Professional Documents
Culture Documents
PDF Game Theory For Next Generation Wireless and Communication Networks Modeling Analysis and Design Zhu Han Ebook Full Chapter
PDF Game Theory For Next Generation Wireless and Communication Networks Modeling Analysis and Design Zhu Han Ebook Full Chapter
https://textbookfull.com/product/biota-grow-2c-gather-2c-cook-
loucas/
https://textbookfull.com/product/security-and-privacy-for-next-
generation-wireless-networks-sheng-zhong/
https://textbookfull.com/product/the-next-generation-vehicular-
networks-modeling-algorithm-and-applications-zhou-su/
https://textbookfull.com/product/5g-nr-the-next-generation-
wireless-access-technology-erik-dahlman/
5G NR: The Next Generation Wireless Access Technology
2nd Edition Erik Dahlman
https://textbookfull.com/product/5g-nr-the-next-generation-
wireless-access-technology-2nd-edition-erik-dahlman/
https://textbookfull.com/product/next-generation-gnss-signal-
design-theories-principles-and-technologies-zheng-yao/
https://textbookfull.com/product/computational-methods-for-next-
generation-sequencing-data-analysis-1st-edition-ion-mandoiu/
https://textbookfull.com/product/malware-diffusion-models-for-
wireless-complex-networks-theory-and-applications-1st-edition-
karyotis/
https://textbookfull.com/product/cross-layer-design-for-secure-
and-resilient-cyber-physical-systems-a-decision-and-game-
theoretic-approach-quanyan-zhu/
Game Theory for Next Generation Wireless and Communication Networks
Discover the very latest game-theoretic approaches for designing, modeling, and opti-
mizing emerging wireless communication networks and systems with this unique text.
Providing a unified and comprehensive treatment throughout, it explains basic concepts
and theories for designing novel distributed wireless networking mechanisms, describes
emerging game-theoretic tools from an engineering perspective, and provides an exten-
sive overview of recent applications. A wealth of new tools is covered – including
matching theory and games with bounded rationality – and tutorial chapters show how to
use these tools to solve current and future wireless networking problems in areas such
as 5G networks, network virtualization, software defined networks, cloud computing,
the Internet of Things, context-aware networks, green communications, and security.
This is an ideal resource for telecommunications engineers and researchers in industry
and academia who are working on the design of efficient, scalable, and robust commu-
nication protocols for future wireless networks, as well as graduate students in these
fields.
Zhu Han is a John and Rebecca Moores Professor in the Department of Electrical and
Computer Engineering as well as the Computer Science Department at the University
of Houston and a Fellow of the IEEE.
Tamer Başar is the Swanlund Endowed Chair, CAS Professor of Electrical and Computer
Engineering, and director of the Center for Advanced Study at the University of Illinois
at Urbana-Champaign. He is a Fellow of the IEEE, IFAC, and SIAM, and a member of
NAE.
Game Theory for Next Generation
Wireless and Communication
Networks
Modeling, Analysis, and Design
ZHU HAN
University of Houston
D U S I T N I YAT O
Nanyang Technological University
WA L I D S A A D
Virginia Tech
TA M E R B A Ş A R
University of Illinois
University Printing House, Cambridge CB2 8BS, United Kingdom
One Liberty Plaza, 20th Floor, New York, NY 10006, USA
477 Williamstown Road, Port Melbourne, VIC 3207, Australia
314–321, 3rd Floor, Plot 3, Splendor Forum, Jasola District Centre, New Delhi – 110025, India
79 Anson Road, #06–04/06, Singapore 079906
www.cambridge.org
Information on this title: www.cambridge.org/9781108417334
DOI: 10.1017/9781108277402
© Cambridge University Press 2019
This publication is in copyright. Subject to statutory exception
and to the provisions of relevant collective licensing agreements,
no reproduction of any part may take place without the written
permission of Cambridge University Press.
First published 2019
Printed in the United Kingdom by TJ International Ltd. Padstow Cornwall
A catalogue record for this publication is available from the British Library.
Library of Congress Cataloging-in-Publication Data
Names: Han, Zhu, 1974–
Title: Game theory for next generation wireless and communication networks
modeling, analysis, and design / Zhu Han, University of Houston, Dusit
Niyato, Nanyang Technological University, Walid Saad, Virginia Tech, Tamer
Başar, University of Illinois.
Description: Cambridge, United Kingdom ; New York, NY, USA : Cambridge
University Press, [2019] | Includes bibliographical references and index.
