• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Contract theory based incentive mechanism design for buffer resource in wireless caching networks ①

    2020-07-12 02:34:16LiuTingting劉婷婷TangLeiZhuHaoBaoYongqiangGuoYajuan
    High Technology Letters 2020年2期

    Liu Tingting(劉婷婷) , Tang Lei, Zhu Hao, Bao Yongqiang, Guo Yajuan

    (*School of Information and Communication Engineering, Nanjing Institute of Technology, Nanjing 211167, P.R.China) (**Institute of Electric Power Science, Jiangsu Electric Power Co. Ltd., Nanjing 210024, P.R.China)

    Abstract

    Key words: contract theory, buffer resource allocation, wireless caching network, incentive mechanism design

    0 Introduction

    Due to the surge of duplicated transmissions in wireless networks, wireless caching technology has been proposed in order to release the transmission redundancy on backhaul channels[1-4]. The advantages of wireless caching technology have been provided as releasing traffic pressures on backhaul channels, reducing the transmission latency and improving the overall network energy efficiency, etc. The recent researches on wireless caching technology can be roughly classified into 2 aspects: content placement[5,6]and content delivery[7,8]. Most of these works have assumed that the popular files can be pre-cached into the edge nodes. However, due to the limited caching capacity, or the inaccurate estimation on user preference profiles, the requested files may not be cached or only be partially cached in the edge nodes. The transmissions of the un-cached files/parts may still induce the duplicated transmissions on backhaul channels or lead to transmission latency.

    In order to further enhance the performance of wireless caching, researchers begin to investigate the joint buffer and cache allocations in wireless caching networks. Cache resource can be considered as a long-term memory to pre-cache the popular files during off-peak time. The pre-cached files can be directly transmitted upon requesting without triggering traffic on backhaul channels. Buffer resource is a kind of short-term memory. It can be used to store the fetched files from the remote servers or from the cache memory. Thus, it can be utilized to enable buffer-aided relay to improve the delivery performance of the un-cached files. Buffer usually has a high input/output (I/O) speed, and therefore, it is allocated with an expensive primary memory. In practice, due to the limited battery capacity, users usually have their personal use purposes or privacy concerns[9]. It is impossible for the edge node to contribute all its buffer resource. Generally, it will devote a limited buffer capacity to help transmissions. It is known that, due to users’ unbalanced data arrival and service rates, there may be some backlogs inside an edge or a relay node. In this paper, the edge node also acts as a relay node. The term ‘relay node’ is used for the ease of discussions. Backlogs may lead to queueing delay, and backlog overflow which is induced by the limited buffer capacity, and even induce re-transmissions over backhaul channels. How to allocate the limited buffer capacity to maximize relay node’s utility has become a critical issue in realizing the buffer-aided relay in wireless caching networks. At the same time, users are willing to utilize the buffer-aided relay scheme to enhance its transmission performance. How to design a proper incentive scheme to incentivize users in participating buffer-aided relay communications has also become an important issue. In order to solve the above 2 issues, 2 problems need to be figured out.

    First, the relationship among the arrival rate, the service rate, the backlogs, and the buffer capacity should be determined. In this way, the buffer capacity on relay node’s side can be linked to each user’s backlogs which are determined by this user’s arrival and service rates. The effective bandwidth theory is a useful framework to analyze the backlog performance of broad classes of arrivals[10,11]. However, it may lead to loose estimation for non-Poisson processes, and it is not realistic to assume user’s arrival or service data follow Poisson processes. At the same time, the martingale theory is proposed as an alternative in analyzing the backlogs, which is flexible and suitable for any kind of arrival and service processes[12]. A lot of works have demonstrated that the martingale theory can provide a tight bound compared with the real data trace. Moreover, the derived bound can be used as an objective function or as a constraint to further optimize the network performance[13-16]. Thus, in this work, the martingale theory will be used to determine the relationship among the arrival rate, the service rate, the backlogs, and the buffer capacity.

    Second, in the concerned wireless caching networks, user’s specific parameters cannot be fully observed by the relay node. Information asymmetry exists in this scenario. The relay node only knows the set of user’s parameters, but it cannot observe the specific value of each user. Contract theory is known as a powerful tool in solving this kind of information asymmetry problem[17]. Most of the existing works on contract theory can be classified into 2 categories: one is adverse selection[18-21], and the other one is moral hazard[22,23]. The existing works have highlighted that solving the problem of asymmetric information in resource allocation is the major advantage of contract theory.

    In this work, an incentive mechanism for buffer resource based on the contract theory in the wireless caching networks is designed. The proposed scheme can provide proper economic incentives to users. The main contributions of this paper are summarized as follows.

