Well what you did was in fact a known attack.
This is called DHCP starvation.
The Pool of IP's thats availible for the DHCP server to give out to its clients reached its end.
For local networks this typically is 192.168.0.2-256 or often 192.168.1.100-200 or alike.
If you spoofed your MAC over and over again you probably reached the end of the pool.
What I previously described was actually changing the modem/routers MAC address.
Which as I said just knocked me off the network.
The DHCP starvation attack is interesting though.
Whats fun about it that it can be used as an alternative to ARP spoofing.
Imagine this;
Client connects to network..
DHCP server is starved by attacker before the client gets an IP address from the router.
The attacked sets up his own fake DHCP server and gives the client an IP address.
However it will tell the client that the gateway is actually the one of the attacker.
Attacker forwards his packets to the real gateway , resulting in MITM.