• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Improved Enhanced Dbtma with Contention-Aware Admission Control to Improve the Network Performance in Manets

    2019-08-13 05:54:06SivaramYuvarajAminSalihMohammedManikandanPorkodiandYuvaraj
    Computers Materials&Continua 2019年8期

    M.Sivaram,D.Yuvaraj ,Amin Salih Mohammed,V.Manikandan,V.Porkodi and N.Yuvaraj

    Abstract: DBTMA relies entirely on RTS/CTS dialogue for un-collided transmission of data.The purpose is to improve the QoS at MAC layer by developing it over 802.11e standard.However,DBTMA does not guarantee real-time constraints without efficient method for controlling the network loads.The main challenges in MANETs include prediction of the available bandwidth,establishing communication with neighboring nodes and predicting the consumption of bandwidth flow.These challenges are provided with solutions using Contention-Aware Admission Control (CACP) protocol.In this paper,the EDBTMA protocol is combined with CACP protocol that introduces bandwidth calculation using admission control strategy.The calculation includes certain metrics like:admission control and bandwidth consumption.To compute the bandwidth of channel,bandwidth utilization and traffic priority is distinguished through dual busy tone is proposed.This operates distinctly on its own packet transmission operation.This CACP mechanism defends the conventional traffic flows from new nodes and based on the measured status information of the channel,it QoS of the admitted flows is maintained.This ensures maximum amount of bandwidth flows accommodated by resources and determines the resources in a system meet the new flow requirements while maintaining existing bandwidth flow levels.

    Keywords: Edbtma,cacp protocol,mac layer,manets.

    1 Introduction

    The IEEE 802.11e MAC protocol improves the 802.11 CSMA/CA standard’s contention technique that allows adjustment in previously fixed MAC parameters.IEEE 802.11e protocol is studied extensively in literatures and the present study almost confines to critical and simulation studies,which compares EDCA with proposed DBTMA.Due to severe lack of hardware devices,the experimental study could be conducted in evaluating the comparison performance of the 802.11 protocol with the proposed one.However,with available hardware,investigations over 802.11e EDCA protocol are done in real-time environment.

    EDCA provides prioritized QoS that further enhances the contention based DCF.This offers a segregated and distributed access to all the wireless communicating medium for QoS stations that uses 8 dissimilar priorities of users.Formerly,each data packet that is received from the respective higher layer is been assigned with a specific values of user priority,before the packet enters the MAC layer.There is an issue during implementation,when the priority value is set for each packet.The EDCA technique provides 4 varied queuing namely first-in first-out (FIFO) queues.This is referred as access categories(ACs) that helps in supporting the traffic delivery with UP over the QoS stations.The data packet obtained from higher layer provided with specific value of user priority is mapped to its respective ACs.

    A relative prioritization is used to root specifications from the bridge specification of IEEE 802.1d [Wietholter and Hoene (2003)].Various types of applications (e.g.,best effort traffic,background traffic,voice and video traffic) is directed over to ACs in the network.Each AC possess an enhanced DCF variant,named as enhanced distributed channel access function (EDCAF) that resists TXOPs in using EDCA parameter’s set from the Set element of EDCA Parameter.Otherwise,the default parameter values are taken into consideration when there is no EDCA Parameter Set element is received.Additionally,there are certain issues in EDCA protocol over MAC layer,which is discussed in following section.

    1.1 Issues in EDCA over MAC layer

    EDCA possess two different collision types:first is classical collision/real collision that ensures two or more ACs that are active within two or more QoS stations.The selected Qos Stations are different,and they access the communication medium at same intervals.The second category of collision is a virtual or internal collision,which occurs when two ACs within same QoS station access the communication medium at the simultaneous intervals [El Masri and Abdellatif (2009)].

    The IEEE 802.11 Wireless LANs (WLANs) is employed widely that ensures universal networking.This is completely due to its easier installation,flexible nature and robustness against node failures.Despite its broad dissemination,the IEEE 802.11 MAC protocol does not support real-time applications that are specific characteristics like timing jitter and packet delay.

    This wireless MAC possess multi-data rate with routers and clients possessing varying data rates.The performance (throughput) of the IEEE 802.11 channel access behaves very poor or it degrades during channel access in multi-rate and overall networks [Li,Pal,and Yang (2008)].The major problem essential in IEEE 802.11s communication is the fairness problem in EDCA multihop networks at MAC channel access protocol.The unfairness is evident in busty conditions and it is not resolved totally in multiple radios that is tuned on multiple access channels.

    The IEEE 802.11 provides long transmission opportunities in each contending nodes of the wireless network.Additionally,it provides channel share proportionate with the data rate of the channel.In actual fact,the IEEE 802.11MAC adopts a fixed contented channel access schema that is termed as Distributed Coordination Function or DCF.This is based purely on CSMA/CA protocols that cannot provide definite networking services.These limitations could be overridden through certain innovations of 802.11e working group.The innovations include Hybrid Coordination Function or HCF that is otherwise an enhanced access method.HCF specifies signaling of messages over certain service request and QoS negotiations and 4 ACs using various priorities that maps the QoS requirements of the users.Especially,HCF assigns Transmission Opportunities (TXOP) over each ACs for satisfying the needs of QoS.This takes place where TXOP is distinct as the time interval during which a station can transmit.This in turn is categorized based on the starting time and the total duration.

    The design of QoS fairness possesses severe several disadvantages that specifically signify during diverse flow in traffic.The applications of diverse traffic flow include video,VoIP and TCP traffic that are active concurrently in the cell.Since,network is incapable in providing them the essential guaranteed service guarantees that includes constant bandwidth for real-time traffic flows.The unfairness problem is insignificant in IEEE 802.11s EDCA communication due to its severe dissimilarity in traffic load among clients and routers.

    1.2 Impact of EDCA over MAC protocol

    The MAC protocol is accountable for the distribution of transmission opportunities in channel.The transmission tries to deliver fair access or same channel share for all active nodes.This is considered without segregating the mobile stations (STAs) and access point (AP).Even though,the performance of EDCA protocol is found in MANETs,it is found that there is a limitation in its packet-level metrics.This includes various factors like delay;throughput and entire focus of EDCA behavior/impact over MAC behavior includes collision and transmission probabilities.

    1.3 Impact of EDCA with DBTMA

    Furthermore,the EDCA could be used with simple and RTS/CTS- channel access methods.The mathematical investigations are accomplished for both channel access with diverse limits on retransmission [Kosek Szott,Natkaniec and Pach (2011)].However,the use of traditional CSMA/CA system provides hidden and exposed terminal problem that concedes the channel access with reduced capacity in network performance.The loss in chancel utilization is address in terms of various systems that includes RTS/CTS network.Hence the present study moves its concentration over a new MAC protocol that should accompany the RTS/CTS based channel access and considers the hidden and exposed terminal problems.Hence,Dual Busy Tone Multiple Access (DBTMA),a multiple access technique in MANETs for packet radio networks is considered for the current study.

    2 Problem statement

    Quality of Service is an important parameter that decides the trusted immediate nodes or hops.Routing through such nodes or hops should be efficient enough to deliver the packets to destination without intrusion.Certain defence,search and rescue operations required a better QoS,however,the availability of such QoS services is inhibited due to several constraints in MANETs.Here the present study discusses the major issues in MANETs namely:hidden terminal problem and exposed terminal problem [Jayasuriya,Perreau,Dadej et al.(2004)],which affects significantly the QoS performance MANETs.

