脚痛是什么原因| 花椒吃多了对身体有什么影响| 虾腹部的黑线是什么| 杭州吃什么| cg动画是什么意思| 固涩是什么意思| 宫保鸡丁宫保是指什么| 草木皆兵指什么生肖| 黑棕色是什么颜色| 尿常规白细胞高是什么原因| 早上起来有痰是什么原因| 什么人不能吃玉米| 呆若木鸡的意思是什么| 气滞血瘀吃什么食物好| hvp是什么| 合肥有什么特产| 平方和是什么| 为什么乳头会痛| 太阳线是什么意思| 什么病会通过唾液传播| 神经病是什么意思| 人为什么会衰老| 93年属什么的生肖| 头发突然秃了一块是什么原因| 喉炎用什么药| 心脏不舒服看什么科室| 滚去掉三点水念什么| 金脸银脸代表什么人物| 小孩热感冒吃什么药好| 耳石症吃什么药最好| 尿素肌酐高是什么原因| 受割礼是什么意思| 镜检红细胞是什么意思| cd ts 什么意思| 绿色加什么颜色是蓝色| 玺是什么意思| 财星是什么意思| 什么是宫刑| 白羊座男生喜欢什么样的女生| 达英35是什么药| 欣是什么意思| 奥特莱斯是什么店| 便民门诊是做什么的| 经常玩手机有什么危害| 养精蓄锐是什么意思| 身上发冷是什么原因| 治飞蚊症用什么眼药水| 男性尿路感染有什么症状| 色纸是什么| 男士内裤买什么牌子好| 过敏性紫癜是什么病| 荨麻疹吃什么药好得快| 肾综合征是什么病严重吗| 肝内高回声是什么意思| 6月20日什么星座| 探望产妇带什么礼物好| 力所能及什么意思| 大暑什么时候| 赵云字什么| 梦见白萝卜是什么意思| 为什么减肥一直减不下来| 土乞念什么| 泼皮是什么意思| 蜂王浆是什么味道| gfr医学上是什么意思| 做梦梦到剪头发是什么意思| 雌蕊由什么组成| 为什么一动就满头大汗| u是什么单位| 今天穿什么衣服合适| 姐姐的婆婆叫什么| 执子之手与子偕老是什么意思| 有胃病的人吃什么最养胃| 七星伴月是什么意思| acg文化是什么意思| 打鼾是什么原因导致的| 真露兑什么好喝| 美食家是什么意思| 心脏肿大是什么原因| 姿态是什么意思| 过堂是什么意思| 富屋贫人是什么意思| 杞人忧天是什么意思| 尿不净是什么原因| 有腿毛的男人说明什么| 红色爱心是什么牌子| 坐飞机需要什么证件| 舌中间有裂纹是什么原因| 谨记是什么意思| 属猴的跟什么属相最配| 什么叫生化| 蛇怕什么家禽| 腺样体肥大是什么意思| 夏天适合种什么植物| 全身性疾病是什么意思| 233是什么意思| 膀胱不充盈什么意思| 思伤脾是什么意思| 女人梦见虫子什么预兆| jacquemus是什么牌子| 什么是糖化血红蛋白| 突然低血压是什么原因造成的| 心发慌是什么原因| 爸爸的爸爸叫什么| 嗓子突然哑了是什么原因引起的| 眼睛痛是什么病| 宝宝胎动频繁说明什么| 什么是六爻| 鲽鱼是什么鱼| 结扎什么意思| 倒置是什么意思| 骨头坏死是什么感觉| 物以类聚人以群分什么意思| 紫涵女装属于什么档次| 什么鱼最好吃| 逼格什么意思| 病灶是什么意思| 胆囊结石会引起身体什么症状| 什么颜色衣服最防晒| 盐和醋泡脚有什么好处| 精液是什么形成的| 吃什么消除肺部结节| 麻薯是什么| 锦鲤跳缸是什么原因| fci是什么意思| 也字少一竖念什么| 茗茶是什么茶| 清末民初是什么时候| 天秤女喜欢什么样的男生| 鼠的五行属什么| 脸部痤疮用什么药| 明胶是什么做的| 