• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A collision recovery algorithm using optimal Q parameter based on BIBD in RFID①

    2016-12-22 05:45:27CuiYinghua崔英花
    High Technology Letters 2016年4期

    Cui Yinghua (崔英花)

    (School of Information and Communication Engineering, Beijing Information Science and Technology University, Beijing 100101, P.R.China)

    ?

    A collision recovery algorithm using optimal Q parameter based on BIBD in RFID①

    Cui Yinghua (崔英花)②

    (School of Information and Communication Engineering, Beijing Information Science and Technology University, Beijing 100101, P.R.China)

    In this work, an optimal Q algorithm based on a collision recovery scheme is presented. Tags use BIBD-(16,4,1) codes instead of RN16s. Therefore, readers can make a valid recognition even in collision slots. A way of getting the optimal slot-count parameter is studied and an optimal Q algorithm is proposed. The theoretical and simulation results show that the proposed algorithm can improve reading efficiency by 100% more than the conventional Q algorithm. Moreover, the proposed scheme changes little to the existing standard. Thus, it is easy to implement and compatible with ISO 18000-6C.

    radio frequency identification (RFID), anti-collision, collision recovery, balanced incomplete block design (BIBD), Q algorithm

    0 Introduction

    RFID (radio frequency identification) is an automatic identification system which includes readers and tags. Due to tags battery presence or absence, RFID technology can be divided into: passive, battery assisted passive and active RFID technology[1].

    In passive RFID, a reader communicates and powers tags using radio frequency (RF) waves transmitted by a reader antenna. Passive tags are able to harvest energy from the RF waves to power its circuitry, and respond back to the reader by smart reflection of the same RF waves. The carrier frequencies of the signals received by the reader are equal, as they originate from a single source, namely the transmitter of the reader. As the same oscillator is also available at the receiver, a down conversion without any frequency offset is readily possible. However the EPC standard[2]permits a large deviation of up to ±22% from that nominal frequency. Therefore synchronization in RFID readers is still an important task. In general, synchronization mechanisms are distinguished into maximum likelihood timing recovery[3]and minimum mean square error methods[4]. The first class estimates the timing instant by maximizing the likelihood function, while the latter estimates the timing instant by minimizing the mean square error.

    In RFID applications, the reader reads tags’ information within the effective range and the tags will respond the request according to a predefined protocol. If several tags respond simultaneously, the reader will detect collision and no tag will be recognized. To solve this problem, many anti-collision protocols have been designed. However, most of them are based on collision avoidance theory and have low system efficiency, usually less than 36.8%[5].

    Many researchers have investigated slots with colliding tag signals. Khasgiwale, et al.[6]estimated the number of tags involved in collision by the collision information on the physical layer. Kumar, et al.[7]proposed to use an interference cancellation scheme to separate the combined signals. Angerer, et al.[8]showed an RFID system which can be recovered from collision when two tags collide on a physical layer with a single antenna receiver. Kotevic, et al.[9]followed the work of Angerer and used more receiving antennas in the reader.

    Apart from the researches mentioned above, recently some researchers have studied on using BIBD (balanced incomplete block design) code in the RFID system. BIBD code is denoted by BIBD-(b,v,r,k,λ) and can be simply expressed as BIBD-(v,k,λ). Mathematically[10], it can be proved that the object set is unique for BIBD-(v,k,1) when no more than k blocks in a set. According to this theory, it can be concluded that BIBD- (b,v,r,k,1) can support b symbols, and identify up to k symbols at one transmission. For example, BIBD-(16,4,1), which is also denoted as, BIBD-(20,16,5,4,1) supporting up to 20 symbols, which are column vectors of the incident matrix. It can be recognized whenever not more than 4 symbols collide.

    In Ref.[11], Seol, et al. designed the symbols by using BIBD-(7, 3, 1) codes in the process of RFID tags identification and proposed a Multi-State Query Tree Protocol. The scheme does not require re-transmission when no more than 3 symbols collide, which will not only reduce the cost of power consumption, but also improve the system identification efficiency. In Ref.[12], Zhang, et al. advanced a novel and fast anti-collision algorithm based on the regressive-style RFID of BIBD-(4, 2, 1). The algorithm makes good use of the advantages of BIBD code, and can also significantly reduce the query time. However, these schemes use BIBD code to construct the EPC code, which decreases total number of supporting users, and are constrained to application-specific scenarios.

    In this study, an optimal Q parameter algorithm based on BIBD is proposed. This algorithm uses BIBD code to construct tag’s respond serials RN16 (16-bit random number) instead of tags’ EPC codes. The reader therefore can recover the RN16s from the colliding signals even in low SNR environment, and acknowledge one of the collision tags, thus increase the system efficiency greatly.

