Start Level 1 Node: Enabling Business-to-Business ProcessesEnabling Business-to-Business ProcessesEnd Level 1 Node: Enabling Business-to-Business Processes
   Start Level 2 Node: Getting InvolvedGetting InvolvedEnd Level 2 Node: Getting Involved
      Start Level 3 Node: Concepts of Process Integration (XI)Concepts of Process Integration (XI)End Level 3 Node: Concepts of Process Integration (XI)
         Start Level 4 Node: BasicsBasicsEnd Level 4 Node: Basics
            Start Level 5 Node: Design TimeDesign TimeEnd Level 5 Node: Design Time
            Start Level 5 Node: Configuration TimeConfiguration TimeEnd Level 5 Node: Configuration Time
            Start Level 5 Node: Implementing Collaborative ProcessesImplementing Collaborative ProcessesEnd Level 5 Node: Implementing Collaborative Processes
            Start Level 5 Node: Interface-Based Message ProcessingInterface-Based Message ProcessingEnd Level 5 Node: Interface-Based Message Processing
            Start Level 5 Node: MessagesMessagesEnd Level 5 Node: Messages
            Start Level 5 Node: Integration Server EnginesIntegration Server EnginesEnd Level 5 Node: Integration Server Engines
         Start Level 4 Node: XI ContentXI ContentEnd Level 4 Node: XI Content
         Start Level 4 Node: ConnectivityConnectivityEnd Level 4 Node: Connectivity
            Start Level 5 Node: Communication Using Proxy RuntimeCommunication Using Proxy RuntimeEnd Level 5 Node: Communication Using Proxy Runtime
               Start Level 6 Node: Integrating Business Systems by Using ABAP ProxiesIntegrating Business Systems by Using ABAP ProxiesEnd Level 6 Node: Integrating Business Systems by Using ABAP Proxies
               Start Level 6 Node: Integrating Business Systems by Using Java ProxiesIntegrating Business Systems by Using Java ProxiesEnd Level 6 Node: Integrating Business Systems by Using Java Proxies
            Start Level 5 Node: Communication Using Adapter RuntimeCommunication Using Adapter RuntimeEnd Level 5 Node: Communication Using Adapter Runtime
               Start Level 6 Node: Integrating Business Systems By Using the IDoc AdapterIntegrating Business Systems By Using the IDoc AdapterEnd Level 6 Node: Integrating Business Systems By Using the IDoc Adapter
               Start Level 6 Node: Integrating Business Systems by Using the RFC AdapterIntegrating Business Systems by Using the RFC AdapterEnd Level 6 Node: Integrating Business Systems by Using the RFC Adapter
               Start Level 6 Node: Integrating Business Systems by Using the Plain HTTP AdapterIntegrating Business Systems by Using the Plain HTTP AdapterEnd Level 6 Node: Integrating Business Systems by Using the Plain HTTP Adapter
               Start Level 6 Node: SAP Business Connector AdapterSAP Business Connector AdapterEnd Level 6 Node: SAP Business Connector Adapter
               Start Level 6 Node: File Adapter for Integrating Business SystemsFile Adapter for Integrating Business SystemsEnd Level 6 Node: File Adapter for Integrating Business Systems
               Start Level 6 Node: JDBC Adapter for Integrating Business SystemsJDBC Adapter for Integrating Business SystemsEnd Level 6 Node: JDBC Adapter for Integrating Business Systems
               Start Level 6 Node: Integrating Business Systems by Using the JMS AdapterIntegrating Business Systems by Using the JMS AdapterEnd Level 6 Node: Integrating Business Systems by Using the JMS Adapter
               Start Level 6 Node: Using the Mail Adapter to Integrate E-Mail ServersUsing the Mail Adapter to Integrate E-Mail ServersEnd Level 6 Node: Using the Mail Adapter to Integrate E-Mail Servers
               Start Level 6 Node: Integrating Marketplaces by Using the Marketplace AdapterIntegrating Marketplaces by Using the Marketplace AdapterEnd Level 6 Node: Integrating Marketplaces by Using the Marketplace Adapter
               Start Level 6 Node: Integrating Remote Client/Web Services by Using the SOAP AdapterIntegrating Remote Client/Web Services by Using the SOAP AdapterEnd Level 6 Node: Integrating Remote Client/Web Services by Using the SOAP Adapter
            Start Level 5 Node: Communication with Embedded Process IntegrationCommunication with Embedded Process IntegrationEnd Level 5 Node: Communication with Embedded Process Integration
