口腔脱皮是什么原因引起的| 张学友属什么生肖| 属猪五行属什么| 陈小春什么星座| 什么是脑梗死| 无名指下面的竖线代表什么| 吃白糖有什么好处和坏处| 左侧卵巢无回声是什么意思| 龟头炎什么症状| 每天拉肚子是什么原因引起的| 搁浅了是什么意思| 内膜b型是什么意思啊| 赤脚走路有什么好处| 清歌是什么意思| 透骨草治什么病最有效| 机械表是什么意思| 为什么会得甲亢| 什么啊| 宫颈机能不全是什么意思| 12月14日是什么星座| 落户是什么意思| 鼻炎用什么药效果好| 郑州有什么好吃的| 诺如病毒吃什么药最有效| 78是什么意思| 象牙塔比喻什么| 梦到羊是什么意思| 盐水泡脚有什么好处| 属鸡的幸运色是什么颜色| 国药准字h代表什么| 胰腺炎吃什么药好| 什么烟好抽| 什么动听四字词语| 谨记是什么意思| 同性恋是什么| 狐臭是什么原因引起的| dpm值阳性什么意思| 切痣挂什么科| d是什么| 2019年是什么生肖| 忌出行是什么意思| 七月是什么生肖| 儿童多动症挂什么科| btob是什么意思| 冰箱保鲜室不制冷是什么原因| 丝棉是什么材料| 菠萝什么季节成熟| 痔疮吃什么| 助力车是什么车| 10月23号是什么星座| 惊奇地什么| 行政管理是做什么的| 能耐是什么意思| 5月出生是什么星座| zs是什么意思| 遐想的意思是什么| 尿肌酐低是什么原因| 喉炎吃什么药最有效| 频繁什么意思| 脾挂什么科| 胆红素高吃什么食物能降得快| 政五行属什么| 6月23号什么星座| 牙齿上有黑点是什么原因| 靠腰是什么意思| 飞机不能带什么| 口腔异味吃什么药| 特别提款权是什么意思| 曹操叫什么| 女人梦见烧纸什么预兆| 什么叫做基本工资| 蚊子不喜欢什么味道| 喝什么泡水降血压最好| 喜欢穿黑色衣服的女人是什么性格| 伏藏是什么意思| 二便是什么意思| 两会什么时候开| 扶他是什么意思| 猪八戒是什么佛| 琥珀是什么意思| 干湿分离什么意思| 病毒性感染是什么原因| 心律不齐吃什么药好| 窦性心动过缓吃什么药| 可定什么时间服用最好| 93年属什么的| 白细胞少什么原因| 这个是什么表情| 九月十七日是什么星座| 吃什么水果可以降火| 便溏是什么原因引起的| 什么是股癣| 遍布是什么意思| 咽炎吃什么药效果最好| 中班小朋友应该学什么| 什么叫便秘| 什么样的人能镇住凶宅| 开是什么生肖| 湿疹不能吃什么食物| 2010属什么| 慢性咽炎吃什么| 六味地黄丸有什么副作用| 脑梗吃什么药最好| 血脂高吃什么食物最好| 乙酉日五行属什么| 三花鱼是什么鱼| 借记卡是什么卡| 怕冷的人是什么原因| 男生适合学什么专业| 甲醛中毒挂什么科| 故意不接电话说明什么| 青钱柳有什么功效与作用| 什么病不能喝酒| 鬼针草有什么功效| 胎儿头位是什么意思| 甲胎蛋白什么意思| 美莎片是什么药| 骨量偏高代表什么意思| 尿电导率低是什么意思| 知柏地黄丸有什么功效| 光明会是什么组织| 耳朵红热是什么原因| 眩晕去医院挂什么科室| 女人吃藕有什么好处| 自缢什么意思| 麦芒是什么意思| 跌宕起伏什么意思| 内角是什么意思| 为什么一来月经就拉肚子| 增强免疫力吃什么| 支原体感染咳嗽吃什么药| 大学没毕业算什么学历| 日柱灾煞是什么意思| 总胆红素偏高是什么原因| 