Full Download Bluetooth For Java 1st Edition Ranjith Antony PDF DOCX
Full Download Bluetooth For Java 1st Edition Ranjith Antony PDF DOCX
https://ebookultra.com/download/bluetooth-for-java-1st-edition-bruce-
hopkins/
ebookultra.com
https://ebookultra.com/download/c-for-java-developers-1st-edition-
allen-jones/
ebookultra.com
IoT Projects with Bluetooth Low Energy 1st Edition Madhur
Bhargava
https://ebookultra.com/download/iot-projects-with-bluetooth-low-
energy-1st-edition-madhur-bhargava/
ebookultra.com
https://ebookultra.com/download/java-for-dummies-4th-edition-barry-
burd/
ebookultra.com
https://ebookultra.com/download/java-ee-7-for-beginners-1st-edition-
sharanam-shah/
ebookultra.com
https://ebookultra.com/download/java-for-dummies-quick-reference-1st-
edition-doug-lowe/
ebookultra.com
Bluetooth For Java 1st Edition Ranjith Antony Digital
Instant Download
Author(s): Ranjith Antony; Bruce Hopkins
ISBN(s): 9781430207634, 1430207639
Edition: 1
File Details: PDF, 22.84 MB
Year: 2008
Language: english
Bluetooth for Java
BRUCE HOPKINS AND RANJITH ANTONY
All rights reserved. No part of this work may be reproduced or transmitted in any form or by any
means, electronic or mechanical, including photocopying, recording, or by any information
storage or retrieval system, without the prior written permission of the copyright owner and the
publisher.
ISBN 978-1-59059-078-2 ISBN 978-1-4302-0763-4 (eBook)
DOI 10.1007/978-1-4302-0763-4
Irademarked names may appear in this book. Rather than use a trademark symbol with every
occurrence of a trademarked name, we use the names only in an editorial fashion and to the
benefit of the trademark owner, with no intention of infringement of the trademark.
Distributed to the book trade in the United States by Springer-Verlag New York, Inc., 175 Fifth
Avenue, New York, NY, 10010 and outside the United States by Springer-Verlag GmbH & Co. KG,
Tiergartenstr. 17,69112 Heidelberg, Germany.
For information on translations, please contact Apress directiy at 2560 9th Street, Suite 219,
Berkeley, CA 94710. Phone 510-549-5930, fax: 510-549-5939, email [email protected], or visit
http://www.apress.com.
The information in this book is distributed on an "as is" basis, without warranty. Although every
precaution has been taken in the preparation of this work, neither the author nor Apress shall
have any liability to any person or entity with respect to any loss or damage caused or alleged to
be caused direcdy or indirectly by the information contained in this work.
The source code for this book is available to readers at http: //www. apress. com in the Downloads
section.
First and foremost, I dedicate this book to the Lord Jesus Christ, without whom
I could not have written this book. I also dedicate this book to my loving wife,
Schrell, and my two wonderful children, Lydia and Bruce Jr.
-Bruce Hopkins
v
Contents at a Glance
vi
Contents
About the Authors ................................................. .xzn
About the Technical Reviewer .................................... .xiv
Acknowledgments .................................................... .xv
Introduction ....................................................... .xvii
vii
Contents
viii
Contents
ix
Contents
x
Contents
Index ..............................................................315
xi
About the Authors
Bruce Hopkins is a 6-year Java veteran with experience in dis-
tributed computing and wireless networking. He has an
electrical and computer engineering degree from Wayne State
University in Detroit and has interest in robotics, microcom-
~~"Ji::::.>L'o4I
puting, and electronics. He has worked in Java since JDK l.Oa,
:::al!:~I~• • and his research studies include distributed computing, clus-
tering, encryption, and pervasive computing. He currently works as an
independent consultant in the Metro Detroit area.
xiii
About the Technical
Reviewer
Andrew Stringer was educated at the Dublin Institute of Technology in computer
science and software engineering, receiving a bachelor of science degree. Andrew
joined Rococo Software in 2001 as a trainer and consultant in the field of wireless
software development. Andrew has great experience in developing and delivering
courses with J2ME and also with Java APIs for Bluetooth Wrreless Technology
(JABWT). Andrew lives in Dublin, Ireland.
