We simulated traffic messages from a sender node n to a sink s with the interference of cross-traffic coming from neighbor nodes as depicted in Figure 4.1. A common setup for each simulation run was chosen with variation in the length of the path and cross-traffic parameters