亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        Sparse Rev-Shift Coded Modulation with Novel Overhead Bound

        2023-11-06 01:15:46MingjunDaiWanruLiChantingZhangXiaohuiLinBinChen
        China Communications 2023年10期

        Mingjun Dai ,Wanru Li ,Chanting Zhang ,Xiaohui Lin,* ,Bin Chen

        1 School of Computer Science and Technology,Kashi University,Kashi 844000,China

        2 College of Electronics and Information Engineering,Shenzhen University,Shenzhen 518000,China

        *The corresponding author,email: xhlin@szu.edu.cn

        Abstract: To provide reliability in distributed systems,combination property (CP) is desired,where k original packets are encoded into n ≥k packets and arbitrary k are sufficient to reconstruct all the original packets.Shift-and-add (SA) encoding combined with zigzag decoding(ZD)obtains the CP-ZD,which is promising to reap low computational complexity in the encoding/decoding process of these systems.As densely coded modulation is difficult to achieve CP-ZD,research attentions are paid to sparse coded modulation.The drawback of existing sparse CP-ZD coded modulation lies in high overhead,especially in widely deployed setting m

        Keywords: distributed system;shift-and-add;zigzag decoding;sparse coded modulation

        I.INTRODUCTION

        The volume of data grows explosively in the era of big data[1,2],which exceeds the processing capability of a single computing node.For distributed implementation,certain nodes may be down or become stragglers[3].For example,in a data center on Facebook,more than 100 failures of stragglers may occur every day [4],which significantly slows down the completion time.

        Network code (NC) [5] tackles the straggler problem by cleverly introducing redundancy to provide combination property (CP) [6],[7]:koriginal packects are encoded inton≥kpackets,and anykout of thesenare able to recover the originalkpackets.Adopting NC to obtain CP has been widely adopted in distributed systems,including distributed communication network[8–10],distributed storage(DS)[11–13],coded distributed computing(CDC)[14–18],and distributed learning[19].

        Prevalent coded modulation methods to obtain CP is the Reed-solomon (RS) [20],which needs to perform encoding and decoding operation over large finite field,and hence the complexity is high especially for the decoding process since it contains gaussian elimination [21].In addition,it has the problem of high power consumption [22],device overheats [23],etc.These drawbacks become prominent in applications where big data is frequently read and written[24]or deployed in devices with limited computing power and resources[25],[26],[27,28].

        Therefore,low-complexity encoding and decoding is more desirable.An efficient method of reducing complexity is let shift-and-add(SA)operation replace linear combination in the encoding process,and backward substitution,say zigzag decoding(ZD)[29],replace the time-consuming gaussian elimination process.Combination of SA and ZD to obtain CP is called CP-ZD.As densely coded modulation is difficult to achieve CP-ZD [30],research attentions are paid to sparse coded modulation.Within sparse coded modulation,the work in[31]proposes the first CP-ZD coded modulation by designing the shift matrix (that characterizes the number of shifts when each component compose the encoded packets)based on increasing the shift difference according to Vandermonde matrix,and is named Inc-Diff.In order to reduce the overhead,by cyclically shifting one particular designed row to form the shift matrix,Cyc-Shift was constructed in [32].Later,a full parameter (n,k) CP-ZD coded modulation was constructed based on increasing difference(ID)and Cyclic Shift(CS),named ID-CS[33].

        In summary,the overhead of existing CP-ZD coded modulation is high,especially for most common scenarios wheremis between 20% and 80% ofk[34],[35].In addition,as far as we know,there is no analytical bound that characterizes the overhead of CP-ZD coded modulation.In this work,we will address these two problems.In Sec.II,preliminaries are given.In Sec.III,code design for Rev-Shift is elaborated.In Sec.IV,a lower bound that characterizes the overhead is derived.Comparison of overheads is given in Sec.V.Finally,conclusions are drawn in Sec.VI.

        II.PRELIMINARIES

        We first formulate system model,and then illustrate design objective and guidelines.

        2.1 System Model

        Consider (n,k) CP-ZD systematic code where there firstksource packets serve as the fistkencoded packets,and the remainingm?n-kencoded packets are obtained by appropriate SA operation over the firstksource packets.As illustrated in Sec.I,we consider to construct encoding method that can reduce the storage overhead in the scenario wherem

        The originalksource packets are represented bys1tosk,with length equal toLand thel-th element(may be a number for CDC environment [14],or a bit for storage systems [33]) ofsidenoted bysi,l,l∈{1,2,...,L}.Letc1tocndenote thenencoded packets.Due to systematic nature,we have systematic packetsci=sifor alli∈{1,2,···,k}?K,and we call encoded packetck+jparity packet,i∈{1,2,···,m}?M,j∈{1,2,...,m}.

