100% found this document useful (1 vote)
24 views

Full Download Bluetooth For Java 1st Edition Ranjith Antony PDF DOCX

Java

Uploaded by

asegidnyanta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
24 views

Full Download Bluetooth For Java 1st Edition Ranjith Antony PDF DOCX

Java

Uploaded by

asegidnyanta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 82

Visit https://ebookultra.

com to download the full version and


explore more ebooks

Bluetooth For Java 1st Edition Ranjith Antony

_____ Click the link below to download _____


https://ebookultra.com/download/bluetooth-for-java-1st-
edition-ranjith-antony/

Explore and download more ebooks at ebookultra.com


Here are some recommended products that might interest you.
You can download now and explore!

Bluetooth For Java 1st Edition Bruce Hopkins

https://ebookultra.com/download/bluetooth-for-java-1st-edition-bruce-
hopkins/

ebookultra.com

Bluetooth Application Programming with the Java APIs The


Morgan Kaufmann Series in Networking 1st Edition C Bala
Kumar
https://ebookultra.com/download/bluetooth-application-programming-
with-the-java-apis-the-morgan-kaufmann-series-in-networking-1st-
edition-c-bala-kumar/
ebookultra.com

Bluetooth connect without cables Bluetooth 1 1 s dramatic


improvements in interoperability and reliability includes
thoroughly revised coverage of Bluetooth security and
power conservation new Bluetooth profiles including the
https://ebookultra.com/download/bluetooth-connect-without-cables-
long awaited Persona 2nd ed Edition Sturman
bluetooth-1-1-s-dramatic-improvements-in-interoperability-and-
reliability-includes-thoroughly-revised-coverage-of-bluetooth-
security-and-power-conservation-new-bluetoo/
ebookultra.com

C for Java Developers 1st Edition Allen Jones

https://ebookultra.com/download/c-for-java-developers-1st-edition-
allen-jones/

ebookultra.com
IoT Projects with Bluetooth Low Energy 1st Edition Madhur
Bhargava

https://ebookultra.com/download/iot-projects-with-bluetooth-low-
energy-1st-edition-madhur-bhargava/

ebookultra.com

Java For Dummies 4th Edition Barry Burd

https://ebookultra.com/download/java-for-dummies-4th-edition-barry-
burd/

ebookultra.com

Getting Started with Bluetooth Low Energy Tools and


Techniques for Low Power Networking 1st Edition Kevin
Townsend
https://ebookultra.com/download/getting-started-with-bluetooth-low-
energy-tools-and-techniques-for-low-power-networking-1st-edition-
kevin-townsend/
ebookultra.com

Java EE 7 for Beginners 1st Edition Sharanam Shah

https://ebookultra.com/download/java-ee-7-for-beginners-1st-edition-
sharanam-shah/

ebookultra.com

Java For Dummies Quick Reference 1st Edition Doug Lowe

https://ebookultra.com/download/java-for-dummies-quick-reference-1st-
edition-doug-lowe/

ebookultra.com
Bluetooth For Java 1st Edition Ranjith Antony Digital
Instant Download
Author(s): Ranjith Antony; Bruce Hopkins
ISBN(s): 9781430207634, 1430207639
Edition: 1
File Details: PDF, 22.84 MB
Year: 2008
Language: english
Bluetooth for Java
BRUCE HOPKINS AND RANJITH ANTONY

APress Media, LLC


Bluetooth for Java
Copyright © 2003 by Apress
Originally published by Apress in 2003

All rights reserved. No part of this work may be reproduced or transmitted in any form or by any
means, electronic or mechanical, including photocopying, recording, or by any information
storage or retrieval system, without the prior written permission of the copyright owner and the
publisher.
ISBN 978-1-59059-078-2 ISBN 978-1-4302-0763-4 (eBook)
DOI 10.1007/978-1-4302-0763-4

Irademarked names may appear in this book. Rather than use a trademark symbol with every
occurrence of a trademarked name, we use the names only in an editorial fashion and to the
benefit of the trademark owner, with no intention of infringement of the trademark.

Technical Reviewer: Andrew Stringer


Editorial Directors: Dan Appleman, Gary Cornell, Simon Hayes, Karen Watterson, John Zukowski
Assistant Publisher: Grace Wong
Project Manager and Development Editor: Tracy Brown Collins
Copy Editor: Ami Knox
Compositor: Impressions Book and Journal Services, Inc.
Artist and Cover Designer: Kurt Krames
Indexer: Valerie Robbins
Production Manager: Kari Brooks
Manufacturing Manager: Tom Debolski

Distributed to the book trade in the United States by Springer-Verlag New York, Inc., 175 Fifth
Avenue, New York, NY, 10010 and outside the United States by Springer-Verlag GmbH & Co. KG,
Tiergartenstr. 17,69112 Heidelberg, Germany.

In the United States, phone 1-800-SPRINGER, email [email protected], or visit


http://www.springer-ny. com.
Outside the United States, fax +49 6221345229, email [email protected], or visit
http://www.springer.de.

For information on translations, please contact Apress directiy at 2560 9th Street, Suite 219,
Berkeley, CA 94710. Phone 510-549-5930, fax: 510-549-5939, email [email protected], or visit
http://www.apress.com.

The information in this book is distributed on an "as is" basis, without warranty. Although every
precaution has been taken in the preparation of this work, neither the author nor Apress shall
have any liability to any person or entity with respect to any loss or damage caused or alleged to
be caused direcdy or indirectly by the information contained in this work.

The source code for this book is available to readers at http: //www. apress. com in the Downloads
section.
First and foremost, I dedicate this book to the Lord Jesus Christ, without whom
I could not have written this book. I also dedicate this book to my loving wife,
Schrell, and my two wonderful children, Lydia and Bruce Jr.
-Bruce Hopkins

Dedicated to my parents, Prof. Antony Mampilly and Prof. Kochurani Mampilly.


-Ranjith Antony
Contents at a Glance
About the Authors ................................................. .xm
About the Technical Reviewer .................................... .xiv
Acknowledgments .................................................... .xv
Introduction ....................................................... .xvii
Chapter 1 Introducing Bluetooth .................................. 1
Chapter 2 Bluetooth 1.1 ........................................... 11
Chapter 3 Before You Get Started ................................33
Chapter 4 Understanding the Java Bluetooth API .............. .45
Chapter 5 Bluetooth with J2ME MIDP .............................. 75
Chapter 6 Creating a Bluetooth Print Server
with JPS API ............................................ 97
Chapter 7 Java and OBEX ......................................... 115
Chapter 8 Using a Bluetooth Simulator .......................... 137
Chapter 9 Bluetooth Security .................................... 155
Chapter 10 Wireless Embedded Systems with
the Micro BlueTarget .................................. 179
Chapter 11 Enterprise Bluetooth Applications with
the Ericsson BlipNet ..................................225
Chapter 12 Bluetooth and Jini ....................................241

v
Contents at a Glance

Appendix A javax. bluetooth ........................................259


Appendix B javax.obex ..............................................265
Appendix C Java Bluetooth Development on
the PalmOS Platform ..................................269
Appendix D BlipNet 1.1 API ........................................273
Index .................................................................315

vi
Contents
About the Authors ................................................. .xzn
About the Technical Reviewer .................................... .xiv
Acknowledgments .................................................... .xv
Introduction ....................................................... .xvii

Chapter 1 Introducing Bluetooth ........................... 1


Bluetooth vs. Infrared .............................................. 1
Bluetooth vs. 802.11b ............................................... 1
Bluetooth Devices on the Market Today ............................3
Devices of the Future ............................................... 8
Summary .............................................................. .10

Chapter 2 Bluetooth 1.1 ..................................... 11


A Brief History of Bluetooth ...................................... 11
The Radio Spectrum .................................................. 12
The Bluetooth Protocol Stack ...................................... 17
Profiles .............................................................23
Profile Interdependencies .........................................28
Personal Area Networks: Piconets and Scatternets ............. .30
The Bluetooth Qualification Process .............................. 31
Summary ...............................................................32

Chapter 3 Before You Get Started ........................33


When NOT to Use Bluetooth and Java ...............................33
Understanding the JCP ..............................................34
The Benefits of the Java Bluetooth API ..........................38
What You Need to Get Started ..................................... .40
Summary ............................................................... 43

vii
Contents

Chapter 4 Understanding the Java


Bluetooth API .................................... .45
The Basic Components of a Bluetooth Application .............. .45
Summary ............................................................... 73

Chapter 5 Bluetooth with J2ME MIDP ..................... 75


J2ME Overview ........................................................ 75
The Mobile Information Device Profile ........................... 76
Stealth Mode Example ............................................... 81
Piconet Browser Example ............................................ 88
Summary ............................................................... 96

Chapter 6 Creating a Bluetooth Print Server


with JPS API ....................................... 97
JPS Overview ......................................................... 98
A Step-by-Step JPS Application ................................. .100
A Complete JPS Application: JPSPrint .......................... .102
Integrating JPS and Bluetooth ................................... .104
Summary .............................................................. 113

Chapter 7 Java and OBEX .................................... 115


What Is OBEX? ....................................................... 115
The OBEX APIs in the JSR-82 ...................................... 121
File Transfer Example ............................................. 127
Summary .............................................................. 136

Chapter 8 Using a Bluetooth Simulator ................. 137


The Pros and Cons of Using a Simulator ......................... 138
Impronto Simulator from Rococo .................................. 139
Summary .............................................................. 153

viii
Contents

Chapter 9 Bluetooth Security ............................. 155


Bluetooth Security Measures ...................................... 155
Security Example ................................................... 163
Summary .............................................................. 177

Chapter 10 Wireless Embedded Systems with


the Micro BlueTarget ......................... 179
What Is the Micro BlueTarget7 .................................... 179
The Micro BlueTarget Hardware Configuration .................... 182
The Micro BlueTarget Software Configuration .................... 185
Application Development on the Micro BlueTarget Platform .... 187
Summary ..............................................................224

Chapter 11 Enterprise Bluetooth Applications


with the Ericsson BlipNet .................225
The Ericsson BlipNet ..............................................226
BlipNet API Overview ..............................................232
The Bluetooth Device Tracker .....................................233
Summary .......................................................... ; .. .240

Chapter 12 Bluetooth and Jini ...........................241


What Is Jini Network Technology? .................................242
How Jini Works .....................................................245
Integrating Jini and Bluetooth ..................................251
A Jini-Bluetooth-Enabled Device: The PsiNaptic PsiNode ......254
The Benefits of Bluetooth and Jini ..............................255
Summary ..............................................................256

Appendix A javax. bluetooth .................................259


Class BluetoothConnectionException ..............................259
Class BluetoothStateException ....................................259
Class DataElement ................................................. .260

ix
Contents

Class DeviceClass ..................................................261


Class DiscoveryAgent ..............................................261
Interface DiscoveryListener ......................................261
Interface L2CAPConnection ........................................262
Interface L2CAPConnectionNotifier ...............................262
Class LocalDevice ..................................................262
Class RemoteDevice .................................................263
Interface ServiceRecord ...........................................263
Class ServiceRegistrationException ..............................263
Class UUID ..........................................................264

Appendix B javax.obex .......................................265


Interface Authenticator ...........................................265
Interface ClientSession ...........................................265
Interface HeaderSet ...............................................265
Interface Operation ...............................................266
Class PasswordAuthentication .....................................266
Class ResponseCodes ................................................267
Class ServerRequestHandler ........................................268
Interface SessionNotifier .........................................268

Appendix C Java Bluetooth Development on


the PalmOS Platform ..........................269
Supported Bluetooth Protocols ....................................269
System Requirements .............................................. .270
Included Software ..................................................271
Installation ........................................................272

Appendix D BlipNet 1.1 API ................................273


Class BlipNetIcons .................................................273
Interface BlipNode .................................................274
Interface BlipNodeCause ...........................................275
Interface BlipNodeEvent ...........................................277
Interface BlipNodeHandle .........................................277
Class BlipNodeHandleInUseException ............................. .280
Class BlipNodeHandleReleasedException ..........................281

x
Contents

Class BlipNodeNotConnectedException ............................281


Class BlipServer ...................................................281
Class BlipServerAccessException .................................282
Interface BlipServerConnection ..................................282
Class BlipServerConnectionException ............................284
Class BlipServerEventAdapter .....................................284
Class BlipServerEventFilter ......................................285
Interface BlipServerEventListener ...............................286
Class BlipServerException ........................................287
Class BluetoothAddress ............................................287
Class ClassOfDevice ...............................................288
Interface Connection Event ........................................292
Class EricssonMelody ..............................................293
Interface Event ....................................................294
Interface InquiryResultEvent .....................................297
Interface link .....................................................298
Class NoSuchSessionException .....................................299
Interface Obex Event ...............................................299
Class ObexFile .................................................... .300
Class ObexGenericObject .......................................... .301
Interface ObexProgressEvent ..................................... .302
Interface ObexProgresslistener ................................. .303
Interface ObexPushObject ........................................ .303
Class ObexServerHostedFile ...................................... .304
Interface PageData ................................................ .304
Interface RemoteBlipServerEventListener ....................... .305
Interface RemoteObexProgresslistener .......................... .305
Class ScanMode .................................................... .305
Class Session ...................................................... .307
Class ShortUuid ................................................... .308
Class TerminalNotConnectedException ........................... .310
Class WapServiceIndication ...................................... .310
Class WapServiceloading ...........................................312

Index ..............................................................315

xi
About the Authors
Bruce Hopkins is a 6-year Java veteran with experience in dis-
tributed computing and wireless networking. He has an
electrical and computer engineering degree from Wayne State
University in Detroit and has interest in robotics, microcom-
~~"Ji::::.>L'o4I
puting, and electronics. He has worked in Java since JDK l.Oa,
:::al!:~I~• • and his research studies include distributed computing, clus-
tering, encryption, and pervasive computing. He currently works as an
independent consultant in the Metro Detroit area.

