Browse Definitions :
Definition

burstiness

Contributor(s): Matthew Haughn

Burstiness is a characteristic of communications involving data that is transmitted intermittently -- in bursts -- rather than as a continuous stream. 

A burst is a transmission involving a large amount of data sent in a short time, usually triggered as a result of some threshold being reached. When bursts are a repeated, dependable behavior in some type of transmission, the subject in question is said to exhibit burstiness.

The tendency for communications to be bursty is an important factor in the design considerations of the hardware manufacturers make for these communications. For example, a large supply of fast RAM can replaced by lower cost memory with a cache, saving money while potentially having little to no effect on the user experience.

Burstiness is sometimes caused by the nature of the data being communicated. Ethernet, for example, is inherently bursty. Computer architectures that rely more heavily on cache than sustainable bandwidth are typically bursty as well, showing much higher bandwidth until the cache is exhausted and data must be retrieved from sources outside the hardware where the chip resides. Mp3 players have often combined slower storage with a faster cache this way. This type of architecture can prove ineffective if cache memory often fails to contain the desired information.

This was last updated in March 2015

Continue Reading About burstiness

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

How well I remember the early days of streaming services like RealPlayer and how the inability to keep sync'd would cause devices to freak out and flood portions of the network. Cisco's cache and content engines came out about that time, and I actually used RealPlayer and other services in the late 90s as ideal test platforms :).
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close