Browse Definitions :
Definition

most significant bit (MSB)

What is most significant bit (MSB)?

The most significant bit (MSB) is the bit in a multiple-bit binary number with the largest value. This is usually the bit farthest to the left, or the bit transmitted first in a sequence. For example, in the binary number 1000, the MSB is 1, and in the binary number 0111, the MSB is 0.

Examples of most significant bit
Most significant bit in the binary number 1000 and the binary number 0111.

When the MSB in a sequence is farthest to the left (or first), the least significant bit (LSB) is usually the one farthest to the right (or last). For example, the decimal number 157 is equal to the binary number 10011101 (or hexadecimal value 9D).

The 1 at the left side of the binary number is the MSB because it has a place value of 128, the highest value in the byte, and the 1 at the right side of the binary number is the LSB, which has a place value of 1, the lowest value in the byte.

Decimal number 157 in binary
Determining the most significant bit and least significant bit for 157.

Both MSB and LSB can play a role when transmitting and storing data. For example, if the bits are sent serially over the network -- one bit at a time -- they are typically transmitted in one of two ways: MSB first or LSB first. A bit is designated as most significant because it has the greatest place value in the binary number, so the least significant bit lies at the other end. This is important information to have when receiving or retrieving data because it tells a program how to interpret the binary data.

The concept of MSB and LSB can also apply to bytes. The most significant byte is the byte in a multiple-byte word with the largest value. As with bits, the most significant byte is normally the byte farthest to the left or the byte transmitted first in a sequence. In this case, the byte sequence is said to be big-endian because the order starts with the "big end" (the most significant byte). If the order were reversed so the MSB is farthest to the right (or last) and the LSB is farthest to the left (or first), the sequence is said to be little-endian.

Consider an example. The decimal number 36,765 can be stored as a two-byte binary number: 10001111 10011101. This is equivalent to the hexadecimal value 8F9D, in which 8F represents the first byte and 9D represents the second byte.

Most significant bit vs. least significant bit
Diagram illustrating the difference between most significant bit and least significant bit.

The first byte in the binary sequence is considered the most significant because it has the largest value. The hexadecimal number reflects this by listing the MSB first (8F), followed by the LSB (9D). The hexadecimal value, like the binary sequence, is considered big-endian format. However, if the hexadecimal value is listed as 9D8F, the order is little-endian because the LSB is listed first.

Under certain circumstances, byte sequences might be neither little-endian nor big-endian. In encrypted data, for example, the byte significance can be scrambled, in which case the MSB or LSB can appear anywhere in the sequence.

This was last updated in July 2022

Continue Reading About most significant bit (MSB)

Networking
  • CSU/DSU (Channel Service Unit/Data Service Unit)

    A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of a modem. It converts a digital data ...

  • data streaming

    Data streaming is the continuous transfer of data from one or more sources at a steady, high speed for processing into specific ...

  • secure access service edge (SASE)

    Secure access service edge, also known as SASE and pronounced sassy, is a cloud architecture model that bundles network and ...

Security
  • application blacklisting (application blocklisting)

    Application blacklisting --increasingly called application blocklisting -- is a network or computer administration practice used ...

  • juice jacking

    Juice jacking is a security exploit in which an infected USB charging station is used to compromise devices that connect to it.

  • hypervisor security

    Hypervisor security is the process of ensuring the hypervisor -- the software that enables virtualization -- is secure throughout...

CIO
HRSoftware
  • recruitment process outsourcing (RPO)

    Recruitment process outsourcing (RPO) is when an employer turns the responsibility of finding potential job candidates over to a ...

  • human resources (HR) generalist

    A human resources generalist is an HR professional who handles the daily responsibilities of talent management, employee ...

  • employee lifecycle

    The employee lifecycle is a human resources model that identifies the different stages a worker advances through in an ...

Customer Experience
  • Adobe Experience Platform

    Adobe Experience Platform is a suite of customer experience management (CXM) solutions from Adobe.

  • virtual assistant (AI assistant)

    A virtual assistant, also called an AI assistant or digital assistant, is an application program that understands natural ...

  • inbound marketing

    Inbound marketing is a strategy that focuses on attracting customers, or leads, via company-created internet content, thereby ...

Close