            Start Level 5 Node: Communication Using Industry StandardsCommunication Using Industry StandardsEnd Level 5 Node: Communication Using Industry Standards
               Start Level 6 Node: Integration of Business Systems Using RNIF AdaptersIntegration of Business Systems Using RNIF AdaptersEnd Level 6 Node: Integration of Business Systems Using RNIF Adapters
               Start Level 6 Node: Integrating Business Systems with the CIDX AdapterIntegrating Business Systems with the CIDX AdapterEnd Level 6 Node: Integrating Business Systems with the CIDX Adapter
            Start Level 5 Node: Communication Between PI LandscapesCommunication Between PI LandscapesEnd Level 5 Node: Communication Between PI Landscapes
               Start Level 6 Node: Integrating PI Business PartnersIntegrating PI Business PartnersEnd Level 6 Node: Integrating PI Business Partners
               Start Level 6 Node: Integrating SAP XI 2.0 Business PartnersIntegrating SAP XI 2.0 Business PartnersEnd Level 6 Node: Integrating SAP XI 2.0 Business Partners
               Start Level 6 Node: Integrating Smaller Business Partners and SubsidiariesIntegrating Smaller Business Partners and SubsidiariesEnd Level 6 Node: Integrating Smaller Business Partners and Subsidiaries
            Start Level 5 Node: Sync/Async CommunicationSync/Async CommunicationEnd Level 5 Node: Sync/Async Communication
      Start Level 3 Node: Working with the Development EnvironmentWorking with the Development EnvironmentEnd Level 3 Node: Working with the Development Environment
   Start Level 2 Node: Go and CreateGo and CreateEnd Level 2 Node: Go and Create
      Start Level 3 Node: Business Partner Integration Using Industry StandardsBusiness Partner Integration Using Industry StandardsEnd Level 3 Node: Business Partner Integration Using Industry Standards
         Start Level 4 Node: Configuring the System LandscapeConfiguring the System LandscapeEnd Level 4 Node: Configuring the System Landscape
         Start Level 4 Node: Installing Business PackagesInstalling Business PackagesEnd Level 4 Node: Installing Business Packages
         Start Level 4 Node: Configuring B2B IntegrationConfiguring B2B IntegrationEnd Level 4 Node: Configuring B2B Integration
         Start Level 4 Node: Handling MessagesHandling MessagesEnd Level 4 Node: Handling Messages
         Start Level 4 Node: Monitoring Unbounded ProcessesMonitoring Unbounded ProcessesEnd Level 4 Node: Monitoring Unbounded Processes
      Start Level 3 Node: Small Business Partner and Subsidiary IntegrationSmall Business Partner and Subsidiary IntegrationEnd Level 3 Node: Small Business Partner and Subsidiary Integration
         Start Level 4 Node: Installing the Partner Connectivity KitInstalling the Partner Connectivity KitEnd Level 4 Node: Installing the Partner Connectivity Kit
         Start Level 4 Node: Configuring Integration with the Partner Connectivity KitConfiguring Integration with the Partner Connectivity KitEnd Level 4 Node: Configuring Integration with the Partner Connectivity Kit
         Start Level 4 Node: Configuring A2A IntegrationConfiguring A2A IntegrationEnd Level 4 Node: Configuring A2A Integration
         Start Level 4 Node: Handling Messages (with PCK)Handling Messages (with PCK)End Level 4 Node: Handling Messages (with PCK)
         Start Level 4 Node: Monitoring Unbounded Processes (with PCK)Monitoring Unbounded Processes (with PCK)End Level 4 Node: Monitoring Unbounded Processes (with PCK)
   Start Level 2 Node: Core Development TasksCore Development TasksEnd Level 2 Node: Core Development Tasks
      Start Level 3 Node: Developing Business LogicDeveloping Business LogicEnd Level 3 Node: Developing Business Logic
         Start Level 4 Node: Structure of Business PackagesStructure of Business PackagesEnd Level 4 Node: Structure of Business Packages
            Start Level 5 Node: Business Package for RosettaNetBusiness Package for RosettaNetEnd Level 5 Node: Business Package for RosettaNet
            Start Level 5 Node: Business Package for CIDXBusiness Package for CIDXEnd Level 5 Node: Business Package for CIDX
      Start Level 3 Node: Using Connectivity and InteroperabilityUsing Connectivity and InteroperabilityEnd Level 3 Node: Using Connectivity and Interoperability