. . - - - - - - , Ranjith Antony earned his bachelor of technology degree in


computer engineering from the College of Engineering,
Chengannur, Kerala, India, an institute affiliated with Cochin
University of Science and Technology. He became a lecturer in
the Department of Computer Engineering of the Government
Model Engineering College, an institute affiliated with Co chin
University of Science and Technology. In June 1998, he joined Atinav as a soft-
ware engineer. Presently, he is working as a senior technical manager and is
managing the Bluetooth -related Java products from Atinav.

xiii
About the Technical
Reviewer
Andrew Stringer was educated at the Dublin Institute of Technology in computer
science and software engineering, receiving a bachelor of science degree. Andrew
joined Rococo Software in 2001 as a trainer and consultant in the field of wireless
software development. Andrew has great experience in developing and delivering
courses with J2ME and also with Java APIs for Bluetooth Wrreless Technology
(JABWT). Andrew lives in Dublin, Ireland.

xiv
Acknowledgments
I PERSONAUYWANT TO 11IANK all the people who helped me in writing the book that
you're holding. Never in a million years would I have thought that I would be
working with Gary Cornell and John Zukowski, both of whom are very respected
Java authors. I'm very grateful that Gary and John accepted my proposal way
back in January of 2002. For that matter, I want to thank the rest of the team at
Apress including Tracy Brown, Ami Knox, Kari Brooks, and Wanshun Tam. More
honor, however, goes to Tracy. Many thanks to Andrew Stringer from Rococo for
tech reviewing this book; I never knew that I could have been wrong so many
times. It's good to have an expert at your disposal.
Bluetooth equipment isn't cheap, so I also want to acknowledge all the great
companies around the world Oiterally) that gave Ranjith and me hardware loans
and technical assistance. For instance, Jeff Day and the rest of the team at 3Com
(including Ken Morley, Brent Nixon, and Randy Rollins) were very helpful in pro-
viding us with Bluetooth adapters and tech support. Mahendra Tailor from TDK
Systems in the UK was very helpful in providing us with equipment as well.
Rococo was very kind to allow us to have an extended evaluation period in order
to write the chapter on Bluetooth simulation. Thanks to Geraldine, Karl, and the
rest of the team in Ireland. Urn Siong Huat from Mobiwave in Singapore was
very helpful in allowing us to use their protocol analyzer for the security chapter.
Peter Duchemin from Smart Network Devices in Germany was very helpful in
getting me the inside scoop on their Micro BlueTarget. I also want to thank
Niels-Christian Gjerrild from Ericsson in Sweden for hardware and documen-
tation on the Ericsson BlipNet system. North of the border, in Canada, I also
received assistance from Dr. Steven Knudsen regarding the integration of Jini and
Bluetooth.
This is my first book, so I definitely have to thank all the wonderful teachers
at Grant, Cass Tech, and WSU who helped me to get here. You'll never forget
a good teacher, and I've had many in my lifetime. I want to thank personally
Mrs. Smith, Mrs. Parent, Mr. Walker, and Mrs. Cowan from Grant School. At
Cass Tech, I had the pleasure to study under Mr. Miller, Mr. Raymond, and
Mrs. Ashford. Dr. Steve Kahn was a little disappointed that I didn't finish my
degree with the Mathematics Department after I joined the Emerging Scholars
Program, but he deserves to be mentioned. I also want to thank Dr. Chaudhary
for giving me the opportunity to study and research with him in the Parallel and
Distributed Computing Lab at Wayne State. Very few students were eligible to
work in the undergraduate research program, and I'm grateful to Bill Hill for
allowing me to be a part of it.

xv
Acknowledgments

I wouldn't be the person that I am today without the spiritual guidance of my


pastors at Bethlehem Temple Church. Many thanks to the late Bishop Jackson,
the late Bishop Porter, Elder Clark, and the whole church family.
I'm the youngest of seven children, so each one of my siblings played a role
in shaping my life and career. Thanks to Theresa, Valerie, Darlene, Barbara, Mark,
and Tyrone. I definitely have to give special thanks to Mom and Dad, because
they've dealt with me for 26 years of my life. They did an excellent job raising all
seven children with college educations. Thanks to Thaddeus Johnson for being
a good friend. In order to stay smart, you have to hang around smart people.
Finally, I want to thank my wonderfully sweet wife, Schrell. She was very
patient and understanding while I wrote this book. She is truly a virtuous
woman.
-Bruce Hopkins

Numerous people have provided assistance, advice, and encouragement


during the preparation of this book. Major contributors of material, ideas,
insights, solutions, and explanations that have found their way into this
book include James Jose, Salman Ali, Rajesh Rabindranath, Sudhin Latheef,
Vaishali Patil, and Sajith M Nair. Besides them, my teammates at Atinav, especially
George Mathew, Cipson Jose, and Dinkar Raj, have contributed suggestions, fixed
program bugs, and made imperceptible contributions too numerous to mention.
I am also grateful to Mr. Lim Siong Huat and his colleagues at Mobiwave for
extending their support by providing timely advice and necessary equipment.
Without him, the chapter on Bluetooth security would not have materialized.
-Ranjith Antony

xvi
Introduction
IN THE NEAR FUTIJRE, Bluetooth wireless technology will be embedded into nearly
every consumer electronics device. Devices like mobile phones, PDAs, laptops,
desktops, calculators, watches, k~yboards, mice, printers, scanners, cameras, and
video game consoles are just a sample of what device manufacturers will be
embedding with Bluetooth. Today, Bluetooth chip sets can be purchased (in mass
quantities) for $5, so it's only a matter of time before many of your personal
devices become Bluetooth enabled.
With Java, you get the ability to create applications that are agnostic of their
underlying hardware platform. As you can see, this makes Java the perfect pro-
gramming language for Bluetooth! Regardless of the hardware or OS used for
your PDA, mobile phone, watch, etc., you can use the same programming lan-
guage to create your Bluetooth applications. This book is all about how to create
wireless applications using Java and Bluetooth.

How This Book Is Organized


Here's an overview ofwhafs covered in this book:

Chapter 1: Introducing Bluetooth: If you're completely new to Bluetooth,


then this chapter is for you. In Chapter 1, we give a brief introduction
to Bluetooth, with a general explanation of what you can do with the
technology.

Chapter 2: Bluetooth 1.1: In this chapter, we dive right into the dirty details
of the Bluetooth protocol. Here we define the roles and relationships
between the Bluetooth stack, Bluetooth profiles, and Bluetooth hardware.
If you've seen Bluetooth terminology before, but you don't know the differ-
ence between SDP and SDAP for instance, then this chapter will help clear
things up.

Chapter 3: Before You Get Started: Chapter 3 is very appropriately named


because it covers all the loose ends that need to be addressed before we
show you how to integrate Bluetooth and Java.

Chapter 4: Understanding the Java Bluetooth API: This chapter covers the
full life cycle of a Bluetooth application (whether you're using Java or not).
This chapter also shows you how to use the javax. bluetooth package of

xvii
Introduction

the official Java Bluetooth API (the JSR-82) in order to create Bluetooth
applications.

Chapter 5: Bluetooth with J2ME MIDP: The first complete example of a Java
Bluetooth application is explained in Chapter 5. Before we present the
code, however, we provide a short review of the J2ME MIDP.

Chapter 6: Creating a Bluetooth Print Server with JPS API: Now with a com-
plete example under your belt, things will start to get pretty exciting. In.
Chapter 6, we introduce you to the Java Printing API and show you how to
create a Bluetooth print server.

Chapter 7: Java and OBEX: Chapter 7 covers the foundation of the OBEX
protocol and provides an example on how to transfer files using the
javax.obex package of the JSR-82.

Chapter 8: Using a Bluetooth Simulator: As you might have guessed, this


chapter is all about how to create Java applications that interact with vir-
tual Bluetooth devices. In this chapter, the entire Bluetooth network is
simulated in software.

Chapter 9: Bluetooth Security: Chapter 9 covers the security measures pro-


vided by the Bluetooth specification in order to make wireless applications
more secure.

Chapter 10: Wireless Embedded Systems with the Micro BlueTarget: The pri-
mary focus of Chapter 10 is the Micro BlueTarget by Smart Network
Devices. In this chapter, we explore the possibilities of creating appli-
cations with a fully functional computer that fits in your hand and
includes an implementation of the JSR-82.

Chapter 11: Enterprise BluetoothApplications with the Ericsson BlipNet: In.


Chapter 11, we introduce you to enterprise Bluetooth applications and
show you how to construct them using Java and the Ericsson BlipNet.

Chapter 12: Bluetooth and Jini: In the final chapter of the book, we provide
an overview of Jini network technology and describe how to implement
Jini and Bluetooth together.

Appendix A: javax.bluetooth: Appendix A is a handy reference that contains


all the method signatures of the javax. bluetooth API.

xviii
Introduction

Appendix B: javax.obex: Appendix B is a handy reference that contains all


the method signatures of the javax. obex API.

Appendix C: Java Bluetooth Development on the PalmOS Platform:


Appendix C provides a quick overview of how to get started creating Java
Bluetooth applications on the Palm OS platform.

Appendix D: BlipNet 1.1 API: Appendix D contains full descriptions of the


classes, exceptions, and interfaces that comprise the BlipNetAPI. This
appendix will be really useful to have on hand when developing BlipNet
applications.

Intended Audience
So who are you? This book really has two audiences. If you're a Java developer,
then this book assumes that you're an intermediate Java developer with little or
no experience with Bluetooth. You'll get the most out of this book if you've writ-
ten a few Java classes on your own (especially J2ME applications).
If you're a Bluetooth developer, then this book becomes useful to you after
Chapter 2. If you've never used Java before, then we'd suggest that you read the
first few chapters of a J2ME book before you read this book.

The Code
The source code for this book is available at http://'tMII. apress. com in the
Downloads section. The book's companion Web site,
http://www.javabluetooth.com. also contains the source code, as well as other
useful resources such as a list of recommended Bluetooth hardware for running
the examples.

xix
CHAPTER 1

Introducing Bluetooth
SIMPLY STATED, BuJE'l'OOTII is a
wireless communication protocol. As such, you
would use Bluetooth to communicate to two or more other Bluetooth-capable
devices. In this sense, Bluetooth is like any other communication protocol that
you may use every day like HTTp, FfP, SMTp, or IMAP. Bluetooth is also like these
protocols in that it has a client-server architecture. In Bluetooth, the one who ini-
tiates the connection (the client) is the master, and the one who receives the
connection (the server) is the slave.
The purpose of this chapter is to give you an introduction to Bluetooth. We'll
briefly compare it with competing technologies like Infrared and 802.llb and
explain where Bluetooth fills the gaps that these other technologies leave open.
Next, we'll show you what Bluetooth can do and where it is currently used in
applications today, just in case you're unfamiliar with the capabilities of the tech-
nology. Finally, we'll wrap up this chapter with a few scenarios for how Bluetooth
will be used in the near future.

Bluetooth vs. Infrared


Of course, wireless communication between two computers is not new. PDAs
have been able to do that for years using infrared technology. One drawback to
infrared is that the devices involved must be a few feet apart, and most impor-
tantly, the infrared transceivers must see each other "eye to eye." If either of those
conditions are not met, then the transmission will fail. Bluetooth overcomes the
first limitation by having a nominal range of about 10 meters (30 feet). Bluetooth
overcomes the second limitation because it works like a radio, so transmissions
are omnidirectional. Consequently, there are no line-of-sight issues when com-
munication occurs between two Bluetooth devices.

Bluetooth vs. 802.11b


If you've heard of Bluetooth before, then you've certainly heard of802.llb (the
wireless LAN protocol), another wireless communication protocol. Bluetooth
and 802.llb were created to accomplish two different goals, although both tech-
nologies operate in the same frequency band: 2.4 GHz.

1
Chapter 1

NOTE Having both technologies operate at the same fre-


quency range does not mean they'll interfere when placed in
range of each other, according to a Forrester Research study
conducted in 2001. Go to http://'IMW.forrester .coml for
details on that report.

