leaky bucket


Also found in: Acronyms, Wikipedia.

leaky bucket

A technique used in ATM networks at the switch level that applies a sustained cell flow rate to bursty traffic. Incoming data flows into a buffer (the "bucket"), then "leaks" out at a steady rate, which is designated as constant bit rate (CBR) traffic. In the event the in-flow exceeds the negotiated rate for a certain time, the buffer will overflow. At that point, the switch examines the Cell Loss Priority (CLP) bit in each cell, and low-priority cells are discarded and retransmitted by the originating device. See leaky bucket counter.
Mentioned in ?
References in periodicals archive ?
If this surcharge is being renewed at the time when the government boasts about adding thousands of megawatts of additional generation capacity to the power sector, it just means a leaky bucket has been enlarged in size, rather than the cracks being fixed.
Leaky Bucket is a reminder to its 250 employees that in the social media space, battles are fought every day.
We need to plug the 30 to 40 holes in the leaky bucket of an Alzheimer's brain, not just one.
But once you start unraveling the overall tax base of the United Kingdom, and with corporation tax going to Northern Ireland and Income Tax going to Scotland along this federal road we are on, then pooling and sharing starts to be a leaky bucket.
She said: "More investment will certainly help and plugging the PS500 million shortfall in flood defence plans identified by the Committee on Climate Change would be a start but this is a leaky bucket that will continually need filling.
Even if you could establish some kind of "homeostasis" with your leaky bucket problem, you're still neglecting your most valuable resource --the ace in your back pocket, if you will.
I wouldn't want to put my confidence in such a leaky bucket as the editors recommended.
Otherwise, itOs like pouring water into a leaky bucket.
Seven years on, revenue from selling the BHA database continues to represent a trickle in the leaky bucket and a levy replacement mechanism remains an elusive target.
Traffic management algorithms: Leaky Bucket, Token Bucket and Virtual Scheduling
The most common are the Token Bucket and Leaky Bucket algorithms.