The Underexplored Landscape of Layer-3 Solutions: A New Paradigm for Blockchain Scalability and Functionality
Share
Part 1 – Introducing the Problem
The Underexplored Landscape of Layer-3 Solutions: A New Paradigm for Blockchain Scalability and Functionality
Part 1 – Introducing the Problem
Despite the evolution of Layer-1 and Layer-2 architectures, there remains a critical scalability and specialization bottleneck in blockchain ecosystems. Layer-1 chains like Ethereum struggle to balance decentralization and throughput, while Layer-2 solutions offer generalized scalability enhancements through rollups and sidechains—but with trade-offs in user experience, data availability, and application composability. This layered architecture caps the depth of domain-specific innovation, particularly in areas where high customization and fine-tuned control over execution logic and application-layer economics are required.
Enter Layer-3 solutions—not just another scalability patch, but a distinctive architectural shift. Instead of merely scaling base layers, Layer-3 protocols embed customizable execution environments atop generalized Layer-2s. Think domain-specific rollups, appchains, and zero-knowledge-enabled micro-VMs tailored to a unique use case. These Layer-3 stacks operate as isolated application layers with sovereign execution, designed for scenarios where abstracting away Layer-1 complexity or splitting computation and settlement is essential.
Yet, research and adoption in this space are fragmented. Partly due to terminology confusion—some projects loosely label themselves Layer-3 for marketing flair. More fundamentally, the conceptual framework for L3s remains poorly defined. Unlike L2s, which benefit from EVM compatibility and optimistic rollup standards, L3s currently lack coordination around infrastructure primitives, security assumptions, and interoperability. As a result, serious builders often sidestep Layer-3 altogether, instead reaching for complex workarounds within Layer-2 ecosystems—often at the cost of gas inefficiency or protocol brittleness.
Additionally, the economic case remains underdeveloped. While general L2s aggregate transaction fees across multiple dApps, L3s risk isolation. If an L3 appchain can't sustain validator incentives or economic security, its existence becomes precarious. This mirrors common critiques of emerging appchain ecosystems and has parallels in the granular fragmentation concerns raised in https://bestdapps.com/blogs/news/unpacking-astar-networks-unique-tokenomics, where specialized environments struggle to maintain TVL and network effects.
Still, Layer-3 solutions could unlock a new paradigm: composable micro-environments with bespoke economics, compliance logic, or even user-specific state machines. But this potential comes with a steep cost in design complexity, tooling burden, and decentralization trade-offs.
Their future hinges not only on modular blockchain frameworks but also on standardized security models and seamless cross-layer communication—problems that remain widely unsolved across the stack. We will explore how these constraints begin to resolve—and the architectures emerging to challenge them—in the next section.
Part 2 – Exploring Potential Solutions
Modular Blockchain Scaling: The Rise of Layer-3 Solutions
Layer-3 (L3) infrastructures are emerging as a response to the limitations of Layer-2 rollups, not by replacing them, but by specializing. While Layer-2s focus primarily on scalability and execution cost reduction, L3s explore domain-specific computation, application-layer interoperability, and composability across fragmented chains. The approaches currently under exploration vary widely in architecture, validation assumptions, and security trade-offs.
One promising path involves application-tailored Layer-3 rollups, often nested atop Ethereum rollups like Arbitrum Orbit or zkSync Hyperchains. These L3 instances inherit the data availability and settlement guarantees of their L2 parent chains while building expressive, app-optimized virtual machines—especially useful for sectors like gaming and DePIN. However, the security inheritance is only as robust as the L2 setup. Fragility arises when two L3s on different L2 parents need to interoperate, complicating trust assumptions across domains.
Another class of solutions leans into general-purpose Layer-3 networks that act as coordination layers above multiple L2 ecosystems. Projects like EigenLayer and its AVS ecosystem envision a marketplace of shared cryptoeconomic security, where L3s dynamically rent trust via restaked ETH. This disintermediates the need for each app to operate its own trust layer. However, slashing conditions and incentive compatibility remain underdeveloped, and the interoperability across AVS modules could suffer from siloing effects, not unlike what plagued multi-chain Layer-1s.