The goal of wireless LAN (802.11 b) is to connect two relatively large devices
that have lots of power at high speeds. 1YPically, this technology is used to con-
nect two laptops within 300 feet at 11 Mb / s. This technology is also useful for
network administrators who want to extend their LAN to places where it is either
expensive or inconvenient to run cables.
On the other hand, Bluetooth is intended to connect smaller devices like
PDAs and mobile phones within a range of 30 feet at a rate of 1 Mb/ s. Slower data
rates and shorter ranges allow Bluetooth to be a low-power wireless technology.
Compared to 802.11 b devices, some Bluetooth devices can easily consume 500
times less power, which can make a huge difference in the battery life of many
mobile devices.
Bluetooth is also intended to be used as a cable replacement technology. If
you have multiple peripherals connected to your computer using RS-232 or USB,
then Bluetooth is the ideal solution if you want to use those devices wirelessly. It's
almost impossible to connect peripherals to your computer using 802.11b tech-
nology (well, except for printers). Bluetooth even has a built-in capability for
wireless audio communication.
Can either technology replace the other? Hardly. Bluetooth will never replace
802.11 b because it's bad at handling the following:

• Large file transfers between devices

• Long-range communication (only Class 1 Bluetooth devices have a range


of300 feet)

CROSS-REFERENCE See "Bluetooth Device Power Classes" in


Chapter 2 for details about power classes.

2
Introducing Bluetooth

On the other hand, 802.11 b will never replace Bluetooth because

• 802.Ub can't be used to communicate to peripherals.

• 802.11 b requires too much power for communication.

• 802.11 b is overkill for small data transfers.

• 802.11 b wasn't designed for voice communication.

In the wireless communication arena, there is no technology that is best


suited for every possible application. Either Bluetooth or 802.Ub can be used for
wireless communication between computers. Both have their place in the market
and can perform in their niches well. Newer wireless LAN protocols like 802.Ua
and 802.11g will further clear the distinction between Bluetooth and wireless
LAN because they extend 802.Ub's bandwidth limitation to 54 Mb/s.

Bluetooth Devices on the Market Today


Now, let's take a look at Bluetooth devices that you can get at any consumer elec-
tronics store today. We'll highlight the problems that Bluetooth solves and give
some scenarios for using this technology. If you're already familiar with common
usage scenarios of Bluetooth devices, then feel free to skip this section.

Wireless Data Transfer: PDA to Phone


Almost everyone owns a mobile phone nowadays. These devices are very conve-
nient, compact, and cute (well, at least some of them). However, they suffer from
two major limitations:

• Mobile phones have limited memory for phone book entries.

• Data entry on mobile phones can be cumbersome.

We've all been there before. Entering data on a mobile phone is very tedious
because you're dealing with a nine-button keypad to type alphanumeric text. Also,
mobile phones don't have a lot of memory for storage, so you're limited to only 50
or 100 entries. On top of that, you'll also need to truncate some names when
adding phone entries, so '~unt Clarissa Johnson" becomes '~t Clrssa Jnsn."

3
Chapter 1

Uyou own a PDA, then you probably agree that PDAs are also useful devices.
They can store thousands of contact entries, and they are a lot better for entering
data compared to mobile phones. Since you can't store your entire contact list on
your mobile phone, you probably have it stored on your PDA. Unfortunately, it's
a little inconvenient to look up a phone number on the PDA and then manually
dial the number on the mobile phone.
With a Bluetooth-enabled PDA and a Bluetooth-enabled mobile phone, you
can keep your entire contact list on the PDA where it's far more convenient. Don't
even bother to store phone numbers on your phone. Whenever you are ready to
dial a number, you just look up the number on the PDA and send the phone
number over to the phone; no wires, no hassle. Figure 1-1 is a picture of one of
HP's advanced Bluetooth-enabled PDAs.

Figure 1-1. The short antennae on HP iPAQ 5400 series Pocket PC allows it to
communicate via Bluetooth and 802.11 b. For added security, this model also
includes a fingerprint reader.

4
Introducing Bluetooth

Connection Sharing: Laptop to Phone


If you're a programmer and you have a laptop, you know how cumbersome it is
to get a dial-up Internet connection on your mobile phone. You may have an
Internet-ready phone, but you may not have the right cable. Maybe you have the
right cable (which isn't cheap), but you need additional software to establish the
dial-up connection. Sometimes, you need to connect two cables together to
accomplish this feat. Bluetooth eliminates all the hassle from this scenario by
creating a standardized method for wireless dial-up networking. You can even
keep your wireless phone at your hip or in your purse while you surf the Web on
your laptop. The same applies for PCs or PDAs that want to use your phone to
connect to the Internet. This is really convenient whenever your broadband con-
nections at home go down for servicing. You can simply place your wireless
phone in the vicinity of your PC and that's it, you're connected.

Personal Networks: PC to PC
Bluetooth is great for connecting two PCs together at a moderate speed. If you
want higher speeds or if you need to transfer large files, then you're better off
using Wireless LAN technology. On the other hand, Bluetooth is good at creating
small, personal networks. So this is a great technology if you're having an
impromptu meeting with coworkers. Bluetooth also has the added capability to
discover new devices when they enter your network.

Cable Replacement: PC to Peripherals


You can imagine Bluetooth as functioning like any other protocol to connect to
your peripherals, such as serial (RS-232), parallel, USB, or Firewire. In the near
future, your personal computer will be equipped with a Bluetooth "port" in the
same manner that it currently features a serial and USB port.
You can use Bluetooth to connect to your peripherals wirelessly and effort-
lessly. Have you ever been to a remote location with a laptop and wanted to use
a printer to print out some files? If you don't have the right printer driver or the
right cable, then you'll need to give your file to someone who does have it. If that
person doesn't have the right program to read your file, then you're out of luck;
no printing for you. If you had a Bluetooth laptop and that printer was a Blue-
tooth printer (regardless of the manufacturer), then you'd have no problem.
With Bluetooth, you can ask the printer for the right driver if you don't have it,
and then you can print your file with no problem.

5
Chapter 1

The Power User


So what if you're a power user? You most likely have a PDA, a wireless phone,
a printer or two, a scanner, an MP3 player, a digital camera, and a DV camera.
The back of your computer probably looks like a rat's nest of wires and cables.
Some devices you may leave disconnected until you really, really need them.
Bluetooth solves all this by allowing you to have virtually an unlimited number of
peripherals wirelessly connected to your computer. The only limitation is that
you can only have seven active connections at the same time. That should be fine
because it would be quite rare for you to print, scan, upload pictures, and sync
your PDA all at the same time.

Interoperability: Any Device to Any Device


In the previous scenario, your non-Bluetooth-enabled devices are definitely not
interoperable. In other words, if you want to send a picture from the camera to
the PDA, then you'll need to use the computer to interconnect them. The same
also goes if you want to scan a document and send it to the printer (i.e., to act like
a copier) or send it to the PDA; you'll always need your PC to be the "man in the
middle." Of course, you can buy a cable or two to do some of those tasks, but
those cables are rare and expensive. Bluetooth solves all this by allowing your
devices to communicate among themselves with no hassle and with no cables.
It's essentially the universal cable!

Bluetooth in the Small Office or Home Office


In the small office setting, how do you share peripherals like a printer among
users? Let's say you have a $300 printer that you want two users on your network
to share. Your cheapest option is to buy a print server-but that's another $300!
You might as well buy another printer for that kind of money. With Bluetooth, if
both your users are in range, no print server is needed because both users can
connect to the printer as if it were a local printer. For that matter, the printer
should be able to print for every Bluetooth user within range; but remember that
it can only handle seven active connections at the same time.

Bluetooth for Voice Applications


Now, Bluetooth is great at transferring data wirelessly, but it also has the capabil-
ity to transmit voice and sound as well. So if you had a Bluetooth headset, you

6
Introducing Bluetooth

could use the same headset to answer calls on your Bluetooth-enabled wireless
phone as well as answer calls on your Bluetooth-enabled home phone. You could
also use the same headset to listen to your Bluetooth-enabled portable radio.
Bluetooth can also be enabled in your car so that if you're driving and you
receive a call on your wireless phone, you can simply transfer the call to the
hands-free system built right into the car. Your phone stays on your hip, or in
your briefcase. You can also use the same technology to initiate a call in your car
without touching your phone at all. In either case, if you've arrived at your desti-
nation and you want to continue the conversation, you just transfer the call back
to the phone.

Bluetooth for Wireless Gaming


Of course, you can use Bluetooth for wireless gaming. It's always a hassle when
you want to connect two handheld video game systems and play against a friend.
Most cables were about 6 feet long, so if both players were on a school bus, they
needed to sit right next to each other to play. With Bluetooth, you just have to
come within range of your opponent to play.
Okay, we're grownups now. But what do you do if you're in a boring meeting
and you have some time to kill? With Bluetooth, you and your equally bored col-
league can both get out your PDAs and playa game of checkers. PDAs are
business tools, so no one will ever know if you are taking down notes or getting
double jumped. Figure 1-2 shows a Bluetooth-enabled mobile gaming device
that could revolutionize the portable gaming industry: the Nokia N-Gage.

Figure 1-2. The Bluetooth-enabled Nokia N-Gage wireless gaming system

7
Chapter 1

Devices of the Future


So, what kind of devices, applications, or innovations can we expect to see in the
future that involve Bluetooth? Well, here are just a few that we can think of:

• Bluetooth locator system

• Personalized family car

• The new arcade: a restaurant lobby

The following sections describe these in more detail.

Bluetooth Locator System


Let's start off with a Bluetooth-enabled home, which means that wherever you go
in your home, you are within range of the wireless network. With a Bluetooth-
enabled home, you have the ultimate locator system. All your Bluetooth-enabled
devices can never be misplaced if they are within the bounds of your home. If an
item ever gets lost, all you need to do is go to your PC and start up the Bluetooth
locator system program. For basic systems, you tell the program what device you
are looking for, and the device will beep until it is found. For advanced systems,
the Bluetooth locator system will display a map of your house and show you
which room has your lost item. This solution is ideal for people who always mis-
place small but essential items like PDAs, wireless phones, keys, 1V remotes,
watches, and baby pacifiers!

Personalized Family Car


In this example, let's start offwith a Bluetooth-enabled car. With a Bluetooth-
enabled car, all you need to do is to set the mirrors, seats, and radio stations just
once and store your preferences on a Bluetooth-enabled device that you carry with
you all the time, like a wireless phone, PDA, or a watch. It wouldn't matter if some-
one else used your car, because all your preferences are stored on the device you
keep with you. After someone uses your car, all you need to do is upload your pref-
erences from your Bluetooth-enabled device (like your watch-see Figure 1-3) and
be on your merry way.

8
Introducing Bluetooth

Figure 1-3. Although the Fossil Wrist PDA doesn't contain any Bluetooth hardware,
it does come preloaded with a Bluetooth-enabled as: the Palm as 4.1. Palm as is
a registered trademark ofPalm, Inc.

The New Arcade: A Restaurant Lobby


Finally, let's say that sometime in the near future, you (and several other people)
are waiting for a seat at a restaurant. While you are waiting for your table, the
hostess gives you a little gaming device to help you kill time. This Bluetooth-
enabled device not only lets you play games against the computer, but you can
also play games with other people in the lobby! When your table is ready, your
game unit vibrates automatically, so the hostess doesn't even need to call you.
When you turn your device in to the hostess, your score is automatically
uploaded to the high scores list. If your score is good enough, you may even
win a free meal.

9
Chapter 1

Summary
Bluetooth is a great technology for wireless connections between power-
conservative computer devices. It is also a great cable replacement technology
for pes and laptops. It can function as a universal connector between your
peripherals and devices, and you may never again need a cable (some of which
can be expensive) to connect your devices together.
In the next chapter, we'll dig right in to the Bluetooth protocol. If you're new
to Bluetooth, this will be your first introduction to a lot of new terminology.
We'll explain to you the components of the Bluetooth stack and the purpose of
Bluetooth profiles. When you create your wireless applications, you'll interact
with the stack and profiles to send and receive data.

10
CHAPTER 2

Bluetooth 1.1
THE MAIN FOCUS OF THIS CHAPTER is to describe the inner workings of Bluetooth. The
most current revision of the protocol is version 1.1. Almost every device on the
market today is compliant with Bluetooth version 1.1, although you might be
able to find some devices that use the LOB version of Bluetooth. The differences
between Bluetooth LOB and 1.1 are beyond the scope of this book. The differ-
ences are minimal, and they really don't apply to Java programmers.
What can you expect for future versions of Bluetooth like 1.2 and 2.0?When-
ever the Bluetooth SIG (the group of companies that developed the Bluetooth
spec) plans to release later revisions of the spec, you can expect some things like
higher speeds, more profiles, and backward compatibility with 1.1. We wouldn't
expect the newer versions to try to compete with 802.11 speeds, but you might see
data rates of 4,8, or even 12 Mb/s. Bluetooth's niche is as a low-power wireless
communication protocol, so don't expect Bluetooth 2.0 to be a power hog.