    (1) A commercial wireless caching network is constructed, where user’s backlog violation probability is derived based on the martingale theory. Then, the utility functions of the relay node and the users are formulated.

    (2) Contract theory is proposed to design the buffer resource allocation scheme between the relay node and the users. The users are classified into different types according to their distances from the relay node. Correspondingly, the relay node divides its devoted buffer resource into different portions, defined as quality. The optimal contract problem is then constructed in maximizing the utility of the relay node.

    (3) Next, the conditions of a feasible contract are developed, and they are considered as constraints in the constructed optimization problem. In order to obtain the optimal contract, the constraints need to be reduced by several steps, which are also elaborated.

    (4) Numerical results are provided to demonstrate effectiveness of the proposed contract theory scheme. Also, it can be found that in terms of maximizing the relay node’s utility, the proposed scheme is superior to the equally allocated scheme.

    The remainders of this paper are organized as follows. The system model and the backlog violation probability derived from the martingale theory, as well as the utility functions of the relay node and users are presented in Section 1. The detailed incentive mechanism design steps based on the contract theory are elaborated in Section 2. Numerical results are presented in Section 3, and finally conclusions are drawn in Section 4.

    1 System model

    In a wireless caching network, instead of direct transmitting files from the base station (BS) to the users, as shown in Fig.1, a nearby node will be employed as a relay to enhance the delivery performance.

    1.1 User’s data arrival model

    A userUirequires a file. Data are transmitted using the buffer-aided relay scheme. Assuming that the bursty file amountai(k) for userUiarriving at the relay node at timekfollows a Markov-modulated on off (MMOO) process which has 2 static status [Π0, Π1]. On state Π0, there is no data arriving, i.e.,a(k)=0, while on state Π1,ai(k)=Rbits/s, andR>0. The corresponding state transition matrixTrais defined as

    Fig.1 System model of a wireless caching network and the details inside a relay node

    (1)

    where,Tαrepresents the transition probability from state Π0to state Π1,Tβrepresents the transition probability from Π1to Π0. Accordingly, the steady state distribution ofai(k) is calculated as

    (2)

    Therefore, the cumulative arrival data over time interval [m,n] is represented as

    (3)

    where the unit of time interval is one second, andAi(m,n) can be regarded as a bivariate arrival process. Ifm=0,Ai(0,n)=Ai(n) is used for brevity.

    1.2 Data service model

    Assuming that the relay node devotes a buffer capacityCBto help the surroundingNusers relay their data. The transmission bandwidth isB. TheNusers equally share the bandwidth. A constant transmission powerPtris utilized for each user. According to Shannon’s channel capacity theorem[24], the service rate, i.e., the transmission rate, from the relay node to the user can be written as

    (4)

    (5)

    Note that when the user’s location is known, the service rate is irrelevant to timek.siis used for brevity.

    Also, the following assumption is provided to make the analysis non-trivial.

    E[ai(k)]

    (6)

    Eq.(6) means that the service rate is larger than the average arrival rate, and it is smaller than the peak arrival rate. In this way, there will be some backlogs inside a relay node’s buffer.

    1.3 Backlog violation probability

    Since there are some backlogs inside a relay node’s buffer, i.e.,

    (7)

    Definition1Backlog violation probability is the probability that a userUi’s allocated bufferαiCBis overflowed, i.e., Pr(Qi≥(αiCB)).

    (8)

    (9)

    The scheduling policy is first in first out (FIFO). Many works have contributed to derive the backlog violation probability. Here, it is provided directly in Theorem 1.

    Theorem1The backlog violation probability is calculated as

    (10)

    ProofPlease refer to Refs[12,14] for the rigorous deduction.

    (11)

    and Eq.(10) can be rewritten as

    (12)

    1.4 Users’ utility

    Assuming that a userUirents anαiportion, it needs to pay πito the relay node. If the data is overflowed, the overflowed data will be re-transmitted through the cellular link, and this will cost the userUiwith some extra money. The utility of the userUiis shown as follows.

    (13)

    (14)

    1.5 Relay node’s utility

    Relay node will make profits by renting out its buffer resource to the surrounding users. The relay node rents out anαiportion to the userUi, and correspondingly the userUiwill pay πito the relay node. Thus, the utility function of the relay node is represented as

    (15)

    2 Incentive mechanism design based on contract theory

    The relay node designs the optimal contracts {αi,πi},i={1,…,N} to maximize its own profits. The optimal contracts also need to comply with the following 2 constraints: individual rationality (IR) and incentive compatibility (IC) for all intended users. The definitions of the IR and IC constraints are as follows.

