Professional Documents
Culture Documents
Wireless Blockchain Principles Technologies and Applications 1st Edition Bin Cao Lei Zhang Mugen Peng Muhammad Ali Imran Eds
Wireless Blockchain Principles Technologies and Applications 1st Edition Bin Cao Lei Zhang Mugen Peng Muhammad Ali Imran Eds
Wireless Blockchain Principles Technologies and Applications 1st Edition Bin Cao Lei Zhang Mugen Peng Muhammad Ali Imran Eds
https://ebookmeta.com/product/wireless-blockchain-principles-
technologies-and-applications-1st-edition-bin-cao-editor/
https://ebookmeta.com/product/autonomous-airborne-wireless-
networks-ieee-press-1st-edition-muhammad-ali-imran-editor/
https://ebookmeta.com/product/eco-friendly-corrosion-inhibitors-
principles-designing-and-applications-1st-edition-lei-guo/
https://ebookmeta.com/product/networked-microgrids-1st-edition-
peng-zhang/
Blockchain Consensus: An Introduction to Classical,
Blockchain, and Quantum Consensus Protocols 1st Edition
Imran Bashir
https://ebookmeta.com/product/blockchain-consensus-an-
introduction-to-classical-blockchain-and-quantum-consensus-
protocols-1st-edition-imran-bashir/
https://ebookmeta.com/product/3-d-computer-vision-principles-
algorithms-and-applications-1st-edition-yu-jin-zhang/
https://ebookmeta.com/product/molecular-characterization-of-
polymers-a-fundamental-guide-1st-edition-muhammad-imran-malik/
https://ebookmeta.com/product/wireless-communication-
advancements-and-challenges-wireless-communications-and-
networking-technologies-1st-edition-prashant-ranjan/
Wireless Blockchain
Wireless Blockchain
Edited by
Bin Cao
Beijing University of Posts and Telecommunications
Beijing, China
Lei Zhang
University of Glasgow
Glasgow, UK
Mugen Peng
Beijing University of Posts and Telecommunications
Beijing, China
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by
any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted
under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written
permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the
Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978)
750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be
addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030,
(201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permission.
Limit of Liability/Disclaimer of Warranty: While the publisher and authors have used their best efforts in
preparing this work, they make no representations or warranties with respect to the accuracy or
completeness of the contents of this work and specifically disclaim all warranties, including without
limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may
be created or extended by sales representatives, written sales materials or promotional statements for this
work. The fact that an organization, website, or product is referred to in this work as a citation and/or
potential source of further information does not mean that the publisher and authors endorse the
information or services the organization, website, or product may provide or recommendations it may
make. This work is sold with the understanding that the publisher is not engaged in rendering professional
services. The advice and strategies contained herein may not be suitable for your situation. You should
consult with a specialist where appropriate. Further, readers should be aware that websites listed in this
work may have changed or disappeared between when this work was written and when it is read. Neither
the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including
but not limited to special, incidental, consequential, or other damages.
For general information on our other products and services or for technical support, please contact our
Customer Care Department within the United States at (800) 762-2974, outside the United States at (317)
572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not
be available in electronic formats. For more information about Wiley products, visit our web site at
www.wiley.com.
Names: Cao, Bin, editor. | Zhang, Lei, editor. | Peng, Mugen, editor. |
Imran, Muhammad Ali, editor.
Title: Wireless blockchain : principles, technologies and applications /
Bin Cao, Beijing University of Posts and Telecommunications, Beijing,
China, Lei Zhang, University of Glasgow, Glasgow, UK, Mugen Peng,
Beijing University of Posts and Telecommunications, Beijing, China,
Muhammad Ali Imran, University of Glasgow, Glasgow, UK.
Description: Chichester, United Kingdom ; Hoboken : Wiley-IEEE Press,
[2022] | Includes bibliographical references and index.
Identifiers: LCCN 2021034990 (print) | LCCN 2021034991 (ebook) | ISBN
9781119790808 (cloth) | ISBN 9781119790815 (adobe pdf) | ISBN
9781119790822 (epub)
Subjects: LCSH: Blockchains (Databases) | Wireless communication
systems–Industrial applications. | Personal communication service
systems.
Classification: LCC QA76.9.B56 W57 2022 (print) | LCC QA76.9.B56 (ebook)
| DDC 005.74–dc23
LC record available at https://lccn.loc.gov/2021034990
LC ebook record available at https://lccn.loc.gov/2021034991
10 9 8 7 6 5 4 3 2 1
v
Contents
Index 297
xiii
List of Contributors
Preface
Originally proposed as the backbone technology of Bitcoin, Ethereum, and many other
cryptocurrencies, blockchain has become a revolutionary decentralized data management
framework that establishes consensuses and agreements in trustless and distributed envi-
ronments. Thus, in addition to its soaring popularity in the finance sector, blockchain has
attracted much attention from many other major industrial sectors ranging from supply
chain, transportation, entertainment, retail, healthcare, information management to finan-
cial services, etc.
Essentially, blockchain is built on a physical network that relies on the communications,
computing, and caching, which serves the basis for blockchain functions such as incentive
mechanism or consensus. As such, blockchain systems can be depicted as a two-tier archi-
tecture: an infrastructure layer and a blockchain layer. The infrastructure layer is the under-
lying entity responsible for maintaining the P2P network, building connection through
wired/wireless communication, and computing and storing data. On the other hand, the
top layer is the blockchain that is responsible for trust and security functions based on
the underlying exchange of information. More specifically, blockchain features several key
components that are summarized as transactions, blocks, and the chain of blocks. Transac-
tions contain the information requested by the client and need to be recorded by the public
ledger; blocks securely record a number of transactions or other useful information; using
a consensus mechanism, blocks are linked orderly to constitute a chain of blocks, which
indicates logical relation among the blocks to construct the blockchain.
As a core function of the blockchain, the consensus mechanism (CM, also referred to as
consensus algorithm or consensus protocol) works in the blockchain layer in order to ensure
a clear sequence of transactions and the integrity and consistency of the blockchain across
geographically distributed nodes. The CM largely determines the blockchain system perfor-
mance in terms of security level (fault tolerance level), transaction throughput, delay, and
node scalability. Depending on application scenarios and performance requirements, differ-
ent CMs can be used. In a permissionless public chain, nodes are allowed to join/leave the
network without permission and authentication. Therefore, proof-based algorithms (PoX),
such as proof-of-work (PoW), proof-of-stake (PoS), and their variants, are commonly used
in many public blockchain applications (e.g. Bitcoin and Ethereum). PoX algorithms are
designed with excellent node scalability performance through node competition; however,
they could be very resource demanding. Also, these CMs have other limitations such as
long transaction confirmation latency and low throughput. Unlike public chains, private
xviii Preface
and consortium blockchains prefer to adopt lighter protocols such as Raft and practical
Byzantine fault tolerance (PBFT) to reduce computational power demand and improve
the transaction throughput. A well-known example of PBFT implementation is the Hyper-
Ledger Fabric, part of HyperLedger business blockchain frameworks. However, such CMs
may require heavy communication resources.
Today, most state-of-the-art blockchains are primarily designed in stable wired commu-
nication networks running in advanced devices with sufficient communication resource
provision. Hence, the blockchain performance degradation caused by communication is
negligible. Nevertheless, this is not the case for the highly dynamic wireless connected
digital society that is mainly composed of massive wireless devices encompassing finance,
supply chain, healthcare, transportation, and energy. Especially through the upcoming 5G
network, the majority of valuable information exchange may be through a wireless medium.
