(Ebook PDF) Soft Computing in Wireless Sensor Networks Instant Download
(Ebook PDF) Soft Computing in Wireless Sensor Networks Instant Download
https://ebooksecure.com/product/ebook-pdf-soft-computing-in-
wireless-sensor-networks/
https://ebooksecure.com/download/randomly-deployed-wireless-
sensor-networks-ebook-pdf/
https://ebooksecure.com/download/handbook-of-hydroinformatics-
volume-i-classic-soft-computing-techniques-ebook-pdf/
https://ebooksecure.com/download/malware-diffusion-models-for-
wireless-complex-networks-theory-and-applications-ebook-pdf/
http://ebooksecure.com/product/ebook-pdf-translational-medicine-
in-cns-drug-development-volume-29/
Progress in Heterocyclic Chemistry Volume 29 1st
Edition - eBook PDF
https://ebooksecure.com/download/progress-in-heterocyclic-
chemistry-ebook-pdf/
http://ebooksecure.com/product/ebook-pdf-millimeter-wave-
wireless-communications/
http://ebooksecure.com/product/ebook-pdf-advances-of-dna-
computing-in-cryptography/
http://ebooksecure.com/product/ebook-pdf-bayesian-networks-in-
fault-diagnosis-practice-and-application/
http://ebooksecure.com/product/ebook-pdf-guide-to-wireless-
communications-4th-edition/
Soft Computing
in Wireless Sensor
Networks
http://taylorandfrancis.com
Soft Computing
in Wireless Sensor
Networks
Edited by
Huynh Thi Thanh Binh
Nilanjan Dey
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts
have been made to publish reliable data and information, but the author and publisher cannot assume
responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize
to copyright holders if permission to publish in this form has not been obtained. If any copyright material
has not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, trans-
mitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter
invented, including photocopying, microfilming, and recording, or in any information storage or retrieval
system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright
.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood
Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and
registration for a variety of users. For organizations that have been granted a photocopy license by the
CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identification and explanation without intent to infringe.
Preface..................................................................................................................... vii
Editors.......................................................................................................................ix
Contributors.............................................................................................................xi
Index......................................................................................................................225
v
http://taylorandfrancis.com
Preface
Recently, the Internet of Things (IoT) has received huge interest from scien-
tists and technology designers throughout the world and is considered the
next network generation in the near future. This concept starts from the idea
of building a network consisting of all real-life objects (things) in which they
can connect, interact, incorporate, and communicate data and information,
accomplishing complex tasks. This way, the strength of the Internet is fully
investigated in a highly effective way, bringing in practical applications in
many fields such as economy, information technology, military, etc. In prac-
tice, some specific applications of the IoT, namely smart home, smart traffic,
etc., have proven its feasibility, convenience and promising benefits.
However, the IoT can only be successfully applied within the support of
wireless sensor networks (WSNs). Today, the development of the Internet,
radio communications, and information technology has brought the poten-
tial development of WSNs. The sensor network might include different types
of sensors, such as earthquake sensors, magnetic field sensors, low-rate sam-
pling sensors, camera sensors, infrared sensors, sound sensors, radar, and so
on, which can monitor large areas under different conditions.
This volume is comprised of nine chapters, providing different techniques
for solving optimization problems in WSNs. An overview about WSNs is
given in Chapter 1, followed by an introduction to optimisation problems in
WSNs in Chapter 2, including major factors that need optimisation; problem
classification and well-known approaches to solve them; and current achieve-
ments and results. These first chapters provide readers with basic theoretical
knowledge about the topic and why it is demanding to push the boundaries
in this field. Chapter 3 discusses the application of machine learning (ML)
algorithms in WSNs, which play a crucial role in WSNs as they simplify
huge amounts of data generated and gathered at the central nodes in WSNs.