    2.1 Hidden terminal problem

    Fig.1 Illustrates the hidden terminal problem in MANETs.If a node that is hidden outside the range of transmission of a sender,however,it lies within the receiver range is considered as hidden terminal.Since the transmission of mobile node range is limited,multiple transmitters within the same receiver range could not have known about the existence of other transmissions.In this way,the nodes are hidden from each other.The nodes transmit in/around at the same time and the real problem is that they don’t recognize that there is a collision in its transmissions on the way to receiver.

    Consider that there exist four nodes A,B,C,and D (Fig.1).The communication range of each node is shown in dotted circle.Consider that the A node is in communication with B node.Assume,there exist a node C and that needs to transmit packets to D node.If the C Node senses that the channel as free,it could start its transmission,however,at node B,there exist a collision.This is considered as hidden terminal problem that significantly degrades the throughput performance in MANETs.

    Figure1:Problem identification - hidden terminal problem

    2.2 Exposed terminal problem

    Fig.2 shows the exposed terminal problem in MANETs.Exposed terminal/nose is one,which lies in the transmission range and lies outside the reception range.The exposed node leads to underutilization of network bandwidth/capacity.

    Consider that there exit four nodes in a network namely,A,B,C,and D (Fig.2).Here,the node C wants to communicate with node D.If node B transmits the packets to node A and if Node B finds that the channel is busy,then it fails to transmit to node A.Although the transmissions that happened cannot causes collision at node D,however,node B is allowed to stop its transmission.From this it could be inferred that the node B is considered as an Exposed Node.This probably leads to inefficient utilization of bandwidth at B node.Hence,the problem of inefficient bandwidth utilization due to B node is considered as exposed terminal problem.

    Figure2:Problem identification-exposed terminal problem

    The Hidden terminal and exposed terminal problems frequently occur in MANET that significantly degrades the throughput of the network.To overcome the hidden terminal and exposed node problem in MANETs,modified RDTMA and EDBTMA protocols are proposed.

    3 Related works

    The hidden terminal and exposed terminal problem are regarded as major concern in MANETs.Conventional methods provide various opportunities for the networks to get rid of such terminal issues.However,there are certain disadvantages associated with the conventional methods.This chapter provides a detailed insight on collision avoidance,hidden terminal and exposed terminal problems and fairness problem in conventional EDCA and DBTMA protocols.The comparison between EDCA and DBTMA is considered since,they are basis protocols in IEEE 802.11e suite.The IEEE 802.11e standard provides an ultimate powerful supporting platform for QoS in Wireless networks.Hence,EDCA protocol is chosen for the comparison purposes.

    3.1 Dbtma techniques on hidden and exposed terminal problem

    The main aims of the MAC protocol are to provide synchronized multiple nodes access over shared communication medium.This maintains higher utilization network.Here,hidden and exposed terminal problem in conventional literatures tries solving or improve the performance in MAC scheme over single/multi-hop networks.

    Deng et al.[Deng and Haas (1998)] proposed Dual Busy Tone Multiple Access (DBTMA)technique in packet radio networks.They tried to solve the hidden and exposed terminal problem in MAC protocol to improve the bandwidth utilization.To achieve these RTS/CTS dialogues are used,however,such schemes possess higher performance degradation basic access method.Henceforth,degradation in utilization,propagation and long transmission delays could lead to poorer performing network.In addition to RTS/CTS,dual busy tones separate the usage of forward and reverse communication.The performance results of dual busy tone are twice the time effective as RTS/CTS signaling method.

    Haas et al.[Haas,Deng and Tabrizi (1999)] proposed a scheme where each node uses dual out band busy tone signals along with RTS/CTS dialogues.The dual out band tones work for notification purpose over entire node within the range of transmission and reception.The assurance of hidden and exposed back-off terminals,however,does not defer.The dual busy tones are regarded as narrow band signals with extra hardware requirements are limited in this literature.Dual busy tones are sensed as meek and implemented using narrow band comparator and filter.The use of busy tones in MAC protocol,possibly helps in using variable packet length for transmission purpose.

    Haas et al.[Haas and Deng (1999)] proposed the DBTMA scheme to operate in a decentralized network like Packet Radio Networks.The usage of RTS/CTS dialogue reserves DBTMA channel.Additionally,two busy tones are used for notifying the neighboring nodes with effective channel reservation in current packet transmission and reception.The performance analysis proved that the DBTMA protocol delivers higher utilization of network that is 100% more than RTS/CTS dialogue schemes.

    Haas et al.[Haas and Deng (1999)] designed DBTMA scheme for multi-hop distributed networks with RTS/CTS dialogue mechanism.This protocol reserves the channel to be shared in multi-hop environment.Nodes in transmitter and receiver range cannot hear the successful RTS/CTS exchange of message.This leads to destruction of data and data access collisions.Thus,two busy tones with narrow bandwidth are used and that notifies neighboring nodes with current channel transmissions.The capacity of channels is analyzed using DBTMA protocol.Various network utilization parameters over multihop networks provides analysis on the DBTMA performance with RTS/CTS dialogue schemes.The DBTMA scheme proved with better collisions prevention than other schemes.

    Haas et al.[Haas and Deng (2002)] address again the problem of hidden and exposed terminals and proposed a modified RTS dialogue scheme.The MAC schemes that use RTS/CTS cannot solve terminal problems,hence the MAC schemes are considered to be fully in-secured in connected wireless networks.Hence,a MAC protocol with DBTMA scheme is proposed and its operation on RTS packet with 2 narrow bandwidth and outband busy tones is used.The RTS packet is installed using the receiver along with a busy tone.The busy tone set up by transmitter completely provides full protection for RTS packets and it increases the successful RTS reception probability.Consequently,this has increased the network throughput.Simulation provided the analytical results and the DBTMA protocol performs superior than other RTS/CTS schemes over one channel and that rely over single busy tone.

    Zhai et al.[Zhai,Wang,Fang et al.(2004)] studied the inefficiency of networks due to hidden and exposed terminal problem,blocking problem of receiver and an intra-flow contention problem.These problems lead to detonation in control packets providing very poor throughput performance.Thus,MAC protocol for IEEE 802.11 wireless network is proposed.The proposed MAC protocol with features includes an architecture with a two communication wireless channels and outband busy tone.Along with this the control and data frames are included.The procedure for exchanging the message provides inclusive solution to these four problems.This scheme provides a better performance over the four problems that could improve greatly the spatial reuse and eliminate the data packet collisions.A stable link layer that possess few control overheads proved well the performance with less routing failures.Consequently,the throughput of the system is improved well than the 802.11 MAC system.

    [Yeh (2004)] identified multiple unique problems over multihop wireless networks.An interference aware multiple access scheme MAC in multihop adhoc and wireless LAN networks.Depending on the CTS (triggered),dialogues-detached and object to sending mechanisms,these schemes are used.The interference aware multiple access is a distributed MAC scheme that solves the additive interference problem using common channel that is shared by data packets and control messages.The distributed MAC scheme achieves the interference that does not rely on busy tone with a dual transceiver.Interference aware multiple access solves the heterogeneous hidden terminal or exposed terminal problem with adjustable power that does not rely on hardware for signal strength measuring and supports the multiple access and interference in directional antennas.