    Definition3IR constraint: each user is assumed to be rational, and it will not accept a contract entry which produces a negative utility for its type. Therefore, IR constraint is provided as follows.

    (16)

    IR constraint means that the savings must compensate the payment. In the case ofUi<0, the user will not purchase the buffer portion.

    Definition4IC constraint: The incentive compatibility constraint means thatVvcannot gain more utility by accepting a contract entry which is not designed for its type. That is

    In other words, user with typeishould obtain the maximum utility if and only if it chooses the contract {αi, πi} designed for its type.

    The optimal contract problem aims to maximize the relay node’s utility, and also complies with the IR and IC constraints. Thus, the optimal contract problem is formulated as follows.

    (18)

    Contract theory is a kind of economical tool that can provide enough incentives to the users that motivate them choose the intended contract entry. This mechanism is guaranteed by the IR and IC constraints. That is to say, if users are not interested in paying anything, they will gain nothing, and if they do not choose the intended contract entry, they will not obtain the maximum profits.

    2.1 Constraints reduction

    Since in Eq.(18), there areNIR constraints andN×(N-1) IC constraints. It is not tractable to solve an optimization problem with so many constraints. First, the number of constraints should be reduced by the following lemmas.

    2.1.1 IR constraint reduction

    Lemma 1 is provided to reduce the IR constraint.

    (19)

    (20)

    2.1.2 IC constraint reduction

    First, in order to make the analysis consistent with the contract theory. ‘Quality’ is defined in this paper.

    Definition5Since the buffer resource is considered as trading goods, the buffer portionαi,?i, is defined as quality.

    The IC constraints can be reduced by the following lemmas.

    ProofLemma 2 is demonstrated from 2 aspects, i.e., sufficient condition and necessary condition.

    (22)

    and

    (23)

    Observing Eq.(22) and Eq.(23), then

    (24)

    Substituting Eq.(20) into Eq.(24), and after some manipulations, then

    (25)

    Eq.(25) can be rewritten as

    (26)

    (27)

    (28)

    (29)

    (30)

    This completes the proof.

    Moreover, if user’s utility function satisfies the local downward incentive constraint (LDIC) and the local upward incentive constraint (LUIC) simultaneously, the IC constraints will be satisfied. Furthermore, the LUIC can be derived from the LDIC, and vice versa. The IC constraints can be replaced by

    (31)

    By integrating the above lemmas, the original problem will be reduced to the following formulation.

    (32)

    2.2 Optimal solution

    By iterating IR and IC constraints shown in Eq.(32), the summation of πican be written as a general equation, i.e.,

    (33)

    Substituting Eq.(33) into Eq.(32), the problem will be further reduced to the following brief formulation.

    (34)

    where,

    (35)

    It can be seen that eachCiin Eq.(34) is only related toαi. In other words, it is not coupled with otherαi. The first and second derivations ofCiare

    (36)

    and

    (37)

    respectively.

    It is easy to verify that Eq.(36)≥0, and Eq.(37)<0, Eq.(34) is a typical convex optimization problem. The optimal solution can be obtained by the interior point method. The numerical results are provided in the next section.

    3 Numerical results

    In this section, numerical simulation results are presented to demonstrate effectiveness of the proposed scheme. The simulation settings are listed in Table 1. Some simulation parameters are assumed, for example,Tα,Tβ, user numbers,Ri, total bandwidth and buffer resource capacity. Some simulation parameters are commonly used, for example, the noise density and path loss exponent. The specific simulation settings will be elaborated if the simulation scenario is changed.

    Table 1 System parameters

    Fig.2 plots the variation of user’s utility when the user chooses different contract entries. It can be seen that each user will obtain the maximum utility when it chooses the contract entry intended for its type. For instance, user 1 will obtain the maximum utility when it chooses the 1st contract entry. User 2 can achieve the maximum utility in the 2nd contract entry. The 3rd contract entry can make user 3 get the maximum utility. Similarly, contract entry 4th, 5th, and 6th will provide user 4, 5, and 6 with the maximum utility, respectively. The incentive compatibility can be verified from Fig.2 that users cannot gain more utility by accepting a contract entry which is not designed for its type.

