分享
 
 
 

TCP/IP网络互连第1卷:原理/协议和体系结构(第四版 英文版)

TCP/IP网络互连第1卷:原理/协议和体系结构(第四版 英文版)  点此进入淘宝搜索页搜索
  特别声明:本站仅为商品信息简介,并不出售商品,您可点击文中链接进入淘宝网搜索页搜索该商品,有任何问题请与具体淘宝商家联系。
  參考價格: 点此进入淘宝搜索页搜索
  分類: 图书,计算机/网络,网络与数据通信,网络协议,

作者: [美]库默 著

出 版 社: 人民邮电出版社

出版时间: 2002-1-1字数: 1080000版次: 1页数: 750印刷时间: 2002-1-1开本:印次:纸张: 胶版纸I S B N : 9787115099204包装: 平装编辑推荐

.

内容简介

本书说详尽地讲解了网络互连的原理、网络体系结构、TCP/IP协议族以及近年来互联网发展的最新技术。本书包括了TCP/IP、网络互连各个组成部分的设计及其工作,以基工作,对每个协议如ARP,RARP,IP,TCP,UDP,RIP,OSPF等等都有详细阐述。这是一本关于TCP/IP网络互连的经典图书,可读性极强,是任何一个想要了解网络互连技术的人所必不可少的参考书。

