Energy Efficient Medium Access Protocol for Wireless Medical Body Area Sensor Networks-t6W.pdf

(1591 KB) Pobierz
640078681 UNPDF
IEEE TRANSACTIONS ON BIOMEDICAL CIRCUITS AND SYSTEMS, VOL. 2, NO. 4, DECEMBER 2008
251
Energy Efcient Medium Access Protocol for
Wireless Medical Body Area Sensor Networks
Okundu Omeni , Member, IEEE , Alan Chi Wai Wong, Alison J. Burdett , Senior Member, IEEE , and
Christofer Toumazou , Fellow, IEEE
ABSTRACT— This paper presents a novel energy-efcient MAC
Protocol designed specically for wireless body area sensor
networks (WBASN) focused towards pervasive healthcare appli-
cations. Wireless body area networks consist of wireless sensor
nodes attached to the human body to monitor vital signs such as
body temperature, activity or heart-rate. The network adopts a
master-slave architecture, where the body-worn slave node peri-
odically sends sensor readings to a central master node. Unlike
traditional peer-to-peer wireless sensor networks, the nodes in
this biomedical WBASN are not deployed in an ad hoc fashion.
Joining a network is centrally managed and all communications
are single-hop. To reduce energy consumption, all the sensor nodes
are in standby or sleep mode until the centrally assigned time
slot. Once a node has joined a network, there is no possibility of
collision within a cluster as all communication is initiated by the
central node and is addressed uniquely to a slave node. To avoid
collisions with nearby transmitters, a clear channel assessment
algorithm based on standard listen-before-transmit (LBT) is
used. To handle time slot overlaps, the novel concept of a wakeup
fallback time is introduced. Using single-hop communication
and centrally controlled sleep/wakeup times leads to signicant
energy reductions for this application compared to more “exible”
network MAC protocols such as 802.11 or Zigbee. As duty cycle is
reduced, the overall power consumption approaches the standby
power. The protocol is implemented in hardware as part of the
Sensium™ system-on-chip WBASN ASIC, in a 0.13- m CMOS
process.
INDEX TERMS— Hardware MAC, MAC Protocol, wireless body
area sensor network, wireless sensor networks.
chronic conditions that require ongoing clinical management
[ 1 ] , [ 2 ] . Sensium™ is a trademark of Toumaz Technology Ltd,
UK.
Vital signs monitoring using wireless sensor network tech-
nologies have previously been described, but these systems are
typically bulky and power hungry and rely on MAC protocols
such as Bluetooth and 802.11 which are inefcient for such
WBASN applications [ 3 ] [ 6 ] . More general Wireless Sensor
Network (WSN) MAC protocols, which have been the focus
of fairly intensive research [ 6 ] , [ 7 ] , [ 9 ] , [ 10 ] , are also not well
suited to these specic biomedical WBASN applications either.
Zigbee/IEEE 802.15.4 [ 6 ] which is designed for similar net-
works does not have sufcient ’network device’ exibility in
non-beacon mode. It also lacks the cross-layer optimization fea-
tures which the proposed protocol brings to this particular area.
This paper describes a novel MAC Protocol designed specif-
ically for wireless body area sensor networks focused on perva-
sive healthcare applications. Like other wireless sensor network
MAC protocols, a primary design goal was low power consump-
tion. This is achieved through a focus on collision avoidance (a
primary source of energy wastage [ 6 ] , [ 7 ] , [ 9 ] , [ 10 ] ), and the use
of centrally controlled time slotting for sensor nodes. The com-
plete hardware MAC also incorporates cross-layer optimization,
performing some ISO/OSI upper layer functions (from session
layer down to PHY) at the hardware MAC layer to reduce the
power overhead of software implementations.