        More specific expression for SA is that the source packet is first shifted to the right by a number of elements,and then addition operation is performed at the corresponding position,where the addition may either be in real field for CDC or in binary field for storage systems.ZD is simply a substitution process,namely eleminating the exposed elements.Detailed elaboration may refer to Example 1.

        Letm×kdimension matrixTrepresent the numbers of elements shifted by the source packets,withTijdenoting the number of elements that source packetsjshifted to the right when forming encoded packetck+i.We hence callTthe shift matrix.The maximum of all elements in the matrixTis called overheadOH.

        Example 1.RefertoinFigure1.TheSAencoding isdescribedindetailusingthecode(n,k)=(4,2).Therearek=2sourcepackets,s1,s2eachwith lengthL=5.Inencodedpackets,c1=s1,c2=s2,andc3,c4areobtainedbySAencodingwiththenumberofelements(s1,s2)shiftedtotherightby(0,1)and(0,2),respectively.Specifically,inordertoconstructc3,s1ands2areshiftedtotherightby0and 1elementrespectivelyandthenadded.Similarly,c4isobtainedbyshiftingthesourcepackageby0and2 elementsrespectivelyandthenadded.Inthiscase,the lengthofc3is6andthelengthofc4is7,andOH=2.

        Figure 1.ZD decoding process of(4,2)code.

        Supposec3,c4areutilizedtorecoverthesource packagess1,s2.RefertoFigure1,theorderofthedecodedinformationelementsisindicatedbythenumbersinparentheses.Firstofall,itcanbeseenfrom Figure1thats1,1ofc3ands1,1,s1,2ofc4areexposedelements,sos1,1ands1,2canberegardedas thefirstandseconddecodedpositionsrespectivelyand theirindicesaremarkedas1and2respectivelyinthe parentheses.s2,1canbedecodedbysubstitutings1,2intothesecondpositionofc3,whichisthethirdinformationelementtobedecoded,soitsindexismarked as3intheparentheses.Similarly,s1,3canbeobtainedbysubstitutings2,1intothethirdpositionofc4whoseindexcanbesetto4.Thisdecodingprocess continuesuntilalltheelementsofs1ands2arerecovered.DuringtheZDprocess,wecalltheresultants encodedpacketaftersubstitutionasdegeneratedencodedpacket.

        2.2 Design Objective and Guideline

        The objective is to design CP-ZD codes with smallOH(or maximal elment inT) in the scenario whenm

        Define shift difference

        forp∈M,i,j∈K.Theorem 1 from [32],as restated below,gives a necessary condition for a code to be CP-ZD.

        Theorem 1.ThecodedefinedbyshiftmatrixTisCPZDonlyifforallpq,i≠j,i,j∈Kandp,q∈M.

        We refer to this property as Distinct Shift Difference(DSD).The guideline to design Rev-Shift code is to first satisfy Theorem 1 and then make the overhead as small as possible.In addition,the derivation of overhead bound should also obey Theorem 1.

        III.REV-SHIFT CODE DESIGH FOR m

        We first design Rev-Shift code,and then prove that it possesses CP-ZD.

        3.1 Design of Rev-Shift Code

        To lower the storage overhead in the case ofm

        Firstly,we design a base matrixTBbased on value(n,k),which mimics existing code design.Secondly,we invert each row from the second row to obtain the inverse matrixTR.Thirdly,vertically concatenateTBandTRto form matrixTG.Lastly,fetch the firstmrows from matrixTGto form shift matrixT.Detailed processing is illustrated below:

        Step 1,Parameter determination:Letrdenote the number of rows inTB,withkdenoting the number of columns inTB.AsTRhas one row less thanTB,the number of rows inTBcan be determined as:

        Step 2,Construct base matrixTB:Let the first row ofTBbe[0,0,0,···,0].Starting from the second row,let the(i,j)-th element be(i-1)×(j-1),2≤i≤r,j∈K.More specifically,TBis

        Step 3,Construct inverted matrixTR:Except the first row ofTB,reverse the other rows ofTBto obtain(r-1)×kTRas

        Step 4,Determine shift matrixT:Vertically concatenateTBandTRto obtain a (2r-1)×kmatrix.Fetch the firstmrows ofTGto obtainT.