    The rest of this paper is organized as follows: Section 1 describes the RFID anti-collision scheme based on BIBD, analyzes its performance and studies how to get the optimum slot-count Q parameter. Section 2 proposes the collision recovery algorithm using optimal Q parameter selection. A performance analysis of the proposed scheme is provided in Section 3. The last section concludes the work.

    1 The optimal Q vlaue for the BIBD scheme

    The ISO 18000-6C specification proposes a frame slotted ALOHA based on anti-collision protocol, named Q-algorithm[13]. It has three basic commands: Query, QueryRep and QueryAdjust. After the reader sends a Query to initiate an inventory round, it then issues one or more QueryAdjust or QueryRep commands in this inventory round depending on whether the Q value needs to be changed. In response, tags that have nonzero slot numbers should decrease their count values and backscatter RN16 when their counter values reach zero. This process continues iteratively until all the tags have been recognized.

    In this section, a modified Q algorithm based on BIBD is presented which is compatible with ISO 18000-6C. In the scheme, tags use BIBD-(16,4,1) instead of RN16, and backscatter BIBD symbols to reader, who can recover the RN16s from the colliding signals, and make a valid recognition in collision slots.

    First, the system efficiency should be analyzed, and then how to choose the optimal Q parameter should be studied. Suppose there are totally n tags to be identified and the total slot number is N, the probability that k tags exist in one slot (k-occupation slot) follows a binomial distribution[14]:

    (1)

    So the expectation of k-occupation slot number is

    Ek=N×Pk

    (2)

    the system efficiency is defined by

    (3)

    Usually, the efficient reading slot refers to a successful tag transmission when exactly one tag transmits in a slot. The expectation of Eff can be calculated as

    (4)

    BIBD-(16,4,1) has 20 symbols with 16-bit in length, and identifies up to 4 symbols at one transmission. By using it instead of RN16, the reader can extract an individual BIBD code from the tags involved in a collision and make a valid acknowledgement. Accordingly, the expectation of the system efficiency can be denoted by

    (5)

    Letf=N/n, for different tag numbers, the optimal values of f and the maximal efficiency are obtained as shown in Fig.1 and Fig.2.

    Furthermore, for n and N→∞, Eq.(5) can be reformulated to

    (6)

    Fig.1 The optimal values of f for different tag numbers

    Fig.2 The maximal values of Eff for different tag numbers

    The maximal system efficiency can be reached with

    (7)

    It is a non-linear equation in one variable, and a simple bisection search or Newton’s methods are used to solve it, and the result is foptimal≈0.452. Therefore, the max system efficiency can be obtained as

    Effmax=Eff|f=0.452=0.817

    (8)

    The Q algorithm uses Q as the slot count parameter and sets the frame size as 2Q, where Q is in the range of [0, 15]. From the figure of function Eff(f), the maximal efficiency can be obtained at the point of nearby 0.452. It is easy to prove that the function is monotonic in the range of f<0.452 or f>0.452. Hence, the optimal Q value can be reached at

    (9)

    Here, integer T satisfies 2T-1<0.452n<2T.

    2 The collision recovery algorithm with optimal Q value selection based on BIBD

    Conventional readers only read data in singleton slots, while the proposed BIBD method is able to identify them in collision slots. So the original Q selection algorithm is not suitable here, and needs some modifications.

    It is known that the exact number of tags in the field allows an optimal choice of Q. When collisions occur, the number of tags involved in the slot can be determined. Combining the number of tags detected in afore rounds will give an accurate estimate of the number of tags participating in the identification process. This can be used to set a near optimal Q value for the next round. The details of the optimal identification process are described as follows:

    (1) Reader selects an initial tag number, let it be N=2Q, then sends Query command with a slot-count parameter Q to the tags. Tags will pick a random value in the range of [0, 2Q-1] and load this value into slot counter. Tags that pick zero will transit to the reply state, choose one of BIBD-(16,4,1) symbols randomly to make an 16-bit signal instead of RN16 and reply immediately, other tags will transit to the arbitrate state and await a QueryRep command.

    (2) If the reader detects no more than 4 tags’ reply, it shall choose one and sends an acknowledgment command to the tag. The identified tag then processes the received ACK and reports its ECP back to the reader.

    (3) If the reader detects idle or more than 4 RN16s, no tag will be acknowledged.

    (4) For each slot, the reader determines the number of reply tags. If there are more than four tags, the reader can’t determine the exact tag number in the slot. It then estimates the number with an approximation by 5. For example, the estimate for i-th slot is given by

    (10)

    Suppose current slot is the l-th slot, reader can estimate the total tag population by

    (11)

    Then, suppose 2T-1

    (12)

    To make the estimate more accurate, such calculation is made only when l≥3.

    (5) If Qoptequals to the current Q value, the reader uses QueryRep command to notify the tags to decrement their slot counters by 1, else reader estimates the remaining tags:

    Rl=Estl-Il

    (13)

    here Ilis the recognized tag number during this identification round. then it is used to estimate the new Q value:

    (14)

    The reader then adjusts the Q value with QueryAdjust command.

