01.公司與產品概要介紹中文-externalv1.0hubo_第1頁
01.公司與產品概要介紹中文-externalv1.0hubo_第2頁
01.公司與產品概要介紹中文-externalv1.0hubo_第3頁
01.公司與產品概要介紹中文-externalv1.0hubo_第4頁
01.公司與產品概要介紹中文-externalv1.0hubo_第5頁
已閱讀5頁,還剩71頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領

文檔簡介

1、A10 Networks公司、產品與解決方案簡介2014.07A10 Networks簡介客戶數量增長公司銷售額增長總部位于美國加州圣何塞650+員工在全球23個國家設有辦公室客戶遍及全球65個國家應用網絡與安全所面臨的挑戰(zhàn)基礎設施性能的可擴展性移動設備爆炸大數據分析IPv4地址空間耗盡100G骨干網時代針對特定目標、特定資源的DDoS快速的、簡便的海量攻擊(僵尸網絡)云的自動化部署(IaaS)軟件定義網絡(SDN)網絡功能虛擬化(NFV)應用性能的可擴展性與可靠性新型數據中心的設計持續(xù)增長的、層出不窮的安全威脅A10 Networks產品線一覽專有IT系統托管IT系統Cloud IaaSIT

2、交付模型應用網絡平臺高性能可擴展性可升級性靈活性CGNTPSADCACOS平臺產品線ADC 應用加速與應用安全CGN IPv4擴展/IPv6遷移TPS 網絡邊界DDoS防御Carrier Grade NetworkingApplication Delivery Controller Threat Protection System遍及65個國家的3000+客戶互聯網巨擎企業(yè)運營商3 of Top 4美國無線運營商7 of Top 10美國Cable運營商Top 3日本無線運營商Top 3中國三大運營商Thunder的獎項 2014Best of Microsoft TechEd 2014最佳突

3、破技術與會者的選擇,從250+競爭者中脫穎而出!“This year, we judged products in nine technical categories. We vetted the nominations from more than 200 entries down to three and sometimes four finalists in each category. Its really exciting to see so many companies creating products that truly help IT professionals and d

4、evelopers make the most of technology advancements. These products add business value for the people who adopt them. As cloud and mobile e more integral to the workplace, innovation continues to accelerate at a rapid pace. Windows IT Pro is proud to be on the front line for evaluating the best techn

5、ology solutions.”Amy Eisenberg, Editor-in-Chief, Windows IT ProThunder的獎項 2013Best of Interop Japan 2013 應用性能優(yōu)化DDoS防御“ high performance in a space-saving form factor multi-function solutions beyond load balancing.”Izumi Miki, Executive Director, IT media Inc. and Interop Tokyo 2013 judge傳統解決方案所面臨的挑戰(zhàn)

6、為何這些挑戰(zhàn)如此難以應對?傳統網絡:依賴于硬件性能有限的、低價值的L2-L4的流量處理對應用狀態(tài)的感知非常有限應用網絡:處理對象 高價值的“業(yè)務”對資源極其敏感(CPU/內存)傳統設備性能有限低價值業(yè)務:報文轉發(fā)/網絡隔離高價值業(yè)務:應用優(yōu)化,應用可靠性,應用安全應用層OSI參考模型表示層會話層傳輸層網絡層數據鏈路層物理層MAC: f4:f9:51:f0:d5:9dIP: MAC: f4:f9:51:f0:d5:9dIP: 為何這些挑戰(zhàn)如此難以應對?傳統網絡處理:處理對象是固定長度的能夠依賴基于ASIC的硬件應用網絡處理:“應用負載”的檢測與處理應用的內容本身是非結構化的數據CPU處理此類數據

7、,對系統架構和性能的要求非常高應用層(業(yè)務)的關注點:優(yōu)化可靠性安全L2L3L4ETHDESTETHSRCETHTYPE662IPHDR-AIPDESTIPSRC124422TCPDESTPORTTCPSRCPORTApplication Data(Unstructured)444TCP.CRCIP.CRCETH.CRCA10 Networks的解決之道:ACOS平臺ACOS平臺:按照摩爾定律擴展應用網絡網絡流量高性能預處理*:基于硬件的L2-L4流量高性能預處理基于硬件優(yōu)化的流量智能分布基于硬件的應用層安全防御功能* 所有中高端Thunder系列產品均支持專用硬件芯片高擴展性的應用層處理:具

