positioning algorithm).The results are shown from Figure 8 to Figure 11.

    Figure 8. Deployment cost at different temperatures.

    As displayed in Figure 8,in Figure 8a,when the stop temperature of SA is set to 0.1,the performance of the traditional SA is not as good as that of SA based on the data hotspot area proposed in this paper.From Figure 8a to Figure 8d,as the stopping temperature of SA decreases,the performance of the traditional SA can approach the algorithm we proposed.At the same time,the algorithm we proposed can converge faster and find the optimal deployment location of edge computing nodes faster.As the temperature decreases,the optimization results gradually stabilize,as shown in Figure 8d,when the temperature reaches 0.0001,the optimization results will appear smooth in the later iteration process.However,the traditional SA algorithm needs more iterations to gradually approach the results of our proposed algorithm.Therefore,compared with the traditional SA algorithm,the SA algorithm based on user data hotspot area can save a lot of computing time and has better optimization effect.

    Figure 9a and Figure 9b display the simulation results when β is 20 and 30.The edge computing nodes in the figure are deployed in the optimized position according to the optimization algorithm,and the surrounding user nodes (red nodes) are connected to the corresponding edge computing nodes.The biggest difference is the number of edge computing nodes,which is caused by the different thresholds of the number of user nodes in the area.When the threshold of the number of user nodes is small,it means that the demand for edge computing nodes in this area is greater,and more edge computing nodes will be deployed.At the same time,the simulation time will be different.More detailed results are illustrated in Figure 10 and Figure 11.

    Figure 9. Simulation results under different thresholds.

    Figure 10. Simulation run time.

    Figure 11. Edge computing node deployment costs.

    Figure 10 depicts how the simulation run time changes as the number of user nodes increases under different conditions.In Figure 10a,the temperature of the SA method is set to 0.0001,and five trends are plotted in the interval from 10 to 50 thresholds.From the figure,we can see that regardless of the threshold,the running time of the simulation shows an upward trend as the number of user nodes increases.The reason is that the increase in the number of user nodes makes the algorithm more difficult.When the number of user nodes is the same,the simulation running time will decrease with the increase of the threshold.As the threshold becomes larger,it means that the certain area needs more users to deploy edge computing nodes,resulting in a reduction in the number of edge computing nodes.From the trend of the five lines in the figure,it can be seen that although the threshold is 50,the running time is the least,but it may cause too few edge computing nodes to provide the proper services,which ends the simulation early.Therefore,when the threshold is 40 or 30,under the condition of completing the task,the running time is less.With reference to Figure 11a,when the threshold is 30,the deployment cost of edge computing nodes is relatively more stable,and is lower than the threshold of 40.Therefore,it is more appropriate to set the threshold to 30.Figure 10b shows the change in simulation run time as the number of user nodes increases at different end temperatures.From the figure,we can see that when the number of user nodes is less than 300,the increment of the simulation running time is gentler,and then the lower the temperature,the greater the change in running time.Combined with the analysis of the deployment cost of the edge computing node in Figure 11b,under the condition that the deployment cost of the edge computing node is lower,the simulation effect is better when t=0.001.

    The conclusion that can be drawn from these analyses is that the SA method has thoroughly explored the deployment space of edge computing nodes based on the determined minimum temperature 0.0001 and the temperature drop gradient value.The future work on this issue is how to reduce the execution time while not affecting the optimal parameter value of the algorithm performance.

    VI.CONCLUSION

    This paper has presented an optimized deployment scheme based on SA to solve the problem of deploying edge computing nodes in 5G networks under strict technical requirements.An experimental simulation platform has been established by combining NS-3 and SUMO to simulate the communication data in the actual scene.The use of a neural network-based regional positioning algorithm has greatly improved the positioning performance to reduce the complexity of edge computing node deployment.Based on the established simulation platform with actual environmental impact,the collected data is optimized to test the performance of the edge computing node deployment framework.Simulation results show that the performance of the proposed method under different parameters,and verify the advancement compared with the traditional SA method.The proposed method can show good performance in a variety of business types and can be used in real high-traffic hotspot scenarios.

    ACKNOWLEDGEMENT

    This work was supported in part by the Beijing Natural Science Foundation under Grant L201011,in part by the National Natural Science Foundation of China (U2001213 and 61971191),and in part by National Key Research and Development Project(2020YFB1807204).