    Yu et al.[Yu and Yin (2005)] presented a joint Physical layer MAC design in a wireless adhoc networks.This syndicates the DBTMA integrated with physical system with modifications over orthogonal frequency division multiplexing system that is proposed in 802.11a.The performance analysis indicates that this scheme provides better performance than 802.11 MAC protocol with lesser complexity than other solutions.Additionally,the system is made compatible with 802.11a wireless networks.

    Leng et al.[Leng,Zhang and Chen (2005)] proposed a dual MAC schemes for solving the hidden terminal and exposed problem in the wireless adhoc networks.This method possesses a larger range of interference.Further,the usage of dual busy tones in a single scheme is provides an improvement toward 802.11 networks.The second scheme signifies exactly the range of interference that adjusts the busy tones’ transmission power.These two schemes prevent the data packet or acknowledgement packet collision.The results proved that the two schemes enhance significantly the throughput (saturation) of 802.11 wireless networks.The method further provides a balance between or a trade-off between collision avoidance and spatial reuse.

    Wang et al.[Wang,Jiang and Zhuang (2006)] proposed a busytone MAC scheme that supports the data or voice traffic address the problems of hidden terminal and exposed terminal problem.Dual busy tone narrowband separate channels with varied ranges of carrier sensing resolves completely the hidden and exposed terminal problems.Additionally,the extension of busy tones over the busy tone transmitter channel,the scheme guarantees the voice traffic independent priority access over delay sensitive schemes over certain user locations.The long and short term QoS performance to required data traffic over multi hop wireless environment has improved greatly than 802.11e MAC schemes.

    Wang et al.[Wang and Zhuang (2006)] enhanced the conventional busytone dialogues for resolving the collisions in RTS occurs due to hidden terminals.The addition of two separated busytone and setting of various ranges of carrier sensing over different channels avoids collisions completely.This includes the data packets and RTS collisions that is caused due to hidden terminal problem.The carrier sensing range setting of transmitter busy tone is twice the carrier sensing range of receiver channels and avoids 100% collision due to hidden terminals.

    Wang et al.[Wang and Ali (2006)] studied the modeling of MAC protocol for wireless adhoc networks.DBTMA is considered to solve the hidden terminal and exposed terminal problem.The conventional evaluation performance of DBTMA failed in considering the hidden terminal problem.Hence to improve the performance analysis,hybrid MAC protocol of Channel Reservation and Busy Tone technique is proposed to consider the aforementioned problem.The performance evaluation failed to provide higher throughput results than the conventional DBTMA model.

    Yuan et al.[Yuan,Zhu,Liu et al.(2007)] proposed Combined DBTMA protocol that uses a single busy tone channel for implementing the entire functions the DBTMA possess.This significant does not losses the system performance.The hidden terminal and exposed terminal problems with less capacity wastage is considered.However,end to end delay is longer than DBTMA technique because of additional delaying parameter.Hence,this technique is considered useless for impending wireless LAN without terminal problems.

    Yeh [Yeh (2007)] proposed the detached busytone method as a solution to get rid of receiver busy tone self-interference.The busytone is transmitted in the form of outband narrow tone signals that helps in transmission of associated data packets.Hence,an advanced busytone multiple access method (ABTMA) is proposed with dual busytone.Additionally,several such advanced subclasses protocol that includes pure ABTMA,collision avoidance ABTMA and RTS-ABTMA with its respective gains.Specifically,the shortened busytone method reduces significantly the identified overhead problem occurring due to induced idleness dialogues.This exists in RTS/CTS dialogue-based MAC for 802.11 or 802.11e protocols with control channels.Also,a self-interference busy tone cancelation method for inband and mixed approach coexist in CSMA or 802.11 or 802.11e wireless networks or busy toneless frequency hopping networks.The busytone detached,busytone shortened,and self-interference busytone cancelation provides better performance throughput than PCMA and DBTMA.However,DBTMA performs well with the use of RTS/CTS signaling.

    Kalfas et al.[Kalfas,Papadimitriou,Nicopolitidis et al.(2007)] studied the extremely vulnerability in adhoc networks due to hidden terminal and exposed terminal problems.This results in subsequent reduction of network capacity.The lack of knowledge over surrounding scenario,an in-wrought characteristic over with wireless adhoc networks,is the major purpose for the performance degradation in MANETs.To problems are addressed effectively using Wireless Medium Access Record Keeping methods that combines the table-driven busy tone with power control protocols.Here,each node has local matrix relation that stores the on-going condition of adjacent nodes.The matrix records are updated periodically using status messages of transmission that possess RTS dialogue that initiates the transmission of data packets.The status messages get secured with busy tones for getting highest priority and maximize the probability of successful transmission.Finally,the power control scheme assures the allocation of best possible bandwidth allocation for wireless networks with maximum throughput.

    Wang et al.[Wang,Jiang and Zhuang (2008)] proposed a busytone MAC scheme that supporting data and voice traffic for address the hidden and exposed terminal problems.A two-narrow band busytone separated channels possessing varied carrier sensing ranges resolves the terminal problems.Besides,the use of busy tones for transmitter node with a back-off method,ensures the priority guaranteed access over delay sensitive traffic networks like voice over data traffic networks.The priority is locations independent depending on the user and it solves the problem of reverse priorities.The performance of fairness indications over data traffic is not connected fully with the scenarios that are improved greatly than 802.11e MAC protocol.This does not need an additional information to exchange packets between the neighbouring nodes.

    Liu et al.[Liu,Leng,Fu et al.(2009)] combatted the exposed terminal problem and the phenomenon of accumulating interference over wireless network channel.To resolve this issues,asymmetrical dual busy tones MAC protocol was proposed.The introduction of busy tone CTS dialogue mechanism along with the use of interfering node estimation algorithm solves the problems of exposed terminal and hidden terminal in large interference environment/ range.Further,the effects due to phenomenon of accumulating interference for busy tones is relieved through power adjustment method.

    Chen et al.[Chen and Li (2011)] proposed Hybrid Channel Reservation and Busy Tone protocol that is treated as a solution for the hidden terminal and exposed terminal problem.This responds well to the real-time transmission systems using reservation of channels and dual busy tone.Typically,the information about channel reservation is transmitted in the form of linked packets.Though,the proposed technique uses busy toneto overcome hidden terminal and exposed terminal problems and broadcasts the information about channel reservation.The performance results proved that the proposed protocols provide higher stability while reserving a channel.This has improved significantly since the reception of the information about channel reservation provides serious effects the existence of hidden terminal and exposed terminals problems.

    Poudyal et al.[Poudyal,Bhattacharjee,Panigrahi et al.(2012)] studies the lack of infrastructure,hidden terminal and exposed terminal problem,dynamic topology and other challenges in MAC wireless networks.The behaviour of two MAC protocols namely multiple access collision avoidance for wireless and DBTMA is studied.The performance evaluation is considered in terms of QoS via bandwidth utilization.The results provide suitable various network topologies for MAC protocol and provides guidelines for robust and efficient MAC protocols design.

