Those of ordinary skill in the art will immediately recognize that for other forms of network access, different hardware would be used to physically interface to the network, but that the functions are logically substantially identical, regardless of the specific interface technique.