As a result of the network topology adopted in the MAC
protocol, many of the traditional problems that plague wireless
sensor networks have been either eliminated or signicantly re-
duced. Specically, idle listening and over-hearing are not an
issue in this protocol as trafc is managed centrally. Table I
highlights some of the key features of traditional ad hoc wire-
less sensor networks (WSN) and emerging wireless body area
sensor networks (WBASN). In the following sections, the pro-
posed MAC Protocol is presented in more detail, from concep-
tion to design, implementation together with measured results.
the convergence of all media and data services appears to
be gaining wide acceptance. The healthcare sector is becoming
increasingly interested in using this new technology to more ef-
fectively administer healthcare delivery. In particular, wireless
vital signs monitoring is an area of modern healthcare that is
growing very fast. This is due to its potential for slowing down
the unsustainable growth of healthcare spending due to an in-
creasing number of people living for years or even decades with
II. R ELATED W ORK
Manuscript received December 31, 2007; revised March 12, 2008. Current
version published November 19, 2008. This work was supported in part by
Toumaz Technology Ltd, Oxfordshire, U.K. This paper was recommended by
Associate Editor E. MacPherson.
O. Omeni, A. C. W. Wong, and A. J. Burdette are with the Toumaz Tech-
nology Ltd, Oxfordshire OX14 4RZ, U.K. (e-mail: okundu.omeni@toumaz.
com; alan.wong@toumaz.com; Alison.burdett@toumaz.com).
C. Toumazou is with the Toumaz Technology Ltd, Oxfordshire OX14 4RZ,
U.K., and also the Institute of Biomedical Engineering, Imperial College
London, London SW7 2AZ, U.K. (e-mail: c.toumazou@ic.ac.uk).
Color versions of one or more of the gures in this paper are available online
at http://ieeexplore.ieee.org.
Digital Object Identier 10.1109/TBCAS.2008.2003431
A. Review Stage
MAC Protocol design is a very broad research area, and a lot
of recent work has focused on the area of wireless sensor net-
works [ 6 ] , [ 7 ] , [ 9 ] , [ 10 ] . As widely reported [ 6 ] , [ 7 ] , [ 9 ], [ 10 ]
major causes of energy wastage in wireless sensor networks
are collisions, idle listening, overhearing, trafc uctuations and
protocol overhead.
In the more specic area of wireless body area networks,
the rst three sources of wastage can be eliminated by using
1932-4545/$25.00 © 2008
AUTHORIZED LICENSED USE LIMITED TO: IMPERIAL COLLEGE LONDON. DOWNLOADED ON JUNE 07,2010 AT 19:36:21 UTC FROM IEEE XPLORE. RESTRICTIONS APPLY.
I. I NTRODUCTION
T HE wireless communications revolution which is leading
640078681.298.png
252
IEEE TRANSACTIONS ON BIOMEDICAL CIRCUITS AND SYSTEMS, VOL. 2, NO. 4, DECEMBER 2008
TABLE I
C OMPARING T RADITIONAL AND B ODY A REA W IRELESS S ENSOR N ETWORKS
6) Sensor nodes are resource constrained, i.e., they have low
processing power and limited memory.
7) Data from the wireless sensor nodes is forwarded to a cen-
tral master node for processing; this central node is signif-
icantly less resource and power constrained relative to the
wireless sensor nodes.
These listed attributes are the main inuences leading to the
specic MAC Protocol implementation described in this paper.
These attributes also differentiate the particular application from
more generic wireless sensor network protocols, and other pro-
tocols which have been deployed in biomedical applications
such as Bluetooth, IEEE 802.11 and 802.15.4.
a master-slave architecture with time division multiple access
with clear channel assessment (TDMA/CCA) [ 6 ] network ac-
cess scheme. In a recent paper, Lamprinos et al. [ 11 ] proposed a
MAC protocol for Patient Personal Area Networks (essentially a
wireless body area network application) in which a master-slave
architecture is employed, whereby, to avoid idle listening, all the
slaves have to lock onto the Rx slot of the master and go into
standby at the same time. This approach imposes a limitation
on the duty cycles of the slaves on the network. Some would
have low duty cycle because they are serviced rst while others
would have a higher duty cycle since they are serviced later in
the Rx slot.
