飞蚊症是什么原因| 赭是什么颜色| 右乳导管扩张什么意思| 膝盖擦伤用什么药| 细菌感染是什么原因| 送男朋友什么礼物合适| zing是什么意思| 什么品牌补水效果好| 灰指甲什么症状| 什么叫脑梗| 摩羯座女和什么座最配| 冷幽默是什么意思| 铿锵玫瑰是什么意思| 便秘吃什么食物好| 强迫症是什么| 什么眼镜框最轻最舒服| 喜用神什么意思| 梦到女儿死了是什么意思| 凤凰单枞是什么茶| 做梦梦到踩到屎是什么意思| 克山病是什么病| 一毛三是什么军衔| 绿头牌是什么意思| 零七年属什么生肖| 134是什么意思| 六月飞雪是什么意思| 紫丁香什么时候开花| 放屁是热的是什么原因| 麻薯是什么做的| 起水泡痒是什么原因| camel是什么颜色| 耳朵疼什么原因| 掉头发严重是什么原因| 眼睑炎用什么药| 一抹多是什么意思| 一个月来两次大姨妈是什么原因| 字什么意思| 便秘喝什么茶好| 肉身成圣是什么意思| 阳是什么意思| 偷鸡不成蚀把米是什么意思| 六月属什么生肖| 下午右眼跳是什么预兆| 耳鸣什么原因| 阳虚吃什么药效果最好| 中性粒细胞百分比偏低是什么意思| 三焦湿热吃什么中成药| 血糖高吃什么可以降下来| 神经质是什么意思| 低密度脂蛋白胆固醇偏高是什么意思| 陆代表什么数字| 拉肚子恶心想吐吃什么药| 囊性结节是什么意思| 凤梨不能和什么一起吃| 微信什么时候推出的| 总是心慌是什么原因| 中国的全称是什么| 1970属什么| 14k是什么意思| 梦见倒房子是什么预兆| 刚怀孕吃什么最好最营养| 什么的足迹| 舌头发白有齿痕是什么原因| youtube是什么软件| 解酒吃什么| 无情无义什么意思| 快穿是什么意思| 4月19是什么星座| ie是什么| 红薯什么时候传入中国| 脂肪燃烧是什么感觉| 肺大泡是什么| 怀孕了吃什么药能流掉| 早上口苦是什么原因| 胆囊大是什么原因| 尿培养能查出什么病| 咖啡烘培度有什么区别| 太平鸟属于什么档次| 人体缺钠会出现什么症状| 什么耳什么聋| 高考450分能上什么学校| 背疼是什么原因引起的女人| 艾斯比什么意思| 项羽为什么会失败| 药占比什么意思| 甲状腺4a类什么意思| 苏打是什么| 上焦中焦下焦是什么| 什么是网约车| 生理期可以吃什么| 布吉岛什么意思| 什么学步| 白细胞酯酶是什么意思| 一月来两次月经是什么原因| 屿字五行属什么| 梦见鹦鹉是什么征兆| 气短心悸是什么意思| 胃火喝什么茶降火| 尿道炎是什么症状| 淋巴瘤是什么症状| otc药物是什么意思| 腹部痛挂什么科| 自燃是什么意思| 白醋泡脚有什么效果| 一语惊醒梦中人是什么意思| 喝金银花有什么好处| 更年期提前是什么症状| 三班倒是什么意思| 法界是什么意思| 蹲马步有什么好处| 什么地叹气| 勾股定理是什么意思| 打破伤风挂什么科| 欣赏一个人是什么意思| 什么是肾阴虚和肾阳虚| 观音菩萨是属什么生肖| 鼻梁骨骨折属于什么伤| 五行缺金是什么意思| 命悬一线的意思是什么| 11月29是什么星座| 女生学什么专业好| 姜茶什么时候喝最好| 掌眼什么意思| 身上臭是什么原因| 回流什么意思| 怀孕初期分泌物是什么样的| 出汗太多吃什么药好| 梦见蛇咬别人是什么意思| 贾琏为什么叫二爷| 河豚是什么| 从良是什么意思| 绿豆不能跟什么一起吃| 齁不住是什么意思| 牙齿像锯齿是什么原因| 大枣枸杞泡水喝有什么好处| 