梦见雨伞是什么意思| 牡丹花是什么颜色| 阑尾炎打什么消炎针好| 为什么身上会长脂肪瘤| 蒙脱石是什么东西| 胆管炎吃什么药| btc是什么货币| 4月29是什么星座| 白内障的症状是什么| 水肿是什么症状| 丝鸟读什么| epl是什么意思| 妇科支原体感染吃什么药| 纤维瘤是什么| 什么是体制内| 长期口苦是什么原因| 女性做结扎手术对身体有什么危害| 耳聋吃什么药| 颈动脉斑块挂什么科| 烀是什么意思| 白茶泡出来是什么颜色| tvt是什么意思| 莘莘学子是什么意思| 尿盐结晶是什么意思| naco是什么牌子| 27属什么| 胆结石可以吃什么水果| 忐忑不安是什么意思| sco是什么意思| 遗传代谢病是什么意思| 阴道排气是什么原因| 做梦梦见钓鱼是什么意思| 为什么掉头发很厉害| 盲肠憩室是什么意思| 考科目二紧张吃什么药| 水里有什么| 上曼月乐环后要注意什么| 类风湿因子高说明什么| 嗓子哑是什么病的前兆| 怀孕什么东西不能吃| 眼睛红用什么眼药水| 什么是蜂胶| 付之东流是什么意思| 尿酸高是什么原因导致的| 今年78岁属什么生肖| 脚板麻木是什么原因| 备胎是什么意思| 白牡丹属于什么茶| 热玛吉是什么意思| 血糖有点高吃什么食物好| 蓝莓有什么营养价值| 拉肚子能吃什么| pt是什么单位| 脚指甲变白是什么原因| 糖浆是什么| 二重唱是什么意思| h2o是什么| 茹字五行属什么| premier是什么牌子| 男宝胶囊为什么不建议吃| 凉拌菜用什么醋好| 二垒是什么意思| 血压高吃什么药| 蒙古族的那达慕大会是在什么时候| 支教回来后有什么待遇| 大乌叶是什么茶| 子宫腺肌症是什么意思| 日本什么时候开始侵略中国| 什么是静息心率| 头总出汗是什么原因| 99年的兔是什么命| 什么茶减肥效果最好| 孩子贫血吃什么补血最快| 胸腔积液挂什么科| 女人右下巴有痣代表什么| e-mail什么意思| 备皮是什么意思| 促甲状腺激素偏低是什么意思| 十月十五号是什么星座| 什么是失信被执行人| 鱼油有什么副作用| amh是什么检查项目| 灰色t恤配什么颜色裤子| 搀扶是什么意思| 524是什么意思| 痤疮涂什么药膏| 60是什么意思| 早上八点是什么时辰| 炸毛是什么意思| 眼睑痉挛挂什么科| 1级高血压是什么意思| 卵巢增大是什么原因引起的| 什么是公主病| 什么是智齿牙| 艾滋病中期有什么症状| 一个木一个西读什么| 屋里喷什么消毒最好| 时来运转是什么生肖| 口腔溃疡是什么样子| 努力的意义是什么| AR什么意思| 脚后跟疼是什么情况| cafe是什么意思| 文爱 什么意思| 创伤急救的原则是什么| 胃一阵一阵的疼是什么原因| 便秘吃什么中药| 左侧小腹疼是什么原因| 公安和警察有什么区别| 肾炎吃什么食物好| 孤单是什么意思| 什么叫烟雾病| 主意正是什么意思| 转氨酶高吃什么食物降得快| 蝙蝠屎是什么中药| 移车打什么电话| 梦见买馒头是什么意思| 什么病会引起腰疼| 什么叫能量| 自愈是什么意思| 为什么月亮是红色的| 关节疼痛用什么药| 柳树代表什么生肖| 杀鸡给猴看什么意思| 甲钴胺片治什么病| 什么地唱歌| 脑白质稀疏什么意思| 煎服是什么意思| w代表什么意思| 刚愎自用代表什么生肖| 百度Jump to content