There are also exploratory designs using zk-recursive proving stacks—such as Polygon’s zero-knowledge L3 initiative—that aggregate proofs from subordinate L2s into batched L3 logic before final settlement on Ethereum. This offers lower latency and recursive compression but is heavily dependent on proving efficiency, which remains a bottleneck in SNARK-heavy systems. Compiler support, circuit design complexity, and cost of prover infrastructure all limit accessibility for smaller teams.
Experimental ideas, like data-sharded execution environments running on SP1-verified zkVMs, aim to merge L3 semantics with rollup-like data locality. While the theoretical throughput is compelling, bringing stateless clients, proverless wallets, and constant overhead proofs into production remains an unsolved challenge.
In contrast, actor-oriented Layer-3 networks like Astar are already exploring real-world composable dApps across substrate and EVM environments. Anyone interested in technical governance design in such ecosystems should look at Empowering Stakeholders Governance in Astar Network for architectural parallels.
What’s clear is that L3s are experimenting with dimensions of flexibility, modularity, and domain-specificity previously ignored in Ethereum scaling discourse. Their success or failure will shape the next era of blockchain architecture.
Part 3 – Real-World Implementations
Layer-3 in Action: Concrete Implementations, Challenges, and Learnings from the Frontlines
Several technically ambitious networks and protocols have begun experimenting with Layer-3 (L3) architectures, seeking to break free of Layer-2's limitations. One early adopter is Cartesi, which uses a Linux-based L3 Rollup model to push complex computations off-chain. This allows developers to build dApps in mainstream programming languages, but the challenge lies in pushing user adoption beyond the highly technical base. Despite solid documentation and virtual machine demos, traction among developers outside Cartesi’s ecosystem has been limited, due primarily to high onboarding complexity and tooling gaps. A deep exploration of their architecture can be found in A Deepdive into Cartesi.
Meanwhile, the Astar Network is taking a modular approach that underscores flexibility. Astar’s "Build2Earn" framework is aiming to attract developers to build not just on their Layer-2 environment, but also to integrate application-specific logic as distinct operational planes—effectively pushing toward a Layer-3 vision. The system rewards builders directly in tokens for smart contract deployments, offering deeper monetization incentives. However, managing distributed incentives has proven difficult, with stakeholders citing governance misalignment. For those analyzing this in greater depth, Empowering Stakeholders Governance in Astar Network offers insights into the intricacies of their design.
ZK Finance is another project leaning into L3’s potential by exploring zero-knowledge application chains operating atop zk-rollups. While promising in terms of scalability and privacy layering, internal reports have pointed out bottlenecks related to proving time costs and the need for custom circuit development. Their tradeoff is clear: you gain privacy and minimized trust assumptions, but lose interoperability unless specific bridging layers are implemented.
Conversely, Pendle is leveraging what can be called a pseudo-L3—tokenized yield markets that work atop Layer-2 infrastructure but introduce app-specific execution environments that resemble L3 strategies. While successful in carving out a new DeFi niche, critics highlight the non-composability of its yield strips in broader DeFi due to exotic token formats. More context is available in A Deepdive into Pendle.
Despite technical hurdles, these real-world implementations show that L3 is no longer just an abstract concept. The recurring challenges—tooling maturity, interoperability constraints, and user onboarding friction—are being dealt with in varying ways. Yet, for many, the allure of an optimized, vertically decomposed blockchain stack remains too valuable to ignore.
Next, we will assess how this evolving architecture reshapes blockchain’s trajectory over the long term—its threats, promises, and the ideological shifts it demands.
Part 4 – Future Evolution & Long-Term Implications
Layer-3 Blockchain Scalability: Predicting the Trajectory of Modular Innovations
As Layer-3 (L3) architectures move out of experimental stages, a clear transformation is emerging: these solutions are no longer just about throughput—they are becoming programmable execution environments optimized for vertical specialization. The architectural distinctions between general-purpose Layer-2s and highly application-specific L3s are likely to widen, with each serving diverging functions in increasingly modular ecosystems.
One area of future evolution is the development of L3s as enablers of zero-knowledge (ZK) modularity. With ZK technology maturing, recursive proofs across L3 rollups could become a viable scaling pathway, reducing the overhead of inter-rollup validation and pushing toward trust-minimized interoperability. Depending on how infrastructure protocols evolve, it’s feasible that L3s may no longer anchor directly to Ethereum or other Layer-1s, but instead to proof aggregators or ZK validity layers, shifting finality assumptions and bridging models altogether.