      Start Level 3 Node: Applying ExtensibilityApplying ExtensibilityEnd Level 3 Node: Applying Extensibility
      Start Level 3 Node: Business Solution ConfigurationBusiness Solution ConfigurationEnd Level 3 Node: Business Solution Configuration
         Start Level 4 Node: ConfigurationConfigurationEnd Level 4 Node: Configuration
            Start Level 5 Node: Configuring Internal Company ProcessesConfiguring Internal Company ProcessesEnd Level 5 Node: Configuring Internal Company Processes
            Start Level 5 Node: Configuring Cross-Company ProcessesConfiguring Cross-Company ProcessesEnd Level 5 Node: Configuring Cross-Company Processes
            Start Level 5 Node: Configuration ScenarioConfiguration ScenarioEnd Level 5 Node: Configuration Scenario
               Start Level 6 Node: Grouping Configuration ObjectsGrouping Configuration ObjectsEnd Level 6 Node: Grouping Configuration Objects
               Start Level 6 Node: Configuration OverviewConfiguration OverviewEnd Level 6 Node: Configuration Overview
            Start Level 5 Node: Configuring Integration ScenariosConfiguring Integration ScenariosEnd Level 5 Node: Configuring Integration Scenarios
               Start Level 6 Node: Selecting an Integration Scenario (Component View)Selecting an Integration Scenario (Component View)End Level 6 Node: Selecting an Integration Scenario (Component View)
               Start Level 6 Node: Assigning ServicesAssigning ServicesEnd Level 6 Node: Assigning Services
               Start Level 6 Node: Configuring ConnectionsConfiguring ConnectionsEnd Level 6 Node: Configuring Connections
                  Start Level 7 Node: Assigning Communication ChannelsAssigning Communication ChannelsEnd Level 7 Node: Assigning Communication Channels
               Start Level 6 Node: Generating Configuration ObjectsGenerating Configuration ObjectsEnd Level 6 Node: Generating Configuration Objects
                  Start Level 7 Node: Settings for GenerationSettings for GenerationEnd Level 7 Node: Settings for Generation
               Start Level 6 Node: Generation LogGeneration LogEnd Level 6 Node: Generation Log
               Start Level 6 Node: Configuring B2B ScenariosConfiguring B2B ScenariosEnd Level 6 Node: Configuring B2B Scenarios
            Start Level 5 Node: Configuring Message ProcessingConfiguring Message ProcessingEnd Level 5 Node: Configuring Message Processing
            Start Level 5 Node: Configuration ObjectsConfiguration ObjectsEnd Level 5 Node: Configuration Objects
               Start Level 6 Node: Object Key in Configuration ObjectsObject Key in Configuration ObjectsEnd Level 6 Node: Object Key in Configuration Objects
                  Start Level 7 Node: Generic/Specific Definition of Configuration ObjectsGeneric/Specific Definition of Configuration ObjectsEnd Level 7 Node: Generic/Specific Definition of Configuration Objects
                     Start Level 8 Node: Examples of Generic/Specific Definition of Interface DeterminatiExamples of Generic/Specific Definition of Interface DeterminatiEnd Level 8 Node: Examples of Generic/Specific Definition of Interface Determinati
               Start Level 6 Node: Collaboration ProfileCollaboration ProfileEnd Level 6 Node: Collaboration Profile
                  Start Level 7 Node: Communication PartyCommunication PartyEnd Level 7 Node: Communication Party
                     Start Level 8 Node: IdentifiersIdentifiersEnd Level 8 Node: Identifiers
                  Start Level 7 Node: ServiceServiceEnd Level 7 Node: Service
                     Start Level 8 Node: Adapter-Specific IdentifiersAdapter-Specific IdentifiersEnd Level 8 Node: Adapter-Specific Identifiers
                     Start Level 8 Node: Access Control Using Assigned UsersAccess Control Using Assigned UsersEnd Level 8 Node: Access Control Using Assigned Users
                     Start Level 8 Node: Business System (Service)Business System (Service)End Level 8 Node: Business System (Service)
                        Start Level 9 Node: Defining a Business System as a ServiceDefining a Business System as a ServiceEnd Level 9 Node: Defining a Business System as a Service
                     Start Level 8 Node: Business ServiceBusiness ServiceEnd Level 8 Node: Business Service