    叶爱在线成人免费视频播放| 欧美中文综合在线视频| 好看av亚洲va欧美ⅴa在| 日本黄大片高清| 国产精品久久久人人做人人爽| 狠狠狠狠99中文字幕| 午夜老司机福利片| 成人一区二区视频在线观看| 国产爱豆传媒在线观看 | 午夜激情福利司机影院| 91国产中文字幕| 国产亚洲精品第一综合不卡| 婷婷精品国产亚洲av在线| 国产精品久久久久久亚洲av鲁大| 身体一侧抽搐| 日韩免费av在线播放| 日韩精品青青久久久久久| 免费看a级黄色片| 无遮挡黄片免费观看| 日韩精品免费视频一区二区三区| 99久久精品热视频| 波多野结衣高清作品| 露出奶头的视频| 岛国在线免费视频观看| 91国产中文字幕| 两人在一起打扑克的视频| 欧洲精品卡2卡3卡4卡5卡区| 欧美最黄视频在线播放免费| 欧美中文日本在线观看视频| 亚洲一卡2卡3卡4卡5卡精品中文| 欧美日韩福利视频一区二区| 国产视频内射| 欧美成人性av电影在线观看| 每晚都被弄得嗷嗷叫到高潮| 天天一区二区日本电影三级| 又黄又爽又免费观看的视频| 在线观看免费视频日本深夜| 一区二区三区高清视频在线| 国产男靠女视频免费网站| 日本五十路高清| 国产又色又爽无遮挡免费看| 国产精品免费一区二区三区在线| 国产午夜精品久久久久久| 国产精品av久久久久免费| 色播亚洲综合网| 后天国语完整版免费观看| www国产在线视频色| 久久久久国产一级毛片高清牌| 中文字幕高清在线视频| 亚洲国产精品sss在线观看| 国内毛片毛片毛片毛片毛片| 美女扒开内裤让男人捅视频| 精品不卡国产一区二区三区| 亚洲国产欧洲综合997久久,| 精品一区二区三区四区五区乱码| 国产伦一二天堂av在线观看| av在线播放免费不卡| 久久精品国产亚洲av高清一级| 国产v大片淫在线免费观看| 国产免费男女视频| 草草在线视频免费看| 人成视频在线观看免费观看| 中文在线观看免费www的网站 | 亚洲九九香蕉| 久久久久国内视频| 一进一出抽搐gif免费好疼| 熟妇人妻久久中文字幕3abv| 夜夜看夜夜爽夜夜摸| 国产精品影院久久| 亚洲乱码一区二区免费版| 国产主播在线观看一区二区| 国产一区二区在线av高清观看| 性色av乱码一区二区三区2| 精品久久久久久久毛片微露脸| 久久午夜亚洲精品久久| 亚洲成a人片在线一区二区| 亚洲欧美精品综合久久99| 成人18禁高潮啪啪吃奶动态图| 欧美三级亚洲精品| 欧美乱色亚洲激情| e午夜精品久久久久久久| 久久久久国产一级毛片高清牌| 成人18禁在线播放| 久久久久久久久免费视频了| 久久精品国产综合久久久| 精品少妇一区二区三区视频日本电影| 亚洲自偷自拍图片 自拍| 久久亚洲真实| 日韩大码丰满熟妇| 99久久国产精品久久久| 一本一本综合久久| 亚洲免费av在线视频| 天堂影院成人在线观看| 亚洲中文日韩欧美视频| 国产乱人伦免费视频| 国产精品综合久久久久久久免费| 精品久久久久久,| 国产成年人精品一区二区| 99国产精品一区二区蜜桃av| 91老司机精品| 国产av在哪里看| 俄罗斯特黄特色一大片| 精品久久久久久成人av| 国产一级毛片七仙女欲春2| 亚洲av成人av| 国产69精品久久久久777片 | 国产精品综合久久久久久久免费| 91成年电影在线观看| 国产视频内射| 精品少妇一区二区三区视频日本电影| 欧美一区二区国产精品久久精品 | 一区二区三区激情视频| 中文字幕熟女人妻在线| 别揉我奶头~嗯~啊~动态视频| 别揉我奶头~嗯~啊~动态视频| 少妇人妻一区二区三区视频| 宅男免费午夜| 九九热线精品视视频播放| 1024视频免费在线观看| 99精品久久久久人妻精品| 成年女人毛片免费观看观看9| 