To elaborate the importance of using soft computing in this research topic,
Chapter 4 presents the relevance of soft computing techniques in the signifi-
cant management of WSNs and introduces soft computing techniques like
ant colony optimization and particle swarm optimization (PSO), artificial
neural networks (ANNs), perception, fuzzy logic, evolutionary computing,
and genetic algorithms in the management of WSNs. There is also a broad
analysis of this intelligence-based soft computing strategy as connected in
the different operational parts of wireless sensor networks. After that, the
following chapters discuss more narrowed optimization problems in WSNs
including their challenges, solutions, and achieved results. Chapter 5 con-
cerns intrusion detection systems in mobile ad hoc networks, in which the
definition of mobile ad hoc networks and different kinds of attacks are well-
elaborated. The performance of grammatical evolution is also analysed with
vii
viii Preface
ix
x Editors
Dr. Dey is an Associate Editor of IEEE Access and is currently the editor
in-chief of the International Journal of Ambient Computing and Intelligence,
International Journal of Rough Sets and Data Analysis and the International
Journal of Natural Computing Research. He is the Series Co-Editor of Springer
Tracts in Nature-Inspired Computing (STNIC), Springer; Series Co-Editor of
Advances in Ubiquitous Sensing Applications for Healthcare (AUSAH), Elsevier,
and Series Editor of Computational Intelligence in Engineering Problem Solving
and Intelligent Signal Processing and Data Analysis, CRC Press (FOCUS/
Brief Series), and Advances in Geospatial Technologies (AGT) Book Series, (IGI
Global), US.
Contributors
xi
xii Contributors
CONTENTS
1.1 Introduction.....................................................................................................2
1.2 Wireless Sensor Networks............................................................................. 2
1.3 Types of Sensor Nodes...................................................................................3
1.3.1 Passive Sensors.................................................................................... 3
1.3.2 Active Sensors..................................................................................... 4
1.4 Sensor Node Description...............................................................................4
1.4.1 Sensing Unit.........................................................................................4
1.4.2 Processing Unit................................................................................... 5
1.4.3 Transceiver Unit.................................................................................. 5
1.4.4 Power Unit...........................................................................................6
1.5 Applications of Sensor Nodes.......................................................................7
1.5.1 Military Applications......................................................................... 7
1.5.2 Environmental Observation..............................................................8
1.5.3 Forest Fire Detection.......................................................................... 8
1.5.4 Pollution Monitoring.......................................................................... 8
1.5.5 Industrial Monitoring........................................................................8
1.5.6 Agriculture Monitoring..................................................................... 9
1.5.7 Health Monitoring.............................................................................. 9
1.5.8 Smart Home....................................................................................... 10
1.5.9 Power Grids....................................................................................... 10
1.5.10 Automobiles....................................................................................... 10
1.6 Protocol Stack of WSNs................................................................................ 10
1.6.1 Physical Layer.................................................................................... 10
1.6.2 Data Link Layer................................................................................. 12
1.6.3 Network Layer................................................................................... 12
1.6.4 Transport Layer................................................................................. 12
1.6.5 Application Layer.............................................................................. 12
1.6.6 Power Management Plane............................................................... 13
1.6.7 Mobility Management Plane........................................................... 13
1.6.8 Task Management Plane.................................................................. 13
1.7 Security Requirements in WSN.................................................................. 13
1.8 Attacks on Wireless Sensor Networks....................................................... 14
1.9 WSN Standards............................................................................................. 17
1
2 Soft Computing in Wireless Sensor Networks
1.1 Introduction
As the result of significant developments in the field of electronic communi-
cation, computer science, and information technology, we now have a new
computing and communication architecture known as wireless sensor net-
works (WSNs). In the past, wired sensors implemented into restricted appli-
ance areas produced low results only. Meanwhile, the convention of adapting
wireless technology produced sensor nodes which formulated more feasible
solutions prior to wired sensor nodes. Recently, there is a measurable benefit
with an immense possibility of connecting various devices and networks
together in an eloquent effort to address important issues and challenges.