Identifiers: LCCN 2019000829 | ISBN 9781108417334 (hardback : alk. paper)
Subjects: LCSH: Wireless communication systems–Mathematical models. | Game theory.
Classification: LCC TK5102.83 .H36 2019 | DDC 621.38201/5193–dc23
LC record available at https://lccn.loc.gov/2019000829
ISBN 978-1-108-41733-4 Hardback
Cambridge University Press has no responsibility for the persistence or accuracy
of URLs for external or third-party Internet Web sites referred to in this publication
and does not guarantee that any content on such Web sites is, or will remain,
accurate or appropriate.
To Tangül, Gözen, Elif, Zara, and Alya (Tamer Başar)
1 Introduction 1
1.1 Overview and Motivation 1
1.2 Intended Book Audience 3
1.3 Organization 4
Part I Theory 9
2 Matching Games 11
2.1 Fundamentals of Matching Theory 11
2.2 Example 1: Student Project Allocation Model for LTE-Unlicensed 17
2.3 Example 2: Stable Fixture Model in LTE V2X 28
2.4 Summary 37
3 Contract Theory 38
3.1 Basic Concepts 39
3.2 Example 1: Incentive Mechanisms for Device-to-Device Communications
in Cellular Networks with Adverse Selection 46
3.3 Example 2: Multidimensional Incentive Mechanism in Mobile
Crowdsourcing with Moral Hazard 65
3.4 Example 3: Financing Contract with Adverse Selection and Moral
Hazard for Spectrum Trading in Cognitive Radio Networks 89
3.5 Summary 105
ix
x Contents
5.3 Foundations of Prospect Theory: Weighting Effects and Framing Effects 116
5.4 Other Notions of Bounded Rationality 121
5.5 Summary 122
15 Security 425
15.1 Security of Drone Delivery Systems 425
15.2 Moving Target Defense in Wireless IoT Networks 438
15.3 Critical Infrastructure Protection 447
15.4 Summary 457
References 459
Index 494
Acknowledgment
This work was supported in part by Office of Naval Research (ONR) MURI Grant
N00014-16-1-2710 and US Army Research Laboratory (ARL) Cooperative Agreement
W911NF-17-2-0196. US MURI AFOSR MURI 18RT0073, NSF CNS-1717454,
CNS- 1731424, CNS-1702850, CNS-1646607, NSF CNS-1460316, CNS-1513697,
CNS-1446621, A*STAR-NTU-SUTD Joint Research Grant Call on Artificial Intelli-
gence for the Future of Manufacturing RGANS1906, WASP/NTU M4082187 (4080),
Singapore MOE Tier 1 under Grant 2017-T1-002-007 RG122/17, MOE Tier 2 under
Grant MOE2014-T2-2-015 ARC4/15, Singapore NRF2015-NRF-ISF001-2277, and
Singapore EMA Energy Resilience under Grant NRF2017EWT-EP003-041.
xii
1 Introduction
1
2 Introduction
1. The book introduces new frameworks and tools from game theory while provid-
ing an engineering perspective. In particular, we include seven chapters that cover
a diversity of new game-theoretic tools that were not covered in our earlier 2011
book. In particular, we provide a clear description of the main game-theoretic
entities in a wireless communications environment with a focus on recent and
emerging applications (e.g., what are the players, their strategies, utilities, and
payoffs, and what is the physical meaning, in a wireless network environment, of
different game-theoretic concepts such as equilibria).
2. The book provides an extensive overview of the very recent applications of
game theory to wireless communications and networking. Using this overview
1.2 Intended Book Audience 3
of applications, readers can easily understand how game theory can be applied
to different wireless systems as well as acquire an in-depth knowledge of the
recent developments in this area. In this context, the book provides tutorial-like
chapters that explain, clearly and concisely, how game-theoretical techniques
can be applied to solving state-of-the-art wireless communication problems.
In particular, we study different new scenarios, such as 5G networks, network
virtualization, software defined networks, cloud computing, data centers, Internet
of Things, context-aware networks, green communication, and security-related
issues. The target audiences for this book are the researchers, engineers, under-
graduate, and graduate students who are looking for a source to learn game
theory from and apply it to solve various multiplayer decision-making problems
that arise in wireless and other engineering systems.
We believe that this follow-up book will be useful to a broad spectrum of readers,
particularly from the wireless communications and networking field. The material from
the book can be used to design and develop more efficient, scalable, and robust commu-
nication protocols.
To summarize, the key features of this book are
1. An extensive overview on the recent advances in game theory, that have occurred
in the recent past.