    This section provides an insight of various techniques and its performance level in terms of the problems that are in existence with EDCA and DBTMA protocols.Additionally,the usage of RTS/CTS dialogue mechanism in EDCA motivated the study to consider the problems associated with EDCA and to provide a relationship with the DBTMA protocol.

    3.2 Throughput and delay analysis of DBTMA

    For an active node,the probability of packet transmission (RTS) over a node in a dedicated time slot is a.The probability of collision of the packet transmission with other packets is p.When the probability of packets,a and p interacts with one another.If the value of a is larger,then the probability of collision,p is increased and if the value of p is larger,then the nodes increases the durations that makes the value of a to reduce further.In steady state,assume a and p of a tag node is constant.Consider the network to be homogeneous,i.e.,the total number of neighboring nodes for each individual node is a constant one.Then assume a and p possess same value for all individual nodes.Hence,to understand the performance of the network,the value of a and p are found to be in steady state.

    4 Proposed method

    The throughput of a channel over a single transmission area with total number of nodes using DBTMA is considered as an analytical model with following assumptions:

    · The transmission time of DATA packet,the transmission time of RTS/CTS control packet and time of propagation:δ,γ and τ.

    · Consider,N similar nodes located over a single transmission area.Each node generates DATA packets with Poisson arrival distribution.

    · The complete traffic load with arrivals,λover each unit time,δ.Henceforth,the DATA packets arrival rate of each individual node is denoted asλ=/N.

    · The arrival of each individual node while processing a packet or blocked by the node is discarded.

    To calculate the throughput of a channel,a busy period signaling over a channel with transmissions within a period is considered in between two successive periods.However,a busy period signal may also possess successful transmission of DATA or collisions of packets.

    4.1 Packet transmission probability

    Consider a node that transmits a RTS packet form transmitter to the intended receiver.The receiver waits over a longer time long to acquire CTS packet.Hence,each request blocks the node that accepts the newer arrivals for the timet=2y+τ seconds.The probability of idle node is represented as:

    Pi=(λ+1)/(λ-1+t)

    Since,entire nodes are located within same area,RTS is successful and BTs is setup,then transmission of DATA packets is treated to be collision resistant.The probability of successful RTS packet at the time is similar to the probability of sending only the RTS packets for transmission,provided that there exists a single channel for transmission:

    Ps=-λNt/1-(λt+1)N

    A busy period defines the channel transmission that can be either unsuccessful or successful and calculated as:

    B=Ts Ps+Tf(1-Ps)

    Tsrepresents the expected time period of successful transmission andTfrepresents the expected time period of unsuccessful transmission.

    4.2 Collision probability

    A successful transmission period possesses transmission time of RTS packet,CTS packet and DATA packet,which monitored by τ.The successful cycle length is thus given as:

    Tc=δ+2γ+3τ Unsuccessful transmission periods possess multiple collided RTS packets.Since,the collision probability of RTS packets >2 is smaller than RTS packets =2,the packets >2 is neglected.The RTS packet transmission is similar to pure ALOHA transmission protocol.Since the assumption of Poisson arrival distributions (like memoryless and exponentially distributed inter arrival times),informs starting time of RTS packet collision to be distributed uniformly throughout the first RTS packet duration.Hence,the collision(average) duration is:

    The average utilization period (U) and idle period (I) over uniform time interval is expressed as:

    U=δ .PsandI=λ-1

    4.3 Throughput analysis

    The analysis of throughput is defined in terms of average duration between the effective packet transmission and unsuccessful packet reception or packet collisions.The DBTMA protocol in IEEE 802.11 communication is possess RTS/CTS dialogue mechanism.The Fig.3 shows the timing duration of successful transmission of packet,a packet collided in transmission of RTS packet and packet collided in transmission during CTS period.

    Figure3:Packet transmission in the presence of hidden-terminals

    The ACK,RTS and CTS denotes the timing duration of acknowledgement packets,ready to send packets and clear to send packets.The inter-frame timing,SISandDISdenotes specifically the short and distributed inter-frame space,respectively.TheTsdenotes the average time wasted by the channel,which senses the channel to be busy after the successful packet transmissions.TheTxdenotes the time wasted due to collision of packets during the transmission of RTS packets.TheThdenotes the time wasted by packets collision due to the availability of hidden terminals.Hence,

    E[T] = RTS + SIS + δ + CTS + SIS + δ + H + E[P] + SIS + δ+ ACK + DIS + δ

    where,

    δ-Propagation delay.

    H-Timing duration of PHY and DBTMA packet header

    P-Timing duration of payload packet.

    Tx=RTS+DIS+δ (3.10)

    Th=RTS+SIS+δ+CTS+DIS+δ (3.11)

    For simplicity,the value ofThis considered as the worst case criteria,where the hidden node of the network collides with CTS transmission packet.The periodvis given by:

    v=T+RTS+SIS+δ

    The complete solution is obtained by considering a criteria situation where RTS/CTS dialogue mechanism is casted-off.Such situation is shown in Fig.4.

    Figure4:Packet transmission and collision

    E[T]=SIS+δ+DIS+δ+H+E[P]+ACK

    E[Tx]=DIS+δ+H+E[P]

    E[Th]=DIS+δ+H+E[P]

    Hence,the periodvis expressed as:

    v=SIS+δ+H+E[P]+T

    Finally,THrepresents a per hop link node throughput that is considered as the percentage of transmitting time of a node (tagged),

    TH=ts/(ti+ts+to+tc)

    where,

    ts-time spent after a successful transmission by node (tagged),

    ti-time when channel being sensed as idle around the node (tagged),

    to-time of channel being used by other nodes,

    tc-time of node (tagged) facing collisions.

    ts=a· E[T] ·pn(1-p).

    ti=(1-pn) +Pi(1-a)-Pi(1-pn)(1-a)

    to=pn((1-Pi) (1- p)(1-a) · E[T]+(1-Pi)(1-a)(px· E[Tx]+ph· E[Th]-px ph· E[Th]))

    tc=a·pn(ph· E[Th]+px· E[Tx]-px ph· E[Th])

    Here,

    pn-probability of finding nodes of tagged node inside the transmission range withA=πλR2

    Pi-is the probabilitytchannel being sensed as idle around the node (tagged),

    pn=1-(1+A)e-A

    Pi=e-aA-(1+A-aA)e-A/(1-a) ·pn

    Finally,throughput of a single hop is defined as:

    TH_hop=(TH×E[P])/E[T]

    4.4 Delay analysis

    The delay analysis in MANETs requires the probability of successfully transmitted node that has achieved after multiple unsuccessful attempts say ‘n’.The probability of which is given as:ps(n)=pn(1-p)

    The average value of unsuccessful attempts is:

    Figure5:Rounds of transmission attempts

    where m-limit of retransmission.