There's also momentum growing around data availability sampling (DAS) fused with L3-specific requirements. If DA layers like Celestia or EigenDA introduce L3-native indexing and caching, we might see a shift toward L3s functioning as composability zones for isolated app stacks—such as gaming economies or real-world asset registries—where execution and availability are semi-ephemeral but highly performant.
However, this future isn't frictionless. One under-discussed issue is fragmentation. As L3s become more customized, developer tooling may become more fractured across stacks optimized for gaming, privacy, or DeFi. That introduces both integration risk and cost-of-maintenance challenges. Teams looking to optimize via a hyper-specific L3 may be forced to re-implement primitives that would otherwise be inherited from a more generalized Layer-2 infrastructure.
There’s also the question of composability across isolated L3 domains. Although bridging and messaging protocols aim to resolve this, maintaining state coherence across application-specific rollups remains complex—especially if L3s settle via different L2s with asynchronous finality models.
In ecosystems like Astar Network—currently exploring layered and cross-chain modularity—this type of architecture raises fundamental questions about which layer governs execution, where fees accrue, and how composable assets remain across execution shards. For more insights relevant to these cross-layer integration issues, see Unlocking Astar Network The Future of Blockchain Interoperability.
At a meta level, the evolution of L3s signifies a shift from monolithic chains toward a fractalized yet programmable data economy—where logic, governance, and incentives can each live on their own optimization layers. That, however, mandates new conversations about who controls and coordinates these increasingly modularized hierarchies.
Part 5 – Governance & Decentralization Challenges
Layer-3 Governance Models: Balancing Decentralization and Control
As Layer-3 (L3) protocols begin to define the next frontier in blockchain scaling, their governance models are already emerging as a critical point of contention. While L3s are often constructed atop Layer-2 networks, many treat governance as an isolated plane, opting either for full decentralization to mirror the ethos of on-chain sovereignty or for lean, centralized oversight to ship features faster. Both paradigms come with acute risks.
A centralized L3 stack allows for rapid iteration — think protocol-level coordination, integration of custom execution environments, and application-layer scheduling. However, this speed comes at the cost of resilience. Centralized upgrade mechanisms and elite multisig-controlled treasuries become clear attack vectors. In extreme cases, Layer-3s could fall prey to regulatory capture or subtle forms of self-censorship due to reliance on centralized infrastructure, especially when jurisdictionally bound to the entities operating the sequencer or rollup aggregator.
On the other side of the spectrum, fully decentralized governance — whether via DAO tokenomics or quadratic voting schemes — introduces complexity that can cripple decision-making. Token-based plutocracy is still the default, resulting in a governance layer vulnerable to whales and mercenary capital. Governance hijacking is not a hypothetical: DAO-based attacks have already played out in several DeFi ecosystems. Layer-3s with low TVL and fragmented participation are particularly easy targets for “boardroom sniping” where attackers quietly accumulate votes to push protocol-level upgrades or drain system treasuries.
More experimental Layer-3s are exploring hybrid governance frameworks — combining off-chain signaling with on-chain execution — but this layering introduces further composability risks. Governance process latency across multiple layers creates scenarios where L1-level changes could invalidate L3-level assumptions without adequate coordination.
An instructive comparison can be found in systems like Astar Network, where governance segmentation aims to delineate community control over parachain functions without bottlenecking execution. However, as highlighted in Empowering Stakeholders: Governance in Astar Network, even this model wrestles with the balance of decentralization and execution efficiency — a trade-off poised to intensify in the L3 landscape.
Layer-3s must also contend with baseline legitimacy. Governance tokens with ambiguous purpose or poor distribution can accelerate capture. Even advanced vote-locking mechanisms or reputation-weighted models fail if the underlying token is illiquid or concentrated among early insiders. Incentive designs embedded in L3 ecosystems are often engineered without adversarial modeling, leaving ample surface area for collusion.
Token staking or sequencing rights auctions won't be effective panaceas unless redesigned with anti-plutocracy filters. The careful convergence of cryptoeconomic incentives and operational transparency is non-optional if L3s aim to avoid repeating the pitfalls of their L2 counterparts.
Coming up: a hard look at the engineering and scalability trade-offs Layer-3 architectures must navigate to reach mass adoption.
