Where/When does Bit endianness matters?

Experts,

I am having below two  queries related to endianness . Please help.

1) Bit endianness where/when it matters to be taken care of?
2)Will the BYTE endianness changes have any dependency to BIT endianess?

Basically, i wanted to know the BIT ENDIANNES
srimallikarthikAsked:
Who is Participating?
 
Infinity08Connect With a Mentor Commented:
>> if the memory representation of a multi-byte item

The question is about bit endianness ;)


>> i understood the transmission protocol scenario, can you add more detail about the "platform that can address bits separately". Is it like, processor architecture  dependable?

Basically, yes. If the platform allows you to address bits separately (ie. each bit has a memory address), then bit endianness plays a role. But only on that platform. When the platform communicates with the outside world, bit endianness no longer plays a role (unless you happen to use a bit-by-bit transfer protocol)


>> can you mention any platform where/when it address bits separately.

Can't come up with one off the top of my head. They're very rare.


>> Need to know whether i shld consider BIT endianness.

If your protocol stack sends data as bytes, you don't have to worry about bit endianness.
The only case where you could be impacted by it, is if you intend to implement the protocol stack for a platform that has addressable bits, and uses a different bit ordering.
0
 
Infinity08Commented:
Bit endianness is only relevant if you are on a platform that can address bits separately, or if you're using a transmission protocol that sends bit per bit.

Are you in any of these situations ?
0
 
Kent OlsenData Warehouse Architect / DBACommented:

Endianness is also a factor when exchanging binary data (related to Infinity's comment of a transmission protocol), often times in emulation/simulation, or where it's important to know if the memory representation of a multi-byte item is the same as the register representation.

0
Cloud Class® Course: Certified Penetration Testing

This CPTE Certified Penetration Testing Engineer course covers everything you need to know about becoming a Certified Penetration Testing Engineer. Career Path: Professional roles include Ethical Hackers, Security Consultants, System Administrators, and Chief Security Officers.

 
srimallikarthikAuthor Commented:
i understood the transmission protocol scenario, can you add more detail about the "platform that can address bits separately". Is it like, processor architecture  dependable? can you mention any platform where/when it address bits separately. This would be  very helpful
0
 
srimallikarthikAuthor Commented:
i am developing protocol stack currently, i am handling BYTE endianness currently to support multi platforms. Need to know whether i shld consider BIT endianness.
0
 
Kent OlsenData Warehouse Architect / DBACommented:
Hi srimallikarthik,

I don't believe that bit endianness is something to cause an issue.  It would come into play only when the number 1 is stored so that only the leftmost bit of an object is set (a very odd computer indeed), or the quite rare (and generally quite old) computer where items can be addressed to the bit level.


Any benefit from coding for it will probably never be realized.


Kent
0
 
srimallikarthikAuthor Commented:
Infinity08 & Kdo,

Thanks for posting
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.