2. A unified view of novel game-theoretical approaches for wireless networks
3. Comprehensive treatment of state-of-the-art distributed techniques for today’s
wireless communication problems
4. Coverage of a wide range of techniques for modeling, design, and analysis of
wireless networks using game theory
5. Identifying the key research issues related to wireless game theory applications
Given the incessantly increasing popularity of game theory in the wireless communi-
cations and networking research community, reference works that provide a compre-
hensive introduction to the analytical aspects and the applications of game theory are
needed. Notably, engineers and researchers in the wireless communication community
seek a reference that can integrate the notions from game theory and wireless engineer-
ing, while emphasizing how game theory can be applied in wireless networks from an
engineering perspective. The primary audience for this book will comprise
1.3 Organization
The design, analysis, and optimization of distributed wireless networks require multidis-
ciplinary knowledge, namely, knowledge of wireless communication and networking,
signal processing, artificial intelligence, decision theory, optimization, game theory,
and economics. Therefore, a book covering the basic concepts/theories for designing
dynamic spectrum access methods, the state-of-the-art of technologies, and the related
information will be very useful in designing future wireless communication systems and
services. These are the primary motivations for writing this book.
Accordingly, there are two main objectives for writing this book. The first objec-
tive is to introduce novel game-theoretic techniques and their applications for design-
ing distributed and efficient solutions for a number of diverse wireless communication
and networking problems. The second objective is to present the state-of-the-art game-
theoretic schemes in networking. This includes classifications of different schemes and
the technical details for each scheme. To achieve the preceding objectives, the book will
comprise two parts, as described next:
Part I: Theory
Before discussing how to apply game theory to different wireless network problems, the
choice of a design technique is crucial and must be emphasized. In this context, this part
presents different new game-theoretic techniques, which can be applied to the design,
analysis, and optimization of wireless networks.
Chapter 2. Matching Games: The goal of Chapter 2 is to demonstrate the effectiveness
of matching theory, a powerful game-theoretic and operational research framework, for
solving a wide range of wireless resource allocation problems in a distributed manner.
Matching theory, as a Nobel Prize-winning framework, has already been widely used
in many economic applications. More recently, matching theory has been shown to
have a promising potential for modeling and analyzing wireless resource allocation
problems due to following reasons: (1) it offers suitable models that can inherently
capture many features of various wireless communication problems; (2) it has the ability
to use notions, such as preference relations, to model complex system requirements; (3)
it provides low-complexity and near-optimal matching algorithms while guaranteeing
system stability. Specifically, in this chapter, an overview of basic concepts, classifi-
cations, and models of matching theory is provided. Furthermore, comparisons with
existing centralized/distributive mathematical solutions of resource allocation problems
in wireless networks are conducted.
Chapter 3. Contract Theory: The aim of Chapter 3 is to introduce the framework
of contract theory as an effective approach for designing incentive mechanisms for a
1.3 Organization 5
we study how to utilize the existing results for formulating a variety of networking
problems.
Chapter 8. Miscellaneous Games: Beyond the previously mentioned new types of
game theory approaches, there are other, miscellaneous types of games. In Chapter 8,
we briefly overview some special types of games such as zero-determinant games and
social choice theory.
computing and network resources. With cloud networking, resources and services can
be provisioned from interconnecting distributed data centers owned by one or multiple
providers, called cloud data center networking. The cloud resources and services can
also be integrated with mobile networks, i.e., mobile cloud networking. Moreover, edge
computing models are deployed in cloud networking to bring the cloud resources and
services close to users, and thus minimize overall costs, jitter, latencies, and network
load. In Chapter 11, game theory has been used to optimize pricing strategies of cloud
providers, bandwidth and task allocation in cloud data center networking, mobile cloud
computing, edge computing, and cloud-based multimedia services.
Chapter 12. Applications of Game Theory in Context-Aware Networks and
Mobile Services: Context-aware Networks are networks that are able to acquire
and utilize context information extracted from mobile devices and mobile users to
improve data transfer performance and mobile service satisfaction. User context
information such as type of applications can be used along with location informa-
tion. Context information can be obtained more easily from a smartphone that is
equipped with numerous sensors, e.g., accelerometers, video, and camera. A major
application of context-aware networks is mobile social networks in which mobile users
utilize social tie information to help information dissemination. Moreover, context-
aware networks allow the customization of mobile services to suit the need and
requirements of distinct users, increasing the network utility and resource utilization.
