六月二七是什么星座| 12.31什么星座| 接济是什么意思| 臣附议是什么意思| 心率过高是什么原因| 甲状腺结节忌口什么| 倒灌是什么意思| 站着说话不腰疼什么意思| 樱桃什么时候成熟| 可甜可盐什么意思| 小便黄是什么病症| 胎儿没有胎心是什么原因| 失心疯是什么意思| 腿部抽筋是什么原因| 情感障碍是什么| 吃什么壮阳| 小壁虎的尾巴有什么作用| 什么东西能吃能喝又能坐| 梦见两口子吵架是什么意思| 11月5日是什么星座| 钛色是什么颜色| 牙结石有什么危害| 补办身份证需要什么手续| 心肌炎做什么检查| 北京属于什么方向| 看得什么| 大禹的爸爸叫什么| st是什么单位| 北极熊是什么颜色的| 乳腺癌什么症状| sunglasses什么意思| 鹦鹉拉稀吃什么药| 蒲公英泡水喝有什么副作用| 右肝钙化灶是什么意思| temp是什么文件夹| 曹操是什么样的人| 水痘是什么原因引起的| 比肩劫财是什么意思| 乏力是什么症状| 住院带什么必备物品| 纯磨玻璃结节是什么意思| 漏尿吃什么药| 为什么会孕酮低| 氯仿是什么| 一千年前是什么朝代| 什么叫感统训练| 正值当年什么意思| 免疫力下降吃什么好| 眩晕症是什么症状| 人为什么会做梦科学解释| 为什么高铁没有e座| 为什么一直打嗝| 什么肉不能吃| 考试为什么要用2b铅笔| 盆腔积液吃什么药好| 万加一笔是什么字| 血压高吃什么水果好| 梦见自己死了又活了是什么意思| 窦性心律逆钟向转位是什么意思| 上呼吸道感染用什么药| 茯苓什么人不能吃| 手脚发麻是什么病征兆| 电影监制是做什么的| 请柬写伉俪什么意思| 男生小肚子疼是什么原因| 什么水什么山| 胎儿畸形是什么原因造成的| 梦见好多动物是什么意思| 死缓什么意思| 面色发黄是什么原因| 鸡蛋花的花语是什么| 清华什么专业最好| 祛斑什么季节做最好| 记忆力减退是什么原因造成的| 人参果是什么季节的| 农历5月17日是什么星座| 律的右边读什么| 什么猫| 刘邦为什么要杀张良| 术后吃什么消炎药| 肚子上长毛是什么原因| 为什么天天晚上做梦| 扁桃体发炎用什么药| esd是什么| 烧酒是什么酒| 水杨酸有什么作用| 牙根疼吃什么药最好| 吹箫什么意思| 牙龈萎缩吃什么药见效快| 壬水代表什么| 十二指肠溃疡吃什么中成药| 脾胃不好有什么症状表现| 一个虫一个卑念什么| 肩宽适合穿什么样的衣服| 吃什么最补脑| 凌晨12点是什么时辰| 什么是纯净水| 祛痘用什么药膏| 脚抽筋是什么原因引起的| 人少了一魄什么反应| 血小板体积偏低是什么原因| 神经鞘瘤挂什么科| 滴虫性阴道炎是什么原因引起的| 太阳黑子是什么东西| 肠腔积气是什么原因| 冬瓜与什么食物相克| 蒸鱼豉油是什么| 痔疮看什么科| 早上口干苦是什么原因| 糖料病者应吃什么好| 屁眼疼是什么原因| 血糖高的可以吃什么水果| 梦见蝎子是什么意思| 小便有点刺痛是什么原因引起的| 胆囊结石不宜吃什么| 环状肉芽肿是什么皮肤病| 什么是变应性鼻炎| 天然是什么意思| 孕妇可以喝什么饮料| 帕金森是什么引起的| 男孩取什么名字好听又有贵气| 佛爷是什么意思| 吃什么对心脏有好处| 眼仁发黄是什么原因| 脚没有力气是什么原因| 黄金芽属于什么茶| 鸡拉绿色粪便是什么病| 立是什么生肖| 什么是气| 成家是什么意思| 一棵树是什么品牌| 在岸人民币和离岸人民币什么意思| 