Thus, it is critically important to answer one question, how much communication resource
is needed to run a blockchain network (i.e. communication for blockchain).
From another equally important aspect when combining blockchain with communi-
cation (especially wireless communication), many works have focused on how to use
blockchain to improve the communication network performance (i.e. blockchain for
communication). This integration between wireless networks and blockchain allows the
network to monitor and manage communication resource utilization in a more efficient
manner, reducing its administration costs and improving the speed of communication
resource trading. In addition, because it is the blockchain’s inherit transparency, it can
also record real-time spectrum utilization and massively improve spectrum efficiency by
dynamically allocating spectrum bands according to the dynamic demands of devices.
Moreover, it can also provide the necessary incentive for spectrum and resource sharing
between devices, fully enabling new technologies and services that are bound to emerge.
The resource coordination and optimization between resource requesters and providers
can be automatically completed through smart contracts, thus improving the efficiency of
resource optimization. Furthermore, with future wireless networks shifting toward decen-
tralized solutions, with thousands of mobile cells deployed by operators and billions of
devices communicating with each other, fixed spectrum allocation and operator-controlled
resource sharing algorithms will not be scalable nor effective in future networks. As such,
by designing a communications network coupled with blockchain as its underlying infras-
tructure from the beginning, the networks can be more scalable and provide better and more
efficient solutions in terms of spectrum sharing and resource optimization, for example.
The book falls under a broad category of security and communication network and their
transformation and development, which itself is a very hot topic for research these years.
The book is written in such a way that it offers a wide range of benefits to the scientific
community: while beginners can learn about blockchain technologies, experienced
researchers and scientists can understand the extensive theoretical design and architecture
development of blockchain, and industrial experts can learn about various perspectives
of application-driven blockchains to facilitate different vertical sectors. Therefore, this
feature topic can attract graduate/undergraduate level students, as well as researchers and
leading experts from both academia and industry. In particular, some blockchain-enabled
use cases included in the book are suitable for audiences from healthcare, computer,
telecommunication, network, and automation societies.
Preface xix
research challenges, the authors propose a scalable citizen-utility that supports interoper-
ability and a Privacy-preserving Data Clearing House (PDCH), which is a blockchain-based
data management tool for preserving on-ledger and off-ledger transactions data privacy.
The chapter is finished with outlines of future research directions of PDCH.
In Chapter 10, the authors introduce a blockchain-enabled COVID-19 contact tracing
solution named BeepTrace. This novel technology inherits the advantages of digital con-
tract tracing (DCT) and blockchain, ensuring the privacy of users and eliminating the con-
cerns about the third-party trust while protecting the population’s health. Then, based on
different sensing technologies, i.e. Bluetooth and GPS, the authors categorize BeepTrace
into BeepTrace-active mode and BeepTrace-passive mode, respectively. In addition, the
authors summarize and compare the two BeepTrace modes and indicate their working prin-
ciples and privacy preservation mechanisms in detail. After that, the authors demonstrate
a preliminary approach of BeepTrace to prove the feasibility of the scheme. At last, further
development prospects of BeepTrace or other decentralized contact tracing applications are
discussed, and potential challenges are pointed out.
Chapter 11 looks at the infusion of blockchain technology into medical data sharing. The
chapter provides an overview of medical data sharing and defines the challenges in this
filed. The authors revisit some already established angles of blockchain medical data shar-
ing in order to properly contextualize it and to highlight new perspectives on the logical
outworking of blockchain-enabled sharing arrangements. Then, the authors present three
cases that are especially suited to blockchain medical data sharing. They also present an
architecture to support each paradigm presented and analyze medical data sharing to high-
light privacy and security benefits to data owners. Finally, the authors highlight some new
and emerging services that can benefit from the security, privacy, data control, granular data
access, and trust blockchain medical data sharing infuses into healthcare.
In Chapter 12, the authors propose a blockchain-based decentralized content vetting for
social networks. The authors use Bitcoin as the underlying blockchain model and develop
an unidirectional channel model to execute the vetting procedure. In this vetting procedure,
all users get a chance to vote for and against a content. Content with sufficient positive votes
is considered as vetted content. The authors then optimize the offline channel network
topology to reduce computation overhead because of using blockchains. At last, the authors
prove the efficiency of the vetting procedure with experiments using simulations of content
propagation in social network.
Abbreviations
1.1 Introduction
The past decade has witnessed tremendous growth in emerging wireless technologies
geared toward diverse applications [1]. Radio access networks (RANs) are becoming
more heterogeneous and highly complex. Without well-designed inter-operation, mobile
network operators (MNOs) must rely on their independent infrastructures and spectra to
deliver data, often leading to duplication, redundancy, and inefficiency. A huge number of
currently deployed business or individual access points (APs) have not been coordinated
in the existing architecture of RANs and are therefore under-utilized. Meanwhile, user
equipments (UEs) are not granted to access to APs of operators other than their own,
even though some of them may provide better link quality and economically sensible.
The present state of rising traffic demands coupled with the under-utilization of existing
spectra and infrastructures motivates the development of a novel network architecture
to integrate multiple parties of service providers (SPs) and clients to transform the rigid
network access paradigm that we face today.
Recently, blockchain has been recognized as a disruptive innovation shockwave [2–4].
Federal Communications Commission (FCC) has been suggested that blockchain may be
integrated into wireless communications for the next-generation network (NGN) in the
Mobile World Congress 2018. Along the same line, the new concept of blockchain radio
access network (B-RAN) was formally proposed and defined in [5, 6]. In a nutshell, B-RAN
is a decentralized and secure wireless access paradigm that leverages the principle of
blockchain to integrate multiple trustless networks into a larger shared network and bene-
fits multiple parties from positive network effects [6]. It is a new architecture that integrates
both characteristics of wireless networks and distributed ledger technologies. As revealed
in [5, 6], B-RAN can improve the overall throughput through simplified inter-operator
* X. Ling, Y. Le, J. Wang, Z. Ding, and X. Gao. Practical modeling and analysis of blockchain radio access
network. IEEE Transactions on Communications, 69(2): 1021–1037, Feb. 2021.
cooperation in the network layer (rather than increasing the channel capacity in the
physical layer). B-RAN can enhance the data delivery capability by connecting these RANs
into a big network and leveraging the power of multi-sided platform (MSP). The positive
network effect can help B-RAN recruit and attract more players, including network
operators, spectral owners, infrastructure manufacturers, and service clients alike [6].
The subsequent expansion of such a shared network platform would make the network
platform more valuable, thereby generating a positive feedback loop. In time, a vast
number of individual APs can be organized into B-RAN and commodified to form a sizable
and ubiquitous wireless network, which can largely improve the utility of spectra and
infrastructures. In practice, rights, responsibilities, and obligations of each participant in
B-RAN can be flexibly codified as smart contracts executed by blockchain.