In Chapter 12, game theory is used to address, for example, competitive resource
allocation issues for quality-of-experience (QoE) support, resource allocation of small
cell networks taking social metrics into account, and social learning for community
detection.
Chapter 13. Applications of Game Theory for Green Communication Networks:
Green Communications pertains to the design of wireless communication systems
that are energy efficient. It has been estimated that worldwide telecommunication
networks account for close to 1000 Terawatt-hours of electricity annually only for
the network infrastructure, and thus energy management is one of the significant
costs for network operators. Energy challenges become more crucial for mobile
devices whose battery energy supply is very limited. In Chapter 13, a number of
approaches have been proposed to reduce the energy consumption of the network
infrastructure and mobile devices, many of which are related to transmission control.
While optimization is a typical approach for minimizing energy consumption of wired
and wireless networks, due to the presence of multiple decision makers, game-theoretic
approaches are also apropos. For example, noncooperative games can provide a suitable
framework to study energy-efficient interference management problems. Meanwhile,
cooperative base station approaches whose goal is to minimize the energy consumption
at the wireless infrastructure level can also be studied using game theory. Moreover,
game-theoretic frameworks are also suitable to study energy harvesting scenarios in
which base stations or devices use alternate forms of renewable energy to power their
systems.
8 Introduction
Chapter 14. 4G, 5G, and Beyond: Modern wireless cellular networks have wit-
nessed an unprecedented evolution from classical, centralized, and homogenous
architectures to a mix of heterogeneous technologies, in which the network devices
are densely and randomly deployed in a decentralized architecture. This shift in
network architecture requires network devices to become more autonomous, which
causes noncooperative behaviors. To cooperate with one another, the need for smart
and autonomic network designs has become a central research issue in a variety
of applications and scenarios. In Chapter 14, we include examples such as next-
generation heterogeneous dense cell networks, LTE-Unlicensed networks or device-
to-device communication networks, in which the mobile devices must be able to
interact, co-exist, meet stringent QoS requirements, and self-adapt to uncertainties
and time-varying environments. Incorporating self-organizing capabilities in het-
erogeneous wireless systems motivates the development of innovative analytical
techniques, such as game theory, which is expected to play a critical role toward
deploying intelligent, distributed, and flexible networked systems in which devices
can make independent and rational strategic decisions, smartly adapting to their
environment.
Chapter 15. Security: Security is one of the major challenges of tomorrow’s wireless
networks. Given the adversarial nature of security scenarios, it is natural to model
security problems using game theory. In Chapter 15, we study a number of emerging
security problems for future wireless networks. First, we analyze the problem of secu-
rity for cyber-physical drone delivery systems, while focusing on games with bounded
rationality. Then, we analyze the emerging paradigm of moving target defense in wire-
less networks, using stochastic games. We conclude the discussion on security with an
overview on how contract theory can be used for critical infrastructure protection.
In a nutshell, this book constitutes a complete and comprehensive reference on a
plethora of advanced game-theoretic frameworks and their applications in wireless com-
munications and networking. Furthermore, with the aforementioned structure of the
book, which separates theory from applications, the material in the book will be easy to
follow and understand.
Part I
Theory
2 Matching Games
11
12 Matching Games
Figure 2.1 A future wireless network with a mixture of small cells, cognitive radio devices, and
heterogeneous spectrum bands. © 2017 IEEE. Reprinted, with permission, from Zhang et al.
2017
schools in New York and Boston, college admissions, the incompatible kidney exchange
market, the partnership formation in a peer-to-peer (P2P) network, and so on.
2.1.1 Preliminaries
First, we discuss the classical model of stable marriage (SM) [4] as an illustrative exam-
ple. We consider a set of men and a set of women, each of whom is called a matching
agent. A preference list of each agent is an ordered list according to the preferences over
the other set of agents. For example, a woman prefers Brad Pitt over George Clooney
over Johnny Depp, etc. A matching consists of (man, woman) pairs. One fundamental
solution concept for any matching problem is the so-called stable matching notion,
which captures the case in which no blocking pair (BP) exists in a matching. Here a
BP is defined as a (man, woman) pair, who both have the incentive to leave their current
partners and form a new marriage relation with each other, i.e. a divorce is inevitable.
A stable matching without a BP can be obtained by the Gale–Shapley (GS) algorithm,
which has been adopted in various types of matching problems [4].