    For a node (tagged),the time interval between the transmissions is divided into failed and successful rounds (Fig.3).When the node fails,the channel spends time in idle state,successful transmissions and in collision.Hence,the total duration of failure round of tagged node is defined as:

    E[f]=(ti+tc+to)/a (1-a (1-p))

    The numerator operator defines the unsuccessful transmission time and denominator defines the probability of unsuccessful attempts.However,channel with successful attempts in idle states,successful attempts of other nodes and collision with other nodes and leads to channel with successful attempts.Hence,the successful duration of tagged node is:

    E[s]=(ti+tc+to)/a (1- ap))

    The numerator operator defines the successful transmissions without collision and denominator defines the probability of successful attempts without collision.The node(tagged) gets repeating itself over average of na rounds and then it delivers the packet.The packet waiting time (average) before successful transmissions is:

    w=E[f] na

    Finally,the packet delay (average) before each successful delivery is expressed as:

    d=E[s]+w

    4.5 Collision detection

    In MANETs,a node is unable to transmit and receive packets concurrently,since the signal strength of the node is weaker than another nodes’ signal.The receiver detects collisions through Cyclic Redundancy Check (CRC) and that fails due to noise in channel,hidden nodes and same back-off intervals.Since,failures with different causes possess varied solutions and the receiver node recognizes the failure reason through CRC.Conversely,the receiver fails in differentiating various failure types in MANETs.The access points reject the available packet and stops transmitting the ACK signal.

    The detection accuracy over hidden collision is increased using following solution:Consider an access point that exploits a preamble in packet at its physical layer.The Pseudo-Random Noise (PRN) is made associated with the preamble in MANET communications that possess fixed pulse sequence.This pulse sequence is a deterministic periodic signal with an optimal solution,where the statistical properties look similar to Gaussian White Noise.The preamble does not dependent of other signals due the fact that it follows PRN properties.The preamble is detected in any situations i.e.,during signal overlaps.Each time a signal is received at receiver,preamble correlation is done in order to whether the signal is correlated with the packet.When the preamble correlation exceeds the threshold time,then the detection of packet by receiver signals sets the value of the flag to 1.Thus,the access points identify the collisions in hidden nodes collisions,when a preamble is detected during the reception of a packet.

    Here in this faster retransmission strategy,the access points decode the frame i.e.,collided regardless of the hidden collisions.If the second frame arrives once the MAC header of first frame is received successfully,then the access point obtains the information on MAC,frame type and first frame duration.The proposed faster retransmission scheme exploits information for providing a fast retransmission strategy to the nodes that are getting collided.

    5 Performance evaluation

    Simulations are performed using Network Simulator-version 2.3 (NS-2.3) that uses parameters like route discovery delay and time,packet loss ratio,throughput and other related metrics etc.,between the EDCA,DBTMA,RDBTMA and EDBTMA.Simulation results are given using NS-2.3 by comparing the parameters like delay,packet loss ratio,throughput,etc.between the DBTMA,RDBTMA and EDBTMA.Each simulation results signifies an average value over 50 random runs.The considered data rate of channel is 1 Mbps and nodes of 1000*1000 is used to simulate all the four protocols at MAC layer.

    This section provides a clear comparison of various parameters related to the performance evaluation of proposed DBTMA protocols in MANETs.The quality of service (QoS) parameter guarantees the successful delivery of network traffic in MANETs.The requirements QoS classically refers to standard metrics that includes packet loss,packet delivery ratio,network throughput,route discovery delay,jitter,packet dropping ratio and so on.The dynamic change in network topology,bandwidth limited constraints,bandwidth quality and link variation pose additional constraints in MANETs to achieve the QoS required for the specific system.

    The proposed method takes into account,the most important criteria that decides the QoS of MANETs i.e.,control overhead.The presence of control message increases the consumption of bandwidth resource.Since,bandwidth is a premium resource for a network,the careful design should be made to maintain the control messages at minimum level.However,the use of control messages increases twice the consumption of bandwidth during transmission than reception.Hence,the reduction of control overhead will impact on energy consumption in the network.

    The present study involves the comparison of various parameters associated with routing protocols of MANET.The standard metrics for comparison includes:total number of nodes,number of packets sent,number of packets received,packet delivery ratio,control overhead,normalized routing overhead,route discovery delay,network throughput,jitter,number of packets dropped dropping ratio,total energy consumption,average energy consumption,overall residual energy and average residual energy.The standard metrics are thus considered for QoS measurement in MANETs.

    Minimal Control Overhead Control messaging consumes bandwidth,processing resources,and battery power to both transmit and receive a message.Because bandwidth is at a premium,routing protocols should not send more than the minimum number of control messages they need for operation,and should be designed so that this number is relatively small.While transmitting is roughly twice as power consuming as receiving,both operations are still power consumers for the mobile devices.Hence,reducing control messaging also helps to conserve battery power.

    Quality of Service.A quality of service (QoS) guarantee is essential for successful delivery of multimedia network traffic.QoS requirements typically refer to a wide set of metrics including throughput,packet loss,delay,jitter,error rate,and so on.Wireless and mobile ad hoc specific network characteristics and constraints described above,such as dynamically changing network topologies,limited link bandwidth and quality,variation in link and node capabilities,pose extra difficulty in achieving the required QoS guarantee in a mobile ad hoc network.

    Table1:Results of various metrics

    Figure6:Packet delivery ratio

    Figure7:Route discovery delay

    Figure8:Throughput

    Figure9:Aggregated bandwidth

    6 Discussions

    The comparison of standard QoS metrics is taken into consideration for evaluating the Enhanced DBTMA with CACP protocol.Total number of nodes is varied for evaluating the performance to prove dynamic nature of the protocol.The nodes are varied from 100,125,150,175 and 200 for different evaluations,where the total packets sent on each 100,125,150 and 200 are 1602,and for 175 it is 3202.The total packets received for 100 nodes is 1596,for 125 it is 1557,150 received 1594 packets,175 with 3199 and finally 200 nodes in the network received 1513 packets.The transmission took place between two nodes in a network of nodes.The corresponding packet delivery ratio ranges from 94% to 99%,which is quite higher than RDBTMA protocol and the packet dropping ratio varies from 0.09% to 5.6%,which is lesser than RDBTMA.

    This proves the effectiveness of the proposed protocol with lesser dropping of packets than RDBTMA in MANETs.However,the control overhead of the network seems decremented drastically,due to reduced control packets using CACP procedure.The routing overheads varying in range from 0.4 to 8%,which is lesser than RDBTMA.Additionally,it could be proved that the system could perform with lesser delay i.e.,for 100 nodes,the route discovery delay is 0.071385 and so on.The total energy and overall residual consumption of the mobile nodes is reduced due to CACP and reduced control overhead.The throughput of the EDBTMA protocol seems promising with higher throughput rate than RDBTMA.The entire data on routing performance of Enhanced DBTMA is shown in Tab.1.

    The performance of the proposed schemes includes three concerns to be addressed:1.Network throughput,2.Bandwidth allocation,3.Collision avoidance.Addressing these concerns using proposed protocols improves the metrics associated with it e.g.,route discovery time,route discovery delay and faster transmission.The concerns are addressed through the modified DBTMA scheme resulted in following results:

    · The Delay in DBTMA is inversely proportional to the scalability of route discovery.Here the scalability of the network increases by 1.46% using Retransmission DBTMA and 2.80% using Enhanced DBTMA.

    · Secondly the throughput of proposed to Retransmission DBTMA increases to 1.60%than DBTMA and Enhanced DBTMA increases to 3.05% than DBTMA.

    · When collision occurs in DBTMA,the fast retransmission strategy is used for improving the network performance using RDBTMA

    ·The interfacing DBTMA with Contention aware admission control (CACP) strategy effects in admission control that improves the bandwidth efficiency using EDBTMA.