    Fig.2 The variation of users’ utility values when the user chooses different contract entry

    Table 2 The set of the parameter

    Fig.3 The optimal contract entry which is a combination of the optimal portion and the optimal price

    Fig.4 compares the utility of the relay node and the users between the contract theory scheme and the equally allocated scheme. The equally allocated scheme evenly divides the buffer capacity. It can be seen from Fig.4 that, the proposed contract theory scheme can achieve a larger utility compared to the benchmark scheme from the perspective of relay node. User’s utility decreases as user’s index increases when contract theory scheme is used. While this kind of trend cannot be observed when the equally allocated scheme is employed. Moreover, the user with index 1 has the maximum utility. This observation is consistent with the intuition that user 1 purchases the maximum portion and pays the most to the relay node, it should gain the most utility. On the other hand, as shown in Fig.4, the proposed scheme is superior to the equally allocated scheme from the perspective of relay node. The relay node who designs the mechanism will choose to use the proposed contract scheme. At the same time, users can obtain the positive utility by using the proposed contract scheme. Therefore, users would also be willing to participate in the proposed scheme.

    Fig.4 Comparison between the contract theory approach and the equally allocated scheme from the perspective of utility

    4 Conclusion

    In this paper, the incentive mechanism incentivizing users in participating buffer-aided relay is investigated in wireless caching networks. Because of the information asymmetric environment, contract theory is utilized to design the incentive mechanism. Specifically, considering the limited buffer capacity, the backlog violation probability, i.e., the buffer overflow probability, is first provided based on the martingale theory. Based on the backlog violation probability, the utilities of relay node and users are formulated. Then, the optimal contract problem is modeled in order to maximize the utility of relay node, while the utilities of users are considered as IR and IC constraints. The feasibility of the contract is also demonstrated. Next, the optimal solution can be obtained by the interior point method. Numerical results are illustrated to demonstrate effectiveness of the proposed scheme. The proposed contract theory scheme has a better utility performance compared to the benchmarks.

