Nibble

An octet code page 866 font table ordered by nibbles.

In computing, a nibble (occasionally nybble or nyble to match the spelling of byte) is a four-bit aggregation,[1][2] or half an octet. It is also known as half-byte[3] or tetrade.[4][5] In a networking or telecommunication context, the nibble is often called a semi-octet,[6] quadbit,[7] or quartet.[8][9] A nibble has sixteen (24) possible values. A nibble can be represented by a single hexadecimal digit and called a hex digit.[10]

A full byte (octet) is represented by two hexadecimal digits; therefore, it is common to display a byte of information as two nibbles. Sometimes the set of all 256 byte values is represented as a 16×16 table, which gives easily readable hexadecimal codes for each value.

Four-bit computer architectures use groups of four bits as their fundamental unit. Such architectures were used in early microprocessors, pocket calculators and pocket computers. They continue to be used in some microcontrollers.

History

The term 'nibble' originates from its representing 'half a byte', with 'byte' a homophone of the English word 'bite'.[3] In 2014, David B. Benson, a professor emeritus at Washington State University, remembered that he playfully used (and may have possibly coined) the term nibble as "half a byte" and unit of storage required to hold a binary-coded decimal (BCD) decimal digit around 1958, when talking to a programmer of Los Alamos Scientific Laboratory. The alternative spelling 'nybble' reflects the spelling of 'byte', as noted in editorials of Kilobaud and Byte in the early 1980s. Another early recorded use of the term 'nybble' was in 1977 within the consumer-banking technology group at Citibank. It created a pre-ISO 8583 standard for transactional messages between cash machines and Citibank's data centers that used the basic informational unit 'NABBLE'.

The nibble is used to describe the amount of memory used to store a digit of a number stored in packed decimal format (BCD) within an IBM mainframe. This technique is used to make computations faster and debugging easier. An 8-bit byte is split in half and each nibble is used to store one decimal digit. The last (rightmost) nibble of the variable is reserved for the sign. Thus a variable which can store up to nine digits would be "packed" into 5 bytes. Ease of debugging resulted from the numbers being readable in a hex dump where two hex numbers are used to represent the value of a byte, as 16×16 = 28. For example, a five-byte BCD value of 31  41  59  26  5C represents a decimal value of +314159265 .

Historically, there are cases where nybble was used for a group of bits greater than 4. In the Apple II microcomputer line, much of the disk drive control and group-coded recording was implemented in software. Writing data to a disk was done by converting 256-byte pages into sets of 5-bit (later, 6-bit) nibbles and loading disk data required the reverse.[11][12][13] Moreover, 1982 documentation for the Integrated Woz Machine refers consistently to an "8 bit nibble".[14] The term byte once had the same ambiguity and meant a set of bits but not necessarily 8, hence the distinction of bytes and octets or of nibbles and quartets (or quadbits). Today, the terms 'byte' and 'nibble' almost always refer to 8-bit and 4-bit collections respectively and are very rarely used to express any other sizes.

Table of nibbles

The sixteen nibbles and their equivalents in other numeral systems:

Examples
BinaryHexadecimal
0000 0100 0010 042
0010 1010 1001 2A9
0010 0000 1001 209
1110 0100 1001 E49
0011 1001 0110 396
0001 0000 0001 101
0011 0101 0100 354
0001 0110 0100 164
0hex=0dec=0oct0000
1hex=1dec=1oct0001
2hex=2dec=2oct0010
3hex=3dec=3oct0011
4hex=4dec=4oct0100
5hex=5dec=5oct0101
6hex=6dec=6oct0110
7hex=7dec=7oct0111
8hex=8dec=10oct1000
9hex=9dec=11oct1001
Ahex=10dec=12oct1010
Bhex=11dec=13oct1011
Chex=12dec=14oct1100
Dhex=13dec=15oct1101
Ehex=14dec=16oct1110
Fhex=15dec=17oct1111

Low and high nibbles

The terms "low nibble" and "high nibble" are used to denote the nibbles containing, respectively, the less significant bits and the more significant bits within a byte. In graphical representations of bits within a byte, the leftmost bit could represent the most significant bit (MSB), corresponding to ordinary decimal notation in which the digit at the left of a number is the most significant. In such illustrations the four bits on the left end of the byte form the high nibble, and the remaining four bits form the low nibble.[15] For example,

ninety-seven = 9710 = (0110 0001)2

the high nibble is 01102 (6), and the low nibble is 00012 (1). The total value is high-nibble × 16 + low-nibble (6×16+1=97).