        Example 2.Suppose(n,k)=(13,7),wehavem=n-k=6.Therefore,thedimensionofshiftmatrixT is6×7.Accordingto(2),wehave

        BasematrixTBisthenconstructedtobe

        ReversematrixTRisthenobtainedtobe

        Finally,shiftmatrixTisobtainedtobe

        3.2 Proof that Rev-Shift Possesses CP-ZD

        Before proving the CP-ZD property of the Rev-Shift code,we first give one lemma and two facts.Afterwards,we then use them in the proof.

        3.2.1 Basic Lemma and Facts

        Lemma 1.Givenanyrowindicesi,jandcolumn indicesm,nofshiftmatrixTspecifiedbyRev-Shift code,wherei≠j,m≠n,wehave

        Proof.The proof of(a)can be obtained directly from the construction rules ofT,and (b) actually follows from the DSD property.Proof of (c) is divided into three cases:

        Case 1.Tim and Tjm are both from TB:Onone hand,since>0,wecandirectlyobtainTin>Tim.Ontheotherhand,ifTim>Tjm,wecandirectlyobtainthatTjmisaboveTim.Sincethedistancebetweenthesametwocolumnsindifferentrows increasesrowbyrow,wehaveissatisfied.

        Case 2.Tim and Tjm are both from TR:Since>0,wehaveTin>Tim,andfurtherdraw theconclusionthatTimistotherightofTininTR.In addition,asTim>Tjm,weobtainthatTjmisabove TiminTR.Wecanalsodirectlyobtain

        Case 3.Tim and Tjm do not simultaneously locate in TB or TR:Itisdividedinto2sub-cases:

        Sub-case2,TimcomesfromTR,Tjmcomesfrom TB:From>0,weknowthatTin>Tim,and henceTimistotherightofTininTR.Therefore,Tjm istotherightofTjninTB.Inaddition,asTim>Tjm,wehave=Tjn-Tjm<0.Therefore,>

        Fact1.Agraphthathasatleastasmanyedgesas verticesmustcontainacycle[36].

        Fact2.The length of each encoded packet becomes shorter and shorter as the ZD decoding process proceeds.LetSidenote the index set of the source packets in the degenerated encoded packetck+i.The ZD decoding succeeds only when we can find one degenerated encoded packetck+iwhose associated|Si|=1.

        3.2.2 Formal Proof of Possessing CP-ZD

        CP-ZD is equivalent to arbitrarykpackets from thenencoded packets can be recovered by the ZD algorithm.

        Theorem 2.Arbitrarykpacketsfromthenencoded packets,whoseshiftmatrixischaracterizedbyTof Rev-Shiftcode,canberecoveredbytheZDalgorithm.Proof.Assume that thekencoded packets are composed ofJ≤Kparity packets andk-Jsystematic packets.The systematic packets can be directly substituted into theJparity packets,which results inJdegenerated parity packets withJsource packets yet to be recovered.In other words,the number of undecoded original packets isJ.

        We useIto denote the index set ofJparity packets,while the index set ofJsource packets is denoted byJ?K,where |I|=|J|=J.In addition,the degenerated shift matrixT-(submatrix ofTby fetching corresponding rows and columns) corresponding to theJparity packets is a matrix of dimensionJ×J.Therefore,the decoding task can be reduced to recovering the remainingJsource packets from theJdegenerated parity packets by ZD algorithm.We use the contradiction method.

        Suppose the ZD algorithm enters a deadlock.This occurs only if |Si|≥2 for alli∈I.Remove arbitrary elements fromSiuntil |Si|=2 for alli∈I.Construct a graph ofJvertices,which are indexed byJ.There is an edge between verticesuandvif and only if bothuandvbelong toSifor somei∈I.By Lemma1b,these edges must be distinct,so there areJedges in total.By Fact 1,there must be a cycle in the graph.

        But Vasilissa saw how she snarled41 at her and she answered: The three questions are enough for me. As thou hast said, grandmother, I would not, through knowing over much, become too soon old.

        Letpbe the number of edges in such a cycle.As mentioned above,by Lemma1b,the constructed graph is a simple graph,which has no cycle of length two.Therefore,p≠2 and hence 3≤p≤J.Furthermore,let thepedges be (d1,d2),(d2,d3),...,(dp-1,dp),(dp,d1).Recall that when constructing the graph,each edge is defined via one of the parity packets.Letr1,r2,...,rp∈Ibe the indices of the parity packets associated with thepedges,respectively.Define

        For notational simplicity,we definedi?dimodp.Note that the existence of the edge (di,di+1),associated with parity packetck+ri,indicates that the number of elements that have been decoded fromSdiminus the number of elements that have been decoded fromis given by.By(9),we must have

        for otherwise the number of decoded elements of thepsource packets would not be consistent.The situation can be discussed in two cases.