级片在线观看| 一本大道久久a久久精品| 国产乱人伦免费视频| 日韩成人在线观看一区二区三区| 亚洲av成人av| 人成视频在线观看免费观看| 午夜精品在线福利| 色综合欧美亚洲国产小说| 首页视频小说图片口味搜索| 91老司机精品| 国产精品99久久99久久久不卡| 久久久久亚洲av毛片大全| 亚洲成人国产一区在线观看| av福利片在线| 亚洲国产精品合色在线| 亚洲熟妇中文字幕五十中出| 亚洲欧美激情综合另类| 欧美日韩精品网址| 久久香蕉国产精品| 国产单亲对白刺激| 日本黄色视频三级网站网址| 国产一区二区三区在线臀色熟女| www.熟女人妻精品国产| 此物有八面人人有两片| 国产精品 国内视频| xxx96com| 国产成人系列免费观看| 真人一进一出gif抽搐免费| 国产亚洲精品综合一区在线观看 | 热99re8久久精品国产| 一本大道久久a久久精品| 国产av一区二区精品久久| 成年人黄色毛片网站| 亚洲人成网站高清观看| 午夜福利18| 亚洲aⅴ乱码一区二区在线播放 | 18禁美女被吸乳视频| 日韩欧美在线二视频| 日本黄色视频三级网站网址| 欧美日韩乱码在线| 夜夜躁狠狠躁天天躁| 亚洲av成人不卡在线观看播放网| 狠狠狠狠99中文字幕| 久久人妻av系列| 999精品在线视频| 久久中文字幕一级| 亚洲人成网站高清观看| 亚洲国产精品sss在线观看| 亚洲五月天丁香| 黑人欧美特级aaaaaa片| 搡老岳熟女国产| 18美女黄网站色大片免费观看| 国产av麻豆久久久久久久| 天天躁狠狠躁夜夜躁狠狠躁| 91国产中文字幕| 亚洲av成人一区二区三| 亚洲,欧美精品.| 黑人操中国人逼视频| 精品福利观看| 日韩 欧美 亚洲 中文字幕| 黄片小视频在线播放| 一个人免费在线观看电影 | 国产精品久久久久久人妻精品电影| 在线观看免费午夜福利视频| 最近最新中文字幕大全电影3| 成人国产综合亚洲| 午夜免费成人在线视频| 深夜精品福利| 俺也久久电影网| 高潮久久久久久久久久久不卡| 午夜免费成人在线视频| 99在线视频只有这里精品首页| 欧美在线黄色| 亚洲国产欧美一区二区综合| 黑人操中国人逼视频| 男女做爰动态图高潮gif福利片| 欧美色视频一区免费| 搞女人的毛片| 久久精品综合一区二区三区| 正在播放国产对白刺激| 久久久国产欧美日韩av| 国产真实乱freesex| 老司机深夜福利视频在线观看| 亚洲,欧美精品.| 亚洲成a人片在线一区二区| 黑人巨大精品欧美一区二区mp4| 90打野战视频偷拍视频| 九色国产91popny在线| 人人妻,人人澡人人爽秒播| 国产精品久久视频播放| 99国产精品一区二区三区| 美女黄网站色视频| 可以免费在线观看a视频的电影网站| 黑人巨大精品欧美一区二区mp4| 中文字幕熟女人妻在线| 脱女人内裤的视频| 国产精品av视频在线免费观看| 国产麻豆成人av免费视频| 国产精品国产高清国产av| 天堂动漫精品| √禁漫天堂资源中文www| 国产精品综合久久久久久久免费| 99riav亚洲国产免费| 欧美乱码精品一区二区三区| 老汉色av国产亚洲站长工具| 天堂影院成人在线观看| 一a级毛片在线观看| 久久香蕉激情| 国产精品久久久久久久电影 | 少妇人妻一区二区三区视频| 美女 人体艺术 gogo| 白带黄色成豆腐渣| 俄罗斯特黄特色一大片| 精品国内亚洲2022精品成人| 色噜噜av男人的天堂激情| 日本一区二区免费在线视频| 999久久久精品免费观看国产| 日本免费a在线| 欧美久久黑人一区二区| 国产av一区二区精品久久| 免费在线观看成人毛片| 99久久久亚洲精品蜜臀av| 亚洲国产精品成人综合色| 