B. Network Architecture
As a result of the attributes in the previous section, a point
to multi-point (star) network architecture is proposed. In this
architecture, the central node acts as the master while the other
nodes are slaves. The slave nodes are the actual WBASN nodes
which acquire sensor data and transmit to the central node for
processing. Each individual master-slaves network is refereed to
as a cluster. For ease of management, the maximum number of
slaves connected to a master in one cluster is 8 (many more can
be connected, but the time-slotting would have to be managed
outside the protocol). Although it is possible to form complex
networks of a “central master” with other masters, this paper
concentrates on the protocol as it relates to one cluster.
Also in this architecture, the network access is clear channel
assessment [ 3 ] , [ 6 ] and collision avoidance with time division
multiplexing (CCA/TDMA). This network access scheme sig-
nicantly reduces the likelihood of collision and idle listening,
leading to signicant power savings. In addition time-slot al-
location is dynamically controlled by the master, so a slave
time slot could be changed every time it communicates with the
master. This enables the system to better cope with uctuating
trafc.
The penalty is increased complexity of the central node. How-
ever, this is not a major problem because the central node is
expected to have signicantly more power and processing re-
sources. The key idea used in this network architecture is to
move much of the network and protocol complexity away from
the power constrained wireless sensor nodes and into the much
more capable central node.
This network topology is shown in Fig. 1. To accommodate
for intercommunication between clusters, access to an IP net-
work may be used. This way complex network structures can
still be built which extend wide areas.
III. M AC P ROTOCOL D ESIGN
The main goal of the proposed MAC Protocol is to reduce
power consumption from sources like idle listening, overhearing
and collision.
The closest existing MAC Protocol to the one presented is
IEEE 802.15.4 [ 6 ], however it had 3 differences which were not
well suited to this specic application.
1) Data reliability isn’t handled in the MAC layer.
2) Multiple communication modes increase the complexity of
implementation. Hence, this new scheme is easily imple-
mented in hardware.
3) Time-slotting is limited (16 slots in a super frame) and
must all be equally spaced
Before describing the MAC Protocol, assumptions about
wireless body area networks are outlined.
A. Attributes of Wireless Body Area Sensor Networks
In specifying this MAC Protocol, the following attributes can
be inferred about the wireless body area sensor network.
1) All wireless sensor nodes are attached to the body.
2) The data being monitored is of low frequency
3) The network does not need to respond immediately to
changes (can be inferred from 2).
4) Sensors monitor a range of vital signs which are typically
at a low data rate kB e.g., Temperature, pressure or
heart-rate reading. However some higher data rate applica-
tions must also be catered for, such as streaming of elec-
trocardiogram (ECG) signals.
5) The nodes are miniature, battery powered and need to
run ideally for days from very low capacity batteries such
as exible printed battery technologies or miniature coin
cells.
C. Basic Operation
The proposed MAC protocol operations are based on three
main communication processes. The rst is when a wireless
sensor node wants to join a cluster. This is called the Link
establishment process. The second is when a slave and master
wake-up after an assigned sleep period. This is called the
wakeup service process. The last process is an exception
process which occurs when a slave urgently wants to send
information to the cluster master. This is called an Alarm
process. In all three processes, communication can only be
AUTHORIZED LICENSED USE LIMITED TO: IMPERIAL COLLEGE LONDON. DOWNLOADED ON JUNE 07,2010 AT 19:36:21 UTC FROM IEEE XPLORE. RESTRICTIONS APPLY.
640078681.309.png 640078681.320.png 640078681.331.png 640078681.001.png 640078681.012.png
OMENI et al. : ENERGY EFFICIENT MEDIUM ACCESS PROTOCOL FOR WIRELESS MEDICAL BODY AREA SENSOR NETWORKS
253
master without waiting for its next wake-up. This alarm con-
dition may be due to an out of bounds measurement (of say
body temperature or blood glucose level) or a “sensor memory
overow” alert. When this mode is enabled, the master contin-
uously sends out a request to all the slave addresses on the net-
work sequentially. The slave listens for its address and commu-
nicates the alarm condition when it receives it. This only hap-
pens when the master is not busy servicing a scheduled wakeup,
and would be terminated when a slave wake-up needs to be ser-
viced. [ Fig. 2(c) ].
All three communication processes described above are illus-
trated in Fig. 2(a) (c) .