The GS algorithm is an iterative procedure, where players in one set make proposals
to the other set, whose players in turn must decide on whether to accept or reject
these proposals. Players make their decisions based on their individual preferences. This
process admits many distributed implementations that do not require the players to know
each other’s preferences [4]. The GS algorithm stops if no further proposals are made,
and the algorithm flowchart is shown in Figure 2.2.
Figure 2.2 The Gale–Shapley algorithm. © 2017 IEEE. Reprinted, with permission, from Zhang
et al. 2017.
include DVD rental markets, campus housing allocation, and assigning reviewers
to conference papers.
• Nonbipartite matching problems with preferences: In this case, all the participat-
ing agents form a single set, and each agent ranks a subset of the others in the
order of its preferences. Example applications include finding kidney exchanges
involving incompatible (patient, donor) pairs, forming pairs of agents for chess
tournaments, and creating partnerships in P2P networks.
On the other hand, if the capacity/quota allowed for each agent is considered, the
other type of classification is shown as follows:
• Class I: Canonical matching: Here any resource (user) preference depends only
on the information available at this resource (user) and on the users (resources)
to which it is seeking to match. This is useful to investigate the resource manage-
ment such as within a single cell or for allocating orthogonal spectrum resources.
Some applications discussed in the book belong to this category, e.g., Section 2.3.
2.1 Fundamentals of Matching Theory 15
Transfers:
users
Figure 2.4 Wireless-oriented classification of matching theory. © 2017 IEEE. Reprinted, with
permission, from Zhang et al. 2017.
• Class II: Matching with externalities: This class tries to find desirable match-
ings if the problem exhibits “externalities,” which means the interdependencies
between players’ preferences. For example, in interference limited networks, if a
user is associated with a resource, the preference of other users changes because
this allocated resource can create interference to other users. Consequently, one
player’s preference depends not only on the information available at this player,
but also on the entire matching. We define two types of externalities: conven-
tional externalities and peer effects. For conventional externalities, the depen-
dence of the preferences means the performance changes because of the interfer-
ence between the matched (user, resource) pair. In peer effects, the preference of
a user on a resource will depend on the identity and the number of other users
matched to the same resource. We will investigate how to address the external
effect in Section 2.2.
• Class III: Matching with dynamics: It fits the scenarios where one must adapt
the matching processes to environment dynamics such as fast fading, mobility, or
time-varying traffic. Over time, the preferences of the players might change, and
consequently the time dimension must be considered for the matching solution.
At a given time, the matching problem can belong to either Class I or II.
• Class IV: Matching with transfers: It corresponds to matching situations in which
there exist transactions among the matched agents. This transfer can be credit,
money, service, resource, etc. For example, in cognitive radio spectrum trading,
the primary users (PUs) offer spectrum resources to the secondary users (SUs) in
exchanged for monetary gains or relay services.
In Class I, the preferences of one player set depend only on the other player set. In
Class II due to externalities, the preferences depend not only on the matched player
set, but also on the entire matching. In Class III, a time-dependent state variable can be
introduced in the matching to achieve dynamic stability. As a result, the preferences are
16 Matching Games
time and state dependent, when the problem has both dynamics and externalities. The
transition among states depends on the studied applications.
such signals, will update their matching matrices and then decide whether to start new
proposals or not. As a result, the GS algorithm can be implemented in a semidistributed
way. Nevertheless, there are still some operations requiring the assistance from the cen-
tralized agents in certain types of matching algorithms. For example, in the interchannel
cooperation (ICC) algorithm in Section 2.2, each iteration needs the detection of a BP.
Such detection needs the computation from the centralized agents (e.g., eNBs), who
have access to all players’ preference lists. Once a BP is detected, the centralized agent
informs the involved players in this BP of the BP status through signaling. Next the
informed BP players take the divorce and remarry actions with the related users. The
divorce and remarry actions are implemented by the rejecting and accepting operations.
In a nutshell, most operations in a matching algorithm can be implemented distribu-
tively, while a small part of the operations require the assistance from centralized agents,
thus making our matching framework a semidistributed one.
the interference due to the coexistence of LTE-U and Wi-Fi, the coexistence of multiple
CNOs in the same unlicensed band can also cause interoperator interference. Such
coexistence challenge needs to be investigated for the future LTE-U design.
There are many works in literature for LTE-U design. In [9], the Wi-Fi performance
in a LTE and Wi-Fi coexisting systems has been investigated through simulation results.
Wi-Fi users achieve from 70 percent to almost 100 percent performance degradation
because of the interference by the coexisting LTE transmissions. In [10] several mech-
anisms are studied to enable the coexistence of LTE and Wi-Fi users including channel
selection, spectrum sharing, transmit controls, and blank subframes. Channel access
strategies are constructed for dualband femtocell-based network systems simultaneously
serving users in both unlicensed and licensed subbands.
