In our example, nodes A, B, C, and D are all connected together through a hub. When system A wants to communicate to system D, it sends its packet destined for D to the hub.

The hub takes any packet that it receives, regenerates it, then sends it out to every port on the hub except for the one it came in on. This provides systems B and C the opportunity to eavesdrop on the communication.