Fig. 1. Proposed MAC Protocol Network topology ( Slave Node,
Master node).
D. Wakeup Fallback Time
The central management of time slotting can be a complex
task for the master especially when complicated by the occur-
rence of sporadic alarm conditions. To ensure that every sensor
slave node maintains a guaranteed time slot [ 6 ] even if another
slave ags an alarm condition, the novel concept of wakeup
fallback time (WFT) is proposed. If a slave wakes up and fails
to communicate with the master (either because it is busy ser-
vicing an alarm, or the channel is temporarily occupied by an
interferer), it goes back to sleep with a sleep time set by the
WFT. During this time it continues to buffer the sensor data.
After the WFT, it wakes up and searches for the master again.
Similarly, if the master is unable to communicate with the slave
at the wakeup time, it also defaults to the WFT. Hence, both
master and slave wakeup at the common WFT and commu-
nicate, restoring the schedule. The WFT is a programmable
parameter and is a fraction of the shortest sleep time on the
network to mitigate continuous time-slot collisions. Also it is
global to the network and originally set by the master during
the link establishment process. This scheme ensures that time
slot overlaps are seamlessly managed and do not degrade the
network in the long run. Also it allows a slave with a long sleep
time more opportunities to communicate its data to the master
without having to wait for the whole sleep-time again.
initiated by the master. In addition only one slave can join the
network at a time as the network is non- ad hoc.
1) Link Establishment: When a master node is rst enabled,
it continuously tries to establish a link with unattached slave
nodes. It does this by rst scanning for a vacant RF channel.
When it nds one, it remains on that channel and starts sending
out a beacon containing a unique address and conguration for
a slave and then listening for a xed time for a response. The
sum of the master’s beacon transmit and listen time is termed
. Alternatively, when a slave node is enabled, it also scans
the available RF channels to nd the master beacon. If a channel
is vacant for , it hops to the next one. If it is occupied, it
listens for xed period for preamble from the master
beacon and if it doesn’t receive it, it moves on again to the next
channel. Once the beacon is received, it responds with an ac-
knowledgement to the master. The master node then assigns a
sleep time and ends the transaction. At the end of the link estab-
lishment process, the slave has a unique address, conguration
information and sleep time [ Fig. 2(a) ]. Subsequent additions to
the network have to be specically initiated (e.g., by software)
on the master. After Link establishment, the RF channel of com-
munication is xed and can only be changed by higher layer in-
tervention.
2) Wakeup Service: After link establishment, both master
and slave sleep timers start to count up to the sleep time. Hence,
they both wake-up at about the same time, the difference in
wake-up times determined by the offsets between both timers
and the length of the sleep time. On wake-up, the master in-
terrogates the slave which alternatively listens. It (master) may
simply request for its (slave’s) sensor data, or request status in-
formation. Whatever the communication, a new sleep time is as-
signed to the slave, setting the next wakeup time-slot [ Fig. 2(b)]
To mitigate long-term time-slot drift between the master and
slaves in a cluster, there is an optional synchronization phase
during every communication when the slave can synchronize
its timer to that of the master. The master’s timers never change.
This dynamic time-slotting does not in any way preclude the use
of the protocol in a xed time-slotting application. It just offers
this added functionality which may be used if required.
3) Alarm: If the slave detects an “alarm condition” while per-
forming some local processing, it may communicate with the
E. Cross Layer Functionality
When a data packet transmission fails, the MAC automati-
cally retries a programmable number of times before dropping
the packet. In addition large packets can be automatically broken
in to smaller frames and transmitted one at a time. The protocol
also provides for the receiver to reassemble the fragmented data
packets as they are received. One additional function provided
is the control of the frequency and rate of sensor data acquisi-
tion depending on the application.
These functions are usually handled by higher layers in the
ISO/OSI protocol stack. In this protocol, hardware implemen-
tation directly at the MAC layer is preferred as signicant power
savings over software implementations is achieved. This is be-
cause the processor would normally need to run continuously
(signicantly increasing standby power) to perform these func-
tions like determining when to take the next sensor reading, how
many should be taken and when to switch to another sensor.