快乐是什么意思| 阴虚火旺有什么症状| 白露是什么季节的节气| 血压和血糖有什么关系| 1978年属马五行缺什么| 七情六欲指的是什么| 岫岩玉是什么玉| 嘴辰发紫是什么病| 大忌什么意思| ctc是什么| 溪字五行属什么| 我是什么结构| 四月三日是什么星座| 四肢麻木是什么病| 胎儿双顶径是什么意思| 万兽之王是什么动物| amv是什么意思| 脑血管堵塞会有什么后果| 口腔溃疡吃什么维生素| 做b超挂什么科| 品检是做什么的| 五月二十日是什么星座| 皮疹是什么原因引起的| 什么树没有叶子| 梦见别人买房子是什么预兆| swissmade是什么意思| 屋漏偏逢连夜雨是什么意思| 男女双修是什么意思| 最好的红酒是什么牌子| 离线缓存是什么意思| 什么叫黑户| 假酒喝了有什么症状| 笙是什么意思| 大便黑色的是什么原因| 喉咙痒吃什么药| 血糖是什么意思| 子宫腺肌症是什么| 梦见孩子拉粑粑是什么意思| 冲菜是什么菜| 什么的晚霞| 一物降一物指什么生肖| 紫藤花什么时候开花| 检查免疫力都需要化验什么项目| 女性胆囊炎有什么症状| 什么茶养胃又治胃病| 谣言是什么意思| 彼岸花代表什么星座| 公安局局长是什么级别| 1967年出生属什么| 受戒是什么意思| 来事吃什么水果好| 呕吐是什么原因引起的| 萎缩性胃炎吃什么药最好| 心脏跳的快吃什么药| 背疼是什么原因| drg是什么| 射精是什么感觉| 孕检nt主要检查什么| sap是做什么的| 牙齿掉了一小块是什么原因| 嘴唇紫色是什么原因| qcy是什么牌子| 查高血压挂什么科| 指尖脱皮是什么原因| 脚出汗是什么原因| 鼻子干燥是什么原因| 眼睛模糊用什么药| 治疗腱鞘炎用什么药效果好| 什么茶刮油| 白细胞2加号什么意思| 恩师是什么意思| 女人梦见下雪是什么征兆| 乌龟为什么喜欢叠罗汉| 火龙果有什么好处| 雪花秀属于什么档次| 送百合花代表什么意思| 含金量什么意思| 香松是什么| 玻璃的原材料是什么| 菜瓜是什么瓜| 北斗是什么意思| 属猪男和什么属相最配| 情窦初开是什么意思| 长痣是什么原因| 拉肚子低烧是什么原因| 熊猫长什么样| 死海是什么| 办理结婚证需要什么材料| 尿道感染用什么消炎药| 脖子粗大是什么病的症状| 男孩过生日送什么礼物好| 白兰地是属于什么酒| 梦见雨伞是什么意思| 梦见小蛇是什么意思| 肺结核传染途径是什么| 丁亥年五行属什么| 阴道口瘙痒是什么原因| 孕妇喉咙痛吃什么好得最快| 什么食物含维生素c最多| 吃什么水果可以通便| 麦粒肿是什么原因引起的| 司马光和司马迁是什么关系| 把你的心我的心串一串是什么歌| 早搏吃什么药最管用| 李子与什么食物相克| 姜太公钓鱼愿者上钩是什么意思| 巨蟹女跟什么星座最配| 前列腺是什么东西| 射手座有什么特点| 4月23日是什么星座| 什么的杯子| 恨嫁什么意思| 吃什么能升血小板| 运动系统由什么组成| 金丝熊吃什么| 骨质疏松吃什么药好| 辗转反侧什么意思| 乳腺结节看什么科| 肝硬化前期有什么症状| 肠胃不好吃什么比较好| 海蜇丝是什么做的| 红斑是什么皮肤病| 易岗易薪是什么意思| 智商100属于什么水平| 1985年属牛是什么命| 梦见捡硬币是什么预兆| 火鸡面为什么这么贵| 四象是什么| 注意是什么意思| 开火车什么意思| 吉尼斯是什么意思| 劣质是什么意思| 百度Jump to content

