Layer 1 and Layer 2 Devices
Hubs operate at Layer 1 (Physical). They repeat all incoming signals out every port — no intelligence. All devices on a hub share bandwidth and are in the same collision domain. Hubs are obsolete but still appear on the exam as a comparison point. A hub creates one large collision domain.
Switches operate at Layer 2 (Data Link). They build a MAC address table by learning which MAC addresses are reachable via which port, then forward frames only to the correct port. Each switch port is its own collision domain, eliminating collisions. All ports on a switch (by default without VLANs) are in the same broadcast domain. Managed switches add VLAN, QoS, port security, and spanning tree capabilities.
Bridges operate at Layer 2 like switches but with fewer ports — typically used to connect two network segments or filter traffic between them. WAPs (wireless access points) connect wireless clients to the wired network at Layer 2, extending the broadcast domain.
Layer 3 and Multi-Layer Devices
Routers operate at Layer 3 (Network). They forward packets between different networks using IP routing tables and break broadcast domains — broadcasts do not cross router interfaces. Routers connect LANs to WANs and enable internet access. Each router interface is its own broadcast domain.
Multilayer switches (Layer 3 switches) combine switching (Layer 2) and routing (Layer 3) in a single device — commonly used in enterprise distribution layers to route between VLANs without a dedicated router. They perform inter-VLAN routing at wire speed.
Firewalls filter traffic based on rules and operate at Layers 3–4 (stateful packet filtering) or Layer 7 (application-aware firewalls, also called next-generation firewalls or NGFW). NGFWs can inspect HTTPS traffic, identify applications, and block based on content, not just ports.
Specialized Network Devices
Load balancers distribute incoming traffic across multiple servers to ensure no single server is overwhelmed, improving performance and availability. They operate at Layer 4 (TCP/UDP) or Layer 7 (application-aware). Common algorithms: round-robin, least-connections, IP hash.
Proxy servers act as intermediaries between clients and the internet. Forward proxies represent clients — they cache content and enforce web filtering for outbound traffic. Reverse proxies represent servers — they load balance, cache, and hide server infrastructure from clients. Both operate at Layer 7.
IDS (Intrusion Detection System) monitors traffic and alerts on suspicious activity. IPS (Intrusion Prevention System) also blocks detected threats. SIEM (Security Information and Event Management) aggregates logs from multiple sources for correlation and alerting. Content filters inspect traffic and block based on URLs, categories, or keywords.