Also the delay involved in communicating through the protocol
stack layers is eliminated [ 12 ].
AUTHORIZED LICENSED USE LIMITED TO: IMPERIAL COLLEGE LONDON. DOWNLOADED ON JUNE 07,2010 AT 19:36:21 UTC FROM IEEE XPLORE. RESTRICTIONS APPLY.
640078681.023.png 640078681.034.png 640078681.045.png 640078681.056.png 640078681.067.png 640078681.078.png 640078681.089.png 640078681.100.png 640078681.111.png 640078681.122.png 640078681.133.png 640078681.144.png
254
IEEE TRANSACTIONS ON BIOMEDICAL CIRCUITS AND SYSTEMS, VOL. 2, NO. 4, DECEMBER 2008
Fig. 2. Stages in the 3 processes. (a) Link establishment. (b) Wakeup servicing. (c) Alarm processing.
IV. M AC P ROTOCOL I MPLEMENTATION
A. Implementation Platform—Sensium™
Following detailed system modeling, the MAC Protocol was
implemented as a key part of a custom system-on-chip (SoC)
ASIC for biomedical WBASN applications. This mixed-signal
SoC, known as Sensium™, integrates a half-duplex transceiver,
programmable sensor interface circuitry and a digital block con-
taining the hardware MAC plus a low power 8051 microcon-
troller integrated with 32 kB of code and 32 kB of data memory.
The data memory is directly accessible via a DMA controller
by both the Sensor Interface ADC (to write sensor readings)
and by the hardware MAC (to read/write sensor readings for
direct transmission/reception). Having direct access to system
memory allows the slave devices to operate entirely without pro-
cessor intervention. The processor can therefore be switched to a
low clock frequency and used to service irregular events like link
errors. On the master, processor intervention is also minimal,
Fig. 3. Sensium™ System on chip block diagram.
and so it is freed up to handle higher layer functions or transfer-
ring acquired data to a PC for further processing. Which blocks
are active in a given mode is controlled by the power man-
agement unit. The Sensium™ system block diagram is shown
below in Fig. 3 .
AUTHORIZED LICENSED USE LIMITED TO: IMPERIAL COLLEGE LONDON. DOWNLOADED ON JUNE 07,2010 AT 19:36:21 UTC FROM IEEE XPLORE. RESTRICTIONS APPLY.
640078681.155.png
OMENI et al. : ENERGY EFFICIENT MEDIUM ACCESS PROTOCOL FOR WIRELESS MEDICAL BODY AREA SENSOR NETWORKS
255
TABLE II
T YPICAL A PPLICATION R EQUIREMENTS
From the above analysis, it has been shown that the duty
cycle in continuous monitoring applications like ECG is af-
fected mainly by the communication symbol rate.
Table II illustrates this using typical numbers for 3 important
applications. For spot measurement applications, we can reduce
duty cycle by increasing the sleep time because more payload
data means that the overhead time becomes less signicant and
(3) approaches (4). This is however not the case for continuous
monitoring applications like ECG as the amount of sensor data
must increase with sleep time. For applications like this, the
sleep time is usually limited by the system memory resources
available for storing the sensor data. Fig. 4 shows the graphs of
obtained by plotting (1) and (2) for a temperature sensing ap-
plication. The payload size was kept xed; while the sleep time
was changed (which means that sampling interval was spread
evenly over the chosen sleep time which is acceptable since the
data is signicantly more than required as shown in Table II) . It
can be concluded from the plot that the power is dependent on
the sleep time (4a) as well as the number of retransmissions (4b).
Fig. 4(b) also shows that the power consumption approaches the
standby power as sleep time increases
The physical layer for the radio operates in the 870/900 MHz
SRD/ISM bands, employing FSK modulation with 50 KHz de-
viation to give an over air bit rate of 50 kbps [ 13 ] . The sensor in-
terface block features sensor driving and interface circuitry for a
range of biomedical sensors, and includes a 10-bit, 50–500 Hz
sampling rate DSM-ADC [ 14 ]. For error control, an (11, 15)
hamming code is implemented in the MAC hardware together
with CRC frame checking. This provides 2 levels of error cor-
rection and detection.