圆是什么图形| 十月十号是什么星座| 龟苓膏有什么作用| 紫砂壶什么泥料最好| 竖心旁的字与什么有关| 百草枯什么味道| 虾青素有什么功效| 舌头白腻厚苔是什么原因| 尿常规红细胞高是什么原因| 服软是什么意思| 眼睛经常有眼屎是什么原因| 怀孕了挂什么科| 什么的南瓜| 女人吃枸杞有什么好处| 造纸术是什么时候发明的| 南浦大桥什么时候建成| 接骨草长什么样| 呕吐吃什么药| 拔胡子有什么危害| 6月28号是什么星座| 孙子兵法是什么生肖| 月黑见渔灯的见读什么| 什么是过敏性咳嗽| 小便发黄是什么原因引起的| 营养心脏最好的药是什么药| pas什么意思| 什么药补肾最好| 10月4号是什么星座| 第一个月怀孕有什么反应| 胃泌素瘤是什么意思| 恩施玉露是什么茶| 世界上最大的鱼是什么鱼| 强龙不压地头蛇是什么生肖| 阴阳怪气是什么意思| 穿模是什么意思| 孕妇喝什么茶对胎儿好| 省委委员是什么级别| 精液是什么颜色的| 左眼跳什么预兆| herry是什么意思| 女人梦到被蛇咬是什么意思| 令堂什么意思| 黑茶色是什么颜色| 糖尿病能喝什么饮料| 梦见老公不理我是什么意思| 女性为什么会感染hpv| 扁桃体发炎是什么引起的| 中药吃多了对人体有什么伤害| 人参有什么作用| 长豆角叫什么| 甲亢能吃什么| 124什么意思| 手为什么会发麻| 胃疼看病挂什么科| 什么映雪| 口腔脱皮是什么原因引起的| 肝实质密度减低是什么意思| 什么是膳食纤维| 吃什么菜能降血糖| 蜘蛛侠叫什么名字| 对什么感兴趣| 蒟蒻是什么意思| 锖色是什么颜色| 阴茎里面痒是什么原因| 特点是什么| 蟹爪兰用什么肥料最好| 心脏彩超能检查出什么| 锖色是什么颜色| 深海鱼油什么时候吃最好| 早上左眼跳是什么预兆| 什么是有机食品和无机食品| 出汗对身体有什么好处| 贺喜是什么意思| 肌层回声欠均匀是什么意思| 高筋面粉是什么意思| 女性下体长什么样| 黑色上衣搭配什么颜色裤子好看| 穿刺手术是什么意思| 小产后可以吃什么水果| 身体透支是什么意思| 反酸吃什么食物好| hpv检查是什么| 淋巴细胞百分比低说明什么问题| 困觉是什么意思| 肝转氨酶高有什么危害| 农历7月25日是什么星座| 四季如春是什么生肖| 陈皮有什么功效| 体内湿气重吃什么药效果好| 容易中暑是什么原因| 孕酮低跟什么有关系| 什么是附件炎| 23号来月经什么时候是排卵期| rbc红细胞偏高是什么意思| 长生是什么意思| 大林木是什么生肖| 野鸡大学是什么意思| 嵌顿是什么意思| 华国锋为什么辞职| 左甲状腺是什么病| 卤水是什么东西| 智齿什么样子| 1989年属蛇是什么命| 喝什么排湿气| 减肥最快的方法是什么| 什么是隐匿性包茎| 紫菜吃多了有什么坏处| s925是什么金| 高压正常低压低是什么原因| 舌炎吃什么药| 去草原穿什么衣服拍照好看| 什么是阻生牙| 碳酸氢钠是什么| 开悟是什么意思| 钥字五行属什么| 七月22号是什么星座| 脚二拇指比大拇指长代表什么| 减脂期吃什么| 颈部淋巴结肿大吃什么药| 六月二十六是什么日子| 胆固醇高不能吃什么水果| 强直性脊柱炎是什么| 气血不足吃什么食物好| 时间是什么| 知了猴是什么| 咽炎是什么症状| 什么样的血管瘤不用治| 雌二醇过高是什么原因| 月经结束一周后又出血是什么原因| 百度Jump to content