xiv
Acknowledgments
I PERSONAUYWANT TO 11IANK all the people who helped me in writing the book that
you're holding. Never in a million years would I have thought that I would be
working with Gary Cornell and John Zukowski, both of whom are very respected
Java authors. I'm very grateful that Gary and John accepted my proposal way
back in January of 2002. For that matter, I want to thank the rest of the team at
Apress including Tracy Brown, Ami Knox, Kari Brooks, and Wanshun Tam. More
honor, however, goes to Tracy. Many thanks to Andrew Stringer from Rococo for
tech reviewing this book; I never knew that I could have been wrong so many
times. It's good to have an expert at your disposal.
Bluetooth equipment isn't cheap, so I also want to acknowledge all the great
companies around the world Oiterally) that gave Ranjith and me hardware loans
and technical assistance. For instance, Jeff Day and the rest of the team at 3Com
(including Ken Morley, Brent Nixon, and Randy Rollins) were very helpful in pro-
viding us with Bluetooth adapters and tech support. Mahendra Tailor from TDK
Systems in the UK was very helpful in providing us with equipment as well.
Rococo was very kind to allow us to have an extended evaluation period in order
to write the chapter on Bluetooth simulation. Thanks to Geraldine, Karl, and the
rest of the team in Ireland. Urn Siong Huat from Mobiwave in Singapore was
very helpful in allowing us to use their protocol analyzer for the security chapter.
Peter Duchemin from Smart Network Devices in Germany was very helpful in
getting me the inside scoop on their Micro BlueTarget. I also want to thank
Niels-Christian Gjerrild from Ericsson in Sweden for hardware and documen-
tation on the Ericsson BlipNet system. North of the border, in Canada, I also
received assistance from Dr. Steven Knudsen regarding the integration of Jini and
Bluetooth.
This is my first book, so I definitely have to thank all the wonderful teachers
at Grant, Cass Tech, and WSU who helped me to get here. You'll never forget
a good teacher, and I've had many in my lifetime. I want to thank personally
Mrs. Smith, Mrs. Parent, Mr. Walker, and Mrs. Cowan from Grant School. At
Cass Tech, I had the pleasure to study under Mr. Miller, Mr. Raymond, and
Mrs. Ashford. Dr. Steve Kahn was a little disappointed that I didn't finish my
degree with the Mathematics Department after I joined the Emerging Scholars
Program, but he deserves to be mentioned. I also want to thank Dr. Chaudhary
for giving me the opportunity to study and research with him in the Parallel and
Distributed Computing Lab at Wayne State. Very few students were eligible to
work in the undergraduate research program, and I'm grateful to Bill Hill for
allowing me to be a part of it.
xv
Acknowledgments
xvi
Introduction
IN THE NEAR FUTIJRE, Bluetooth wireless technology will be embedded into nearly
every consumer electronics device. Devices like mobile phones, PDAs, laptops,
desktops, calculators, watches, k~yboards, mice, printers, scanners, cameras, and
video game consoles are just a sample of what device manufacturers will be
embedding with Bluetooth. Today, Bluetooth chip sets can be purchased (in mass
quantities) for $5, so it's only a matter of time before many of your personal
devices become Bluetooth enabled.
With Java, you get the ability to create applications that are agnostic of their
underlying hardware platform. As you can see, this makes Java the perfect pro-
gramming language for Bluetooth! Regardless of the hardware or OS used for
your PDA, mobile phone, watch, etc., you can use the same programming lan-
guage to create your Bluetooth applications. This book is all about how to create
wireless applications using Java and Bluetooth.
Chapter 2: Bluetooth 1.1: In this chapter, we dive right into the dirty details
of the Bluetooth protocol. Here we define the roles and relationships
between the Bluetooth stack, Bluetooth profiles, and Bluetooth hardware.
If you've seen Bluetooth terminology before, but you don't know the differ-
ence between SDP and SDAP for instance, then this chapter will help clear
things up.
Chapter 4: Understanding the Java Bluetooth API: This chapter covers the
full life cycle of a Bluetooth application (whether you're using Java or not).