8、備高度可擴展性的SMP架構獨一無二的共享內存架構并行處理確保性能現行擴展低價值業(yè)務:報文轉發(fā)/網絡隔離高價值業(yè)務:應用優(yōu)化,應用可靠性,應用安全應用層OSI參考模型表示層會話層傳輸層網絡層數據鏈路層物理層MAC: f4:f9:51:f0:d5:9dIP: MAC: f4:f9:51:f0:d5:9dIP: 共享內存架構123N流量智能加速交換與路由ACOS平臺:高性能應用網絡的基礎共享內存架構123N流量智能加速交換與路由高效精準的共享內存架構64位多核/多CPU架構優(yōu)化的流量分布應用加速應用安全應用可靠ADC aGalaxy基于ACOS平臺的Application Service Gatew

9、ay產品家族統一策略管理產品線操作系統平臺與業(yè)務產品形態(tài)CGNTPSaXAPIACOS Advanced Core Operating System應用安全DDoS | SSL | WAF | AAM | DAF應用優(yōu)化應用加速IPv6 | SLB | SSL | GSLB | TCP Opt | NATThunderTM & AX Series AppliancesVirtual Chassis (aVCS )vThunderPerpetual License私有數據中心Thunder HVA AppliancesApplication Delivery Partitions (ADPs)公

10、共數據中心(多租戶)專有IT系統aFleXaCloud Services Architecture (SDN & Cloud Integration)aCloudIT交付模型托管IT系統Cloud IaaSvThunder Pay-as-you-Go LicenseThunderAppliancesThunder 6630 ADC (SSL Options)Thunder 6430/6430S ADCThunder 5630 ADC (SSL Options)Thunder 5430/5430-11/5430S-11 ADC Thunder 4430/4430S ADCThunder 3030

11、S ADC Thunder 1030S ADC Thunder 930 ADC Thunder 6630 CGN (SSL Options)Thunder 6430/6430S CGNThunder 5630 ADC (SSL Options)Thunder 5430/5430-11/5430S-11 CGNThunder 4430/4430S CGNThunder 3030S CGN Thunder 6435/6435S TPSThunder 5435/5435S TPSThunder 4435/4435S TPSThunder 3030S TPSThunder Hybrid Virtual

12、 AppliancesThunder 3530 HVAThunder 3030 HVAThunder 3530 HVAThunder 3030 HVAThunder Virtual AppliancesvThunder ADCvThunder Pay-as-you-GovThunder ADC for AWSvThunder CGNvThunder Pay-as-you-GoADC Product LineApplication Optimization, Availability & Security for Web and Data Center ServersCGN Product Li

13、neCarrier-Grade, RFC Compliant IPv4 NAT Extension & IPv6 Migration SolutionsTPS Product LineDDoS Detection & Mitigation Products Preventing Attacks on Critical Server InfrastructureThunder Series Application Service Gateway PortfolioThunder ASG Products & Example Deployment Use CasesSLB, Cache, SSL

14、Offload, WAFData CenterDemilitarized Zone (DMZ)ADC FWLB & SSL InterceptCGNAT, NAT44, NAT64, DS-LitePay-as-you-Go Licensing ModelCarrier NetworkManaged Hosting Provider & IaaSDDoS Detection & MitigationCGNTPSaCloudADCCustomer Case StudiesWhy We Win: ADC SolutionPriceConnections(L4 CPS)Throughput(Gbps

15、)750,000150,000CASE STUDY: BoxNEEDScalable ADC infrastructure to provide high performance to growing user baseSolve low reliability and outages from incumbentSOLUTIONGreater than 4x connections / sec. and 3x of throughputGreater than 2x price-performance with increased reliabilityReduced network dow

16、ntimeLeading, fast-growing “prosumer” cloud serviceA10 Thunder 3030S ADCF5 ADC BIG-IP 4000S $64K*3x5x$30KBase3010* F5 “Better” LicenseBox: ADC Case StudyA top Software-as-a-Service required an ADC Project: Scale a fast growing web businessCompetition: F5Provide core L4-7 ADC services and SSL offload

