How to explore Black Hole attack using Extreme Switches...

Userlevel 1
We are from Academic Institution. We are providing IT Service for the Institute as well as we are giving some practical explanation for students based on their subjects.

We have more than 100 Extreme Switches in our Network. Now our requirement is, We have to explain the black hole attack in Practical manner.

Is it possible to explain the black hole attack using extreme switches?

if possible, can you provide the steps to explain the Black hole attack?