This chapter also shows you how to use the javax. bluetooth package of
xvii
Introduction
the official Java Bluetooth API (the JSR-82) in order to create Bluetooth
applications.
Chapter 5: Bluetooth with J2ME MIDP: The first complete example of a Java
Bluetooth application is explained in Chapter 5. Before we present the
code, however, we provide a short review of the J2ME MIDP.
Chapter 6: Creating a Bluetooth Print Server with JPS API: Now with a com-
plete example under your belt, things will start to get pretty exciting. In.
Chapter 6, we introduce you to the Java Printing API and show you how to
create a Bluetooth print server.
Chapter 7: Java and OBEX: Chapter 7 covers the foundation of the OBEX
protocol and provides an example on how to transfer files using the
javax.obex package of the JSR-82.
Chapter 10: Wireless Embedded Systems with the Micro BlueTarget: The pri-
mary focus of Chapter 10 is the Micro BlueTarget by Smart Network
Devices. In this chapter, we explore the possibilities of creating appli-
cations with a fully functional computer that fits in your hand and
includes an implementation of the JSR-82.
Chapter 12: Bluetooth and Jini: In the final chapter of the book, we provide
an overview of Jini network technology and describe how to implement
Jini and Bluetooth together.
xviii
Introduction
Intended Audience
So who are you? This book really has two audiences. If you're a Java developer,
then this book assumes that you're an intermediate Java developer with little or
no experience with Bluetooth. You'll get the most out of this book if you've writ-
ten a few Java classes on your own (especially J2ME applications).
If you're a Bluetooth developer, then this book becomes useful to you after
Chapter 2. If you've never used Java before, then we'd suggest that you read the
first few chapters of a J2ME book before you read this book.
The Code
The source code for this book is available at http://'tMII. apress. com in the
Downloads section. The book's companion Web site,
http://www.javabluetooth.com. also contains the source code, as well as other
useful resources such as a list of recommended Bluetooth hardware for running
the examples.
xix
CHAPTER 1
Introducing Bluetooth
SIMPLY STATED, BuJE'l'OOTII is a
wireless communication protocol. As such, you
would use Bluetooth to communicate to two or more other Bluetooth-capable
devices. In this sense, Bluetooth is like any other communication protocol that
you may use every day like HTTp, FfP, SMTp, or IMAP. Bluetooth is also like these
protocols in that it has a client-server architecture. In Bluetooth, the one who ini-
tiates the connection (the client) is the master, and the one who receives the
connection (the server) is the slave.
The purpose of this chapter is to give you an introduction to Bluetooth. We'll
briefly compare it with competing technologies like Infrared and 802.llb and
explain where Bluetooth fills the gaps that these other technologies leave open.
Next, we'll show you what Bluetooth can do and where it is currently used in
applications today, just in case you're unfamiliar with the capabilities of the tech-
nology. Finally, we'll wrap up this chapter with a few scenarios for how Bluetooth
will be used in the near future.
1
Chapter 1
The goal of wireless LAN (802.11 b) is to connect two relatively large devices
that have lots of power at high speeds. 1YPically, this technology is used to con-
nect two laptops within 300 feet at 11 Mb / s. This technology is also useful for
network administrators who want to extend their LAN to places where it is either
expensive or inconvenient to run cables.
On the other hand, Bluetooth is intended to connect smaller devices like
PDAs and mobile phones within a range of 30 feet at a rate of 1 Mb/ s. Slower data
rates and shorter ranges allow Bluetooth to be a low-power wireless technology.
Compared to 802.11 b devices, some Bluetooth devices can easily consume 500
times less power, which can make a huge difference in the battery life of many
mobile devices.
Bluetooth is also intended to be used as a cable replacement technology. If
you have multiple peripherals connected to your computer using RS-232 or USB,
then Bluetooth is the ideal solution if you want to use those devices wirelessly. It's
almost impossible to connect peripherals to your computer using 802.11b tech-
nology (well, except for printers). Bluetooth even has a built-in capability for
wireless audio communication.