    ·The impact of modified DBTMA MAC routing protocol over AODV protocol increases the network responsiveness in terms of collision avoidance,faster transmission,higher throughput and reduced delay.

    7 Conclusions

    In this paper,an Enhanced Dual Busy-tone Multiple Access (EDBTMA) protocol for 802.11 communications in MANETs is proposed.The proposed EDBTMA protocol avoids or reduces the impacts due to hidden terminal and exposed terminal problems using busy tone out band signals.Contention aware Admission Control Protocol performs the admission control inside and outside the transmission range of the nodes.The CACP possess local resource information and admission of new flows of the neighboring nodes.This enhances the broadcast and multicast reliability transmission and provides a better control function for admission control.The EDBTMA with CACP improves well the QoS of MANETs by providing better bandwidth allocation with network delay and jitter.

    欧美bdsm另类| 欧美日韩国产mv在线观看视频| 免费在线观看完整版高清| 亚洲四区av| 91aial.com中文字幕在线观看| 亚洲三级黄色毛片| 欧美 亚洲 国产 日韩一| 国产极品粉嫩免费观看在线| 亚洲成色77777| 考比视频在线观看| 午夜精品国产一区二区电影| 亚洲国产最新在线播放| 成人18禁高潮啪啪吃奶动态图| 1024视频免费在线观看| 亚洲精品一二三| 美女国产高潮福利片在线看| 又粗又硬又长又爽又黄的视频| 高清黄色对白视频在线免费看| av在线老鸭窝| a 毛片基地| av国产精品久久久久影院| 日韩大片免费观看网站| 男女边摸边吃奶| www.av在线官网国产| 乱码一卡2卡4卡精品| 人妻人人澡人人爽人人| 亚洲欧洲日产国产| 五月伊人婷婷丁香| 中文字幕人妻丝袜制服| 蜜桃在线观看..| 久久久久久人妻| 国产片特级美女逼逼视频| 国产片内射在线| 免费播放大片免费观看视频在线观看| 99re6热这里在线精品视频| 熟女人妻精品中文字幕| 国产成人av激情在线播放| 哪个播放器可以免费观看大片| 久久这里有精品视频免费| 韩国高清视频一区二区三区| 色婷婷久久久亚洲欧美| 日韩欧美精品免费久久| 久久久久视频综合| 国产精品一国产av| 22中文网久久字幕| 夜夜爽夜夜爽视频| 久久 成人 亚洲| 菩萨蛮人人尽说江南好唐韦庄| 满18在线观看网站| 人体艺术视频欧美日本| 91精品三级在线观看| 亚洲精品成人av观看孕妇| 国语对白做爰xxxⅹ性视频网站| 在线观看国产h片| av片东京热男人的天堂| 国产精品成人在线| 亚洲av国产av综合av卡| 两性夫妻黄色片 | 国产毛片在线视频| 在线亚洲精品国产二区图片欧美| 妹子高潮喷水视频| 免费黄网站久久成人精品| 国产日韩欧美在线精品| a级片在线免费高清观看视频| 欧美 日韩 精品 国产| 国产乱来视频区| 中文乱码字字幕精品一区二区三区| 91精品国产国语对白视频| 国国产精品蜜臀av免费| 久久99精品国语久久久| 老司机影院毛片| 十八禁网站网址无遮挡| 女性生殖器流出的白浆| 日本91视频免费播放| 99热全是精品| 亚洲精品久久午夜乱码| 国产激情久久老熟女| 色吧在线观看| 少妇被粗大猛烈的视频| 老司机影院毛片| 又黄又爽又刺激的免费视频.| 99久久精品国产国产毛片| 精品第一国产精品| 99热国产这里只有精品6| 久久久久久久久久久久大奶| 久久久久久久久久人人人人人人| 午夜福利乱码中文字幕| 日韩制服丝袜自拍偷拍| 国产精品国产三级国产专区5o| 性色avwww在线观看| 色视频在线一区二区三区| 精品久久国产蜜桃| 国产极品粉嫩免费观看在线| 亚洲精品久久久久久婷婷小说| 夫妻性生交免费视频一级片| 尾随美女入室| 精品人妻一区二区三区麻豆| 十八禁高潮呻吟视频| 99热6这里只有精品| 美国免费a级毛片| av卡一久久| √禁漫天堂资源中文www| 在线观看免费日韩欧美大片| 香蕉丝袜av| 99re6热这里在线精品视频| 久久精品国产亚洲av涩爱| 国产精品国产av在线观看| 一级爰片在线观看| 免费黄频网站在线观看国产| 91成人精品电影| 欧美成人午夜免费资源| 18禁在线无遮挡免费观看视频| 亚洲综合色惰| 亚洲精品自拍成人| 久久久亚洲精品成人影院| 婷婷色麻豆天堂久久| 亚洲精品美女久久av网站| 亚洲性久久影院| 日韩视频在线欧美| 国产深夜福利视频在线观看| 99热这里只有是精品在线观看| 欧美xxxx性猛交bbbb| 亚洲国产精品成人久久小说| 黄色毛片三级朝国网站| 成人18禁高潮啪啪吃奶动态图| 亚洲国产欧美在线一区| 欧美bdsm另类| 国产 一区精品| 免费高清在线观看视频在线观看| 国产成人精品在线电影| 日韩一区二区视频免费看| 乱码一卡2卡4卡精品| av线在线观看网站| 久久久精品区二区三区| a级毛片黄视频| 大香蕉97超碰在线| 亚洲高清免费不卡视频| 综合色丁香网| 国产日韩一区二区三区精品不卡| 精品一区在线观看国产| 欧美少妇被猛烈插入视频| 亚洲内射少妇av| 久久这里只有精品19| 国产精品一国产av| 成人毛片a级毛片在线播放| 久久久久久久久久人人人人人人| 捣出白浆h1v1| 91精品三级在线观看| 在线精品无人区一区二区三| 女人久久www免费人成看片| 岛国毛片在线播放| 蜜桃在线观看..