SlideShare a Scribd company logo
1 of 23
OSI Layer Model
Open Systems
Interconnection (OSI)
Model
CONTENTS
 What is OSI?
 Layer Architecture
 The 7 OSI Layers
 Interaction between the OSI layers
 Conclusion
What is OSI?
 The Open Systems Interconnection (OSI) is a model
that was developed by the ISO (International
Organization for Standards ) and it describes how
information from a software application in one
computer, moves through a network medium to a
software application in another computer.
Layer Architecture
Layer architecture simplifies the network design.
It is easy to debug network applications in a layered
architecture network.
The network management is easier due to the layered
architecture.
Network layers follow a set of rules, called protocol.
The protocol defines the format of the data being
exchanged, and the control and timing for the handshake
between layers.
Characteristics of the OSI
Upper layers
7 Layers


 Lower layers


The Upper Layers: This deals with Application issues
and generally are implemented only in software. The
highest layer, application layer is closest to the end
user. This layer is where communication from one
end user to another begins through the interaction
between the application layer processes and the end
user.
The Lower layers: This handles Data transport
issues. The physical layer and Data link layers are
implemented in hardware and software.
OSI & TCP/IP Models layers
TCP/IP Model
Copyrights to 2021hacker
OSI Reference Model: 7 Layers
Physical Layer
Provides physical interface for transmission of information.
Defines rules by which bits are passed from one system to
another on a physical communication medium.
Such characteristics as voltage levels, timing of voltage
changes, physical data rates, maximum transmission
distances, physical connectors, and other similar attributes are
defined by physical layer specifications.
OSI Model
Data Link Layer
Breaks the outgoing data into frames and reassemble the
received frames.
Handle errors by implementing an acknowledgement and
retransmission scheme.
Implement flow control.
half-duplex or full-duplex
Supports simplex,
communication.
OSI Model
Network Layer
Implements routing of packets through the network.
 Defines the most optimum path the packet should take
from the source to the destination
 Defines logical addressing so that any endpoint can be
identified.
 Routers and L3 Switches works here.
 IP address understandable layer
OSI Model
Source-to-destination delivery
Transport Layer
Purpose of this layer is to provide a reliable mechanism for the
exchange of data between two processes in different
computers.
Ensures that the data units are delivered error free.
Ensures that data units are delivered in sequence.
Ensures that there is no loss or duplication of data units.
Provides connectionless or connection oriented service.
OSI Model
Session Layer



Session layer provides mechanism for controlling the dialogue
between the two end systems. It defines how to start, control and
end conversations (called sessions) between applications.
This layer requests for a logical connection to be established on an
end-user’s request.
Any necessary log-on or password validation is also handled by
this layer.
Session layer is also responsible for terminating the connection.
OSI Model
Presentation Layer
Presentation layer defines the format in which the data is to be
exchanged between the two communicating entities.
Also handles data compression and data encryption
(cryptography).
OSI Model
Application Layer
Application layer interacts with application programs and
is the highest level of OSI model.
Examples of application layer are applications such as file
transfer, electronic mail, remote login etc.
OSI Model
Interaction Between OSI Model
Layers
 Information sent from a software application
in one system to a software application in
another, must pass through each of the OSI
layers. An example of this is shown in the
diagram below:
OSI in Action
A message begins at the top
application layer and moves down
the OSI layers to the bottom
physical layer.
As the message descends, each
successive OSI model layer adds a
header to it.
A header is layer-specific
information that basically explains
what functions the layer carried
out.
Conversely, at the receiving end,
headers are striped from the
the
message as it travels up
corresponding layers.
OSI Model
7 1 Application Application I 7
7-6 interface 7-6 interface
6 Presentation Presentation 6
6-5 interface 6-5 interface
5 Session Session 5
5-4 interface 5-4 interface
4 Transport Transport I 4
4-3 interface 4-3 interface
3 Network Network Network 3
3-2 interface 3-2 interface
2 1 Data link Data link Data link Data link 2
2- 1interface
Physical Physical Physical
2-1 interface
Physical I 1
F i g u r e 3 . 2 OSIlayers
Device
A Intermediate
node
Device
B
Link Link
Physical communication Physical communication
 A given layer within the OSI model
communicates with three other layers:the
layer directly above it, the layer directly
below it and it’s peer layer in other networked
computer system. In the diagram below, the
data link layer in system A, communicates
with the network layer and physical layer of
system A. It also communicates with the data
link layer of system B.
Copyrights to 2021hacker
Conclusion
 Overall, this presentation has tried to
describe the OSI model,what it is all about
and how communication occurs through the
layers of the model from one user to
another .