Can either technology replace the other? Hardly. Bluetooth will never replace
802.11 b because it's bad at handling the following:
2
Introducing Bluetooth
We've all been there before. Entering data on a mobile phone is very tedious
because you're dealing with a nine-button keypad to type alphanumeric text. Also,
mobile phones don't have a lot of memory for storage, so you're limited to only 50
or 100 entries. On top of that, you'll also need to truncate some names when
adding phone entries, so '~unt Clarissa Johnson" becomes '~t Clrssa Jnsn."
3
Chapter 1
Uyou own a PDA, then you probably agree that PDAs are also useful devices.
They can store thousands of contact entries, and they are a lot better for entering
data compared to mobile phones. Since you can't store your entire contact list on
your mobile phone, you probably have it stored on your PDA. Unfortunately, it's
a little inconvenient to look up a phone number on the PDA and then manually
dial the number on the mobile phone.
With a Bluetooth-enabled PDA and a Bluetooth-enabled mobile phone, you
can keep your entire contact list on the PDA where it's far more convenient. Don't
even bother to store phone numbers on your phone. Whenever you are ready to
dial a number, you just look up the number on the PDA and send the phone
number over to the phone; no wires, no hassle. Figure 1-1 is a picture of one of
HP's advanced Bluetooth-enabled PDAs.
Figure 1-1. The short antennae on HP iPAQ 5400 series Pocket PC allows it to
communicate via Bluetooth and 802.11 b. For added security, this model also
includes a fingerprint reader.
4
Introducing Bluetooth
Personal Networks: PC to PC
Bluetooth is great for connecting two PCs together at a moderate speed. If you
want higher speeds or if you need to transfer large files, then you're better off
using Wireless LAN technology. On the other hand, Bluetooth is good at creating
small, personal networks. So this is a great technology if you're having an
impromptu meeting with coworkers. Bluetooth also has the added capability to
discover new devices when they enter your network.
5
Chapter 1
6
Introducing Bluetooth
could use the same headset to answer calls on your Bluetooth-enabled wireless
phone as well as answer calls on your Bluetooth-enabled home phone. You could
also use the same headset to listen to your Bluetooth-enabled portable radio.
Bluetooth can also be enabled in your car so that if you're driving and you
receive a call on your wireless phone, you can simply transfer the call to the
hands-free system built right into the car. Your phone stays on your hip, or in
your briefcase. You can also use the same technology to initiate a call in your car
without touching your phone at all. In either case, if you've arrived at your desti-
nation and you want to continue the conversation, you just transfer the call back
to the phone.
7
Chapter 1
8
Introducing Bluetooth
Figure 1-3. Although the Fossil Wrist PDA doesn't contain any Bluetooth hardware,
it does come preloaded with a Bluetooth-enabled as: the Palm as 4.1. Palm as is
a registered trademark ofPalm, Inc.
9
Chapter 1
Summary
Bluetooth is a great technology for wireless connections between power-
conservative computer devices. It is also a great cable replacement technology
for pes and laptops. It can function as a universal connector between your
peripherals and devices, and you may never again need a cable (some of which
can be expensive) to connect your devices together.
In the next chapter, we'll dig right in to the Bluetooth protocol. If you're new
to Bluetooth, this will be your first introduction to a lot of new terminology.
We'll explain to you the components of the Bluetooth stack and the purpose of
Bluetooth profiles. When you create your wireless applications, you'll interact
with the stack and profiles to send and receive data.
10
CHAPTER 2
Bluetooth 1.1
THE MAIN FOCUS OF THIS CHAPTER is to describe the inner workings of Bluetooth. The
most current revision of the protocol is version 1.1. Almost every device on the
market today is compliant with Bluetooth version 1.1, although you might be
able to find some devices that use the LOB version of Bluetooth. The differences
between Bluetooth LOB and 1.1 are beyond the scope of this book. The differ-
ences are minimal, and they really don't apply to Java programmers.
What can you expect for future versions of Bluetooth like 1.2 and 2.0?When-
ever the Bluetooth SIG (the group of companies that developed the Bluetooth
spec) plans to release later revisions of the spec, you can expect some things like
higher speeds, more profiles, and backward compatibility with 1.1. We wouldn't
expect the newer versions to try to compete with 802.11 speeds, but you might see
data rates of 4,8, or even 12 Mb/s. Bluetooth's niche is as a low-power wireless
communication protocol, so don't expect Bluetooth 2.0 to be a power hog.