    日韩一区二区视频免费看| 国产精品99久久99久久久不卡 | 天天躁日日躁夜夜躁夜夜| 日本vs欧美在线观看视频| 久久久久精品久久久久真实原创| 一级毛片黄色毛片免费观看视频| 亚洲自偷自拍图片 自拍| 亚洲美女黄色视频免费看| 日韩,欧美,国产一区二区三区| 国产一卡二卡三卡精品 | 女人被躁到高潮嗷嗷叫费观| 国产精品人妻久久久影院| 丝袜人妻中文字幕| 人人妻人人澡人人爽人人夜夜| 女人高潮潮喷娇喘18禁视频| 精品少妇内射三级| 国产人伦9x9x在线观看| 亚洲av福利一区| 操出白浆在线播放| 亚洲美女黄色视频免费看| 99精国产麻豆久久婷婷| 黄频高清免费视频| 99国产精品免费福利视频| 1024香蕉在线观看| 男女无遮挡免费网站观看| 久久婷婷青草| 日韩制服骚丝袜av| 欧美日韩福利视频一区二区| 亚洲国产av新网站| 精品久久蜜臀av无| 熟女少妇亚洲综合色aaa.| 久久人人爽av亚洲精品天堂| 成人影院久久| 人人妻人人添人人爽欧美一区卜| 高清不卡的av网站| av电影中文网址| 97精品久久久久久久久久精品| 中文字幕制服av| 精品国产一区二区三区四区第35| 在线天堂最新版资源| 青草久久国产| 色视频在线一区二区三区| 日韩一区二区三区影片| 宅男免费午夜| 亚洲美女黄色视频免费看| 国产精品女同一区二区软件| 999精品在线视频| 亚洲第一青青草原| 亚洲色图 男人天堂 中文字幕| 国产一区二区 视频在线| 亚洲五月色婷婷综合| 日韩一区二区视频免费看| 交换朋友夫妻互换小说| 丰满乱子伦码专区| 国产黄色视频一区二区在线观看| 亚洲欧美成人精品一区二区| 免费人妻精品一区二区三区视频| 国精品久久久久久国模美| 黄色 视频免费看| 老汉色av国产亚洲站长工具| 国产国语露脸激情在线看| 国产成人免费无遮挡视频| 亚洲国产欧美日韩在线播放| 国产一区二区激情短视频 | 亚洲第一区二区三区不卡| 中国三级夫妇交换| a 毛片基地| 久久精品熟女亚洲av麻豆精品| 欧美日韩综合久久久久久| 街头女战士在线观看网站| 成人影院久久| 999久久久国产精品视频| videosex国产| 亚洲国产av新网站| 在现免费观看毛片| a级片在线免费高清观看视频| 男女免费视频国产| 欧美中文综合在线视频| 久久精品久久久久久久性| 中文字幕人妻丝袜一区二区 | 精品亚洲乱码少妇综合久久| 久久99一区二区三区| 欧美中文综合在线视频| 天堂俺去俺来也www色官网| 免费在线观看完整版高清| 在线观看免费日韩欧美大片| 国产99久久九九免费精品| 欧美日韩亚洲高清精品| 日韩,欧美,国产一区二区三区| 久久精品久久久久久噜噜老黄| 嫩草影院入口| 国产又爽黄色视频| 永久免费av网站大全| 国产精品三级大全| 天堂俺去俺来也www色官网| 久久亚洲国产成人精品v| 汤姆久久久久久久影院中文字幕| 黄色怎么调成土黄色| 一级黄片播放器| 18禁国产床啪视频网站| 制服诱惑二区| 又黄又粗又硬又大视频| 久久毛片免费看一区二区三区| 丝袜人妻中文字幕| xxxhd国产人妻xxx| 乱人伦中国视频| 国产熟女欧美一区二区| 国产亚洲欧美精品永久| 免费看av在线观看网站| 尾随美女入室| 欧美精品人与动牲交sv欧美| 操出白浆在线播放| 国产男女内射视频| 国产精品三级大全| 丝袜美足系列| 日日摸夜夜添夜夜爱| 久久精品亚洲熟妇少妇任你| 国产老妇伦熟女老妇高清| 国产精品久久久久久精品古装| 女人高潮潮喷娇喘18禁视频| 日韩一区二区视频免费看| 不卡视频在线观看欧美| av.在线天堂| 中文欧美无线码| 亚洲av男天堂| 最近中文字幕高清免费大全6| 国产免费一区二区三区四区乱码| 麻豆精品久久久久久蜜桃| 免费黄频网站在线观看国产| 国产伦理片在线播放av一区| 成人毛片60女人毛片免费| av又黄又爽大尺度在线免费看| 热re99久久国产66热| 不卡av一区二区三区| xxx大片免费视频| 一区二区三区四区激情视频| 亚洲国产欧美日韩在线播放| 考比视频在线观看| a级毛片在线看网站| 一边亲一边摸免费视频| 久久精品亚洲熟妇少妇任你| 少妇精品久久久久久久| 欧美激情高清一区二区三区 | 国产精品熟女久久久久浪| 麻豆精品久久久久久蜜桃| 一区二区三区乱码不卡18| 欧美日韩亚洲高清精品| e午夜精品久久久久久久| 中国三级夫妇交换| 搡老乐熟女国产| 精品卡一卡二卡四卡免费| 天堂俺去俺来也www色官网| 国产色婷婷99| 伦理电影大哥的女人| 