The first wireless sensor network was a sound surveillance system devel-
oped by the US military in the 1950s to detect and track Soviet submarines [1].
This servicing technology is still at work today for monitoring undersea
wildlife and volcanic activity. Nowadays, with the rapid development of
the aforementioned WSN, this technology is easily deployed in the largest
geographical area that allows alike sensor nodes to gather the raw data and
communicate and transfer it in new applications [2].
FIGURE 1.1
Communication architecture of a wireless sensor network.
additional sensor nodes or sink stations within the network. Among these
above specifications, sensing the environment is the most important one.
WSNs can be structured in centralized, distributed, and ad hoc ways.
Figure 1.1 shows the general communication structure of a WSN. It primarily
consists of sensor field, sink node, and user or task management component.
Sensor nodes are deployed in a specific area is known as a sensor field. Each
sensor node in the sensor field is capable of sensing its own respective envi-
ronment phenomenon and routing the observed data to the sink node through
a multi-hop connection. A sink node is a special kind of sensor node which
collects data from the sensor field and performs the necessary operations or
simply forwards the collected data to the user or task manager node. In addi-
tion, it also sends queries to the sensor nodes in the network and retrieves the
required data. Finally, the user or task manager node accords an assignment
to each sensor node in the sensor field. Nevertheless, the sink node connects
with the user or task manager node via an Internet or satellite connection [1,2].
1.3.1 Passive Sensors
Passive sensors observe the data by active probing, which means their energy
is used only to amplify the analog signals. Passive sensors don’t require exter-
nal resources as their energy is used only to generate analog signals. These
sensors can change their physical properties (like capacitance) and generate
electrical signals. Again, these passive sensors are divided into two types’
passive omnidirectional sensors and passive narrow beam sensors.
4 Soft Computing in Wireless Sensor Networks
1.3.2 Active Sensors
Active sensor nodes sense the data by manipulating the environment which
means they need continuous energy to generate analog signals. Active sen-
sor nodes dynamically probe the neighboring environment and use an exter-
nal power supply of energy, which is needed to monitor and operate. Digital
sensors generate distinct indications which are later converted to digital
characterization based on the parameters measured. A single byte group
discrete values output is measured as the quantity. Analog sensors generate
continuous signals (such as temperature, pressure, and water flow), which
are measured as continuous analog signals.
Each sensor node is also called a mote but all motes are not always called
sensor nodes. Motes receive and transmit the data and employs some pro-
cessing techniques inside the sensor node, like compression, encryption etc.
So, sensor node operate like motes, but motes do not always operate as sen-
sor nodes [1–3].
1.4.1 Sensing Unit
A sensing unit observes its environmental phenomena for gathering infor-
mation (such as temperature, pressure, light, and displacement) as well as
producing the corresponding output as an optical or electrical signal. A
sensing unit basically consists of two parts; a sensor and an analog to digital
converter (ADC). In the sensor part, one or more sensors there produce the
analog signals, and these analog signals are transferred into digital signals
Introduction to Wireless Sensor Networks 5
FIGURE 1.2
Basic configuration of sensor node.
through the ADC and fed into a processing unit for supplementary opera-
tions. Based on the observed or gathered phenomena, sensor nodes are clas-
sified as thermal, optical, acoustic, or mechanical sensors.
1.4.2 Processing Unit
A processing unit includes two parts; storage plus a processor. A storage
component, which works as nonvolatile memory used to store programming
instructions, temporarily stores sensed data. Also, it will store processed
data on occasion. The processor in sensor node makes the sensor node col-
laborate with other nodes in the network to complete the designated exer-
cise. The microcontroller performs tasks, processes the data, and controls the
other functionalities of a sensor node. Because of some special characteris-
tics of microcontrollers, like low cost, easy attachment with supplementary
apparatuses, effortlessness of training, and squat power utilization, micro-
controllers are used in sensor nodes. ATMEL, At mega 128L, and MSP430
are the most commonly used microcontrollers because they have power sav-
ing capabilities. Among these, MSP 430 has six different power modes from
wholly energetic to wholly powered down. These kinds of power reduction
approaches enlarge the system lifetime and make the sensor node live longer.