This chapter is all about Bluetooth. We'll give you brief history on how it
began and how it got its name. Next, we'll show you the radio spectrum and
where Bluetooth fits in with devices that you probably already know about.
Afterwards, we'll describe the anatomy of a Bluetooth-enabled device by giving
a description of Bluetooth hardware, the Bluetooth stack, and Bluetooth profiles.
For the remainder of this book, when we refer to Bluetooth, we are referring to
the 1.1 version of the spec. Now, let's dig in to Bluetooth!
11
Chapter 2
studies of a wireless technology to link mobile phones and accessories. Years later
in 1997, Ericsson formed the Bluetooth Special Interest Group (Bluetooth SIG) so
that other companies could use and promote the technology. At that time, the
Bluetooth SIG consisted of the following promoter companies:
• Ericsson
• IBM
• Intel
• Nokia
• Toshiba
Later on, in 1999 after the 1.0 specification was released, the Bluetooth SIG
added four more members:
• 3Com
• Agere
• Microsoft
• Motorola
Today, the Bluetooth SIG has well over 2,000 members that are all interested
in promoting and improving the Bluetooth standard.
12
Bluetooth 1.1
81uetooth Devices
So, if a Bluetooth device is just a radio, then what do these radios look like? Well,
Figures 2-1,2-2, and 2-3 are just a sample of devices that are Bluetooth radios.
Some of these items are used in development kits, while others are meant to be
used by consumers.
13
Chapter 2
14
Bluetooth 1.1
Figure 2-3. The Palm SD Bluetooth card for Palm as 4 devices. Palm as is
a registered trademark of Palm, Inc.
The examples in this book will use a variety of Bluetooth devices from multi-
pIe vendors. The example in Chapter 8, however, uses no Bluetooth devices at all!
In that example, we simulate the entire Bluetooth network in software using the
Rococo Impronto Simulator.
)) )0)
Figure 2-4. You can only connect to one Bluetooth device at a time ifyou have
hardware that only supports point-to-point communication.
15
Chapter 2
( (011
Figure 2-5. You can connect to up to seven Bluetooth devices at a time ifyou have
multipoint-capable hardware.
16
Bluetooth 1.1
How can you determine a Bluetooth device's power class, and thereby know
its range? The power class is rarely printed on the unit, so here's a hint if you're
trying to distinguish the power class of a device that you've never seen before. If
that device is powered by batteries, or if it fits in your hand (like a wireless phone
or a headset), then it is most likely a Class 2 or 3 device. If the Bluetooth device is
built right into the hardware of another unit, and that unit is plugged into AC
power, then it is most likely a Class 1 device.
Don't worry about Bluetooth device classes too much; just be aware that
Bluetooth can communicate at greater distances than 10 meters.
So, if you're familiar with the HTTP protocol stack and how it works, then you
can relate to the Bluetooth protocol stack. A Web browser uses an HTTP protocol
stack so that it can receive Web content like HTML pages, images, files, and best
of all, Java applets. A Web server also uses an HTTP protocol stack to send out
Web content to Web browsers over the network. So, like the HTTP protocol stack,
17
Chapter 2
a Bluetooth protocol stack will allow Bluetooth clients and servers to send and
receive data over a wireless network.
So how do the Bluetooth device and the Bluetooth stack work together? What
is their relationship? Well, a Bluetooth device without a stack can be compared to
a computer without an operating system. More specifically, it's like a computer
peripheral without a driver. Figure 2-6 illustrates this concept.
I )0) )
------------~O.-----------------------~0·-----------
Figure 2-6. A) The computer may be attached to its peripherals, but it can't control
them without a driver. B) The computer may be attached to a Bluetooth device,
but it can't control it without a stack.
18
Bluetooth 1.1
• RFCOMM
rn
OBEX WAP
[}] IP IP
PPP
CD IP
JGG G G
,.c
[ RFCOMM ....0..
