Do MITM attacks require more than one network device?

I have searched for information and all I cant find anything that describes the process clearly.

I'm not looking for spoonfeeding, i can work out commands and utilities on my own... but if someone could explain the process in round-about terms, focusing on hardware requirements, that would be really helpfull.


cheers