习近平时代观的基本特征

From Wikipedia, the free encyclopedia
(Redirected from Server-side)
A computer network diagram of clients communicating with a server via the Internet
百度 这样算下来,购买比亚迪元DM版,即使是顶配的型也不超过20万元,整体来说还是很实惠的。

The client–server model is a distributed application structure that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients.[1] Often clients and servers communicate over a computer network on separate hardware, but both client and server may be on the same device. A server host runs one or more server programs, which share their resources with clients. A client usually does not share its computing resources, but it requests content or service from a server and may share its own content as part of the request. Clients, therefore, initiate communication sessions with servers, which await incoming requests. Examples of computer applications that use the client–server model are email, network printing, and the World Wide Web.

Client and server role

[edit]

The server component provides a function or service to one or many clients, which initiate requests for such services. Servers are classified by the services they provide. For example, a web server serves web pages and a file server serves computer files. A shared resource may be any of the server computer's software and electronic components, from programs and data to processors and storage devices. The sharing of resources of a server constitutes a service.

Whether a computer is a client, a server, or both, is determined by the nature of the application that requires the service functions. For example, a single computer can run a web server and file server software at the same time to serve different data to clients making different kinds of requests. The client software can also communicate with server software within the same computer.[2] Communication between servers, such as to synchronize data, is sometimes called inter-server or server-to-server communication.

Client and server communication

[edit]

Generally, a service is an abstraction of computer resources and a client does not have to be concerned with how the server performs while fulfilling the request and delivering the response. The client only has to understand the response based on the relevant application protocol, i.e. the content and the formatting of the data for the requested service.

Clients and servers exchange messages in a request–response messaging pattern. The client sends a request, and the server returns a response. This exchange of messages is an example of inter-process communication. To communicate, the computers must have a common language, and they must follow rules so that both the client and the server know what to expect. The language and rules of communication are defined in a communications protocol. All protocols operate in the application layer. The application layer protocol defines the basic patterns of the dialogue. To formalize the data exchange even further, the server may implement an application programming interface (API).[3] The API is an abstraction layer for accessing a service. By restricting communication to a specific content format, it facilitates parsing. By abstracting access, it facilitates cross-platform data exchange.[4]

A server may receive requests from many distinct clients in a short period. A computer can only perform a limited number of tasks at any moment, and relies on a scheduling system to prioritize incoming requests from clients to accommodate them. To prevent abuse and maximize availability, the server software may limit the availability to clients. Denial of service attacks are designed to exploit a server's obligation to process requests by overloading it with excessive request rates. Encryption should be applied if sensitive information is to be communicated between the client and the server.

Example

[edit]

When a bank customer accesses online banking services with a web browser (the client), the client initiates a request to the bank's web server. The customer's login credentials are compared against a database, and the webserver accesses that database server as a client. An application server interprets the returned data by applying the bank's business logic and provides the output to the webserver. Finally, the webserver returns the result to the client web browser for display.

In each step of this sequence of client–server message exchanges, a computer processes a request and returns data. This is the request-response messaging pattern. When all the requests are met, the sequence is complete.

This example illustrates a design pattern applicable to the client–server model: separation of concerns.

Server-side

[edit]

Server-side refers to programs and operations that run on the server. This is in contrast to client-side programs and operations which run on the client.

General concepts

[edit]

"Server-side software" refers to a computer application, such as a web server, that runs on remote server hardware, reachable from a user's local computer, smartphone, or other device.[5] Operations may be performed server-side because they require access to information or functionality that is not available on the client, or because performing such operations on the client side would be slow, unreliable, or insecure.

Client and server programs may be commonly available ones such as free or commercial web servers and web browsers, communicating with each other using standardized protocols. Or, programmers may write their own server, client, and communications protocol which can only be used with one another.

Server-side operations include both those that are carried out in response to client requests, and non-client-oriented operations such as maintenance tasks.[6][7]

Computer security

[edit]

In a computer security context, server-side vulnerabilities or attacks refer to those that occur on a server computer system, rather than on the client side, or in between the two. For example, an attacker might exploit an SQL injection vulnerability in a web application in order to maliciously change or gain unauthorized access to data in the server's database. Alternatively, an attacker might break into a server system using vulnerabilities in the underlying operating system and then be able to access database and other files in the same manner as authorized administrators of the server.[8][9][10]

Examples

[edit]

In the case of distributed computing projects such as SETI@home and the Great Internet Mersenne Prime Search, while the bulk of the operations occur on the client side, the servers are responsible for coordinating the clients, sending them data to analyze, receiving and storing results, providing reporting functionality to project administrators, etc. In the case of an Internet-dependent user application like Google Earth, while querying and display of map data takes place on the client side, the server is responsible for permanent storage of map data, resolving user queries into map data to be returned to the client, etc.

Web applications and services can be implemented in almost any language, as long as they can return data to standards-based web browsers (possibly via intermediary programs) in formats which they can use.