色精品久久人妻99蜜桃| 少妇的丰满在线观看| 久久99热这里只频精品6学生| 午夜激情av网站| 极品少妇高潮喷水抽搐| 欧美黑人欧美精品刺激| 欧美在线一区亚洲| 十分钟在线观看高清视频www| 黄片播放在线免费| a 毛片基地| 精品一区二区三卡| 欧美日韩一区二区视频在线观看视频在线| 亚洲国产精品一区三区| 国产又爽黄色视频| 国产精品无大码| 亚洲国产欧美网| 一区二区日韩欧美中文字幕| av福利片在线| 免费黄色在线免费观看| 成人亚洲欧美一区二区av| xxx大片免费视频| 丰满饥渴人妻一区二区三| 久久久久久久久久久免费av| 中文字幕最新亚洲高清| tube8黄色片| 最新的欧美精品一区二区| 中文字幕av电影在线播放| 免费少妇av软件| 免费高清在线观看视频在线观看| 亚洲欧美一区二区三区久久| 99re6热这里在线精品视频| 亚洲伊人久久精品综合| 久久久久久免费高清国产稀缺| 成人亚洲欧美一区二区av| 欧美另类一区| 91成人精品电影| 制服丝袜香蕉在线| av在线播放精品| 国产色婷婷99| 久久久精品国产亚洲av高清涩受| 9热在线视频观看99| 日本黄色日本黄色录像| 亚洲国产中文字幕在线视频| 极品少妇高潮喷水抽搐| av免费观看日本| 高清欧美精品videossex| 亚洲精品一二三| 99精品久久久久人妻精品| 超碰成人久久| 国产一区二区激情短视频 | 精品一区二区免费观看| 免费黄色在线免费观看| 久久精品国产亚洲av高清一级| 欧美久久黑人一区二区| 日韩精品免费视频一区二区三区| 久久99精品国语久久久| 老司机深夜福利视频在线观看 | 秋霞伦理黄片| e午夜精品久久久久久久| 国产日韩欧美视频二区| 高清黄色对白视频在线免费看| 人人澡人人妻人| 在线观看人妻少妇| 国产国语露脸激情在线看| 国产精品一区二区精品视频观看| 19禁男女啪啪无遮挡网站| 大码成人一级视频| 亚洲av在线观看美女高潮| 婷婷色麻豆天堂久久| 精品卡一卡二卡四卡免费| 久久天堂一区二区三区四区| 久久久久精品久久久久真实原创| 性色av一级| av.在线天堂| 日本爱情动作片www.在线观看| 国产免费又黄又爽又色| 亚洲av成人精品一二三区| 国产精品免费视频内射| 欧美激情高清一区二区三区 | 欧美激情高清一区二区三区 | 久久人妻熟女aⅴ| 精品少妇久久久久久888优播| 天天影视国产精品| 久久久精品国产亚洲av高清涩受| 建设人人有责人人尽责人人享有的| 美女脱内裤让男人舔精品视频| 久久人人爽av亚洲精品天堂| 国产野战对白在线观看| 国产成人精品无人区| a级毛片在线看网站| 十八禁网站网址无遮挡| 亚洲欧美精品自产自拍| 亚洲免费av在线视频| 午夜日韩欧美国产| 十八禁高潮呻吟视频| 美女脱内裤让男人舔精品视频| 亚洲美女视频黄频| 国产免费一区二区三区四区乱码| 精品人妻一区二区三区麻豆| 赤兔流量卡办理| 国产免费福利视频在线观看| 国产一区二区三区av在线| 一本—道久久a久久精品蜜桃钙片| 婷婷色综合www| 国产色婷婷99| 高清黄色对白视频在线免费看| 欧美少妇被猛烈插入视频| 在线 av 中文字幕| 国产精品一区二区精品视频观看| 色视频在线一区二区三区| 一区二区三区激情视频| 人妻一区二区av| 日韩大码丰满熟妇| 亚洲国产中文字幕在线视频| 黄色视频在线播放观看不卡| 日韩欧美一区视频在线观看| 日韩av在线免费看完整版不卡| 欧美精品av麻豆av| 一边摸一边做爽爽视频免费| 亚洲在久久综合| 亚洲色图 男人天堂 中文字幕| 亚洲精品av麻豆狂野| 99久久人妻综合| 免费女性裸体啪啪无遮挡网站| 午夜久久久在线观看| 下体分泌物呈黄色| 成人午夜精彩视频在线观看| 在线观看免费日韩欧美大片| 丰满少妇做爰视频| 午夜福利在线免费观看网站| 看免费av毛片| 亚洲在久久综合| 伦理电影免费视频| 国产日韩一区二区三区精品不卡| 飞空精品影院首页| 国产精品一区二区在线观看99| 女人精品久久久久毛片| 国产精品嫩草影院av在线观看| 国产av一区二区精品久久| 亚洲熟女精品中文字幕| 国精品久久久久久国模美| 国产日韩欧美亚洲二区| 欧美xxⅹ黑人| 日韩大片免费观看网站| 麻豆精品久久久久久蜜桃| 亚洲,欧美精品.