Posted on 16 Dec, 2016, in Uncategorized
This article explains security mechanisms which may be implemented to prevent ethernet ports assigned to access points being used by other devices.
Posted on 02 Dec, 2016, in Uncategorized
This article tries to explain the relation between Access Requests, Access Retries, and Access Timeouts