5.2.2. Traffic Shaping Algorithms: Leaky Bucket & Token Bucket Questions & Answers | Computer Networks BSC-CSIT | TU | TABFlux