Sorry, but last time I checked "the locical construct that changes signal into information" a.k.a. was still "above" the signal. You are not using correct vocabulary. That's part of what makes your attempts so "painful".
It's underlying to the INFORMATION. Big, bold, and beautiful.
Right? Isn't that what this is all about? You want to be able to tell your device to do something, and it behaves intelligently based on that instruction? So when your tune your radio into the AM band, it understands how to extract the music from the carrier wave? Or when you tell your smart linked pistol to eject a clip(*cough*magazine*cough), it understands that you didn't mean: Fire in full auto?
All this stuff in between your command, and its interpretation, aren't magic. They're defined by standards, protocols, and implementation.
Not coincidentally the term "Information System" is not related to "underlying" or "transmission layers".
The entire means by which an Information System is capable of operating on information is the cumulative result of layers and layers and layers of logical constructs of information which, ultimately, are implemented using something eventually tied to the physical behavior of our universe.
And now let's come back to the point where the sole difference between the compared systems was A) and you "violently" agreed that wired would be better than wi-fi wheras I even accepted that - under idealized conditions - they could be equal there as well. So now, where will the two systems in question have any difference in "responsiveness"?
Okay. Now wired and wireless operate at the same speed. Really that's so secondary to the point I'm not really even sure why you're bringing it up. Did you want to agree that they did operate at the same speed? Okay, fine. Did you want to say that they don't? Okay, whatever, I'll agree with that to.
Can we not revisit this point? Because it's, like, not related to any point I've made whatsoever. Let's just operate forward going: However you want the relationship between wireless and directly-wired to work, we'll go with that, and I'll make a T-Shirt that says as much for us and we can wear them around together.
The varying degrees of responsiveness depend entirely on what you need your system to do, and how you're able to do it based on the limitations of various implementations. For instance, if you would like to conduct prime factorization with every computer you're directly connected to, while I conduct it with every computer within a square kilometer of myself, we're going to have dramatically different response times.
Wow ... now I wonder why I even mentioned a deliberate structuring of the protocol and then asked the question how and why nobody is capable of bypassing that decision?
Wait, wait, wait...
...You mean like an implementation? So, like, what you're saying is that the implementation and not solely the physical characteristics of a transmission medium will drive the response of a System.
Cochise, this is a big step for us. I think we're going to be friends, after all.

Now, let's just take this a step further and agree that with varying implementations, certain characteristics of a system will influence it's ultimate responsiveness more than in other implementations.

Which is a "stupid" assumption to begin with. It's not plausible even from within the SR universe because you have people there that are bent on bypassing protocol limitations on a much larger scale. For a last time I will ask you this: How can deckers/hackers, that are capable of hacking Matrix protocols, ad hoc cracking of encryption and building specialized hardware for that very purpose at the same be incapable of bypassing that particular design decision? The answer to that: Developer's fiat in order to maintain "combat hacking". Full stop.
You're discussing implementation with me. This is progress. I'm feeling really good about where we are right now.
Yes ... and criminals and even benovelent hackers both in our real world as well as within the SR universe are constantly trying to make that "big word" work ... and they succeed.
...
~grr~ Again: My assumption was and is, that all parts of the protocol - thus including authetication - would be part of the communication regardless of communication medium.
...
So now you're trying to tell me that the end points are not capable of successfull authentication of incomming transmissions and thus have to rely on distributed computational power to get there?
...
But since this whole communication isn't leading anywhere, I'll simply say we'll have to agree to disagree and then ignore any further comment by you on this issue, because you're not worth the hassle of increasing the headache I already got from this.
...
~grr~ Again: My assumption was and is, that all parts of the protocol - thus including authetication - would be part of the communication regardless of communication medium.
...
So now you're trying to tell me that the end points are not capable of successfull authentication of incomming transmissions and thus have to rely on distributed computational power to get there?
...
But since this whole communication isn't leading anywhere, I'll simply say we'll have to agree to disagree and then ignore any further comment by you on this issue, because you're not worth the hassle of increasing the headache I already got from this.
I think you may have misread something that I responded to Jaid about, as something that I was directing at you. It's understandable. There's a lot of text flying across the screen.

(Though... I suppose, now that you mention it, since we were just talking shop on implementation, how you authentication, error check, perform function X,Y, or Z in any given implementation probably matters. Right? So, if you're doing it in a way that's conducted inefficiently locally, whether or not it matters when it "would be part of the communication regardless" starts to make a difference, right?)
(Because performing it inefficiently locally != performing it efficiently non-locally.)
-Wired_SR_AEGIS