0
[~__________________H_o_st__co_n_tr_o_ll_e_r_I_n_te_rl_a_C_e_(_H_CI_)________________~J
Figure 2-7. The Bluetooth protocol stack
19
Chapter 2
You may notice that some of these layers are called "protocols" as well. That's
because these items are subprotocols of the Bluetooth protocol stack. Others like
TCP IIp, OBEX, and WAP were not originated by the Bluetooth SIG, but they have
been incorporated into the Bluetooth protocol. Those subprotocols are known as
adopted protocols.
20
Bluetooth 1.1
RFCOMM
RFCOMM is commonly known as the wireless serial port, or the cable replace-
ment protocol. The name is derived from the fact that your serial ports are called
COMMl, COMM2, etc. RFCOMM simulates the functionality of a standard serial
port. For instance, a Bluetooth-enabled PDA would use the RFCOMM layer to
synchronize its data to a Bluetooth-enabled PC as if they were physically con-
nected by a cable.
21
Chapter 2
22
Bluetooth 1.1
L2CAP Logical link Control and The layer that handles all data transmissions from
Adaptation Protocol upper layers
SDP Service Discovery Protocol The layer that discovers services on Bluetooth
devices in the area
RFCOMM RFCOMM The layer that allows you to create a virtual serial
port and to stream data
TCS-BIN Telephony Control The layer that allows you to create control signals
Protocol Specification for audio applications
WAP Wireless Access Protocol The adopted protocol that allows you to view
content in Wireless Markup Language (WML)
OBEX Object Exchange The adopted protocol that allows you to send
and receive objects
BNEP Bluetooth Network The layer that encapsulates other protocol data
Encapsulation Protocol packets into L2CAP packets
HID Human Interface The layer that traffics the controls signals and
Device Protocol data for input devices like keyboards and mice
Profiles
So, let's say that you own a Bluetooth-enabled PDA and a Bluetooth-enabled
wireless phone. Both of the devices have Bluetooth stacks. How can you tell if
your devices will interact properly and allow you to synchronize the phone lists
between each other? How will you know if you can send a phone number from
the PDA to the phone? And most importantly, how can you determine if these
23
Chapter 2
devices will allow you to browse the Internet on the PDA using the phone as
a wireless modem?
That's why the Bluetooth SIG defined profiles. ABluetooth profile is
a designed set of functionality for Bluetooth devices. For instance, using the
examples just listed, the phone and the PDA must both support the Synchro-
nization Profile in order to synchronize data between themselves. In order to
send object data like a v. cf file from the PDA to the phone, both devices need to
have the Object Push Profile implemented. And finally, the PDA and the wireless
phone must both support the Dial-Up Networking Profile in order for the PDA to
wirelessly browse the Internet from the phone. If you want your Bluetooth-
enabled devices to interact, having a Bluetooth stack is not good enough. Those
devices also need to implement the same profile.
Now, here's a list of many of the Bluetooth profiles and a description of what
they do. For most of them, you can basically guess what they do; the names are
not cryptic.
24
Bluetooth 1.1
g (omputer Management !.
S"
ttl ~ Performance Logs and Alerts
8 ~Modems
ttl ~ shared Folders
4jl3Com Bluetooth DUN Client
-,
I±J -t Sound, video and game controDers
[±; _ System devices
Figure 2-8. As you can see in Windows 2000, the operating system thinks that
COMM10 and COMMll are actual serial ports!
t:f(
NOTE
over the air using your virtual serial port, then you'll need
another Bluetooth-enabled device in the area that also sup-
'- -
ports the Serial Port Profile.
25
Chapter 2
FAX Profile
Using the FAX Profile, a Bluetooth-enabled computer can send a fax wirelessly to
a Bluetooth-enabled fax machine or to a Bluetooth-enabled wireless phone.
Headset Profile
The Headset Profile is primarily designed for connecting Bluetooth-enabled
headsets to Bluetooth-enabled wireless phones.
26
Bluetooth 1.1
Intercom Profile
If two Bluetooth-enabled devices are within range, and they support the
Intercom Profile, then they can function just like regular intercoms.
Synchronization Profile
You use the Synchronization Profile to synchronize data between two Bluetooth-
enabled devices. The most common applications for this profile would be to
synchronize data between a PDA and a PC.