思钱想厚什么意思| csk是什么品牌| 自愿离婚要带什么证件| 负离子是什么东西| 微醺是什么状态| 喝什么水减肥最快| 牛油果对身体有什么好处| eason是什么意思| 什么是庚日| 心与什么相表里| 审计署是什么级别| 什么时候恢复高考| 青光眼有什么症状| 每天吃一个鸡蛋有什么好处| 胯骨在什么位置图片| 尿比重是什么| 核医学科主要治什么病| 什么是甲沟炎| 神经炎是什么症状| 鳗鱼吃什么食物| 22年属什么生肖| 经期头疼是什么原因怎么办| 佛家思想的核心是什么| 脸色发红什么原因| 打狂犬疫苗后注意什么| 心肌炎什么症状| 善字五行属什么| 游离脂肪酸是什么| 孕妇梦见别人怀孕是什么意思| 是什么拼音| 送行是什么意思| 尿里面有血是什么原因| 姑姑的弟弟叫什么| 银杏叶是什么颜色| 耳鸣是什么原因引起的嗡嗡的响| 马跟什么生肖最配| 脑梗吃什么最好| 电视黑屏是什么原因| 贝字旁的字和什么有关| 柠檬不能和什么一起吃| 超声波是什么| 1983属什么| 什么能让虱子卵脱落| 眼睛经常长麦粒肿是什么原因| 梦见男朋友出轨了是什么意思| 脑梗挂什么科室| 中秋节送什么好| 聚聚什么意思| 咽炎咳嗽吃什么药| 宫腔粘连有什么症状| 憩息是什么意思| 什么时候怀孕几率高| 三纲指的是什么| 江郎才尽是什么意思| 小便赤黄是什么原因| 割包皮看什么科| 什么是臆想症| 镜花缘是什么意思| ems是什么| 眼睛红血丝多是什么原因| 眼皮发肿是什么原因| 月老叫什么名字| 牛鬼蛇神指什么生肖| 木棉花的花语是什么| 郑中基为什么娶余思敏| 耳鸣吃什么药好| 晚上睡觉腿抽筋是什么原因| 糖尿病患者主食应该吃什么| 活珠子是什么| 泌乳素高是什么原因引起的| 痔疮吃什么消炎药最好| 痣为什么会越来越多| 嘴唇淡紫色是什么原因| 上海副市长什么级别| 突然长胖很多是什么原因| 什么叫cta检查| 气泡水是什么| 黄体功能不全是什么意思| 嗯哼是什么意思| 太阳穴疼痛是什么原因| 舌苔黄腻厚是什么原因| 什么的小花| 皮肤黄什么原因| 加盟什么品牌好| 脚为什么会肿| 淋巴滤泡增生是什么意思严重吗| 为什么会肛裂| 鱼是什么意思| 昱念什么| 过期牛奶有什么用途| 什么手机有红外线功能| 尿里有潜血是什么原因| 人参归脾丸适合什么人吃| 放屁多是什么病的征兆| mt是什么| 96年的属什么| 农历11月11日是什么星座| 姓薄的读音是什么| 东道主是什么意思| 小孩晚上磨牙是什么原因引起的| 分泌性中耳炎吃什么药| 尿失禁是什么意思| 前列腺钙化有什么症状| notice是什么意思| 7月22号是什么日子| 湿热体质适合喝什么茶| 扁桃体切除有什么坏处| 古埃及是什么人种| ex什么意思| 什么东西补气血效果最好| 麦冬长什么样子图片| 男人蛋疼是什么原因| 金翅鸟吃什么| lsp什么意思| 乘载和核载是什么意思| 霸王花煲汤放什么材料| 为什么手心总是出汗| 血氯高是什么原因| 一九八七年属什么生肖| 孕妇吃什么钙片好| 闰六月给父母买什么| 想成为什么样的人| 97年是属什么的| 男生说gg是什么意思| 失眠吃什么药最好| 主动脉瓣退行性变是什么意思| 牦牛角手串有什么作用| 嬴稷和嬴政是什么关系| 铅中毒用什么解毒| 属猪和什么属相最配| 心里难受是什么原因| 小狗能看见什么颜色| 百度Jump to content