看黄色毛片网站| 精品国产美女av久久久久小说| 99热6这里只有精品| 久久 成人 亚洲| 最好的美女福利视频网| 真人一进一出gif抽搐免费| 免费观看精品视频网站| 一级a爱片免费观看的视频| 欧美日韩福利视频一区二区| 小说图片视频综合网站| 岛国在线免费视频观看| 欧美乱码精品一区二区三区| 欧美日韩中文字幕国产精品一区二区三区| 九色国产91popny在线| 美女午夜性视频免费| 操出白浆在线播放| 人妻夜夜爽99麻豆av| 69av精品久久久久久| 人人妻人人看人人澡| 美女高潮喷水抽搐中文字幕| 欧美国产日韩亚洲一区| 一区福利在线观看| 狂野欧美激情性xxxx| 男人舔女人的私密视频| 国产av又大| 亚洲欧美精品综合一区二区三区| а√天堂www在线а√下载| 亚洲 欧美一区二区三区| 久久精品夜夜夜夜夜久久蜜豆 | 亚洲电影在线观看av| 久久久久久久精品吃奶| 欧美绝顶高潮抽搐喷水| or卡值多少钱| 丁香六月欧美| 变态另类丝袜制服| 一级毛片女人18水好多| 中文字幕人妻丝袜一区二区| 精品第一国产精品| 宅男免费午夜| 中文字幕最新亚洲高清| 丰满的人妻完整版| √禁漫天堂资源中文www| 日韩欧美精品v在线| 18禁黄网站禁片午夜丰满| 亚洲电影在线观看av| 99久久无色码亚洲精品果冻| 天天一区二区日本电影三级| 性色av乱码一区二区三区2| 麻豆一二三区av精品| 国产精品一及| 国内久久婷婷六月综合欲色啪| 成人三级黄色视频| 久久这里只有精品19| 欧美日韩黄片免| 18美女黄网站色大片免费观看| 在线十欧美十亚洲十日本专区| 91成年电影在线观看| 国内精品久久久久精免费| 黄色女人牲交| 99热这里只有精品一区 | 精品国产美女av久久久久小说| 亚洲欧美精品综合久久99| 女人高潮潮喷娇喘18禁视频| 午夜激情福利司机影院| 99久久久亚洲精品蜜臀av| 嫁个100分男人电影在线观看| 亚洲色图av天堂| 性色av乱码一区二区三区2| 国产成人精品久久二区二区免费| 国产三级黄色录像| 真人做人爱边吃奶动态| 国产三级黄色录像| 亚洲av中文字字幕乱码综合| 久久香蕉国产精品| 真人做人爱边吃奶动态| 久久精品影院6| 欧美久久黑人一区二区| 亚洲精品一区av在线观看| 国产精品 国内视频| 国产97色在线日韩免费| 最近最新中文字幕大全电影3| 亚洲精品一卡2卡三卡4卡5卡| 国产不卡一卡二| 18美女黄网站色大片免费观看| 国产人伦9x9x在线观看| 成人av一区二区三区在线看| 99在线人妻在线中文字幕| 亚洲免费av在线视频| 欧美激情久久久久久爽电影| 国产精品免费一区二区三区在线| 久久这里只有精品19| 曰老女人黄片| 国内揄拍国产精品人妻在线| 一本一本综合久久| 亚洲成av人片在线播放无| 午夜福利欧美成人| 午夜免费激情av| 免费在线观看日本一区| 在线视频色国产色| 国产成人影院久久av| 蜜桃久久精品国产亚洲av| 夜夜夜夜夜久久久久| 国产伦一二天堂av在线观看| 他把我摸到了高潮在线观看| 亚洲人与动物交配视频| 欧美激情久久久久久爽电影| 在线永久观看黄色视频| 青草久久国产| 一本综合久久免费| 亚洲美女视频黄频| 久9热在线精品视频| 搞女人的毛片| 18禁国产床啪视频网站| 免费在线观看黄色视频的| 在线国产一区二区在线| 亚洲国产看品久久| 成人av在线播放网站| 日韩国内少妇激情av| 香蕉av资源在线| 精品无人区乱码1区二区| 国产视频一区二区在线看| 最近视频中文字幕2019在线8| 色尼玛亚洲综合影院| 亚洲全国av大片| 久99久视频精品免费| 久久久久久九九精品二区国产 | 