车讯:26.28-39.18万 曝进口新Tiguan疑似售价

From Wikipedia, the free encyclopedia
百度 我们将考虑全部的意见。

Replication in computing refers to maintaining multiple copies of data, processes, or resources to ensure consistency across redundant components. This fundamental technique spans databases, file systems, and distributed systems, serving to improve availability, fault-tolerance, accessibility, and performance.[1] Through replication, systems can continue operating when components fail (failover), serve requests from geographically distributed locations, and balance load across multiple machines. The challenge lies in maintaining consistency between replicas while managing the fundamental tradeoffs between data consistency, system availability, and network partition tolerance – constraints known as the CAP theorem.[2]

Terminology

[edit]

Replication in computing can refer to:

  • Data replication, where the same data is stored on multiple storage devices
  • Computation replication, where the same computing task is executed many times. Computational tasks may be:
    • Replicated in space, where tasks are executed on separate devices
    • Replicated in time, where tasks are executed repeatedly on a single device

Replication in space or in time is often linked to scheduling algorithms.[3]

Access to a replicated entity is typically uniform with access to a single non-replicated entity. The replication itself should be transparent to an external user. In a failure scenario, a failover of replicas should be hidden as much as possible with respect to quality of service.[4]

Computer scientists further describe replication as being either:

  • Active replication, which is performed by processing the same request at every replica
  • Passive replication, which involves processing every request on a single replica and transferring the result to the other replicas

When one leader replica is designated via leader election to process all the requests, the system is using a primary-backup or primary-replica scheme, which is predominant in high-availability clusters. In comparison, if any replica can process a request and distribute a new state, the system is using a multi-primary or multi-master scheme. In the latter case, some form of distributed concurrency control must be used, such as a distributed lock manager.

Load balancing differs from task replication, since it distributes a load of different computations across machines, and allows a single computation to be dropped in case of failure. Load balancing, however, sometimes uses data replication (especially multi-master replication) internally, to distribute its data among machines.

Backup differs from replication in that the saved copy of data remains unchanged for a long period of time.[5] Replicas, on the other hand, undergo frequent updates and quickly lose any historical state. Replication is one of the oldest and most important topics in the overall area of distributed systems.

Data replication and computation replication both require processes to handle incoming events. Processes for data replication are passive and operate only to maintain the stored data, reply to read requests and apply updates. Computation replication is usually performed to provide fault-tolerance, and take over an operation if one component fails. In both cases, the underlying needs are to ensure that the replicas see the same events in equivalent orders, so that they stay in consistent states and any replica can respond to queries.

Replication models in distributed systems

[edit]

Three widely cited models exist for data replication, each having its own properties and performance:

  • Transactional replication: used for replicating transactional data, such as a database. The one-copy serializability model is employed, which defines valid outcomes of a transaction on replicated data in accordance with the overall ACID (atomicity, consistency, isolation, durability) properties that transactional systems seek to guarantee.
  • State machine replication: assumes that the replicated process is a deterministic finite automaton and that atomic broadcast of every event is possible. It is based on distributed consensus and has a great deal in common with the transactional replication model. This is sometimes mistakenly used as a synonym of active replication. State machine replication is usually implemented by a replicated log consisting of multiple subsequent rounds of the Paxos algorithm. This was popularized by Google's Chubby system, and is the core behind the open-source Keyspace data store.[6][7]
  • Virtual synchrony: involves a group of processes which cooperate to replicate in-memory data or to coordinate actions. The model defines a distributed entity called a process group. A process can join a group and is provided with a checkpoint containing the current state of the data replicated by group members. Processes can then send multicasts to the group and will see incoming multicasts in the identical order. Membership changes are handled as a special multicast that delivers a new "membership view" to the processes in the group.[8]

Database replication

[edit]

Database replication involves maintaining copies of the same data on multiple machines, typically implemented through three main approaches: single-leader, multi-leader, and leaderless replication.[1]

In single-leader (also called primary/replica) replication, one database instance is designated as the leader (primary), which handles all write operations. The leader logs these updates, which then propagate to replica nodes. Each replica acknowledges receipt of updates, enabling subsequent write operations. Replicas primarily serve read requests, though they may serve stale data due to replication lag – the delay in propagating changes from the leader.

In multi-master replication (also called multi-leader), updates can be submitted to any database node, which then propagate to other servers. This approach is particularly beneficial in multi-data center deployments, where it enables local write processing while masking inter-data center network latency.[1] However, it introduces substantially increased costs and complexity which may make it impractical in some situations. The most common challenge that exists in multi-master replication is transactional conflict prevention or resolution when concurrent modifications occur on different leader nodes.

Most synchronous (or eager) replication solutions perform conflict prevention, while asynchronous (or lazy) solutions have to perform conflict resolution. For instance, if the same record is changed on two nodes simultaneously, an eager replication system would detect the conflict before confirming the commit and abort one of the transactions. A lazy replication system would allow both transactions to commit and run a conflict resolution during re-synchronization. Conflict resolution methods can include techniques like last-write-wins, application-specific logic, or merging concurrent updates.[1]

However, replication transparency can not always be achieved. When data is replicated in a database, they will be constrained by CAP theorem or PACELC theorem. In the NoSQL movement, data consistency is usually sacrificed in exchange for other more desired properties, such as availability (A), partition tolerance (P), etc. Various data consistency models have also been developed to serve as Service Level Agreement (SLA) between service providers and the users.

