The document summarizes two algorithms for regulating network traffic: 1. The Leaky Bucket Algorithm models traffic as water entering a bucket with a hole, limiting output to a constant rate regardless of input rate. Packets are discarded if the bucket is full. 2. The Token Bucket Algorithm generates tokens periodically that must be removed from the bucket before packets can be transmitted, allowing bursts up to the token capacity. This is less restrictive than the Leaky Bucket Algorithm.