17、 to remove traffic bottlenecksScalability and price performance were the major factor“We researched incumbent solutions but discovered the products used older technologies and designs, while including a significant expense. The price/performance and cutting-edge technology value proposition delivere

18、d by A10s ADCs is a perfect fit for our Web 2.0 business.” Jeff Queisser, VP of Technical Operations High Availability PairLinux, Apache, My SQL, PHP (LAMP)Why We Win: CGN SolutionThroughput(Gbps)Simultaneous Sessions(# Flows)Capacity(# Subscribers)512,000136,000256M68M11576A10 CGN1 RU SpaceJuniper

19、MX480 3DMS-DPC (4)8 RU Space4x4x1.5xCASE STUDYNational provider of wireless voice, messaging and data servicesNEEDDeliver reliable service to millions of subscribersAvoid costly & disruptive IPv6 replacementSOLUTIONScalable translation solution that extends life of IPv4Roughly 3x overall performance

20、 at roughly $ price vs. incumbent edge-router vendorTier-1 US wireless carrier Project: Mobile network expansion w/ IPv4 address exhaustionCompetition: JuniperIPv4 address expansion (CGNAT) for smartphone streaming appsMature CGNAT implementation in a compact form factorAdditional projects wonNAT64/

21、DNS64 to offer access to new users over IPv6ADC for core server load balancingUS Wireless SP: CGNAT Case Study192.0.n.n“The AX Series Provides great performance, great support, significant growth, a small footprint and a committed company” Source: Vice President, Large Enterprise munications Service

22、s Comany | TVID: AF6-D00-F8A Why We Win: TPS SolutionA10 Thunder TPSArbor Peakflow TMSRadware DefenseProSpeed(Packets per Second)200M+40MPrice(40+ Gbps)25M$200K$800K$600K5xNEEDReliable and Scalable Solution to Protect Against Current and Future DDoS Attacks SOLUTIONFlexibility to Respond to Evolving

23、 AttacksScalability to Achieve Maximum Protection5x Performance and 1/3 Price of Incumbent VendorsCASE STUDYGlobal cloud computing and hosting platform services companyFortune 50 Web Giant: DDoS Prevention Case StudyFortune 50 Software / Web GiantProject: Unpredictable DDoS attacks at 100Gbps+Mitiga

24、tes DDoS attacks to a specific host dynamicallyCompetition: Arbor and RadwareHighest DDoS mitigation scalability to 155 Gbps per appliance (3x+)Additional projects wonMassive “Internet scale” load balancingInternal Enterprise application load balancingAPI CommandAnalyticsThunder blocks the bad inbou

25、nd traffic and forwards the good trafficWhy A10 WinsBest-in-class application networking performance scalabilitySoftware-based platform agility for multiple marketsFlexible form factors & packagingHighly efficient design for data center OPEXGold standard for quality & reliabilityPredictable OPEX and

26、 licensingWhy A10 ACOS WinsScalable Symmetric Multi-Core Processing (SMMP)Designed to Optimize Resource Utilization & EfficiencyShared-Memory Architecture (SMA)Architected for 64-bit multi-core, multi-threaded operationsFundamental benefits: memory, processor & I/O efficiencyLinear performance scala

27、bility with x86 trajectoryFlexible Traffic Accelerator (FTA)Multi-processor flow distributionSymmetric distribution of load across coresACOS: Best-in-Class Performance ScalabilityPlatform Development Reflects Technology Era1990199520002005201020151st Generation SLB2nd Generation ADCA10NetworksACOSIn

28、tel “Core 2”Family (July 2006)32-bit Single-Core CPUs64-bit Multi-Core CPUsMoores LawCan modestly scale up parallel processing efficiencyCan eliminate requirement for some memory sharingFlaw: memory elements must still be replicated impacting performanceConfigurations: system, interface, VIP, rates,

29、 rules, et alCaching: inherently cross-flow, cross-core functionLearning: security policies inherently shared (black lists, cookies)Competitors Approach: Parallel Processing w/ Dedicated MemoryL4-7CPU 1L4-7CPU 2L4-7CPU 3L4-7CPU 4L4-7CPU 5Communication BusScales up parallel processing linearlyNo need