    (6) The above process may iterate many times, until all the tags have been recognized.

    In contrast to the conventional Q algorithm, the proposed scheme uses BIBD-based 16-bit signals instead of RN16, and employs an optimal Q selection algorithm. The scheme estimates the tag population during recognition process, and adjusts the Q parameter more efficiently. For each collision slot, only one tag is preferred to acknowledge, though acknowledge all the collided tags within one slot can increase the system efficiency greatly. While it will introduce more change to the conventional Q scheme which is not desirable. It is clear that the scheme is compatible with ISO 18000-6C and easy to implement.

    3 Simulation results

    The performance of the proposed method for collision recovery is verified through MATLAB simulations. In this section, a simulation model based on the algorithms described in section 2 is established and it is compared with the conventional Q parameter algorithm and the modified Q algorithm mentioned in Ref.[15], which is one of the previous work based on BIBD without optimal Q parameter selection. The simulation is repeated 100 times for each number of tags from 100 to 1000, and the initial value of Q is set to 4. Actually, the tag number beforehand is unknown and the frame size N is a power of 2 and parameter Q can only be adjusted gradually, so the actual system efficiency should be a little lower than the theoretical maximum.

    The result of this experiment is depicted in Fig.3. It shows that the optimal Q value scheme is far more effective than the conventional one. For other improved Aloha-based schemes, such as EDFSA[16]and TSA[17], the proposed scheme also behaves much better than them, as their average efficiencies did not exceed 38%. Moreover, the optimal scheme is also better than the modified Q algorithm. The two Q algorithms both choose 4 as the initial value of Q; the modified Q algorithm employs a slightly changed Q selection algorithm while the optimal scheme uses an optimal Q parameter selection, which proves that the optimal slot-count parameter choosing method contributes to the identification efficiency greatly. It is interesting to notice that the figure of the proposed scheme is like a wave, the crests are reached at about 64, 256, 512, … which are the points the estimation is the most accurate.

    Fig.3 Comparison of the efficiency of different algorithms

    It also should be emphasized that the proposed scheme only makes minor changes to the original Q algorithm. One is using BIBD-(16,4,1) block instead of RN16 for tags, which is the main idea of the proposed scheme to enable readers to decode RN16s from collision signals and make a valid acknowledge within a collided slot. The other is the optimal slot-count select algorithm. Qestis updated after every reading slot, and the Q value is adjusted dynamically when necessary. Therefore, the scheme is compatible with ISO 18000-6C and easy to implement. The theoretical and simulation results show that the scheme has greatly improved system efficiency.

    4 Conclusion

    In this work a collision recovery algorithm using optimal Q parameter based on BIBD is proposed. Using BIBD-(16,4,1) code instead of RN16 for tags’ backscatter, it enables readers to make a valid acknowledge from collision slots with no more than 4 tags. As a result, the system efficiency can be improved greatly. Moreover, the optimum slot-count parameter selection is studied and an optimal Q algorithm is designed which can adjust the slot-count parameter more efficiently. Simulation indicates that the scheme has good

    performance. Compared with the standard Q algorithm in Gen2, a performance gain of about 100% can be achieved.

    [ 1] Dobkin D M. The RF in RFID. Burlington: Elsevier, 2008

    [ 2] EPCGloabl. EPC Radio-Frequency Identity ProtocolsClass-1 Generation-s UHF RFID, Oct., 2008

    [ 3] Kobayashi H. Simultaneous adaptive estimation and decision algorithm for carriesr modulated adata transmission systems. IEEE Transcations on Communication Technology, 1997, 19(3):268-280

    [ 4] Barry J R, Lee E A, Messerschmitt D G. Digital Communication. 3rd Edition, Springer, 2004

    [ 5] Finkenzeller K. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. 2nd Edition. John Wiley & Sons Ltd, 2003

    [ 6] Khasgiwale R S, Adyanthaya R U, Engels D W. Extracting information from tag collisions. In: Proceedings of the IEEE International Conference on RFID, Orlando, USA, 2009. 131-138

    [ 7] Kumar R, La Porta T F. Interference cancellation-based RFID Tags Identification. In: Proceedings of the 14th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, Miami, USA, 2011. 111-118

    [ 8] Angerer C, Langwieser R, Rupp M. RFID reader receivers for physical layer collision recovery. IEEE Transactions on Communications, 2010, 58(12): 3526-3537

    [ 9] Kaitovic J, Langwieser R, Rupp M. RFID reader with multi antenna physical layer collision recovery receivers. In: Proceedings of the IEEE International Conference On RFID-Technologies and Applications (RFID-TA), Sitges, Spain, 2011. 286-291