| av片东京热男人的天堂| 亚洲一区中文字幕在线| 亚洲国产看品久久| 大话2 男鬼变身卡| 国产精品人妻久久久影院| 久久久久国产精品人妻一区二区| 热99久久久久精品小说推荐| 午夜av观看不卡| av国产久精品久网站免费入址| 亚洲少妇的诱惑av| 国产精品久久久久久人妻精品电影 | 亚洲精品日本国产第一区| 国产精品国产av在线观看| 电影成人av| 又粗又硬又长又爽又黄的视频| 成人国语在线视频| 青春草国产在线视频| 97在线人人人人妻| 亚洲精品视频女| 精品久久久精品久久久| 亚洲伊人色综图| 99精国产麻豆久久婷婷| 综合色丁香网| 欧美亚洲日本最大视频资源| 欧美激情高清一区二区三区 | 丝袜脚勾引网站| 久久久久久久国产电影| 赤兔流量卡办理| 女性生殖器流出的白浆| 可以免费在线观看a视频的电影网站 | 最近2019中文字幕mv第一页| 久久久久国产精品人妻一区二区| 宅男免费午夜| 亚洲av电影在线进入| 91aial.com中文字幕在线观看| 大片电影免费在线观看免费| 久久99热这里只频精品6学生| 在线观看一区二区三区激情| 久久99精品国语久久久| 成人国产av品久久久| 91精品国产国语对白视频| 一边摸一边做爽爽视频免费| 欧美成人精品欧美一级黄| 伦理电影大哥的女人| 色精品久久人妻99蜜桃| 亚洲国产av影院在线观看| 国产精品免费视频内射| 久久精品国产a三级三级三级| 精品国产乱码久久久久久男人| 国产精品无大码| svipshipincom国产片| 最近手机中文字幕大全| 久久久精品区二区三区| 日韩电影二区| 黄色一级大片看看| 丝袜人妻中文字幕| 国产精品亚洲av一区麻豆 | 国产淫语在线视频| 母亲3免费完整高清在线观看| 又大又黄又爽视频免费| 国产一区二区 视频在线| 欧美日韩精品网址| 国产深夜福利视频在线观看| 人妻一区二区av| 香蕉国产在线看| 99久国产av精品国产电影| 亚洲专区中文字幕在线 | 成年女人毛片免费观看观看9 | 国产亚洲一区二区精品| 亚洲人成网站在线观看播放| 精品国产露脸久久av麻豆| 日本猛色少妇xxxxx猛交久久| 精品少妇内射三级| 日本欧美视频一区| 成年人免费黄色播放视频| 如日韩欧美国产精品一区二区三区| 美女扒开内裤让男人捅视频| 好男人视频免费观看在线| 成年av动漫网址| 熟女av电影| 在线观看免费日韩欧美大片| 又粗又硬又长又爽又黄的视频| 国产精品蜜桃在线观看| 午夜免费男女啪啪视频观看| 男女下面插进去视频免费观看| 成人国语在线视频| 热re99久久国产66热| 老汉色∧v一级毛片| 日韩视频在线欧美| 两性夫妻黄色片| 啦啦啦在线观看免费高清www| 下体分泌物呈黄色| 一级爰片在线观看| 国产男女超爽视频在线观看| 日本av免费视频播放| 久久ye,这里只有精品| 男人爽女人下面视频在线观看| 亚洲国产精品国产精品| 亚洲精品视频女| 免费久久久久久久精品成人欧美视频| 亚洲欧美精品综合一区二区三区| 日韩 欧美 亚洲 中文字幕| 在线天堂最新版资源| 亚洲av男天堂| 一区福利在线观看| 一级,二级,三级黄色视频| 精品一区在线观看国产| 午夜福利影视在线免费观看| 女的被弄到高潮叫床怎么办| 少妇精品久久久久久久| 黑丝袜美女国产一区| √禁漫天堂资源中文www| 日本欧美国产在线视频| 日韩 欧美 亚洲 中文字幕| 满18在线观看网站| 十分钟在线观看高清视频www| 在现免费观看毛片| 在线观看一区二区三区激情| 国产熟女午夜一区二区三区| 久久人人爽av亚洲精品天堂| 建设人人有责人人尽责人人享有的| 国产在线视频一区二区| 日韩av不卡免费在线播放| 久久精品国产综合久久久| 国产成人欧美| 欧美激情极品国产一区二区三区| 视频区图区小说| 精品少妇内射三级| 国产精品二区激情视频| 久久性视频一级片| 国产成人av激情在线播放| 久久久久久人人人人人| 久久精品国产亚洲av涩爱| 亚洲天堂av无毛| 一区二区三区四区激情视频| 久久婷婷青草| 亚洲视频免费观看视频| 色播在线永久视频| 亚洲国产精品一区二区三区在线| 中文字幕人妻熟女乱码| 亚洲 欧美一区二区三区| 亚洲图色成人| 国产成人一区二区在线| 一本—道久久a久久精品蜜桃钙片| 大片免费播放器 马上看| 天天躁狠狠躁夜夜躁狠狠躁| 男女免费视频国产| av网站在线播放免费| 亚洲av在线观看美女高潮| 最近中文字幕2019免费版| 午夜激情久久久久久久| 一边摸一边做爽爽视频免费| 国产成人一区二区在线| 免费久久久久久久精品成人欧美视频| 国产精品久久久久久精品电影小说| 丁香六月天网| 久久免费观看电影| 黄片播放在线免费| 国产又爽黄色视频| 亚洲精品自拍成人| 大片电影免费在线观看免费| 