There are several techniques for replicating data changes between nodes:[1]

  • Statement-based replication: Write requests (such as SQL statements) are logged and transmitted to replicas for execution. This can be problematic with non-deterministic functions or statements having side effects.
  • Write-ahead log (WAL) shipping: The storage engine's low-level write-ahead log is replicated, ensuring identical data structures across nodes.
  • Logical (row-based) replication: Changes are described at the row level using a dedicated log format, providing greater flexibility and independence from storage engine internals.

Disk storage replication

[edit]
Storage replication

Active (real-time) storage replication is usually implemented by distributing updates of a block device to several physical hard disks. This way, any file system supported by the operating system can be replicated without modification, as the file system code works on a level above the block device driver layer. It is implemented either in hardware (in a disk array controller) or in software (in a device driver).

The most basic method is disk mirroring, which is typical for locally connected disks. The storage industry narrows the definitions, so mirroring is a local (short-distance) operation. A replication is extendable across a computer network, so that the disks can be located in physically distant locations, and the primary/replica database replication model is usually applied. The purpose of replication is to prevent damage from failures or disasters that may occur in one location – or in case such events do occur, to improve the ability to recover data. For replication, latency is the key factor because it determines either how far apart the sites can be or the type of replication that can be employed.

The main characteristic of such cross-site replication is how write operations are handled, through either asynchronous or synchronous replication; synchronous replication needs to wait for the destination server's response in any write operation whereas asynchronous replication does not.

Synchronous replication guarantees "zero data loss" by the means of atomic write operations, where the write operation is not considered complete until acknowledged by both the local and remote storage. Most applications wait for a write transaction to complete before proceeding with further work, hence overall performance decreases considerably. Inherently, performance drops proportionally to distance, as minimum latency is dictated by the speed of light. For 10 km distance, the fastest possible roundtrip takes 67 μs, whereas an entire local cached write completes in about 10–20 μs.

In asynchronous replication, the write operation is considered complete as soon as local storage acknowledges it. Remote storage is updated with a small lag. Performance is greatly increased, but in case of a local storage failure, the remote storage is not guaranteed to have the current copy of data (the most recent data may be lost).

Semi-synchronous replication typically considers a write operation complete when acknowledged by local storage and received or logged by the remote server. The actual remote write is performed asynchronously, resulting in better performance but remote storage will lag behind the local storage, so that there is no guarantee of durability (i.e., seamless transparency) in the case of local storage failure.[citation needed]

Point-in-time replication produces periodic snapshots which are replicated instead of primary storage. This is intended to replicate only the changed data instead of the entire volume. As less information is replicated using this method, replication can occur over less-expensive bandwidth links such as iSCSI or T1 instead of fiberoptic lines.

Implementations

[edit]

Many distributed filesystems use replication to ensure fault tolerance and avoid a single point of failure.

Many commercial synchronous replication systems do not freeze when the remote replica fails or loses connection – behaviour which guarantees zero data loss – but proceed to operate locally, losing the desired zero recovery point objective.

Techniques of wide-area network (WAN) optimization can be applied to address the limits imposed by latency.

File-based replication

[edit]

File-based replication conducts data replication at the logical level (i.e., individual data files) rather than at the storage block level. There are many different ways of performing this, which almost exclusively rely on software.

Capture with a kernel driver

[edit]

A kernel driver (specifically a filter driver) can be used to intercept calls to the filesystem functions, capturing any activity as it occurs. This uses the same type of technology that real-time active virus checkers employ. At this level, logical file operations are captured like file open, write, delete, etc. The kernel driver transmits these commands to another process, generally over a network to a different machine, which will mimic the operations of the source machine. Like block-level storage replication, the file-level replication allows both synchronous and asynchronous modes. In synchronous mode, write operations on the source machine are held and not allowed to occur until the destination machine has acknowledged the successful replication. Synchronous mode is less common with file replication products although a few solutions exist.

File-level replication solutions allow for informed decisions about replication based on the location and type of the file. For example, temporary files or parts of a filesystem that hold no business value could be excluded. The data transmitted can also be more granular; if an application writes 100 bytes, only the 100 bytes are transmitted instead of a complete disk block (generally 4,096 bytes). This substantially reduces the amount of data sent from the source machine and the storage burden on the destination machine.

