尿泡沫多吃什么药| 世界第八大奇迹是什么| 甲状腺功能亢进症是什么病| 为什么熊猫是国宝| 不加一笔是什么字| 经常流鼻血是什么病| 人乳头瘤病毒hpv是什么意思| 用什么泡脚能减肥| 杭州有什么| 什么的风儿| 屁多还臭是什么原因| 扁平疣吃什么药| 高密度脂蛋白胆固醇低是什么意思| 一个月一个非念什么| 探望病人买什么水果| 鼻子干燥吃什么中成药| 掌中宝是什么东西| 经常便秘是什么原因| 同病相怜是什么意思| 雪糕是什么做的| 万艾可是什么药| 甲沟炎吃什么药| SEX是什么| 公务员是干什么的| 脑供血不足吃什么药最好| 元五行属什么| prl是什么激素| 酸奶什么时候喝好| 白炽灯是什么灯| 位图是什么意思| 肿瘤标志物cA724高说明什么| 如鱼得水是什么意思| 腌鱼放什么调料| 什么食物对眼睛视力好| 肚脐眼周围痛什么原因| 北京大学校长什么级别| 绛紫色是什么颜色| 早搏吃什么药最好| 的意思是什么| 身上痒是什么原因| 胶原蛋白是什么意思| wba是什么意思| 脑白质病变是什么病| 双肺钙化灶是什么意思| 音乐制作人是干什么的| 抗ccp抗体高说明什么| HP是什么| 喜欢一个人会有什么表现| 遗精是什么感觉| 做流产手术需要准备什么东西| 低血糖吃什么药| 山穷水尽疑无路是什么生肖| 奥斯卡小金人什么意思| 锌是什么颜色| 肺脓肿是什么病严重吗| 落花雨你飘摇的美丽是什么歌| app是什么意思啊| 双顶径是指什么| 地主代表什么生肖| 胃萎缩是什么原因| 今天买什么股票| 葵水是什么意思| 壁虎是什么动物| 宫颈纳囊是什么病| 话唠是什么意思| 凭什么| 真菌孢子是什么| 秦始皇什么星座| 什么含钾最多| 培根是什么肉| 给医生送锦旗写什么| 十点半是什么时辰| dcr是什么| diy是什么意思| 尾椎骨疼是什么原因| 吃维生素c片有什么好处| 包公是什么意思| 科班出身是什么意思| 9月8号是什么星座| 齐天大圣是什么意思| 门户网站是什么| ppl什么意思| 散瞳是什么意思| 罕见是什么意思| 血压低压高是什么原因造成的| 什么是石女| 10.25是什么星座| 春天有什么| birkin是什么意思| 经常头疼什么原因| 产褥热是什么病| 唵是什么意思| 拉大便有血是什么原因| 晒伤用什么| 宫腔镜手术是什么原因才要做| 三伏天是什么| 荨麻疹长什么样图片| 伯恩光学是做什么的| 看牙齿挂什么科| 细佬什么意思| 双手麻是什么原因| 保温壶什么内胆最健康| 蛇缠腰是什么病怎么治| 7月出生是什么星座| 经常肚子疼拉肚子是什么原因| 脚趾甲真菌感染用什么药| 藜芦是什么东西| 榅桲是什么水果| 每晚都做梦是什么原因| 甲基蓝治疗什么鱼病| 晨勃消失是什么原因| 鸡血藤有什么功效| 脑壳疼是什么原因| 呕吐后吃什么食物好| cosplay什么意思| 为什么一直打嗝| 一什么三什么的成语| 负离子什么意思| 窝沟封闭是什么意思| mandy英文名什么意思| 六八年属什么生肖| 3月29号是什么星座| 鱼油功效和作用是什么| 身上长红色痣是什么原因| 瘤变是什么意思| 为什么会生化| 血脂高低看什么指标| 三妻四妾是什么生肖| 头重脚轻是什么生肖| 四季春是什么茶| 破伤风有什么作用| 家是什么| 1975年属兔是什么命| 大黄是什么药| 为什么不嫁丧妻之男| 