More Related Content

Similar to OSI Model.pptx (20)

OSI MODEL
    OSI MODEL    OSI MODEL
OSI MODEL
 
Lecture2
Lecture2Lecture2
Lecture2
 
Lecture2
Lecture2Lecture2
Lecture2
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
OSI & TCP model
OSI & TCP modelOSI & TCP model
OSI & TCP model
 
OSI Model - Open Systems Interconnection
OSI Model - Open Systems InterconnectionOSI Model - Open Systems Interconnection
OSI Model - Open Systems Interconnection
 
THE OSI MODEL
THE OSI MODEL THE OSI MODEL
THE OSI MODEL
 
Osi
OsiOsi
Osi
 
Osi model
Osi model Osi model
Osi model
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Lecture 05
Lecture 05Lecture 05
Lecture 05
 
Lecture 03
Lecture 03Lecture 03
Lecture 03
 
OSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptxOSI Reference Model-Lecture-2.pptx
OSI Reference Model-Lecture-2.pptx
 
DCN _ unit 2.pptx
DCN _ unit 2.pptxDCN _ unit 2.pptx
DCN _ unit 2.pptx
 
Networking overview
Networking overviewNetworking overview
Networking overview
 
what is OSI model
what is OSI modelwhat is OSI model
what is OSI model
 
Osi model
Osi modelOsi model
Osi model
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 
COMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IPCOMPUTER NETWORK_OSI & TCP/IP
COMPUTER NETWORK_OSI & TCP/IP
 

More from karmaYonten5

Image operating.pptx
Image operating.pptxImage operating.pptx
Image operating.pptxkarmaYonten5
 
Troubleshooting.pptx
Troubleshooting.pptxTroubleshooting.pptx
Troubleshooting.pptxkarmaYonten5
 
WIN XP SP1,2,3.pptx
WIN XP SP1,2,3.pptxWIN XP SP1,2,3.pptx
WIN XP SP1,2,3.pptxkarmaYonten5
 
DZONGKHA UNICODE.pptx
DZONGKHA UNICODE.pptxDZONGKHA UNICODE.pptx
DZONGKHA UNICODE.pptxkarmaYonten5
 
software compatibility.pptx
software compatibility.pptxsoftware compatibility.pptx
software compatibility.pptxkarmaYonten5
 
INSTALL APLLICATION SOFTWARE.pptx
INSTALL APLLICATION SOFTWARE.pptxINSTALL APLLICATION SOFTWARE.pptx
INSTALL APLLICATION SOFTWARE.pptxkarmaYonten5
 
INSTALL WINDOW OS.ppt
INSTALL WINDOW OS.pptINSTALL WINDOW OS.ppt
INSTALL WINDOW OS.pptkarmaYonten5
 
CONFIGURE SOFTWARE, CONDUCT TEST.pptx
CONFIGURE SOFTWARE, CONDUCT TEST.pptxCONFIGURE SOFTWARE, CONDUCT TEST.pptx
CONFIGURE SOFTWARE, CONDUCT TEST.pptxkarmaYonten5
 
COUSTIMISE DISK PARTITION (1).pptx
COUSTIMISE DISK PARTITION  (1).pptxCOUSTIMISE DISK PARTITION  (1).pptx
COUSTIMISE DISK PARTITION (1).pptxkarmaYonten5
 
Backup Data (cloud storage).pptx
Backup Data (cloud storage).pptxBackup Data (cloud storage).pptx
Backup Data (cloud storage).pptxkarmaYonten5
 
Network Topologies.pptx
Network Topologies.pptxNetwork Topologies.pptx
Network Topologies.pptxkarmaYonten5
 

More from karmaYonten5 (13)

Image operating.pptx
Image operating.pptxImage operating.pptx
Image operating.pptx
 
Troubleshooting.pptx
Troubleshooting.pptxTroubleshooting.pptx
Troubleshooting.pptx
 
Memory.pptx
Memory.pptxMemory.pptx
Memory.pptx
 
WIN XP SP1,2,3.pptx
WIN XP SP1,2,3.pptxWIN XP SP1,2,3.pptx
WIN XP SP1,2,3.pptx
 
DZONGKHA UNICODE.pptx
DZONGKHA UNICODE.pptxDZONGKHA UNICODE.pptx
DZONGKHA UNICODE.pptx
 
software compatibility.pptx
software compatibility.pptxsoftware compatibility.pptx
software compatibility.pptx
 
INSTALL APLLICATION SOFTWARE.pptx
INSTALL APLLICATION SOFTWARE.pptxINSTALL APLLICATION SOFTWARE.pptx
INSTALL APLLICATION SOFTWARE.pptx
 
INSTALL WINDOW OS.ppt
INSTALL WINDOW OS.pptINSTALL WINDOW OS.ppt
INSTALL WINDOW OS.ppt
 
CONFIGURE SOFTWARE, CONDUCT TEST.pptx
CONFIGURE SOFTWARE, CONDUCT TEST.pptxCONFIGURE SOFTWARE, CONDUCT TEST.pptx
CONFIGURE SOFTWARE, CONDUCT TEST.pptx
 
