Table 5: Networking protocols adopted by the system.
After the system has been described and designed, a model checking for different scenarios has taken place and the results are shown in Table 6.
Table 6: Calculated latency and throughput for each scenario.