    [10] Colbourn C J, Dinitz J H. The CRC Handbook of Combinatorial Design. Boca Raton: CRC Press, 1996

    [11] Seol J M, Kim S W. Collision-resilient multi-state query tree protocol for fast RFID tag identification. In: Proceedings of the International Conference on Computational Intelligence and Security, Guizhou, China, 2006. 1159-1162

    [12] Li Z, Zhang X, Lei Z. Anti-collision algorithm based on the regressive-style RFID of BIBD (4,2,1). In: Proceedings of the International Conference on Advanced Computer Theory and Engineering (ICACTE), Chengdu, China, 2010. 352-355

    [13] International Organization for Standardization/International Electrotechnical Commission. ISO/IEC 18000-6 information technology automatic identification and data capture techniques—radio frequency identification for item management air interface—Part 6: parameters for air interface communications at 860-960MHz. International Organization for Standardization, 2007

    [14] Vogt H. Efficient object identification with passive RFID tags. In: Proceedings of the 1st International Conference on Pervasive Computing,Zürich, Switzerland, 2002. 98-113

    [15] Cui Y H, Yang S G. A modified Q parameter scheme based on BIBD in RFID. Advanced Materials Research, 2013, 765: 2041-2045

    [16] Lee S R, Joo S D, Lee C W. An enhanced dynamic framed slotted aloha algorithm for RFID tag identification. In: Proceedings of the 2nd Annual International Conference for Mobile Ubiquitous Systems: Networking and Services, Boston, USA, 2005. 162-172

    [17] Bonuccelli F L M A, Martelli F. Tree slotted aloha: a new protocol for tag identification in RFID networks. In: Proceedings of the International Symposium on World of Wireless, Mobile and Multimedia Networks, New York, USA, 2006. 603-608

    Cui Yinghua, born in 1973. She received her Ph.D degree and Master degree from Peking University in 2009 and 2003. Her research interests include anti-collision algorithm in RFID, wireless communication, and wireless sensor network.

    10.3772/j.issn.1006-6748.2016.04.002

    ① Supported by the National Natural Science Foundation of China (No. 61340005), Beijing Natural Science Foundation (No. 4132012), Beijing Education Committee Science and Technology Development Plan (No. KM201411232011), Beijing Outstanding Personnel Training Project (No. 2013D005007000006), Scientific Research Improving Project-Intelligent Sense and Information Processing (No. 5211524100).

    ② To whom correspondence should be addressed. E-mail: cui_ying_hua@sina.com Received on Sep. 15, 2015

