Browse Definitions :
Definition

burstiness

Burstiness is a characteristic of communications involving data that is transmitted intermittently -- in bursts -- rather than as a continuous stream. 

A burst is a transmission involving a large amount of data sent in a short time, usually triggered as a result of some threshold being reached. When bursts are a repeated, dependable behavior in some type of transmission, the subject in question is said to exhibit burstiness.

The tendency for communications to be bursty is an important factor in the design considerations of the hardware manufacturers make for these communications. For example, a large supply of fast RAM can replaced by lower cost memory with a cache, saving money while potentially having little to no effect on the user experience.

Burstiness is sometimes caused by the nature of the data being communicated. Ethernet, for example, is inherently bursty. Computer architectures that rely more heavily on cache than sustainable bandwidth are typically bursty as well, showing much higher bandwidth until the cache is exhausted and data must be retrieved from sources outside the hardware where the chip resides. Mp3 players have often combined slower storage with a faster cache this way. This type of architecture can prove ineffective if cache memory often fails to contain the desired information.

This was last updated in March 2015

Continue Reading About burstiness

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close