System Overview - Rate limiting algorithms (token bucket, leaky bucket)
This system controls how many requests a user can make to a service in a given time. It uses two common methods: the token bucket and the leaky bucket algorithms. The goal is to prevent overload and ensure fair use by limiting request rates smoothly and predictably.