CROSS-REFERENCE See Chapter 1 for a discussion of


Bluetooth versus 802.11 b.

This chapter is all about Bluetooth. We'll give you brief history on how it
began and how it got its name. Next, we'll show you the radio spectrum and
where Bluetooth fits in with devices that you probably already know about.
Afterwards, we'll describe the anatomy of a Bluetooth-enabled device by giving
a description of Bluetooth hardware, the Bluetooth stack, and Bluetooth profiles.
For the remainder of this book, when we refer to Bluetooth, we are referring to
the 1.1 version of the spec. Now, let's dig in to Bluetooth!

A Brief History of Bluetooth


Bluetooth got its name from King Harald BHitand (Bluetooth) of Denmark. His
most notable accomplishment was that he united Denmark and Norway under
Christianity in the 10th century. In 1994, Ericsson conducted the first research

11
Chapter 2

studies of a wireless technology to link mobile phones and accessories. Years later
in 1997, Ericsson formed the Bluetooth Special Interest Group (Bluetooth SIG) so
that other companies could use and promote the technology. At that time, the
Bluetooth SIG consisted of the following promoter companies:

• Ericsson

• IBM

• Intel

• Nokia

• Toshiba

Later on, in 1999 after the 1.0 specification was released, the Bluetooth SIG
added four more members:

• 3Com

• Agere

• Microsoft

• Motorola

Today, the Bluetooth SIG has well over 2,000 members that are all interested
in promoting and improving the Bluetooth standard.

The Radio Spectrum


Wrreless communication between computers is either in the form of light or
radio signals. Infrared technology is the common way to conduct short range
wireless communications and obviously uses light. Conversely, Bluetooth tech-
nology uses radio signals. Table 2-1 gives a list of common everyday items that
rely on radio signals for communication. As you can see, Bluetooth, cordless
phones, B02.llb, and B02.llg fall in the 2.4 GHz range. Hopefully, this will
demystify the Bluetooth concept if you are new to all this; it's just a radio.

12
Bluetooth 1.1

Table 2-1. Common Radio Frequencies

ITEM FREQUENCY RANGE


AM radio 535 kHz-1.6 MHz

Garage door openers 40 MHz

Baby monitors 49 MHz

TV channels 2-6 54 MHz-88 MHz

FMradio 88 MHz-108 MHz

TV channels 7-13 174 MHz-216 MHz

TV channels 14-83 512 MHz-806 MHz

CDMA cellular phone 824 MHz-894 MHz

GSM cellular phone 880 MHz-960 MHz

Cordless phones 900 MHz

Global Positioning System 1.227 GHz-1.575 GHz

PCS cellular phone 1.85 GHz-1.99 GHz

802.llb 2.4 GHz-2.483 GHz

802.llg 2.4 GHz-2.483 GHz


Bluetooth 2.4 GHz-2.483 GHz

Cordless phones 2.4GHz


802.11a 5.15-5.35 GHz

81uetooth Devices
So, if a Bluetooth device is just a radio, then what do these radios look like? Well,
Figures 2-1,2-2, and 2-3 are just a sample of devices that are Bluetooth radios.
Some of these items are used in development kits, while others are meant to be
used by consumers.

13
Chapter 2

Figure 2-1. The 3COM USB Bluetooth module

Figure 2-2. The CSR BlueCore 1. This single-chip solution includes


a microprocessor, RAM, I/O controller, and Bluetooth implementation in a single
package! This is most likely the smallest radio that you've ever seen.

14
Bluetooth 1.1

Figure 2-3. The Palm SD Bluetooth card for Palm as 4 devices. Palm as is
a registered trademark of Palm, Inc.

The examples in this book will use a variety of Bluetooth devices from multi-
pIe vendors. The example in Chapter 8, however, uses no Bluetooth devices at all!
In that example, we simulate the entire Bluetooth network in software using the
Rococo Impronto Simulator.

Point-to-Point and Multipoint


One factor that distinguishes various Bluetooth devices is their connection capa-
bilities. If a Bluetooth device can only support point-to-point communication,
then it can only communicate to a single Bluetooth device at a time.
Figure 2-4 demonstrates point-to-point communication in Bluetooth.

)) )0)

Figure 2-4. You can only connect to one Bluetooth device at a time ifyou have
hardware that only supports point-to-point communication.

15
Chapter 2

Now, point-to-point communication isn't necessarily a bad thing. Uyou


have a Bluetooth phone, you really only need one connection to your Bluetooth
phone. Frankly, it doesn't make sense to have multiple headsets be able to con-
nect to your phone while you are using it.
On the other hand, a multipoint device is able to communicate with up to
seven other devices at the same time. Figure 2-5 is a diagram of a multipoint
device communicating to other devices within range using Bluetooth technology.

( (011

Figure 2-5. You can connect to up to seven Bluetooth devices at a time ifyou have
multipoint-capable hardware.

Bluetooth Device Power Classes


Bluetooth hardware devices are broken up into three power classes. Table 2-2
describes the device classes and their capabilities.

Table 2-2. Bluetooth Device Power Classes

CLASS POWER RATING RANGE


Class 1 100mW 100 meters
Class 2 2.SmW 20 meters
Class 3 ImW 10 meters

So as we stated in Chapter 1, Bluetooth devices are not limited to 10 meters


in range.

16
Bluetooth 1.1

CROSS REFERENCE See "Bluetooth us. B02.11b" in Chapter 1


for details on the initial discussion ofBluetooth's range.

How can you determine a Bluetooth device's power class, and thereby know
its range? The power class is rarely printed on the unit, so here's a hint if you're
trying to distinguish the power class of a device that you've never seen before. If
that device is powered by batteries, or if it fits in your hand (like a wireless phone
or a headset), then it is most likely a Class 2 or 3 device. If the Bluetooth device is
built right into the hardware of another unit, and that unit is plugged into AC
power, then it is most likely a Class 1 device.
Don't worry about Bluetooth device classes too much; just be aware that
Bluetooth can communicate at greater distances than 10 meters.

The Bluetooth Protocol Stack


Your computer is a pretty powerful device. It has a processor, memory, bus, hard
drive, and other neat things. The unfortunate thing is that the computer doesn't
have the ability to use peripherals by itself. Common peripherals like CDIDVD
drives, graphic displays, mice, keyboards, modems, printers, and scanners all need
drivers. Your computer needs a driver to instruct it how to use a peripheral. By
itself, the computer has no idea how to print to a printer or scan with a scanner.
The computer is pretty powerful, but also pretty helpless. The device driver is the
controlling agent that helps the computer to communicate with its peripherals.
The Bluetooth stack and Bluetooth hardware have a similar relationship. The
Bluetooth stack is a controlling agent (it could be software, firmware, hardware,
or a combination of all three) that implements the Bluetooth protocol and also
allows you to control your Bluetooth device programmatically. The Bluetooth
stack allows you to do these two things:

• Communicate with other Bluetooth devices

• Control your own Bluetooth device

So, if you're familiar with the HTTP protocol stack and how it works, then you
can relate to the Bluetooth protocol stack. A Web browser uses an HTTP protocol
stack so that it can receive Web content like HTML pages, images, files, and best
of all, Java applets. A Web server also uses an HTTP protocol stack to send out
Web content to Web browsers over the network. So, like the HTTP protocol stack,

17
Chapter 2

a Bluetooth protocol stack will allow Bluetooth clients and servers to send and
receive data over a wireless network.
So how do the Bluetooth device and the Bluetooth stack work together? What
is their relationship? Well, a Bluetooth device without a stack can be compared to
a computer without an operating system. More specifically, it's like a computer
peripheral without a driver. Figure 2-6 illustrates this concept.

I )0) )

------------~O.-----------------------~0·-----------

Figure 2-6. A) The computer may be attached to its peripherals, but it can't control
them without a driver. B) The computer may be attached to a Bluetooth device,
but it can't control it without a stack.

So, in order to communicate with the Bluetooth protocol and to control


a Bluetooth radio, your computer uses a Bluetooth stack. Now, let's break down
the Bluetooth stack into its individual components and see how they work. Each
component of the stack is called a layer.

Layers of the Protocol Stack


For application developers, the Bluetooth protocol can be broken up into two
main items: layers and profiles. All the layers of the Bluetooth protocol form the
protocol stack. Figure 2-7 shows how the following layers of the Bluetooth proto-
col "stack up":

• Host Controller Interface (HCI)

• Logical Link Control and Adaptation Protocol (L2CAP)

18
Bluetooth 1.1

• Service Discovery Protocol (SDP)

• RFCOMM

• Telephony Control Protocol Specification (TCS-BIN)

• Wireless Access Protocol (WAP)

• Object Exchange (OBEX)

• Bluetooth Network Encapsulation Protocol (BNEP)

• Human Interface Device Protocol (HID)

rn
OBEX WAP

[}] IP IP
PPP
CD IP

JGG G G
,.c
[ RFCOMM ....0..
0

Logical Link Control and Adaptation Protocol (L2CAP)

[~__________________H_o_st__co_n_tr_o_ll_e_r_I_n_te_rl_a_C_e_(_H_CI_)________________~J
Figure 2-7. The Bluetooth protocol stack

NOTE Now, ifyou're familiar with the Java Collection


Framework, then you've heard of java . util. Stack. Please
erase that idea from your mind completely, or you'll be thor-
oughly confused here. Bluetooth uses some terms like stack
and profile, which unfortunately are used in Java as well.
This chapter is all about Bluetooth, so we'll clear up the con-
fusion whenever there is a clash of terminology here.

19
Chapter 2

You may notice that some of these layers are called "protocols" as well. That's
because these items are subprotocols of the Bluetooth protocol stack. Others like
TCP IIp, OBEX, and WAP were not originated by the Bluetooth SIG, but they have
been incorporated into the Bluetooth protocol. Those subprotocols are known as
adopted protocols.

Host Controller Interface (HCI)


The Host Controller Interface is a layer of software that passes all your data from
your computer to your attached Bluetooth device. For instance, if you are trying
to communicate wirelessly from your PC (the host) and you have a Bluetooth
device (the controller) attached to your USB port, then you'll need a layer that
can understand the USB calls and send that information to the upper layers of
the stack. Everything (voice and data) passes though the Host Controller
Interface.

Logical Link Control and Adaptation Protocol


(L2CAP)
The Logical Link Control and Adaptation Protocol is the core layer of the stack
through which all data must pass. 12CAP boasts some powerful features like
packet segmentation and reassembling of data, as well as protocol multiplexing.
If you are trying to pass a very large packet of data, 12CAP breaks up the packet
and sends smaller ones. Conversely, 12CAP also reassembles segmented packets
when accepting data. With protocol multiplexing, 12CAP can accept data from
more than one upper protocol at the same time (like SDP and RFCOMM). Only
data passes through the 12CAP layer; audio links have direct access to the Host
Controller Interface.

Service Discovery Protocol (SOP)


A Bluetooth device uses Service Discovery Protocol in order to discover services.
What's a Bluetooth service? A good example would be a Bluetooth printer.
A Bluetooth printer will publish itself with a message such as, "I am a printer,
how can 1 help you?" If you have a document, and you want to print it, then you
would use the Service Discovery Protocol to find a printer that offers a printer
service in your range.

20
Bluetooth 1.1

RFCOMM
RFCOMM is commonly known as the wireless serial port, or the cable replace-
ment protocol. The name is derived from the fact that your serial ports are called
COMMl, COMM2, etc. RFCOMM simulates the functionality of a standard serial
port. For instance, a Bluetooth-enabled PDA would use the RFCOMM layer to
synchronize its data to a Bluetooth-enabled PC as if they were physically con-
nected by a cable.

Telephony Control Protocol Specification (TCS,


TCS Binary, TCS-BIN)
Telephony Control Protocol Specification (TCS, TCS Binary, TCS-BIN) is used to
send control signals to devices that want to employ the audio capabilities within
Bluetooth. For example, a Bluetooth cordless phone would use this layer of the
protocol to send signals to the base station indicating that the user has requested
to hang up the current call, or to use call waiting, or to place a three-way call, etc.

Wireless Access Protocol (WAP)


If you've used an Internet-enabled wireless phone before, then you've usedWAP.
In Bluetooth, this is an adopted protocol, so the Bluetooth SIG has incorporated
the existingWAP protocol into the Bluetooth protocol to fit Bluetooth's needs.
WAP requires that PPp, IP, and UDP be present in the stack.

Object Exchange (OBEX)


OBEX is a communication protocol initially defined by the Infrared Data
Association (IrDA). Unless you've worked with infrared, you've probably haven't
heard of OBEX. lust like WAF, OBEX was defined by another group, but it was
adopted by the Bluetooth SIG. OBEX is pretty useful when you want to transfer
objects like files between Bluetooth devices. OBEX does not require that TCP and
IP be present in the stack, but the manufacturer is free to implement OBEX over
TCP/IP.