Client side

[edit]

Client-side refers to operations that are performed by the client in a computer network.

General concepts

[edit]

Typically, a client is a computer application, such as a web browser, that runs on a user's local computer, smartphone, or other device, and connects to a server as necessary. Operations may be performed client-side because they require access to information or functionality that is available on the client but not on the server, because the user needs to observe the operations or provide input, or because the server lacks the processing power to perform the operations in a timely manner for all of the clients it serves. Additionally, if operations can be performed by the client, without sending data over the network, they may take less time, use less bandwidth, and incur a lesser security risk.

When the server serves data in a commonly used manner, for example according to standard protocols such as HTTP or FTP, users may have their choice of a number of client programs (e.g. most modern web browsers can request and receive data using both HTTP and FTP). In the case of more specialized applications, programmers may write their own server, client, and communications protocol which can only be used with one another.

Programs that run on a user's local computer without ever sending or receiving data over a network are not considered clients, and so the operations of such programs would not be termed client-side operations.

Computer security

[edit]

In a computer security context, client-side vulnerabilities or attacks refer to those that occur on the client / user's computer system, rather than on the server side, or in between the two. As an example, if a server contained an encrypted file or message which could only be decrypted using a key housed on the user's computer system, a client-side attack would normally be an attacker's only opportunity to gain access to the decrypted contents. For instance, the attacker might cause malware to be installed on the client system, allowing the attacker to view the user's screen, record the user's keystrokes, and steal copies of the user's encryption keys, etc. Alternatively, an attacker might employ cross-site scripting vulnerabilities to execute malicious code on the client's system without needing to install any permanently resident malware.[8][9][10]

Examples

[edit]

Distributed computing projects such as SETI@home and the Great Internet Mersenne Prime Search, as well as Internet-dependent applications like Google Earth, rely primarily on client-side operations. They initiate a connection with the server (either in response to a user query, as with Google Earth, or in an automated fashion, as with SETI@home), and request some data. The server selects a data set (a server-side operation) and sends it back to the client. The client then analyzes the data (a client-side operation), and, when the analysis is complete, displays it to the user (as with Google Earth) and/or transmits the results of calculations back to the server (as with SETI@home).

Early history

[edit]

An early form of client–server architecture is remote job entry, dating at least to OS/360 (announced 1964), where the request was to run a job, and the response was the output.

While formulating the client–server model in the 1960s and 1970s, computer scientists building ARPANET (at the Stanford Research Institute) used the terms server-host (or serving host) and user-host (or using-host), and these appear in the early documents RFC 5[11] and RFC 4.[12] This usage was continued at Xerox PARC in the mid-1970s.

One context in which researchers used these terms was in the design of a computer network programming language called Decode-Encode Language (DEL).[11] The purpose of this language was to accept commands from one computer (the user-host), which would return status reports to the user as it encoded the commands in network packets. Another DEL-capable computer, the server-host, received the packets, decoded them, and returned formatted data to the user-host. A DEL program on the user-host received the results to present to the user. This is a client–server transaction. Development of DEL was just beginning in 1969, the year that the United States Department of Defense established ARPANET (predecessor of Internet).

Client-host and server-host

[edit]

Client-host and server-host have subtly different meanings than client and server. A host is any computer connected to a network. Whereas the words server and client may refer either to a computer or to a computer program, server-host and client-host always refer to computers. The host is a versatile, multifunction computer; clients and servers are just programs that run on a host. In the client–server model, a server is more likely to be devoted to the task of serving.

An early use of the word client occurs in "Separating Data from Function in a Distributed File System", a 1978 paper by Xerox PARC computer scientists Howard Sturgis, James Mitchell, and Jay Israel. The authors are careful to define the term for readers, and explain that they use it to distinguish between the user and the user's network node (the client).[13] By 1992, the word server had entered into general parlance.[14][15]

Centralized computing

[edit]

The client-server model does not dictate that server-hosts must have more resources than client-hosts. Rather, it enables any general-purpose computer to extend its capabilities by using the shared resources of other hosts. Centralized computing, however, specifically allocates a large number of resources to a small number of computers. The more computation is offloaded from client-hosts to the central computers, the simpler the client-hosts can be.[16] It relies heavily on network resources (servers and infrastructure) for computation and storage. A diskless node loads even its operating system from the network, and a computer terminal has no operating system at all; it is only an input/output interface to the server. In contrast, a rich client, such as a personal computer, has many resources and does not rely on a server for essential functions.

