networking 77

·Class discussion on network security should be comprehensive to include MAC spoofing and how implementing proper subnetting helps to secure a network.

·Break up into groups and discuss whether it is ever possible to truly make an impenetrable network.

oHave the groups present their findings in a debate format