1.4.3 Transceiver Unit
The transceiver attaches the node to the network. It is an amalgamation of
transmitter and receiver to a solitary device which works on specific radio
frequency (RF). The RF message requires modulation, filtering, multiplexing,
band bass, and demodulation, which makes it more complex and expensive.
Basically, sensor node uses industrial scientific medical bands (ISM) which
6 Soft Computing in Wireless Sensor Networks
1.4.4 Power Unit
The sensor node is a small microelectrical appliance which consists of low
energy. The power unit sustains the sensor node in a rough and uncondi-
tional environment where changing batteries is expensive and difficult.
Mainly, sensor nodes use their energy for sensing, transmission, and data
aggregation purposes. Among these aforemention operations, the transmis-
sion of information consumes the majority of energy, compared to the other
operations. The power source of a sensor node is constituted by a recharge-
able or nonrechargeable battery. Rechargeable sensor nodes are capable to
renovate their power from the nature circumstances like solar, high tem-
perature differences, and pulsation. Non-rechargeable sensor nodes must be
competent to operate until either the assignment time is completed or the
battery is replaced. However, based on the application scenario, the lifetime
of sensor node will be decided. For example, scientists monitoring the pres-
ence or age of ice (especially in the form of glaciers) or observing the bed
slides in the ocean need the sensors able to work continuously. When the
sensors are deployed in the battlefield, finding the temperature in particular
area may need a few hours or days. In the past, the batteries of tiny sensor
nodes were manufactured with vanadium and molybdenum oxide. Future
energy exploration from the environment occured because sensor nodes
operated in irregular places. The battery for sensor nodes should be as small
Introduction to Wireless Sensor Networks 7
1.5.1 Military Applications
Wireless sensor network implementation primarily began with the military
application with the formation of DARPA and enemy tracking. Since sensor
nodes are densely deployed, if some sensor nodes are destroyed by antago-
nistic actions, it doesn’t influence or affect the military operation. This makes
sensor nodes ideal for the battlefield. Using appropriate sensors in the spe-
cific network area, the identification of enemy forces, movement detection,
analysis, and progress of their movement can be achieved. Sensor nodes pro-
vide the following services in the battlefield [5]:
Battlefield Surveillance: Information from the border, battlefield and
some other vital behavior in the area will be gathered by the sensor node.
Targeting: Sensors are placed in weapons and collect information about
targets (like motion, movement, angle, distance, etc.) which can be sent to the
shooter. This sensor is used for better target estimation.
Intrusion Detection: Sensor nodes are used to identify the intrusion in
the network and sounding an alarm. The defense system will then assess an
appropriate recourse for the attack.
Monitoring Forces: Sensor nodes monitor the movement of troops and
tanks, and report that information to the base station.
8 Soft Computing in Wireless Sensor Networks
1.5.2 Environmental Observation
Sensor nodes play an important role to supervise and estimate the environ-
mental conditions of large geographic areas (like temperature, humidity, rain-
fall, etc.) which help in pollution monitoring, forest fire detection, and flood
detection. The first well-known wireless sensor network for weather coverage
was an automated real-world evaluation in real time (ALERT). ALERT can pro-
duce real-time information concerning rainfall and water levels to estimate the
possibility of flooding. Environmental monitoring is broadly divided into two
types; indoor and outdoor monitoring. Indoor monitoring is used for build-
ings and offices. This application involves sensing humidity, temperature, and
air quality. Examples of outdoor monitoring applications are volcanic erup-
tions, earthquakes, chemical hazard detection, and weather forecasting [6].