鸟喜欢吃什么| 轻奢是什么意思| 肌酐是什么病| 狗头是什么意思| 尿蛋白是什么原因造成的| 10月28日是什么日子| 什么太阳| 小腹痛挂什么科| 醒酒是什么意思| 缺铁吃什么补得最快| 甜字五行属什么| 血管堵塞吃什么好| b-h是什么药| 痛风频繁发作说明什么| 总胆红素偏高是什么病| 看胰腺挂什么科| 上火牙齿痛吃什么药| 膳食纤维有什么作用| 春季感冒吃什么药| 拉肚子看什么科| 容易淤青的体质叫什么| 摩羯座的幸运花是什么| 舌尖长溃疡是什么原因| 摄政王是什么意思| 荆棘是什么植物| 史记是什么体史书| 血小板低看什么科| 入殓师是什么意思| z世代是什么意思| 五味子是什么| 易岗易薪是什么意思| 家里消毒杀菌用什么好| 天天喝豆浆有什么好处和坏处| 匪气是什么意思| 为什么性生活会出血| 脚肿吃什么消肿最快| 梦见别人怀孕了是什么意思| 腿痛去医院挂什么科| 火疖子吃什么药| 谷草谷丙偏高是什么意思| 女人梦到小蛇什么预兆| 2月11日是什么星座| 梦见参加葬礼是什么意思| 王八蛋是什么意思| 毛孔粗大做什么医美| diss是什么意思| 着凉拉肚子吃什么药| 奶粉可以做什么美食| 胎心快是什么原因| 陈坤为什么地位那么高| 火星上有什么| 早上起床头晕是什么原因| 客厅挂钟放在什么位置好| 咳嗽嗓子有痰吃什么药| 为什么插几下就射了| 治疗风湿有什么好方法| 7月15号是什么星座| 仁德是什么意思| 12min是什么意思| 四百多分能上什么大学| 肾病有什么症状男性| 什么炒鸡蛋最好吃| 炒熟的黑豆有什么功效| 什么叫银屑病| 杵状指常见于什么病| 以色列是什么人种| 脸黑的人适合穿什么颜色的衣服| 眼压高吃什么药| 红房子是什么| 低钙血症是什么意思| 命犯桃花是什么意思| 男人脚底有痣代表什么| 3D硬金是什么意思| 史铁生为什么瘫痪| 番茄酱和番茄沙司有什么区别| 乳腺结节3类什么意思| 四个又读什么| 鱼日羽念什么| 甲状腺球蛋白抗体高说明什么| 打蛇打七寸是什么意思| 公历和农历有什么区别| 皮肤痒是什么病的前兆| 什么样的女孩容易招鬼| 香蕉为什么是弯的| 西装革履什么意思| 北京的简称是什么| 医院总务科是干什么的| 撒贝宁是什么族| 汐字五行属什么| 它是什么用英语怎么说| 总有眼屎是什么原因| 甲状腺功能亢进吃什么药| 辣椒油用什么能洗掉| 2003年属什么| 就义是什么意思| 七月二十四是什么星座| 梦见两条大蟒蛇是什么征兆| 小孩老是咬手指甲是什么原因| 麻腮风疫苗是预防什么| 流莺是什么意思| 右肾小结石是什么意思| 什么蘑菇有毒| 塞保妇康为什么会出血| 断档是什么意思| 漱口水有什么作用| 天秤座女和什么星座最配| 不爱说话的人是什么性格| 缺氯有什么症状怎么补| l do是什么意思| pt什么意思| 被蜜蜂蛰了擦什么药| 凌寒独自开的凌是什么意思| 毛囊炎的症状是什么原因引起的| 什么牌子的蜂蜜比较好| 迄今为止什么意思| 梦见买车是什么意思| 舌裂是什么原因造成的| 宫腔内偏强回声是什么意思| 打喷嚏是什么原因| 剁椒鱼头属于什么菜系| 老是嗜睡是什么原因| 日语牙白什么意思| 刘玄德属什么生肖| kaws是什么牌子| 白细胞一个加号什么意思| 腹直肌分离是什么意思| 黑曜石是什么| 山大王是什么意思| 20度穿什么衣服合适| 百度