21
Chapter 2

NOTE A Bluetooth vendor does not need to implement all


the Bluetooth protocol layers into its product in order to be
Bluetooth compliant. For instance, a Bluetooth cordless
phone may very well only have HCI, SDp, L2CAP, and rcs
implemented into its stack. That's perfectly fine because
a cordless phone may not need any extra functionality.

Bluetooth Network Encapsulation Protocol (BNEP)


The Bluetooth Network Encapsulation Protocol is a layer in the Bluetooth stack
that allows other networking protocols to be transmitted over Bluetooth, namely
Ethernet. ABluetooth vendor has many options if it wants to implement TCP lIP
networking in its Bluetooth device. BNEP is a popular choice because it encapsu-
lates TCP/IP packets in L2CAP packets before handing off the data to the L2CAP
layer in the stack.

Human Interface Device Protocol (HID)


The Human Interface Device Protocol is another adopted protocol in the
Bluetooth specification. It was originally defined in the USB specification, and it
lists the rules and guidelines for transmitting information to and from human
interface devices like keyboards, mice, remote controls, and video game con-
trollers.
Table 2-3 is a handy guide that gives a brief description of the layers of the
Bluetooth stack and their purpose.

22
Bluetooth 1.1

Table 2-3. Layers of the Bluetooth Protocol Stack

SHORT NAME FULL NAME DESCRIPTION


HCI Host Controller Interface The layer that interfaces the host (i.e., the PC)
and the controller (the Bluetooth module)

L2CAP Logical link Control and The layer that handles all data transmissions from
Adaptation Protocol upper layers

SDP Service Discovery Protocol The layer that discovers services on Bluetooth
devices in the area
RFCOMM RFCOMM The layer that allows you to create a virtual serial
port and to stream data
TCS-BIN Telephony Control The layer that allows you to create control signals
Protocol Specification for audio applications
WAP Wireless Access Protocol The adopted protocol that allows you to view
content in Wireless Markup Language (WML)
OBEX Object Exchange The adopted protocol that allows you to send
and receive objects
BNEP Bluetooth Network The layer that encapsulates other protocol data
Encapsulation Protocol packets into L2CAP packets
HID Human Interface The layer that traffics the controls signals and
Device Protocol data for input devices like keyboards and mice

NOTE For an exhaustive list ofall the new and upcoming


Bluetooth protocols, go to the Bluetooth Member site at
http://www.bluetooth.org.

Profiles
So, let's say that you own a Bluetooth-enabled PDA and a Bluetooth-enabled
wireless phone. Both of the devices have Bluetooth stacks. How can you tell if
your devices will interact properly and allow you to synchronize the phone lists
between each other? How will you know if you can send a phone number from
the PDA to the phone? And most importantly, how can you determine if these

23
Chapter 2

devices will allow you to browse the Internet on the PDA using the phone as
a wireless modem?
That's why the Bluetooth SIG defined profiles. ABluetooth profile is
a designed set of functionality for Bluetooth devices. For instance, using the
examples just listed, the phone and the PDA must both support the Synchro-
nization Profile in order to synchronize data between themselves. In order to
send object data like a v. cf file from the PDA to the phone, both devices need to
have the Object Push Profile implemented. And finally, the PDA and the wireless
phone must both support the Dial-Up Networking Profile in order for the PDA to
wirelessly browse the Internet from the phone. If you want your Bluetooth-
enabled devices to interact, having a Bluetooth stack is not good enough. Those
devices also need to implement the same profile.
Now, here's a list of many of the Bluetooth profiles and a description of what
they do. For most of them, you can basically guess what they do; the names are
not cryptic.

NOTE For an exhaustive list ofall the Bluetooth profiles,


go to the Bluetooth Member site athttp://'vMW . bluetooth. org.

Generic Access Profile


The Generic Access Profile is the most common Bluetooth profile. All other
profiles use this profile for basic connection establishment. This is the
java .lang . Object in the Bluetooth Profile realm; every profile needs to use
the functionality of the GAP.

Service Discovery Application Profile


The Service Discovery Application Profile is a profile that directly interacts with
the Service Discovery Protocol (SOP) layer in the Bluetooth protocol stack. This
profile is used to find services on Bluetooth-enabled devices in the area.

24
Bluetooth 1.1

Serial Port Profile


The Serial Port Profile is a profile that interacts directly with the RFCOMM layer
in the Bluetooth protocol stack. This profile is used to create a virtual serial port
on your Bluetooth-enabled device. For instance, some Bluetooth kits come with
a driver that will allow your operating system to communicate over the virtual
serial port as if it were an actual serial port. As far as the operating system is con-
cerned, it's just another serial port, as shown in Figure 2-8.

g (omputer Management !.

Action :!lew r!J IE @


Tree I ~~~~==~==============~
I±. Floppy disk controllers
~ - Floppy disk drives
II!
Computer Management (local)
I±. Human Interface Devices
8 System Tools
lP IDE ATAl ATAPI controllers
+ !liID Event Viewer
lP ~ Keyboards
I±! ~ System Information
!±J ~ Mice and other pointing devices

S"
ttl ~ Performance Logs and Alerts
8 ~Modems
ttl ~ shared Folders
4jl3Com Bluetooth DUN Client

ttl ~ Local use~s ~~d Groups 3Com Bluetooth Fax Client


" 3Com Bluetooth LAN Client
8 Storage
" Xircom MPCI Modem 56
LJ Disk Management '+' ~ Monitors
Disk Defragmenter
I.+l Network adapters
logical Drives
+ PCMClA adapters
I±i 'ij Removable Storage
- .y Ports (COM StLPT)
ttl Services and Applications
.y3Com Bluetooth DUN Client (COMI 2)
y 3Com Bluetooth Fax Client (COM 13)
)/3com Bluetooth LAN Client (COM14)
;;J 3Com Bluetooth Serial Client (COM 10)
)l3Com Bluetooth Serial Host (COMI I )
J/ECP Printer Port (LPTl)

-,
I±J -t Sound, video and game controDers
[±; _ System devices

Figure 2-8. As you can see in Windows 2000, the operating system thinks that
COMM10 and COMMll are actual serial ports!

Of course, ifyou want to connect to another device

t:f(
NOTE
over the air using your virtual serial port, then you'll need
another Bluetooth-enabled device in the area that also sup-
'- -
ports the Serial Port Profile.

25
Chapter 2

Dial-Up Networking Profile


If you've used a modem before, then you should be familiar with the concept of
dial-up networking. The Dial-Up Networking Profile allows you to mimic the
functionality of a modem. Just like the Serial Port Profile, some Bluetooth kits
come with a driver that will allow your operating system to communicate over
the virtual modem as if it were an actual modem (see Figure 2-8). As far as the
operating system is concerned, it's just another modem.

NOTE For such an example to work, you'll need another


Bluetooth-enabled device in the area that also supports the
Dial- Up Networking Profile, like a network access point or
a wireless phone.

FAX Profile
Using the FAX Profile, a Bluetooth-enabled computer can send a fax wirelessly to
a Bluetooth-enabled fax machine or to a Bluetooth-enabled wireless phone.

Headset Profile
The Headset Profile is primarily designed for connecting Bluetooth-enabled
headsets to Bluetooth-enabled wireless phones.

LAN Access Profile


A Bluetooth-enabled device such as a PC or laptop will use the LAN Access Profile
to connect to a network access point connected to aLAN.

Personal Area Networking Profile


The Personal Area Networking Profile is pretty much similar to the LAN Access
Profile, except it also has support for devices to form ad-hoc networks among
themselves. The PAN Profile also has a requirement that BNEP be present in the
underlying protocol stack.

26
Bluetooth 1.1

Cordless Telephony Profile


The Cordless Telephony Profile allows you to use a Bluetooth-enabled handset to
connect to a Bluetooth-enabled "landline" phone to place calls. For instance,
through this profile, you continue to receive calls to your home phone, but
you have the convenience of answering that call on your Bluetooth wireless
phone, without using the minutes of the calling plan of your wireless phone.

Intercom Profile
If two Bluetooth-enabled devices are within range, and they support the
Intercom Profile, then they can function just like regular intercoms.

Generic Object Exchange Profile


The Generic Object Exchange Profile is the generic profile that all profiles use if
they want to employ the functionality of the OBEX protocol in the Bluetooth
stack.

Object Push Profile


The Object Push Profile provides the functionality for a device to push and pull
an object. Using this profile, though, you are limited to a certain class of objects
like vCards.

File Transfer Profile


The File Transfer Profile is a more robust profile for transferring objects. You can
use the File Transfer Profile to transfer files and folders from one Bluetooth-
enabled device to another.

Synchronization Profile
You use the Synchronization Profile to synchronize data between two Bluetooth-
enabled devices. The most common applications for this profile would be to
synchronize data between a PDA and a PC.

27
Discovering Diverse Content Through
Random Scribd Documents
fish-hook is worthless, the fish holoholona a ka lawaia.” O ko
will not bite it; it will weary one’s Aiai manao ma keia olelo i ka
body for nothing.” The wife then wahine, i loaa ka pa o Kahuoi, a
asked him: “Where can I get kona makuakane, i aihue ia ai e
another pearl fish-hook then?” Kipapalaulu.
Aiai replied: “You go to your
father and tell him there is a
pearl fish-hook that will enrich
the fishermen. It is in the
fishermen’s calabash of fishing
utensils.” By this the husband
wished to get possession of the
pearl fish-hook Kahuoi which had
been stolen from his father by
Kipapalaulu.

Upon coming to her father she A hiki ke kaikamahine i mua o


asked for another pearl fish- Kipapalaulu, nonoi aku i pa e
hook. Kipapalaulu refused, haawi hou mai, hoole mai o
saying: “There is none left to Kipapalaulu: “Aohe pa i koe; o ka
give; that was the last pearl fish- pau ae la no ia o na pa.” I aku o
hook I had which I gave you.” Kauaelemimo: “Ka! Olelo mai nei
Kauaelemimo said: “Aiai told me, o Aiai, he pa no, aia ka iloko o ka
you had another one; it is in the ipu holoholona a ka lawaia.” “Ae,
fishermen’s calabash of fishing he pa io, akahi au a manao.”
utensils.” “Yes, certainly there is Kiina aku la a lawe ia mai la, i
one. I now remember it for the nana iho ka hana, he pa. Lawe
first time.” The calabash was aku la ka wahine a mua o Aiai,
then brought to the king and lalau mai la o Aiai a olelo iho la:
when he looked in it he found “Ola na iwi ua hoi mai nei oe.”
the hook which he gave to his [559]
daughter. The wife then returned
with it to her husband. Aiai took
it and said: “My days of poverty 8 I aku o Aiai i ka wahine: “E hoi
are now [558]over since you have hou oe i waa no’u; aole ka waa
come back.” Aiai then said to his elima anana ka loa, a e walu, o
wife: “Go back again to your ka waa he umi anana ka loa. Oia
father and ask him for a canoe; ka waa au e olelo aku ai i ko
not one of five or eight fathoms makuakane.” A hiki ka wahine
in length, but get one that is ten imua o Kipapalaulu, nonoi aku la
fathoms in length; that is the i waa, a hiki i ka waa umi anana
size of the canoe that I want ka loa. Olelo mai ka makuakane:
from your father.” When “Nawai e hoe e hiki ai keia waa?”
Kauaelemimo arrived in the “Na kuu kane no.” A lohe o Aiai i
presence of her father, she asked ka olelo a kana wahine kii aku la
for the canoe described by her ia a lawe mai la i ka waa, holo
husband. When the canoe ten aku la ia me ka manu, o
fathoms in length was brought Kamanuwai, a me ka pa o
the father asked the daughter: Kahuoi, a waho o Mamala, wehe
“Who will be able to paddle this ka pa a lawaia, na ke aku no i pii
canoe?” “My husband will.” a komo ka waa, ai iho la ka
When Aiai heard the answer manu a ola ae la. Hoi mai la o
made by his wife, he took the Aiai, ua piha na waa i ke aku, a
canoe and set out with the bird, hiki i mua o ka wahine, haawi
Kamanuwai, taking the pearl aku la i ka ia, o ua pa nei lilo aku
fish-hook, Kahuoi, along. When la ia Kamanuwai ke kiai. Pela ke
he arrived off of Mamala he took kaao no Aiai. [558]
out the hook and began fishing.
The aku began to come and
jump into the canoe of their own
accord until it was loaded down
deep. The bird then eat some of
the fish and was again restored
to its former self. When Aiai
came home his double canoe
was loaded down deep with aku.
Upon arriving in the presence of
his wife he gave her all the fish,
but the pearl fish-hook was
taken by the bird, Kamanuwai,
its guardian. This is the legend
of Aiai. [555]

1 That section of Nuuanu Valley in the


neighborhood of Wyllie Street. ↑
2 Its great value lay in the fact that it
was specially attractive to the fish
desired, the aku. ↑
3 That section of Honolulu above
Beretania Street, from Nuuanu to
the stream, as it used to run. ↑
4 Mamala, Honolulu harbor entrance.
Kou was the harbor itself. ↑
5 Kuula was deified upon his death at
the cruel hands of Hua of Maui,
according to tradition, that he became
the god of fishermen to whom the koas
around Oahu, Maui, and other islands
are dedicated, and though these
outward evidences of idolatrous
practice have passed away, the inward
feeling of recognition of this god’s claim
on their effort is still stronger among
the old fishermen than they are willing
to admit. ↑
6 Kaumakapili, roosting with closed
eyes. ↑
7 Kapuukolo, from about the site of
the present King Street market to
River Street and the stream. ↑
8 Another interpretation of the ola na
iwi expression. ↑
[Contents]
Legend of Pupualenalena. Kaao no Pupualenalena.