| 高清视频免费观看一区二区| 欧美老熟妇乱子伦牲交| 亚洲精华国产精华液的使用体验| 成年动漫av网址| 日韩精品免费视频一区二区三区 | 精品人妻一区二区三区麻豆| av黄色大香蕉| 乱码一卡2卡4卡精品| 精品99又大又爽又粗少妇毛片| 国产日韩欧美视频二区| 麻豆乱淫一区二区| 欧美xxxx性猛交bbbb| 国产老妇伦熟女老妇高清| 中文乱码字字幕精品一区二区三区| 午夜福利影视在线免费观看| 少妇人妻精品综合一区二区| 久久国产亚洲av麻豆专区| 卡戴珊不雅视频在线播放| 一区二区三区四区激情视频| 精品少妇内射三级| 亚洲综合精品二区| 视频中文字幕在线观看| 日韩精品有码人妻一区| 免费高清在线观看视频在线观看| 亚洲美女黄色视频免费看| 日韩制服骚丝袜av| 只有这里有精品99| 一级,二级,三级黄色视频| 五月伊人婷婷丁香| 国产精品国产三级国产av玫瑰| 日本午夜av视频| 汤姆久久久久久久影院中文字幕| 纵有疾风起免费观看全集完整版| 一级毛片黄色毛片免费观看视频| 国产成人精品无人区| 国产精品成人在线| freevideosex欧美| 国产极品天堂在线| av免费观看日本| av又黄又爽大尺度在线免费看| 2018国产大陆天天弄谢| 一级毛片电影观看| 黄色毛片三级朝国网站| 五月天丁香电影| 国内精品宾馆在线| 国产片特级美女逼逼视频| 亚洲精品日本国产第一区| 久久精品夜色国产| 少妇人妻精品综合一区二区| 欧美日韩亚洲高清精品| 午夜影院在线不卡| 97在线人人人人妻| 亚洲国产精品国产精品| 精品亚洲成国产av| 另类亚洲欧美激情| av有码第一页| videosex国产| 男女免费视频国产| 亚洲激情五月婷婷啪啪| 91在线精品国自产拍蜜月| 极品人妻少妇av视频| 国产男女内射视频| 最近中文字幕高清免费大全6| 国产精品女同一区二区软件| www.熟女人妻精品国产 | 九色亚洲精品在线播放| 欧美亚洲日本最大视频资源| 久久精品国产亚洲av天美| 韩国精品一区二区三区 | 这个男人来自地球电影免费观看 | 国产 精品1| 热re99久久精品国产66热6| 成年av动漫网址| 极品少妇高潮喷水抽搐| 秋霞伦理黄片| 伦精品一区二区三区| 国产一区二区激情短视频 | 国产精品熟女久久久久浪| 色婷婷久久久亚洲欧美| 狠狠婷婷综合久久久久久88av| 亚洲在久久综合| 久久人妻熟女aⅴ| 视频在线观看一区二区三区| 又大又黄又爽视频免费| 午夜久久久在线观看| 久久午夜综合久久蜜桃| 春色校园在线视频观看| 国产精品一区www在线观看| 欧美 日韩 精品 国产| 久久久久久久亚洲中文字幕| 久久av网站| 国产免费一级a男人的天堂| 国产精品一国产av| 人人妻人人澡人人看| 日韩中文字幕视频在线看片| xxxhd国产人妻xxx| www日本在线高清视频| 九九爱精品视频在线观看| 夜夜爽夜夜爽视频| 久久鲁丝午夜福利片| 久久女婷五月综合色啪小说| a级毛片在线看网站| 色婷婷av一区二区三区视频| 在线观看美女被高潮喷水网站| 亚洲 欧美一区二区三区| 色婷婷久久久亚洲欧美| 亚洲国产精品国产精品| 国产精品不卡视频一区二区| 日韩在线高清观看一区二区三区| 久久久久精品人妻al黑| 国产女主播在线喷水免费视频网站| 18在线观看网站| 中国三级夫妇交换| 免费大片18禁| 最近的中文字幕免费完整| 成人无遮挡网站| 国国产精品蜜臀av免费| 最近最新中文字幕免费大全7| 欧美国产精品一级二级三级| 最近手机中文字幕大全| 18禁动态无遮挡网站| 自线自在国产av| 少妇被粗大的猛进出69影院 | 欧美最新免费一区二区三区| 成人毛片a级毛片在线播放| 26uuu在线亚洲综合色| 青春草亚洲视频在线观看| 在线 av 中文字幕| av线在线观看网站| 秋霞伦理黄片| 男女免费视频国产| 成人手机av| 免费不卡的大黄色大毛片视频在线观看| 男女边吃奶边做爰视频| av在线播放精品| 国产片特级美女逼逼视频| 超碰97精品在线观看| 精品视频人人做人人爽| 成人亚洲精品一区在线观看| 18在线观看网站| av又黄又爽大尺度在线免费看| 亚洲精品久久午夜乱码| 欧美精品亚洲一区二区| 十八禁高潮呻吟视频| 欧美激情国产日韩精品一区| av.在线天堂| 如日韩欧美国产精品一区二区三区| 国产成人免费观看mmmm| 亚洲精品久久午夜乱码| 亚洲欧美一区二区三区国产| 精品亚洲成a人片在线观看| 高清视频免费观看一区二区| 九九在线视频观看精品| 精品人妻偷拍中文字幕| 制服诱惑二区| 国产精品一区二区在线不卡| 日韩 亚洲 欧美在线| 蜜桃国产av成人99| 精品视频人人做人人爽| 精品国产露脸久久av麻豆| 一区在线观看完整版| 日本av手机在线免费观看| 亚洲欧美日韩另类电影网站| 欧美精品高潮呻吟av久久| 黄色配什么色好看| 精品国产露脸久久av麻豆| 亚洲国产av新网站| av国产精品久久久久影院| www日本在线高清视频| 性色av一级| 老女人水多毛片| 99国产精品免费福利视频| 美女大奶头黄色视频| 亚洲国产精品一区二区三区在线| 日本黄色日本黄色录像| 人人妻人人澡人人看| 天美传媒精品一区二区| 国产精品久久久久成人av| 亚洲少妇的诱惑av| 欧美最新免费一区二区三区| 男人操女人黄网站| 欧美性感艳星| 成年人午夜在线观看视频| 999精品在线视频| 日韩在线高清观看一区二区三区| 22中文网久久字幕| 欧美精品av麻豆av| 欧美日韩亚洲高清精品| 肉色欧美久久久久久久蜜桃| 亚洲欧洲精品一区二区精品久久久 | 天天操日日干夜夜撸| 色吧在线观看| 又黄又粗又硬又大视频| 亚洲第一av免费看| 亚洲av中文av极速乱| 啦啦啦在线观看免费高清www| 人妻人人澡人人爽人人| av在线app专区| 大陆偷拍与自拍| 国产精品秋霞免费鲁丝片| 人人澡人人妻人| 丰满饥渴人妻一区二区三| 亚洲欧美成人精品一区二区| 寂寞人妻少妇视频99o| 又大又黄又爽视频免费| www日本在线高清视频| 在线精品无人区一区二区三| 一本色道久久久久久精品综合| 成人毛片60女人毛片免费| 日本猛色少妇xxxxx猛交久久| 天堂俺去俺来也www色官网| 18禁国产床啪视频网站| 精品人妻偷拍中文字幕| 少妇的丰满在线观看| 又黄又粗又硬又大视频| 免费黄频网站在线观看国产| 最近中文字幕2019免费版| 一区二区av电影网| av卡一久久| 欧美成人精品欧美一级黄| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 下体分泌物呈黄色| 日韩视频在线欧美| 视频在线观看一区二区三区| 精品久久蜜臀av无| 国产精品嫩草影院av在线观看| 日本91视频免费播放| 天堂中文最新版在线下载| av又黄又爽大尺度在线免费看| 亚洲国产最新在线播放| 