本书适合为高等院样计算机专业网络相关课程的教材,也适合各类网络技术开发人员阅读。

作者简介

目录

Chapter 1Introduction And Overview1

1.1The Motivation For Internetworking1

1.2The TCP/IP Internet2

1.3Internet Services3

1.4History And Scope Of The Internet6

1.5The Internet Architecture Board8

1.6The IAB Reorganization9

1.7The Internet Society11

1.8Internet Request For Comments11

1.9Internet Protocols And Standardization12

1.10Future Growth And Technology12

1.11Organization Of The Text13

1.12Summary14

Chapter2Review Of Underlying Network Technologies17

2.1Introduction17

2.2Two Approaches To Network Communication18

2.3Wide Area And Local Area Networks19

2.4Ethernet Technology20

2.5Fiber Distributed Data Interconnect(FDDI)33

2.6Asynchronous Transfer Mode37

2.7WAN Technologies:ARPANET38

2.8National Science Foundation Networking40

2.9ANSNET44

2.10A Very High Speed Backbone(vBNS)45

2.11Other Technologies Over Which TCP/IP Has Been Used46

2.12Summary And Conclusion50

Chapter 3Internetworking Concept And Architectural Model53

3.1Introduction53

3.2Application-Level Interconnection53

3.3Network-Level Interconnection54

3.4Properties Of The Internet55

3.5Internet Architecture56

3.6Interconnection Through IP Routers56

3.7The User's View58

3.9The Unanswered Questions59

3.10Summary60

Chapter 4Classful Internet Addresses63

4.1Introduction63

4.2Universal Identifiers63

4.3The Original Classful Addressing Scheme64

4.4Addresses Specify Network Connections65

4.5Network And Directed Broadcast Addresses65

4.6Limited Broadcast66

4.7Interpreting Zero To Mean “This”67

4.8Subnet And Supernet Extensions67

4.9IP Multicast Addresses68

4.10Weaknesses In Internet Addressing68

4.11Dotted Decimal Notation69

4.12Loopback Address70

4.13Summary Of Special Address Conventions70

4.14Internet Addressing Authority71

4.15Reserved Address Prefixes72

4.16An Example72

4.17Network Bye Order74

4.18Summary75

Chapter 5Mapping Internet Addresses To Physical Addresses(ARP)77

5.1Introduction77

5.2The Address Resolution Problem77

5.3Two Types Of Physical Addresses78

5.4Resolution Through Direct Mapping78

5.5The Address Resolution Cache80

5.6The Address Resolution Cache80

5.7ARP Cache Timeout81

5.8ARP Refinements82

5.9Relationship Of ARP To Other Protocols82

5.10ARP Encapsulation And Identification84

5.12ARP Protocol Format84

5.13 Summary86

Chapter 6Determining An Internet Address At Startup(RARP)89

6.1Introduction89

6.2Reverse Address Resolution Protocol(RARP)90

6.3Timing RARP Transactions92

6.4Primary And Backup RARP Servers92

6.5Summary93

Chapter 7Internet Protocol:Connectionless Datagram Delivery95

7.1Introduction95

7.2A Virtual Network95

7.3Internet Architecture And Philosophy96

7.4The Conceptual Service Organization96

7.5Connectionless Delivery System97

7.6Purpose Of The Internet Protocol97

7.7The Internet Datagram97

7.8Internet Datagram Options107

7.9Summary113

Chapter 8Internet Protocol:Routing IP Datagrams115

8.1Introduction115

8.2Routing In An Internet115

8.3Direct And Indirect Delivery117

8.4Table-Driven IP Routing119

8.5Next-Hop Routing119

8.6Default Routes121

8.7Host-Specific Routes121

8.8The IP Routing Algorithm121

8.9Routing With IP Addresses122

8.10Handling Incoming Datagrams124

8.11Establishing Routing Tables125

8.12Summary125

Chapter 9Internet Protocol:Error And Control Messages(ICMP)129

9.1Introduction129

9.2The Internet Control Message Protocol129

9.3Error Reporting vs. Error Correction130

9.4ICMP Message Delivery131

9.5ICMP Message Format132

9.6Testing Destination Reachability And Status(Ping)133

9.7Echo Request And Reply Message Format134

9.8Reports Of Unreachable Destinations134

9.9Congestion And Datagram Flow Control136

9.10Source Quench Format136

9.11Route Change Requests From Routers137

9.12Detecting Circular Or Excessively Long Routes139

9.13Reporting Other Problems140

9.14Clock Synchronization And Transit Time Estimation140