Pupualenalena was a dog that He ilio o Pupualenalena, o Puako


once lived in Puako, Hawaii, with i Hawaii ka aina. Noho iho la ua
its own master. After a while his ilio nei me kona kahu ponoi, a
master was kidnapped by lilo aku kona kahu ponoi ia
Kanikaa, a spirit, so the dog Kanikaa, he ’kua ia, noho iho la
went and lived with another ia me kona kahu hanai. He mea
master. It was the usual thing for mau i ke kahu ka holo e lawaia,
the new master to go out a o ua ilio nei mahope o ke
fishing, so he took the dog with kahu; loaa no ka ia pau no i ka
him, making it sit behind him in ilio, pela aku no, a no ia pau o
the canoe. Every time a fish was ka ia i ka ilio, olelo iho la ke
caught the dog would eat it up, kahu: “U, ua pono no hoi kau ai
and as the dog kept on doing ana i ka ia, i na hoi e loaa ana
this for some time, the master ka’u puni ia oe o ka awa, alaila,
said: “Yes, I have no objections pono no hoi kau ai ana i ka ia.”
to your eating the fish, if you
can only supply me with my
favorite drink, the awa, then it
would be all right for you to eat
the fish.”

While the master was saying Ma keia olelo a ke kahu, ua lohe


this, the dog Pupualenalena ua ilio nei o Pupualenalena. I ka
understood him. In the evening wa ahiahi, nalowale ua ilio nei o
the dog disappeared. This Pupualenalena. O keia nalo ana,
absence was because it went to ua hele i ka aihue awa i lalo o
steal awa down in the valley of Waipio. O Hakau ke ’lii e noho
Waipio. At this time Hakau the ana i Waipio ia wa, nana ua mala
king was living at Waipio. He awa nei i ka pali o Puaahuku
owned a large field of awa, just olalo iho. I laila ka awa a
at the foot of the Puaahuku cliff. Pupualenalena i kii ai e uhuki, a
This was the field where kokoke e ao, halulu ana ua ilio
Pupualenalena came and got nei me ka awa, lalau aku la ke
awa. At daybreak he would kahu a mama iho la i ka awa, a
reach home with his awa, when inu iho la. Inu mau aku la ke
his master would take it, cut it kahu i ka awa, a nui na la i hala,
up and prepare some and drink kii mau no hoi ka ilio i ka awa a
it. The master after this had all kokoke e pau ka mala awa a
the awa he wanted and the dog Hakau, hoohuoi o Hakau i ka
kept him supplied for many days. pau o ka awa, a hoonoho aku la
The dog, however, went to the i mau kanaka kiai. Ia lakou e kiai
place so often that after a while ana, hiki ana ua ilio nei, a
very little of the field was left; so kokoke i ka mala awa, huhuki
Hakau began to be suspicious ana i ka awa, ia wa, maopopo ia
and therefore set guards over lakou he ilio ka mea nana e
the field. While the guards were huhuki nei ka awa a ke ’lii. A ahu
watching one night, the dog ka awa a ua ilio nei, hoi aku la,
came to the field and began hahai aku la lakou mahope o ua
pulling up the awa; when he had ilio nei.
a sufficient amount for a load it
took up the load and returned Ua oi aku ka mama o ka ilio i
home. The guards then were mua o ka poe nana e hahai ana,
sure that a dog was pulling the nolaila, haalele kekahi poe
king’s awa, so they followed it. kanaka i ka hahai ana i ua ilio
The dog being much faster than nei a hoi aku la. Hookahi kanaka
the guards it got away; but one i hahai loa ia Pupualenalena a
fellow who was a good runner hiki i kai o Puako. Nana aku la ia
kept up the chase until i ke kahu o ua ilio nei, ua hele a
Pupualenalena was finally mahuna i ka awa, ninau aku la:
tracked to Puako. When the “Ea, nau no keia ilio?” Ae mai la
guard saw the dog’s master he kela: “Ae.” I aku ua kanaka nei:
was covered with scales from the “Ua hewa olua i ke ’lii ia Hakau,
constant use of awa. The guard oia ka awa a ko ilio e kii nei,
then approached him and asked: [561]o ka awa a ke ’lii.” Lalau aku
“Say, is this your dog?” The la ua kanaka nei i ka ilio a me ke
master replied: “Yes.” The guard kahu, a lawe aku la i mua o
then said: “You two have sinned Hakau malalo o Waipio.
[560]against the king, Hakau.
Your dog has been stealing the A hiki laua nei i mua o Hakau,
awa which belongs to the king.” ninau mai o Hakau: “Nau no keia
The guard then took the man ilio?” “Ae, na’u no,” pela ke kahu.
and his dog and brought them to Wahi a Hakau: “A nau no e inu
Hakau in the valley of Waipio. nei kuu awa?” “Ae, na’u no, e
When they arrived in the kuhi ana au eia ma kahi kokoke
presence of Hakau, Hakau keia awa, aole ka: Eia ka i
asked: “Is this your dog?” “Yes, Waipio nei.” I aku o Hakau: “Ae,
it is mine,” answered the man. e make ana olua ia’u no ka pau
Hakau asked: “Have you been ana o kuu awa ia olua.”
drinking my awa then?” “Yes, I
have been drinking it. I thought
that the awa came from some
place nearer home. But I am
mistaken, and that he has been
getting it from Waipio, here.”
Hakau replied: “Yes, I am going
to kill both of you for taking my
awa.”

During this time, in the reign of Aia iloko o ia wa e noho alii ana
Hakau, there was a large shell o Hakau, he pu na ke ’kua, o
used as a trumpet, called Kuana, Kuana ka inoa o ia pu, iluna aku
that was owned by the spirits o Waipio, e kani mau ana ua pu
which lived above Waipio. This nei i na po a pau loa, nolaila,
shell was blown every night and uluhua o Hakau. Nolaila, olelo
the sound from it made Hakau aku o Hakau i ke kahu o
angry. So he said to the master Pupualenalena: “Aia ke ola o
of Pupualenalena: “I will, olua me ko ilio a loaa ka pu a ke
however, save you and your dog ’kua.” Ia Hakau e olelo nei, ke
if you will get me the shell lohe nei o Pupualenalena. A
owned by the spirits.” While ahiahi, kani ka pu a ke ’kua; a
Hakau was speaking, aumoe, moe ke ’lii o ke ’kua, ala
Pupualenalena heard and na kiai, a mahope pauhia i ka
understood the king’s wish. That hiamoe. Komo ana o
night the shell was again blown Pupualenalena iloko, ae aku la
by the spirits. At midnight the maluna o na kiai, nana aku la e
king of the spirits retired leaving kau ana ua pu nei maluna o ke
the guards to keep watch; but ’lii wahi, ae aku la no keia
later on they also fell asleep. maluna o ke ’lii a loaa ka pu,
Pupualenalena then stole in and komo aku la ke poo o ua ilio nei
jumped over the sleeping maloko o ke kaula kakai o ka pu,
guards. Seeing the shell hanging e paa ai, a holo mai la.
over the king, it jumped over
him, took the shell, stuck his Ma keia holo ana, ua puka i
head in through the loop of the waho o ka hale, pa kekahi aoao
string by which it was hung up o ka pu i ka pohaku, niho mole,
and ran off with it. While in its ala ke ’kua a alualu ia ia nei, aole
flight and just as he was out of i loaa mai. Hiki keia i mua o
the house one side of the shell Hakau me ka pu, olioli o Hakau i
struck a rock and a piece of the ka loaa ana o ka pu, nolaila,
shell was broken off. Upon hoonoho o Hakau i ke kahu a me
hearing the crack of the shell the ka ilio i ka aina, a lilo ae la i
spirits woke up and gave chase, punahele na Hakau. [560]
but they were unable to catch
the dog.

When the dog arrived in the


presence of Hakau with the
shell, he was so happy that he
thereupon placed the master
and his dog on a piece of land
near by, and they became great
favorites with Hakau. [559]
[Contents]
Legend of Kaulanapokii. Kaao no Kaulanapokii.

Kaumalumalu was the father and O Holualoa i Kona, Hawaii, ka


Lanihau was the mother who aina. O Kaumalumalu ka
once lived in Holualoa, Kona, makuakane, o Lanihau ka
Hawaii, residing there as king makuahine, he mau alii laua no
and queen at that time. Mumu Kona ia wa. O Mumu ka mua, o
was their first-born, then came Wawa, o Ahewahewa, o
Wawa, then Ahewahewa, then Lulukaina, o Kalino, alima kane.
Lulukaina and then Kalino O Mailelaulii, o Mailekaluhea, o
making five sons. Then came Mailepakaha, o Mailehaiwale, o
Mailelaulii, Mailekaluhea, Kaulanapokii, alima wahine.
Mailepakaha, Mailehaiwale and Noho iho la lakou a pau i ke nui,
last came Kaulanapokii making olelo aku o Mailelaulii i kona mau
five daughters. After the children kaikaina: “E hele kakou e
were grown up, Mailelaulii asked makaikai maanei aku nei.” Hele
her younger sisters, saying: “Let mai la lakou a hiki i Huehue e
us go sight seeing 1 hereabouts.” nana ala ia Kohala, nana mai la,
They then started out and went a makemake mai la i ke aiai o ke
as far as Huehue from which one o Kiholo a me Kapalaoa, a
point Kohala can be seen. On hiki lakou i laila, malaila mai a
beholding the white sands of hiki i Kalahuipuaa, e noho ana o
Kiholo and Kapalaoa they were Puako.
enticed to go on. When they
arrived at Kapalaoa they thought
they would keep on to
Kalahuipuaa. Upon arriving at
Kalahuipuaa they met Puako.
Puako was a very handsome He kanaka maikai o Puako, he
man whose form was perfect. ui, aohe puu, aohe kee, lawe ae
When he saw Mailelaulii he took la ia ia Mailelaulii i wahine, a
her to be his wife and that night moe iho la lakou ia po a ao ae
they were covered with the la. Nana aku la lakou ia Puako, e
same kapa. Very early the next hele ana i kuapa i ka halihali kai
morning the girls looked and saw loko o na poho paakai, a
Puako carrying sea water and hoowahawaha iho la ia Puako.
filling pools for salt making. Olelo aku na kaikaina, ia
Upon seeing this the sisters got Mailelaulii: “Ea, ina o kau kane
disgusted and said to Mailelaulii: kela, luhi kakou i ka hoohaha
“Say, if that is going to be your paakai, i ka lawe i ke kai, hele
husband we will all be made wale iho no ke kino a kuanoni.”
weary carrying [562]sea water for [563]
salt making and our skins will
look like the windward bark of a Olelo aku la o Mailelaulii ia
noni tree.” Mailelaulii then said to Puako: “E hele ana makou e
Puako: “My sisters are urging me makaikai, ke koi nei lakou nei
to continue on our way sight ia’u e hele makou.” Ae mai la o
seeing.” Puako consented to this, Puako, nolaila, hele lakou nei ma
so the girls departed on their Kohala nei. A hiki lakou i Kohala
way to Kohala. When they a noho ma Kokoiki, e noho ana o
arrived at Kokoiki, in Kohala, Hikapoloa he ’lii no Puuepa a me
they met Hikapoloa, the chief of Hukiaa, aohe wahine ana,
Puuepa and Hukiaa; as he was a nolaila, lawe ae la o Hikapoloa ia
single man he took Mailelaulii to Mailelaulii i wahine, a noho iho la
be his wife: so the sisters took lakou ia Kohala.
up their residence in Kohala.

Shortly after this some of the A liuliu iho, holo kekahi poe o
Kohala people sailed for Kekaha Kohala i ke kalepa ia i ke kaha, a
and from there continued on to hala loa i Kona a Holualoa, kahi
Holualoa, Kona, for the purpose o Mumu ma. O ka Mumu ma
of trade, where they met Mumu hana me na kaikaina o ka
and his brothers. Mumu and his lawaia, o ke aku ka ia a me na ia
brothers were fishermen and e ae, a na lakou ua pa ai nei i ke
caught aku and all other kinds of aku. No laila ka ia a ka poe
fish. They had in their kalepa o Kohala i holo aku ai.
possession some very rare pearl
fish-hooks, which supplied them
with all the aku they wanted.
The Kohala traders got their fish
from Mumu and his brothers.

