diff --git a/docs/udelartex/capitulos/gestion.tex b/docs/udelartex/capitulos/gestion.tex
index a8ac552635e6688d99217710edc8ef2b40b6a942..a18c119b92749b2b01376a2074f749545451681a 100644
--- a/docs/udelartex/capitulos/gestion.tex
+++ b/docs/udelartex/capitulos/gestion.tex
@@ -444,4 +444,15 @@ echo 'flush_all' | nc $(awk -F '-l' '/^OPTIONS/ {print $2}' {{ memcached_conf_de
 
 \end{itemize}
 
+\section*{Conclusiones}
+Recapitulando todas las operaciones descritas en este capitulo podemos sacar varias conclusiones: 
+\begin{itemize}
+\item La presencia de fallas es algo que siempre hay que contemplar y en el caso de un Datacenter es primordial la celeridad y la conservación de los datos. Para lograr esto se deben tener políticas de respaldo tanto para el cluster de Galera y los almacenamientos de bloque. Por otro lado para restablecer el servicio como se describió en el capítulo puede requerir de una secuencia considerable de comandos o verificaciones, por lo tanto lo mejor es tener scripts para automatizar estas tareas ganando tiempo y consistencia.
+
+\item Por el lado de las modificaciones en el Datacenter tanto para escalarlo horizontalmente o actualizar la versión utilizada queda evidenciada a lo largo del capitulo la complejidad y los riesgos que conlleva realizar este tipo de tareas. Por esto siempre es recomendable realizar las tareas en un ambiente de desarrollo para evitar la mayor cantidad de problemas. 
+
+\item Alejarse de lo estándar como se realizó en este trabajo al utilizar como backend de almacenamiento Ceph puede presentar algunas complicaciones particulares de la tecnología o algún requerimiento para la misma en el proyecto OSA, como por ejemplo ocurrió al intentar actualizar de versión en donde se requiere que existan al menos 3 monitors en el cluster de Ceph. 
+
+\item Nuevamente se puede apreciar como junto a la evolución de OpenStack muchos de los problemas de las versiones anteriores son solucionados brindando mayor consistencia a los procesos.
+\end{itemize}
 