27
Discovering Diverse Content Through
Random Scribd Documents
fish-hook is worthless, the fish holoholona a ka lawaia.” O ko
will not bite it; it will weary one’s Aiai manao ma keia olelo i ka
body for nothing.” The wife then wahine, i loaa ka pa o Kahuoi, a
asked him: “Where can I get kona makuakane, i aihue ia ai e
another pearl fish-hook then?” Kipapalaulu.
Aiai replied: “You go to your
father and tell him there is a
pearl fish-hook that will enrich
the fishermen. It is in the
fishermen’s calabash of fishing
utensils.” By this the husband
wished to get possession of the
pearl fish-hook Kahuoi which had
been stolen from his father by
Kipapalaulu.
During this time, in the reign of Aia iloko o ia wa e noho alii ana
Hakau, there was a large shell o Hakau, he pu na ke ’kua, o
used as a trumpet, called Kuana, Kuana ka inoa o ia pu, iluna aku
that was owned by the spirits o Waipio, e kani mau ana ua pu
which lived above Waipio. This nei i na po a pau loa, nolaila,
shell was blown every night and uluhua o Hakau. Nolaila, olelo
the sound from it made Hakau aku o Hakau i ke kahu o
angry. So he said to the master Pupualenalena: “Aia ke ola o
of Pupualenalena: “I will, olua me ko ilio a loaa ka pu a ke
however, save you and your dog ’kua.” Ia Hakau e olelo nei, ke
if you will get me the shell lohe nei o Pupualenalena. A
owned by the spirits.” While ahiahi, kani ka pu a ke ’kua; a
Hakau was speaking, aumoe, moe ke ’lii o ke ’kua, ala
Pupualenalena heard and na kiai, a mahope pauhia i ka
understood the king’s wish. That hiamoe. Komo ana o
night the shell was again blown Pupualenalena iloko, ae aku la
by the spirits. At midnight the maluna o na kiai, nana aku la e
king of the spirits retired leaving kau ana ua pu nei maluna o ke
the guards to keep watch; but ’lii wahi, ae aku la no keia
later on they also fell asleep. maluna o ke ’lii a loaa ka pu,
Pupualenalena then stole in and komo aku la ke poo o ua ilio nei
jumped over the sleeping maloko o ke kaula kakai o ka pu,
guards. Seeing the shell hanging e paa ai, a holo mai la.
over the king, it jumped over
him, took the shell, stuck his Ma keia holo ana, ua puka i
head in through the loop of the waho o ka hale, pa kekahi aoao
string by which it was hung up o ka pu i ka pohaku, niho mole,
and ran off with it. While in its ala ke ’kua a alualu ia ia nei, aole
flight and just as he was out of i loaa mai. Hiki keia i mua o
the house one side of the shell Hakau me ka pu, olioli o Hakau i
struck a rock and a piece of the ka loaa ana o ka pu, nolaila,
shell was broken off. Upon hoonoho o Hakau i ke kahu a me
hearing the crack of the shell the ka ilio i ka aina, a lilo ae la i
spirits woke up and gave chase, punahele na Hakau. [560]
but they were unable to catch
the dog.
Shortly after this some of the A liuliu iho, holo kekahi poe o
Kohala people sailed for Kekaha Kohala i ke kalepa ia i ke kaha, a
and from there continued on to hala loa i Kona a Holualoa, kahi
Holualoa, Kona, for the purpose o Mumu ma. O ka Mumu ma
of trade, where they met Mumu hana me na kaikaina o ka
and his brothers. Mumu and his lawaia, o ke aku ka ia a me na ia
brothers were fishermen and e ae, a na lakou ua pa ai nei i ke
caught aku and all other kinds of aku. No laila ka ia a ka poe
fish. They had in their kalepa o Kohala i holo aku ai.
possession some very rare pearl
fish-hooks, which supplied them
with all the aku they wanted.
The Kohala traders got their fish
from Mumu and his brothers.
Is that all the fault, why a man O ka hala wale iho la no ia, e
should be killed? make ai kanaka?