On returning to Kohala the Hoi mai la lakou a Puuepa, lawe


traders upon arriving at Puuepa mai la i kekahi mau ia na
took some of the fish to Hikapoloa a me na wahine.
Hikapoloa, his wife and sisters. Ninau aku la lakou: “Nohea ka
When the fish was given to them oukou ia?” “No Holualoa.” “Na
the sisters asked: “Where did wai la o Holualoa?” “Na Mumu
you get your fish from?” “From ma.” I aku lakou ia Hikapoloa: “O
Holualoa.” “From whom at ko makou mau kaikunane ia,
Holualoa?” “From Mumu and his elima ko lakou nui, he poe
brothers.” The sisters then said lawaia wale no.” Olelo mai o
to Hikapoloa: “They are our Hikapoloa: “Pehea, loaa no ia’u
brothers. There are five of them ka pa ke kii?” “Ae, aole e aua ia
and all fishermen.” Hikapoloa oe, ke olelo aku oe he kaikoeke
then asked: “Do you think I will oe no lakou, a ke hai aku oe o
be able to get a pearl fish-hook Mailelaulii kau wahine.”
if I should go for one?” “Yes,
they will not refuse you one if
you tell them that you are their
brother-in-law and if you tell
them that Mailelaulii is your
wife.”
Soon after this Hikapoloa set sail Holo aku la o Hikapoloa a pae
for Kona and landed at Holualoa. ma Holualoa, i ka lawaia na
Upon his arrival his brothers-in- kaikoeke a hoi mai la, e noho
law were out fishing so he ana keia i ka hale. Hai aku la o
awaited for their return. Upon Hikapoloa i na kaikoeke, e like
being told that he was their me ka olelo a na kaikuahine.
brother-in-law, they asked him: Ninau mai la na kaikoeke:
“What is the object of your “Heaha kau huakai?” “He pa hi
visit?” “I have come for a pearl aku, o ia ko’u mea i hiki mai nei,
fish-hook for aku fishing. That is aohe mea e ae.” “Ae, he pa, eia
the only thing that has brought no me ka makoi a me ke aho.”
me here, nothing else.” “Yes, you Hooili mai la lakou i ke aku a na
shall have a pearl fish-hook. waa o Hikapoloa, a me ke aku
Here it is, with the rod and line.” maloo.
When Hikapoloa came home his
canoes were loaded down with
dry aku as well as with fresh
aku.

After Hikapoloa had been home Hai mai la o Hikapoloa a hiki i


for some time he gave orders Kohala, noho iho la a liuliu,
that the canoes be made ready hoolale aku la i na waa a me na
to go out fishing for aku. When kaohi. Holo aku la lakou i ka hi
the canoes were ready they aku, a kahi o ke aku, lalau iho la
started out and upon coming to o Hikapoloa, i ka pa a paa ae la i
the aku grounds he took up the ka lima, e manao ana ia e lele
fish-hook and held it in his hand, mai ke aku mai ke kai mai a
thinking that the aku would jump komo i ka waa. Pela ka hana ana
into the canoe of their own a po ka la, pau na hoewaa i ka
accord. He held the hook this opili, aohe loaa o ke aku; nolaila,
way all day until the paddlers lilo keia loaa ole o ke aku i hala e
were stiff with cold, but no aku make ai na kaikoeke. Pae aku la
was caught. Upon failing to get lakou a uka, noho iho la me ka
any aku he took it as sufficient olelo ole i na wahine, ua holo ia
cause for the death of his lakou e make na kaikoeke.
brothers-in-law. When they
arrived home, Hikapoloa did not Olelo aku la o Hikapoloa i ke kiai
tell his wife of his plans to kill his o Kukuipahu, oia ke awa e pae ai
brothers-in-law; but he told the ko Kona waa ke holo mai: “E! I
watchman 2 at Kukuipahu, the hiki mai o’u kaikoeke mai Kona
place where the canoes from mai, mai hanai oe i ka ai, olelo
Kona generally make their aku oe aia i uka ka ai ia
landing, saying: “In case my Hikapoloa.” Hoomakaukau iho la
brothers-in-law from Kona o Hikapoloa, i ka wahie a me ka
should arrive, don’t give them umu, a hoonoho iho la i kiai no
any food; tell them they can get ka puka o ka hale, me kona
their food up at Hikapoloa’s makaukau i ke koi, ina e komo
place.” Hikapoloa then prepared ke poo maloko o ka hale, alaila
firewood and the umu, 3 and ooki i ke koi.
then selected a guard for the
door who was already armed
with a stone axe and instructed
him that when any head should
enter the door to cut it off.

Not very long after this a A hiki i ka wa wi o Kona, aohe ai,


prolonged drought visited Kona a hookahi aina ai o Kohala, olelo
and food became very scarce. aku o Kalino i na kaikuaana: “E
After a while there was no food holo kakou i Kohala i ai na
to be had in the district; Kohala kakou.” Ae na kaikuaana, holo
was the only [564]place that had mai [565]la lakou me ka hi aku a
food, so Kalino said to his older komo na waa hiki i Kukuipahu
brothers: “Let us sail to Kohala ma Kohala. A pae lakou i
and get us some food.” The Kukuipahu, ua pololi, ua hele a
brothers consented to this; so maka poniuniu i ka make a ka ai,
they made ready and while on hoona aku la lakou nei a ka hale
their way they fished for aku. o ke kiai, olelo mai ke kiai: “E! I
When they arrived at Kukuipahu, olelo mai ke kaikoeke o oukou e
in Kohala, their canoe was pii oukou ke pae mai, aia no ka
loaded down deep with aku. As ai iaia.” I aku na kaikaina ia
they came ashore they were all Mumu: “E pii oe, a hiki, lawe mai
faint with hunger from want of oe i wahi ai na makou, a maona
food; so they went to the house ia pii aku, mai lohi oe.” Hopu iho
of the watchman expecting to la o Mumu he aku, pii aku la a
obtain some food. When they hiki i Puuiki, he ahua puu ia e
arrived at the house the nana ana ia kai o Kukuipahu, a e
watchman said: “Your brother-in- nana ana i na hale o Hikapoloa.
law has left word that you go Hai aku ke kiai ia Hikapoloa. “E,
right on up as he has the food he kanaka hoi keia eia la, ke
for you.” The younger brothers holo mai nei he ia ko ka lima.”
then said to Mumu: “You go on Nana aku la o Hikapoloa a ike,
up and when you get there bring olelo aku la: “O Mumu, o ke
us some food. After we have kaikunane o Mailelaulii ma.”
some food we will also go up.
Don’t be long.” Mumu then took A hiki mai la o Mumu i waho o
up an aku and started on his ka pa o ka hale, ninau mai la i ke
way to Puuiki, a hill looking kiai: “Auhea na ’lii wahine?” I
down on Kukuipahu and from aku ke kiai: “Mahope ia, e komo
which point the houses of e ai a maona, alaila i ka
Hikapoloa could be seen. As he makamaka.” Ma keia olelo a ke
reached the top of the hill, the kiai, komo aku la o Mumu i loko
watchman called out to o ka pa o ka hale, a hiki i ka
Hikapoloa: “Say, I see a man, he hale, kahea mai ke kiai o loko:
comes running with a fish in his “Komo mai.” Komo aku la o
hand.” Hikapoloa looked and saw Mumu, o ke poo kai komo, ooki
it was Mumu, so he said: “It is iho la keia kanaka i ke koi, lele
the brother of Mailelaulii.” When ke poo mai ke kino aku, a kahi e
Mumu arrived outside of the waiho. Ninau mai ke poo o
enclosure surrounding the Mumu:
house, he asked of the
watchman: “Where are the
chiefesses?” The watchman said:
“That is afterwards; enter the
house and have some food first,
then you may see your
relations.” On thus being invited,
Mumu entered the enclosure and
went up to the house. The inner
guard then called out: “Come
in.” At this Mumu entered, head
first, when down came the axe
and the head was cut off from
the body. The head rolled off to
some distance and then asked:

Inquire and ask E ui aku, e ninau,


For the fault why the man was I ka hala i make ai ke kanaka;
killed; Heaha ka hala o kanaka i make
What is the fault that a man ai?
should be killed?

Hikapoloa answered: “There is a I aku o Hikapoloa: “He hala. O


fault. The pearl fish-hook that ka pa ai ole, haawi ia mai, o ka
was worthless was given to me pa ai, aua ia aku. Oia ka hala.”
and the pearl fish-hook that the Pane hou mai ke poo o Mumu ia
aku is fond of was kept back. Hikapoloa:
That is the fault.” The head of
Mumu again inquired of
Hikapoloa:

Is that all the fault, why a man O ka hala wale iho la no ia, e
should be killed? make ai kanaka?
The umu by this time was hot Ua makaukau ka umu, ua
and ready; the body was then enaena; ia wa, kalua ia ke kino o
put into the umu. After it was Mumu i ka umu, a moa, olelo o
cooked Hikapoloa said: “The Hikapoloa: “O ka mea ikaika i ka
person who will eat the biggest ai ana, e lilo ke ahupuaa nui iaia.
amount 4 shall be presented with A pau ka ai ana, kiola ia aku la
the largest ahupuaa.” After the na iwi i ka puainako. Kakali mai
body was eaten the bones were la na kaikaina o ka hoi aku, a
thrown onto a pile of sugar-cane liuliu, pii o Ahewahewa, pela no
trash. The younger brothers in ka hana a hiki ia Kalino. Lalau
the meantime awaited for the iho la o Kalino i ke aku, pii mai la
return of their brother. After a hiki i Puuiki, hai aku la ke kiai
some time had lapsed ia Hikapoloa: “E, he kanaka wiwi
Ahewahewa went up and he also ae hoi keia e pii mai nei.” I aku o
was killed. The next one Hikapoloa: “O Kalino keia
followed and so on down to kanaka, ua kunihi mai la ka pii
Kalino. When it came to Kalino’s ana; he kanaka nui keia, o ka
turn, he took up an aku and pau keia o na kane. O ka muli
started off. When he got to loa keia o Mumu ma.” A hiki o
Puuiki, he was seen, and the Kalino, me ke aku i ka lima,
watchman called out to ninau aku la i na kiai: “Auhea na
Hikapoloa: “Say, there is a thin ’lii wahine?” “Mahope ia, e komo
man coming up.” Hikapoloa e ai a maona, alaila hele aku e
answered: “It must be Kalino; he ike.” Komo aku la o Kalino, ooki
must be coming up sideways for iho la ke koi, moku ke poo. Olelo
he is a large man. He is the last mai ke poo o Kalino:
one, the youngest of the
brothers.” When Kalino arrived
with the aku in his hand, he
asked the watchman: “Where
are the chiefesses?” “You can
see them later on, enter first and
help yourself to some food, then
afterwards go and see them.”
Kalino then entered the house,
when down came the axe and
his head was cut off. The head
of Kalino then asked:

Inquire and ask E ui aku, e ninau


For the fault why the man was I ka hala i make ai ke kanaka;
killed; Heaha ka hala o kanaka i make
What is the fault that a man ai?
should be killed? [567]
[566]

Hikapoloa answered: “There is a I aku o Hikapoloa: “He hala. O


fault. The pearl fish-hook that ka pa ai ole, haawi ia mai, o ka
was worthless was given to me pa ai, aua ia aku, oia ka hala i
and the pearl fish-hook that the make ai.” Olelo mai ke poo o
aku is fond of was kept back. Kalino:
That is the fault why he should
be killed.” The head of Kalino
then answered:

Is that all the fault why a man O ka hala wale iho la no ia e


should be killed? make ai kanaka?

Kalino’s body was then cooked in Kalua ia o Kalino a moa i ka


the umu and was then eaten up; umu, ai ia iho la, a koe ka iwi
and the bones were thrown in a kiola ia i waho o ke opu ahuawa.
heap of ahuawa. 5

There were five brothers, Elima lakou nei, elima umu,


requiring five umus and five elima wahie, eia na wahie.
different kinds of firewood:

Mumu, the man, the wood was O Mumu, ke kanaka, he opiko


opiko. 6 kona wahie;
Wawa, the man, the wood was O Wawa, ke kanaka, he aaka
aaka. 7 kona wahie,
Ahewahewa, the man, the wood O Ahewahewa, ke kanaka, he
was mamane. 8 mamane kona wahie.
Lulukaina, the man, the wood O Lulukaina, ke kanaka, he pua
was pua. 9 kona wahie.
Kalino, the man, the wood was O Kalino, ke kanaka, he alani
alani. 10 kona wahie.

