@Zac67
Why are you lecturing me?
For what it's worth, part of my job is signing certificates for a larger CA and deal with support for those certificates, I do have ideas about how things work, thank you very much, including the difference between SSL and TLS.
My point was that it's pretty much the same software that is used for these things, whether you use it for setting up encrypted tunnels over TCP (strictly SSL), setting up encryptet tunnels from within a protocol (TLS), encrypting and signing email (S/MIME), signing zone files (DNSSEC), authentication over wireless (802.1X/WPA(2) enterprise with EAP-TLS/TTLS/PEAP) or wire, and heaploads more.
As for router, switches and hubs, please have a look at what companies like Cisco, Juniper and others deliver today, that's right - boxes that do a heck lot of mixing between layer two and three in the same box.
For what it's worth, I don't see the point in pushing this further, your view is correct on a principal, theoretical level, but internet technology is developed by pragmatists who use whatever technology that fits at any level they see fit. If you think that's all wrong, then I suggest you participate in IETF and do some serious humming