    淫秽高清视频在线观看| 人人妻人人澡人人看| 久久伊人香网站| 日本成人三级电影网站| 九色国产91popny在线| 黄色毛片三级朝国网站| 熟女少妇亚洲综合色aaa.| 在线av久久热| 日韩欧美在线二视频| 欧美激情 高清一区二区三区| 国内久久婷婷六月综合欲色啪| av片东京热男人的天堂| 欧美午夜高清在线| 亚洲专区中文字幕在线| 999久久久精品免费观看国产| 夜夜夜夜夜久久久久| 精品久久久久久,| 日韩欧美一区二区三区在线观看| 香蕉av资源在线| 成人亚洲精品一区在线观看| 老鸭窝网址在线观看| 黄片大片在线免费观看| 成人手机av| 欧美色欧美亚洲另类二区| 国产精品永久免费网站| 成年女人毛片免费观看观看9| 国产片内射在线| 久久人妻av系列| 真人做人爱边吃奶动态| 国产精品乱码一区二三区的特点| 午夜激情av网站| 亚洲精品中文字幕在线视频| 久久欧美精品欧美久久欧美| 久久亚洲精品不卡| 十八禁网站免费在线| 久久久国产精品麻豆| 啪啪无遮挡十八禁网站| 禁无遮挡网站| 女警被强在线播放| 国产成人欧美在线观看| 中文字幕最新亚洲高清| 亚洲av中文字字幕乱码综合 | 国产一卡二卡三卡精品| 久久久久久国产a免费观看| 国产黄色小视频在线观看| 视频在线观看一区二区三区| 在线观看免费午夜福利视频| 国产97色在线日韩免费| 高清在线国产一区| 欧美最黄视频在线播放免费| 中文字幕精品免费在线观看视频| 在线观看免费视频日本深夜| 自线自在国产av| avwww免费| 天堂动漫精品| 极品教师在线免费播放| 桃红色精品国产亚洲av| av福利片在线| 一边摸一边抽搐一进一小说| 在线观看日韩欧美| 久久久精品国产亚洲av高清涩受| 禁无遮挡网站| 丁香六月欧美| 国产高清videossex| 亚洲一区高清亚洲精品| 午夜精品久久久久久毛片777| 狠狠狠狠99中文字幕| 国产精品免费一区二区三区在线| 国产亚洲精品第一综合不卡| 夜夜爽天天搞| 亚洲成国产人片在线观看| 亚洲av成人一区二区三| 亚洲国产精品999在线| 亚洲九九香蕉| 欧美另类亚洲清纯唯美| 国产精品98久久久久久宅男小说| 久久天堂一区二区三区四区| videosex国产| 黑人操中国人逼视频| 久久草成人影院| 18禁黄网站禁片午夜丰满| 在线看三级毛片| 观看免费一级毛片| 国产精品亚洲美女久久久| 窝窝影院91人妻| 亚洲一卡2卡3卡4卡5卡精品中文| 99久久精品国产亚洲精品| 两个人看的免费小视频| 在线十欧美十亚洲十日本专区| 身体一侧抽搐| 久久亚洲精品不卡| www.999成人在线观看| 老汉色av国产亚洲站长工具| 久久精品影院6| 久久久久久国产a免费观看| 亚洲狠狠婷婷综合久久图片| 美女高潮到喷水免费观看| 日韩三级视频一区二区三区| 亚洲av日韩精品久久久久久密| av视频在线观看入口| 色播亚洲综合网| 这个男人来自地球电影免费观看| 看免费av毛片| 欧美日本亚洲视频在线播放| 欧美zozozo另类| 欧美一级毛片孕妇| 少妇 在线观看| 久久婷婷人人爽人人干人人爱| av超薄肉色丝袜交足视频| 亚洲男人的天堂狠狠| 国产精品1区2区在线观看.| 草草在线视频免费看| 久久精品91无色码中文字幕| 50天的宝宝边吃奶边哭怎么回事| 国内少妇人妻偷人精品xxx网站 | 亚洲欧美日韩无卡精品| 黄频高清免费视频| 国产精品永久免费网站| 亚洲成人久久性| 十八禁网站免费在线| 国产熟女午夜一区二区三区| 久久精品国产综合久久久| 人人妻,人人澡人人爽秒播| 视频区欧美日本亚洲| 日本一区二区免费在线视频| 欧美乱码精品一区二区三区| 国内揄拍国产精品人妻在线 | 欧美乱码精品一区二区三区| 在线永久观看黄色视频| 在线观看免费日韩欧美大片| 精品久久久久久久人妻蜜臀av| 日韩免费av在线播放| 欧美性猛交╳xxx乱大交人| 中文字幕精品亚洲无线码一区 | 亚洲av美国av| 两性夫妻黄色片| 亚洲欧美日韩高清在线视频| 国产亚洲精品第一综合不卡| 在线观看免费日韩欧美大片| 久久精品亚洲精品国产色婷小说| 日本精品一区二区三区蜜桃| 欧美色欧美亚洲另类二区| 又黄又爽又免费观看的视频| 午夜免费观看网址| 日本一区二区免费在线视频| 国产精品免费视频内射| 国产精品日韩av在线免费观看| 欧美色欧美亚洲另类二区| 欧美国产精品va在线观看不卡| 国产在线观看jvid| 老鸭窝网址在线观看| 老司机午夜福利在线观看视频| 美女国产高潮福利片在线看| 