1.5.4 Pollution Monitoring
Wireless sensor networks can be employed towards monitoring and exam-
ining the pollution intensity in a particular area. Sensor nodes, which are
deployed around the city, can be used to estimate the respective environ-
mental factors, and accordingly producing a warning signal when these
factors reach their aforementioned threshold limit. For example, LTE-M
module–based Zigbee wireless sensor nodes are kept on the stations of pub-
lic vehicles to collect data, and are sent to the cloud base station for further
processing of the pollution level.
1.5.5 Industrial Monitoring
Industries are mostly using wireless sensor networks for determining the
level of output quality in its operation and also in cost-reduction procedures.
For example, in nuclear power projects, sensors are used to monitor the water
level in the tank and the temperature and pressure in refrigerators. One
more central application of sensor networks is to supervise machine health.
The aspiration of this application is to detect the defective parts of equipment
Introduction to Wireless Sensor Networks 9
1.5.6 Agriculture Monitoring
The use of wireless sensor networks in the agriculture research community
has been increasing rapidly. Sensor nodes sense parameters like tempera-
ture, humidity, soil moisture, and sunlight of the agriculture field so the nec-
essary precautionary measures will be given to its stakeholders to increase
the harvest. The LOFAR-Agro project is used in potato fields for crop moni-
toring. Here, wireless sensor networks are used to detect where the potatoes
are infected by disease. By locating such areas, the use of pesticides is mini-
mized and confined to susceptible areas.
1.5.7 Health Monitoring
In this application, patients are outfitted by collective sensors on special
points of their anatomy to supervise patient metrics, such as blood pressure,
heart rate, etc. Home-based wireless ECG monitoring systems exploiting
Zigbee technology are considered some of the applications that take advan-
tage of health monitoring. Such methods can helpful for supervising people
in their homes, along with periodic supervising by a general practitioner.
Electrocardiograms (ECG) are imperative for detecting heart disease abnor-
malities. Clinical ECG equipment may be functional for short-range inspec-
tion, but are impractical for home health use. In recent times, wireless ECG
supervising systems have been created that are compatible with Bluetooth,
as well as Zigbee, protocols. A Zigbee device is capable to advocate unfailing
multi-hop, self-organizing, and mesh network which steadies the appliance
software layers considered by the IEEE 802.15 plus Zigbee alliance. Zigbee
can provide with diminutive energy connectivity along with an undersized
rate for the equipment that necessitates prolonged battery continuation [8].
Wireless capsule endoscopy (WCE) suggests an illustrated inspection of the
entire gastrointestinal (GI) tract and the rationalized analytical progression
of undersized bowel illness, moreover the triumph over the boundaries of
conventional diagnosing equipment. In order to strengthen the WCE, compu-
tational procedures can be implemented for specific capsule localization and
tracking. For perfect understanding of the wireless capsule endoscope (WCE)
location point toward the wrongdoing position which plays an essential role
for dissimilar reasons including perfect localization of injuries plus mecha-
nized CE direction-finding. Localization is fulfilled by several localization
techniques such as received signal strength (RSS)–based localization, time of
arrived (TOA)–based localization, magnetic-based localization, image-based
localization, and date of arrived (DOA)–based localization [9].
10 Soft Computing in Wireless Sensor Networks
1.5.8 Smart Home
Remote management of home applications is achievable by using some inte-
grated, specially designed sensor nodes. Sensor nodes can be deployed in
household devices like microwaves and washing machines, and can be main-
tained without the need for human interaction. Sensor nodes share some com-
mon resources like water, heaters, and electricity in the intelligent home projects.
1.5.9 Power Grids
Wireless sensor nodes deployed in power grid applications provide neces-
sary information regarding eclectic utilization, which makes them more
efficient. Sensor nodes are used for measurement and tracking energy pro-
duction and consumption to monitor the entire surrounding area. If there
are any abnormal positions detected, the nodes will send that diagnostic
information to an authority to solve these problems.
