树脂是什么材质| 五月二十号是什么星座| 韩束属于什么档次| 什么的苹果| 琪是什么意思| 白菜属于什么科| 黄金微针是什么| 吃惊的什么| 拉肚子可以吃什么菜| 胃溃疡可以吃什么水果| 红斑狼疮吃什么药| 畏首畏尾是什么意思| 健忘是什么意思| 小炒肉用什么肉| 什么的寒风| 蒜苗炒什么好吃| 仰角是什么意思| 唉什么意思| 长期喝枸杞水有什么好处和坏处| 什么农药最毒| 九死一生什么意思| hairy什么意思| 高血压用什么药最好| 监视居住是什么意思| 氟哌酸又叫什么名字| 心里恶心是什么原因| 距骨在什么位置| 补充电解质是什么意思| 脾胃虚寒是什么症状| 郡主是什么身份| 把脉把的是什么脉| 过期牛奶可以做什么| 泻立停又叫什么名字| 怀孕了吃什么药可以打掉| 爱什么分明| 308什么意思| 樱桃跟车厘子有什么区别| 什么食物含有维生素d| 水瓶男和什么星座最配| 水痘开始痒了说明什么| 狗皮膏药什么意思| 吃什么食物能养肝护肝| bpm是什么单位| 老虎五行属什么| 腼腆什么意思| 荨麻疹可以吃什么水果| 霉菌有什么症状| 怀孕初期吃什么| 出家人不打诳语是什么意思| 做梦翻车了什么预兆| 2月18日是什么星座| 门道是什么意思| 株连九族是什么意思| 冰箱冷藏室结冰是什么原因| rps是什么| 毛爷爷是什么意思| 槟榔是什么东西| 脾胃不好吃什么药| 汗是什么味道| 名媛什么意思| 七夕之夜是什么生肖| 安属于五行属什么| 亚急性甲状腺炎吃什么药| 心电图显示窦性心律是什么意思| 身体缺钾吃什么药| 猪身上红疙瘩用什么药| 糖化是什么意思| 海参几头是什么意思| 黑茶金花是什么菌| 7.7是什么星座| 什么叫周围神经病| 服兵役是什么意思| aj是什么| 铁棍山药和普通山药有什么区别| 间接胆红素偏高是什么原因| 桑榆是什么意思| 十月二十六是什么星座| 投诉医生打什么电话| 桎梏是什么意思| 知了猴是什么东西| 400年前是什么朝代| 明天属相是什么生肖| 口缘字一半念什么| 突然低血压是什么原因造成的| 什么是溶血性疾病| 油嘴滑舌指什么生肖| 儿童身高矮小挂什么科| 换床有什么讲究| 身强力壮是什么生肖| 火供是什么意思| 打狗看主人打虎看什么答案| 委屈是什么意思| adh医学上是什么意思| 什么是麦粒肿| 早上吃什么减肥| 什么的树枝| 治疗胃反酸烧心用什么药最好| 快递已揽件是什么意思| 梅毒阳性是什么意思| 俊五行属性是什么| 天津古代叫什么| 辰砂和朱砂有什么区别| 猫咪为什么害怕黄瓜| 智齿为什么会横着长| 地中海贫血有什么症状| 该说不说的是什么意思| sls是什么化学成分| 脖子上为什么会长丝状疣| 文化底蕴是什么意思| 贾字五行属什么| 抖阴是什么| 治疗灰指甲用什么药| 什么行业最赚钱投资小| 黑脸娃娃有什么功效| 1995年属什么生肖| 喜鹊进家有什么预兆| 医生助理是做什么的| 胆气不足吃什么中成药| 妥瑞氏症是什么病| 黄豆吃多了有什么坏处| 孔子名叫什么| 艾草长什么样子图片| mophie是什么牌子| 张飞的武器是什么| 白面是什么| 扶她是什么| 中国信仰什么教| 迷离的眼神什么意思| 高烧吃什么药| 命犯桃花是什么意思| 东山再起是什么意思| 夏天是什么时候| 女生排卵期是什么时候| 