                     Start Level 8 Node: Integration Process (Service)Integration Process (Service)End Level 8 Node: Integration Process (Service)
                        Start Level 9 Node: Defining an Integration Process as a ServiceDefining an Integration Process as a ServiceEnd Level 9 Node: Defining an Integration Process as a Service
                  Start Level 7 Node: Communication ChannelCommunication ChannelEnd Level 7 Node: Communication Channel
                     Start Level 8 Node: Creating Communication Channels AutomaticallyCreating Communication Channels AutomaticallyEnd Level 8 Node: Creating Communication Channels Automatically
               Start Level 6 Node: Collaboration AgreementCollaboration AgreementEnd Level 6 Node: Collaboration Agreement
                  Start Level 7 Node: Receiver AgreementReceiver AgreementEnd Level 7 Node: Receiver Agreement
                     Start Level 8 Node: Security Settings for the Receiver XI AdapterSecurity Settings for the Receiver XI AdapterEnd Level 8 Node: Security Settings for the Receiver XI Adapter
                     Start Level 8 Node: Security Settings for the Receiver SOAP AdapterSecurity Settings for the Receiver SOAP AdapterEnd Level 8 Node: Security Settings for the Receiver SOAP Adapter
                     Start Level 8 Node: Security Settings for the Receiver Mail AdapterSecurity Settings for the Receiver Mail AdapterEnd Level 8 Node: Security Settings for the Receiver Mail Adapter
                  Start Level 7 Node: Sender AgreementSender AgreementEnd Level 7 Node: Sender Agreement
                     Start Level 8 Node: Security Settings for the Sender XI AdapterSecurity Settings for the Sender XI AdapterEnd Level 8 Node: Security Settings for the Sender XI Adapter
                     Start Level 8 Node: Security Settings for the Sender SOAP AdapterSecurity Settings for the Sender SOAP AdapterEnd Level 8 Node: Security Settings for the Sender SOAP Adapter
                     Start Level 8 Node: Security Settings for the Sender Mail AdapterSecurity Settings for the Sender Mail AdapterEnd Level 8 Node: Security Settings for the Sender Mail Adapter
               Start Level 6 Node: Logical Routing ObjectsLogical Routing ObjectsEnd Level 6 Node: Logical Routing Objects
                  Start Level 7 Node: Receiver DeterminationReceiver DeterminationEnd Level 7 Node: Receiver Determination
                     Start Level 8 Node: Standard Receiver DeterminationStandard Receiver DeterminationEnd Level 8 Node: Standard Receiver Determination
                        Start Level 9 Node: Example of a Receiver DeterminationExample of a Receiver DeterminationEnd Level 9 Node: Example of a Receiver Determination
                     Start Level 8 Node: Enhanced Receiver DeterminationEnhanced Receiver DeterminationEnd Level 8 Node: Enhanced Receiver Determination
                  Start Level 7 Node: Interface DeterminationInterface DeterminationEnd Level 7 Node: Interface Determination
                     Start Level 8 Node: Standard Interface DeterminationStandard Interface DeterminationEnd Level 8 Node: Standard Interface Determination
                     Start Level 8 Node: Enhanced (Mapping-Based) Interface DeterminationEnhanced (Mapping-Based) Interface DeterminationEnd Level 8 Node: Enhanced (Mapping-Based) Interface Determination
            Start Level 5 Node: Integration Directory Programming InterfaceIntegration Directory Programming InterfaceEnd Level 5 Node: Integration Directory Programming Interface
               Start Level 6 Node: Examples of Possible ApplicationsExamples of Possible ApplicationsEnd Level 6 Node: Examples of Possible Applications
               Start Level 6 Node: Calling the Programming InterfaceCalling the Programming InterfaceEnd Level 6 Node: Calling the Programming Interface
                  Start Level 7 Node: Prerequisites for Using the Programming InterfacePrerequisites for Using the Programming InterfaceEnd Level 7 Node: Prerequisites for Using the Programming Interface
                     Start Level 8 Node: Assigning PermissionsAssigning PermissionsEnd Level 8 Node: Assigning Permissions
                     Start Level 8 Node: Calling and Completing Web Service Descriptions.Calling and Completing Web Service Descriptions.End Level 8 Node: Calling and Completing Web Service Descriptions.