Part 6 – Scalability & Engineering Trade-Offs
The Complex Trade-Offs of Scaling Layer-3 Solutions in Blockchain Architecture
Layer-3 (L3) protocols aspire to offer extensibility and application-specific customization layered atop existing L2s, but scaling these solutions introduces non-trivial engineering constraints. As developers attempt to construct interoperable L3s capable of vertical scalability and composable functionality, they must navigate the classic blockchain trilemma: decentralization, security, and throughput. The compromises are particularly acute for L3s, which inherit limitations from their L1 and L2 substrates while introducing new abstraction layers.
A major scalability bottleneck arises from recursive dependency risks. L3s often rely on L2 sequencers—typically centralized or semi-centralized actors—meaning that any latency or failure at L2 propagates upward. Optimistic rollups exacerbate this, introducing seven-day dispute windows that can delay finality on L3s if not handled carefully. Leveraging Zero-Knowledge (ZK) proofs for L2 settlement mitigates some of this, but the computational overhead of ZK recursion at the L3 tier can saturate prover capacity, limiting real-time responsiveness.
Another engineering constraint is state fragmentation. As L3s specialize for use cases (e.g., gaming, DeFi, identity), isolated state machines multiply, hindering cross-dapp composability and creating challenges around shared liquidity. Techniques like shared sequencers improve coordination, but introduce protocol-level dependencies that reduce modularity. These design frictions reflect trade-offs similar to those analyzed in Unlocking Astar Network The Future of Blockchain Interoperability, where cross-chain composability introduces new vectors for failure and centralization.
Consensus layering also raises protocol coherency concerns. When L3s implement their own consensus (e.g., PoA or PoS), they add weight to L2 consensus and increase complexity in fault handling. Fully delegating consensus to L2 preserves architectural purity but limits L3 autonomy. Introducing light consensus within L3s—a hybrid model—improves flexibility but marginally increases the attack surface and weakens security assumptions.
Lastly, the frequent use of centralized APIs, relayers, and bridges at L3 to facilitate interoperability and off-chain data integrations introduces critical centralized chokepoints. These express speed and usability advantages—often demanded by developers and users—but at the cost of meaningful decentralization. The reliance on trusted infrastructure is a known issue, but its implications are magnified when built three layers above L1.
While the ambition of L3s is to unlock application-specific blockchains with higher throughput and flexible governance, their layered complexity and compounded dependencies invite careful scrutiny. The next section will dissect the regulatory, jurisdictional, and compliance challenges posed by Layer-3 execution environments across fragmented legal regimes.
Part 7 – Regulatory & Compliance Risks
Layer-3 Compliance Risks: The Inconsistent Regulatory Terrain Shaping Blockchain’s Next Frontier
While Layer-3 (L3) solutions are technically positioned above Layer-2 rollups and Layer-1 blockchains, their legal positioning lies in a murky middle ground. Most L3s promise deeply customizable application layers, but this added flexibility can introduce unique compliance threats that neither regulators nor developers are adequately prepared to address.
The most pressing concern stems from jurisdictional fragmentation. Unlike Layer-1 chains, which operate under global awareness and scrutiny, L3 protocols are often built and governed by smaller development teams deploying app-specific logic. This granularity creates ambiguity—should an L3 protocol inherit the regulatory oversight of the underlying L2, or is it an entirely separate legal entity? The answer can change drastically depending on the jurisdiction. The U.S., for example, leans towards a functionality-based interpretation under “substance over form,” which could classify L3 tokens—even purely infrastructural ones—as securities if they exhibit capital-raising behavior.
Compounding this is the emergence of L3s functioning as modular service hubs—offering things like zero-knowledge proof integration, privacy layers, and customizable zk-rollups. While such technologies might evade traditional financial scrutiny, the recent regulatory backlash against privacy coins and mixing services suggests that L3 applications could be caught in the regulatory crossfire. This becomes particularly salient for L3s resolving identity or compliance middleware. Builders must ask: does their system require Know Your Customer (KYC) obligations even if it simply facilitates compliance rather than directly touching fiat?
Historically, regulators have treated infrastructure providers lightly—often framed as neutral conduits. But the growing sophistication of L3s blurs the line between protocol and financial application. We saw early parallels during the SEC's scrutiny of ICO platforms and layer-1 governance tokens. L3s creating incentive layers, application-specific staking, or fee routing may unknowingly replicate patterns that triggered previous enforcement actions.