豚鼠吃什么| 艾滋病初期有什么症状| 补牙挂什么科| 情绪是什么| 木志读什么| 预防感冒吃什么药| 荔枝什么时候过季| 怀孕早期需要注意什么| 脑多普勒检查什么| 拉杆箱什么材质好| 11月29号什么星座| bug是什么意思网络用语| 头晕是什么感觉| 出栏是什么意思| 香瓜不能和什么一起吃| 钱学森发明了什么| 国家安全法属于什么法| 贵人多忘事什么意思| 股市pe是什么意思| 观察是什么意思| 皮肤黑适合穿什么颜色的衣服| 01年属蛇的是什么命| 什么是铅中毒| 万里长城是什么生肖| 逃出生天什么意思| 露酒是什么| 六畜大宝在农家是什么生肖| haze是什么意思| 梦见打碎碗是什么预兆| 小马是什么牌子| 伊朗是什么教派| 三花五罗都是什么鱼| 淋巴结肿大用什么药| 梦见下大雨是什么征兆| 为什么不要看电焊火花| 黄芪起什么作用| 一个王一个月念什么| 卡密什么意思| 十指连心是什么意思| 瑗是什么意思| 公务员是做什么的| 球蛋白是什么| 元辰是什么意思| 天衣无缝什么意思| 阴茎瘙痒是什么原因| 什么时候开始胎教| 子宫小有什么影响| 靥是什么意思| 终其一生下一句是什么| 什么是hpv病毒| 昆仑玉是什么玉| 兰州人为什么要戴头巾| 为什么会血热| 自行是什么意思| 收官之作什么意思| 号召是什么意思| 小厨宝是什么| 尿急是什么症状| 什么是碱| 五台山是求什么的| 慢性宫颈炎吃什么药| 吃什么拉什么完全不能消化怎么办| 戊肝抗体igg阳性是什么意思| 小孩子坐飞机需要什么证件| 丧偶式婚姻是什么意思| 胃炎吃什么最好| 纤维蛋白原偏低吃什么| 为什么要吃叶酸| 痰栓是什么意思| 孩子流黄鼻涕吃什么药效果好| 眼睛发黄什么原因| 天花是什么病| 姑奶奶是什么意思| 1210是什么星座| 双鱼座有什么特点| 爱情是什么样| 钩藤为什么要后下| 法式刘海适合什么脸型| 肺部积液吃什么药| 24岁属什么生肖| 天加一笔变成什么字| 三个十念什么| 小孩疝气是什么症状| 看病人送什么花| 打喷嚏漏尿是什么原因| 美国是什么洲| 一节黑一节白是什么蛇| 什么是等位基因| 哺乳期抽烟对宝宝有什么影响| 龙头烤是什么鱼| 腐竹是什么| 想当演员考什么学校| 车前草有什么作用| 肚脐眼发炎是什么原因| 晚上7点到9点是什么时辰| 为什么会血压低| 8月30号是什么星座| 嫡长子是什么意思| 今晚吃什么家常菜| 染色体是什么意思| 四大是什么| 晚上吃什么减肥效果最好| 包皮长什么样| 双鱼座的幸运石是什么| 刻意是什么意思| 耍宝是什么意思| 维生素k2是什么| 女人的第二张脸是什么| 1月3日是什么星座| 韩世忠为什么不救岳飞| 吃薄荷叶有什么好处和坏处| 高考450分能上什么学校| 铅华是什么意思| 出虚汗吃什么药| 七月十五有什么禁忌| 为什么会脑梗| 催乳素是什么| 全身冰凉是什么原因| 钙化是什么意思啊| borel手表是什么牌子| 肠息肉吃什么药| 水痘疫苗第二针什么时候打| 呆萌是什么意思| 内裤上有黄色分泌物是什么原因| 肺部结节是什么意思啊| 周朝之后是什么朝代| 福祉是什么意思| 七月份适合种什么蔬菜| 孕早期有什么症状| 怀孕牙龈出血是什么原因| 3月27日什么星座| 百度Jump to content

