That is not what was said at all.
The discussion was of a log file that showed that BC's laptop was attached to a router which could have been used to route a phone call. This router was shown to have been signed out of an inventory by BC, and could not be located later. There was an outline in dust conforming to a device that was physically similar to the router. There was supposedly a log file showing that the MAC address of that router was connected to on the laptop within the time frame where he said he was asleep. He said he didn't have the router, but his computer attached to it on the night in question. The MAC address is burned into the network interface and is unique to that device.
The log showing a connection to the router did not have to have any correlation at all to any phone call that was made, neither in duration, time or date. In theory, I could configure a router to do this, and not use that function for years, but when I eventually chose to do it, it would not change the fact that my computer was used to attach to that router. I have worked in IT, networking and computer systems for 35 years. I have worked on all types of equipment. So, please elaborate on where I have made a misstatement if I conclude that someone says that because the log file duration of the connection and the duration of the phone call do not match, I have made a mistake?
The log file is one set of data, the duration of the phone call is another set of data. They do not have to agree, if they do not, it neither proves nor disproves anything. However, since he claimed that he didn't have that piece of equipment, but his computer was used to attach to it on that night, there is a clear provenance to this data. The log file was likely found on his computer, had to be since the router has not been found.