女人被躁到高潮嗷嗷叫费观| 国产免费现黄频在线看| 桃花免费在线播放| 欧美日韩亚洲高清精品| 亚洲中文av在线| 爱豆传媒免费全集在线观看| 国产精品久久久久久精品电影小说| 国产又色又爽无遮挡免| 精品国产一区二区久久| 一级毛片我不卡| 午夜福利乱码中文字幕| 国产免费福利视频在线观看| 欧美另类一区| 乱人伦中国视频| 最近最新中文字幕大全免费视频 | 又大又黄又爽视频免费| 99热全是精品| 日本黄色日本黄色录像| 国产极品粉嫩免费观看在线| 国产精品嫩草影院av在线观看| 午夜免费男女啪啪视频观看| 成人国产av品久久久| 久久久久人妻精品一区果冻| 国产野战对白在线观看| 国产成人精品无人区| 丰满迷人的少妇在线观看| 久久久欧美国产精品| 人人妻人人澡人人看| 国产精品熟女久久久久浪| 日韩熟女老妇一区二区性免费视频| 一本色道久久久久久精品综合| 一边摸一边抽搐一进一出视频| 欧美精品高潮呻吟av久久| 一级,二级,三级黄色视频| 在线 av 中文字幕| 中文字幕人妻丝袜一区二区 | 国产野战对白在线观看| 超色免费av| av国产久精品久网站免费入址| 午夜福利一区二区在线看| 久久久久精品久久久久真实原创| 日本欧美国产在线视频| 黑丝袜美女国产一区| 欧美国产精品一级二级三级| 亚洲精品国产av蜜桃| 国产精品偷伦视频观看了| 嫩草影院入口| 欧美变态另类bdsm刘玥| 亚洲av男天堂| 韩国av在线不卡| 欧美日韩综合久久久久久| 国产成人啪精品午夜网站| 午夜免费鲁丝| 精品视频人人做人人爽| 交换朋友夫妻互换小说| 中文字幕av电影在线播放| 捣出白浆h1v1| 日韩中文字幕视频在线看片| 韩国高清视频一区二区三区| 亚洲欧美一区二区三区黑人| 两个人看的免费小视频| 欧美精品高潮呻吟av久久| 日本午夜av视频| 一边摸一边抽搐一进一出视频| 国产精品一区二区在线观看99| 国产亚洲最大av| 男女午夜视频在线观看| 日本wwww免费看| a 毛片基地| 国产一区二区激情短视频 | 国产xxxxx性猛交| 少妇被粗大猛烈的视频| 国产黄色视频一区二区在线观看| 亚洲欧美精品自产自拍| 久久久久久久精品精品| 在线观看人妻少妇| 色婷婷av一区二区三区视频| 麻豆精品久久久久久蜜桃| 黄频高清免费视频| 美国免费a级毛片| 亚洲成av片中文字幕在线观看| av片东京热男人的天堂| 国产野战对白在线观看| 制服诱惑二区| 久久久久精品性色| 国产成人精品在线电影| 十分钟在线观看高清视频www| 国产一级毛片在线| 国产精品偷伦视频观看了| 免费日韩欧美在线观看| 亚洲中文av在线| 久久精品国产综合久久久| 久久天堂一区二区三区四区| 国产精品人妻久久久影院| 999久久久国产精品视频| 婷婷色麻豆天堂久久| 不卡av一区二区三区| 久久精品人人爽人人爽视色| 成人三级做爰电影| 国产欧美日韩一区二区三区在线| 久久性视频一级片| 国产精品一区二区精品视频观看| 精品国产一区二区三区久久久樱花| 一区二区三区四区激情视频| 久久天堂一区二区三区四区| 久久久国产一区二区| 欧美av亚洲av综合av国产av | 99热全是精品| 色精品久久人妻99蜜桃| 免费在线观看视频国产中文字幕亚洲 | 成年美女黄网站色视频大全免费| 青青草视频在线视频观看| 久久狼人影院| 美女扒开内裤让男人捅视频| 丝袜喷水一区| 日韩精品有码人妻一区| 亚洲专区中文字幕在线 | 性色av一级| 欧美精品一区二区免费开放| 一区二区三区激情视频| 亚洲国产欧美一区二区综合| 日本欧美国产在线视频| 永久免费av网站大全| 亚洲五月色婷婷综合| 最近最新中文字幕大全免费视频 | 黄片播放在线免费| 久久毛片免费看一区二区三区| 国产激情久久老熟女| 青春草视频在线免费观看| 成人国产av品久久久| 国产黄色视频一区二区在线观看| 51午夜福利影视在线观看| 9191精品国产免费久久| 国产av码专区亚洲av| 精品少妇内射三级| 国产在线免费精品| 国产av国产精品国产| 岛国毛片在线播放| 免费观看性生交大片5| 国产探花极品一区二区| 亚洲 欧美一区二区三区| 精品少妇黑人巨大在线播放| 久久午夜综合久久蜜桃| 亚洲欧美成人精品一区二区| 激情五月婷婷亚洲| 日韩一区二区视频免费看| 欧美日韩亚洲国产一区二区在线观看 | 熟妇人妻不卡中文字幕| 一区二区av电影网| 九九爱精品视频在线观看| 欧美日韩一级在线毛片| 亚洲少妇的诱惑av| 日日撸夜夜添| 极品少妇高潮喷水抽搐|