                  Start Level 7 Node: Code Example for WS Call (SAP NetWeaver Developer Studio)Code Example for WS Call (SAP NetWeaver Developer Studio)End Level 7 Node: Code Example for WS Call (SAP NetWeaver Developer Studio)
                  Start Level 7 Node: Generating Web Service Client (Eclipse Web Tools Platform)Generating Web Service Client (Eclipse Web Tools Platform)End Level 7 Node: Generating Web Service Client (Eclipse Web Tools Platform)
                  Start Level 7 Node: Code Example for Web Service Call (Eclipse Web Tools Platform)Code Example for Web Service Call (Eclipse Web Tools Platform)End Level 7 Node: Code Example for Web Service Call (Eclipse Web Tools Platform)
                  Start Level 7 Node: Calling WS Using Test Environment (Web Services Navigator)Calling WS Using Test Environment (Web Services Navigator)End Level 7 Node: Calling WS Using Test Environment (Web Services Navigator)
               Start Level 6 Node: Description of the Programming InterfaceDescription of the Programming InterfaceEnd Level 6 Node: Description of the Programming Interface
                  Start Level 7 Node: Operations on Configuration ObjectsOperations on Configuration ObjectsEnd Level 7 Node: Operations on Configuration Objects
                     Start Level 8 Node: Overview of the OperationsOverview of the OperationsEnd Level 8 Node: Overview of the Operations
                     Start Level 8 Node: Create an Object (Create)Create an Object (Create)End Level 8 Node: Create an Object (Create)
                     Start Level 8 Node: Creating an Object from a Template (CreateFromTemplate)Creating an Object from a Template (CreateFromTemplate)End Level 8 Node: Creating an Object from a Template (CreateFromTemplate)
                     Start Level 8 Node: Changing an Object (Change)Changing an Object (Change)End Level 8 Node: Changing an Object (Change)
                     Start Level 8 Node: Reading an Object (Read)Reading an Object (Read)End Level 8 Node: Reading an Object (Read)
                     Start Level 8 Node: Deleting an Object (Delete)Deleting an Object (Delete)End Level 8 Node: Deleting an Object (Delete)
                     Start Level 8 Node: Checking an Object (Check)Checking an Object (Check)End Level 8 Node: Checking an Object (Check)
                     Start Level 8 Node: Searching for an Object (Query)Searching for an Object (Query)End Level 8 Node: Searching for an Object (Query)
                     Start Level 8 Node: Opening an Object for Processing (OpenForEdit)Opening an Object for Processing (OpenForEdit)End Level 8 Node: Opening an Object for Processing (OpenForEdit)
                     Start Level 8 Node: Rejecting Changes to an Object (Revert)Rejecting Changes to an Object (Revert)End Level 8 Node: Rejecting Changes to an Object (Revert)
                  Start Level 7 Node: Description of Object TypesDescription of Object TypesEnd Level 7 Node: Description of Object Types
                     Start Level 8 Node: Cross-Object-Type ElementsCross-Object-Type ElementsEnd Level 8 Node: Cross-Object-Type Elements
                     Start Level 8 Node: Communication PartyCommunication PartyEnd Level 8 Node: Communication Party
                     Start Level 8 Node: ServiceServiceEnd Level 8 Node: Service
                     Start Level 8 Node: Communication ChannelCommunication ChannelEnd Level 8 Node: Communication Channel
                     Start Level 8 Node: Receiver DeterminationReceiver DeterminationEnd Level 8 Node: Receiver Determination
                     Start Level 8 Node: Interface DeterminationInterface DeterminationEnd Level 8 Node: Interface Determination
                     Start Level 8 Node: Sender AgreementSender AgreementEnd Level 8 Node: Sender Agreement
                     Start Level 8 Node: Receiver AgreementReceiver AgreementEnd Level 8 Node: Receiver Agreement
                     Start Level 8 Node: Value MappingValue MappingEnd Level 8 Node: Value Mapping
                     Start Level 8 Node: Configuration ScenarioConfiguration ScenarioEnd Level 8 Node: Configuration Scenario
                  Start Level 7 Node: Operations on Change ListsOperations on Change ListsEnd Level 7 Node: Operations on Change Lists
                     Start Level 8 Node: Overview of the OperationsOverview of the OperationsEnd Level 8 Node: Overview of the Operations
