cancel
Showing results for 
Search instead for 
Did you mean: 

new to sap pi (concepts in sap pi)

Former Member
0 Kudos

I am new to sap pi,

i must prepare a transition questionnaire for a sap pi support. can anybody help me in preparing the questionnaire?

Accepted Solutions (1)

Accepted Solutions (1)

Former Member
0 Kudos

How new are you?

You probably want to know what transaction are going through XI?

You will want to know the different adapters used in Configuration. What systems XI interfaces with?

What types of Mapping has been done in Design?

Learn the basics of monitoring messages.

Using TCode SXMB_MONI

Using Runtime Workbench

Answers (3)

Answers (3)

Former Member
0 Kudos

thanks for all the help

Former Member
0 Kudos

Apart from what Chirag has mentioned also look into the use of transactions SMQ1 & SMQ2. These would be very handy coz usually you face issues with queues getting stuck in production due to over-load.

Regards

Soumen...

rajasekhar_reddy14
Active Contributor
0 Kudos

Hi,

Recently i prepared one document for PI Support project,i hope this may help you...

--> What is the typeu2019s of business systems involving in current client landscape?

--> How many SAP Systems and no SAP Systems involving in current PI implementation?

--> How many total numbers of interfaces running in existing landscape?

--> How many Application to application (A2A) and Business to business interfaces (B2B)?

--> What is the frequency of interfaces?

--> How PI interacting with the internal/external systems?? Direct mode of communication or connecting to file server?

--> Any third party adapters used to connect external Systems?

--> What are the protocols used in connected to internal /external systems?

--> What is the message types used in connecting to External/internal systems?

--> Is there any EDI Message formats using in current PI implementation.

--> What are the types of adapters using in current PI implementation.

--> What is the version of SAP Net Weaver PI? What are the types of adapters using in current PI implementation.

--> What are the types of PI mappings implemented?

--> What are the types of security involved in message processing and network-level security?

--> The timelines to understand the current PI interfaces?

--> What is the time line to resolve any PI issue?

Regards,

Raj