leaky bucket algorithm
by gowtham[ Edit ] 2010-02-18 19:42:15
Although the leaky bucket algorithm has several uses, it is best understood in the context of network traffic shaping or rate limiting. Typically, the algorithm is used to control the rate at which data is injected into a network, smoothing out "burstiness" in the data rate.