                     Start Level 8 Node: Create a Change List (Create)Create a Change List (Create)End Level 8 Node: Create a Change List (Create)
                     Start Level 8 Node: Activate a Change List (Activate)Activate a Change List (Activate)End Level 8 Node: Activate a Change List (Activate)
                     Start Level 8 Node: Reset a Change List (Revert)Reset a Change List (Revert)End Level 8 Node: Reset a Change List (Revert)
                     Start Level 8 Node: List the Objects in a Change List (GetObjectIdentifiers)List the Objects in a Change List (GetObjectIdentifiers)End Level 8 Node: List the Objects in a Change List (GetObjectIdentifiers)
                     Start Level 8 Node: Consistency Check (CheckContent)Consistency Check (CheckContent)End Level 8 Node: Consistency Check (CheckContent)
                     Start Level 8 Node: Determining Status of Change List (GetState)Determining Status of Change List (GetState)End Level 8 Node: Determining Status of Change List (GetState)
                     Start Level 8 Node: Determine Runtime Cache Status (GetCacheState)Determine Runtime Cache Status (GetCacheState)End Level 8 Node: Determine Runtime Cache Status (GetCacheState)
                  Start Level 7 Node: Description of Change ListsDescription of Change ListsEnd Level 7 Node: Description of Change Lists
               Start Level 6 Node: TroubleshootingTroubleshootingEnd Level 6 Node: Troubleshooting
                  Start Level 7 Node: SeveritySeverityEnd Level 7 Node: Severity
                  Start Level 7 Node: Technical Error CodeTechnical Error CodeEnd Level 7 Node: Technical Error Code
               Start Level 6 Node: Special Tasks and InformationSpecial Tasks and InformationEnd Level 6 Node: Special Tasks and Information
                  Start Level 7 Node: Defining Object ReferencesDefining Object ReferencesEnd Level 7 Node: Defining Object References
                  Start Level 7 Node: Notes on Working with Complex Configuration ObjectsNotes on Working with Complex Configuration ObjectsEnd Level 7 Node: Notes on Working with Complex Configuration Objects
                  Start Level 7 Node: Notes on Working with PasswordsNotes on Working with PasswordsEnd Level 7 Node: Notes on Working with Passwords
                  Start Level 7 Node: Notes on Working with Languages and Language-Dependent TextsNotes on Working with Languages and Language-Dependent TextsEnd Level 7 Node: Notes on Working with Languages and Language-Dependent Texts
               Start Level 6 Node: Recommendations on Call SequenceRecommendations on Call SequenceEnd Level 6 Node: Recommendations on Call Sequence
            Start Level 5 Node: Security SettingsSecurity SettingsEnd Level 5 Node: Security Settings
               Start Level 6 Node: Message Security (Overview)Message Security (Overview)End Level 6 Node: Message Security (Overview)
               Start Level 6 Node: Transport Security (Overview)Transport Security (Overview)End Level 6 Node: Transport Security (Overview)
            Start Level 5 Node: Value MappingValue MappingEnd Level 5 Node: Value Mapping
               Start Level 6 Node: Displaying/Editing the Value Mapping TableDisplaying/Editing the Value Mapping TableEnd Level 6 Node: Displaying/Editing the Value Mapping Table
               Start Level 6 Node: Value Mapping Replication for Mass DataValue Mapping Replication for Mass DataEnd Level 6 Node: Value Mapping Replication for Mass Data
            Start Level 5 Node: Additional FunctionsAdditional FunctionsEnd Level 5 Node: Additional Functions
               Start Level 6 Node: Testing the ConfigurationTesting the ConfigurationEnd Level 6 Node: Testing the Configuration
               Start Level 6 Node: Defining Web ServicesDefining Web ServicesEnd Level 6 Node: Defining Web Services
               Start Level 6 Node: Analyzing the Runtime CacheAnalyzing the Runtime CacheEnd Level 6 Node: Analyzing the Runtime Cache
                  Start Level 7 Node: Analyzing an Integration Process in the XI Runtime CacheAnalyzing an Integration Process in the XI Runtime CacheEnd Level 7 Node: Analyzing an Integration Process in the XI Runtime Cache
                  Start Level 7 Node: Error Analysis (Integration Processes)Error Analysis (Integration Processes)End Level 7 Node: Error Analysis (Integration Processes)