In this section, we discuss implementation of a matching-based approach to handle
the coexistence issue of unlicensed users and cellular users (CUs) in the unlicensed
spectrum market [5, 11]. We investigate a resource allocation framework using carrier
aggregation to offload the mobile broadband traffic to LTE-U. The key issues are sum-
marized as follows.
Baron looked at his watch twice as he climbed the stairs. Yes, the
family had had time to return from church; but they had not done so.
Mrs. Shepard was busy in the dining-room, but otherwise the house
was unoccupied. Silence reigned in the upper regions.
Thomason, the houseman, was looking impatiently down from the
upper landing; but Thomason didn’t count. He was probably hungry.
Baron realized that he, too, was hungry.
He went into the cheerful sitting-room and looked down upon the
street, and instantly his attitude changed.
There they came! And something was wrong. Oh, plainly, something
was wrong.
Mrs. Baron’s head was held high; she was pale; her lips were
compressed. There was nothing gracious in her carriage. She was
marching.
By her side walked Flora, keeping step with difficulty. She appeared
to be fighting off all realization of her mother’s state.
Mrs. Shepard was no longer present to lend her support to Bonnie
May. The faithful servitor had come home immediately after Sunday-
school to look after the dinner, and the child walked alone, behind
her silent elders. Her whole being radiated defiance. She was
apparently taking in every aspect of the street, but her casual
bearing was obviously studied; the determined effort she was
making was not to be concealed.
Baron hurried down-stairs so that he might meet them in the hall,
and engineer a temporary dispersement. He was affecting a calm
and leisurely demeanor when the door opened and Mrs. Baron,
followed by the others, entered.
There was an ominous silence. Bonnie May caught sight of Baron
and approached him with only a partial concealment of eagerness
and hurry.
Mrs. Baron and Flora ascended the stairs: the former leading the
way sternly; the latter moving upward with wan cheeks and bowed
head.
Baron led the way into the sitting-room, Bonnie May following. He
pretended not to see or to apprehend anything unusual. “Well, what
do you think of Sunday-school?” he began gayly.
“I think it’s fierce!” This took the form of an explosion. “It wouldn’t do
even for one-night stands!”
Baron felt the need of an admonitory attitude. “Bonnie May,” he said,
“you should have discovered that it wasn’t a play. It was something
real. It’s a place where people go to help each other.”
“They certainly need help all right enough.” This with a quite unlovely
jeering laugh.
“I wonder what you mean by that?”
“I suppose I meant the same thing you meant yourself.”
Baron paused, frowning. “I meant,” he explained patiently, “that they
are people who want to be as good as they can, and who want to
give one another encouragement.”
The child was conscious of his wish to be conciliatory. She tried to
restrain herself. “Well,” she asked, “if they want to be good, why
don’t they just be good? What’s the use of worrying about it?”
“I’m afraid it isn’t quite so simple a matter as all that.”
Bonnie May’s wrath arose in spite of herself. She was recalling
certain indignities. “I don’t see anything in it but a bum performance.
Do you know what I think they go there for?”
“That’s what I’m trying to find out.”
“I think they go there to watch each other—to find out something bad
about each other.”
“Bonnie May!”
“I do! And I’ve had pretty near enough, too. You asked me and I told
you. You’re all asking me to do things, and asking me questions; and
then if I don’t agree with you in every way I’m wrong. That may look
all right to you, but it doesn’t to me. If I’ve got to take everything, I
mean to be on my way.”
Baron remained silent a full minute. When he spoke again his voice
was persuasive, gentle. “I’m anxious to understand your difficulties,”
he said. “I’m anxious to have you understand ours. I’m sorry I
criticised you. I’m sure you mean to be fair.”
She looked at him with a light of gratitude in her eyes, a quiver of
emotion passing over her face. She had an intense desire to justify
herself—at least to him.
“Do you know what was the first thing they asked me?”
“Your name, probably.”
“No, Mrs. Shepard told them that. They asked me if I was a good
little girl!”
“But I don’t see any harm in that. Why shouldn’t they have asked
you?”
“You don’t! Do you suppose that I was going to tell them that I was—
or that I wasn’t? What nonsense! Are you ‘a good young man’? How
does a question like that sound?”
Baron pondered. “Well—” he suggested.