9.15Information Request And Reply Messages142

9.16Obtaining A Subnet Mask142

9.17Router Discovery143

9.18Router Solicitation144

9.19Summary145

Chapter 10Classless And Subnet Address Extensions(CIDR)147

10.1Introduction147

10.2Review Of Relevant Facts147

10.3Minimizing Network Numbers148

10.4Transparent Routers149

10.5Proxy ARP150

10.6Subnet Addressing152

10.7Flexibility In Subnet Address Assignment154

10.8Variable-Length Subnets155

10.9Implementation Of Subnets With Masks156

10.10Subnet Mask Representation157

10.11Routing In The Presence Of Subnets158

10.12The Subnet Routing Algorithm159

10.13A Unified Routing Algorithm160

10.14Maintenance Of Subnet Masks161

10.15Broadcasting To Subnets161

10.16Anonymous Point-To-Point Networks162

10.17Classless Addressing(Supernetting)164

10.18The Effect Of Supernetting On Routing165

10.19CIDR Address Blocks And Bit Masks165

10.20Address Blocks And CIDR Notation166

10.21A Classless Addressing Example167

10.22Data Structures And Algorithms For Classless Lookup167

10.23Longest-Match Routing And Mixtures Of Route Types170

10.24CIDR Blocks Reserved For Private Networks172

10.25Summary173

Chapter 11Protocol Layering177

11.1Introduction177

11.2The Need For Multiple Protocols177

11.3The Conceptual Layers Of Protocol Software178

11.4Functionality Of The Layers181

11.5X.25 And Its Relation To The ISO Model182

11.6Differences Between ISO And Internet Layering185

11.7The Protocol Layering Principle187

11.8Layering In The Presence Of Network Substructure189

11.9Two Important Boundaries In The TCP/IP Model191

11.10The Disadvantage Of Layering192

11.11The Basic Idea Behind Multiplexing And Demultiplexing192

11.12Summary194

Chapter 12User Datagram Protocol(UDP)197

12.1Introduction197

12.2Identifying The Ultimate Destination197

12.3The User Datagram Protocol198

12.4Format Of UDP Messages199

12.5UDP Pseudo-Header200

12.6UDP Encapsulation And Protocol Layering201

12.7Layering And The UDP Checksum Computation203

12.8UDP Multiplexing,Demultiplexing,And Ports203

12.9Reserved And Available UDP Port Numbers204

12.10Summary206

Chapter 13Reliable Stream Transport Service(TCP)209

13.1Introduction209

13.2The Need For Stream Delivery209

13.3Properties Of The Reliable Delivery Service210

13.4Providing Reliability211

13.5The Idea Behind Sliding Windows213

13.6The Transmission Control Protocol215

13.7Ports,Connections,And Endpoints216

13.8Passive And Active Opens218

13.9Segments,Streams,And Sequence Numbers219

13.10Variable Window Size And Flow Control220

13.11TCP Segment Format221

13.12Out Of Band Data222

13.13Maximum Segment Size Option223

13.14TCP Checksum Computation224

13.15Acknowledgements And Retransmission225

13.16Timeout And Retransmission226

13.17Accurate Measurement Of Round Trip Samples228

13.18Karn's Algorithm And Timer Backoff229

13.19Responding To High Variance In Delay230

13.20Response To Congestion232

13.21Congestion,Tail Drop,And TCP234

13.22Random Early Discard(RED)235

13.23Establishing A TCP Connection237

13.24Initial Sequence Numbers239

13.25Closing a TCP Connection239

13.26TCP Connection Reset241

13.27TCP State Machine241

13.28Forcing Data Delivery243

13.29Reserved TCP Port Numbers243

13.30TCP Performance243

13.31Silly Window Syndrome And Small Packets245

13.32Avoiding Silly Window Syndrome246

13.33Summary249

Chapter 14Routing:Cores,Peers,And Algorithms253

14.1Introduction253

14.2The Origin Of Routing Tables254

14.3Routing With Partial Information 255

14.4Original Internet Architecture And Cores256

14.5Core Routers257

14.6Beyond The Core Architecture To Peer Backbones260

14.7Automatic Route Propagation262

14.8Distance Vector (Bellman-Ford)Routing262

14.9Gateway-To-Gateway Protocol(GGP)264

14.10Distance Factoring265

14.11Reliability And Routing Protocols265

14.12Link-State(SPE)Routing266

14.13Summary267

Chapter 15Routing:Exterior Gateway Protocols And Autonomous269

Systems(BGP)

