leaky bucket algorithm

by gowtham 2010-02-18 19:42:15

Although the leaky bucket algorithm has several uses, it is best understood in the context of network traffic shaping or rate limiting. Typically, the algorithm is used to control the rate at which data is injected into a network, smoothing out "burstiness" in the data rate.

Tagged in:

1771
like
0
dislike
0
mail
flag

You must LOGIN to add comments