Layer 2 Network Attacks And Exploitation