15.1Introduction269

15.2Adding Complexity To The Architectural Model269

15.3Determining A Practical Limit On Group Size270

15.4A Fundamental Idea:Extra Hops271

15.5Hidden Networks273

15.6Autonomous System Concept274

15.7From A Core To Independent Autonomous Systems275

15.8An Exterior Gateway Protocol276

15.9BGP Characteristics277

15.10BGP Functionality And Message Types278

15.11BGP Message Header278

15.12BGP OPEN Message279

15.13BGP UPDATE Message280

15.14Compressed Mask-Address Pairs281

15.15BGP Path Attributes282

15.16BGP KEEPALIVE Message283

15.17Information From The Receiver's Perspective284

15.18The Key Restriction Of Exterior Gateway Protocols285

15.19The Internet Routing Arbiter System287

15.20BGP NOTIFICATION Message288

15.21Decentralization Of Internet Architecture289

15.22Summary290

Chapter 16Routing:In An Autonomous System(RIP,OSPF,HELLO)293

16.1Introduction293

16.2Static Vs. Dynamic Interior Routes293

16.3Routing Information Protocol(RIP)296

16.4The Hello Protocol305

16.5Delay Metrics And Oscillation305

16.6Combining RIP,Hello,And BGP307

16.7Inter-Autonomous System Routing307

16.8Gated:Inter-Autonomous System Communication308

16.9The Open SPF Protocol(OSPF)308

16.10Routing With Partial Information315

16.11Summary315

Chapter 17Internet Multicasting319

17.1Introduction319

17.2Hardware Broadcast319

17.3Hardware Origins Of Multicast320

17.4Ethernet Multicast321

17.5IP Multicast321

17.6The Conceptual Pieces322

17.7IP Multicast Addresses323

17.8Multicast Address Semantics325

17.9Mapping IP Multicast To Ethernet Multicast325

17.10Hosts And Multicast Delivery326

17.11Multicast Scope326

17.12Extending Host Software To Handle Multicasting327

17.13Internet Group Management Protocol328

17.14IGMP Implementation328

17.15Group Membership State Transitions329

17.16IGMP Message Format331

17.17Multicast Forwarding And Routing Information332

17.18Basic Multicast Routing Paradigms334

17.19Consequences Of TRPF335

17.20Multicast Trees337

17.21The Essence Of Multicast Routing338

17.22Reverse Path Multicasting338

17.23Distance Vector Multicast Routing Protocol339

17.24The Mrouted Program340

17.25Alternative Protocols343

17.26Core Based Trees(CBT)343

17.27Protocol Independent Multicast(PIM)344

17.28Multicast Extensions To OSPF(MOSPF)347

17.29Reliable Multicast And ACK Implosions347

17.30Summary349

Chapter 18TCP/IP Over ATM Networks353

18.1Introduction353

18.2ATM Hardware354

18.3Large ATM Networks354

18.4The Logical View Of An ATM Network355

18.5The Two Connection Paradigms356

18.6Paths,Circuits,And Identifiers357

18.7ATM Cell Transport358

18.8ATM Adaptaion Layers358

18.9ATM Adaptation Layer 5360

18.10AAL5 Convergence,Segmentation,And Reassembly361

18.11Datagram Encapsulation And IP MTU Size361

18.12Packet Type And Multiplexing362

18.13IP Address Binding In An ATM Network363

18.14Logical IP Subnet Concept364

18.15Connection Management365

18.16Address Binding Within An LIS366

18.17ATMARP Packet Format366

18.18Using ATMARP packets To Determine An Address369

18.19Obtaining Entries For A Server Database370

18.20Timing Out ATMARP Information In A Server370

18.21Timing Out ATMARP Information In A Host Or Router371

18.22IP Switching Technologies371

18.23Switch Operation372

18.24Optimized IP Forwarding372

18.25Classification,Flows,And Higher Layer Switching373

18.26Applicability Of Switching Technology374

18.27Summary374

Chapter 19Mobile IP377

19.1Introduction377

19.2Mobility,Routing,and Addressing377

19.3Mobile IP Characteristics378

19.4Overview Of Mobile IP Operation378

19.5Mobile Addressing Details379

19.6Foreign Agent Discovery380

19.7Agent Registration381

19.8Registration Message Format381

19.9Communication With A Foreign Agent383

19.10Datagram Transmission And Reception383

19.11The Two-Crossing Problem384

19.12Communication With Computers On the Home Network385

19.13Summary386

Chapter 20Private Network Interconnection(NAT,VPA)389

20.1Introduction389

20.2Private And Hybrid Networks389

20.3A Virtual Private Network(VPN)390

20.4VPN Addressing And Routing392

20.5AVPN With Private Addresses393

20.6Network Address Translation(NAT)394

20.7NAT Translation Table Creation395

20.8Multi-Address NAT396

20.9Port-Mapped NAT396

20.10Interaction Between NAT And ICMP398

20.11Interaction Between NAT And Applications398

20.12Conceptual Address Domains399

20.13Slirp And Masquerade399

20.14Summary400

Chapter 21Client-Server Model Of Interaction403

21.1Introduction403

21.2The Client-Server Model403

21.3A Simple Example:UDP Echo Server404

21.4Time And Date Service406