帶您走進2018年“國家賬本”

From Wikipedia, the free encyclopedia
(Redirected from Client-side)
A computer network diagram of clients communicating with a server via the Internet
百度 可能几句话能说清的事,他却说个没完没了;只是犯个小小的错误就被他喋喋不休;一说起退休前的那点儿事,他就根本停不下来……如果老人这样的唠叨曾经让你无法忍受,甚至厌烦,那么现在,你应该庆幸了,因为这充分说明,您家的老人心理健康、大脑灵活,并且因为这个爱唠叨的习惯,他还会比一般老人更长寿。

The client–server model is a distributed application structure that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients.[1] Often clients and servers communicate over a computer network on separate hardware, but both client and server may be on the same device. A server host runs one or more server programs, which share their resources with clients. A client usually does not share its computing resources, but it requests content or service from a server and may share its own content as part of the request. Clients, therefore, initiate communication sessions with servers, which await incoming requests. Examples of computer applications that use the client–server model are email, network printing, and the World Wide Web.

Client and server role

[edit]

The server component provides a function or service to one or many clients, which initiate requests for such services. Servers are classified by the services they provide. For example, a web server serves web pages and a file server serves computer files. A shared resource may be any of the server computer's software and electronic components, from programs and data to processors and storage devices. The sharing of resources of a server constitutes a service.

Whether a computer is a client, a server, or both, is determined by the nature of the application that requires the service functions. For example, a single computer can run a web server and file server software at the same time to serve different data to clients making different kinds of requests. The client software can also communicate with server software within the same computer.[2] Communication between servers, such as to synchronize data, is sometimes called inter-server or server-to-server communication.

Client and server communication

[edit]

Generally, a service is an abstraction of computer resources and a client does not have to be concerned with how the server performs while fulfilling the request and delivering the response. The client only has to understand the response based on the relevant application protocol, i.e. the content and the formatting of the data for the requested service.

Clients and servers exchange messages in a request–response messaging pattern. The client sends a request, and the server returns a response. This exchange of messages is an example of inter-process communication. To communicate, the computers must have a common language, and they must follow rules so that both the client and the server know what to expect. The language and rules of communication are defined in a communications protocol. All protocols operate in the application layer. The application layer protocol defines the basic patterns of the dialogue. To formalize the data exchange even further, the server may implement an application programming interface (API).[3] The API is an abstraction layer for accessing a service. By restricting communication to a specific content format, it facilitates parsing. By abstracting access, it facilitates cross-platform data exchange.[4]

A server may receive requests from many distinct clients in a short period. A computer can only perform a limited number of tasks at any moment, and relies on a scheduling system to prioritize incoming requests from clients to accommodate them. To prevent abuse and maximize availability, the server software may limit the availability to clients. Denial of service attacks are designed to exploit a server's obligation to process requests by overloading it with excessive request rates. Encryption should be applied if sensitive information is to be communicated between the client and the server.

Example

[edit]

When a bank customer accesses online banking services with a web browser (the client), the client initiates a request to the bank's web server. The customer's login credentials are compared against a database, and the webserver accesses that database server as a client. An application server interprets the returned data by applying the bank's business logic and provides the output to the webserver. Finally, the webserver returns the result to the client web browser for display.

In each step of this sequence of client–server message exchanges, a computer processes a request and returns data. This is the request-response messaging pattern. When all the requests are met, the sequence is complete.

This example illustrates a design pattern applicable to the client–server model: separation of concerns.

Server-side

[edit]

Server-side refers to programs and operations that run on the server. This is in contrast to client-side programs and operations which run on the client.

General concepts

[edit]

"Server-side software" refers to a computer application, such as a web server, that runs on remote server hardware, reachable from a user's local computer, smartphone, or other device.[5] Operations may be performed server-side because they require access to information or functionality that is not available on the client, or because performing such operations on the client side would be slow, unreliable, or insecure.

Client and server programs may be commonly available ones such as free or commercial web servers and web browsers, communicating with each other using standardized protocols. Or, programmers may write their own server, client, and communications protocol which can only be used with one another.

Server-side operations include both those that are carried out in response to client requests, and non-client-oriented operations such as maintenance tasks.[6][7]

Computer security

[edit]

In a computer security context, server-side vulnerabilities or attacks refer to those that occur on a server computer system, rather than on the client side, or in between the two. For example, an attacker might exploit an SQL injection vulnerability in a web application in order to maliciously change or gain unauthorized access to data in the server's database. Alternatively, an attacker might break into a server system using vulnerabilities in the underlying operating system and then be able to access database and other files in the same manner as authorized administrators of the server.[8][9][10]

Examples

[edit]

In the case of distributed computing projects such as SETI@home and the Great Internet Mersenne Prime Search, while the bulk of the operations occur on the client side, the servers are responsible for coordinating the clients, sending them data to analyze, receiving and storing results, providing reporting functionality to project administrators, etc. In the case of an Internet-dependent user application like Google Earth, while querying and display of map data takes place on the client side, the server is responsible for permanent storage of map data, resolving user queries into map data to be returned to the client, etc.

Web applications and services can be implemented in almost any language, as long as they can return data to standards-based web browsers (possibly via intermediary programs) in formats which they can use.