免费在线观看完整版高清| 别揉我奶头~嗯~啊~动态视频| 国产精品电影一区二区三区| 国产亚洲精品第一综合不卡| 久久天躁狠狠躁夜夜2o2o| 91老司机精品| 天天躁夜夜躁狠狠躁躁| 亚洲黑人精品在线| 亚洲 欧美一区二区三区| 女人高潮潮喷娇喘18禁视频| 又大又爽又粗| 超碰成人久久| 99热只有精品国产| 欧美丝袜亚洲另类 | 一区二区三区国产精品乱码| 国产一区在线观看成人免费| a在线观看视频网站| 日韩欧美国产在线观看| 日韩免费av在线播放| 精品国产乱码久久久久久男人| 欧美中文综合在线视频| 少妇粗大呻吟视频| 国内毛片毛片毛片毛片毛片| 最近最新中文字幕大全电影3 | 免费看十八禁软件| 在线国产一区二区在线| 日韩欧美一区视频在线观看| 热99re8久久精品国产| 国产精品乱码一区二三区的特点| 深夜精品福利| 欧美一级毛片孕妇| 精品国产国语对白av| www日本在线高清视频| 又大又爽又粗| 精品一区二区三区四区五区乱码| 成人精品一区二区免费| 日本成人三级电影网站| 伊人久久大香线蕉亚洲五| 欧美黑人欧美精品刺激| 午夜福利免费观看在线| 亚洲国产欧美一区二区综合| 中文字幕精品亚洲无线码一区 | 国产免费男女视频| 天天躁夜夜躁狠狠躁躁| 最近最新中文字幕大全电影3 | 亚洲国产日韩欧美精品在线观看 | 亚洲第一电影网av| 日韩国内少妇激情av| 手机成人av网站| 亚洲精品中文字幕在线视频| 欧美黑人精品巨大| 国产黄a三级三级三级人| 国产一区二区在线av高清观看| 麻豆国产av国片精品| 人人妻人人看人人澡| 草草在线视频免费看| 日本一区二区免费在线视频| 亚洲专区国产一区二区| 免费电影在线观看免费观看| 18禁裸乳无遮挡免费网站照片 | 久久久久久九九精品二区国产 | 男人的好看免费观看在线视频 | 美女国产高潮福利片在线看| 两个人免费观看高清视频| 久9热在线精品视频| 又黄又粗又硬又大视频| 久久精品国产亚洲av香蕉五月| 可以在线观看的亚洲视频| 又黄又粗又硬又大视频| 亚洲久久久国产精品| 精品日产1卡2卡| 亚洲精品国产区一区二| 亚洲一码二码三码区别大吗| 中文字幕高清在线视频| 日本精品一区二区三区蜜桃| 一卡2卡三卡四卡精品乱码亚洲| 亚洲一区二区三区色噜噜| 国内毛片毛片毛片毛片毛片| 亚洲av中文字字幕乱码综合 | 久久青草综合色| 美女大奶头视频| 欧美色视频一区免费| 不卡av一区二区三区| 亚洲成人国产一区在线观看| aaaaa片日本免费| 日韩中文字幕欧美一区二区| 国产成人精品无人区| 一级毛片女人18水好多| 国产一卡二卡三卡精品| 特大巨黑吊av在线直播 | 亚洲一区高清亚洲精品| 亚洲 国产 在线| 啪啪无遮挡十八禁网站| 国产免费男女视频| 99在线人妻在线中文字幕| 亚洲国产中文字幕在线视频| 人人妻人人澡欧美一区二区| 久久香蕉激情| 欧美成人午夜精品| 两个人视频免费观看高清| 欧美一级a爱片免费观看看 | 1024视频免费在线观看| 国产精品国产高清国产av| 19禁男女啪啪无遮挡网站| 欧美另类亚洲清纯唯美| 亚洲国产精品sss在线观看| 欧美成狂野欧美在线观看| 亚洲最大成人中文| 欧美日韩亚洲综合一区二区三区_| 91大片在线观看| 久久久国产欧美日韩av| 别揉我奶头~嗯~啊~动态视频| 老司机在亚洲福利影院| 天天添夜夜摸| 久久热在线av| 久热这里只有精品99| 非洲黑人性xxxx精品又粗又长| 在线观看66精品国产| 亚洲国产欧洲综合997久久, | 美女高潮到喷水免费观看| 午夜免费激情av| 国产精品美女特级片免费视频播放器 | 夜夜夜夜夜久久久久| 成人一区二区视频在线观看| www.自偷自拍.com| 香蕉丝袜av| 欧美中文日本在线观看视频| √禁漫天堂资源中文www| 亚洲av五月六月丁香网| 国产精品一区二区三区四区久久 | www.精华液| 欧美绝顶高潮抽搐喷水| 国产av在哪里看| 19禁男女啪啪无遮挡网站| 91国产中文字幕| 国产激情久久老熟女| 亚洲中文字幕日韩| 国产免费av片在线观看野外av| 国产成人影院久久av| 欧美最黄视频在线播放免费| 亚洲男人天堂网一区| 99久久综合精品五月天人人| 免费看a级黄色片| 好男人在线观看高清免费视频 | 最近在线观看免费完整版| 一级黄色大片毛片| 国产亚洲精品久久久久5区| 国产精品电影一区二区三区| 国产欧美日韩精品亚洲av| www.