Leokhaaleoo.hashnode.dev·Jul 19, 2023Rate Limiter in System Design. Part 2 - Commonly Used AlgorithmsLeaky Bucket Conceptually, the Leaky Bucket algorithm operates as follows. The server utilizes a fixed-sized bucket, and the bottom of the bucket has a hole (output) to hold a certain number of tokens. In this context, a token represents a request se...1 likeSystem Design