Which of the following mechanisms are used in the MAC flooding attack? (Multiple choice)