There are two policy interceptor pipelines. The first pipeline is depicted as a series of seven boxes in the following order: Management, Context, Atomic Transaction, Reliable Messaging, Addressing, Security, and MTOM. An arrow, indicating a Request, points from a client to the policy interceptor pipeline. The arrow continues from the end of the pipeline and points to a Network "cloud." The arrow continues and points to a second policy interceptor pipeline. The second pipeline is depicted as a series of nine boxes in the following order: Fast Infoset, MTOM, Security, Addressing, MEX, Reliable Messaging, Atomic Transaction, Context, and Management. The arrow points from the end of the pipeline to a Web service. There is another arrow, indicating a Response, that follows the reverse path. This arrow points from the Web service, to the second policy interceptor pipeline, to the Network cloud, to the first interceptor pipeline, ending at the client.