Extracting a nibble from a byte

In the C programming language:

#define HI_NIBBLE(b) (((b) >> 4) & 0x0F)
#define LO_NIBBLE(b) ((b) & 0x0F)

where b must be a variable or constant of an integral data type, and only the least-significant byte of b is used.

For example, HI_NIBBLE(0xAB)==0xA and LO_NIBBLE(0xAB)==0xB.

In Common Lisp:

(defun hi-nibble (b)
  (ldb (byte 4 4) b))
(defun lo-nibble (b)
  (ldb (byte 4 0) b))

See also

References

  1. Hall, Douglas V. (1980). Microprocessors and Digital Systems. McGraw-Hill. ISBN 0-07-025571-7.
  2. Warren Jr., Henry S. (2013) [2002]. Hacker's Delight (2 ed.). Addison Wesley - Pearson Education, Inc. ISBN 978-0-321-84268-8. 0-321-84268-5.
  3. 1 2 Raymond, Eric S. (1996). The New Hacker's Dictionary. MIT Press. p. 333. ISBN 978-0-262-68092-9.
  4. Carr, John W. Introduction to the use of digital computers: Notes from the Summer Conference Held at the Computation Center of the University of North Carolina, Chapel Hill, N.C., August 17-28, 1959. Frontier Research on Digital Computers. 1. University of North Carolina at Chapel Hill, Computation Center. p. 211. Each of these letters corresponds to one of the integers from zero to fifteen, therefore requiring 4 bits (one "tetrade") in binary representation.
  5. Speiser, Ambrosius Paul (1965) [1961]. Digitale Rechenanlagen - Grundlagen / Schaltungstechnik / Arbeitsweise / Betriebssicherheit [Digital computers - Basics / Circuits / Operation / Reliability] (in German) (2 ed.). ETH Zürich, Zürich, Switzerland: Springer-Verlag / IBM. pp. 6, 34, 165, 183, 208, 213, 215. LCCN 65-14624. 0978.
  6. Puzman, Josef; Kubin, Boris (2012). Public Data Networks: From Separate PDNs to the ISDN. Springer Science+Business Media. p. 113. ISBN 978-1-4471-1737-7.
  7. Horak, Ray (2007). Webster's New World Telecom Dictionary. John Wiley & Sons. p. 402. ISBN 978-0-470-22571-4.
  8. Brewster, Ronald L. (1994). Data Communications and Networks, Vol. III. IEE telecommunications series. 31. Institution of Electrical Engineers. p. 155. ISBN 978-0-85296-804-8. A data symbol represents one quartet (4 bits) of binary data.
  9. Courbis, Paul; Lalande, Sébastien (2006-06-27) [1989]. Voyage au centre de la HP28c/s (in French) (2 ed.). Paris, France: Editions de la Règle à Calcul. OCLC 636072913. Archived from the original on 2016-08-06. Retrieved 2015-09-06.
  10. Heller, Steve (1997). Introduction to C++. Morgan Kaufmann. p. 27. ISBN 978-0-12-339099-8. Each hex digit (0–f) represents exactly 4 bits.
  11. Worth, Don D.; Lechner, Pieter M. (May 1982) [1981]. Beneath Apple DOS (4th printing ed.). Reseda, CA, USA: Quality Software. Retrieved 2017-03-21.
  12. Worth, Don D.; Lechner, Pieter M. (March 1985) [1984]. Beneath Apple ProDOS - For Users of Apple II Plus, Apple IIe and Apple IIc Computers (PDF) (2nd printing ed.). Chatsworth, CA, USA: Quality Software. ISBN 0-912985-05-4. LCCN 84-61383. Archived (PDF) from the original on 2017-03-21. Retrieved 2017-03-21.
  13. Copy II Plus Version 9 - ProDOS/DOS Utilities - Data Recovery, File Management, Protected Software Backup (PDF). 9.0. Central Point Software, Inc. 1989-10-31 [1982]. Archived (PDF) from the original on 2016-03-13. Retrieved 2017-03-21.
  14. Apple Computer, Inc. (February 1982) [1978]. Integrated Woz Machine (IWM) Specification (PDF) (19 ed.). DigiBam Computer Museum. Archived (PDF) from the original on 2016-08-06. Retrieved 2016-08-06.
  15. Baccala, Brent (April 1997). "Binary arithmetic". Connected: An Internet Encyclopedia (3rd ed.). Archived from the original on 2016-08-06. Retrieved 2015-07-20.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.