Among the existing studies on leveraging blockchain in networks, most have focused on
Internet of Things (IoT) [7–11], cloud/edge computing [12–15], wireless sensor networks
[16], and consensus mechanisms [17–19]. Only a few considered the future integration of
blockchain in wireless communications [20–26]. Weiss et al. [20] discussed several poten-
tials of blockchain in spectrum management. Kuo et al. [21] summarized some critical
issues when applying blockchain to wireless networks and pointed out the versatility of
blockchain. Pascale et al. [22] adopted smart contracts as an enabler to achieve service level
agreement (SLA) for access. Kotobi and Bilen [23] proposed a secure blockchain verifica-
tion protocol associated with virtual currency to enable spectrum sharing. Le et al. [27]
developed an early prototype to demonstrate the functionality of B-RAN.
Despite the growing number of papers and heightened interests to blockchain-based
networking, works including fundamental analysis are rather limited. A number of
critical difficulties remain unsolved. (i) Existing works have not assessed the impact of
decentralization on RANs after introducing blockchain. Decentralization always comes
with a price that should be characterized and quantified. (ii) Very few papers have noticed
that service latency will be a crucial debacle for B-RAN as a price of decentralization [22].
Unfortunately, the length of such delay and its controllability are still open issues.
(iii) Security is yet another critical aspect of blockchain-based protocols. In particular,
alternative history attack, as an inherent risk of decentralized databases, is always possible
and must be assessed. (iv) A proper model is urgently needed to exploit the characteristics
of B-RAN (such as latency and security) and to further provide insights and guidelines for
real-world implementations.
To address the aforementioned open issues, this chapter establishes a framework to con-
cretely model and evaluate B-RAN. We start from the block generation process and develop
an analytical model to characterize B-RAN behaviors. We shall evaluate the performance
in terms of latency and security in order to present a more comprehensive view of B-RAN.
We further verify the efficacy of our model through an innovative B-RAN prototype. The
key contributions are summarized as follows:
● We define the workflow of B-RAN and introduce an original queuing model based on a
time-homogeneous Markov chain, the first known analytical model for B-RAN.
● From the queuing model, we analytically characterize the steady state of B-RAN and fur-
ther derive the average service latency.
● We use the probability of a successful attack to define the safety property of B-RAN and
evaluate potential factors that influence the security.
1.2 What is B-RAN 3
Request
Authorize
Blockchain
the greater pool of UEs to access their APs and networks by receiving payment or credit for
reciprocal services. Blockchain acts as a public ledger in B-RAN for recording, confirming,
and enforcing digital actions in smart contracts to protect the interests of all participants.
B-RAN is envisioned to be broadly inter-operative and to support diverse advanced wire-
less services and standards. In this chapter, we focus on the fundamental access approach
for which the procedure is shown in Figure 1.2.
● In preparation for access, UEs and SPs should first enter an SLA containing the details
including service types, compensation rates, among other terms. (For example, SPs can
first publish their service quality and charge standard, and UEs select suitable SPs accord-
ing to the expenditure and quality of service.) The service terms and fees will be explicitly
recorded in a smart contract authorized by the digital signatures of both sides.
● In phase 1, the smart contract with the access request is committed to the mining network
and is then verified by miners. The verified contracts are assembled into a new block,
which is then added at the end of the chain.
● In phase 2, the block is accepted into the main chain after sufficient blocks as confirma-
tions built on top of it.
● In phase 3, the request is waiting for service in the service queue.
● In phase 4, the access service is delivered according to the smart contract.
The above procedure can be viewed as a process of trust establishment between clients
and SPs, similar to negotiating and signing monthly contracts between users and MNOs.
Thus, in B-RAN, clients can obtain access services more conveniently through the above
process instead of signing contracts with a specific MNO in advance. The service duration
in B-RAN is flexible and can be as short as a few minutes or hours, which is different from
typical long-term plans (e.g. monthly plans). UEs can prolong access services by renewing
the contract earlier before the previous one expires in order to continue the connection
status. Therefore, service latency in this context refers to the delay when a UE accesses
an unknown network for the first time and can be viewed as the time establishing trust
between two trustless parties, which is significantly different from the transmission delay
in the physical layer.
1.2 What is B-RAN 5
Commit
Smart AP
Service AP
contract
Queue
Block Access
REQk(t ak , τ ck ) Wait for N Blocks
UE
τ ck
UE AP t ak
Phase 1 Phase 2 Phase 3 Phase 4
Wait to be included Wait for confirmations Wait for service In service
into a block
1 Usually, the physical channel may provide services to many clients via proper multiple access
techniques. We use the concept of “virtual link” to avoid ambiguity.
2 Note that, in this chapter, the miners still follow the basic first-in-first-out principle to put the requests
into the queue.
6 1 What is Blockchain Radio Access Network?
periodically. Based on the above mechanism, B-RAN can take advantage of pooling and
sharing across subnetworks. Please refer to Figure 1.9 in this chapter and [6, 10] for more
details and evidence for the pooling effect in B-RAN.
1.2.3 Implementation
In order to evaluate our established model, we will provide demonstrative experimental
results from a home-built prototype throughout the whole article. We implement this ver-
sion of B-RAN prototype on four single board computers (SBCs) and use a workstation with
Intel Core CPU I7-8700K and 32GB RAM in order to provide sufficient computing power.
Our prototype consists of a standard file system for data storage, a key-value database for
file index, and the core modules written in Python. The prototype supports both PoW and
PoD consensus mechanisms as two available options and can adopt an appropriate one
according to the specific environment and requirements. We configure different SBCs as
UEs and APs and set up the integrated development environment (IDE), wherein UEs pro-
pose access requests according to the input configurations, and APs provide services based
on the workflow given in Section 1.2.1. During tests, the prototype can track running statis-
tics and provide them as output results.
The B-RAN prototype is a hierarchical architecture with a number of modules and com-
ponents [6]. For example, the fast smart contract deployment (FSCD) was proposed in [27]
to accelerate the service deployment, and the hash time-locked contract (HTLC) is designed
1.3 Mining Model 7
in [6] to enforce the contract and secure the trading process. This chapter is important by
modeling and assessing B-RAN, and thus, we cannot include all the technical details here.
Please see these citations for more details. Note that, in this chapter, the average service
time T c as time unit is set to unity without loss of generality, so time is measured as relative
variables in terms of time unit T c .
In Sections 1.5–1.7, we will assess the performance of B-RAN from different points of view
and verify our model step by step through prototype verifications. Although these verifica-
tions focus on different aspects, all of them are obtained from the same B-RAN prototype
described above.
Here, “HP” stands for the hash pointer to a previous block, “DP” means the data payload,
“TS” is the current timestamp, “GT” represents a given target, and “OF” is the optional field
depending on the specific type of the hash puzzle. For instance, in the PoW protocol, the
optional field can be any random number, whereas in the PoD protocol, the optional field is
given by the hardware identifier. In PoW, the range of the optional field is unlimited. Hence,
a miner can guess many times to find a correct nonce, and hence, the number of trials is only
restricted by the mining rigs. In PoD, the optional field is given by the tamper-proof identi-
fier such that each device can perform the hash computation only once for each timestamp,
thereby largely reducing the power consumption. The premise behind that is that the enti-
ties in real RANs cannot be effortlessly forged or created. The characteristics, e.g. security
and power consumption, of different hash-based consensus mechanisms can be traded off
by properly choosing the optional field.
Note that W b can be viewed as the waiting period before a block is successfully generated,
and its distribution can be described by (1.2) and (1.3). The average number of successes in
m independent trials is mp.
