What are the technical implications and potential security measures associated with an endpoint abandoning an Extensible Authentication Protocol (EAP) session and initiating a new one, particularly in environments requiring secure and reliable network access?