“Well, I wouldn’t stand it. I asked her if she was ‘a good old
woman’—and the frowzy old thing stared at me just as ugly! She
walked way down into the parquet without looking back. She’d been
grinning when she asked me. I’ll bet she won’t grin like that very
soon again.”
Baron walked to the window and looked out dully, to gain time.
How extraordinary the child’s attitude was! And yet.... He could
understand that she might have been the only child in the troupe with
which she travelled, and that her older companions, weary of
mimicry and make-believe when their work was done, might have
employed very frank, mature speech toward each other and their
young companion.
He turned away from the window with a sigh. “Won’t you take my
word for it, Bonnie May, that these people mean well, and that one
should speak of them with respect, even if one cannot speak of them
with affection?”
“But they don’t mean well. What’s the good of stalling?” She turned
until her back was toward him, and sat so, her cheek in her hand,
and her whole body eloquent of discouragement.
An instant later she turned toward him with the first evidence of
surrender she had shown. Her chin quivered and her eyes were filled
with misery. “Did you tell the man where I was, so they can come for
me if they want me?” she asked.
Here spoke the child, Baron thought. His resentment fled instantly.
“Truly I did,” he assured her. “I have been doing everything I could
think of to help. I want you to believe that.”
“Oh, I do; but you all put too much on me. I want to go back to where
things are real——”
“Real, child? The theatre, and plays, and make-believe every day?”
“It’s the only thing that’s real. You’d know that if you were an artist. It
means what’s true—that’s what it means. Do you mean to tell me
there’s anything real in all the putting on here in this house—the way
you hide what you mean and what you believe and what you want?
Here’s where the make-believe is: just a mean make-believe that
nothing comes of. The theatre has a make-believe that everybody
understands, and so it really isn’t a make-believe, and something
good and true comes of it.”
Her eyes were flashing. Her hands had been clasped while she
spoke until she came to the final clause. Then she thrust her arms
forward as if she would grasp the good and true thing which came of
the make-believe she had defended.
When Baron spoke again his words came slowly. “Bonnie May,” he
said, “I wish that you and I might try, like good friends, to understand
each other, and not to say or think anything bitter or unkind. Maybe
there will be things I can teach you. I’m sure there are things you can
teach me! And the others ... I honestly believe that when we all get
better acquainted we’ll love one another truly.”
She hung her head pensively a moment, and then, suddenly, she
laughed heartily, ecstatically.
“What is it?” he asked, vaguely troubled.
“I’m thinking it’s certainly a pretty kettle of fish I’ve got into. That’s
all.”
“You know I don’t quite understand that.”
“The Sunday-school, I mean, and your mother, and everything. They
put me in with a lot of children”—this somewhat scornfully—“and a
sort of leading lady asked us riddles—is that what you call them?
One of them was: ‘How long did it take to make the world?’”
“But that wasn’t a riddle.”
“Well, whatever it was; and they caught one Smart Alec. She said,
‘Forty days and forty nights,’ and they all laughed—so you could see
it was just a catch. As if anybody knew! That was the only fun I could
see to the whole performance, and it sounded like Rube fun at that.
One odious little creature looked at my dress a long time. Then she
said: ‘I’ve got a new dress.’ Another looked at me and sniffed, and
sniffed, and sniffed. She wrinkled her nose and lifted her lip every
time she sniffed. It was like a kind of signal. Then she said: ‘My papa
has got a big store, and we’ve got a horse and buggy.’ She sniffed
again and looked just as spiteful! I had to get back at that one. ‘Don’t
cry, little one,’ I said. ‘Wait until it’s a pretty day and I’ll come around
and take you out in my automobile.’”
“But you haven’t any automobile!”
“That,” with great emphasis, “doesn’t make any difference. There’s
no harm in stringing people of a certain kind.”
“Oh, Bonnie May!” cried Baron reproachfully, and with quickly
restored calm he added: “Surely one should tell the truth!”
“Yes, one should, if two would. But you can’t afford to show your
hand to every Bedelia that gets into your troupe. No, you can’t,” she
repeated defiantly, reading the pained look in his eyes.