        Case 4.The shift matrix associated with the deadlock does not contain the first row,namely the all 0 row:ByLemma1a,allthetermsintherighthandside of(9)arenon-zero.Furthermore,dueto(10),these termscannotallhavethesamesign.Therefore,we mustbeabletofindavalueofi∈{1,2,...,p}such that

        and

        where the above two inequalities follow from (11)and(12),respectively.Since

        it suffices to consider only the case where

        By(12),(13),and Lemma1c,we have

        Re-labeling the edges is equivalent to changing the direction of the loop.Since in fact the direction of the loop is not specified,either direction is ok,and hence(18)is equivalent to(14).In a similar manner,(14) and (18) can be obtained whenandsimultaneously locate inTR.

        Case 5.The shift matrix associated with the deadlock contains the first row,namely the all 0 row:When?loopcontainsashiftdifferencevalue0,the numberofrowsinthecodingmatrixthatconstitutethedeadlockmustbegreaterthan2,namely,thenumber ofitemsontherighthandsideof(9)mustbegreater than2.Thereasonisasfollows:Supposethenumber ofitemsisexactly2,thereisanall-0rowandanarbitraryrowwithashiftdifferencevaluenotequalto0.Inotherwords,therewillbeonlyonevalueequalto0,andtheotherelementswillnotbeequalto0,sothat?loop≠0,whichcontradictstothedeadlockfact.

        When the number of terms is greater than 2,to ensure ?loop≠0,we can still find a benchmark valuerifromr1,r2,···,rpthat satisfies(11)and(12).Similar to the proof of Case 1,(14) or equivalentlycan be proved.

        Notice that the key idea that leads to the contradiction is that in the deadlock state,the numbers of elements decoded by two distinct parity packets are not the same,as illustrated in Figure 2,where the part with dashed lines indicate the elements of the original packets that have been decoded,and the part with solid lines indicates the elements yet to be decoded.

        Figure 2.A graphical illustration to show that(14)is impossible.

        Suppose at this deadlock,exactlyq≥0 elements ofsdi+1have been decoded.The existence of the edge(di,di+1)in our constructed graph indicates that there is no exposed element in parity packetand exactlyq+elements ofhave been decoded(Refer to the upper portion of Figure 2).

        To better understand the above proof,examples are given for Case 1(Example 3)and Case 2(Example 4),respectively.

        Example 3.FollowingExample2,considersetting(n,k)=(13,7).Assumethatencodedpackets c1,c5,c6,c7,c9,c11,c12aregiven,whichindicatesthat theencodedpacketcorrespondingtoall0rowisnot contained.Bysubstitutingsystematicpacketsinto paritypackatesc9,c11,c12,wetransformtheproblemintorecoveringtheremainingsystematicpackets s2,s3,s4fromdegeneratedpacketsc9,c11,c12through theZDalgorithm.Ifthedecodinghasfalleninto deadlock,wehave|S9|=|S11|=|S12|=2.Accordingtothegraphconstructionrule[36],thisis agraphwith3verticesandthenumberofedgesin thisloopisp=3.Drawthecorrespondinggraph inTasshowninFigure3(a).Letd1,d2,d3correspondtocolumn2,column3,andcolumn4,respectively.Letr3,r1,r2correspondtoparitypacket c9,c11,c12,respectively.Atthistime,theloopexists?loop1=(6-3)+(3-4)+(1-3)=0with?loop1representedasshowninFigure3(b),wherethereexistand=-2<0.Therefore,accordingto(14),δ==3-1=2>0issatisfied.

        Figure 3.Example of ?loop1=0.

        ThedecodingsituationisillustratedinFigure4.SupposeL=12,andq=7elementsofs3inc11havebeenrecovered/decoded.Thefirstunknownelementofs3inc11iss3,8.From=3,wecan obtainthatthenumberofelementsdecodedins2is=7+3=10.

        Figure 4.?loop1=0(deadlock)contradicts with the actual decoding situation.