对话陈振濂:书法艺术要记录和歌颂时代

From Wikipedia, the free encyclopedia
(Redirected from Server-side)
A computer network diagram of clients communicating with a server via the Internet
百度 对不同的企业来说,可能大的企业今年还是一个大年,小的企业今年可能是一个小年,行业的洗牌在加剧。

The client–server model is a distributed application structure that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients.[1] Often clients and servers communicate over a computer network on separate hardware, but both client and server may be on the same device. A server host runs one or more server programs, which share their resources with clients. A client usually does not share its computing resources, but it requests content or service from a server and may share its own content as part of the request. Clients, therefore, initiate communication sessions with servers, which await incoming requests. Examples of computer applications that use the client–server model are email, network printing, and the World Wide Web.

Client and server role

[edit]

The server component provides a function or service to one or many clients, which initiate requests for such services. Servers are classified by the services they provide. For example, a web server serves web pages and a file server serves computer files. A shared resource may be any of the server computer's software and electronic components, from programs and data to processors and storage devices. The sharing of resources of a server constitutes a service.

Whether a computer is a client, a server, or both, is determined by the nature of the application that requires the service functions. For example, a single computer can run a web server and file server software at the same time to serve different data to clients making different kinds of requests. The client software can also communicate with server software within the same computer.[2] Communication between servers, such as to synchronize data, is sometimes called inter-server or server-to-server communication.

Client and server communication

[edit]

Generally, a service is an abstraction of computer resources and a client does not have to be concerned with how the server performs while fulfilling the request and delivering the response. The client only has to understand the response based on the relevant application protocol, i.e. the content and the formatting of the data for the requested service.

Clients and servers exchange messages in a request–response messaging pattern. The client sends a request, and the server returns a response. This exchange of messages is an example of inter-process communication. To communicate, the computers must have a common language, and they must follow rules so that both the client and the server know what to expect. The language and rules of communication are defined in a communications protocol. All protocols operate in the application layer. The application layer protocol defines the basic patterns of the dialogue. To formalize the data exchange even further, the server may implement an application programming interface (API).[3] The API is an abstraction layer for accessing a service. By restricting communication to a specific content format, it facilitates parsing. By abstracting access, it facilitates cross-platform data exchange.[4]

A server may receive requests from many distinct clients in a short period. A computer can only perform a limited number of tasks at any moment, and relies on a scheduling system to prioritize incoming requests from clients to accommodate them. To prevent abuse and maximize availability, the server software may limit the availability to clients. Denial of service attacks are designed to exploit a server's obligation to process requests by overloading it with excessive request rates. Encryption should be applied if sensitive information is to be communicated between the client and the server.

Example

[edit]

When a bank customer accesses online banking services with a web browser (the client), the client initiates a request to the bank's web server. The customer's login credentials are compared against a database, and the webserver accesses that database server as a client. An application server interprets the returned data by applying the bank's business logic and provides the output to the webserver. Finally, the webserver returns the result to the client web browser for display.

In each step of this sequence of client–server message exchanges, a computer processes a request and returns data. This is the request-response messaging pattern. When all the requests are met, the sequence is complete.

This example illustrates a design pattern applicable to the client–server model: separation of concerns.

Server-side

[edit]

Server-side refers to programs and operations that run on the server. This is in contrast to client-side programs and operations which run on the client.

General concepts

[edit]

"Server-side software" refers to a computer application, such as a web server, that runs on remote server hardware, reachable from a user's local computer, smartphone, or other device.[5] Operations may be performed server-side because they require access to information or functionality that is not available on the client, or because performing such operations on the client side would be slow, unreliable, or insecure.

Client and server programs may be commonly available ones such as free or commercial web servers and web browsers, communicating with each other using standardized protocols. Or, programmers may write their own server, client, and communications protocol which can only be used with one another.

Server-side operations include both those that are carried out in response to client requests, and non-client-oriented operations such as maintenance tasks.[6][7]

Computer security

[edit]

In a computer security context, server-side vulnerabilities or attacks refer to those that occur on a server computer system, rather than on the client side, or in between the two. For example, an attacker might exploit an SQL injection vulnerability in a web application in order to maliciously change or gain unauthorized access to data in the server's database. Alternatively, an attacker might break into a server system using vulnerabilities in the underlying operating system and then be able to access database and other files in the same manner as authorized administrators of the server.[8][9][10]

Examples

[edit]

In the case of distributed computing projects such as SETI@home and the Great Internet Mersenne Prime Search, while the bulk of the operations occur on the client side, the servers are responsible for coordinating the clients, sending them data to analyze, receiving and storing results, providing reporting functionality to project administrators, etc. In the case of an Internet-dependent user application like Google Earth, while querying and display of map data takes place on the client side, the server is responsible for permanent storage of map data, resolving user queries into map data to be returned to the client, etc.

Web applications and services can be implemented in almost any language, as long as they can return data to standards-based web browsers (possibly via intermediary programs) in formats which they can use.