医学领域获2016年度国家科学技术奖励33项大奖

From Wikipedia, the free encyclopedia
(Redirected from Server-side)
A computer network diagram of clients communicating with a server via the Internet
百度 该部丛书,历时十载,共计16卷、39册,近1500万字、2万图版,是中国现代艺术教育史上最大规模的一次学术梳理,也是中国美术出版史上最具研究性的学术工程。

The client–server model is a distributed application structure that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients.[1] Often clients and servers communicate over a computer network on separate hardware, but both client and server may be on the same device. A server host runs one or more server programs, which share their resources with clients. A client usually does not share its computing resources, but it requests content or service from a server and may share its own content as part of the request. Clients, therefore, initiate communication sessions with servers, which await incoming requests. Examples of computer applications that use the client–server model are email, network printing, and the World Wide Web.

Client and server role

[edit]

The server component provides a function or service to one or many clients, which initiate requests for such services. Servers are classified by the services they provide. For example, a web server serves web pages and a file server serves computer files. A shared resource may be any of the server computer's software and electronic components, from programs and data to processors and storage devices. The sharing of resources of a server constitutes a service.

Whether a computer is a client, a server, or both, is determined by the nature of the application that requires the service functions. For example, a single computer can run a web server and file server software at the same time to serve different data to clients making different kinds of requests. The client software can also communicate with server software within the same computer.[2] Communication between servers, such as to synchronize data, is sometimes called inter-server or server-to-server communication.

Client and server communication

[edit]

Generally, a service is an abstraction of computer resources and a client does not have to be concerned with how the server performs while fulfilling the request and delivering the response. The client only has to understand the response based on the relevant application protocol, i.e. the content and the formatting of the data for the requested service.

Clients and servers exchange messages in a request–response messaging pattern. The client sends a request, and the server returns a response. This exchange of messages is an example of inter-process communication. To communicate, the computers must have a common language, and they must follow rules so that both the client and the server know what to expect. The language and rules of communication are defined in a communications protocol. All protocols operate in the application layer. The application layer protocol defines the basic patterns of the dialogue. To formalize the data exchange even further, the server may implement an application programming interface (API).[3] The API is an abstraction layer for accessing a service. By restricting communication to a specific content format, it facilitates parsing. By abstracting access, it facilitates cross-platform data exchange.[4]

A server may receive requests from many distinct clients in a short period. A computer can only perform a limited number of tasks at any moment, and relies on a scheduling system to prioritize incoming requests from clients to accommodate them. To prevent abuse and maximize availability, the server software may limit the availability to clients. Denial of service attacks are designed to exploit a server's obligation to process requests by overloading it with excessive request rates. Encryption should be applied if sensitive information is to be communicated between the client and the server.

Example

[edit]

When a bank customer accesses online banking services with a web browser (the client), the client initiates a request to the bank's web server. The customer's login credentials are compared against a database, and the webserver accesses that database server as a client. An application server interprets the returned data by applying the bank's business logic and provides the output to the webserver. Finally, the webserver returns the result to the client web browser for display.

In each step of this sequence of client–server message exchanges, a computer processes a request and returns data. This is the request-response messaging pattern. When all the requests are met, the sequence is complete.

This example illustrates a design pattern applicable to the client–server model: separation of concerns.

Server-side

[edit]

Server-side refers to programs and operations that run on the server. This is in contrast to client-side programs and operations which run on the client.

General concepts

[edit]

"Server-side software" refers to a computer application, such as a web server, that runs on remote server hardware, reachable from a user's local computer, smartphone, or other device.[5] Operations may be performed server-side because they require access to information or functionality that is not available on the client, or because performing such operations on the client side would be slow, unreliable, or insecure.

Client and server programs may be commonly available ones such as free or commercial web servers and web browsers, communicating with each other using standardized protocols. Or, programmers may write their own server, client, and communications protocol which can only be used with one another.

Server-side operations include both those that are carried out in response to client requests, and non-client-oriented operations such as maintenance tasks.[6][7]

Computer security

[edit]

In a computer security context, server-side vulnerabilities or attacks refer to those that occur on a server computer system, rather than on the client side, or in between the two. For example, an attacker might exploit an SQL injection vulnerability in a web application in order to maliciously change or gain unauthorized access to data in the server's database. Alternatively, an attacker might break into a server system using vulnerabilities in the underlying operating system and then be able to access database and other files in the same manner as authorized administrators of the server.[8][9][10]

Examples

[edit]

In the case of distributed computing projects such as SETI@home and the Great Internet Mersenne Prime Search, while the bulk of the operations occur on the client side, the servers are responsible for coordinating the clients, sending them data to analyze, receiving and storing results, providing reporting functionality to project administrators, etc. In the case of an Internet-dependent user application like Google Earth, while querying and display of map data takes place on the client side, the server is responsible for permanent storage of map data, resolving user queries into map data to be returned to the client, etc.

Web applications and services can be implemented in almost any language, as long as they can return data to standards-based web browsers (possibly via intermediary programs) in formats which they can use.

Client side

[edit]

Client-side refers to operations that are performed by the client in a computer network.

