leaky

The leaky bucket is an algorithm based on an analogy of how a bucket with a constant leak will overflow if either the average rate at which water is poured in exceeds the rate at which the bucket leaks or if more water than the capacity of the bucket is poured in all at once. It can be used to determine whether some sequence of discrete events conforms to defined limits on their average and peak rates or frequencies, e.g. to limit the actions associated to these events to these rates or delay them until they do conform to the rates. It may also be used to check conformance or limit to an average rate alone, i.e. remove any variation from the average.
It is used in packet-switched computer networks and telecommunications networks in both the traffic policing and traffic shaping of data transmissions, in the form of packets, to defined limits on bandwidth and burstiness (a measure of the unevenness or variations in the traffic flow). It can also be used as a scheduling algorithm to determine the timing of transmissions that will comply with the limits set for the bandwidth and burstiness applied by the network: see network scheduler. A version of the leaky bucket, the generic cell rate algorithm, is recommended for asynchronous transfer mode (ATM) networks in Usage/Network Parameter Control at user–network interfaces or inter-network interfaces or network-to-network interfaces to protect a network from excessive traffic levels on connections routed through it. The generic cell rate algorithm, or an equivalent, may also be used to shape transmissions by a network interface card onto an ATM network (i.e. on the user side of the user-network interface), e.g. to levels below the levels set for Usage/Network Parameter Control in the network to prevent it taking action to further limit that connection. The leaky bucket algorithm is also used in leaky bucket counters, e.g. to detect when the average or peak rate of random or stochastic events or stochastic processes, such as faults or failures, exceed defined limits.
At least some implementations of the leaky bucket are a mirror image of the Token Bucket algorithm and will, given equivalent parameters, determine exactly the same sequence of events to conform or not conform to the same limits. However, there are at least two different descriptions of the leaky bucket that can and have caused confusion.

View More On Wikipedia.org
  • 61

    Dan

    Administrator From On the forum.
    • Messages
      2,786
    • Directory
      6
    • Reaction score
      1,222
    • Points
      113
  • 1

    alichambersUK

    • Messages
      42
    • Reaction score
      3
    • Points
      8
  • 1

    Garyga

    53 From Stockport
    • Messages
      7
    • Reaction score
      0
    • Points
      1
  • 1

    Nicola1978

    • Messages
      4
    • Reaction score
      1
    • Points
      0
  • 1

    ceemage

    • Messages
      4
    • Reaction score
      0
    • Points
      0
  • 1

    Bidge

    • Messages
      3
    • Reaction score
      0
    • Points
      0
  • 1

    CumbianHobo

    • Messages
      4
    • Reaction score
      1
    • Points
      0
  • 1

    Lnd89

    • Messages
      4
    • Reaction score
      0
    • Points
      0
  • 1

    Dave Gething

    52 From London
    • Messages
      9
    • Reaction score
      1
    • Points
      1
  • 1

    ScruffyStu

    57 From London
    • Messages
      2
    • Reaction score
      0
    • Points
      1
  • 1

    NorthernLad

    • Messages
      40
    • Reaction score
      3
    • Points
      8
  • 1

    Daniel Betts

    40 From London
    • Messages
      1
    • Reaction score
      0
    • Points
      1
  • 1

    Cat123

    From Oxford
    • Messages
      9
    • Reaction score
      0
    • Points
      1
  • 1

    DrPepper13

    • Messages
      4
    • Reaction score
      0
    • Points
      1
  • 1

    DIY-NEWB

    • Messages
      5
    • Reaction score
      1
    • Points
      3
  • 1

    Osen

    • Messages
      2
    • Reaction score
      0
    • Points
      0
  • 1

    Erebus

    • Messages
      4
    • Reaction score
      0
    • Points
      0
  • 1

    Spinball

    • Messages
      31
    • Reaction score
      3
    • Points
      8
  • 1

    phil235

    • Messages
      4
    • Reaction score
      1
    • Points
      0
  • 1

    loted932

    • Messages
      12
    • Reaction score
      0
    • Points
      1
  • Newest Plumbing Threads

    Back
    Top
    AdBlock Detected

    We get it, advertisements are annoying!

    Sure, ad-blocking software does a great job at blocking ads, but it also blocks useful features of our website. For the best site experience please disable your AdBlocker.

    I've Disabled AdBlock