8.3.2 Monitor Load During Delivery ........................................................................................................ 170
8.4 END OF BATCH PROCESSING ................................................................................................................ 170
8.4.1 Ending a Batch on MultiLoad ......................................................................................................... 170
8.5 END OF TRANSACTION PROCESSING ..................................................................................................... 171
8.5.1 Ending a Transaction on MultiLoad ............................................................................................... 171
8.6 SHUTDOWN OF HOST SOFTWARE .......................................................................................................... 171
CHAPTER 9 DATA COMMUNICATION NOTES AND RECOMMENDATIONS ........................................... 172
9.1 PROTOCOL SELECTION: RS-232 VS. RS-485 ........................................................................................ 172
9.1.1 RS-232 ........................................................................................................................................... 172
9.1.2 RS-485 ........................................................................................................................................... 172
9.2 CABLE SELECTION................................................................................................................................ 172
9.3 LINE TERMINATION IN MULTI-DROPPED COMMUNICATIONS ..................................................................... 172
9.4 OPTICAL ISOLATION .............................................................................................................................. 173
9.5 SHIELD GROUNDING ............................................................................................................................. 173
CHAPTER 10 PARAMETER ACCESS SECURITY .................................................................................... 174
10.1 UNDERSTANDING NEW USER AND SECURITY FEATURES ......................................................................... 174