General concepts

[edit]

Typically, a client is a computer application, such as a web browser, that runs on a user's local computer, smartphone, or other device, and connects to a server as necessary. Operations may be performed client-side because they require access to information or functionality that is available on the client but not on the server, because the user needs to observe the operations or provide input, or because the server lacks the processing power to perform the operations in a timely manner for all of the clients it serves. Additionally, if operations can be performed by the client, without sending data over the network, they may take less time, use less bandwidth, and incur a lesser security risk.

When the server serves data in a commonly used manner, for example according to standard protocols such as HTTP or FTP, users may have their choice of a number of client programs (e.g. most modern web browsers can request and receive data using both HTTP and FTP). In the case of more specialized applications, programmers may write their own server, client, and communications protocol which can only be used with one another.

Programs that run on a user's local computer without ever sending or receiving data over a network are not considered clients, and so the operations of such programs would not be termed client-side operations.

Computer security

[edit]

In a computer security context, client-side vulnerabilities or attacks refer to those that occur on the client / user's computer system, rather than on the server side, or in between the two. As an example, if a server contained an encrypted file or message which could only be decrypted using a key housed on the user's computer system, a client-side attack would normally be an attacker's only opportunity to gain access to the decrypted contents. For instance, the attacker might cause malware to be installed on the client system, allowing the attacker to view the user's screen, record the user's keystrokes, and steal copies of the user's encryption keys, etc. Alternatively, an attacker might employ cross-site scripting vulnerabilities to execute malicious code on the client's system without needing to install any permanently resident malware.[8][9][10]

Examples

[edit]

Distributed computing projects such as SETI@home and the Great Internet Mersenne Prime Search, as well as Internet-dependent applications like Google Earth, rely primarily on client-side operations. They initiate a connection with the server (either in response to a user query, as with Google Earth, or in an automated fashion, as with SETI@home), and request some data. The server selects a data set (a server-side operation) and sends it back to the client. The client then analyzes the data (a client-side operation), and, when the analysis is complete, displays it to the user (as with Google Earth) and/or transmits the results of calculations back to the server (as with SETI@home).

Early history

[edit]

An early form of client–server architecture is remote job entry, dating at least to OS/360 (announced 1964), where the request was to run a job, and the response was the output.

While formulating the client–server model in the 1960s and 1970s, computer scientists building ARPANET (at the Stanford Research Institute) used the terms server-host (or serving host) and user-host (or using-host), and these appear in the early documents RFC 5[11] and RFC 4.[12] This usage was continued at Xerox PARC in the mid-1970s.

One context in which researchers used these terms was in the design of a computer network programming language called Decode-Encode Language (DEL).[11] The purpose of this language was to accept commands from one computer (the user-host), which would return status reports to the user as it encoded the commands in network packets. Another DEL-capable computer, the server-host, received the packets, decoded them, and returned formatted data to the user-host. A DEL program on the user-host received the results to present to the user. This is a client–server transaction. Development of DEL was just beginning in 1969, the year that the United States Department of Defense established ARPANET (predecessor of Internet).

Client-host and server-host

[edit]

Client-host and server-host have subtly different meanings than client and server. A host is any computer connected to a network. Whereas the words server and client may refer either to a computer or to a computer program, server-host and client-host always refer to computers. The host is a versatile, multifunction computer; clients and servers are just programs that run on a host. In the client–server model, a server is more likely to be devoted to the task of serving.

An early use of the word client occurs in "Separating Data from Function in a Distributed File System", a 1978 paper by Xerox PARC computer scientists Howard Sturgis, James Mitchell, and Jay Israel. The authors are careful to define the term for readers, and explain that they use it to distinguish between the user and the user's network node (the client).[13] By 1992, the word server had entered into general parlance.[14][15]

Centralized computing

[edit]

The client-server model does not dictate that server-hosts must have more resources than client-hosts. Rather, it enables any general-purpose computer to extend its capabilities by using the shared resources of other hosts. Centralized computing, however, specifically allocates a large number of resources to a small number of computers. The more computation is offloaded from client-hosts to the central computers, the simpler the client-hosts can be.[16] It relies heavily on network resources (servers and infrastructure) for computation and storage. A diskless node loads even its operating system from the network, and a computer terminal has no operating system at all; it is only an input/output interface to the server. In contrast, a rich client, such as a personal computer, has many resources and does not rely on a server for essential functions.