        Inc9,sincethenumberofelementsdecodedbys2is 10and=1,wecanobtainthatthenumberof elementsdecodedins3isatleastq+=7+2=9,whichcontradictstheoriginalassumption thatq=7elementsofs3havebeendecoded.Therefore,thedeadlockdoesnotexist.

        Example 4.FollowingExample2,considersetting(n,k)=(13,7).Assumethatencodedpackets c1,c2,c6,c7,c8,c10,c13aregiven,whichindicatesthat theencodedpacketc8correspondingtotheall0row iscontained.Similarly,aftersubstitutingavailable systempacketss1,s2,s6,s7intotheparitypackets c8,c10,c13,weobtaintheequivalentsystemofrecoveringtheoriginalpacketss3,s4,s5fromdegenerated packetsc8,c10,c13.

        Supposedecodingcannotproceed,whichmeans thereexists|S8|=|S10|=|S13|=2.Accordingto previousproof,wecanconstructagraphwith3verticesandcorrespondingloopwithp=3edgesaswell.DetailsmayrefertothegraphinTasshowninFigure5.Letd1,d2,andd3beassociatedwithcolumns4,3,and5,respectively.Letr1,r2,andr3beassociated withparitypacketsc13,c8,andc10,respectively.There exists?loop2=(8-6)+(0-0)+(6-8)=0asillustratedinFigure5,andthereexists=2>0and=-2 <0inthisloop.Therefore,according toequation(14),δ==2-(-2)=4>0issatisfied.

        Figure 5.Example of ?loop2=0.

        ThedecodingsituationisasshowninFigure6.SupposethelengthofeachoriginalpacketisL=12,q=4elementsofs4inc13havebeendecoded,thefirstunknownelementofs4inc13iss4,5.Fact=2indicatesthatthenumberofelementsalreadydecodedins3isq+=4+2=6.Inc10,sincethenumberofelementsdecodedins3is6,and=-2,wecanobtainthatthenumberofelementsdecodedin s4isatleastq+=4+4=8.Thiscontradictstheoriginalassumptionofq=4elements,whichmeansthedeadlockdoesnotexist.

        Figure 6.?loop2=0(deadlock)contradicts with the real decoding situation.

        IV.LOWER BOUND ON THE OVERHEAD

        In this section,based on the DSD property in Sec.II,we derive a lower bound on the overheads.Note that DSD is a necessary instead of sufficient condition for possessing CP-ZD,and hence the characterized bound based on DSD is a lower bound.We first give some lemmas and theorems.

        Lemma 2.Ifanm×kshiftmatrixTsatisfiesthe DSDproperty,itstransposeT′mustalsosatisfythe DSDproperty.

        Proof.Firstly,consider 2×2 matrix.Suppose matrixsatisfies DSD property,namelyab≠c-d.It is equivalent toa-c≠b-d,which indicates thatalso satisfies DSD property.We then consider general dimension of shift matrixT.For its arbitrary 2×2 submatrix,say indexed by rowsp,q∈{1,2,···,m}and columnsi,j∈{1,2,···,k},namely submatrixwe have.Previous paragraph indicates for,or equivalently,the submatrix ofT′indexed by rowsi,jand columnsp,q,we have.Therefore,T′satisfies DSD property.

        Lemma 3.ForashiftmatrixTwithmrowsandkcolumnsthatsatisfiestheDSDproperty,wehavem≤2OH+1.

        Proof.Firstly,consider caseOH=1,all elements inTbelong to set{0,1},and hence the corresponding shift difference belong to set{-1,0,1}.Therefore,in the ideal case,the maximum number of rows in the shift matrix that satisfies the DSD property is 3,namely,m≤3.

        Now consider caseOH=2,all the elements inTbelong to set{0,1,2}.The corresponding shift difference belong to set{-2,-1,0,1,2}.Therefore,the maximum number of rows in the shift matrix that satisfies the DSD property is 5,namely,m≤5.

        Now consider general value ofOH,all the elements inTbelong to set{0,1,2,...,OH}.The corresponding shift differences belong to set{-OH,-OH+1,...,-1,0,1,...,OH-1,OH}.Therefore,we obtainm≤2OH+1.

        According to Lemma 3,the relationship between the overheadOHand the number of rowsmbecomes,which is listed in Table 1.The following theorem can be inferred from Lemma 3.

        Table 1.Relationship between the number of rows m and overhead OH.

        Theorem 3.ForshiftmatrixTwithmrowsandk columnsthatsatisfiestheDSDproperty,giventhe overheadOH,wehavem≤2OH+1andk≤2OH+1.