精华液| 精品久久久久久,| 热99re8久久精品国产| 亚洲中文字幕一区二区三区有码在线看 | 日韩欧美 国产精品| 最近最新免费中文字幕在线| 欧美精品亚洲一区二区| 亚洲av熟女| 国产亚洲精品综合一区在线观看 | 大香蕉久久成人网| 变态另类成人亚洲欧美熟女| 久久天躁狠狠躁夜夜2o2o| 精品国产国语对白av| 久久精品aⅴ一区二区三区四区| 97碰自拍视频| 黄色女人牲交| 亚洲五月天丁香| 亚洲国产中文字幕在线视频| 国产精品一区二区精品视频观看| 美女免费视频网站| 黄频高清免费视频| 国产熟女午夜一区二区三区| 色尼玛亚洲综合影院| 亚洲中文字幕一区二区三区有码在线看 | 亚洲一区中文字幕在线| 午夜亚洲福利在线播放| 超碰成人久久| 欧美成人性av电影在线观看| 亚洲国产精品合色在线| 搡老妇女老女人老熟妇| 看黄色毛片网站| 黄色视频不卡| 久久国产亚洲av麻豆专区| 亚洲av成人av| 99精品在免费线老司机午夜| 亚洲精品国产精品久久久不卡| 校园春色视频在线观看| 不卡av一区二区三区| 国产精品精品国产色婷婷| 18禁黄网站禁片午夜丰满| 在线国产一区二区在线| 波多野结衣av一区二区av| 欧美激情高清一区二区三区| 久久伊人香网站| 黄网站色视频无遮挡免费观看| 国产一区二区激情短视频| 国产欧美日韩一区二区精品| 中文字幕久久专区| 国产一级毛片七仙女欲春2 | 久久久久九九精品影院| 一级毛片女人18水好多| 国产av在哪里看| 欧美在线一区亚洲| 精品国产乱子伦一区二区三区| 久久精品人妻少妇| 最近最新中文字幕大全免费视频| www.熟女人妻精品国产| 男人舔女人的私密视频| 精品久久久久久久毛片微露脸| 亚洲欧美激情综合另类| 国产伦在线观看视频一区| 国产精品影院久久| 国产精品久久久久久人妻精品电影| 国产精品 欧美亚洲| 曰老女人黄片| 国产不卡一卡二| 国产成人精品无人区| 国产激情久久老熟女| 国产精品亚洲一级av第二区| 国产精品爽爽va在线观看网站 | 亚洲精品在线观看二区| 首页视频小说图片口味搜索| 精华霜和精华液先用哪个| 夜夜夜夜夜久久久久| 久久人人精品亚洲av| 老司机午夜十八禁免费视频| 欧美又色又爽又黄视频| 在线av久久热| 国产在线观看jvid| 成人三级做爰电影| 神马国产精品三级电影在线观看 | 夜夜看夜夜爽夜夜摸| 亚洲人成77777在线视频| 99热这里只有精品一区 | 亚洲一码二码三码区别大吗| 成人精品一区二区免费| 亚洲片人在线观看| 非洲黑人性xxxx精品又粗又长| 欧美日韩精品网址| 中文字幕另类日韩欧美亚洲嫩草| 看黄色毛片网站| 男女床上黄色一级片免费看| 女警被强在线播放| 国产一区二区三区视频了| 中国美女看黄片| 久久精品亚洲精品国产色婷小说| 男女床上黄色一级片免费看| 成熟少妇高潮喷水视频| 女性被躁到高潮视频| 国产精品久久久人人做人人爽| 欧美色欧美亚洲另类二区| 在线观看66精品国产| 久久久国产精品麻豆| 久久久久久亚洲精品国产蜜桃av| 精品国产亚洲在线| 99riav亚洲国产免费| 成人特级黄色片久久久久久久| 久久久久九九精品影院| 12—13女人毛片做爰片一| 一级作爱视频免费观看| 999久久久精品免费观看国产| 日韩av在线大香蕉| 琪琪午夜伦伦电影理论片6080| 成人手机av| 两性午夜刺激爽爽歪歪视频在线观看 | 久9热在线精品视频| 欧美激情久久久久久爽电影| 日本免费一区二区三区高清不卡| 免费观看人在逋| 精品高清国产在线一区| 少妇被粗大的猛进出69影院| 性欧美人与动物交配| ponron亚洲| 母亲3免费完整高清在线观看| 国产伦在线观看视频一区| 亚洲久久久国产精品| 色尼玛亚洲综合影院| 午夜a级毛片| 久久久精品国产亚洲av高清涩受| 身体一侧抽搐| 久久精品91无色码中文字幕| 国产免费男女视频| 久久久久久大精品| 黑人欧美特级aaaaaa片| 伊人久久大香线蕉亚洲五| 国产精品日韩av在线免费观看| 亚洲欧美精品综合久久99| 亚洲国产中文字幕在线视频| 成人国产综合亚洲| 怎么达到女性高潮| 国产又色又爽无遮挡免费看| 99久久精品国产亚洲精品| 18禁观看日本| 香蕉国产在线看| 女同久久另类99精品国产91| 日本免费a在线| 久久 成人 亚洲| 欧美黑人欧美精品刺激| 国产又黄又爽又无遮挡在线| 久久欧美精品欧美久久欧美| 久99久视频精品免费| 欧美一区二区精品小视频在线| 久久精品成人免费网站| 免费无遮挡裸体视频| 欧美激情高清一区二区三区| 久久久久久久久中文| 黄色视频不卡| 