Client side

[edit]

Client-side refers to operations that are performed by the client in a computer network.

General concepts

[edit]

Typically, a client is a computer application, such as a web browser, that runs on a user's local computer, smartphone, or other device, and connects to a server as necessary. Operations may be performed client-side because they require access to information or functionality that is available on the client but not on the server, because the user needs to observe the operations or provide input, or because the server lacks the processing power to perform the operations in a timely manner for all of the clients it serves. Additionally, if operations can be performed by the client, without sending data over the network, they may take less time, use less bandwidth, and incur a lesser security risk.

When the server serves data in a commonly used manner, for example according to standard protocols such as HTTP or FTP, users may have their choice of a number of client programs (e.g. most modern web browsers can request and receive data using both HTTP and FTP). In the case of more specialized applications, programmers may write their own server, client, and communications protocol which can only be used with one another.

Programs that run on a user's local computer without ever sending or receiving data over a network are not considered clients, and so the operations of such programs would not be termed client-side operations.

Computer security

[edit]

In a computer security context, client-side vulnerabilities or attacks refer to those that occur on the client / user's computer system, rather than on the server side, or in between the two. As an example, if a server contained an encrypted file or message which could only be decrypted using a key housed on the user's computer system, a client-side attack would normally be an attacker's only opportunity to gain access to the decrypted contents. For instance, the attacker might cause malware to be installed on the client system, allowing the attacker to view the user's screen, record the user's keystrokes, and steal copies of the user's encryption keys, etc. Alternatively, an attacker might employ cross-site scripting vulnerabilities to execute malicious code on the client's system without needing to install any permanently resident malware.[8][9][10]

Examples

[edit]

Distributed computing projects such as SETI@home and the Great Internet Mersenne Prime Search, as well as Internet-dependent applications like Google Earth, rely primarily on client-side operations. They initiate a connection with the server (either in response to a user query, as with Google Earth, or in an automated fashion, as with SETI@home), and request some data. The server selects a data set (a server-side operation) and sends it back to the client. The client then analyzes the data (a client-side operation), and, when the analysis is complete, displays it to the user (as with Google Earth) and/or transmits the results of calculations back to the server (as with SETI@home).

Early history

[edit]

An early form of client–server architecture is remote job entry, dating at least to OS/360 (announced 1964), where the request was to run a job, and the response was the output.

While formulating the client–server model in the 1960s and 1970s, computer scientists building ARPANET (at the Stanford Research Institute) used the terms server-host (or serving host) and user-host (or using-host), and these appear in the early documents RFC 5[11] and RFC 4.[12] This usage was continued at Xerox PARC in the mid-1970s.

One context in which researchers used these terms was in the design of a computer network programming language called Decode-Encode Language (DEL).[11] The purpose of this language was to accept commands from one computer (the user-host), which would return status reports to the user as it encoded the commands in network packets. Another DEL-capable computer, the server-host, received the packets, decoded them, and returned formatted data to the user-host. A DEL program on the user-host received the results to present to the user. This is a client–server transaction. Development of DEL was just beginning in 1969, the year that the United States Department of Defense established ARPANET (predecessor of Internet).

Client-host and server-host

[edit]

Client-host and server-host have subtly different meanings than client and server. A host is any computer connected to a network. Whereas the words server and client may refer either to a computer or to a computer program, server-host and client-host always refer to computers. The host is a versatile, multifunction computer; clients and servers are just programs that run on a host. In the client–server model, a server is more likely to be devoted to the task of serving.

An early use of the word client occurs in "Separating Data from Function in a Distributed File System", a 1978 paper by Xerox PARC computer scientists Howard Sturgis, James Mitchell, and Jay Israel. The authors are careful to define the term for readers, and explain that they use it to distinguish between the user and the user's network node (the client).[13] By 1992, the word server had entered into general parlance.[14][15]

Centralized computing

[edit]

The client-server model does not dictate that server-hosts must have more resources than client-hosts. Rather, it enables any general-purpose computer to extend its capabilities by using the shared resources of other hosts. Centralized computing, however, specifically allocates a large number of resources to a small number of computers. The more computation is offloaded from client-hosts to the central computers, the simpler the client-hosts can be.[16] It relies heavily on network resources (servers and infrastructure) for computation and storage. A diskless node loads even its operating system from the network, and a computer terminal has no operating system at all; it is only an input/output interface to the server. In contrast, a rich client, such as a personal computer, has many resources and does not rely on a server for essential functions.