        Proof.Given overheadOHassociated with shift matrixT,Table 1 gives constraint onm≤2OH+1.We also claim thatk≤m,which is proved in the following.According to Theorem 2,its transposeT′alsosatisfies the DSD property.In this case,the dimension ofT′isk×m,which must also satisfym≤k,namelyk≤2OH+1.

        Therefore,we obtain a lower bound on the overhead:

        We find that this bound is tight,namely it overlaps the overehead of existing CP-ZD codes,in certain cases as shown in the following example:

        Example 5.Firstly,considercaseOHLBD=1.We canfindaCP-ZDcodewithm=k=3whoseoverheadexactlyequalsOHLBD=1.Todothat,wefirstconstructTB=andthenconstructTG=.Itcanbeverifiedbyexhaustivesearchthatany3×3submatrixTfromTGsatisfies CP-ZD.

        Secondly,considercaseOHLBD=2.Wecanfind severalCP-ZDcodeswithm=5,k=4orm=4,k=5whoseoverheadexactlyequalsOHLBD=2.DetailedTarelistedas:

        Note that to our best knowledge,we are the first that found tight bound for CP-ZD code in certain scenarios.

        V.COMPARE OF OVERHEADS

        In this section,we compare the overhead among existing CP-ZD codes (including Inc-Diff [31],Cyc-Shift[32],ID-CS codes[33]),our proposed Rev-Shift and lower bound as characterized in (19),whose expressions are listed below:

        We execute comparisons on two settings,one is fixingkand varying,and the other is fixingαand varyingk.

        5.1 Setting 1,Fix k and Vary α:

        We focus on the scenario wherem

        The overheads fork=50 andk=100 are plotted in Figure 7 and Figure 8,respectively.It can be observed that the advantage of Rev-Shift over existing codes is significant.However,the lower bound is tight only whenαapproaches 0 or equivalently whenmapproaches 0.

        Figure 7.Comparison of the overhead at k=50.

        Figure 8.Comparison of the overhead at k=100.

        5.2 Setting 2,Fix α and Vary k:

        We fixαand varynfrom 10 to 200.In particular,by fixingα=0.3,1,and 3,respectively,we plot Figure 9 and Figure 10,where Rev-Shift code only occurs in the case whenm

        Figure 9.Comparison of the overhead,m

        Figure 10.Comparison of the overhead,m ≥k.

        VI.CONCLUSION

        For frequently used scenariom

        ACKNOWLEDGEMENT

        The research was jointly supported by research grants from Natural Science Foundation of China(62071304),Guangdong Basic and Applied Basic Research Foundation (2020A1515010381,2022A1515011219,20220809155455002),Basic Research foundation of Shenzhen City(20200826152915001,20190808120415286),and Natural Science Foundation of Shenzhen University (00002501),Xinjiang Uygur Autonomous Region Natural Science Foundation General Project(2023D01A60).

        成人综合网亚洲伊人| 久久国产精品国产精品久久| 亚洲国产精一区二区三区性色| 中文人妻av久久人妻18| 无码人妻精品一区二区三区不卡| 亚洲欧美日韩在线一区| 国产黑丝在线| 久久精品国产亚洲av热一区| 中文字幕亚洲永久精品| 最新中文字幕乱码在线| 亚洲女同av在线观看| 久久精品国产亚洲av久五月天| 精品国产一区二区三区av天堂| 亚洲熟妇无码av在线播放| 欧美高清视频手机在在线| 中文无码伦av中文字幕| 国产综合无码一区二区色蜜蜜| 国产精品区一区第一页| 日日摸夜夜添夜夜添无码免费视频| 亚洲美女又黄又爽在线观看| 国产精品福利影院| 一区二区三区在线蜜桃| 亚洲精品在线一区二区| 久久精品国产亚洲夜色av网站| 亚洲精品v欧洲精品v日韩精品| 亚洲自偷自拍熟女另类| 另类亚洲欧美精品久久不卡| 亚洲AV无码乱码一区二区三区| 国产精品国产三级国产不卡| 日本在线免费不卡一区二区三区| 亚洲中文字幕在线一区| 好大好爽我要高潮在线观看| 好吊妞无缓冲视频观看| 国产男女免费完整视频| 少妇被爽到高潮动态图| 在教室伦流澡到高潮hgl视频| 精品手机在线视频| 中文字幕精品乱码一区| 久久精品国产亚洲av四叶草| 免费国产成人肉肉视频大全| 老熟妻内射精品一区|