Client side

[edit]

Client-side refers to operations that are performed by the client in a computer network.

General concepts

[edit]

Typically, a client is a computer application, such as a web browser, that runs on a user's local computer, smartphone, or other device, and connects to a server as necessary. Operations may be performed client-side because they require access to information or functionality that is available on the client but not on the server, because the user needs to observe the operations or provide input, or because the server lacks the processing power to perform the operations in a timely manner for all of the clients it serves. Additionally, if operations can be performed by the client, without sending data over the network, they may take less time, use less bandwidth, and incur a lesser security risk.

When the server serves data in a commonly used manner, for example according to standard protocols such as HTTP or FTP, users may have their choice of a number of client programs (e.g. most modern web browsers can request and receive data using both HTTP and FTP). In the case of more specialized applications, programmers may write their own server, client, and communications protocol which can only be used with one another.

Programs that run on a user's local computer without ever sending or receiving data over a network are not considered clients, and so the operations of such programs would not be termed client-side operations.

Computer security

[edit]

In a computer security context, client-side vulnerabilities or attacks refer to those that occur on the client / user's computer system, rather than on the server side, or in between the two. As an example, if a server contained an encrypted file or message which could only be decrypted using a key housed on the user's computer system, a client-side attack would normally be an attacker's only opportunity to gain access to the decrypted contents. For instance, the attacker might cause malware to be installed on the client system, allowing the attacker to view the user's screen, record the user's keystrokes, and steal copies of the user's encryption keys, etc. Alternatively, an attacker might employ cross-site scripting vulnerabilities to execute malicious code on the client's system without needing to install any permanently resident malware.[8][9][10]

Examples

[edit]

Distributed computing projects such as SETI@home and the Great Internet Mersenne Prime Search, as well as Internet-dependent applications like Google Earth, rely primarily on client-side operations. They initiate a connection with the server (either in response to a user query, as with Google Earth, or in an automated fashion, as with SETI@home), and request some data. The server selects a data set (a server-side operation) and sends it back to the client. The client then analyzes the data (a client-side operation), and, when the analysis is complete, displays it to the user (as with Google Earth) and/or transmits the results of calculations back to the server (as with SETI@home).

Early history

[edit]

An early form of client–server architecture is remote job entry, dating at least to OS/360 (announced 1964), where the request was to run a job, and the response was the output.

While formulating the client–server model in the 1960s and 1970s, computer scientists building ARPANET (at the Stanford Research Institute) used the terms server-host (or serving host) and user-host (or using-host), and these appear in the early documents RFC 5[11] and RFC 4.[12] This usage was continued at Xerox PARC in the mid-1970s.

One context in which researchers used these terms was in the design of a computer network programming language called Decode-Encode Language (DEL).[11] The purpose of this language was to accept commands from one computer (the user-host), which would return status reports to the user as it encoded the commands in network packets. Another DEL-capable computer, the server-host, received the packets, decoded them, and returned formatted data to the user-host. A DEL program on the user-host received the results to present to the user. This is a client–server transaction. Development of DEL was just beginning in 1969, the year that the United States Department of Defense established ARPANET (predecessor of Internet).

Client-host and server-host

[edit]

Client-host and server-host have subtly different meanings than client and server. A host is any computer connected to a network. Whereas the words server and client may refer either to a computer or to a computer program, server-host and client-host always refer to computers. The host is a versatile, multifunction computer; clients and servers are just programs that run on a host. In the client–server model, a server is more likely to be devoted to the task of serving.

An early use of the word client occurs in "Separating Data from Function in a Distributed File System", a 1978 paper by Xerox PARC computer scientists Howard Sturgis, James Mitchell, and Jay Israel. The authors are careful to define the term for readers, and explain that they use it to distinguish between the user and the user's network node (the client).[13] By 1992, the word server had entered into general parlance.[14][15]

Centralized computing

[edit]

The client-server model does not dictate that server-hosts must have more resources than client-hosts. Rather, it enables any general-purpose computer to extend its capabilities by using the shared resources of other hosts. Centralized computing, however, specifically allocates a large number of resources to a small number of computers. The more computation is offloaded from client-hosts to the central computers, the simpler the client-hosts can be.[16] It relies heavily on network resources (servers and infrastructure) for computation and storage. A diskless node loads even its operating system from the network, and a computer terminal has no operating system at all; it is only an input/output interface to the server. In contrast, a rich client, such as a personal computer, has many resources and does not rely on a server for essential functions.

