Figure 2: Request interception points occur at four points along the end-to-end invocation path from client to server