As microcomputers decreased in price and increased in power from the 1980s to the late 1990s, many organizations transitioned computation from centralized servers, such as mainframes and minicomputers, to rich clients.[17] This afforded greater, more individualized dominion over computer resources, but complicated information technology management.[16][18][19] During the 2000s, web applications matured enough to rival application software developed for a specific microarchitecture. This maturation, more affordable mass storage, and the advent of service-oriented architecture were among the factors that gave rise to the cloud computing trend of the 2010s.[20][failed verification]

Comparison with peer-to-peer architecture

[edit]

In addition to the client-server model, distributed computing applications often use the peer-to-peer (P2P) application architecture.

In the client-server model, the server is often designed to operate as a centralized system that serves many clients. The computing power, memory and storage requirements of a server must be scaled appropriately to the expected workload. Load-balancing and failover systems are often employed to scale the server beyond a single physical machine.[21][22]

Load balancing is defined as the methodical and efficient distribution of network or application traffic across multiple servers in a server farm. Each load balancer sits between client devices and backend servers, receiving and then distributing incoming requests to any available server capable of fulfilling them.

In a peer-to-peer network, two or more computers (peers) pool their resources and communicate in a decentralized system. Peers are coequal, or equipotent nodes in a non-hierarchical network. Unlike clients in a client-server or client-queue-client network, peers communicate with each other directly. [23] In peer-to-peer networking, an algorithm in the peer-to-peer communications protocol balances load, and even peers with modest resources can help to share the load.[24] If a node becomes unavailable, its shared resources remain available as long as other peers offer it. Ideally, a peer does not need to achieve high availability because other, redundant peers make up for any resource downtime; as the availability and load capacity of peers change, the protocol reroutes requests.

Both client-server and master-slave are regarded as sub-categories of distributed peer-to-peer systems.[25]

See also

[edit]

