Rate Limiting and Throttling

Question 1 of 6

What is the key difference between the token bucket and leaky bucket algorithms?

← Back to categories