高唐县民族实验小学福景分校:阳光大课间 健康...

百度 美方这种做法破坏中美两国两军关系氛围,造成双方海空兵力近距离接触,极易引发误判甚至海空意外事件,这是对中方的严重政治和军事挑衅。

In computer networking, the User Datagram Protocol (UDP) is one of the core communication protocols of the Internet protocol suite used to send messages (transported as datagrams in packets) to other hosts on an Internet Protocol (IP) network. Within an IP network, UDP does not require prior communication to set up communication channels or data paths.

User Datagram Protocol
Communication protocol
AbbreviationUDP
Developer(s)David P. Reed
Introduction1980
InfluencedQUIC, UDP-Lite
OSI layerTransport layer (4)
RFC(s)RFC 768

UDP is a connectionless protocol, meaning that messages are sent without negotiating a connection and that UDP does not keep track of what it has sent.[1][2] UDP provides checksums for data integrity, and port numbers for addressing different functions at the source and destination of the datagram. It has no handshaking dialogues and thus exposes the user's program to any unreliability of the underlying network; there is no guarantee of delivery, ordering, or duplicate protection. If error-correction facilities are needed at the network interface level, an application may instead use Transmission Control Protocol (TCP) or Stream Control Transmission Protocol (SCTP) which are designed for this purpose.

UDP is suitable for purposes where error checking and correction are either not necessary or are performed in the application; UDP avoids the overhead of such processing in the protocol stack. Time-sensitive applications often use UDP because dropping packets is preferable to waiting for packets delayed due to retransmission, which may not be an option in a real-time system.[3]

The protocol was designed by David P. Reed in 1980 and formally defined in RFC 768.

Attributes

edit

UDP is a simple message-oriented transport layer protocol that is documented in RFC 768. Although UDP provides integrity verification (via checksum) of the header and payload,[4] it provides no guarantees to the upper layer protocol for message delivery and the UDP layer retains no state of UDP messages once sent. For this reason, UDP sometimes is referred to as Unreliable Datagram Protocol.[5] If transmission reliability is desired, it must be implemented in the user's application.

A number of UDP's attributes make it especially suited for certain applications.

Ports

edit

Applications can use datagram sockets to establish host-to-host communications. An application binds a socket to its endpoint of data transmission, which is a combination of an IP address and a port. In this way, UDP provides application multiplexing. A port is a software structure that is identified by the port number, a 16-bit integer value, allowing for port numbers between 0 and 65535. Port 0 is reserved but is a permissible source port value if the sending process does not expect messages in response.

The Internet Assigned Numbers Authority (IANA) has divided port numbers into three ranges.[6] Port numbers 0 through 1023 are used for common, well-known services. On Unix-like operating systems, using one of these ports requires superuser operating permission. Port numbers 1024 through 49151 are the registered ports used for IANA-registered services. Ports 49152 through 65535 are dynamic ports that are not officially designated for any specific service and may be used for any purpose. These may also be used as ephemeral ports, which software running on the host may use to dynamically create communications endpoints as needed.[6]

UDP datagram structure

edit

A UDP datagram consists of a datagram header followed by a data section (the payload data for the application). The UDP datagram header consists of 4 fields, each of which is 2 bytes (16 bits):[3]

UDP header format[7]
Offset Octet 0 1 2 3
Octet Bit 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
0 0 Source Port Destination Port
4 32 Length Checksum
8 64 Data
12 96
? ?

The use of the Checksum and Source Port fields is optional in IPv4 (light purple background in table). In IPv6 only the Source Port field is optional. If not used, these fields should be set to zero.[7]

Source Port: 16 bits
This field identifies the sender's port, when used, and should be assumed to be the port to reply to if needed. If the source host is the client, the port number is likely to be an ephemeral port. If the source host is the server, the port number is likely to be a well-known port number from 0 to 1023.[6]
Destination Port: 16 bits
This field identifies the receiver's port and is required. Similar to source port number, if the client is the destination host then the port number will likely be an ephemeral port number and if the destination host is the server then the port number will likely be a well-known port number.[6]
Length: 16 bits
This field specifies the length in bytes of the UDP datagram (the header fields and Data field) in octets. The minimum length is 8 bytes, the length of the header. The field size sets a theoretical limit of 65,535 bytes (8-byte header + 65,527 bytes of data) for a UDP datagram. However, the actual limit for the data length, which is imposed by the underlying IPv4 protocol, is 65,507 bytes (65,535 bytes ? 8-byte UDP header ? 20-byte IP header).[8]
Using IPv6 jumbograms it is possible to have UDP datagrams of size greater than 65,535 bytes. The length field is set to zero if the length of the UDP header plus UDP data is greater than 65,535.[9]
Checksum: 16 bits
The checksum field may be used for error-checking of the header and data. This field is optional in IPv4, and mandatory in most cases in IPv6.[10]
Data: Variable
The payload of the UDP packet.