1.5.10 Automobiles
Sensor networks have been used to monitor and track vehicles for a long time.
A common example would be video cameras that are fixed at a particular area
to observe traffic. The videos are sending to a human operator, and as a low-
cost replacement for video cameras, small sensor nodes are installed to moni-
tor traffic. Sensor nodes take pictures of traffic, which are sent to a human
operator or automatic controllers, and take control signals. Sensor nodes are
installed in particular vehicles to monitor and track their movements.
1.6.1 Physical Layer
The physical layer is designed for modulation, carrier frequency generation,
and transmission, as well as for receiving techniques, signal detection, and
frequency selection. The transmission links of wireless sensor networks are
twisted based on infrared, optical, and radio. Sensor nodes present employ-
ment based on radio frequency design. So, the physical layer typically takes
care of communication-based radio links.
Introduction to Wireless Sensor Networks 11
1.6.3 Network Layer
The network layer permits direction-finding of statistics data throughout a
wireless communication channel. Sensor networks are without infrastruc-
ture and are multi-hop, where each sensor node as source node collects
sensed data and transmits the sensed data to the reliable sink node. So, it
is important for the network layer to route the data in the direction of sink
node. Because of limited power resource protocols which are designed in
traditional and ad hoc networks, this method is not appropriate for wireless
sensor networks. We have numerous tactics to route the data as a routing
power expenditure through a vacant power platform on vigor metrics, and
data-centric routing stands on important dissemination.
1.6.4 Transport Layer
The transport layer affords logical communication among the application
process operations on different hosts within the main network and supple-
mentary networks. The transport layer mostly preserves data flow when the
application layer demands it. Designing a set of rules on the network layer
is very complicated, since the sensor node parameters are mostly affected by
numerous limitations like restricted power and memory. This layer is princi-
pally compulsory, while the organization is premeditated to be contacted via
the Internet or extra peripheral networks.
1.6.5 Application Layer
The application layer sustains several contradictory software applications on
the sensibility assignment. There are many application areas which are well-
designed, although prospective relevance layer protocols for sensor networks
are still laregly unsophisticated. There are three eventual relevant layer proce-
dures designed for the application layer, which are as follows: the sensor man-
agement protocol (SMP), the sensor query and data dissemination protocol
(SQDDP), and the task assignment and data advertisement protocol (TADAP).
Discovering Diverse Content Through
Random Scribd Documents
The Project Gutenberg eBook of Vivian's
Lesson
This ebook is for the use of anyone anywhere in the United States
and most other parts of the world at no cost and with almost no
restrictions whatsoever. You may copy it, give it away or re-use it
under the terms of the Project Gutenberg License included with this
ebook or online at www.gutenberg.org. If you are not located in the
United States, you will have to check the laws of the country where
you are located before using this eBook.
Language: English
‘C OME on, Vivian. It is high time we were going home; you know
we promised mother that we would come off the ice at half-
past four.’
‘Well, so we will; but it is only five-and-twenty past now, so we
have plenty of time for one turn more. Come on, old stupid; you are
always frightened of being late;’ and the younger of the speakers, a
brown-eyed, mischievous-looking lad of about eleven, swung off
with his three companions, leaving his brother standing watching
them, a troubled look on his face.
He hated to make a fuss, and he did not want to leave the ice a
moment sooner than he could help; but a promise is a promise, and
he had given his word that they would be ready to leave the pond at
the half-hour. It was later than they were generally allowed to stay;
but it was Saturday afternoon, and there were signs of a thaw, so,
as the ice might not last till Monday, their father had agreed to an
extra half-hour on condition that they left the ice punctually and
hurried home.
Vivian had given his word readily enough, and had meant to keep
it; but now, as he flew round and round the pond, crying ‘Just one
turn more,’ he seemed to have forgotten all about his promise.
Ronald sat down and took off his skates, then stepped on the
path, and stood buckling them together.