Drawbacks of this software-only solution include the requirement for implementation and maintenance on the operating system level, and an increased burden on the machine's processing power.

File system journal replication

[edit]

Similarly to database transaction logs, many file systems have the ability to journal their activity. The journal can be sent to another machine, either periodically or in real time by streaming. On the replica side, the journal can be used to play back file system modifications.

One of the notable implementations is Microsoft's System Center Data Protection Manager (DPM), released in 2005, which performs periodic updates but does not offer real-time replication.[citation needed]

Batch replication

[edit]

This is the process of comparing the source and destination file systems and ensuring that the destination matches the source. The key benefit is that such solutions are generally free or inexpensive. The downside is that the process of synchronizing them is quite system-intensive, and consequently this process generally runs infrequently.

One of the notable implementations is rsync.

Replication within file

[edit]

In a paging operating system, pages in a paging file are sometimes replicated within a track to reduce rotational latency.

In IBM's VSAM, index data are sometimes replicated within a track to reduce rotational latency.

Distributed shared memory replication

[edit]

Another example of using replication appears in distributed shared memory systems, where many nodes of the system share the same page of memory. This usually means that each node has a separate copy (replica) of this page.

Primary-backup and multi-primary replication

[edit]

Many classical approaches to replication are based on a primary-backup model where one device or process has unilateral control over one or more other processes or devices. For example, the primary might perform some computation, streaming a log of updates to a backup (standby) process, which can then take over if the primary fails. This approach is common for replicating databases, despite the risk that if a portion of the log is lost during a failure, the backup might not be in a state identical to the primary, and transactions could then be lost.

A weakness of primary-backup schemes is that only one is actually performing operations. Fault-tolerance is gained, but the identical backup system doubles the costs. For this reason, starting c.?1985, the distributed systems research community began to explore alternative methods of replicating data. An outgrowth of this work was the emergence of schemes in which a group of replicas could cooperate, with each process acting as a backup while also handling a share of the workload.

Computer scientist Jim Gray analyzed multi-primary replication schemes under the transactional model and published a widely cited paper skeptical of the approach "The Dangers of Replication and a Solution".[9][10] He argued that unless the data splits in some natural way so that the database can be treated as n disjoint sub-databases, concurrency control conflicts will result in seriously degraded performance and the group of replicas will probably slow as a function of n. Gray suggested that the most common approaches are likely to result in degradation that scales as O(n3). His solution, which is to partition the data, is only viable in situations where data actually has a natural partitioning key.

In the 1985–1987, the virtual synchrony model was proposed and emerged as a widely adopted standard (it was used in the Isis Toolkit, Horus, Transis, Ensemble, Totem, Spread, C-Ensemble, Phoenix and Quicksilver systems, and is the basis for the CORBA fault-tolerant computing standard). Virtual synchrony permits a multi-primary approach in which a group of processes cooperates to parallelize some aspects of request processing. The scheme can only be used for some forms of in-memory data, but can provide linear speedups in the size of the group.

A number of modern products support similar schemes. For example, the Spread Toolkit supports this same virtual synchrony model and can be used to implement a multi-primary replication scheme; it would also be possible to use C-Ensemble or Quicksilver in this manner. WANdisco permits active replication where every node on a network is an exact copy or replica and hence every node on the network is active at one time; this scheme is optimized for use in a wide area network (WAN).

Modern multi-primary replication protocols optimize for the common failure-free operation. Chain replication[11] is a  popular family of such protocols. State-of-the-art protocol variants[12] of chain replication offer high throughput and strong consistency by arranging replicas in a chain for writes. This approach enables local reads on all replica nodes but has high latency for writes that must traverse multiple nodes sequentially.

A more recent multi-primary protocol, Hermes,[13] combines cache-coherent-inspired invalidations and logical timestamps to achieve strong consistency with local reads and high-performance writes from all replicas. During fault-free operation, its broadcast-based writes are non-conflicting and commit after just one multicast round-trip to replica nodes. This design results in high throughput and low latency for both reads and writes.

