Originally posted by: Fox5
I'm actually kind of curious what network bridging does that's so bad. I figured it'd all be handled internally and externally would look identical.
Well, it can get sort of technical, but the short version is that a "switch" is really a multiport bridge, it acts like a bridge in that it watches what traffic comes from and goes to each port using a table of port/MAC pairs.
On a bridge, any unknown MAC addresses are flooded to all ports except the source, and all broadcasts are forwarded to every other port.
When one port sends a broadcast or multicast (or a flood), the two ports keep forwarding each others traffic, doubling and re-doubling each round until the link is saturated (i.e., "no room for normal traffic" and "no more processor time left in the switch").
In commercial grade switches, there are protocols available (spanning tree, etherchannel, and others) that permit multiple parallel connections to avoid the L2 loop / broadcast storm scenario. Both ends of the (multiple parallel) link have to support the protocol (and most consumer grade switches do not), and they must be enabled (i.e., they don't come up automatically).
Chances are they know you did it, and they're just waiting for youto show your face so they can explain it to you themselves. That's the kind of infor any decent monitoring system can provide.
Good Luck
Scott