The umu by this time was hot Ua makaukau ka umu, ua
and ready; the body was then enaena; ia wa, kalua ia ke kino o
put into the umu. After it was Mumu i ka umu, a moa, olelo o
cooked Hikapoloa said: “The Hikapoloa: “O ka mea ikaika i ka
person who will eat the biggest ai ana, e lilo ke ahupuaa nui iaia.
amount 4 shall be presented with A pau ka ai ana, kiola ia aku la
the largest ahupuaa.” After the na iwi i ka puainako. Kakali mai
body was eaten the bones were la na kaikaina o ka hoi aku, a
thrown onto a pile of sugar-cane liuliu, pii o Ahewahewa, pela no
trash. The younger brothers in ka hana a hiki ia Kalino. Lalau
the meantime awaited for the iho la o Kalino i ke aku, pii mai la
return of their brother. After a hiki i Puuiki, hai aku la ke kiai
some time had lapsed ia Hikapoloa: “E, he kanaka wiwi
Ahewahewa went up and he also ae hoi keia e pii mai nei.” I aku o
was killed. The next one Hikapoloa: “O Kalino keia
followed and so on down to kanaka, ua kunihi mai la ka pii
Kalino. When it came to Kalino’s ana; he kanaka nui keia, o ka
turn, he took up an aku and pau keia o na kane. O ka muli
started off. When he got to loa keia o Mumu ma.” A hiki o
Puuiki, he was seen, and the Kalino, me ke aku i ka lima,
watchman called out to ninau aku la i na kiai: “Auhea na
Hikapoloa: “Say, there is a thin ’lii wahine?” “Mahope ia, e komo
man coming up.” Hikapoloa e ai a maona, alaila hele aku e
answered: “It must be Kalino; he ike.” Komo aku la o Kalino, ooki
must be coming up sideways for iho la ke koi, moku ke poo. Olelo
he is a large man. He is the last mai ke poo o Kalino:
one, the youngest of the
brothers.” When Kalino arrived
with the aku in his hand, he
asked the watchman: “Where
are the chiefesses?” “You can
see them later on, enter first and
help yourself to some food, then
afterwards go and see them.”
Kalino then entered the house,
when down came the axe and
his head was cut off. The head
of Kalino then asked:
They were all killed without the Ua make lakou me ka ike ole o
knowledge of their sisters, as na kaikuahine, no ka mea, e
they were at this time haku inoa ana na kaikuahine no
composing a mele or chant for ke keiki a Hikapoloa me
the child of Hikapoloa and Mailelaulii e hapai ana. Ua paa
Mailelaulii which was as yet lakou ma kekahi hale e aku, me
unborn. They were closed up in ka hele ole i waho o ka hale, no
another house, never once ka mea, he kapu ka inoa, aole e
coming out; as people while holoholo i waho, a i loko o ka
composing a name chant were hale. O Kaulanapokii, ko lakou
restricted 11 and not allowed to muli loa, ua ike ia i na uhane o
go in and out of the house. But na kaikunane i ke ku aku, aohe
Kaulanapokii, the youngest of poo, elima kino, aole na poo,
the sisters, saw the spirits of nolaila uwe ia a holoholo i loko o
their brothers standing without ka hale.
heads; five bodies headless,
whereupon she wept and walked
back and forth within the house.
Kaulanapokii was a woman who
had supernatural powers and
could see certain things. This
power is even now possessed by
the doctors who give medicines
in her name.
Say, thou smoke of the opiko Ka uwahi opiko o uka e aala mai
send your fragrance from the nei e!
uplands, Ua ike paha oe i kuu kaikunane
Perchance you have seen my o Mumu.
brother Mumu?
“Yes, I have seen him, his bones “Ae, ua ike, aia i ka puainako na
are lying there on the pile of iwi.” Hele aku la keia ohi,
sugar-cane trash.” Kaulanapokii houluulu a kahi hookahi, pela no
then proceeded to the rubbish ka ia nei hana a hiki ia Kalino,
pile and collected the bones oia ka lima:
together. She then called each
brother in turn collecting their
bones together until it was the
turn of her fifth brother, Kalino,
when she called:
Say, thou smoke of the alani, Ka uwahi alani o uka e aala mai
send your fragrance from the nei e!
uplands, O ka wahie paha oe o kuu
Are you not the wood with which kaikunane i moa ai.
my brother was cooked?
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookultra.com