Hence, if m hash trials are conducted in a time interval of length 𝜏, then the success rate
defined as the mean number of successes per unit time is 𝜆b = mp∕𝜏. Now, let p → 0 and
m → ∞ in the way that keeps 𝜆b constant. We can visualize an experiment with infinite
hash trials performed within interval 𝜏. Successive trials are infinitesimally close with van-
ishingly small probability of success, but the mean number of successes remains a non-zero
constant 𝜆b 𝜏. By using the fact that the geometric distribution approaches the exponential
distribution in the limit, we have
( )m
𝜆b 𝜏
lim (1 − p)m ∣p= 𝜆b 𝜏 = lim 1 − = exp(−𝜆b 𝜏). (1.4)
m→∞ m m→∞ m
Letting a random variable U b be the continuous time before preceding the first success, we
have
{ } { }
Pr U b > 𝜏 = Pr W b > m = exp(−𝜆b 𝜏). (1.5)
We name U b as the block time in the context of blockchain. According to (1.5), the average
[ ]
block time 𝔼 U b , denoted by T b , is equal to 1∕𝜆b , where 𝜆b is thus called as the mining
rate representing how fast blocks generate.
Equations (1.4) and (1.5) imply that, if the number of hash computations of the whole
network in a unit time tends to infinity, then the length of time between two successive
blocks, i.e. U b ’s, would follow the exponential distribution. Interestingly, most of mature
PoW blockchain networks indeed perform a huge number of hash computations every
moment. For example, the minimum hash rates of bitcoin and Ethereum during 2018 are
14 891 and 159TH/s.3 . These are humongous numbers in real world and practically support
the limiting condition that the number of trials tends to infinity. When massive hardware
devices are participating in mining, the condition also holds for PoD. Remark that, even
if the number of trials is finite and the exponential approximation no longer holds, the
block times U b ’s are still mutually independent and identically distributed because of the
memoryless property of geometric distribution.
Now, we further prove that block generation forms a Poisson process. Let B(n, t, t + h)
denote the event that n blocks are generated in interval (t, t + h). As h → 0, the probability
that at least one block is generated in (t, t + h) is
We note that o(h) is an infinitesimal of higher order such that limh→0 o(h)∕h = 0. Exactly,
one block is generated in (t, t + h), i.e. B(n = 1, t, t + h), if and only if the first block occurs
within (t, t + h) and the second one occurs after the epoch t + h. Hence, the probability of
Pr {B(n = 1, t, t + h)} is
Pr {B(n = 1, t, t + h)}
h { } { }
= Pr U1b = h − u Pr U2b > u du
∫0
h
= 𝜆b exp(−𝜆b (h − u)) exp(−𝜆b u)du
∫0
= 𝜆b h exp(−𝜆b h) = 𝜆b h + o(h), h → 0,
where U1b and U2b represent the generation times of first and second blocks since t, respec-
tively. As h → 0, the probability of occurrence of two or more blocks in (t, t + h) is
In conclusion, the block generation can be modeled as a Poisson process with mining rate
𝜆b . Since the negligible propagation delay and infinity hash rate are assumed in the model-
ing, we shall carefully verify the validation of the Poisson model by real data.
In Prototype Verification A, we illustrate the validity of the Poisson model in Figure 1.3
by empirical data. In our self-built B-RAN prototype described in Figure 1.3a, we deploy five
miners with equal mining rates and set the block generation rate to 𝜆b = 1∕10 or equiva-
lently the average block time T b = 1∕𝜆b = 10. We measure the block time for 10 000 blocks
and plot the histogram to approximate the distribution of block time U b . One can see that
the Poisson model closely fits the data. Furthermore, we collected the empirical data from
Bitcoin (51 036 blocks starting at height 530 1144 ) and Ethereum (2 078 000 blocks start-
ing at height 5 806 2895 ) to demonstrate the validity of the model in practice. The collected
Bitcoin and Ethereum data are also consistent with the model in a real network where prop-
agation delay does exist. To be more specific, we calculate R2 as a goodness-of-fit indicator
× 10–3
0.1
1.5 R2 > 0.999 0.06 2
R > 0.995
0 0 0
0 20 40 60 0 1000 2000 3000 0 20 40 60
Block time (s) Block time (s) Block time (s)
(a) (b) (c)
Figure 1.3 The distribution of block time from real data and simulations. (Please see footnotes 4
and 5 for sources.) (a) Self-built B-RAN prototype. (b) Bitcoin. (c) Ethereum.
and obtain R2 > 0.999 for Bitcoin and R2 > 0.995 for Ethereum. The above results strongly
support that the Poisson model perfectly fits the data, even in Ethereum where the block
propagation is in the same order of magnitude as the block time. Therefore, even though
the propagation delay is simply neglected, the Poisson model can still well characterize the
block generation in practice.
+ , t ≥ 0}.
{X(t) ∈ ℤN+1
6 Usually, an attacker can hardly amass more hash power than the sum of other honest miners, i.e. 𝛽 < 1;
Otherwise, the attacker already dominates the mining network.
1.4 B-RAN Queuing Model 11
B-RAN is said to be in state E(i0 , i1 , … , iN−1 , j) at time t if X(t) = E(i0 , i1 , … , iN−1 , j). Note
that the way to establish a queuing model is not unique. We define B-RAN by using the
queuing model {X(t), t ≥ 0} owing to two critical properties, as shown in Theorem 1.1.
Theorem 1.1 The queuing model {X(t), t ≥ 0} is a continuous process with Markov prop-
erty and time homogeneity or mathematically:
(a) Pr{X(t + h) = E|X(t) = E′ , X(u) for 0 ≤ u ≤ t} (1.6)
{ }
= Pr X(t + h) = E|X(t) = E′ ;
{ }
(b) Pr{X(t + h) = E|X(t) = E′ } = Pr X(t) = E|X(0) = E′ . (1.7)
Proof: Recall that, as claimed in Section 1.2, requests arrive according to a Poisson process
with rate 𝜆a , and the service times are exponentially distributed with mean 1∕𝜆c , indepen-
dently of each other. According to the mining model in Section 1.3, the block generation
is a Poisson process with rate 𝜆b . In a nutshell, request inter-arrival times U a , block times
U b , and service times U c are exponential with mean 1∕𝜆a , 1∕𝜆b , and 1∕𝜆c , respectively, and
independent of each other.
The exponential service times U c imply that if j UEs are in service, the rate at which
service completions occur is j𝜆c . To show this, suppose that U1c , U2c , … , Ujc are the duration
c
of j i.i.d. exponential simultaneously running time intervals with mean 1∕𝜆c . Let Umin =
{ }
min U1 , U2 , … , Uj be the minimum service time. Observe that Umin will exceed u if and
c c c c
Only those UEs that are in service can possibly leave. Hence, the service completion rate
with j simultaneous services is j𝜆c for 0 ≤ j ≤ s. Since at most s UEs can be in service simul-
taneously, obviously the service completion rate is at most s𝜆c . Hence, we denote
𝜆cj = min (j, s) ⋅ 𝜆c , (1.8)
to represent the service completion rate of B-RAN compactly. Similarly, the time until
the next event (a request arrival, a block generation, or a service completion) is also
exponentially distributed with rate (𝜆a + 𝜆b + 𝜆cj ). The probability that an event occurs in
( ( ) ) ( )
(t, t + h) is 1 − exp − 𝜆a + 𝜆b + 𝜆cj h , which tends to 𝜆a + 𝜆b + 𝜆cj h + o(h) as h → 0.