在线观看66精品国产| 最近最新免费中文字幕在线| 亚洲熟女毛片儿| 午夜免费激情av| 一区二区三区激情视频| 久9热在线精品视频| 日韩欧美 国产精品| 欧美日韩福利视频一区二区| 精品电影一区二区在线| 免费在线观看成人毛片| 美女大奶头视频| 狂野欧美激情性xxxx| 亚洲成人中文字幕在线播放| 99热这里只有精品一区 | 长腿黑丝高跟| 日日摸夜夜添夜夜添小说| 国产一区二区激情短视频| 一级毛片高清免费大全| 国内毛片毛片毛片毛片毛片| 婷婷亚洲欧美| 日韩高清综合在线| 老司机靠b影院| 欧美人与性动交α欧美精品济南到| 一区二区三区高清视频在线| 精品无人区乱码1区二区| 精品人妻1区二区| 欧美3d第一页| 国产一区二区在线观看日韩 | 久久精品91无色码中文字幕| 亚洲人成网站在线播放欧美日韩| 好男人在线观看高清免费视频| 午夜视频精品福利| 午夜激情福利司机影院| 成人三级黄色视频| 久久伊人香网站| 少妇被粗大的猛进出69影院| 淫妇啪啪啪对白视频| 九色成人免费人妻av| 久久 成人 亚洲| 嫩草影院精品99| 国产成+人综合+亚洲专区| 久久精品国产亚洲av高清一级| 国产精品国产高清国产av| 亚洲精华国产精华精| 精品少妇一区二区三区视频日本电影| 后天国语完整版免费观看| 日韩免费av在线播放| 精品一区二区三区四区五区乱码| 18禁黄网站禁片免费观看直播| 亚洲avbb在线观看| 丰满人妻一区二区三区视频av | 午夜精品久久久久久毛片777| 好男人电影高清在线观看| 中文字幕精品亚洲无线码一区| 午夜影院日韩av| 成熟少妇高潮喷水视频| 久久中文看片网| 欧美一级a爱片免费观看看 | 欧美精品亚洲一区二区| 桃红色精品国产亚洲av| 精品电影一区二区在线| 国产成人欧美在线观看| 欧美黑人精品巨大| 精品一区二区三区av网在线观看| 国产精品爽爽va在线观看网站| 欧美日韩国产亚洲二区| cao死你这个sao货| 动漫黄色视频在线观看| 久久这里只有精品19| 少妇人妻一区二区三区视频| 久久久久精品国产欧美久久久| 男女床上黄色一级片免费看| 午夜福利成人在线免费观看| 国产高清激情床上av| 成人18禁高潮啪啪吃奶动态图| 长腿黑丝高跟| 国产亚洲精品一区二区www| 大型av网站在线播放| 亚洲欧美精品综合一区二区三区| 国产欧美日韩一区二区精品| 久久久久亚洲av毛片大全| 欧美一级毛片孕妇| 他把我摸到了高潮在线观看| 国产av麻豆久久久久久久| 99国产综合亚洲精品| 成年版毛片免费区| 真人一进一出gif抽搐免费| 嫩草影视91久久| 亚洲免费av在线视频| 国内揄拍国产精品人妻在线| 黄色a级毛片大全视频| 一个人免费在线观看的高清视频| 婷婷亚洲欧美| 精品欧美国产一区二区三| 亚洲精品在线观看二区| 蜜桃久久精品国产亚洲av| 国产成年人精品一区二区| 亚洲中文日韩欧美视频| 日韩av在线大香蕉| 欧美三级亚洲精品| 97超级碰碰碰精品色视频在线观看| 丁香欧美五月| 国产精品一区二区免费欧美| 天天添夜夜摸| 一二三四在线观看免费中文在| 最近在线观看免费完整版| 人人妻人人澡欧美一区二区| 在线播放国产精品三级| 欧美一区二区国产精品久久精品 | 九九热线精品视视频播放| 天天一区二区日本电影三级| 青草久久国产| 国产亚洲精品第一综合不卡| 国产av一区在线观看免费| 99在线人妻在线中文字幕| 亚洲一区二区三区不卡视频| 久久久久国内视频| 男人舔奶头视频| 成人三级做爰电影| www.999成人在线观看| 亚洲午夜理论影院| 国产精品久久视频播放| 好男人电影高清在线观看| 色综合欧美亚洲国产小说| 99热只有精品国产| 