‘Come on, Vivi,’ he entreated. ‘It is the half-hour now, and you
know how anxious mother will be.’
‘All right,’ said Vivian a little sulkily, ‘I suppose I must; but it is an
awful nuisance, when we may not have such lovely ice all winter
again.’
‘I should think so,’ struck in Fergus Strangeways. ‘I am thankful
that father doesn’t make us come in so soon. Why, the moon will be
up in no time, and we will stay on quite late. Captain Laing and he
are coming down before dinner, and Captain Laing promised to show
us how to cut the “Figure Eight.”’
‘How jolly!’ said Ronald a little wistfully, while Vivian bent his head
over his straps and pretended not to hear.
‘Couldn’t you stay, really?’ asked Charlie Strangeways, Fergus’s
elder brother; ‘you could come in and have tea with us. I dare say
Dr Armitage would know where you were; it is going to be lovely
moonlight, and it isn’t as if we were to be alone all the time. I don’t
suppose that he would have minded if he had known that the dad
and Captain Laing were coming.’
‘Oh, do let us stay, Ronald! I’m sure father wouldn’t mind. You
know he did say that he would have taken us out by moonlight
himself if he had not been so busy,’ pleaded Vivian.
‘No, Charlie,’ said Ronald firmly. ‘It is very good of you to ask us,
and it would have been splendid fun; but father didn’t know about
your father and Captain Laing, and he would wonder where we
were. Besides, we promised.—So hurry up, Vivian.’
‘What a stick you are, Ronald!’ said Fergus; ‘you can’t change a
bit, even when circumstances change. Just because Dr Armitage said
that you couldn’t be out alone here after dark, you spoil all the fun
by going off, although it is very different now that father and Captain
Laing are coming.’
‘Don’t be stupid, Fergus,’ put in Charlie good-naturedly. ‘If they
promised, they must go. Besides, it is a long way over to Holmend;
it is easy for us with our house close by.’
Charlie was fifteen, and a public school boy, so his word carried
weight with it, and his brother was silent, while Vivian took up his
skates more cheerfully.
‘We’ll see you in the beginning of the week,’ went on Charlie; ‘we
are going to practise shooting on Tuesday if the frost doesn’t hold,
we have got such jolly little pistols from Uncle Don; they carry quite
a long way, and one can kill a bird with them. You must come over
and bring yours; the Doctor is going to give you a pair for Christmas,
isn’t he?’
Poor Vivian turned hot all over. If there was one thing in the world
he was frightened of, it was being laughed at. As a rule, the boys
were at liberty to choose their Christmas presents; and when, a
fortnight before, Fergus had told him of his uncle’s intended present,
he had instantly agreed to ask his father for the same, and great
had been his disappointment and dismay when his request met with
a grave refusal.
‘A pistol for your Christmas present! Not if I know it, my boy.
What! Fergus and Vere and Charlie going to have them? Well, if I
mistake not, they will be in my hands shortly. No, no; if their father
likes to risk their lives, that is no reason why I should risk yours.
Now, don’t look so glum; I know what I am talking about. If you had
seen the case I saw over at Whitforth the other day: a lad older than
either Ronald or you had got hold of one of these pistols, and it
went off in his little brother’s face. I don’t want to harrow your
feelings, but,’ and the Doctor’s voice dropped, and he spoke sadly,
‘that poor little chap will never be able to see again. No; I’ll give you
anything you like, in reason, for your Christmas present, but a pistol
is out of the question.’
At the time the explanation had been sufficient, but now Vivian’s
eager little spirit felt very rebellious.
Fergus Strangeways was just a year older than he was, and surely
he was as capable of being careful as Fergus. How Fergus and Vere
would laugh at him if they knew the whole story! He flashed a
warning look at Ronald, but Ronald did not seem to understand.
‘We may come out to watch,’ he said in his quiet voice; ‘but father
won’t let us have pistols yet. He says we are too young. He has
promised to give us proper guns when we are sixteen. He will not let
us shoot before that.’
