Table
5: Networking protocols adopted by the system.
After the system has been described and designed, a model checking for
different scenarios has taken place and the results are shown in Table
6.
Table 6: Calculated latency and throughput for each scenario.