See also

[edit]

References

[edit]
  1. ^ a b c d e Kleppmann, Martin (2017). Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems. O'Reilly Media. pp. 151–185. ISBN 9781491903100.
  2. ^ Brewer, Eric A. (2000). "Towards robust distributed systems (Abstract)". Proceedings of the nineteenth annual ACM symposium on Principles of distributed computing. p. 7. doi:10.1145/343477.343502. ISBN 1-58113-183-6.
  3. ^ Mansouri, Najme, Gholam, Hosein Dastghaibyfard, and Ehsan Mansouri. "Combination of data replication and scheduling algorithm for improving data availability in Data Grids", Journal of Network and Computer Applications (2013)
  4. ^ V. Andronikou, K. Mamouras, K. Izan, D. Kyriazis, T. Varvarigou, "Dynamic QoS-aware Data Replication in Grid Environments", Elsevier Future Generation Computer Systems - The International Journal of Grid Computing and eScience, 2012
  5. ^ "Backup and Replication: What is the Difference?". Zerto. February 6, 2012.
  6. ^ Marton Trencseni, Attila Gazso (2009). "Keyspace: A Consistently Replicated, Highly-Available Key-Value Store". Retrieved 2025-08-07.
  7. ^ Mike Burrows (2006). "The Chubby Lock Service for Loosely-Coupled Distributed Systems". Archived from the original on 2025-08-07. Retrieved 2025-08-07.
  8. ^ Birman, K.; Joseph, T. (2025-08-07). "Exploiting virtual synchrony in distributed systems". Proceedings of the eleventh ACM Symposium on Operating systems principles - SOSP '87. New York, NY, USA: Association for Computing Machinery. pp. 123–138. doi:10.1145/41457.37515. ISBN 978-0-89791-242-6. S2CID 7739589.
  9. ^ "The Dangers of Replication and a Solution"
  10. ^ Proceedings of the 1999 ACM SIGMOD International Conference on Management of Data: SIGMOD '99, Philadelphia, PA, US; June 1–3, 1999, Volume 28; p. 3.
  11. ^ van Renesse, Robbert; Schneider, Fred B. (2025-08-07). "Chain replication for supporting high throughput and availability". Proceedings of the 6th Conference on Symposium on Operating Systems Design & Implementation - Volume 6. OSDI'04. USA: USENIX Association: 7.
  12. ^ Terrace, Jeff; Freedman, Michael J. (2025-08-07). "Object storage on CRAQ: high-throughput chain replication for read-mostly workloads". USENIX Annual Technical Conference. USENIX'09. USA: 11.
  13. ^ Katsarakis, Antonios; Gavrielatos, Vasilis; Katebzadeh, M.R. Siavash; Joshi, Arpit; Dragojevic, Aleksandar; Grot, Boris; Nagarajan, Vijay (2025-08-07). "Hermes: A Fast, Fault-Tolerant and Linearizable Replication Protocol". Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems (PDF). ASPLOS '20. New York, NY, USA: Association for Computing Machinery. pp. 201–217. doi:10.1145/3373376.3378496. hdl:20.500.11820/c8bd74e1-5612-4b81-87fe-175c1823d693. ISBN 978-1-4503-7102-5. S2CID 210921224.
痔疮有什么特征 通告是什么意思 韩字五行属什么 猪润是什么 身份证末尾x代表什么
吃什么提神 1658是什么意思 白子画什么时候爱上花千骨的 须发早白吃什么中成药 夏天吃什么菜
梦见雪是什么意思 一切就绪是什么意思 热痱子长什么样 陈皮和橘子皮有什么区别 判缓刑是什么意思
当归长什么样的图片 狗狗什么时候打疫苗 过敏性鼻炎吃什么中药 女用避孕套是什么样的 尿频是什么意思
基础医学是什么hcv8jop9ns7r.cn 为什么总放屁hcv9jop5ns2r.cn 泰山在什么地方hcv8jop4ns9r.cn 供奉是什么意思hcv9jop3ns4r.cn 儿童说话晚去医院挂什么科hcv8jop6ns1r.cn
腰椎退行性改变是什么意思wuhaiwuya.com 什么东西最养胃hcv8jop8ns3r.cn 08属什么生肖hcv9jop0ns3r.cn rna是什么意思hcv8jop1ns6r.cn 色盲是什么遗传方式hcv8jop3ns3r.cn
说话口臭是什么原因引起的hcv9jop5ns1r.cn 脉络膜裂囊肿是什么病hcv8jop4ns7r.cn 6合是什么生肖hcv7jop9ns5r.cn 什么外之什么tiangongnft.com 紫菜和海苔有什么区别hkuteam.com
奥地利讲什么语言hcv8jop7ns4r.cn 脱轨是什么意思hcv9jop7ns3r.cn 智商130算什么水平imcecn.com 月经期同房有什么危害hcv9jop3ns0r.cn 什么叫透析hcv8jop3ns1r.cn
百度