COUSTIMISE DISK PARTITION (1).pptx
COUSTIMISE DISK PARTITION  (1).pptxCOUSTIMISE DISK PARTITION  (1).pptx
COUSTIMISE DISK PARTITION (1).pptx
 
Backup Data (cloud storage).pptx
Backup Data (cloud storage).pptxBackup Data (cloud storage).pptx
Backup Data (cloud storage).pptx
 
Network Topologies.pptx
Network Topologies.pptxNetwork Topologies.pptx
Network Topologies.pptx
 
TCP&IP Model.pptx
TCP&IP Model.pptxTCP&IP Model.pptx
TCP&IP Model.pptx
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

OSI Model.pptx

  • 1. OSI Layer Model Open Systems Interconnection (OSI) Model
  • 2. CONTENTS  What is OSI?  Layer Architecture  The 7 OSI Layers  Interaction between the OSI layers  Conclusion
  • 3. What is OSI?  The Open Systems Interconnection (OSI) is a model that was developed by the ISO (International Organization for Standards ) and it describes how information from a software application in one computer, moves through a network medium to a software application in another computer.
  • 4. Layer Architecture Layer architecture simplifies the network design. It is easy to debug network applications in a layered architecture network. The network management is easier due to the layered architecture. Network layers follow a set of rules, called protocol. The protocol defines the format of the data being exchanged, and the control and timing for the handshake between layers.
  • 5. Characteristics of the OSI Upper layers 7 Layers    Lower layers
  • 6.   The Upper Layers: This deals with Application issues and generally are implemented only in software. The highest layer, application layer is closest to the end user. This layer is where communication from one end user to another begins through the interaction between the application layer processes and the end user. The Lower layers: This handles Data transport issues. The physical layer and Data link layers are implemented in hardware and software.
  • 7. OSI & TCP/IP Models layers TCP/IP Model
  • 8. Copyrights to 2021hacker OSI Reference Model: 7 Layers
  • 9. Physical Layer Provides physical interface for transmission of information. Defines rules by which bits are passed from one system to another on a physical communication medium. Such characteristics as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors, and other similar attributes are defined by physical layer specifications. OSI Model
  • 10. Data Link Layer Breaks the outgoing data into frames and reassemble the received frames. Handle errors by implementing an acknowledgement and retransmission scheme. Implement flow control. half-duplex or full-duplex Supports simplex, communication. OSI Model
  • 11. Network Layer Implements routing of packets through the network.  Defines the most optimum path the packet should take from the source to the destination  Defines logical addressing so that any endpoint can be identified.  Routers and L3 Switches works here.  IP address understandable layer OSI Model
  • 13. Transport Layer Purpose of this layer is to provide a reliable mechanism for the exchange of data between two processes in different computers. Ensures that the data units are delivered error free. Ensures that data units are delivered in sequence. Ensures that there is no loss or duplication of data units. Provides connectionless or connection oriented service. OSI Model
  • 14. Session Layer    Session layer provides mechanism for controlling the dialogue between the two end systems. It defines how to start, control and end conversations (called sessions) between applications. This layer requests for a logical connection to be established on an end-user’s request. Any necessary log-on or password validation is also handled by this layer. Session layer is also responsible for terminating the connection. OSI Model
  • 15. Presentation Layer Presentation layer defines the format in which the data is to be exchanged between the two communicating entities. Also handles data compression and data encryption (cryptography). OSI Model
  • 16. Application Layer Application layer interacts with application programs and is the highest level of OSI model. Examples of application layer are applications such as file transfer, electronic mail, remote login etc. OSI Model
  • 17. Interaction Between OSI Model Layers  Information sent from a software application in one system to a software application in another, must pass through each of the OSI layers. An example of this is shown in the diagram below:
  • 18.
  • 19. OSI in Action A message begins at the top application layer and moves down the OSI layers to the bottom physical layer. As the message descends, each successive OSI model layer adds a header to it. A header is layer-specific information that basically explains what functions the layer carried out. Conversely, at the receiving end, headers are striped from the the message as it travels up corresponding layers. OSI Model
  • 20. 7 1 Application Application I 7 7-6 interface 7-6 interface 6 Presentation Presentation 6 6-5 interface 6-5 interface 5 Session Session 5 5-4 interface 5-4 interface 4 Transport Transport I 4 4-3 interface 4-3 interface 3 Network Network Network 3 3-2 interface 3-2 interface 2 1 Data link Data link Data link Data link 2 2- 1interface Physical Physical Physical 2-1 interface Physical I 1 F i g u r e 3 . 2 OSIlayers Device A Intermediate node Device B Link Link Physical communication Physical communication
  • 21.  A given layer within the OSI model communicates with three other layers:the layer directly above it, the layer directly below it and it’s peer layer in other networked computer system. In the diagram below, the data link layer in system A, communicates with the network layer and physical layer of system A. It also communicates with the data link layer of system B.
  • 23. Conclusion  Overall, this presentation has tried to describe the OSI model,what it is all about and how communication occurs through the layers of the model from one user to another .