Token Bucket: Architecting Next-Gen Secure, Resilient, and High-Performance Distributed Systems and App Modernization
Keywords:
Token Bucket Algorithm, Distributed Systems, Resiliency, Architectural Pattern, Fintech, Cloud NativeAbstract
With the increase demand of digital footprint, creating a robust and resilient distributed system adhering to cloud needs has become essential. Distributed system has challenges of scaling and cascade failure in case of exponential or burst traffic. Token Bucket algorithm is an architecture paradigm in distributed system that not only helps to overcome these challenges but also to sustain increasing workloads. In digital eco-system Token Bucket helps systems to be loosely coupled with asynchronous processing that serves to design a system with maximum availability and minimum latency. Along with its self-healing and fault tolerance capability Token Bucket also helps in safeguarding the system from various cyber threats. Token bucket provides a blueprint to architect complex software system that delivers speed, reliability and fortified protection. This algorithm when properly designed and considered for use case can be a state-of-the-art for digital ecosystem.
Downloads
References
N. U. Ahmed, Qun Wang, L. Orozco Barbosa, Systems approach to modeling the Token Bucket algorithm in computer networks, Wiley, Aug 2002, https://doi.org/10.1080/10241230215282.
Puqi Perry Tang, T.-Y.C. Tai, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320), March 1999.
Peter L Dordal, Loyola University Chicago, An Introduction to Computer Networks, July 2020, intronetworks.cs.luc.edu.
Salman A. Alqahtani, – Wireless Personal Communications: An International Journal, Volume 84, Issue 2, Pages 801 - 819, https://doi.org/10.1007/s11277-015-2661.
Liu, W., et al. (2019). – A distributed cache consistency maintenance mechanism based on redis cluster. Journal of Computer and Communications, 61.
S. Weerasinghe and I. Perera, "Optimised Strategy for Inter-Service Communication in Microservices," Int. J. Adv. Comput. Sci. Appl., vol. 14, no. 2, 2023, doi: 10.14569/IJACSA.2023.0140233.
V. Lenarduzzi, F. Lomio, N. Saarimäki, and D. Taibi, "Doesmigrating a monolithic system to microservices decrease the technical debt? " J. Syst. Softw., vol. 169, p. 110710, Nov. 2020, doi:10.1016 /j.jss. 2020.110710.
Jacopo Soldani, Giuseppe Montesano & Antonio Brogi, Department of Computer Science, University of Pisa, Pisa, ItalyWhat Went Wrong? – Explaining Cascading Failures in Microservice-Based Applications Conference paper, First Online: 26 September 2021, pp 133–153.
David Gamez, Simin Nadjm-Tehrani, John Bigham, Claudio Balducelli, Kalle Burbeck, – Tobias Chyssler, Safeguarding Critical Infrastructures, 2017 - opendocs.ids.ac.uk.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.