欧美亚洲日本最大视频资源| 在线精品无人区一区二区三| av播播在线观看一区| 视频中文字幕在线观看| 中文字幕制服av| 国产成人精品在线电影| av免费在线看不卡| 卡戴珊不雅视频在线播放| 亚洲成人一二三区av| 人人妻人人爽人人添夜夜欢视频| 成人黄色视频免费在线看| 啦啦啦视频在线资源免费观看| 999精品在线视频| 国产探花极品一区二区| 寂寞人妻少妇视频99o| 色婷婷av一区二区三区视频| 性色avwww在线观看| 日日啪夜夜爽| 美女脱内裤让男人舔精品视频| 免费播放大片免费观看视频在线观看| av卡一久久| 啦啦啦啦在线视频资源| av视频免费观看在线观看| 国产极品天堂在线| 最近中文字幕高清免费大全6| 免费黄色在线免费观看| 人妻 亚洲 视频| 18在线观看网站| 免费大片18禁| 精品亚洲乱码少妇综合久久| 国产成人精品无人区| 亚洲情色 制服丝袜| 国产精品久久久久久精品古装| 另类亚洲欧美激情| 如日韩欧美国产精品一区二区三区| av一本久久久久| 国产69精品久久久久777片| 免费在线观看完整版高清| 亚洲国产av影院在线观看| 成年人午夜在线观看视频| 免费在线观看完整版高清| 制服诱惑二区| 综合色丁香网| 日韩一区二区三区影片| 捣出白浆h1v1| 中国三级夫妇交换| 五月天丁香电影| 精品酒店卫生间| 精品久久久久久电影网| 久久精品久久精品一区二区三区| 久久久久久人人人人人| 久久国产精品大桥未久av| 久久久久视频综合| 久久久久精品性色| 人人妻人人爽人人添夜夜欢视频| 哪个播放器可以免费观看大片| 热re99久久国产66热| 国产淫语在线视频| 一区在线观看完整版| 久久国内精品自在自线图片| 精品视频人人做人人爽| 免费观看a级毛片全部| 久久韩国三级中文字幕| 18禁动态无遮挡网站| 国产免费福利视频在线观看| 丰满迷人的少妇在线观看| 女人被躁到高潮嗷嗷叫费观| 色网站视频免费| 欧美少妇被猛烈插入视频| 美女视频免费永久观看网站| 国产av精品麻豆| 丰满乱子伦码专区| 午夜激情av网站| 久久久久国产网址| 99热网站在线观看| 美女国产高潮福利片在线看| 久久精品aⅴ一区二区三区四区 | 香蕉精品网在线| 视频在线观看一区二区三区| 国产精品久久久久成人av| 精品国产一区二区三区久久久樱花| 亚洲av福利一区| 妹子高潮喷水视频| 全区人妻精品视频| 制服人妻中文乱码| 国产在线一区二区三区精| 亚洲av欧美aⅴ国产| 久久97久久精品| 国产色婷婷99| 欧美亚洲 丝袜 人妻 在线| 美女内射精品一级片tv| 夜夜爽夜夜爽视频| 波多野结衣一区麻豆| 亚洲av免费高清在线观看| a级片在线免费高清观看视频| 视频区图区小说| 中文乱码字字幕精品一区二区三区| 人人妻人人爽人人添夜夜欢视频| 18禁裸乳无遮挡动漫免费视频| 99热全是精品| 亚洲经典国产精华液单| 夫妻午夜视频| 久久精品国产鲁丝片午夜精品| 成人毛片a级毛片在线播放| 午夜免费鲁丝| 国产色婷婷99| 观看美女的网站| 国产黄色视频一区二区在线观看| 不卡视频在线观看欧美| 各种免费的搞黄视频| 久久久久久人人人人人| 欧美精品人与动牲交sv欧美| 一级毛片我不卡| 午夜视频国产福利| 视频区图区小说| 久久99热6这里只有精品| 中文字幕另类日韩欧美亚洲嫩草| 狂野欧美激情性xxxx在线观看| 老女人水多毛片| 如日韩欧美国产精品一区二区三区| 丝袜美足系列| 高清视频免费观看一区二区| 大片电影免费在线观看免费| 狠狠精品人妻久久久久久综合| 精品人妻偷拍中文字幕| 久久国产亚洲av麻豆专区| 欧美老熟妇乱子伦牲交| 爱豆传媒免费全集在线观看| 女的被弄到高潮叫床怎么办| 插逼视频在线观看| 日本猛色少妇xxxxx猛交久久| 亚洲国产成人一精品久久久| 久久久亚洲精品成人影院| 日本欧美国产在线视频| 亚洲在久久综合| 国产亚洲午夜精品一区二区久久| 丝袜在线中文字幕| 日韩av不卡免费在线播放| 少妇猛男粗大的猛烈进出视频| 丁香六月天网| 免费在线观看黄色视频的| 国产日韩欧美视频二区| 久久99一区二区三区| 午夜91福利影院| 黄色一级大片看看| √禁漫天堂资源中文www| 精品人妻一区二区三区麻豆| 99香蕉大伊视频| 性色av一级| 亚洲精品视频女| 亚洲精品日本国产第一区| 国产有黄有色有爽视频| 国产免费视频播放在线视频| 人妻一区二区av| 国产高清国产精品国产三级| 日韩精品免费视频一区二区三区 | 亚洲国产欧美在线一区| av黄色大香蕉| 日韩伦理黄色片| 最近2019中文字幕mv第一页| 波野结衣二区三区在线| 黑人欧美特级aaaaaa片| 精品人妻在线不人妻| 777米奇影视久久| 国产日韩欧美亚洲二区| 少妇被粗大猛烈的视频| 少妇人妻精品综合一区二区| 亚洲av日韩在线播放| 欧美日韩国产mv在线观看视频| kizo精华| 日本猛色少妇xxxxx猛交久久| 亚洲图色成人| 街头女战士在线观看网站| 少妇 在线观看| 欧美精品人与动牲交sv欧美| 国产精品熟女久久久久浪| 欧美最新免费一区二区三区| 亚洲国产精品一区三区| 亚洲人成网站在线观看播放| 各种免费的搞黄视频| 精品亚洲成a人片在线观看| 人人妻人人澡人人看| 女人被躁到高潮嗷嗷叫费观| 成人手机av| 天堂俺去俺来也www色官网| 日韩av在线免费看完整版不卡| 国产在视频线精品| 久久国产精品大桥未久av| 丝袜美足系列| 久久女婷五月综合色啪小说| 国产成人a∨麻豆精品| 久久久久久久久久成人| 伦理电影免费视频| 国产淫语在线视频| 又粗又硬又长又爽又黄的视频| 伊人久久国产一区二区| 视频区图区小说| 丝瓜视频免费看黄片| 成人国产麻豆网| 999精品在线视频| 亚洲天堂av无毛| 国产精品久久久久久久久免| 亚洲精品乱码久久久久久按摩| 亚洲精品日本国产第一区| 日本黄大片高清| 老司机亚洲免费影院| 精品熟女少妇av免费看| 一区二区三区乱码不卡18| 熟女电影av网| 久久国内精品自在自线图片| 国产男女超爽视频在线观看| 大片免费播放器 马上看| 最近中文字幕2019免费版| 午夜老司机福利剧场| 亚洲国产日韩一区二区| 黑人欧美特级aaaaaa片| 熟女av电影| 午夜免费鲁丝| 国产一区二区激情短视频 | 欧美+日韩+精品| 伦理电影免费视频| 一本一本久久a久久精品综合妖精 国产伦在线观看视频一区 | 岛国毛片在线播放| 毛片一级片免费看久久久久| 日韩熟女老妇一区二区性免费视频| 亚洲欧美日韩卡通动漫| 久久久久久久久久久免费av| 国产免费一区二区三区四区乱码| 亚洲经典国产精华液单| 国产av国产精品国产| 久久久久久久久久久免费av| videossex国产| 免费高清在线观看日韩|