30、 for any memory replicationFlaw: noneA10 ACOS Approach: Parallel Processing with Shared MemoryL4-7CPU 1L4-7CPU 2L4-7CPU 3L4-7CPU 4L4-7CPU 5High-speed Shared MemoryLinear Scaling Shared Memory ArchitectureResource efficiency# of CPU CoresConventional IPC memory architectureParallel processingwith ded

31、icated memoryBenefits:CostPowerHeatSizeA10 ACOS shared memoryarchitectureObjective Data ComparisonSource: Company Public Data Sheets*with max SSL optionNote: based upon F5 lowest priced “Good” license package with LTM only Platform:Thunder 1030SBIG-IP2200SThunder 3030SBIG-IP4000SThunder 5430(S)-11BI

32、G-IP10200V-SSLThunder 6430SViprion 2400 (4x B2150)PerformanceL4 Connections Per Second450,000150,000750,000150,0003,700,0001,000,0005,300,0001,600,000HTTP Requests Per Second2,000,0001,100,0003,000,0001,250,00020,000,00014,000,00031,000,00028,000,000L7 Throughput (Gbps)1053010784014572L7 Requests Pe

33、r Sec (Inf-Inf)480,000425,000800,000425,0002,100,0002,000,0003,300,0002,000,000Max. SSL TPS 2K Keys*7,0004,00014,0004,500110,00075,000130,00040,000Price PerformanceSLB/LTM$20,995$27,995$29,995$29,995$116,995/$146,995$104,995$269,995$269,975$ / L4 CPS$0.05$0.19$0.04$0.20$0.03/$0.04$0.10$0.05$0.17$ /

34、SSL TPS 2K Keys$3.00$7.00$2.14$6.67$1.34$1.40$2.08$6.75ResourcesCPU TypeIntel Xeon QuadIntel Xeon DualIntel Xeon QuadIntel Xeon QuadIntel Xeon Deca (10) coreIntel Xeon Hex CoreIntel Xeon 2x Octo CoreIntel Xeon 4x Quad CoreMemory8 GB8 GB16 GB16 GB64 GB48 GB128 GB128 GBACOS Platform: High Performance

35、Application NetworkingShared Memory Architecture123NFlexible Traffic AcceleratorSwitching and RoutingEfficient & Accurate Memory Architecture64-Bit Multi-CoreOptimizedOptimizedFlow DistributionApplication AccelerationApplicationSecurityApplication AvailabilityConventional: Inter-Process Communicatio

36、n (IPC) ArchitectureL4-7CPU 1L4-7CPU 1L4-7CPU 1L4-7CPU 1L4-7CPU 1Communication BusConventional: Inter-Process Communication (IPC) ArchitectureL4-7CPU 1L4-7CPU 2L4-7CPU 1L4-7CPU 1L4-7CPU 1Communication BusCPU / Memory Overhead:IPC CommunicationBus SchedulingBus Interrupt & LockingDuplicate Memory Blo

37、cksConventional: Inter-Process Communication (IPC) ArchitectureL4-7CPU 1L4-7CPU 2L4-7CPU 3L4-7CPU 4L4-7CPU 5Communication BusCPU / Memory Overhead:IPC CommunicationBus SchedulingBus Interrupt & LockingDuplicate Memory BlocksMulti-Core Design Challenges:N2 Additional OverheadWasted ResourcesConnectio

38、n InaccuracyACOS Architecture OverviewACOS Operating System High-speed Shared MemoryHardware CompressionSSLAccelerationControl KernelControl Protocol & ManagementSwitching & RoutingFlexible Traffic Accelerator1Gbps10Gbps40GbpsL4-7CPU 1L4-7CPU 2L4-7CPU 3L4-7CPU 4L4-7CPU 5L4-7CPU 1L4-7CPU 2L4-7CPU 3L4

39、-7CPU 4L4-7CPU 5High-speed Shared MemoryACOS Shared MemoryConventional IPC ArchitectureL4-7CPU 1L4-7CPU 2L4-7CPU 3L4-7CPU 4L4-7CPU 5Communication BusMemoryMemoryMemoryMemoryMemoryBenefits of ACOS Shared MemoryACOS Shared MemoryConventional IPC ArchitectureL4-7CPU 1L4-7CPU 2L4-7CPU 3L4-7CPU 4L4-7CPU