Checksum computation

edit

The method used to compute the checksum is defined in RFC 768, and efficient calculation is discussed in RFC 1071:

Checksum is the 16-bit ones' complement of the ones' complement sum of a pseudo header of information from the IP header, the UDP header, and the data, padded with zero octets at the end (if necessary) to make a multiple of two octets.[7]

In other words, all 16-bit words are summed using ones' complement arithmetic. Add the 16-bit values up. On each addition, if a carry-out (17th bit) is produced, swing that 17th carry bit around and add it to the least significant bit of the running total.[11] Finally, the sum is then ones' complemented to yield the value of the UDP checksum field.

If the checksum calculation results in the value zero (all 16 bits 0) it should be sent as the ones' complement (all 1s) as a zero-value checksum indicates no checksum has been calculated.[7] In this case, any specific processing is not required at the receiver, because all 0s and all 1s are equal to zero in 1's complement arithmetic.

The differences between IPv4 and IPv6 are in the pseudo header used to compute the checksum, and that the checksum is not optional in IPv6.[12] Under specific conditions, a UDP application using IPv6 is allowed to use a zero UDP zero-checksum mode with a tunnel protocol.[13]

IPv4 pseudo header

edit

When UDP runs over IPv4, the checksum is computed using a pseudo header that contains some of the same information from the real IPv4 header.[7]:?2? The pseudo header is not the real IPv4 header used to send an IP packet, it is used only for the checksum calculation. UDP checksum computation is optional for IPv4. If a checksum is not used it should be set to the value zero.

UDP pseudo-header for checksum computation (IPv4)
Offset Octet 0 1 2 3
Octet Bit 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
0 0 Source Address
4 32 Destination Address
8 64 Zeroes Protocol UDP Length
12 96 Source Port Destination Port
16 128 Length Checksum
20 160 Data
24 192
? ?

The checksum is calculated over the following fields:

Source Address: 32 bits
The source address from the IPv4 header.
Destination Address: 32 bits
The destination address from the IPv4 header.
Zeroes: 8 bits; Zeroes == 0
All zeroes.
Protocol: 8 bits
The protocol value for UDP: 17 (or 0x11).
UDP length: 16 bits
The length of the UDP header and data (measured in octets).

IPv6 pseudo header

edit

As IPv6 has larger addresses and a different header layout, the method used to compute the checksum is changed accordingly:[10]:?§8.1?

Any transport or other upper-layer protocol that includes the addresses from the IP header in its checksum computation must be modified for use over IPv6, to include the 128-bit IPv6 addresses instead of 32-bit IPv4 addresses.

When computing the checksum, again a pseudo header is used that mimics the real IPv6 header:

UDP pseudo-header for checksum computation (IPv6)
Offset Octet 0 1 2 3
Octet Bit 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
0 0 Source address
4 32
8 64
12 96
16 128 Destination address
20 160
24 192
28 224
32 256 UDP length
36 288 Zeroes (0) Next Header (17)
40 320 Source port Destination port
44 352 Length Checksum
48 384 Data
52 416
? ?

The checksum is computed over the following fields:

Source address: 128 bits
The address in the IPv6 header.
Destination address: 128 bits
The final destination; if the IPv6 packet does not contain a Routing header, TCP uses the destination address in the IPv6 header, otherwise, at the originating node, it uses the address in the last element of the Routing header, and, at the receiving node, it uses the destination address in the IPv6 header.
UDP length: 32 bits
The length of the UDP header and data (measured in octets).
Zeroes: 24 bits; Zeroes == 0
All zeroes.
Next Header: 8 bits
The transport layer protocol value for UDP: 17.

Reliability and congestion control

edit

Lacking reliability, UDP applications may encounter some packet loss, reordering, errors or duplication. If using UDP, the end-user applications must provide any necessary handshaking such as real-time confirmation that the message has been received. Applications, such as TFTP, may add rudimentary reliability mechanisms into the application layer as needed.[6] If an application requires a high degree of reliability, a protocol such as the Transmission Control Protocol may be used instead.

