Rate Limiting Algorithms
title: "Rate Limiting Algorithms" seoTitle: "Rate Limiting Algorithms | Appendix" @description: "What are Rate Limiting Algorithms?" metaKeywords: "Rate Limiting Algorithms, Rate Limited, DoS" author: "Myles Golden" date: "2022-06-2I 8" lastmod: "2022-06-28" published: true category: "term" parent_category: "home" img: "/images/no_img.png" tags: - term
There are two types of rate limiting algorithms: Leaky Bucket and Token Bucket.
Leaky Bucket is a rate limiting algorithm that works by dropping incoming packets if the traffic rate exceeds the limit. This can be used to protect networks from DoS attacks, as well as to manage network resources.
Token Bucket is a rate limiting algorithm that works by assigning tokens to each incoming packet. If the traffic rate exceeds the limit, the packet is dropped. This can be used to protect networks from DoS attacks, as well as to manage network resources.