The length of time required for the event to occur and the type of the event are independent.
There are several possible changes to a state. If a new request arrives, the state of B-RAN
( ) ( )
will switch from E′ i0 , i1 , … , iN−1 , j to E i0 + 1, i1 , … , iN−1 , j . The probability that a new
request arrives in (t, t + h) is given by
( ) ( )}
Pr {X(t + h) = E i0 + 1, i1 , … , iN−1 , j |X(t) = E′ i0 , i1 , … , iN−1 , j (1.9)
(( ) )
𝜆 a
= a 𝜆a + 𝜆b + 𝜆cj h + o(h) = 𝜆a h + o(h), (h → 0).
𝜆 + 𝜆b + 𝜆cj
Similarly, if a new block is generated, all the existing blocks will get one more confirmation,
( ) ( )
and the state of B-RAN will move from E′ i0 , i1 , … , iN−1 , j to E 0, i0 , i1 , … , iN−1 + j . The
12 1 What is Blockchain Radio Access Network?
λccjh
λah
1 – (λa + λb + λcj )h E΄(i0, i1, ..., iN–1, j) E(i0 + 1, i1, ..., iN–1, j)
λbh
( )
Figure 1.4 State transition graph of E i0 , i1 , … , iN−1 , j . (j ≥ 1.).
Although the queuing model established by Theorem 1.1 is a vector stochastic process
with possibly high dimensions, we would like to emphasize that such a queuing model
is more tractable than the original non-Markovian process. According to the proof of
{ }
Theorem 1.1, we can directly obtain the transition probabilities Pr X(h) = E|X(0) = E′
and characterize the queuing model {X(t), t ≥ 0} completely.
Figure 1.4 visualizes the transition relationships according to the proof of Theorem 1.1.
{ }
One can see that the basic elements 𝜆a , 𝜆b , 𝜆c , s and the number of confirmations N
are enough to determine the transition probabilities and thus characterize the behaviors
{ }
of B-RAN. Hence, we introduce a four-tuple Φ = 𝜆a , 𝜆b , 𝜆c , s as basic configurations to
describe B-RAN. In Sections 1.5 and 1.6, we will analyze B-RAN from a deeper view in
more dimensions.
In the one-confirmation case, the queuing model is presented by {X(t) = E(i, j), t ≥ 0},
where we drop the subscript of i0 for notational simplicity. State E(i, j) means that i pending
requests are waiting for assembling into a block and j confirmed requests are waiting for
service. Define 𝑤i,j (t) = Pr {X(t) = E(i, j)} as the probability of the queue in state E(i, j) at
time t. Now, let us investigate the transition probabilities during time h with the help of
Theorem 1.1. By comparing the state of B-RAN at time t + h with that at time t, for all
i = 1, 2, … and j = 0, 1, 2, …, we have
( )
𝑤i,j (t + h) − 𝑤i,j (t) = 𝑤i−1,j (t)𝜆a h + 𝑤i,j+1 (t)𝜆cj+1 h − 𝑤i,j (t) 𝜆a + 𝜆b + 𝜆cj h,
λb λb λb
λa λa
λa λa
λc λc2 λc3
1, 0 1, 1 1, 2 ...
λa λa λa
λc λc2
2, 0 2, 1 ...
λa λa
3, 0
λc ...
λa
...
0, 0 0, 1 0, 2 0, 3
w0, 0
w1, 0
w0, 1
1, 0 1, 1 1, 2 w2, 0
w1, 1
w0, 2
2, 0 2, 1 w3, 0
w2, 1
w1, 2
3, 0
w0, 3
…
𝓌
…
⎡ −𝜆
a 𝜆c1 ··· ⎤
( )
⎢ 𝜆 a − 𝜆a + 𝜆b 𝜆c1 ··· ⎥
⎢ ( a ) ⎥
⎢ 𝜆 b − 𝜆 + 𝜆 c
𝜆c2 ··· ⎥
⎢
1 ( a )
Q= 𝜆 a − 𝜆 +𝜆 b ··· ⎥
⎢ ( ) ⎥
⎢ 𝜆a − 𝜆a + 𝜆b + 𝜆c1 ··· ⎥
( )
⎢ 𝜆b 𝜆b − 𝜆a + 𝜆c2 ··· ⎥
⎢ ⎥
⎣ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋱ ⎦
(1.14)
d
The entry in Q equals to the corresponding transition rate given by dh Pr{X(h) =
{ }
E|X(0) = E′ } only depending on the B-RAN configuration tuple Φ = 𝜆a , 𝜆b , 𝜆c , s . We can
numerically solve the matrix equation by combining with the sum probability condition of
𝟏T w = 1, i.e.
[ ] [ ]
Q 𝟎
w = . (1.15)
𝟏T 1
From (1.15), the steady-state distribution w(Φ) can be expressed as an implicit function of
Φ. Note that the waiting space of B-RAN has no maximum limit. The number of states, i.e.
the dimensions of the vector w, should be infinite. In numerical calculations, we can use
the solution with large enough but finite dimensions to approximate the infinite-dimension
one. However, in practice, the number of UEs in a tract cannot be infinite, either. The aggres-
sive load 𝜆a is required to be less than 𝜆c by the stable condition.
We can obtain the steady-state distribution of B-RAN via (1.15). In Prototype
Verification B, we use our self-built prototype to measure the sojourn time of each state
and estimate the probability of a state. The results show that analytical steady distributions
are highly consistent with experimental outcomes, thereby validating our established
queuing model. We illustrate the steady-state distributions of B-RAN with different T b
𝜆a
and different traffic intensities 𝜌 = s𝜆 c
in Figure 1.7. The low, medium, and high traffic
1.5 Latency Analysis of B-RAN 15
(0,0) (0,1) (0,2) (0,3) (0,4) (0,5) (0,0) (0,1) (0,2) (0,3) (0,4) (0,5)
0.66 0.26 0.053 0.0071 ≈0 ≈0 0.62 0.25 0.051 0.0072 ≈0 ≈0
(1,0) (1,1) (1,2) (1,3) (1,4) (1,0) (1,1) (1,2) (1,3) (1,4)
0.011 0.0041 ≈0 ≈0 ≈0 0.049 0.016 0.0029 ≈0 ≈0
(5,0) (5,0)
0 T b = 0.04 T c, ρ = 0.1 ≈0 T b = 0.2 T c, ρ = 0.1
(a) (d)
(0,0) (0,1) (0,2) (0,3) (0,4) (0,5) (0,0) (0,1) (0,2) (0,3) (0,4) (0,5)
0.19 0.3 0.24 0.13 0.051 0.021 0.15 0.23 0.19 0.11 0.046 0.02
(1,0) (1,1) (1,2) (1,3) (1,4) (1,0) (1,1) (1,2) (1,3) (1,4)
0.012 0.018 0.014 0.0073 0.0028 0.044 0.06 0.043 0.021 0.0083
(5,0) (5,0)
≈0 T b = 0.04 T c, ρ = 0.4 ≈0 T b = 0.2 T c, ρ = 0.4
(b) (e)
(0,0) (0,1) (0,2) (0,3) (0,4) (0,5) (0,0) (0,1) (0,2) (0,3) (0,4) (0,5)
0.045 0.13 0.18 0.16 0.12 0.082 0.029 0.08 0.12 0.11 0.084 0.063
(1,0) (1,1) (1,2) (1,3) (1,4) (1,0) (1,1) (1,2) (1,3) (1,4)
0.005 0.013 0.018 0.016 0.011 0.015 0.036 0.045 0.039 0.027
(5,0) (5,0)
≈0 T b = 0.04 T c, ρ = 0.7 ≈0 T b = 0.2 T c, ρ = 0.7
(c) (f)
Figure 1.7 The distribution of steady states under different traffic intensities and block time with
s = 4 links. (a) T b = 0.04T c under low traffic intensity 𝜌 = 0.1. (b) T b = 0.04T c under medium traffic
intensity 𝜌 = 0.4. (c) T b = 0.04T c under high traffic intensity 𝜌 = 0.7. (d) T b = 0.2T c under low traffic
intensity 𝜌 = 0.1. (e) T b = 0.2T c under medium traffic intensity 𝜌 = 0.4. (f) T b = 0.2T c under high
traffic intensity 𝜌 = 0.7.