They were all killed without the Ua make lakou me ka ike ole o
knowledge of their sisters, as na kaikuahine, no ka mea, e
they were at this time haku inoa ana na kaikuahine no
composing a mele or chant for ke keiki a Hikapoloa me
the child of Hikapoloa and Mailelaulii e hapai ana. Ua paa
Mailelaulii which was as yet lakou ma kekahi hale e aku, me
unborn. They were closed up in ka hele ole i waho o ka hale, no
another house, never once ka mea, he kapu ka inoa, aole e
coming out; as people while holoholo i waho, a i loko o ka
composing a name chant were hale. O Kaulanapokii, ko lakou
restricted 11 and not allowed to muli loa, ua ike ia i na uhane o
go in and out of the house. But na kaikunane i ke ku aku, aohe
Kaulanapokii, the youngest of poo, elima kino, aole na poo,
the sisters, saw the spirits of nolaila uwe ia a holoholo i loko o
their brothers standing without ka hale.
heads; five bodies headless,
whereupon she wept and walked
back and forth within the house.
Kaulanapokii was a woman who
had supernatural powers and
could see certain things. This
power is even now possessed by
the doctors who give medicines
in her name.

When Mailelaulii saw E olelo iki kakou no


Kaulanapokii weeping, she Kaulanapokii. He wahine mana o
inquired saying: “Why are you Kaulanapokii, he ike; o ia mana a
walking back and forth? We are hiki i keia la, a ke lilo nei oia i
composing a chant, but you are kumu lapaau, a haha paaoao.
walking back and forth.” Ninau mai o Mailelaulii: “Heaha
Kaulanapokii replied: “Our kou mea e holoholo nei, he haku
brothers have all been killed by inoa hoi ka kakou, he holoholo
your husband, for I see all five of kau?” I aku o Kaulanapokii: “O
them standing without heads.” na kaikunane o kakou ua make i
The sisters then all began ko kane, eia la ke ku mai nei
weeping for their brothers, but lakou, a elima aohe poo.” “Uwe
Kaulanapokii stopped them iho la lakou i na kaikunane i ka
saying: “Don’t weep.” make ana.” Papa aku o
Kaulanapokii then told her sister Kaulanapokii: “Mai uwe oukou.” I
Mailelaulii: “Sit down and force aku o Kaulanapokii ia Mailelaulii:
the child to come forth at this “E hookohi mai oe i ko keiki, a
time, so that your husband upon hemo ae i keia wa, i lohe aku ko
hearing the child will come in kane hele mai, o kona wa ia e
here, when he shall be killed.” make ai.” Ma ka mana o
Through the supernatural Kaulanapokii, hemo ke keiki;
powers of Kaulanapokii, the child aole nae i puni, aka, no ka huhu
came forth although the time for o Kaulanapokii keia hemo ana. A
its delivery was not yet come. hemo ke keiki, lalau iho la o
This was caused through the Kaulanapokii ma na wawae a
anger of Kaulanapokii. As the hoolewalewa aku la. Kahea aku
child came forth, Kaulanapokii la ia Hikapoloa, kiina mai ko
took it by the feet and held the keiki. Kii mai la o Hikapoloa a
child up, at the same time calling komo i loko o ka hale. Ia wa
to Hikapoloa: “Come and get kahea o Kaulanapokii i na
your child.” Hikapoloa then came kaikuaana.
into the house. As he entered,
Kaulanapokii called out to her
sisters:

Say, Mailelaulii, Mailekaluhea, E, Mailelaulii, Mailekaluhea,


Mailepakaha, Mailehaiwale, 12 Mailepakaha, Mailehaiwale,
Let the ie and the rivers of water E ke ie! E ka mana wai,
Block up the back, block up the E kahihi kua, e kahihi alo. [569]
front. [568] E ka ohu kolo mai i uka,
Ye fog that creeps there in the E ka ohu kolo mai i kai,
uplands, E kai pupuka, e kai hehena,
Ye fog that creeps there in the E kai pili aiku,
lowlands, E ala e ka ua, e ka makani,
Ye ugly seas, ye raving seas, E ala! E ala.
Ye seas that rise and stand.
Ye rains arise, ye winds arise,
Arise! Arise!!

Whereupon the house was Ia wa ua paa o waho i ka maile, i


completely covered over with the ke ie, i ka ua, i ka makani, i ka
maile vines and the ie vines. The ohu me ka pohina. Paa o
rain beat down in torrents, the Hikapoloa i loko, aole e puka i
wind blew in a gale and the fog waho, ua hihi mai la ke ie, ke
and mist covered the land. This maile. Kahea mai ke kahuna o
prevented Hikapoloa from Kehoni, ka inoa:
getting out, as the ie and maile
had entangled the whole house.
Upon seeing this the priest,
Kehoni by name, who had
entered with Hikapoloa, called
out:

Say, Kaulanapokii, E Kaulanapokii e!


The all-powerful woman from Ka wahine mana o ka la komo
the eastern sun, Ka ulu loaa ole i ka lou ia
The breadfruit that cannot be No’u kekahi ola.
reached with a pole,
Allow me a pathway.

Kaulanapokii consented to this, Ae aku o Kaulanapokii, hookowa


and the maile and ie vines ia ka maile a me ke ie, puka o
separated, permitting Kehoni to Kehoni i waho, a ola ia, make o
walk out and thus saving himself. Hikapoloa, puhi ia ka hale i ke
Hikapoloa died and the house ahi. Hele aku o Kaulanapokii a
was set on fire. Kaulanapokii hiki i kahi o na kaikunane i make
then proceeded to the place ai, kahea aku ma ke mele:
where her brothers had been
killed and called in a chant:

Say, thou smoke of the opiko Ka uwahi opiko o uka e aala mai
send your fragrance from the nei e!
uplands, Ua ike paha oe i kuu kaikunane
Perchance you have seen my o Mumu.
brother Mumu?

“Yes, I have seen him, his bones “Ae, ua ike, aia i ka puainako na
are lying there on the pile of iwi.” Hele aku la keia ohi,
sugar-cane trash.” Kaulanapokii houluulu a kahi hookahi, pela no
then proceeded to the rubbish ka ia nei hana a hiki ia Kalino,
pile and collected the bones oia ka lima:
together. She then called each
brother in turn collecting their
bones together until it was the
turn of her fifth brother, Kalino,
when she called:

Say, thou smoke of the alani, Ka uwahi alani o uka e aala mai
send your fragrance from the nei e!
uplands, O ka wahie paha oe o kuu
Are you not the wood with which kaikunane i moa ai.
my brother was cooked?

“Yes, I am the wood. He was “Ae, owau ka wahie, ua moa, ua


cooked. He has been consumed pau i ka ai ia, o na iwi aia i ke
and the bones are there in the opu ahuawa, kahi i waiho ai.” Kii
ahuawa heap where they now aku la keia houluulu. A akoakoa
lie.” Kaulanapokii proceeded to na kaikunane, olelo aku keia i na
the place indicated and collected kaikuaana: “E hana kakou i na
them. After all the bones had kaikunane o kakou a ola, hoi
been collected, Kaulanapokii said kakou i Kona.” Hana iho la lakou
to her sisters: “Let us work on a ola o Mumu ma, alaila, hoi
our brothers and when they lakou i Kona. Hoohiki lakou aole
come to life again we will return e moe i ko Kohala kane, aole hoi
to Kona.” The sisters then first e moe i ko Kohala wahine, pela
took up Mumu and after he ka paa o ko lakou manao a loaa
came back to life the others ka lakou mau keiki. Pela lakou i
were taken up. After all the haalele ai i ka aina haaheo o
brothers had been restored to Kohala a me ka makani aloha he
life, they all returned to Kona, aeloa. [570]
where they all made oath, that
they would never be covered
over with the same kapa with
any man or woman from Kohala.
This oath was even taken up and
kept by their children after them.
Thus did they forsake the proud
land of Kohala and its favorite
wind, the aeloa. [561]

1 The expression maanei aku nei,


further ahead from here, while not
embodying direction would invariably
be accompanied by a wave or motion
of the hand to indicate the point in
mind. ↑
2 Here appears to have been a system
of coast guards for the execution of
special orders of the king, chief or
konohiki. ↑
3 Umu or imu, the underground oven
of heated stones. ↑
4 This would seem to be a premium
upon the practice of cannibalism, if
such existed. ↑
5 Ahuawa, rushes from which cords
were made; or, it may have been a
heap of awa refuse. ↑
6 Opiko or kopiko, a firewood
(Straussia Kaduana). ↑
7 Aaka, bastard sandal wood
(Myoporum sandwicense). ↑
8 Mamane, a most durable hard wood
(Sophora chrysophylla). ↑
9 Pua, a good firewood in that it will
burn green (Pelea sandwicensis). ↑
10 Alani, the bark and wood of which
held medicinal properties, and its
leaves scent for kapas (Pelea
sandwicensis). ↑
11 The kapu inoa among the alii rank
was not a sacred name in a literal
sense, but is here shown to be the
secrecy to be observed at and following
the composing of a name song or
chant, until the time of its ceremonial
announcement or recital. ↑
12 Names of the four varieties of the
fragrant maile vine (Alyxia
olivæformis). These same four sisters
are prominent characters in the legend
of Laieikawai, but in that story they
claim Kauai as their home. ↑
[Contents]
Legend of Pupuhuluena. Kaao no Pupuhuluena.

It was amongst the steep cliffs O Kalae i na pali hulaana ka


to the east of Kohala, Hawaii, aina, ma Kohala, Hawaii, kahi
that Pupuhuluena once lived. noho o Pupuhuluena. Noho iho
When he first came to the place la ia ma ia aina, aohe ai, he wi,
there was no food growing, no ua nele ke kalo, ka uala, ka uhi,
taro, no potatoes, no yams, nor na mea ai a pau loa. Ua hoi ka
anything else in the shape of ai, a i ke ’kua kahi i huna ia ai,
food. All the food had been ma Kalae i Kau. Noho iho la o
taken and hidden by the gods in Pupuhuluena, a makemake i ka
Kalae, Kau. Once upon a time lawaia, holo aku la ia mawaho ae
Pupuhuluena had a desire to go o Makaukiu e lawa ia ai, iaia e
fishing, so he sailed to a point lawaia ana, mumulu mai la na ia
directly off Makaukiu. While he a pau loa malalo o kona waa, ka
was busy fishing, he saw that all uhu, ka nenue, ka ulua, ke
the different fishes were kahala, ke opakapaka, ka hee,
gathered under his canoe; the ka manini, ka opelu, ke aku, a
uhu, 1 the nenue, 2 ulua, 3 kahala, 4 me na ia a pau loa. Nolaila,
opakapaka, 5 hee, 6 manini, 7 hahai o Pupuhuluena i na ia a
opelu, 8 aku 9 and all the other pau no ka makemake, a hala na
kinds of fishes. When he saw the pali, aole no laila ka ia, a hiki i
fish move away he followed Kohala waho, aole no laila ka ia.
them until the cliffs were passed, A hiki keia i Kawaihae, aohe no
and as the fish kept on going he laila ka ai, a Puako keia hiki i
followed right along; he arrived Maniniowali, alaila noho ka
off Kohala, still the fish kept on: manini, hele hou keia a hiki i ke
he arrived off Kawaihae, still the kaha a Kaelehuluhulu, noho ke
fish kept on: then on to Puako aku, ke opakapaka. Holo hou
and to Maniniowali where the keia a Kona, noho kekahi mau ia,
manini remained behind, but he pela kai nei hahai hele ana a hiki
still followed until he was off i Kapukaulua, i Kalae maanei
Kekaha and from there on to mai, noho ka ulua ilaila.
Kaelehuluhulu; here the aku and
opakapaka remained behind.
Proceeding again until he was off
the Kona coast, here some of the
other fishes remained behind,
but he kept on following the
others until he was off the place
called Kapukaulua, just this side
of Kalae where the ulua
remained behind. At this place
he saw a canoe floating with a
large-mouth net let down on the
coral bed. There were two
fishermen in the canoe, Ieiea
and Poopalu; they were the
fishermen of Makalii.

Pupuhuluena upon seeing the Nana aku la o Pupuhuluena, e


men moved on until he was lana ana keia waa lawaia, he
quite close to them. He then upena waha nui ka upena e kuu
took up a kukui nut, chewed it ana. O ka inoa o keia mau
up and blew the substance upon lawaia, o Ieiea, o Poopalu, he
the surface of the sea 10 which mau lawaia na Makalii. Holo aku
enabled him to clearly see the la o Pupuhuluena a kokoke, lalau
bottom. As he looked down he iho la ia i ke kukui, mama ae la a
saw the fish entering the mouth pupuhi iho la i ke kai, malino
of the net, let down by Ieiea and maikai iho la o lalo. Nana aku la
Poopalu, so he called out: “Say, keia a ike ua komo ka ia i ka
the fish have gone into your upena a Ieiea a me Poopalu,
net.” “You are telling a lie. We kahea aku la: “E! Ua komo ka ia
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

ebookultra.com

You might also like