Notes

[edit]
  1. ^ "Distributed Application Architecture" (PDF). Sun Microsystem. Archived from the original (PDF) on 6 April 2011. Retrieved 2025-08-05.
  2. ^ The X Window System is one example.
  3. ^ Benatallah, B.; Casati, F.; Toumani, F. (2004). "Web service conversation modeling: A cornerstone for e-business automation". IEEE Internet Computing. 8: 46–54. doi:10.1109/MIC.2004.1260703. S2CID 8121624.
  4. ^ Dustdar, S.; Schreiner, W. (2005). "A survey on web services composition" (PDF). International Journal of Web and Grid Services. 1: 1. CiteSeerX 10.1.1.139.4827. doi:10.1504/IJWGS.2005.007545.
  5. ^ "What do client side and server side mean? Client side vs. server side". Cloudflare. Retrieved 17 April 2025.
  6. ^ "Introduction to the server side - Learn web development | MDN". developer.mozilla.org. 2025-08-05. Retrieved 2025-08-05.
  7. ^ "Server-side website programming - Learn web development | MDN". developer.mozilla.org. 2025-08-05. Retrieved 2025-08-05.
  8. ^ a b Lehtinen, Rick; Russell, Deborah; Gangemi, G. T. (2006). Computer Security Basics (2nd ed.). O'Reilly Media. ISBN 9780596006693. Retrieved 2025-08-05.
  9. ^ a b JS (2025-08-05). "Week 4: Is There a Difference between Client Side and Server Side?". n3tweb.wordpress.com. Retrieved 2025-08-05.
  10. ^ a b Espinosa, Christian (2025-08-05). "Decoding the Hack" (PDF). alpinesecurity.com. Retrieved 2025-08-05.[permanent dead link]
  11. ^ a b Rulifson, Jeff (June 1969). DEL. IETF. doi:10.17487/RFC0005. RFC 5. Retrieved 30 November 2013.
  12. ^ Shapiro, Elmer B. (March 1969). Network Timetable. IETF. doi:10.17487/RFC0004. RFC 4. Retrieved 30 November 2013.
  13. ^ Sturgis, Howard E.; Mitchell, James George; Israel, Jay E. (1978). "Separating Data from Function in a Distributed File System". Xerox PARC.
  14. ^ Harper, Douglas. "server". Online Etymology Dictionary. Retrieved 30 November 2013.
  15. ^ "Separating data from function in a distributed file system". GetInfo. German National Library of Science and Technology. Archived from the original on 2 December 2013. Retrieved 29 November 2013.
  16. ^ a b Nieh, Jason; Yang, S. Jae; Novik, Naomi (2000). "A Comparison of Thin-Client Computing Architectures". Academic Commons. doi:10.7916/D8Z329VF. Retrieved 28 November 2018.
  17. ^ d'Amore, M. J.; Oberst, D. J. (1983). "Microcomputers and mainframes". Proceedings of the 11th annual ACM SIGUCCS conference on User services - SIGUCCS '83. p. 7. doi:10.1145/800041.801417. ISBN 978-0897911160. S2CID 14248076.
  18. ^ Tolia, Niraj; Andersen, David G.; Satyanarayanan, M. (March 2006). "Quantifying Interactive User Experience on Thin Clients" (PDF). Computer. 39 (3). IEEE Computer Society: 46–52. doi:10.1109/mc.2006.101. S2CID 8399655.
  19. ^ Otey, Michael (22 March 2011). "Is the Cloud Really Just the Return of Mainframe Computing?". SQL Server Pro. Penton Media. Archived from the original on 3 December 2013. Retrieved 1 December 2013.
  20. ^ Barros, A. P.; Dumas, M. (2006). "The Rise of Web Service Ecosystems". IT Professional. 8 (5): 31. doi:10.1109/MITP.2006.123. S2CID 206469224.
  21. ^ Cardellini, V.; Colajanni, M.; Yu, P.S. (1999). "Dynamic load balancing on Web-server systems". IEEE Internet Computing. 3 (3). Institute of Electrical and Electronics Engineers (IEEE): 28–39. doi:10.1109/4236.769420. ISSN 1089-7801.
  22. ^ "What Is Load Balancing? How Load Balancers Work". NGINX. June 1, 2014. Retrieved January 21, 2020.
  23. ^ Alharbi, A.; Aljaedi, A. (2004). "Peer-to-Peer Network Security Issues and Analysis: Review". IJCSNS International Journal of Computer Science and Network Security. doi:10.1007/978-3-540-45172-3_6.
  24. ^ Rao, A.; Lakshminarayanan, K.; Surana, S.; Manning Karp, R. (2020). "Load Balancing in Structured P2P Systems". IJCSNS International Journal of Computer Science and Network Security. 20: 74–88.
  25. ^ Varma, Vasudeva (2009). "1: Software Architecture Primer". Software Architecture: A Case Based Approach. Delhi: Pearson Education India. p. 29. ISBN 9788131707494. Retrieved 2025-08-05. Distributed Peer-to-Peer Systems [...] This is a generic style of which popular styles are the client-server and master-slave styles.
腹膜透析是什么意思 据点是什么意思 早茶是什么意思 晚上睡觉脚底发热是什么原因 门良念什么
7月28号是什么星座 颤栗是什么意思 妊娠纹是什么 扁桃体发炎不能吃什么东西 羊是什么结构的字
托帕石是什么 四叶草是什么牌子 肥皂是什么做的 bf是什么 古代女子成年行什么礼
石蜡是什么东西 小鸡啄米什么意思 灵芝泡水喝有什么好处 包皮手术挂什么科 经常放屁是什么问题
7月28号是什么星座hcv9jop1ns0r.cn 为什么老是想睡觉hcv9jop4ns5r.cn 甲减是一种什么病hanqikai.com 肌酸什么时候喝比较好hcv7jop9ns7r.cn 室性早搏吃什么药最好hcv8jop1ns3r.cn
什么晚霜比较好用hcv8jop1ns2r.cn 田七和三七有什么区别hcv8jop6ns4r.cn 偶发室上性早搏是什么意思hcv9jop0ns0r.cn 舌苔发黄是什么原因引起的hcv7jop5ns4r.cn 一个口一个坐念什么jinxinzhichuang.com
胸口疼是什么原因hcv8jop4ns9r.cn 怀孕养狗对胎儿有什么影响hcv7jop9ns6r.cn 尿白细胞加减什么意思hcv7jop5ns5r.cn 手心发热是什么原因hcv9jop4ns8r.cn 制片人是什么意思hcv7jop9ns3r.cn
鸡吃什么长得又快又肥0735v.com 广东有什么城市hcv8jop4ns4r.cn hcg是什么hcv9jop6ns0r.cn 珍珠母贝是什么东西hcv8jop2ns5r.cn 果可以加什么偏旁hcv7jop5ns6r.cn
百度