Another random document with
no related content on Scribd:
must be humorous, or he could not have written the chapters on ‘A
New England Squire’ and ‘The Country Church,’ to say nothing of
the account of the loves of Clarence and Jenny. He must be
sentimental, or the chapter entitled ‘A Good Wife’ had been an
impossibility.
At every point the book betrays its Puritan origin. ‘Ik Marvel’ is a
moralist. He makes a direct and constant appeal to the ethical
sentiment. In one of his prefaces he mentions the fact—doubtless an
amused smile played about his lips as he wrote the lines—that
Dream Life has sometimes insinuated itself into Sunday-school
libraries. He hopes it has ‘worked no blight there.’ At all events,
‘there are six days in the week ... on which its perusal could do no
mischief.’ Doubtless the moral lessons are commonplace enough,
but their triteness is relieved by the literary quality. Puritanism
without its narrowness, and sentimentalism controlled by humor and
good sense, lie at the basis of Reveries of a Bachelor and Dream
Life. The character of their author is to be plainly if not completely
read in these two books.
The distinctive flavor of ‘Ik Marvel’s’ literary style may be got in
the pleasing volume entitled Fresh Gleanings. Limpidity, grace, ease,
are among the virtues of his prose. The fabric of words is light, airy,
richly colored at times, but not over colored. With due recognition of
his individuality it may be said that ‘Ik Marvel’ was a literary son of
‘Geoffrey Crayon.’ The sweetness, the leisurely flow of the narrative,
the unobtrusiveness of manner, all suggest Irving. Perhaps Mitchell
meant to acknowledge his literary paternity when he dedicated
Dream Life to the author of The Sketch Book. But while we
recognize this debt to Irving it is most important that we do not
exaggerate it.
One marked exception must be made. There is no hint of Irving
in Battle Summer, an account of the Revolution of 1848, every page
of which echoes more or less distinctly the voice of Carlyle. So close
is the imitation at times as to awaken a doubt whether Battle
Summer was not intended for a ‘serious parody.’ At all events, it is
one of many proofs of the strong hold the History of the French
Revolution had on the minds of young men.
III
THE WRITINGS
Fresh Gleanings is a volume of travel, written in a way to persuade
one of the uselessness of pictorial illustrations. Its manner
occasionally suggests Sterne’s Sentimental Journey, which the
young traveller may have been reading of late. Sentiment and humor
are agreeably blended. Under ‘Ik Marvel’s’ guidance one visits Paris,
Limoges, Arles, Nîmes, Montpellier, Rouen, carefully avoiding the
‘objects of interest’ and learning much about the life. A less
courageous writer would have told us more and shown us less.
Books like this always contain interpolated stories, told around
the inn fire, or over the half-cup at the café. The ‘Story of Le Merle,’
‘An Old Chronicle of the City,’ ‘Hinzelmann,’ and ‘Boldo’s Story’ are
graceful, but so brief as to seem mere anecdotes.
The Lorgnette, consisting of the lucubrations of one ‘John
Timon,’ is an amusing and instructive periodical. Not its least
entertaining feature is the account of the literary distempers of the
day, the Tupper fever, the Festus outbreak, the Jane Eyre malady,
and the Typee disorder, together with other literary epidemics.
Neither The Lorgnette nor Fudge Doings is now much read. But if
the modern cynic, who takes, possibly, a condescending attitude
towards these old satires on fashionable life, will but pick up a copy
of Fudge Doings and try a few chapters, he will be forced to admit
that if we should not to-day think of writing satire in this manner, it
may have been a good way in 1855. Perchance in opening the
volume at random he comes on the account of the adventure of
Wash. Fudge with the black domino. In which case he will find
himself betrayed into reading two chapters at least, for he must
needs take the trouble to learn how the affair ended.
Fudge Doings and The Lorgnette may be looked on as a
contribution to the history of manners. By their aid one reconstructs
the drama of fashionable life in the mid-century, sees what was then
thought monstrous, and incidentally learns how simple the vices of
the grandfathers were.
Reveries of a Bachelor ushers one into a quaint and delightful
world. The reveries are of love—whether, in the words of Robert
Burton quoting Plotinus, ‘it be a God, or a divell, or passion of the
minde.’ The book is by no means compounded exclusively of
moonshine and roses. Some of the pictures are calculated to give a
bachelor pause. Here is Peggy who loves you, or at least swears it,
with her hand on the Sorrows of Werther. She is not bad looking,
Peggy, ‘save a bit too much of forehead.’ But she is ‘such a sad blue’
who will spend her money on the ‘Literary World’ and the Friends in
Council.
By the severer standards of our day Peggy was not so much of a
‘blue.’ None the less she is distinctly literary. She reads Dante and
‘funny Goldoni’ and leaves spots of baby-gruel on a Tasso of 1680.
She adores La Bruyère; even reads him while nurse gets dinner and
‘you are holding the baby.’
The vision presently becomes terrific and can only be dispelled
by a vicious kick at the forestick. Revery, misnamed idleness, has its
uses. Whatever else comes true, the Bachelor will not marry a young
woman who consoles her husband for an ill-cooked dinner by
quotations from the Greek Anthology.
Dream Life is also a collection of ‘reveries.’ Under the similitude
of the seasons, the author has pencilled little sketches of boyhood,
youth, manhood, and age. The temptation to the obvious in morals
and sentiment must have been great; but again Mitchell’s literary skill
and his humor carry him through successfully.
Seven Stories with Basement and Attic is a group of narratives
drawn from the author’s ‘plethoric little note books of travel.’ The
‘Basement’ is the introduction, the ‘Attic’ the conclusion. The first
story, ‘Wet Day at an Irish Inn,’ shows how, if he be observant, a man
may have adventures without taking the trouble to cross the street in
search of them. Three of the stories are French (‘Le Petit Soulier,’
‘The Cabriolet,’ and ‘Emile Roque’); another is Swiss (the ‘Bride of
the Ice King’); yet another is Italian (‘Count Pesaro’), and all are
exquisite, written in a style which for sweetness and unaffected ease
is, if not a lost art, at all events a neglected one. It has been said that
our young men would not care to write in this fashion to-day; it is a
question whether our young men would be able to do so.