As microcomputers decreased in price and increased in power from the 1980s to the late 1990s, many organizations transitioned computation from centralized servers, such as mainframes and minicomputers, to rich clients.[17] This afforded greater, more individualized dominion over computer resources, but complicated information technology management.[16][18][19] During the 2000s, web applications matured enough to rival application software developed for a specific microarchitecture. This maturation, more affordable mass storage, and the advent of service-oriented architecture were among the factors that gave rise to the cloud computing trend of the 2010s.[20][failed verification]

Comparison with peer-to-peer architecture

[edit]

In addition to the client-server model, distributed computing applications often use the peer-to-peer (P2P) application architecture.

In the client-server model, the server is often designed to operate as a centralized system that serves many clients. The computing power, memory and storage requirements of a server must be scaled appropriately to the expected workload. Load-balancing and failover systems are often employed to scale the server beyond a single physical machine.[21][22]

Load balancing is defined as the methodical and efficient distribution of network or application traffic across multiple servers in a server farm. Each load balancer sits between client devices and backend servers, receiving and then distributing incoming requests to any available server capable of fulfilling them.

In a peer-to-peer network, two or more computers (peers) pool their resources and communicate in a decentralized system. Peers are coequal, or equipotent nodes in a non-hierarchical network. Unlike clients in a client-server or client-queue-client network, peers communicate with each other directly. [23] In peer-to-peer networking, an algorithm in the peer-to-peer communications protocol balances load, and even peers with modest resources can help to share the load.[24] If a node becomes unavailable, its shared resources remain available as long as other peers offer it. Ideally, a peer does not need to achieve high availability because other, redundant peers make up for any resource downtime; as the availability and load capacity of peers change, the protocol reroutes requests.

Both client-server and master-slave are regarded as sub-categories of distributed peer-to-peer systems.[25]

See also

[edit]