Most often, UDP applications do not employ reliability mechanisms and may even be hindered by them. Streaming media, real-time multiplayer games and voice over IP (VoIP) are examples of applications that often use UDP. In these particular applications, loss of packets is not usually a fatal problem. In VoIP, for example, latency and jitter are the primary concerns. The use of TCP would cause jitter if any packets were lost as TCP does not provide subsequent data to the application while it is requesting a re-send of the missing data.

Applications

edit

Numerous key Internet applications use UDP, including: the Domain Name System (DNS), the Simple Network Management Protocol (SNMP), the Routing Information Protocol (RIP)[3] and the Dynamic Host Configuration Protocol (DHCP).

Voice and video traffic is generally transmitted using UDP. Real-time video and audio streaming protocols are designed to handle occasional lost packets, so only slight degradation in quality occurs, rather than large delays if lost packets were retransmitted. Because both TCP and UDP run over the same network, in the mid-2000s a few businesses found that an increase in UDP traffic from these real-time applications slightly hindered the performance of applications using TCP such as point of sale, accounting, and database systems (when TCP detects packet loss, it will throttle back its data rate usage).[14]

Some VPN systems such as OpenVPN may use UDP and perform error checking at the application level while implementing reliable connections. WireGuard uses UDP and performs error checking, but does not provide any reliability guarantees, leaving it for the encapsulated protocols to deal with.

QUIC is a transport protocol built on top of UDP. QUIC provides a reliable and secure connection. HTTP/3 uses QUIC as opposed to earlier versions of HTTPS which use a combination of TCP and TLS to ensure reliability and security respectively. This means that HTTP/3 uses a single handshake to set up a connection, rather than having two separate handshakes for TCP and TLS, meaning the overall time to establish a connection is reduced.[15]

Comparison of UDP and TCP

edit

Transmission Control Protocol is a connection-oriented protocol and requires handshaking to set up end-to-end communications. Once a connection is set up, user data may be sent bi-directionally over the connection.

  • Reliable – TCP manages message acknowledgment, retransmission and timeouts. Multiple attempts to deliver the message are made. If data gets lost along the way, data will be re-sent. In TCP, there's either no missing data, or, in case of multiple timeouts, the connection is dropped.
  • Ordered – If two messages are sent over a connection in sequence, the first message will reach the receiving application first. When data segments arrive in the wrong order, TCP buffers the out-of-order data until all data can be properly re-ordered and delivered to the application.
  • Heavyweight – TCP requires three packets to set up a socket connection before any user data can be sent. TCP handles reliability and congestion control.
  • Streaming – Data is read as a byte stream, no distinguishing indications are transmitted to signal message (segment) boundaries.

User Datagram Protocol is a simpler message-based connectionless protocol. Connectionless protocols do not set up a dedicated end-to-end connection. Communication is achieved by transmitting information in one direction from source to destination without verifying the readiness or state of the receiver.

  • Unreliable – When a UDP message is sent, it cannot be known if it will reach its destination; it could get lost along the way. There is no concept of acknowledgment, retransmission, or timeout.
  • Not ordered – If two messages are sent to the same recipient, the order in which they arrive cannot be guaranteed.
  • Lightweight – There is no ordering of messages, no tracking connections, etc. It is a very simple transport layer designed on top of IP.
  • Datagrams – Packets are sent individually and are checked for integrity on arrival. Packets have definite boundaries which are honored upon receipt; a read operation at the receiver socket will yield an entire message as it was originally sent.
  • No congestion control – UDP itself does not avoid congestion. Congestion control measures must be implemented at the application level or in the network.
  • Broadcasts – being connectionless, UDP can broadcast - sent packets can be addressed to be receivable by all devices on the subnet.
  • Multicast – a multicast mode of operation is supported whereby a single datagram packet can be automatically routed without duplication to a group of subscribers.