B. Mac Complexity
The entire Hardware MAC protocol, including the error
control and framing block, was under 12 K-gates for the slave
and K-gates for the master. The gate count of the hard-
ware implementations points to the simplicity of the protocol.
Since no hardware implementations of 802.15.4 were found,
we compared the software implementations of both protocols.
The proposed protocol can be implemented in around 16 kB of
code (including application code) while 15.4 would require at
least 32 kB. The power consumption for this implementation
is around 500 W while it is 15.4 is 10 mW [ 15 ] , [ 16 ] . This
is because of the difference in clock frequency required to run
both protocols. This protocol can be run on an
(1)
The general equation for average power is
C. System Power and Duty Cycle Analysis
(2)
The average power consumption is dependent on the duty
cycle of operation. So even though a sensor node has a very
long sleep time, but also has a long active time, the duty cycle
would be high and hence average power. This can be computed
for spot measurement applications like for temperature and glu-
cose and also for continuous monitoring applications like ECG.
Table II gives compares common applications.
A detailed analysis of the relationships between the parame-
ters that affect duty cycle and average power computation fol-
lows.
Expading the DC equation further, we have
(3)
Fir spot measurement applications, is signicant because
of the small data payload and hence cannot be ignored.
AUTHORIZED LICENSED USE LIMITED TO: IMPERIAL COLLEGE LONDON. DOWNLOADED ON JUNE 07,2010 AT 19:36:21 UTC FROM IEEE XPLORE. RESTRICTIONS APPLY.
640078681.166.png 640078681.177.png 640078681.188.png 640078681.199.png 640078681.210.png 640078681.221.png 640078681.232.png 640078681.243.png 640078681.254.png 640078681.265.png 640078681.273.png 640078681.274.png 640078681.275.png 640078681.276.png 640078681.277.png 640078681.278.png 640078681.279.png 640078681.280.png 640078681.281.png 640078681.282.png 640078681.283.png 640078681.284.png 640078681.285.png 640078681.286.png 640078681.287.png 640078681.288.png 640078681.289.png 640078681.290.png 640078681.291.png 640078681.292.png 640078681.293.png 640078681.294.png 640078681.295.png 640078681.296.png 640078681.297.png 640078681.299.png 640078681.300.png 640078681.301.png 640078681.302.png 640078681.303.png 640078681.304.png 640078681.305.png 640078681.306.png 640078681.307.png 640078681.308.png 640078681.310.png 640078681.311.png 640078681.312.png 640078681.313.png 640078681.314.png 640078681.315.png 640078681.316.png 640078681.317.png 640078681.318.png 640078681.319.png 640078681.321.png 640078681.322.png 640078681.323.png 640078681.324.png 640078681.325.png 640078681.326.png 640078681.327.png 640078681.328.png 640078681.329.png 640078681.330.png 640078681.332.png 640078681.333.png 640078681.334.png 640078681.335.png 640078681.336.png 640078681.337.png 640078681.338.png 640078681.339.png 640078681.340.png 640078681.341.png 640078681.002.png 640078681.003.png 640078681.004.png 640078681.005.png 640078681.006.png 640078681.007.png 640078681.008.png 640078681.009.png 640078681.010.png 640078681.011.png 640078681.013.png 640078681.014.png 640078681.015.png 640078681.016.png 640078681.017.png 640078681.018.png 640078681.019.png 640078681.020.png 640078681.021.png 640078681.022.png 640078681.024.png 640078681.025.png 640078681.026.png 640078681.027.png 640078681.028.png 640078681.029.png 640078681.030.png 640078681.031.png 640078681.032.png 640078681.033.png 640078681.035.png 640078681.036.png 640078681.037.png 640078681.038.png 640078681.039.png 640078681.040.png 640078681.041.png 640078681.042.png 640078681.043.png 640078681.044.png 640078681.046.png 