Leokhaaleoo.hashnode.dev·Jul 19, 2023Rate Limiter in System Design. Part 2 - Commonly Used AlgorithmsLeaky Bucket Conceptually, the Leaky Bucket algorithm operates as follows. The server utilizes a fixed-sized bucket, and the bottom of the bucket has a hole (output) to hold a certain number of tokens. In this context, a token represents a request se...1 likeSystem Design
Leokhaaleoo.hashnode.dev·Jul 19, 2023Rate Limiter in System Design - Part 1: Concepts and ApplicationsWhat is Rate Limiter In the simplest terms, a Rate Limiter restricts the number of access requests to a resource on a system from an agent (such as a user, browser, or another server) within a specific time frame. Based on several rate-limiting techn...1 likeratelimit