One novel stands to ‘Ik Marvel’s’ credit, Doctor Johns, a story of
a New England country parsonage, well written because its author
could not write otherwise, faithful and exact because he knew the
life, yet going no deeper than other attempts to explain the New
England character, the externals of which are so easy to portray and
the real essence so baffling.
Among the best of ‘Ik Marvel’s’ books are those dealing with
rural life. My Farm of Edgewood sets forth the author’s adventures in
buying a country home, and his subsequent adventures in settling
therein and making life variously profitable. It is a successful attempt
to magnify the office of gentleman-farmer. The attractiveness of the
life is not over-emphasized, nor is it pretended that that is legitimate
farming which produces big crops regardless of expense.
The picture as a whole is seductive in ways not to be referred to
the literary skill of the artist. It is odd enough how a lay-reader,
unused to carrots and cabbages, will follow every detail of Mitchell’s
experiment. Here must be some outcroppings of the primitive
instinct. Moreover, the book relates to home-making, a subject
perennially dear to the American heart. Our restlessness has never
unsettled us in that regard.
Wet Days at Edgewood is a companion volume. The days here
celebrated, nine in number, were made bright by readings about ‘old
farmers, old gardeners, and old pastorals.’ Rejoicing in the strong
common sense of ancient writers on husbandry, and in the quaint
flavor of their style, ‘Ik Marvel’ chats of Roman farm and villa life,
recalling what Varro and Columella had to say about the art of tilling
the soil. He takes pleasure in the reflection that ‘yon open furrow ...
carries trace of the ridging in the “Works and Days;” that the brown
field of half-broken clods is the fallow (Νεός) of Xenophon,’ and that
‘Cato gives orders for the asparagus.’
Then he comes to modern times, to the days of Thomas Tusser,
Sir Hugh Platt, Gervase Markham, Samuel Hartlib, Jethro Tull, and
William Shenstone, men who farmed practically, or theoretically, or
even poetically. ‘Ik Marvel’ loves them all, even those whose
enthusiasm was in the ratio of their helplessness. No less dear to
him is Goldsmith, who wrote what passes for a rural tale and is not
rural at all, but comically urban, and Charles Lamb, who hated the
country and gladly avowed it.
These are Mitchell’s principal works. Having read thus far, it were
a pity to overlook the two volumes on English Lands, Letters, and
Kings, and a greater pity to overlook the instructive and entertaining
American Lands and Letters. In brief, the reader who insists on
knowing ‘Ik Marvel’ only by Reveries of a Bachelor does his author
an injustice and robs himself of many hours of literary delight.
Sentimentalism will always manifest itself in literature in one form
or another. That there will be a return to the manner which we
associate with ‘Ik Marvel’ is not likely, yet it was sentimentalism in its
manliest form. The continued popularity of Reveries of a Bachelor
suggests that Americans of to-day are not quite as cynical and
irreverent as they are sometimes painted, or as they love to paint
themselves.
FOOTNOTES:
61
There were to have been two volumes of Battle Summer,
called respectively the ‘Reign of the Blouse’ and the ‘Reign of
the Bourgeoisie.’ Only the first was published.
62
Reprinted under the title Out-of-Town Places, 1884.
XVIII
JAMES RUSSELL LOWELL
REFERENCES:
I
HIS LIFE
II
LOWELL’S CHARACTER
‘I am a kind of twins myself, divided between grave and gay,’ said
Lowell, in one of those rare moments when he condescended to self-
analysis. The duality of temperament here pointed at is one secret of
the fascination he exerted on all who were privileged to know him
intimately. The fascination was certainly great and the tributes to it
numerous. Lowell’s personality was so winning, and the man was so
genuine, human, and lovable, that it is difficult to speak of him in terms
having even the semblance of impartiality. Although strong-willed and
positive, not indisposed now and then to indulge himself in the luxury of
stubbornness, he was open-minded, wholly unselfish, kind-hearted,
affectionate, and gentle; and while he had his reserves he was
democratic in all the best senses of the word, for his democracy sprang
from the depths of his nature. Changeable in his moods, he could be
teasing, whimsical, irritating; but when he was most mocking and
perverse he was most delightful.
There is something very attractive in Lowell’s attitude toward
literature and literary fame. Books were an essential part of his life. He
had mastered that difficult art of reading as few men have mastered it.
He was rarely endowed as a poet and prose-writer. And yet Lowell, the
most complete illustration we have of the literary man, showed no
inclination to magnify the importance of letters.
As to his individual achievements, he not only never thought of
himself more highly than he ought to think, but was the rather inclined
to place too low an estimate on the value of his work. Self-distrust
increased with years. Nevertheless, Lowell indulged himself in no
philosophy of despair. He had had much to be grateful for. ‘I have
always believed that a man’s fate is born with him, and that he cannot
escape from it nor greatly modify it’ (Lowell once wrote to his friend
Charles Eliot Norton) ‘and that consequently every one gets in the long
run exactly what he deserves, neither more nor less.’ Lowell goes on to
say that the creed is a ‘cheerful’ one; he might have added that it is no
less sensible and manly than it is cheerful.
Whether he found his creed satisfactory at all times or was always
conscious that he had a creed, we cannot know, but he could be the
blithest of fatalists when it pleased him to be.
III
POET AND PROSE WRITER
Lowell’s prose is manly, direct, varied, flexible, generally harmonious,
abounding in passages marked by grace, beauty, and sweetness, and
capable of rising to genuine eloquence. In its overflowing vitality and
human warmth it is an adequate expression of the man, imaging his
mocking and humorous moods no less than his deep sincerity, his
strength of purpose, and his passion. Much of it has the confidence and
ease that go with successful improvisation. If Lowell was ‘willing to risk
the prosperity of a verse upon a lucky throw of words,’ he was even
more willing to take like chances with his prose.
His thought ran easily into figurative form, and the making of
metaphor was as natural to him as breathing. He would even amuse
himself with conceits, for he loved to play with language, to force words
into shapes he might perchance have condemned had he found them
in the work of another. But if style is to be representative, this
playfulness, however annoying to Lowell’s critics, is a virtue. A Lowell
chastened in his English and wholly academic would not be the Lowell
we rejoice in.
He practised the art of poetry in many forms and always with
success. Of everything he wrote you might say that it had been his
study, though you might refrain from saying that ‘it had been all in all his
study.’ In other words, as we read Lowell the question never arises
whether or not the poet is working in unfamiliar materials, but whether
he might not have given his product a higher finish, the materials and
the form remaining the same. He was no aspirant after flawless beauty.
He wrote spontaneously and was for the time wholly possessed by his
theme. But what he had written he had written; and if never content
with the result he at least compelled himself to be philosophical. He
made a few changes, to be sure, but (as was said of a far greater poet)
he would correct with an afterglow of poetic inspiration, not with a
painful tinkering of the verse.
It is by tinkering with the verse, however (the ‘higher’ tinkering), that
perfection is attained. And he who wrote with evident ease so many
lovely and felicitous lines could as easily have bettered lines that are
wanting in finish. It was not Lowell’s way. Too much may not be
required of a man who often felt the utmost repugnance to reading his
own writings, once they were in print.