As microcomputers decreased in price and increased in power from the 1980s to the late 1990s, many organizations transitioned computation from centralized servers, such as mainframes and minicomputers, to rich clients.[17] This afforded greater, more individualized dominion over computer resources, but complicated information technology management.[16][18][19] During the 2000s, web applications matured enough to rival application software developed for a specific microarchitecture. This maturation, more affordable mass storage, and the advent of service-oriented architecture were among the factors that gave rise to the cloud computing trend of the 2010s.[20][failed verification]

Comparison with peer-to-peer architecture

[edit]

In addition to the client-server model, distributed computing applications often use the peer-to-peer (P2P) application architecture.

In the client-server model, the server is often designed to operate as a centralized system that serves many clients. The computing power, memory and storage requirements of a server must be scaled appropriately to the expected workload. Load-balancing and failover systems are often employed to scale the server beyond a single physical machine.[21][22]

Load balancing is defined as the methodical and efficient distribution of network or application traffic across multiple servers in a server farm. Each load balancer sits between client devices and backend servers, receiving and then distributing incoming requests to any available server capable of fulfilling them.

In a peer-to-peer network, two or more computers (peers) pool their resources and communicate in a decentralized system. Peers are coequal, or equipotent nodes in a non-hierarchical network. Unlike clients in a client-server or client-queue-client network, peers communicate with each other directly. [23] In peer-to-peer networking, an algorithm in the peer-to-peer communications protocol balances load, and even peers with modest resources can help to share the load.[24] If a node becomes unavailable, its shared resources remain available as long as other peers offer it. Ideally, a peer does not need to achieve high availability because other, redundant peers make up for any resource downtime; as the availability and load capacity of peers change, the protocol reroutes requests.

Both client-server and master-slave are regarded as sub-categories of distributed peer-to-peer systems.[25]

See also

[edit]