As microcomputers decreased in price and increased in power from the 1980s to the late 1990s, many organizations transitioned computation from centralized servers, such as mainframes and minicomputers, to rich clients.[17] This afforded greater, more individualized dominion over computer resources, but complicated information technology management.[16][18][19] During the 2000s, web applications matured enough to rival application software developed for a specific microarchitecture. This maturation, more affordable mass storage, and the advent of service-oriented architecture were among the factors that gave rise to the cloud computing trend of the 2010s.[20][failed verification]

Comparison with peer-to-peer architecture

[edit]

In addition to the client-server model, distributed computing applications often use the peer-to-peer (P2P) application architecture.

In the client-server model, the server is often designed to operate as a centralized system that serves many clients. The computing power, memory and storage requirements of a server must be scaled appropriately to the expected workload. Load-balancing and failover systems are often employed to scale the server beyond a single physical machine.[21][22]

Load balancing is defined as the methodical and efficient distribution of network or application traffic across multiple servers in a server farm. Each load balancer sits between client devices and backend servers, receiving and then distributing incoming requests to any available server capable of fulfilling them.

In a peer-to-peer network, two or more computers (peers) pool their resources and communicate in a decentralized system. Peers are coequal, or equipotent nodes in a non-hierarchical network. Unlike clients in a client-server or client-queue-client network, peers communicate with each other directly. [23] In peer-to-peer networking, an algorithm in the peer-to-peer communications protocol balances load, and even peers with modest resources can help to share the load.[24] If a node becomes unavailable, its shared resources remain available as long as other peers offer it. Ideally, a peer does not need to achieve high availability because other, redundant peers make up for any resource downtime; as the availability and load capacity of peers change, the protocol reroutes requests.

Both client-server and master-slave are regarded as sub-categories of distributed peer-to-peer systems.[25]

See also

[edit]