IV
POEMS, THE BIGLOW PAPERS, FABLE FOR
CRITICS, VISION OF SIR LAUNFAL
Lowell’s first poetic flights were strong-winged. ‘Threnodia,’ ‘The
Sirens,’ ‘Summer Storm,’ ‘To Perdita, Singing,’ whatever their faults,
have a richness, a melody, a freedom of structure, an almost careless
grace, that are captivating. Here was no painful effort in production with
the inevitable result of frigidity and hardness.
The poet’s gift matured rapidly. There is strength in such poems as
‘Prometheus,’ ‘Columbus,’ ‘A Glance behind the Curtain,’ rare beauty in
‘A Legend of Brittany,’ ‘Hebe,’ and ‘Rhœcus,’ a mystical power in the
haunting lines of ‘The Sower,’ passion and uplift in ‘The Present Crisis,’
‘Anti-Apis,’ the lines ‘To W. L. Garrison,’ and the ‘Ode to France,’ while
in ‘An Interview with Miles Standish’ is a promise of that satirical power
which was presently to find complete expression in The Biglow Papers.
Early in his career Lowell announced his theory of the poet’s office,
which is to inspire to high thought and noble action, not merely to
please with pretty fancies and melodious verse. The ‘Ode,’ written in
1841, is an expression of his poetic faith. The ethical and reforming
bent in Lowell’s character was so strong as to make it difficult for him,
true bard though he was, to look on poetry as an art to be cultivated for
itself alone.
Inspiriting as were stanzas like ‘The Present Crisis,’ Lowell’s power
became most effective in the anti-slavery struggle when the outbreak of
the Mexican War led to the writing of The Biglow Papers. Printed
anonymously in a journal, copied into other newspapers, the question
of their authorship much debated, these satires were at last adjudicated
to the man who wrote them, but not until he himself had heard it
demonstrated ‘in the pauses of a concert’ that he was wholly incapable
of such a performance.
Of the characters of the little drama, Hosea Biglow, the country
youth, stands for the plain common-sense of New England, opposed to
the extension of slavery whatever the means employed, and above all
by legalized murder with an accompaniment of drums and fifes. The
Reverend Homer Wilbur acts as ‘chorus,’ and by his learned comments
surrounds the productions of the country muse with an atmosphere of
scholarship. Birdofredom Sawin is the clown of the little show.
Many finer touches have become obscure by the lapse of time, and
The Biglow Papers is now provided with historical notes; but the
energy, the spirit, and the unfailing humor of the work are perennial.
Lowell was most fortunate in his verbal felicities. Who could have
foreseen that so much danger lurked in a middle initial, or that a plain
name of the sort borne by the former senator from Middlesex contained
such comic potentialities?
V
UNDER THE WILLOWS, THE CATHEDRAL,
COMMEMORATION ODE, THREE MEMORIAL
POEMS, HEARTSEASE AND RUE
‘Under the Willows’ is a poem of Nature in which the poet at no time
loses sight either of the world of books or of the world of men. If he be
driven indoors by the rigors of May, he is content to sit by his wood-fire
and read what the poets have said in praise of that inclement month. Or
if June has come and he can dream under his favorite willows, his
reveries gain a zest from the interruptions of the tramp, ‘lavish
summer’s bedesman,’ the scissors-grinder, that grimy Ulysses of New
England, the school-children, and the road-menders,
Vexing Macadam’s ghost with pounded slate.
It is a poem of thanksgiving in which the poet voices his gratitude
for the benediction of the higher mood and the human kindness of the
lower.
The volume to which ‘Under the Willows’ gives its name is typical.
He who prizes Lowell’s verse will hardly be content with any selection
which does not include ‘Al Fresco,’ ‘A Winter-Evening Hymn to my
Fire,’ ‘Invita Minerva,’ ‘The Dead House,’ ‘The Parting of the Ways,’
‘The Fountain of Youth,’ and ‘The Nightingale in the Study.’
Its manner of contrasting To-Day with Yesterday, the genius that
creates with the spirit that analyzes, makes The Cathedral an
essentially American poem. The minster in its ‘vast repose,’
Silent and gray as forest-leaguered cliff,
must always seem a marvel to a dweller among temples of ‘deal and
paint.’ The poem is the meditation of a New-World conservative,
altogether catholic of sympathies, who holds no less firmly to the past
because, under the fascination of democracy, he breathes in the
presence of the ‘backwoods Charlemagne’ a braver air and is
conscious of an ‘ampler manhood.’ And what, he asks, will be the faith
of this new avatar of the Goth, what temples will the creature build?
Very beautiful, very suggestive, and in its shifting moods entirely
representative of the poet who wrote it must this fine work always
seem.
The Ode recited at the Harvard Commemoration (July 21, 1865) is
Lowell’s supreme achievement in verse. It breathes the most exalted
patriotism, a love of native land that is intense, fiery, consuming.
Though written in honor of sons of the University who had gone to the
war, the spirit of the Ode is not local and particular. The poet celebrates
not individual deeds alone but the sum of those deeds, not man but
manhood:—
And the poet longs for skill to praise him fitly whom he does fitly praise
in the stanzas that follow. It is a thoughtful, nobly eloquent, and
poetically beautiful characterization of the great Virginian, and
appropriately closes with a fine apostrophe to the historic
Commonwealth from which Washington sprang.
The ‘Ode for the Fourth of July, 1876,’ though not lacking in forceful
lines and fine imagery, is the least happy of the three poems. The
questioning and critical mood is prominent. But the spirit of confidence
prevails and is voiced in the invocation with which the ode concludes.
Various notes are touched in the collection of eighty-eight poems to
which its author gave the title of Heartsease and Rue. Here are verses
new and old, grave and gay, satirical, humorous, sentimental, and
elegiac, epigrams, inscriptions, lyrics, poems of occasion, sonnets,
epistles, and, chief among them, the ode written on hearing the news of
the death of Agassiz. Whether, as has been asserted, ‘this poem takes
its place with the few great elegies in our language, gives a hand to
“Lycidas” and to “Thyrsis,”’ is a question to be decided by the suffrages
of many good critics, rather than by the dictum of one. There is no
doubt, however, that by virtue of its human quality, depth of personal
feeling, sincerity in the accent of bereavement, and felicity of phrase,
the ‘Agassiz’ will always stand in the first rank of Lowell’s greater verse.
VI
FIRESIDE TRAVELS, MY STUDY WINDOWS,
AMONG MY BOOKS, LATEST LITERARY
ESSAYS
Fireside Travels is so entertaining a book as to make one wish that
Lowell had chronicled more of his journeyings at home and abroad in
the same amusing style. Two of the six essays—‘Cambridge Thirty
Years Ago’ and ‘A Moosehead Journal’—take the form of letters
addressed to the author’s friend, ‘the Edelmann Storg’ (W. W. Story).
The others are grouped under the general title of ‘Leaves from my
Journal in Italy and Elsewhere.’
One spirit animates the pages of this book,—a love of plain people,
homely adventures, everyday sights and sounds. In a half-serious way
(as if to show that he knows how to ‘do’ a tempest in the mountains or
an illumination of St. Peter’s) Lowell throws in a number of
unconventional passages on entirely conventional themes. But the
strength of the book lies in the sympathetic and humorous accounts of
that protean animal Man, who, whether he showed himself in the guise
of a denizen of Old Cambridge, or of Uncle Zeb, who had been ‘to the
‘Roostick war,’ or of the Chief Mate of the packet ship, or of Leopoldo,
the Italian guide, was more interesting to Lowell than any other object
of his study.