Loading content...
The two-port repeater solved the fundamental problem of signal regeneration, but early Ethernet networks faced another challenge: physical topology. The original Ethernet standards (10BASE5 and 10BASE2) used a bus topology—a single coaxial cable to which all stations attached. While conceptually simple, bus topologies presented significant practical problems:
The hub emerged as the solution—a multi-port device that created a physical star topology while maintaining the logical bus behavior of Ethernet. This seemingly simple evolution represented a paradigm shift in how networks were built and managed.
This page provides comprehensive coverage of network hubs—their internal architecture, operational principles, port types, LED indicators, performance characteristics, and ultimate obsolescence. You will understand why hubs represented essential progress from coaxial bus topologies while also understanding why they became obsolete as networks grew.
A hub is fundamentally a multi-port repeater. It receives a signal on any one port and repeats that signal out all other ports simultaneously. This simple operational model conceals a sophisticated internal design that evolved significantly over the hub's commercial lifespan.
Core Definition:
A network hub is a Physical Layer (OSI Layer 1) device that:
Internal Architecture of an Active Hub:
The internal design of a typical active Ethernet hub reveals how it achieves multi-port signal distribution:
┌─────────────────────────────────────────────────┐
│ Active Hub Internal │
├─────────────────────────────────────────────────┤
│ │
│ Port 1 ─[Transceiver]─┐ │
│ │ │
│ Port 2 ─[Transceiver]─┼──[Shared Bus/Backplane]─┐
│ │ │ │
│ Port 3 ─[Transceiver]─┤ │ │
│ │ ┌──────────────┐ │ │
│ Port 4 ─[Transceiver]─┼────│ Collision │───┘ │
│ ... │ │ Detection │ │
│ │ │ & Jam Logic │ │
│ Port N ─[Transceiver]─┘ └──────────────┘ │
│ │
│ [Power Supply] [LED Driver] [Management] │
│ (optional) │
└─────────────────────────────────────────────────┘
Key Components:
Port Transceivers: Each port has dedicated transmit/receive circuitry that interfaces with the connected cable, performing signal conditioning and level shifting.
Shared Bus/Backplane: All port transceivers connect to a common electrical bus. Any signal received on one port propagates across this bus to all other ports.
Collision Detection Logic: Circuitry monitors the shared bus for simultaneous transmissions. When detected, a jam signal is generated and propagated to all ports.
Signal Regeneration: The backplane includes the 3R circuits—re-amplification, reshaping, and retiming—applied to all signals traversing the hub.
Auto-Partition Logic: Many hubs include circuitry to automatically disable (partition) a port that exhibits excessive collisions or other faults, protecting the rest of the network.
The hub's most significant contribution to networking wasn't a technical innovation in signal processing—it was an architectural transformation. By converting Ethernet from a physical bus to a physical star topology, hubs revolutionized network design, installation, and maintenance.
Bus vs. Star: Physical Topology Comparison:
Centralized Wiring:
The star topology centralized all network connections at a single point—the wiring closet or telecommunications room. This physical arrangement provided numerous operational benefits:
Structured Cabling Systems: Star topology aligned perfectly with structured cabling standards (TIA/EIA-568), allowing permanent building infrastructure with flexible patch panel connections.
Fault Indication: Hub port LEDs immediately identified problematic connections. A link light that refuses to illuminate points directly to a cable or device issue.
Easy Moves/Adds/Changes (MACs): Moving a user required only patching a cable at the central location rather than reworking the network backbone.
Media Flexibility: Hubs with multiple media modules allowed mixing UTP for desktops, fiber for backbone connections, and other media types within a single logical network.
Physical Security: Network equipment concentrated in lockable telecommunications rooms rather than spread throughout the facility.
Logical Bus Behavior:
Despite the physical star arrangement, hubs maintained Ethernet's logical bus behavior. All devices still shared a single collision domain, and all traffic still reached all ports. This was intentional—10BASE-T (the standard that popularized hubs) was designed as a compatible evolution of 10BASE5 and 10BASE2, preserving CSMA/CD semantics while improving physical plant management.
Always distinguish between physical and logical topology. A hub creates a physical star but maintains a logical bus. A switch creates a physical star and also segments the network logically. This distinction is fundamental to understanding network behavior and performance characteristics.