The pitying looks on his companions’ faces were quite lost on
Ronald, who was only thinking of his promise to be home in good
time; but they stung Vivian even more than the words that followed.
‘What a nuisance it must be to be so well looked after! You’ll grow
into regular muffs if you don’t look out.’
‘I would give you a licking for that, just to judge if the symptoms
are beginning, but I haven’t time to-night,’ said Ronald, with a laugh,
conscious that none of the boys could stand up against him; and he
walked off whistling through the woods, followed by Vivian, who was
fuming with rage and injured pride.
‘What made you go and give me away like that?’ he asked
presently. ‘You know there is a talk of our going to Aunt Dora’s next
week. I know, anyhow, because mother had a letter, and if only you
had held your tongue I would have said that very likely we would be
away from home, and they need never have known anything about
father not letting us have these pistols. Now Fergus will go all over
the place laughing at us for a couple of babies;’ and he kicked at the
fallen leaves viciously in his vexation.
‘As if I minded what Fergus Strangeways says!’ retorted Ronald
scornfully; ‘why, he’s the veriest little ass going. He may get a pistol,
but I bet you a sixpence that he daren’t let it off, in spite of all his
bluster. Besides, I knew nothing about any invitation to Aunt Dora’s;
and if I had, I wouldn’t have been such a sneak as to pretend that
that was the reason that we couldn’t go to shoot with them. Of
course it is a nuisance. I would have liked a pistol as well as you;
but father would not have hindered us having one if he had not had
good reasons, and now that he has promised us that lovely camera
I’m sure we can’t grumble.’
‘That’s all very well for you,’ growled Vivian; ‘you always were a
bit of a muff, with your music, and your photographs, and your
collections. “The paragon” the other boys call you behind your back,
for they say that you haven’t enough spirit in you to do anything
wrong.’
‘They had better say it to my face then, and I’ll give them what
for, and you too for listening to such rot,’ said Ronald hotly; and then
he laughed at his own vehemence. ‘Don’t let us quarrel on Christmas
Eve,’ he went on pleasantly; ‘I’ll race you across the meadow.’
They set off at a run, and by the time they had reached the
garden gate, hot and breathless, they had almost forgotten the
cause of their anger.
‘There is mother at the window, and Dorothy,’ cried Vivian, waving
his cap. ‘Doesn’t a lit-up room look jolly and comfortable when one
is outside? After all, I am rather glad that we didn’t stay any longer
at the lake, for I am awfully hungry, and I expect there is a
scrumptious tea in the schoolroom.’
As they went into the hall of the long, low red house, a little
figure in white ran out to meet them.
‘Hurry, quick!’ she lisped, ‘we’s going to have tea wif muvver, an’
then we’s going to dec’rate. Black has brought in such a lot of green
stuff, heaps an’ heaps, all p’ickles. Dorothy knows, ’cause she hurted
her fingers.’
‘Dorothy was well warned, so it was her own fault,’ said a clear
voice behind her, and Mrs Armitage appeared in the hall. Tall, slim,
and graceful, with a wealth of rippling hair and a sweet pale face, it
was no wonder that to the boys mother was the centre of their
world.
‘Quickly, boys, run upstairs, get off those dirty boots, and get
ready for tea. Father has been called out, and may not be home till
quite late, so I will have it with you in the schoolroom, and
afterwards we will try to get the hall decorated before he comes
back. You know how he loves to see the greenery.’
After tea, Ellen the housemaid was pressed into the service, so
the decorations went on merrily; and as Vivian stood on a ladder
fastening up the wreaths of bright holly which his mother’s quick
fingers wove so rapidly, while little Dorothy ran about, proud in the
belief that she was helping every one, he thought quite pityingly of
the Strangeways, who had no mother or little sister, although they
might possess pistols and skate in the moonlight while he had to
come home.
CHAPTER II.
AN INVITATION.