Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.
2.1.6. Endpoints
Endpoints are why networks exist—they're the devices that actually do work. PCs, laptops, phones, printers, security cameras, badge readers, IoT sensors... anything that generates or consumes data.
From a network engineer's perspective, endpoints are identified by MAC addresses (Layer 2) and IP addresses (Layer 3). They're also your biggest security risk: endpoints get phished, infected, and stolen. That's why network security increasingly focuses on what endpoints are allowed to do, not just where they can connect.