Understanding exact hub operation is essential for comprehending its limitations and the motivations for switch development. Let's trace what happens when a frame traverses a hub.
Step-by-Step Frame Journey:
Step 1: Frame Transmission
Device A begins transmitting a frame to Device B.
The electrical signals travel through the UTP cable
to Port 3 of the hub.
Step 2: Signal Reception
The Port 3 transceiver receives the signal.
Receive circuitry performs clock recovery to synchronize
with the incoming bit stream.
Step 3: Signal Regeneration
The hub's 3R circuitry:
- Re-amplifies the signal to full voltage levels
- Re-shapes edges to eliminate distortion
- Re-times the bit stream using the recovered clock
Step 4: Bus Propagation
The regenerated signal is placed on the hub's internal bus.
All port transceivers (except Port 3) receive this signal.
Step 5: Simultaneous Transmission
Ports 1, 2, 4 through N simultaneously transmit
the regenerated signal onto their attached cables.
Every connected device receives the frame.
Step 6: Collision Handling
If Device C starts transmitting during this process:
- Both signals arrive at the hub simultaneously
- Collision detection logic recognizes the overlap
- A jam signal is generated and broadcast to all ports
- All transmitting devices back off and retry
Every port on a hub receives every frame, regardless of destination. Device B may be the intended recipient, but Devices C, D, E, and all others also receive and process (then discard) the frame. This wastes bandwidth and creates security vulnerabilities—any device can capture all traffic with a packet sniffer.
Collision Domain Analysis:
A hub extends the collision domain to encompass all connected devices. This has quantifiable performance implications:
| Hub Configuration | Devices | Theoretical Max Throughput | Practical Throughput |
|---|---|---|---|
| 4-port hub | 4 | 10 Mbps (shared) | ~3-5 Mbps |
| 8-port hub | 8 | 10 Mbps (shared) | ~2-4 Mbps |
| 16-port hub | 16 | 10 Mbps (shared) | ~1-3 Mbps |
| 24-port hub | 24 | 10 Mbps (shared) | ~1-2 Mbps |
As the number of devices increases, collision probability rises exponentially. The theoretical maximum throughput for Ethernet with many stations under high load approaches 37% of nominal bandwidth—but practical throughput is often much lower due to variable traffic patterns and non-optimal backoff behavior.
Auto-Partitioning:
Enterprises-grade hubs implemented auto-partitioning as a fault isolation mechanism. When a port exhibits abnormal behavior (excessive collisions, jabber, etc.), the hub automatically disables that port to protect the rest of the network. The port's LED changes state to indicate the partition, and the hub periodically tests whether the condition has cleared.
Typical auto-partition triggers:
This mechanism demonstrates that while hubs lacked Layer 2 intelligence, they incorporated sophisticated Layer 1 protection logic.
Hubs were standardized as part of the IEEE 802.3 Ethernet specifications. Understanding these standards provides insight into hub capabilities and limitations.
IEEE 802.3 Repeater Standards:
| Standard | Speed | Media | Repeater Class | Notes |
|---|---|---|---|---|
| 802.3 (10BASE-T) | 10 Mbps | UTP | Class I/II | Most common hub type |
| 802.3u (100BASE-TX) | 100 Mbps | Cat5 UTP | Class I/II | Fast Ethernet hub |
| 802.3u (100BASE-FX) | 100 Mbps | Fiber | Class I | Fiber Fast Ethernet |
| 802.3ab (1000BASE-T) | 1000 Mbps | Cat5e/6 | N/A | No repeater specification |
Repeater Classes (Fast Ethernet):
Class I Repeaters:
Class II Repeaters:
Why No Gigabit Hubs?
The 802.3ab specification for 1000BASE-T (Gigabit Ethernet over copper) did not include a repeater specification. By the time Gigabit Ethernet was standardized in 1999, switches had become so inexpensive that there was no market for shared-medium Gigabit networks. The tight timing constraints of Gigabit Ethernet also made hub implementation impractical:
The nanosecond-level timing at Gigabit speeds left no practical margin for hub propagation delays while maintaining collision detection functionality.
Small networks often require more ports than a single hub provides. Connecting multiple hubs together—cascading—extends network capacity but introduces critical constraints that network designers must respect.