21.5The Complexity of Servers407

21.6RARP Server408

21.7Alternatives To The Client-Server Model409

21.8Summary410

Chapter 22The Socket Interface413

22.1Introduction413

22.2The UNIX I/O Paradigm And Network I/O414

22.3Adding Network I/O to UNIX414

22.4The Socket Abstraction415

22.5Creating A Socket415

22.6Socket Inheritance And Termination416

22.7Specifying A Local Address417

22.8Connecting Sockets To Destination Addresses418

22.9Sending Data Through A Socket421

22.10Receiving Data Through A Socket Addresses422

22.11Obtaining Local And Remote Socket Addresses422

22.12Obtaining And Setting Socket Options423

22.13Specifying A Queue Length For A Server424

22.14How A Server AcceptsConnections424

22.15Servers That Handle Multiple Services425

22.16Obtaining And Setting Host Names426

22.17Obtaining And Setting The Internal Host Domain427

22.18Socket Library Calls427

22.19Network Byte Order Conversion Routines428

22.20IP Address Manipulation Routines428

22.21Accessing The Domain Name System431

22.22Obtaining Information About Hosts432

22.23Obtaining Information About Networks433

22.24Obtaining Information About Protocols434

22.25Obtaining Information About Network Services434

22.26An Example Client435

22.27An Example Server437

22.28Summary440

Chapter 23Bootstrap And Autoconfiguration(NOOTP,DHCP)443

23.1Introduction443

23.2The Need An Alternative To RARP444

23.3Using IP To Determine An IP Address444

23.4The BOOTP Retransmission Policy445

23.5The BOOTP Message Format446

23.6The Two-Step Bootstrap Procedure447

23.7Vendor-Specific Field448

23.8The Need For Dynamic Configuration448

23.9Dynamic Host Configuration450

23.10Dynamic IP Address Assignment450

23.11Obtaining Multiple Addresses451

23.12Address Acquisition States452

23.14Lease Renewal States454

23.15DHCP Message Format455

23.16DHCP Options And Message Type456

23.17Option Overload457

23.18DHCP And Domain Names457

23.19Summary458

Chapter 24The Domain Name System(DNS)461

24.1Introduction461

24.2Names For Machines462

24.4Hierarchical Names463

24.5Delegation Of Authority For Names464

24.6Subset Authority464

24.7Internet Domain Names465

24.8Official And Unofficial Internet Domain Names466

24.9Named Items And Syntax Of Names468

24.10Mapping Domain Names To Addresses469

24.11Domain Name Resolution471

24.12Efficient Translation472

24.13Caching:The Key To Efficiency473

24.14Domain Server Message Format474

24.15Compressed Name Format477

24.16Abbreviation Of Domain Names477

24.17Inverse Mappings478

24.18Pointer Queries479

24.19Object Types And Resource Record Contents479

24.20Obtaining Authority For A Subdomain480

24.21Summary481

Chapter 25Applications:Remote Login(TELNET,Rlogin)485

25.1Introduction485

25.2Remote Interactive Computing485

25.3TELNET Protocol486

25.4Accommodating Heterogeneity488

25.5Passing Commands That Control The Remote Side490

25.6Forcing The Server To Read A Control Function492

25.7TELNET Options492

25.8TELNET Option Negotiation493

25.9Rlogin(BSD UNIX)494

25.10 Summary495

Chapter 26Applications:File Transfer And Access(FTP,TFTP,NFS)497

26.1Introduction497

26.2File Access And Transfer497

26.3On-line Shared Access498

26.4Sharing By File Transfer499

26.5FTP:The Major TCP/IP File Transfer Protocol499

26.6FTP Features500

26.7FTP Process Model500

26.8TCP Port Number Assignment502

26.9The User's View Of FTP502

26.10An Example Anonymous FTP Session504

26.11TFTP505

26.12NFS507

26.13NFS Implementation507

26.14Remote Procedure Call(RPC)508

26.15Summary509

Chapter 27Applications:Electronic Mail(SMTP,POP,IMAP,MIME)511

27.1Introduction511

27.2Electronic Mail511

27.3Mailbox Names And Aliases513

27.4Alias Expansion And Mail Forwarding513

27.5The Relationship Of Internetworking And Mail514

27.6TCP?IP Standards For Electronic Mail Service516

27.7Electronic Mail Addresses516

27.8Pseudo Domain Addresses518

27.9Simple Mail Transfer Protocol(SMTP)518

27.10Mail Retrieval And Mailbox Manipulation Protocols521

27.11The MIME Extension for Non-ASCII Data522

27.12MIME Multipart Messages523

27.13Summary524

Chapter 28Applications :World Wide Web(HTTP)527

28.1Introduction527

28.2Importance Of The Web527

28.3Architectural Components528

28.4Uniform Resource Locators528

28.5An Example Document529

28.6Hypertext Transfer Protocol530

28.7HTTP GET Request530

28.8Error Messages531

28.9Persistent Connections And Lengths532

28.10Data Length And Program Output532

28.11Length Encoding And Headers533

28.12Negotiation534

28.13Conditional Requests535

28.14Support For Proxy Servers535

28.15Caching 536

28.16Summary537

