Browse Definitions :
Definition

burstiness

Contributor(s): Matthew Haughn

Burstiness is a characteristic of communications involving data that is transmitted intermittently -- in bursts -- rather than as a continuous stream. 

A burst is a transmission involving a large amount of data sent in a short time, usually triggered as a result of some threshold being reached. When bursts are a repeated, dependable behavior in some type of transmission, the subject in question is said to exhibit burstiness.

The tendency for communications to be bursty is an important factor in the design considerations of the hardware manufacturers make for these communications. For example, a large supply of fast RAM can replaced by lower cost memory with a cache, saving money while potentially having little to no effect on the user experience.

Burstiness is sometimes caused by the nature of the data being communicated. Ethernet, for example, is inherently bursty. Computer architectures that rely more heavily on cache than sustainable bandwidth are typically bursty as well, showing much higher bandwidth until the cache is exhausted and data must be retrieved from sources outside the hardware where the chip resides. Mp3 players have often combined slower storage with a faster cache this way. This type of architecture can prove ineffective if cache memory often fails to contain the desired information.

This was last updated in March 2015

Continue Reading About burstiness

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

How well I remember the early days of streaming services like RealPlayer and how the inability to keep sync'd would cause devices to freak out and flood portions of the network. Cisco's cache and content engines came out about that time, and I actually used RealPlayer and other services in the late 90s as ideal test platforms :).
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • certificate authority (CA)

    A certificate authority (CA) is a trusted entity that issues digital certificates, which are data files used to cryptographically...

  • hacktivism

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose.

  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyberattack in which an intruder gains access to a network and ...

SearchHealthIT

  • Cerner Corp.

    Cerner Corp. is a public company in North Kansas City, Mo., that provides various health information technologies, ranging from ...

  • clinical decision support system (CDSS)

    A clinical decision support system (CDSS) is an application that analyzes data to help healthcare providers make decisions and ...

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

SearchDisasterRecovery

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

SearchStorage

  • file system

    In a computer, a file system -- sometimes written filesystem -- is the way in which files are named and where they are placed ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

  • cache (computing)

    A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing ...

Close