Notes

[edit]
  1. ^ "Distributed Application Architecture" (PDF). Sun Microsystem. Archived from the original (PDF) on 6 April 2011. Retrieved 2025-08-05.
  2. ^ The X Window System is one example.
  3. ^ Benatallah, B.; Casati, F.; Toumani, F. (2004). "Web service conversation modeling: A cornerstone for e-business automation". IEEE Internet Computing. 8: 46–54. doi:10.1109/MIC.2004.1260703. S2CID 8121624.
  4. ^ Dustdar, S.; Schreiner, W. (2005). "A survey on web services composition" (PDF). International Journal of Web and Grid Services. 1: 1. CiteSeerX 10.1.1.139.4827. doi:10.1504/IJWGS.2005.007545.
  5. ^ "What do client side and server side mean? Client side vs. server side". Cloudflare. Retrieved 17 April 2025.
  6. ^ "Introduction to the server side - Learn web development | MDN". developer.mozilla.org. 2025-08-05. Retrieved 2025-08-05.
  7. ^ "Server-side website programming - Learn web development | MDN". developer.mozilla.org. 2025-08-05. Retrieved 2025-08-05.
  8. ^ a b Lehtinen, Rick; Russell, Deborah; Gangemi, G. T. (2006). Computer Security Basics (2nd ed.). O'Reilly Media. ISBN 9780596006693. Retrieved 2025-08-05.
  9. ^ a b JS (2025-08-05). "Week 4: Is There a Difference between Client Side and Server Side?". n3tweb.wordpress.com. Retrieved 2025-08-05.
  10. ^ a b Espinosa, Christian (2025-08-05). "Decoding the Hack" (PDF). alpinesecurity.com. Retrieved 2025-08-05.[permanent dead link]
  11. ^ a b Rulifson, Jeff (June 1969). DEL. IETF. doi:10.17487/RFC0005. RFC 5. Retrieved 30 November 2013.
  12. ^ Shapiro, Elmer B. (March 1969). Network Timetable. IETF. doi:10.17487/RFC0004. RFC 4. Retrieved 30 November 2013.
  13. ^ Sturgis, Howard E.; Mitchell, James George; Israel, Jay E. (1978). "Separating Data from Function in a Distributed File System". Xerox PARC.
  14. ^ Harper, Douglas. "server". Online Etymology Dictionary. Retrieved 30 November 2013.
  15. ^ "Separating data from function in a distributed file system". GetInfo. German National Library of Science and Technology. Archived from the original on 2 December 2013. Retrieved 29 November 2013.
  16. ^ a b Nieh, Jason; Yang, S. Jae; Novik, Naomi (2000). "A Comparison of Thin-Client Computing Architectures". Academic Commons. doi:10.7916/D8Z329VF. Retrieved 28 November 2018.
  17. ^ d'Amore, M. J.; Oberst, D. J. (1983). "Microcomputers and mainframes". Proceedings of the 11th annual ACM SIGUCCS conference on User services - SIGUCCS '83. p. 7. doi:10.1145/800041.801417. ISBN 978-0897911160. S2CID 14248076.
  18. ^ Tolia, Niraj; Andersen, David G.; Satyanarayanan, M. (March 2006). "Quantifying Interactive User Experience on Thin Clients" (PDF). Computer. 39 (3). IEEE Computer Society: 46–52. doi:10.1109/mc.2006.101. S2CID 8399655.
  19. ^ Otey, Michael (22 March 2011). "Is the Cloud Really Just the Return of Mainframe Computing?". SQL Server Pro. Penton Media. Archived from the original on 3 December 2013. Retrieved 1 December 2013.
  20. ^ Barros, A. P.; Dumas, M. (2006). "The Rise of Web Service Ecosystems". IT Professional. 8 (5): 31. doi:10.1109/MITP.2006.123. S2CID 206469224.
  21. ^ Cardellini, V.; Colajanni, M.; Yu, P.S. (1999). "Dynamic load balancing on Web-server systems". IEEE Internet Computing. 3 (3). Institute of Electrical and Electronics Engineers (IEEE): 28–39. doi:10.1109/4236.769420. ISSN 1089-7801.
  22. ^ "What Is Load Balancing? How Load Balancers Work". NGINX. June 1, 2014. Retrieved January 21, 2020.
  23. ^ Alharbi, A.; Aljaedi, A. (2004). "Peer-to-Peer Network Security Issues and Analysis: Review". IJCSNS International Journal of Computer Science and Network Security. doi:10.1007/978-3-540-45172-3_6.
  24. ^ Rao, A.; Lakshminarayanan, K.; Surana, S.; Manning Karp, R. (2020). "Load Balancing in Structured P2P Systems". IJCSNS International Journal of Computer Science and Network Security. 20: 74–88.
  25. ^ Varma, Vasudeva (2009). "1: Software Architecture Primer". Software Architecture: A Case Based Approach. Delhi: Pearson Education India. p. 29. ISBN 9788131707494. Retrieved 2025-08-05. Distributed Peer-to-Peer Systems [...] This is a generic style of which popular styles are the client-server and master-slave styles.
生姜和红枣煮水喝有什么作用 望梅止渴的梅是什么梅 来姨妈不能吃什么 乳腺癌吃什么水果好 红枣有什么功效和作用
甲状腺球蛋白低是什么原因 0.5是什么意思 木耳菜又叫什么菜 菟丝子是什么 湿气重用什么泡脚最好
bun是什么意思 慢性浅表性胃炎吃什么药好 便宜的反义词是什么 白细胞高一点点是什么原因 月亮杯是什么东西
生化妊娠什么意思 眼压高是什么原因引起的 日成是什么字 兰花象征着什么 二月什么座
博士生导师是什么级别xjhesheng.com 春天都有什么花开hcv8jop1ns4r.cn 龙脉是什么意思hcv7jop9ns8r.cn 什么是肾癌hcv9jop6ns6r.cn 卧推100公斤什么水平gangsutong.com
连城诀为什么不火hcv9jop8ns0r.cn 胃病烧心吃什么药好hcv8jop1ns3r.cn 胎盘低置状态是什么意思hcv8jop0ns8r.cn 主动脉夹层是什么意思hcv9jop6ns0r.cn 睡觉起来眼皮肿是什么原因hcv8jop8ns6r.cn
胆结石可以吃什么水果cj623037.com 黄瓜为什么是苦的jasonfriends.com 什么病会引起腰疼wzqsfys.com 小孩老是打嗝是什么原因hcv8jop4ns6r.cn 女人更年期吃什么药hcv9jop8ns3r.cn
左室舒张功能减退是什么意思hcv7jop7ns3r.cn 吃花生有什么好处hcv8jop4ns6r.cn 斗地主是什么意思hcv8jop1ns4r.cn 高血压喝什么茶好hcv8jop7ns6r.cn 男生被口是什么感觉hcv9jop6ns9r.cn
百度