Chapter 29Applications :Voice And Video Over IP(RTP)539

29.1Introduction539

29.2Audio Clips And Encoding Standards539

29.3Audio And Video Transmission And Reproduction540

29.4Jitter And Playback Delay541

29.5Real-Time Transport Protocol(RTP)542

29.6Streams,Mixing,And Multicasting543

29.7RTP Encapsulation544

29.8RTP Control Protocol(RTCP)544

29.9RTCP Operation545

29.10IP Telephony And Signaling546

29.11Resource Reservation And Quality Of Service548

29.12QoS,Utilization,And Capacity549

29.13RSVP549

29.14COPS550

29.15Summary551

Chapter 30Applications :Internet Management(SNMP)553

30.1Introduction553

30.2The Level Of Management Protocols553

30.3Architectural Model554

30.4Protocol Framework556

30.5Examples of MIB Variables557

30.6The Structure Of Management Information558

30.7Formal Definitions Using ASN.1559

30.8Structure And Representation Of MIB Object Names559

30.9Simple Network Management Protocol564

30.10SNMP Message Format566

30.11Example Encoded SNMP Message569

30.12New Features In SNMPv3572

30.13Summary572

Chapter 31Summary Of Protocol Dependencies575

31.1Introduction 575

31.2Protocol Dependencies575

31.3The Hourglass Model577

31.4Application Program Access578

31.5Summary579

Chapter 32Internet Security And Firewall Design(Ipsec)581

32.1Introduction581

32.2Protecting Resources582

32.3Information Policy583

32.4Internet Security583

32.5IP Security(IPsec)584

32.6IPsec Authentication Header584

32.7Security Association585

32.8IPsec Encapsulating Security Payload586

32.9Authentication And Mutable Header Fields587

32.10IPsec Tunneling588

32.11Required Security Algorithms588

32.12Secure Sockets589

32.13Firewalls And Internet Access589

32.14Multiple Connections And Weakest Links589

32.15Firewall Implementation590

32.16Packet-Level Filters590

32.17Security And Packet Filter Specification591

32.18The Consequence Of Restricted Access For Clients592

32.19Proxy Access Through A Firewall592

32.20The Details Of Firewall Architecture593

32.21Stub Network594

32.22An Alternative Firewall Implementation595

32.23Monitoring And Logging596

32.24Summary596

Chapter 33The Future Of TCP/IP(Ipv6)599

33.1Introduction599

33.2Why Change?600

33.3New Policies600

33.4Motivation For Changing Ipv4600

33.5The Road To A New Version Of IP601

33.6The Name Of The Next IP602

33.7Features Of Ipv6602

33.8General Form Of An Ipv6 Datagram603

33.9Ipv6Base Header Format603

33.10Ipv6 Extension Headers605

33.11Parsing An Ipv6 Datagram606

33.12Ipv6Fragmentation And Reassembly607

33.13The Consequence Of End-To-End Fragmentation607

33.14Ipv6 Source Routing608

33.15Ipv6 Options609

33.16Size Of The Ipv6 Address Space610

33.17Ipv6 Colon Hexadecimal Notation610

33.18Three Basic IPv6 Address Types612

33.19The Duality Of Broadcast And Multicast612

33.20An Engineering Choice And Simulated Broadcast613

33.21Proposed Ipv6 Address Space Assignment613

33.22Embedded Ipv4 Addresses And Transition614

33.23Unspecified And Loopback Addresses616

33.24Unicast Address Hierarchy616

33.25Aggregatable Global Unicast Address Structure617

33.26Interface Identifiers618

33.27Additional Hierarchy619

33.28Local Addresses619

33.29Autoconfiguration And Renumbering620

33.30Summary620

Appendix 1A Guide To RFCs523

Appendix 2Glossary Of Internetworking Terms And Abbreviations673

Bibliography721

Index729

媒体评论

 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
2023年上半年GDP全球前十五强
 百态   2023-10-24
美众议院议长启动对拜登的弹劾调查
 百态   2023-09-13
上海、济南、武汉等多地出现不明坠落物
 探索   2023-09-06
印度或要将国名改为“巴拉特”
 百态   2023-09-06
男子为女友送行,买票不登机被捕
 百态   2023-08-20
手机地震预警功能怎么开?
 干货   2023-08-06
女子4年卖2套房花700多万做美容:不但没变美脸,面部还出现变形
 百态   2023-08-04
住户一楼被水淹 还冲来8头猪
 百态   2023-07-31
女子体内爬出大量瓜子状活虫
 百态   2023-07-25
地球连续35年收到神秘规律性信号,网友:不要回答!
 探索   2023-07-21
全球镓价格本周大涨27%
 探索   2023-07-09
钱都流向了那些不缺钱的人,苦都留给了能吃苦的人
 探索   2023-07-02
倩女手游刀客魅者强控制(强混乱强眩晕强睡眠)和对应控制抗性的关系
 百态   2020-08-20
美国5月9日最新疫情:美国确诊人数突破131万
 百态   2020-05-09
荷兰政府宣布将集体辞职
 干货   2020-04-30
倩女幽魂手游师徒任务情义春秋猜成语答案逍遥观:鹏程万里
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案神机营:射石饮羽
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案昆仑山:拔刀相助
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案天工阁:鬼斧神工
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案丝路古道:单枪匹马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:与虎谋皮
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:李代桃僵
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:指鹿为马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:小鸟依人
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:千金买邻
 干货   2019-11-12
 
推荐阅读
 
 
>>返回首頁<<
 
 
靜靜地坐在廢墟上,四周的荒凉一望無際,忽然覺得,淒涼也很美
© 2005- 王朝網路 版權所有