Delyan Genkov

Delyan Genkov
Verified
Delyan verified their affiliation via an institutional email.
Verified
Delyan verified their affiliation via an institutional email.
  • PhD
  • Professor (Associate) at Technical University of Gabrovo

About

23
Publications
1,763
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
20
Citations
Current institution
Technical University of Gabrovo
Current position
  • Professor (Associate)
Additional affiliations
October 1995 - February 2015
Technical University of Gabrovo
Position
  • Research Assistant

Publications

Publications (23)
Conference Paper
Configuration files are critical for most networking devices – without configuration they are not functioning at all, or can’t perform some essential functions. There is reach variety of networking devices, and different approaches for configuration management. Present paper aims to propose a software application for centralized configuration manag...
Conference Paper
The Cisco Networking Academy Program is established in 1997 and become very popular today. Now there are more than 10,000 academies in 165 countries and more than 1,000,000 students worldwide. Teaching in the program includes online lectures, exams and laboratory exercises on real equipment and/or simulators. Present paper proposes a way to create...
Conference Paper
In Technical University in Gabrovo, Bulgaria we started a project for building an e-learning system. Our platform is based on Moodle 2.3 and it has some interesting extensions. The aim of this paper is to share our experience, starting from defining the initial need from e-learning system, to describe some technical details, encountered difficultie...
Conference Paper
Video surveillance systems become very popular in todays world. Some of them have operators that perform observation, but other relies on some alarm mechanisms for detection of events. There are sophisticated video surveillance software systems, that have video analytic functions, but simple video systems can detect only motion or loss of video sig...
Conference Paper
Network security is an essential part of modern computer systems and networks. There are many aspects of security, but one of the modern features built in some network switches is port security – a feature preventing network users from address spoofing, network flooding and unauthorized access through switching to another switch port. This feature...
Article
Internet is near to one of the most important changes in its existence — the migration of core protocol IP to a new version IPv6. Along with other changes, one of the important results is that the IPv6 network will no longer cares for fragmentation. According recommendations the sending node is responsible to select proper size of packets to send....
Article
Video surveillance systems are important part of today's organizations. When there is no live observation of the cameras image, it is important to have some alarm mechanisms for detection of physical impact against the cameras. Most simple video systems can detect motion and/or loss of video signal, but are vulnerable to covering or spraying the ca...
Conference Paper
The Internet is near to one of the most important changes in its existence -- the migration of core protocol IP to a new version IPv6. Along with other changes, one of the important results is that the IPv6 network will no longer cares for fragmentation. According recommendations the sending node is responsible to select proper size of packets to s...
Conference Paper
In February, 2011 last portions of IPv4 addresses were given to the Regional Internet Registries. More addresses will not be given. There are recommendations to the Internet Service Providers and client organizations to consider their approach for adopting the new Internet Protocol – IPv6. This cannot be done at the same time in the whole Internet,...
Conference Paper
Internet is near to one of the most important changes in its existence - the migration of core protocol IP to a new version IPv6. Along with other changes, one of the important results is that the IPv6 network will no longer cares for fragmentation. According recommendations the sending node is responsible to select proper size of packets to send....
Conference Paper
Video surveillance systems are important part of today's organizations. When there is no live observation of the cameras image, it is important to have some alarm mechanisms for detection of physical impact against the cameras. Most simple video systems can detect motion and/or loss of video signal, but are vulnerable to covering or spraying the ca...
Conference Paper
The modern recommendations regarding the IP fragmentation process is to avoid it. There are different possibilities regarding the OSI model layers to implement logic for avoiding fragmentation. The present study describes a possible algorithm about integrating the IP fragmentation avoiding logic into the application software.
Conference Paper
Most software applications do not consider the process of IP datagram fragmentation. They rely on the network for fragmenting packets or on the operating system's Path MTU Discovery algorithm for finding the best packet size for transmission without fragmentation. This behaviour is dangerous and in some cases can lead to particular or full miscommu...
Article
Full-text available
The heterogeneous nature of the Internet communications is transparent for the end user. One of the factors determining the transit delays is the presence of fragmentation and reassembly of the IP datagrams. The modern recommendations regarding the IP fragmentation process is to avoid it. There are different possibilities regarding the OSI model la...

Network

Cited By