Notes

[edit]
  1. ^ "Distributed Application Architecture" (PDF). Sun Microsystem. Archived from the original (PDF) on 6 April 2011. Retrieved 2025-08-08.
  2. ^ The X Window System is one example.
  3. ^ Benatallah, B.; Casati, F.; Toumani, F. (2004). "Web service conversation modeling: A cornerstone for e-business automation". IEEE Internet Computing. 8: 46–54. doi:10.1109/MIC.2004.1260703. S2CID 8121624.
  4. ^ Dustdar, S.; Schreiner, W. (2005). "A survey on web services composition" (PDF). International Journal of Web and Grid Services. 1: 1. CiteSeerX 10.1.1.139.4827. doi:10.1504/IJWGS.2005.007545.
  5. ^ "What do client side and server side mean? Client side vs. server side". Cloudflare. Retrieved 17 April 2025.
  6. ^ "Introduction to the server side - Learn web development | MDN". developer.mozilla.org. 2025-08-08. Retrieved 2025-08-08.
  7. ^ "Server-side website programming - Learn web development | MDN". developer.mozilla.org. 2025-08-08. Retrieved 2025-08-08.
  8. ^ a b Lehtinen, Rick; Russell, Deborah; Gangemi, G. T. (2006). Computer Security Basics (2nd ed.). O'Reilly Media. ISBN 9780596006693. Retrieved 2025-08-08.
  9. ^ a b JS (2025-08-08). "Week 4: Is There a Difference between Client Side and Server Side?". n3tweb.wordpress.com. Retrieved 2025-08-08.
  10. ^ a b Espinosa, Christian (2025-08-08). "Decoding the Hack" (PDF). alpinesecurity.com. Retrieved 2025-08-08.[permanent dead link]
  11. ^ a b Rulifson, Jeff (June 1969). DEL. IETF. doi:10.17487/RFC0005. RFC 5. Retrieved 30 November 2013.
  12. ^ Shapiro, Elmer B. (March 1969). Network Timetable. IETF. doi:10.17487/RFC0004. RFC 4. Retrieved 30 November 2013.
  13. ^ Sturgis, Howard E.; Mitchell, James George; Israel, Jay E. (1978). "Separating Data from Function in a Distributed File System". Xerox PARC.
  14. ^ Harper, Douglas. "server". Online Etymology Dictionary. Retrieved 30 November 2013.
  15. ^ "Separating data from function in a distributed file system". GetInfo. German National Library of Science and Technology. Archived from the original on 2 December 2013. Retrieved 29 November 2013.
  16. ^ a b Nieh, Jason; Yang, S. Jae; Novik, Naomi (2000). "A Comparison of Thin-Client Computing Architectures". Academic Commons. doi:10.7916/D8Z329VF. Retrieved 28 November 2018.
  17. ^ d'Amore, M. J.; Oberst, D. J. (1983). "Microcomputers and mainframes". Proceedings of the 11th annual ACM SIGUCCS conference on User services - SIGUCCS '83. p. 7. doi:10.1145/800041.801417. ISBN 978-0897911160. S2CID 14248076.
  18. ^ Tolia, Niraj; Andersen, David G.; Satyanarayanan, M. (March 2006). "Quantifying Interactive User Experience on Thin Clients" (PDF). Computer. 39 (3). IEEE Computer Society: 46–52. doi:10.1109/mc.2006.101. S2CID 8399655.
  19. ^ Otey, Michael (22 March 2011). "Is the Cloud Really Just the Return of Mainframe Computing?". SQL Server Pro. Penton Media. Archived from the original on 3 December 2013. Retrieved 1 December 2013.
  20. ^ Barros, A. P.; Dumas, M. (2006). "The Rise of Web Service Ecosystems". IT Professional. 8 (5): 31. doi:10.1109/MITP.2006.123. S2CID 206469224.
  21. ^ Cardellini, V.; Colajanni, M.; Yu, P.S. (1999). "Dynamic load balancing on Web-server systems". IEEE Internet Computing. 3 (3). Institute of Electrical and Electronics Engineers (IEEE): 28–39. doi:10.1109/4236.769420. ISSN 1089-7801.
  22. ^ "What Is Load Balancing? How Load Balancers Work". NGINX. June 1, 2014. Retrieved January 21, 2020.
  23. ^ Alharbi, A.; Aljaedi, A. (2004). "Peer-to-Peer Network Security Issues and Analysis: Review". IJCSNS International Journal of Computer Science and Network Security. doi:10.1007/978-3-540-45172-3_6.
  24. ^ Rao, A.; Lakshminarayanan, K.; Surana, S.; Manning Karp, R. (2020). "Load Balancing in Structured P2P Systems". IJCSNS International Journal of Computer Science and Network Security. 20: 74–88.
  25. ^ Varma, Vasudeva (2009). "1: Software Architecture Primer". Software Architecture: A Case Based Approach. Delhi: Pearson Education India. p. 29. ISBN 9788131707494. Retrieved 2025-08-08. Distributed Peer-to-Peer Systems [...] This is a generic style of which popular styles are the client-server and master-slave styles.
照影是什么检查 十九畏是什么意思 梦见刨红薯是什么意思 出车前检查的目的是什么 房子风水主要看什么
天高云淡是什么季节 总出虚汗是什么原因 cbd什么意思 乳房疼痛应该挂什么科 火热是什么意思
瘪嘴是什么意思 红细胞压积偏低是什么意思 女人左下腹部疼痛什么原因 肩周炎用什么药好 孩子嗓子疼吃什么药
洋溢着什么样的笑容 lancome是什么牌子的 越南人说什么语言 恋足癖是什么意思 脑梗前有什么预兆
rt是什么hcv9jop7ns4r.cn 六味地黄丸起什么作用hcv7jop4ns7r.cn 额窦炎吃什么药效果好hcv8jop5ns3r.cn 初遇是什么意思hcv7jop9ns3r.cn 什么运动瘦肚子最快hcv8jop7ns0r.cn
胃主什么hcv8jop2ns8r.cn 心思重是什么意思aiwuzhiyu.com 怀孕16周要做什么检查hcv9jop0ns1r.cn 阳萎是什么意思hcv7jop5ns0r.cn 胃火吃什么药wzqsfys.com
八方来财是什么生肖hcv8jop2ns9r.cn 蜂蜜加柠檬有什么功效和作用hcv8jop6ns0r.cn 洋葱为什么会让人流泪hcv8jop2ns4r.cn 10个油是什么意思hcv9jop5ns0r.cn 脑电图异常是什么病hcv8jop3ns1r.cn
电脑为什么打不开hcv9jop2ns2r.cn 甲鱼吃什么hcv9jop4ns9r.cn 扁平疣是什么原因引起的hcv8jop3ns4r.cn 薄荷泡水喝有什么好处hcv9jop5ns4r.cn 一串什么hcv8jop1ns5r.cn
百度