40、5High-speed Shared MemoryL4-7CPU 1L4-7CPU 2L4-7CPU 3L4-7CPU 4L4-7CPU 5Communication BusZero Memory DuplicationZero IPCZero LockingZero SchedulingZero InterruptsBenefits of ACOS Shared MemoryL4-7CPU 1L4-7CPU 2L4-7CPU 3L4-7CPU 4L4-7CPU 5High-speed Shared MemoryACOS Shared MemoryACOS: SW Agility Suppor

41、ts Rapid Product Line ExtensionsADCSLBNATSSL OFFLOADDDoSDNSFWWAFSSL INTERCEPTAAMNATDDoSCGNCGNATIPv6IP PROXYGATEWAYTPSVOLUMETRICATTACKMITIGATIONRESOURCE ATTACK MITIGATIONPROTOCOL ATTACK MITIGATIONFuture Products in DevelopmentACOS ACOS: Flexible Form Factors for all IT Consumption ModelsDedicated Dat

42、a CentersManaged Hosting, SPCloud IaaS, SPCommon Features & Admin Across Form FactorsvThunder Virtual ApplianceThunder SeriesApplication Delivery PartitionsPay-as-You-Go LicensingThunder HVAvThunder Virtual AppliancevThunder Virtual ApplianceaVCS - Virtual Chassis SystemThunder SeriesRent (RBM)Utili

43、ty (UBM)ACOS designed for reliabilityNo HDD SSD onlyNo CPU fans hot-swap fans onlyNo moving parts on motherboardReliability DataA10 DOA & RMA rate: 2.0% (2013 rate)Industry standard DOA & RMA rate: 4.0% (IT infrastructureGold Standard for Reliability & Quality Thunder Series ADC Product Line Overvie

44、wThunder ADC Solutions to Enhance Your BusinessAvailabilityScale Web and key infrastructure Reduce downtimeEnsure business continuityAccelerationProvide fast and responsive servicesCompetitive advantage Drive down CAPEX and OPEXSecurityProtect against advanced and emerging attacks Protect brand and

45、guard against revenue lossMeet required compliance standardsApplication availabilityTo maintain uptime SLB, GSLB, high-availability (HA), Health-checks, moreApplication accelerationFor equipment consolidation and faster user experience Caching, compression, network optimization, moreApplication secu

46、rity services For brand and asset protection while enhancing your existing security FWLB, WAF, SSL services, moreEnterprise Data CenterAcceleration:SSL OffloadTCP ReuseRAM CachingCompressionA10 ADCWeb AppDNSOther AppSecurity:DDoS MitigationWAFDAFAAMAvailability:GSLBHigh-availabilityHealth-checksBack

47、up Data CenterScaling security devices and encrypted communicationsSSL Intercept: Eliminate encryption blind spot and scale security appliancesFWLB and SSL offload, moreDefend against emerging DDoS attacks Network and application protectionSelectively apply dynamic security chainsTraffic steering an

48、d advanced ADC servicesDMZ Security SolutionsFirewall Load BalancingDDoS MitigationWAFDAFAAMTraffic SteeringaFleX ScriptingSSL OffloadA10 ADCData CenterFirewallsIDS/IPSDLPOtherFirewall Load BalancingSSL InterceptA10 ADCInternal UsersOptimized network efficiency and servicesTraffic steering and servi

49、ce chainingEnhanced service availabilityLoad balancing for Web, caches, Diameter, SIP, IPv4/IPv6 moreService Provider SolutionsService Provider NetworksThunder ADC Hardware AppliancesPricePerformanceThunder 930 ADC5 Gbps (L4&L7)200k L4 CPS1 M RPS (HTTP)Thunder 1030S ADC10 Gbps (L4&L7)450k L4 CPS2M R