Furthermore, global regulators are not aligned. An L3 protocol legal in Singapore may face sanctions risk in the EU if its tooling allows private transfers or bypasses AML triggers. This could disincentivize institutional adoption. Entities holding custody licenses or managing DAO treasuries will often sidestep L3 integrations unless legal liabilities are fully clarified.
Protocols like Astar Network, which stand out for their governance and compliance experimentation, highlight how Layer-3 solutions may eventually need to embed governance mechanisms with built-in regulatory responsiveness. This concept is explored deeply in this Empowering Stakeholders: Governance in Astar Network.
As L3s mature and blur the boundaries between middleware and applications, they will increasingly attract the attention of both technocrats and regulators. This legal uncertainty will strongly influence how quickly the technology can be adopted at scale.
Next, we’ll explore the broader financial and economic ramifications of Layer-3 integration—unpacking its impact on fee markets, capital efficiency, and the traditional DeFi stack.
Part 8 – Economic & Financial Implications
Economic Disruption and Opportunity in the Layer-3 Era: Stakeholder Shifts and Financial Risks
Layer-3 (L3) protocols are redefining blockchain economics by introducing tailored execution layers on top of general-purpose Layer-2s—enabling hyper-specialized financial rails that could render traditional Web3 business models obsolete. This architectural leap isn’t just technical; it carries seismic economic implications for a wide range of actors in the ecosystem.
For institutional investors, L3s present both threat and opportunity. On one hand, the modular stack enables highly verticalized applications—domain-specific chains with precise governance and monetization models. This aligns closely with institutional needs for measurable KPIs and legal clarity, potentially accelerating capital inflows into programmable finance. On the other hand, significant fragmentation across L3 ecosystems could undermine network effects. Investors backing generalized L1 and L2 ecosystems may see value diluted by sub-market liquidity and user dispersion across niche L3s.
Developers are strategically repositioned. Rather than launching apps on shared infrastructure, they're increasingly incentivized to create their own sovereign execution environments. This unlocks deeper fee capture and governance authority, but comes at the cost of increased technical burden and competitive isolation. Only developer teams with executional and community-building capacity will thrive, while smaller projects may collapse under the weight of L3’s added complexity.
Traders, meanwhile, face evolving liquidity dynamics. The proliferation of app-chains isolates pools across execution layers, potentially increasing slippage and reducing arbitrage efficiency. However, for sophisticated quantitative participants, L3s also present alpha opportunities through novel MEV extraction zones and custom order flow arrangements. Cross-rollup capital efficiency tools will be critical, yet remain underdeveloped.
L3s also complicate tokenomics. As projects create their own execution layers, legacy token utility may come under pressure. Governance tokens originally designed for monolithic ecosystems risk becoming archaic in fragmented L3 environments. Projects like Astar Network may provide a glimpse into how tokenomics adapt in a multi-layered world—a deep dive into its structure reflects this trend.
Moreover, Layer-3 introduces a new systemic risk vector: protocol isolation. A compromised or misconfigured execution layer could become a financial dead zone, stranding liquidity and user assets. In an ecosystem with hundreds of L3s, governance failures on even a few can ripple across DeFi ecosystems via interdependencies.
The financialization of infrastructure is accelerating. With Layer-3, the line between app and protocol, user and investor, is becoming indistinguishable. What this means for digital sovereignty and user power is less clear—a tension to be explored in the next installation on the social and philosophical implications of these emergent layers.
Part 9 – Social & Philosophical Implications
Economic and Financial Implications of Layer-3 Protocols: Disruption, Incentives, and Risk Concentration
Layer-3 (L3) protocols, by abstracting application-specific logic from Layer-2 infrastructure, are poised to shift the economic terrain across decentralized ecosystems. But this shift is not universally positive. These meta-protocols have the potential to unlock novel value streams, while also introducing compounding layers of abstraction that dilute economic clarity and risk transparency.
A defining financial attribute of L3s is the emergence of micro-incentive networks. By allowing developers to launch bespoke rollups and app chains with tailored economic rules, L3s can support hyper-fragmented markets where liquidity, yield, and access are determined by granularity—not scale. This enables protocol designers to issue tokens with focused utility but incentivizes the segmentation of liquidity. While agile protocols might benefit through yield innovation or behavior-based gamification, general traders may find themselves spread thin across incompatible L3 environments.