Baron knew that he should have expressed his disapproval of such a
vagrant philosophy as this; but before he had time to frame a tactful
response the child continued:
“Then the leading lady turned to me, thinking up another question. I
made up my mind to be on hand if I had to sleep in the wings. ‘Why
were Adam and Eve driven out of the garden?’ was mine. I said:
‘Because they couldn’t make good!’ She looked puzzled, and I
patted her on the knee. ‘You can’t put over anything on me,’ I said. I
think I shouted it. That stopped the whole show for a minute, and an
old character man up near the stage got up and said: ‘A little less
noise, please.’ Then your mother came back.” (Baron had
anticipated this detail.) “She had been taking the leading part in a
little sketch up in front.” (Teaching her class, Baron reflected, and
smiled wryly in spite of himself.) “She had got through with her
musical turn, and—well, I don’t want to talk about her. She told me I
must sit still and listen to what the others said. Why? I’d like to know.
I couldn’t agree with her at all. I told her I was a professional and
didn’t expect to pick up anything from a lot of amateurs. And then,”
she added dejectedly, “the trouble began.”
Baron groaned. He had hoped the worst had been told. What in the
world was there to follow?
“Your mother,” resumed Bonnie May, “spoke to the woman who had
been asking questions. She said—so that the children could hear
every word—‘She’s a poor little thing who’s had no bringing up.
She’ll have to learn how to behave.’”
She hung her head in shame at the recollection of this. For the
moment she seemed unwilling to proceed.
“And what happened then?” Baron asked persuasively.
“Oh—I was getting—rattled! She had no right to work in a line like
that.”
“But what did you do?”
“I told her.... You know I am sorry, don’t you?”
“Maybe you’d rather not tell me?”
“You’d better know. I told her that when it came to doing the nasty
stuff I had seen pupils from the dramatic schools that looked like
headliners compared with her.”
Baron stiffened. “Goodness! You couldn’t have said that!”
“Yes, I did. And I didn’t have to wait to hear from any prompter,
either. And she—you know she won’t take anything. The way she
looked! She said she was glad to say she didn’t have any idea what I
was talking about. Just a stall, you know. Oh, these good people!
She called Flora and said I was to be taken into a corner, and that I
was to sit there until we went home. And Flora led me into a corner
and the others looked back as if they were afraid of me. They all
sang after a while—a kind of ensemble affair. Flora held the music
over and invited me to sing. I told her musical turns were not in my
line. She just kept on holding the music for me—honestly, she’s the
dearest thing!—and singing herself. It was a crime, the noise she
made. Isn’t it awful when people try to sing and can’t? As if they had
to. Why do they do it? I felt like screaming to her to stop. But she
looked as if she might be dreaming, and I thought if anybody could
dream in that terrible place it would be a crime to wake them, even if
they did make a noise. They had an intermission, and then a man
down in front delivered a monologue.... Oh, me! Talk about the
moving-picture shows! Why, they’re artistic....”
What, Baron wondered, was one to say to a child who talked in such
a fashion?
Nothing—nothing at all. He groaned. Then, to his great relief, Flora
appeared.
“Dinner is ready,” she said, standing in the doorway. There was a
flush on her cheeks and an odd smile on her lips.
Baron took Bonnie May by the hand—he could not quite understand
the impulse which prompted him to do so—and led her into the
dining-room.
He saw that she bore her face aloft, with a painful effort at
unconcern. He was glad that she was given a place next to him, with
the elder Baron on her right, and Flora across the table from her.
He was dismayed to note that his mother was quite beside herself.
He had expected a certain amount of irritation, of chagrin, but not
this ominous, pallid silence. She avoided her son’s eyes, and this
meant, of course, that her wrath would sooner or later be visited
upon his head.
He sighed with discouragement. He realized sadly that his mother’s
heaviest crosses had always come to her from such trivial causes!
She was oddly childish—just as Bonnie May was strangely
unchildlike. Still, she had all the traditions of propriety, of a rule-made
demeanor, behind her. Strange that she could not have risen to the
difficulty that had confronted her, and emerged from a petty
predicament without so much of loss!
The meal progressed in a constrained silence. Bonnie May
concerned herself with her napkin; she admired the design on the
china; she appeared to appraise the dishes with the care of an
epicure. And at last, unfortunately, she spoke.
“Don’t you think, Mr. Baron”—to the master of the house—“that it is a
pretty custom to converse while at table?”
Mr. Baron coughed. He was keenly aware that something had gone
wrong; he was shrewd enough to surmise that Bonnie May had
offended. But he was in the position of the passenger below decks
who senses an abnormal atmosphere but who is unadvised as to the
nature of the storm.
“I’m afraid I’m not a very reliable hand at small talk,” he said
guardedly. “I think my idea is that you ought to talk when you have
something to say.”
“Very good!” agreed Bonnie May, nodding brightly. She patted her
lips daintily with the corner of her napkin. “Only it seems like