黄色a级毛片大全视频| 国产高清激情床上av| 制服诱惑二区| 不卡一级毛片| 国产av又大| 亚洲一区二区三区不卡视频| 国产一区二区在线av高清观看| 50天的宝宝边吃奶边哭怎么回事| 精品国产超薄肉色丝袜足j| 一个人观看的视频www高清免费观看 | 一本一本综合久久| 9191精品国产免费久久| 亚洲成av片中文字幕在线观看| 女人被狂操c到高潮| 国产精品久久久久久亚洲av鲁大| 久久午夜亚洲精品久久| 婷婷精品国产亚洲av| 国产精品香港三级国产av潘金莲| aaaaa片日本免费| 亚洲精品在线观看二区| 欧美乱妇无乱码| 国产伦在线观看视频一区| 露出奶头的视频| 国产精品一区二区免费欧美| 99re在线观看精品视频| 少妇的丰满在线观看| 每晚都被弄得嗷嗷叫到高潮| 久久亚洲真实| 国产精品免费视频内射| 狠狠狠狠99中文字幕| 香蕉久久夜色| 在线免费观看的www视频| 午夜福利成人在线免费观看| 欧美av亚洲av综合av国产av| 久99久视频精品免费| 国语自产精品视频在线第100页| 国产精品爽爽va在线观看网站 | 亚洲精品一卡2卡三卡4卡5卡| 国产高清有码在线观看视频 | av片东京热男人的天堂| 亚洲精品一卡2卡三卡4卡5卡| 欧美黑人精品巨大| 亚洲人成电影免费在线| 久久久久久久久中文| 丁香欧美五月| 久久精品成人免费网站| 麻豆一二三区av精品| 啦啦啦免费观看视频1| 国产色视频综合| 黄色毛片三级朝国网站| 亚洲av成人不卡在线观看播放网| 免费高清在线观看日韩| 成年免费大片在线观看| 91在线观看av| 精华霜和精华液先用哪个| 亚洲九九香蕉| 国产aⅴ精品一区二区三区波| www.自偷自拍.com| 国产精品久久久久久人妻精品电影| 久久热在线av| 国产精品久久久久久亚洲av鲁大| 欧美zozozo另类| 真人做人爱边吃奶动态| 亚洲精品久久成人aⅴ小说| 欧美日韩一级在线毛片| 亚洲午夜精品一区,二区,三区| 19禁男女啪啪无遮挡网站| 丰满人妻熟妇乱又伦精品不卡| 国产av在哪里看| a在线观看视频网站| netflix在线观看网站| 久久婷婷人人爽人人干人人爱| 18禁黄网站禁片午夜丰满| 国产精品免费视频内射| 国产一区二区三区在线臀色熟女| 亚洲第一电影网av| 色在线成人网| 久久久国产成人免费| 国产精品1区2区在线观看.| 久久久久久大精品| 在线播放国产精品三级| 黄色女人牲交| 日本一本二区三区精品| 天堂√8在线中文| 成人欧美大片| 在线免费观看的www视频| 欧美久久黑人一区二区| 国产精品久久久久久精品电影 | 91成人精品电影| 99久久国产精品久久久| 99久久久亚洲精品蜜臀av| 久9热在线精品视频| 久久久久久人人人人人| 女警被强在线播放| 亚洲 国产 在线| 免费在线观看黄色视频的| 午夜福利高清视频| 亚洲成人久久爱视频| 久久久久亚洲av毛片大全| 免费在线观看亚洲国产| 久久久国产欧美日韩av| 91麻豆av在线| 午夜a级毛片| 国产精品 欧美亚洲| 国产一区二区在线av高清观看| 婷婷亚洲欧美| 99精品久久久久人妻精品| 日韩精品免费视频一区二区三区| 99国产精品99久久久久| 一边摸一边抽搐一进一小说| 最好的美女福利视频网| 中文字幕最新亚洲高清| 91av网站免费观看| 欧美亚洲日本最大视频资源| 校园春色视频在线观看| videosex国产| 国产亚洲精品久久久久久毛片| 欧美黄色淫秽网站| 美女高潮喷水抽搐中文字幕| 色婷婷久久久亚洲欧美| 真人一进一出gif抽搐免费| 国产不卡一卡二| 成人精品一区二区免费| 亚洲精品久久国产高清桃花| 色在线成人网| 免费观看精品视频网站| 亚洲一码二码三码区别大吗| 久久精品人妻少妇| 成人18禁在线播放| 久久中文字幕一级| 黄色 视频免费看| 午夜福利成人在线免费观看| 视频区欧美日本亚洲| 久久香蕉精品热| 亚洲第一欧美日韩一区二区三区| 美女高潮喷水抽搐中文字幕| 色老头精品视频在线观看| 午夜老司机福利片| 精品乱码久久久久久99久播| 熟妇人妻久久中文字幕3abv| 午夜精品在线福利| 一区福利在线观看| 精品国产国语对白av| 午夜精品在线福利| 亚洲片人在线观看| 亚洲国产日韩欧美精品在线观看 | 嫩草影视91久久| 精品第一国产精品| 大型av网站在线播放| 天天躁夜夜躁狠狠躁躁| 制服人妻中文乱码| 日日干狠狠操夜夜爽| 97碰自拍视频| 人人澡人人妻人| 母亲3免费完整高清在线观看| 亚洲精品一区av在线观看|