The 5-4-3 Rule (10 Mbps Ethernet):
For 10BASE-T networks using hubs, the 5-4-3 rule establishes maximum topology limits:
The remaining 2 segments are IRL (Inter-Repeater Link) segments—cable runs connecting hubs to each other without attached stations.
Why These Limits Exist:
Ethernet's CSMA/CD mechanism requires that a transmitting station can detect any collision before it finishes sending the minimum-size frame (64 bytes = 512 bits). At 10 Mbps:
Signal must travel from the sender to the farthest station and back (2 × maximum distance) within 51.2 μs. Every hub adds delay:
| Component | Delay Contribution |
|---|---|
| UTP cable (per 100m) | ~5 μs |
| Hub processing | 3-8 μs |
| NIC turnaround | ~2 μs |
With four hubs and five segments, the round-trip delay approaches the slot time limit.
Violating the 5-4-3 rule doesn't immediately break the network. Instead, it creates a timing window where collisions can occur without detection—called 'late collisions.' These cause frame corruption without triggering retransmission, leading to intermittent, hard-to-diagnose data errors.
Fast Ethernet Cascading Rules:
At 100 Mbps, timing constraints become much stricter. The slot time shrinks to 5.12 μs, allowing far less propagation distance:
Class I Repeater Networks:
Class II Repeater Networks:
These tight constraints effectively limited Fast Ethernet hub deployments to small workgroups. Larger networks required switches to create multiple collision domains.
Proper Hub Cascade Topology:
┌───────────────┐
│ Core Hub │
│ (uplinks) │
└───┬───────┬───┘
│ │
┌───────────┘ └───────────┐
│ │
┌───────┴───────┐ ┌───────┴───────┐
│ Workgroup │ │ Workgroup │
│ Hub 1 │ │ Hub 2 │
└───┬───┬───┬───┘ └───┬───┬───┬───┘
│ │ │ │ │ │
PC PC PC PC PC PC
Note the hierarchical structure—a maximum of two hubs between any two PCs. Using switches at the core eliminated hub cascading limits entirely.
The hub's broadcast nature creates fundamental performance limitations that become more severe as network size and traffic load increase. Understanding these implications explains why hubs were ultimately replaced by switches.
Bandwidth Sharing:
A hub's bandwidth is shared among all connected devices. Unlike a switch, which can provide full bandwidth to each port simultaneously, a hub offers only aggregate bandwidth equal to a single link:
| Network Configuration | Available Bandwidth per Device |
|---|---|
| 2 devices on 10 Mbps hub | 10 Mbps (half-duplex, shared) |
| 8 devices on 10 Mbps hub | ~1.25 Mbps average (theoretical) |
| 24 devices on 10 Mbps hub | ~0.4 Mbps average (theoretical) |
| 2 devices on 10 Mbps switch | 10 Mbps each (dedicated) |
| 24 devices on 10 Mbps switch | 10 Mbps each (dedicated) |
Collision Overhead:
As more devices share the collision domain, collision probability increases non-linearly. The mathematical analysis shows:
Ethernet throughput under load (S) is approximately:
S = G × e^(-2G)
Where G = offered load (attempts per slot time)
Maximum throughput occurs at G = 0.5, giving S ≈ 0.18 (18%)
This theoretical maximum assumes ideal backoff behavior. Practical measurements show:
Shared Ethernet networks exhibit a 'cliff' in usability around 60-70% offered load. Beyond this point, collision overhead consumes ever-larger fractions of available bandwidth, and network response becomes erratic. Well-designed hub networks were typically planned for sustained loads below 40%.
Half-Duplex Limitation:
Hubs inherently operate in half-duplex mode—only one device can transmit at a time across the entire hub. This is fundamental to the collision domain concept. Full-duplex Ethernet, where devices can transmit and receive simultaneously, requires switches (or direct point-to-point connections).
Impact on Modern Applications:
Even legacy hubs would struggle with modern network traffic patterns:
| Application Type | Typical Bandwidth | Hub Performance |
|---|---|---|
| Web browsing | 1-10 Mbps bursts | Acceptable on light networks |
| VoIP call | 80-100 Kbps per call | Jitter problems under load |
| Video streaming (SD) | 3-5 Mbps sustained | One stream saturates shared hub |
| Video streaming (HD) | 8-25 Mbps sustained | Impossible on 10 Mbps hub |
| File transfer | As fast as possible | Starves other users |
| Video conferencing | 1-4 Mbps bidirectional | Severe quality issues |
Latency Variability:
Unlike switches with predictable store-and-forward delays, hub latency varies wildly based on collision patterns:
The hub's broadcast nature creates significant security vulnerabilities that modern network designs must avoid. Understanding these vulnerabilities emphasizes why hubs are inappropriate for any security-conscious environment.