            Start Level 5 Node: System Landscape Directory in SAP Exchange InfrastructureSystem Landscape Directory in SAP Exchange InfrastructureEnd Level 5 Node: System Landscape Directory in SAP Exchange Infrastructure
               Start Level 6 Node: Configuring a Business SystemConfiguring a Business SystemEnd Level 6 Node: Configuring a Business System
               Start Level 6 Node: Configuring Groups and Transport TargetsConfiguring Groups and Transport TargetsEnd Level 6 Node: Configuring Groups and Transport Targets
         Start Level 4 Node: Configuration with the PCKConfiguration with the PCKEnd Level 4 Node: Configuration with the PCK
            Start Level 5 Node: Collaboration ProfileCollaboration ProfileEnd Level 5 Node: Collaboration Profile
               Start Level 6 Node: Communication PartyCommunication PartyEnd Level 6 Node: Communication Party
                  Start Level 7 Node: IdentifiersIdentifiersEnd Level 7 Node: Identifiers
               Start Level 6 Node: ServiceServiceEnd Level 6 Node: Service
                  Start Level 7 Node: Business ServiceBusiness ServiceEnd Level 7 Node: Business Service
               Start Level 6 Node: Communication ChannelCommunication ChannelEnd Level 6 Node: Communication Channel
            Start Level 5 Node: Collaboration AgreementCollaboration AgreementEnd Level 5 Node: Collaboration Agreement
               Start Level 6 Node: Receiver AgreementReceiver AgreementEnd Level 6 Node: Receiver Agreement
                  Start Level 7 Node: Security Settings for the Receiver XI AdapterSecurity Settings for the Receiver XI AdapterEnd Level 7 Node: Security Settings for the Receiver XI Adapter
                  Start Level 7 Node: Security Settings for the Receiver SOAP AdapterSecurity Settings for the Receiver SOAP AdapterEnd Level 7 Node: Security Settings for the Receiver SOAP Adapter
                  Start Level 7 Node: Security Settings for the Receiver Mail AdapterSecurity Settings for the Receiver Mail AdapterEnd Level 7 Node: Security Settings for the Receiver Mail Adapter
               Start Level 6 Node: Sender AgreementSender AgreementEnd Level 6 Node: Sender Agreement
                  Start Level 7 Node: Security Settings for the Sender XI AdapterSecurity Settings for the Sender XI AdapterEnd Level 7 Node: Security Settings for the Sender XI Adapter
                  Start Level 7 Node: Security Settings for the Sender SOAP AdapterSecurity Settings for the Sender SOAP AdapterEnd Level 7 Node: Security Settings for the Sender SOAP Adapter
                  Start Level 7 Node: Security Settings for the Sender Mail AdapterSecurity Settings for the Sender Mail AdapterEnd Level 7 Node: Security Settings for the Sender Mail Adapter
            Start Level 5 Node: Generic/Specific Definition of Configuration ObjectsGeneric/Specific Definition of Configuration ObjectsEnd Level 5 Node: Generic/Specific Definition of Configuration Objects
               Start Level 6 Node: Generic/Specific Definition of Sender AgreementsGeneric/Specific Definition of Sender AgreementsEnd Level 6 Node: Generic/Specific Definition of Sender Agreements
               Start Level 6 Node: Generic/Specific Definition of Receiver AgreementsGeneric/Specific Definition of Receiver AgreementsEnd Level 6 Node: Generic/Specific Definition of Receiver Agreements
   Start Level 2 Node: Ensuring QualityEnsuring QualityEnd Level 2 Node: Ensuring Quality
      Start Level 3 Node: TestingTestingEnd Level 3 Node: Testing
      Start Level 3 Node: Logging and TracingLogging and TracingEnd Level 3 Node: Logging and Tracing
   Start Level 2 Node: IntegrationIntegrationEnd Level 2 Node: Integration
      Start Level 3 Node: Using Third PartyUsing Third PartyEnd Level 3 Node: Using Third Party
   Start Level 2 Node: ReferenceReferenceEnd Level 2 Node: Reference
      Start Level 3 Node: Configuration Example: Message ExchangeConfiguration Example: Message ExchangeEnd Level 3 Node: Configuration Example: Message Exchange
         Start Level 4 Node: Configuration Objects in the Sender PCKConfiguration Objects in the Sender PCKEnd Level 4 Node: Configuration Objects in the Sender PCK
         Start Level 4 Node: Configuration Objects in the Integration ServerConfiguration Objects in the Integration ServerEnd Level 4 Node: Configuration Objects in the Integration Server
         Start Level 4 Node: Configuration Objects in the Receiver PCKConfiguration Objects in the Receiver PCKEnd Level 4 Node: Configuration Objects in the Receiver PCK