亚洲国产欧美网| 亚洲黑人精品在线| 亚洲国产精品合色在线| 亚洲精品中文字幕一二三四区| 91老司机精品| 国产区一区二久久| 国内少妇人妻偷人精品xxx网站 | 国产精品爽爽va在线观看网站| 两个人看的免费小视频| 国产精品av视频在线免费观看| 欧美中文日本在线观看视频| 亚洲精品一区av在线观看| 国产麻豆成人av免费视频| 黄色 视频免费看| 久久精品91无色码中文字幕| 白带黄色成豆腐渣| 日韩欧美免费精品| 国产亚洲精品一区二区www| 色综合站精品国产| 久久 成人 亚洲| 亚洲熟妇中文字幕五十中出| 国产成人av激情在线播放| 黄片小视频在线播放| 亚洲天堂国产精品一区在线| 国产欧美日韩一区二区三| 午夜福利成人在线免费观看| 日韩欧美精品v在线| 精品久久蜜臀av无| 日韩成人在线观看一区二区三区| 特大巨黑吊av在线直播| 国产精品久久久久久精品电影| 最新美女视频免费是黄的| 在线免费观看的www视频| 精品第一国产精品| 色噜噜av男人的天堂激情| 91成年电影在线观看| 看片在线看免费视频| 淫秽高清视频在线观看| 亚洲av中文字字幕乱码综合| 欧美一区二区国产精品久久精品 | 亚洲最大成人中文| 最近视频中文字幕2019在线8| netflix在线观看网站| 亚洲av日韩精品久久久久久密| 免费一级毛片在线播放高清视频| 麻豆国产97在线/欧美 | 国产三级在线视频| 亚洲免费av在线视频| 欧美+亚洲+日韩+国产| x7x7x7水蜜桃| 亚洲精品在线观看二区| 国产69精品久久久久777片 | 国产蜜桃级精品一区二区三区| 亚洲欧美精品综合久久99| 国内揄拍国产精品人妻在线| 蜜桃久久精品国产亚洲av| 国产精品久久久人人做人人爽| 国产人伦9x9x在线观看| 九色成人免费人妻av| 成人国产综合亚洲| 99久久国产精品久久久| 国产精品久久久久久精品电影| netflix在线观看网站| 久久久久九九精品影院| 亚洲国产精品sss在线观看| 啦啦啦观看免费观看视频高清| 午夜亚洲福利在线播放| 悠悠久久av| 欧洲精品卡2卡3卡4卡5卡区| 亚洲av电影在线进入| 亚洲成人免费电影在线观看| 国产69精品久久久久777片 | 在线观看日韩欧美| 男人舔女人下体高潮全视频| 中文字幕高清在线视频| 一本久久中文字幕| 精华霜和精华液先用哪个| 国产av麻豆久久久久久久| 国产精品久久视频播放| 国产亚洲精品第一综合不卡| 人妻丰满熟妇av一区二区三区| 久久人妻福利社区极品人妻图片| 亚洲一区二区三区色噜噜| 亚洲精品国产一区二区精华液| 久久久久久大精品| 亚洲国产高清在线一区二区三| 欧美一级毛片孕妇| 国产亚洲欧美在线一区二区| 老熟妇乱子伦视频在线观看| 免费在线观看亚洲国产| 欧美黑人欧美精品刺激| 激情在线观看视频在线高清| 精品一区二区三区四区五区乱码| 亚洲av美国av| 国产精品乱码一区二三区的特点| 在线观看日韩欧美| 免费av毛片视频| 免费在线观看视频国产中文字幕亚洲| 亚洲色图 男人天堂 中文字幕| 亚洲精品久久成人aⅴ小说| 亚洲成av人片在线播放无| 给我免费播放毛片高清在线观看| 国产一区二区在线观看日韩 | 日本撒尿小便嘘嘘汇集6| 久久中文看片网| 757午夜福利合集在线观看| 无人区码免费观看不卡| 亚洲成人国产一区在线观看| 亚洲欧美日韩东京热| 99久久国产精品久久久| 欧美黄色片欧美黄色片| 老熟妇乱子伦视频在线观看| 久久久久性生活片| 中文字幕人妻丝袜一区二区| 国产黄片美女视频| 国产视频内射| 久久久水蜜桃国产精品网| 在线观看66精品国产| 精品久久蜜臀av无| 一个人免费在线观看的高清视频|