Passive Eavesdropping:
Because every frame transmitted on a hub reaches every port, any device can capture all network traffic simply by placing its network interface in promiscuous mode. No special hardware or sophisticated attack is required—standard packet capture tools (Wireshark, tcpdump) work directly.
This means on a hub-based network:
No Access Control:
Hubs provide no mechanism for:
Regulatory Implications:
Modern security and privacy regulations make hub deployments problematic or impossible:
| Regulation | Hub Compliance Issue |
|---|---|
| PCI DSS | Requires network segmentation; hubs cannot segment |
| HIPAA | PHI must be protected in transit; hubs expose all traffic |
| GDPR | Personal data must be protected; hubs allow passive capture |
| SOX | Financial data integrity; no audit trail on hubs |
The Security Case for Switches:
Switches fundamentally change the security model:
There is no legitimate security reason to deploy hubs in modern networks. The only entities who might want hub behavior are attackers—promiscuous mode captures become trivial. Any hub still in production should be replaced immediately. Switch prices have fallen to near-hub levels, eliminating any cost justification.
The transition from hubs to switches represents one of the most complete technology replacements in networking history. Understanding why this happened illuminates the fundamental limitations of shared-medium networking.
Economic Crossover:
In the early 1990s, switches cost 10-20x more than hubs on a per-port basis. A 24-port 10BASE-T hub might cost $1,000; an equivalent switch cost $10,000-$20,000. This price premium initially restricted switches to backbone connections.
By the mid-2000s, the economics inverted:
| Year | 24-port 10/100 Hub | 24-port 10/100 Switch | Price Ratio |
|---|---|---|---|
| 1995 | ~$500 | ~$5,000 | 10:1 |
| 2000 | ~$200 | ~$600 | 3:1 |
| 2005 | ~$50 | ~$80 | 1.6:1 |
| 2010 | Discontinued | ~$40 | N/A |
| 2025 | N/A | ~$25 | N/A |
Once switch prices fell to near-hub levels, the hub had no remaining advantage. Manufacturers stopped production; retailers cleared inventory; new installations universally specified switches.
Where Hubs Might Still Exist:
Despite their obsolescence, hubs occasionally appear in specific scenarios:
Network Analysis: Security professionals sometimes use hubs to create monitoring points—unlike switches that require port mirroring configuration, hubs naturally provide all traffic to capture devices.
Legacy Equipment: Some old industrial or medical equipment requires hub behavior for protocol reasons or has embedded hubs in aged networking components.
Very Old Installations: Networks in abandoned buildings, historical systems preserved for documentation, or extremely neglected infrastructure.
Education: Networking courses sometimes use hubs to demonstrate collision behavior and contrast with switch operation.
Current Availability:
New hubs are essentially unavailable from mainstream vendors. Remaining inventory is typically:
The hub era ended sometime around 2005-2010, completing a technology transition that began in the mid-1990s.
The hub's ~20-year production lifespan (roughly 1990-2010) was remarkably short for networking technology. This rapid obsolescence demonstrates how quickly fundamental architectural improvements can displace established technology when the economic barriers fall.
We have comprehensively explored the network hub—the multi-port repeater that transformed physical network topology while maintaining shared-medium behavior. Let's consolidate the key concepts:
Looking Ahead:
The hub represented an important evolutionary step—solving the physical topology problems of bus networks while maintaining Ethernet semantics. However, its shared-medium nature created inherent limitations in performance, scalability, and security.
In the next page, we'll explore the bridge—the first network device to operate at Layer 2 (Data Link Layer) and provide collision domain segmentation. This conceptual leap from signal repetition to intelligent frame forwarding laid the groundwork for modern switch technology.
You now understand the hub's role as a multi-port Layer 1 device, its contributions to network physical topology, its performance and security limitations, and why it became obsolete. This knowledge prepares you to appreciate why Layer 2 devices—bridges and switches—represented such a fundamental advance.