Notes

[edit]
  1. ^ "Distributed Application Architecture" (PDF). Sun Microsystem. Archived from the original (PDF) on 6 April 2011. Retrieved 2025-08-05.
  2. ^ The X Window System is one example.
  3. ^ Benatallah, B.; Casati, F.; Toumani, F. (2004). "Web service conversation modeling: A cornerstone for e-business automation". IEEE Internet Computing. 8: 46–54. doi:10.1109/MIC.2004.1260703. S2CID 8121624.
  4. ^ Dustdar, S.; Schreiner, W. (2005). "A survey on web services composition" (PDF). International Journal of Web and Grid Services. 1: 1. CiteSeerX 10.1.1.139.4827. doi:10.1504/IJWGS.2005.007545.
  5. ^ "What do client side and server side mean? Client side vs. server side". Cloudflare. Retrieved 17 April 2025.
  6. ^ "Introduction to the server side - Learn web development | MDN". developer.mozilla.org. 2025-08-05. Retrieved 2025-08-05.
  7. ^ "Server-side website programming - Learn web development | MDN". developer.mozilla.org. 2025-08-05. Retrieved 2025-08-05.
  8. ^ a b Lehtinen, Rick; Russell, Deborah; Gangemi, G. T. (2006). Computer Security Basics (2nd ed.). O'Reilly Media. ISBN 9780596006693. Retrieved 2025-08-05.
  9. ^ a b JS (2025-08-05). "Week 4: Is There a Difference between Client Side and Server Side?". n3tweb.wordpress.com. Retrieved 2025-08-05.
  10. ^ a b Espinosa, Christian (2025-08-05). "Decoding the Hack" (PDF). alpinesecurity.com. Retrieved 2025-08-05.[permanent dead link]
  11. ^ a b Rulifson, Jeff (June 1969). DEL. IETF. doi:10.17487/RFC0005. RFC 5. Retrieved 30 November 2013.
  12. ^ Shapiro, Elmer B. (March 1969). Network Timetable. IETF. doi:10.17487/RFC0004. RFC 4. Retrieved 30 November 2013.
  13. ^ Sturgis, Howard E.; Mitchell, James George; Israel, Jay E. (1978). "Separating Data from Function in a Distributed File System". Xerox PARC.
  14. ^ Harper, Douglas. "server". Online Etymology Dictionary. Retrieved 30 November 2013.
  15. ^ "Separating data from function in a distributed file system". GetInfo. German National Library of Science and Technology. Archived from the original on 2 December 2013. Retrieved 29 November 2013.
  16. ^ a b Nieh, Jason; Yang, S. Jae; Novik, Naomi (2000). "A Comparison of Thin-Client Computing Architectures". Academic Commons. doi:10.7916/D8Z329VF. Retrieved 28 November 2018.
  17. ^ d'Amore, M. J.; Oberst, D. J. (1983). "Microcomputers and mainframes". Proceedings of the 11th annual ACM SIGUCCS conference on User services - SIGUCCS '83. p. 7. doi:10.1145/800041.801417. ISBN 978-0897911160. S2CID 14248076.
  18. ^ Tolia, Niraj; Andersen, David G.; Satyanarayanan, M. (March 2006). "Quantifying Interactive User Experience on Thin Clients" (PDF). Computer. 39 (3). IEEE Computer Society: 46–52. doi:10.1109/mc.2006.101. S2CID 8399655.
  19. ^ Otey, Michael (22 March 2011). "Is the Cloud Really Just the Return of Mainframe Computing?". SQL Server Pro. Penton Media. Archived from the original on 3 December 2013. Retrieved 1 December 2013.
  20. ^ Barros, A. P.; Dumas, M. (2006). "The Rise of Web Service Ecosystems". IT Professional. 8 (5): 31. doi:10.1109/MITP.2006.123. S2CID 206469224.
  21. ^ Cardellini, V.; Colajanni, M.; Yu, P.S. (1999). "Dynamic load balancing on Web-server systems". IEEE Internet Computing. 3 (3). Institute of Electrical and Electronics Engineers (IEEE): 28–39. doi:10.1109/4236.769420. ISSN 1089-7801.
  22. ^ "What Is Load Balancing? How Load Balancers Work". NGINX. June 1, 2014. Retrieved January 21, 2020.
  23. ^ Alharbi, A.; Aljaedi, A. (2004). "Peer-to-Peer Network Security Issues and Analysis: Review". IJCSNS International Journal of Computer Science and Network Security. doi:10.1007/978-3-540-45172-3_6.
  24. ^ Rao, A.; Lakshminarayanan, K.; Surana, S.; Manning Karp, R. (2020). "Load Balancing in Structured P2P Systems". IJCSNS International Journal of Computer Science and Network Security. 20: 74–88.
  25. ^ Varma, Vasudeva (2009). "1: Software Architecture Primer". Software Architecture: A Case Based Approach. Delhi: Pearson Education India. p. 29. ISBN 9788131707494. Retrieved 2025-08-05. Distributed Peer-to-Peer Systems [...] This is a generic style of which popular styles are the client-server and master-slave styles.
尿酸高吃什么食物 男人为什么会得尿结石 发腮是什么意思 月经量少吃什么排淤血 子宫痉挛是什么症状
什么是小三 什么时候种玉米 鼻孔里面痒是什么原因 鼻子出血什么原因 嗓子疼头疼吃什么药
结婚长明灯有什么讲究 腰椎间盘突出挂什么科室 早上起来头晕是什么原因 看望病人送什么花合适 山楂可以和什么一起泡水喝
dha有什么作用与功效 子婴是秦始皇什么人 医生和医师有什么区别 宫颈多发纳囊是什么病 脚底红是什么原因
淋巴门结构可见是什么意思zhongyiyatai.com ppq是什么意思dayuxmw.com afp是什么意思hcv9jop3ns9r.cn 冰箱eco是什么意思hcv8jop1ns8r.cn 芦荟有什么作用jiuxinfghf.com
耳鸣脑鸣是什么原因引起的hcv9jop5ns8r.cn 7月1号是什么节日aiwuzhiyu.com 五行木生什么hcv7jop9ns5r.cn 隶属什么意思hcv8jop1ns5r.cn 肠易激综合征吃什么药好hcv8jop9ns4r.cn
缺血灶是什么意思jingluanji.com emmm什么意思hcv8jop6ns3r.cn ppt是什么意思hcv8jop4ns1r.cn 考试吃什么hcv9jop8ns1r.cn 什么是焦虑症hcv8jop7ns4r.cn
as是什么元素hcv9jop2ns3r.cn 血糖高能吃什么hcv8jop4ns5r.cn 结婚10年是什么婚hcv9jop3ns6r.cn 黑是什么生肖hcv9jop2ns9r.cn 吃什么降血压的食物hcv9jop5ns6r.cn
百度