50、PS (HTTP)SSL ProcessorThunder 3030S ADC30 Gbps (L4&L7)750k L4 CPS3M RPS (HTTP) SSL ProcessorThunder 4430(S) ADC38 Gbps (L4&L7)2.7M L4 CPS11M RPS (HTTP)Thunder 5430S ADC77/75 Gbps (L4/L7)2.8M L4 CPS17M RPS (HTTP)SSL ProcessorHardware FTAThunder 5430(S)-11 ADC79/78 Gbps (L4/L7)3.7M L4 CPS20M RPS (HTTP

51、)SSL ProcessorHardware FTAThunder 5630 ADC79/78 Gbps (L4/L7)6M L4 CPS32.5M RPS (HTTP)SSL ProcessorHardware FTAThunder 6430(S) ADC150/145 Gbps (L4/L7)5.3M L4 CPS31M RPS (HTTP)SSL ProcessorHardware FTAThunder 6630 ADC150/145 Gbps (L4/L7)7.1M L4 CPS38M RPS (HTTP)SSL ProcessorHardware FTAvThunder Softwa

52、re AppliancesLab EditionEntry Level/Lab 200 MbpsEntry Level/Lab1 GbpsHigh-performance4 GbpsHigh-performance 8 Gbps vThunder (Perpetual Licensing)200 Mbps to 8 GbpsVMware, KVM, Hyper-V & Xen hypervisorsDynamic provisioning, faster roll outScale up or down on-demandPricePerformanceOther vThunder Appli

53、ances and Flexible Billing OptionsvThunder Pay-as-You-Go LicensingElastic & adaptive“Pay-as-you-Go” meteringAutomated licensingFor IaaS providers only License per MonthRent (RBM)Utility (UBM) License per BytevThunder for AWS10 Mbps to 1 Gbps licensing1 click provisioning of 64-bit Amazon Machine Ima

54、ge (AMI)EC2 or VPC environmentsNo feature limitations; licensed by bandwidthBYOL perpetual license or hourly based licenseWhy HVA?Hardware accelerationDeploy instances on demandConsolidationStrong hypervisor-based isolationAdvantage:Hardware performance, virtual flexibilityOpenStack management SR-IO

55、V support for network and SSL accelerationNo performance or feature licensesThunder Hybrid Virtual Appliance (HVA)PricePerformanceThunder 3030S HVA8 instances,35 GbpsThunder 3530S HVA40 instances, 100 GbpsThunder Series TPS Product Line OverviewThunder Threat Protection System (TPS)Next Generation D

56、DoS ProtectionMulti-vector protectionDetect & mitigate application & network attacksFlexible scripting & DPI for rapid responseHigh performanceMitigate 155 Gbps of attack throughput, 200 M packets per second (PPS) in 1 rack unitBroad Deployment and 3rd Party Symmetric, asymmetric, out-of-bandOpen SD

57、K/RESTful API for 3rd party integrationMulti-vector Application & Network ProtectionHigh Performance MitigationBroad Deployment Options & 3rd Party IntegrationDDoS Problems Q3 2010 PayPalDiscloses cost of attack 3.5M($5.8 million)Q1 2013 Credit Union Regulators mend DDoS protection to all membersQ4

58、2012 Bank of the West$900k stolen, DDoS as a distractionQ1 2013 al Qassam Cyber Fighters10-40 Gbps attacks target 9 major banksQ1 2014 CloudFlare 400 Gbps NTP amplification attackQ4 201360 Gbps attacks regularly seen,100 Gbps not monQ4 2013 26% YoY attack increase (17% L7, 28% L3-4) Q4 2013PPS reach

59、es 35 millionQ4 20136.8 million mobile devices are potential attackers (LOIC and AnDOSid)“High-bandwidth DDoS attacks are ing the new norm and will continue wreaking havoc on unprepared enterprises”Source: GartnerAttacks intentions: Make resources unavailableResource exhaustionOverwhelm equipment (a

60、pplication)capacityVolumetricFlood network capacityTwo attack vectorsNetwork attacks (L3-4)TCP, UDP, ICMP, moreApplication attacks (L7)HTTP, DNS, NTP, moreEmergence of multi-vector attacksMultiple attack vectors per incident are on the riseCommon DDoS Attack TypesCPE class platformMSSP integrated so

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經權益所有人同意不得將文件中的內容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
  • 6. 下載文件中如有侵權或不適當內容,請與我們聯系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論