Institutional capital faces a different tradeoff. Custom execution layers offer gated access points for private liquidity pools or compliance-aware decentralized finance (CeDeFi) applications. However, the opaque economic bridges between L2 and L3 introduce substantial verification overhead. Proofs of availability, settlement guarantees, and data validity proofs across stacked layers can obfuscate true counterparty risk. It’s a scenario where structured finance thinking becomes a necessity within smart contract stacks.
On the downside, traditional DeFi arbitrageurs and liquidity providers stand to lose. Cross-rollup composability remains non-trivial even at the L2 level—and L3 protocols exacerbate fragmentation across both fiscal and temporal axes. MEV extraction becomes harder to track across layers, while transactional latency adds risk to high-frequency traders reliant on network predictability. In effect, L3’s modularity may inadvertently centralize value capture toward vertically integrated players who can control or influence coordination layers across the stack.
A key concern also arises from governance centralization. When a Layer-3 sits atop a general L2 like Optimism, but runs its own fee markets and validators, the scope for extraction expands significantly. Protocols like Astar, which focus on interoperability and modular logic across chains, must navigate these dynamics carefully. For an example of such complexity, see Unlocking Astar Network The Future of Blockchain Interoperability.
Finally, new forms of speculative behavior may thrive. With hyper-focused L3 tokens, short-lived pump-driven ecosystems could emerge, resembling microcap “appcoins” more than foundational monetary assets. Some may use these tokens not for utility but to seek yield arbitrage between economic layers. This evolution—while promising in terms of capital efficiency—introduces new systemic risks that detract from the core promise of deterministic finance.
In the next section, we’ll explore how L3 innovation is reshaping our collective relationship with decentralization, identity, and digital sovereignty beyond economic frameworks.
Part 10 – Final Conclusions & Future Outlook
Final Reflection: Layer-3’s Potential, Pitfalls, and the Road Ahead
Layer-3 solutions promise unprecedented scalability, modular flexibility, and application-specific customization. Throughout this series, we've explored their technical architectures, economic designs, interoperability layers, and security trade-offs—each adding dimension to their still-forming identity in the blockchain hierarchy.
The strongest use case for L3s is deeply verticalized environments—gaming worlds, privacy-focused zones, or DeFi clusters—with specific on-chain execution needs and user flows. In optimal scenarios, they act as execution silos optimized for niche demands while retaining L2 security guarantees. These setups drastically reduce gas costs, allow for high UX fidelity, and unlock bespoke governance systems. A relevant example is Astar Network’s ecosystem, which offers insight into cross-layer governance and application support — Unlocking Astar Network The Future of Blockchain Interoperability.
However, this layered complexity introduces friction. L3s currently suffer from fragmented tooling, non-standard dev environments, and often speculative value narratives based more on token issuance than tangible throughput. Worst-case trajectories see them become redundant—either by smarter L2 stack compression or eventual L1 improvements integrating app-specific execution natively. Scenarios like mass protocol abandonment or fractured user bases creating liquidity silos are realistic concerns.
Key unanswered questions linger:
- Will bridges between L2 and L3 ever become trust-minimized and seamlessly functional without centralized relayers?
- Can L3 protocols maintain economic security long-term if their transaction volume doesn't justify maintenance costs relative to inherent validator overhead?
- Is the user experience of navigating L1 -> L2 -> L3 flows too cumbersome for non-technical participants, limiting mainstream viability?
For L3s to thrive, ecosystem alignment is essential. Tooling, standards, UX pathways, and capital efficiency from DeFi integration must converge under common frameworks. Integrations with user-friendly wallets, adoption by DAOs needing specialized execution logic, and organic liquidity migration will be forcing functions for survival or failure.
What’s clear: the blockchain stack is no longer linear—and the role of L3s will polarize between mission-critical infrastructure and experimental dead ends.
As the decentralized future unfolds, the question remains: will Layer-3s define a new application-centric era of blockchain utility—or will they be remembered as scalability’s overengineered detour?
If you’re exploring Layer 2 or L3 strategies—or want to get started in multichain DeFi ecosystems—this referral link offers a straightforward entry point into the most liquid CEX supporting multi-chain assets.
Authors comments
This document was made by www.BestDapps.com