development

Rate Limiting: Leaky Bucket vs Leaky Token Bucket

Similarity
Both are used to control flow

Differences
Leaky Bucket

  • Leaky bucket uses a queue to absorb a burst of requests & a constant set of requests are dequeued.
  • If request overflows the queue capacity, the data is lost.

Leaky Token Bucket

  • Think of N semaphores as tokens.
  • Leaky Token Bucket algorithm accepts a request till a semaphore is available.
  • If no token is available, the sender is blocked. So no data loss as such.

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.