Standards

edit
  • RFC 768 – User Datagram Protocol
  • RFC 2460 – Internet Protocol, Version 6 (IPv6) Specification
  • RFC 2675 – IPv6 Jumbograms
  • RFC 4113 – Management Information Base for the UDP
  • RFC 8085 – UDP Usage Guidelines

See also

edit

References

edit
  1. ^ Castelli, Matthew J. (2003). Network Sales and Services Handbook. Cisco Press. ISBN 9781587050909.
  2. ^ Stanek, William (2015). Windows Command Line: The Personal Trainer for Windows 8.1 Windows Server 2012 and Windows Server 2012 R2. Stanek & Associates. ISBN 9781627164139.
  3. ^ a b c Kurose, J. F.; Ross, K. W. (2010). Computer Networking: A Top-Down Approach (5th ed.). Boston, MA: Pearson Education. ISBN 978-0-13-136548-3.
  4. ^ Clark, M.P. (2003). Data Networks IP and the Internet, 1st ed. West Sussex, England: John Wiley & Sons Ltd.
  5. ^ content@ipv6.com (15 August 2006). "UDP Protocol Overview". Ipv6.com. Retrieved 17 August 2011.{{cite web}}: CS1 maint: numeric names: authors list (link)
  6. ^ a b c d e Forouzan, B.A. (2000). TCP/IP: Protocol Suite, 1st ed. New Delhi, India: Tata McGraw-Hill Publishing Company Limited.
  7. ^ a b c d e J. Postel, ed. (28 August 1980). User Datagram Protocol. IETF. doi:10.17487/RFC0768. STD 6. RFC 768. Internet Standard 6.
  8. ^ Stevens, W. Richard (1994). TCP/IP Illustrated: The protocols. Vol. 1 (2 ed.). Addison-Wesley. ISBN 978-0-20-163346-7.
  9. ^ D. Borman; S. Deering; R. Hinden (August 1999). IPv6 Jumbograms. Network Working Group. doi:10.17487/RFC2675. RFC 2675. Proposed Standard. Obsoletes RFC 2147.
  10. ^ a b S. Deering; R. Hinden (July 2017). Internet Protocol, Version 6 (IPv6) Specification. Internet Engineering Task Force. doi:10.17487/RFC8200. STD 86. RFC 8200. Internet Standard 86. Obsoletes RFC 2460.
  11. ^ "Compute 16-bit Ones' Complement Sum". mathforum.org. John. 20 March 2002. Archived from the original (email) on 17 November 2020. Retrieved 5 November 2014.
  12. ^ Internet Protocol, Version 6 (IPv6) Specification. p. 27-28. doi:10.17487/RFC8200. RFC 8200.
  13. ^ Internet Protocol, Version 6 (IPv6) Specification. p. 23. doi:10.17487/RFC8085. RFC 8085.
  14. ^ "The impact of UDP on Data Applications". Networkperformancedaily.com. Archived from the original on 31 July 2007. Retrieved 17 August 2011.
  15. ^ "QUIC, a multiplexed stream transport over UDP". chromium.org. Retrieved 17 February 2021.
edit
为什么喝酒 空气是由什么组成的 621什么星座 p是什么医学 共情能力是什么意思
身上起疙瘩是什么原因 高锰酸钾有什么作用 赤道2什么时候上映 男性睾丸一边大一边小是什么原因 正常精液是什么颜色
冰岛为什么不让随便去 躯体化障碍是什么病 15一16岁青少年腰疼是什么病 吃什么对肺部好 子加一笔是什么字
diamond是什么牌子 虎的偏旁是什么 肚子胀不消化吃什么药 三氯蔗糖是什么 八八年属什么
人乳头瘤病毒39型阳性是什么意思hcv9jop3ns8r.cn 反文旁和什么有关hcv9jop4ns0r.cn 铁皮石斛有什么功效hcv9jop6ns0r.cn 食管炎吃什么药最好hcv7jop9ns0r.cn 免疫五项检查是什么hcv9jop5ns6r.cn
胰岛素针头4mm和5mm有什么区别hlguo.com 1977年五行属什么hcv8jop2ns8r.cn 子宫腺肌症吃什么药最有效hcv8jop3ns8r.cn 族谱是什么意思hcv8jop4ns5r.cn 三叉神经痛吃什么药效果最好hcv9jop7ns4r.cn
今年72岁属什么生肖hcv9jop0ns5r.cn 什么面条好吃wuhaiwuya.com pp材质是什么材质xinjiangjialails.com 张五行属什么hcv8jop7ns6r.cn 汀是什么意思hcv8jop3ns3r.cn
胃不好吃什么药hcv9jop5ns2r.cn 破冰是什么意思gangsutong.com 孕妇梦见坟墓是什么预兆hcv9jop5ns4r.cn 什么花草hcv9jop0ns3r.cn 眼袋是什么原因引起的hcv9jop2ns3r.cn
百度