640078681.047.png 640078681.048.png 640078681.049.png 640078681.050.png 640078681.051.png 640078681.052.png 640078681.053.png 640078681.054.png 640078681.055.png 640078681.057.png 640078681.058.png 640078681.059.png 640078681.060.png 640078681.061.png 640078681.062.png 640078681.063.png 640078681.064.png 640078681.065.png 640078681.066.png 640078681.068.png 640078681.069.png 640078681.070.png 640078681.071.png 640078681.072.png 640078681.073.png 640078681.074.png 640078681.075.png 640078681.076.png 640078681.077.png 640078681.079.png 640078681.080.png 640078681.081.png 640078681.082.png 640078681.083.png 640078681.084.png 640078681.085.png 640078681.086.png 640078681.087.png 640078681.088.png 640078681.090.png 640078681.091.png 640078681.092.png 640078681.093.png 640078681.094.png 640078681.095.png 640078681.096.png 640078681.097.png 640078681.098.png 640078681.099.png 640078681.101.png 640078681.102.png 640078681.103.png 640078681.104.png 640078681.105.png 640078681.106.png 640078681.107.png 640078681.108.png 640078681.109.png 640078681.110.png 640078681.112.png 640078681.113.png 640078681.114.png 640078681.115.png 640078681.116.png 640078681.117.png 640078681.118.png 640078681.119.png 640078681.120.png 640078681.121.png 640078681.123.png 640078681.124.png 640078681.125.png 640078681.126.png 640078681.127.png 640078681.128.png 640078681.129.png 640078681.130.png 640078681.131.png 640078681.132.png 640078681.134.png 640078681.135.png 640078681.136.png 640078681.137.png 640078681.138.png 640078681.139.png 640078681.140.png 640078681.141.png 640078681.142.png 640078681.143.png 640078681.145.png 640078681.146.png 640078681.147.png 640078681.148.png 640078681.149.png 640078681.150.png 640078681.151.png 640078681.152.png 640078681.153.png 640078681.154.png 640078681.156.png 640078681.157.png 640078681.158.png 640078681.159.png 640078681.160.png 640078681.161.png 640078681.162.png 640078681.163.png 640078681.164.png 640078681.165.png 640078681.167.png 640078681.168.png 640078681.169.png 640078681.170.png 640078681.171.png 640078681.172.png 640078681.173.png 640078681.174.png 640078681.175.png 640078681.176.png 640078681.178.png 640078681.179.png 640078681.180.png 640078681.181.png 640078681.182.png 640078681.183.png 640078681.184.png 640078681.185.png 640078681.186.png 640078681.187.png 640078681.189.png 640078681.190.png 640078681.191.png 640078681.192.png 640078681.193.png 640078681.194.png 640078681.195.png 640078681.196.png 640078681.197.png 640078681.198.png 640078681.200.png 640078681.201.png 640078681.202.png 640078681.203.png 640078681.204.png 640078681.205.png 640078681.206.png 640078681.207.png 640078681.208.png 640078681.209.png 640078681.211.png 640078681.212.png 640078681.213.png 640078681.214.png 640078681.215.png 640078681.216.png 640078681.217.png 640078681.218.png 640078681.219.png 640078681.220.png 640078681.222.png 640078681.223.png 640078681.224.png 640078681.225.png 640078681.226.png 640078681.227.png 640078681.228.png 640078681.229.png 640078681.230.png 640078681.231.png 640078681.233.png 640078681.234.png 640078681.235.png 640078681.236.png 640078681.237.png 640078681.238.png 640078681.239.png 640078681.240.png 640078681.241.png 640078681.242.png 640078681.244.png 640078681.245.png 640078681.246.png 640078681.247.png 640078681.248.png 640078681.249.png 640078681.250.png 640078681.251.png 640078681.252.png 640078681.253.png 640078681.255.png 640078681.256.png 640078681.257.png 640078681.258.png 640078681.259.png 640078681.260.png 640078681.261.png 640078681.262.png 640078681.263.png 640078681.264.png 640078681.266.png 640078681.267.png 640078681.268.png 640078681.269.png 640078681.270.png 640078681.271.png 640078681.272.png
Zgłoś jeśli naruszono regulamin