diff --git a/docs/udelartex/tesis.lof b/docs/udelartex/tesis.lof
index fc1f56d7dde2bcd840d01938bb774b78a654de6a..8ae14c46a694b03de89dbd6192b590f50b8b1da5 100644
--- a/docs/udelartex/tesis.lof
+++ b/docs/udelartex/tesis.lof
@@ -32,81 +32,81 @@
 \contentsline {figure}{\numberline {6.5}{\ignorespaces Salida a Internet en los nodos de Openstack.\relax }}{61}{figure.caption.70}%
 \addvspace {10\p@ }
 \addvspace {10\p@ }
-\contentsline {figure}{\numberline {8.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{83}{figure.caption.91}%
-\contentsline {figure}{\numberline {8.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{88}{figure.caption.94}%
-\contentsline {figure}{\numberline {8.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{88}{figure.caption.95}%
-\contentsline {figure}{\numberline {8.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{90}{figure.caption.96}%
-\contentsline {figure}{\numberline {8.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{91}{figure.caption.97}%
-\contentsline {figure}{\numberline {8.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{91}{figure.caption.99}%
-\contentsline {figure}{\numberline {8.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{92}{figure.caption.100}%
-\contentsline {figure}{\numberline {8.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{93}{figure.caption.102}%
-\contentsline {figure}{\numberline {8.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{100}{figure.caption.106}%
-\contentsline {figure}{\numberline {8.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{101}{figure.caption.110}%
-\contentsline {figure}{\numberline {8.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{101}{figure.caption.112}%
-\contentsline {figure}{\numberline {8.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{106}{figure.caption.116}%
-\contentsline {figure}{\numberline {8.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{107}{figure.caption.119}%
-\contentsline {figure}{\numberline {8.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{108}{figure.caption.121}%
-\contentsline {figure}{\numberline {8.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{109}{figure.caption.123}%
-\contentsline {figure}{\numberline {8.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{112}{figure.caption.127}%
-\contentsline {figure}{\numberline {8.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{112}{figure.caption.128}%
-\contentsline {figure}{\numberline {8.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{113}{figure.caption.131}%
-\contentsline {figure}{\numberline {8.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{114}{figure.caption.133}%
-\contentsline {figure}{\numberline {8.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{118}{figure.caption.134}%
-\contentsline {figure}{\numberline {8.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{125}{figure.caption.137}%
-\contentsline {figure}{\numberline {8.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{127}{figure.caption.138}%
-\contentsline {figure}{\numberline {8.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{131}{figure.caption.139}%
-\contentsline {figure}{\numberline {8.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{132}{figure.caption.140}%
-\contentsline {figure}{\numberline {8.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{132}{figure.caption.142}%
-\contentsline {figure}{\numberline {8.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{134}{figure.caption.143}%
-\contentsline {figure}{\numberline {8.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{135}{figure.caption.145}%
-\contentsline {figure}{\numberline {8.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{140}{figure.caption.149}%
-\contentsline {figure}{\numberline {8.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{141}{figure.caption.153}%
-\contentsline {figure}{\numberline {8.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{142}{figure.caption.155}%
-\contentsline {figure}{\numberline {8.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{146}{figure.caption.159}%
-\contentsline {figure}{\numberline {8.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{147}{figure.caption.162}%
-\contentsline {figure}{\numberline {8.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{148}{figure.caption.164}%
-\contentsline {figure}{\numberline {8.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{149}{figure.caption.166}%
-\contentsline {figure}{\numberline {8.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{152}{figure.caption.170}%
-\contentsline {figure}{\numberline {8.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{152}{figure.caption.171}%
-\contentsline {figure}{\numberline {8.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{153}{figure.caption.174}%
-\contentsline {figure}{\numberline {8.38}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos funcionales\relax }}{154}{figure.caption.176}%
-\contentsline {figure}{\numberline {8.39}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos luego de un fallo en uno de ellos\relax }}{154}{figure.caption.177}%
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{167}{figure.caption.183}%
-\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{168}{figure.caption.184}%
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{210}{figure.caption.205}%
-\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{211}{figure.caption.206}%
-\addvspace {10\p@ }
-\contentsline {figure}{\numberline {4.1}{\ignorespaces Vista del login de Horizon.\relax }}{218}{figure.caption.220}%
-\contentsline {figure}{\numberline {4.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{219}{figure.caption.222}%
-\contentsline {figure}{\numberline {4.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{220}{figure.caption.223}%
-\contentsline {figure}{\numberline {4.4}{\ignorespaces Creación de un usuario.\relax }}{221}{figure.caption.225}%
-\contentsline {figure}{\numberline {4.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{222}{figure.caption.227}%
-\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{222}{figure.caption.228}%
-\contentsline {figure}{\numberline {4.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{223}{figure.caption.230}%
-\contentsline {figure}{\numberline {4.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{224}{figure.caption.231}%
-\contentsline {figure}{\numberline {4.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{225}{figure.caption.233}%
-\contentsline {figure}{\numberline {4.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{226}{figure.caption.234}%
-\contentsline {figure}{\numberline {4.11}{\ignorespaces Creación de una red (1/3).\relax }}{227}{figure.caption.236}%
-\contentsline {figure}{\numberline {4.12}{\ignorespaces Creación de una red (2/3).\relax }}{227}{figure.caption.237}%
-\contentsline {figure}{\numberline {4.13}{\ignorespaces Creación de una red (3/3).\relax }}{228}{figure.caption.238}%
-\contentsline {figure}{\numberline {4.14}{\ignorespaces Creación de un router.\relax }}{228}{figure.caption.240}%
-\contentsline {figure}{\numberline {4.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{229}{figure.caption.242}%
-\contentsline {figure}{\numberline {4.16}{\ignorespaces Creación de una key pair.\relax }}{229}{figure.caption.244}%
-\contentsline {figure}{\numberline {4.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{230}{figure.caption.246}%
-\contentsline {figure}{\numberline {4.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{230}{figure.caption.247}%
-\contentsline {figure}{\numberline {4.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{231}{figure.caption.248}%
-\contentsline {figure}{\numberline {4.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{231}{figure.caption.249}%
-\contentsline {figure}{\numberline {4.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{232}{figure.caption.250}%
-\contentsline {figure}{\numberline {4.22}{\ignorespaces Asignación de floating IP.\relax }}{233}{figure.caption.251}%
-\contentsline {figure}{\numberline {4.23}{\ignorespaces Asociación de floating IP.\relax }}{234}{figure.caption.252}%
-\contentsline {figure}{\numberline {4.24}{\ignorespaces Reglas security group por defecto.\relax }}{234}{figure.caption.253}%
-\contentsline {figure}{\numberline {4.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{235}{figure.caption.254}%
-\contentsline {figure}{\numberline {4.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{235}{figure.caption.255}%
+\contentsline {figure}{\numberline {8.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{84}{figure.caption.92}%
+\contentsline {figure}{\numberline {8.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{89}{figure.caption.95}%
+\contentsline {figure}{\numberline {8.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{89}{figure.caption.96}%
+\contentsline {figure}{\numberline {8.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{91}{figure.caption.97}%
+\contentsline {figure}{\numberline {8.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{92}{figure.caption.98}%
+\contentsline {figure}{\numberline {8.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{92}{figure.caption.100}%
+\contentsline {figure}{\numberline {8.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{93}{figure.caption.101}%
+\contentsline {figure}{\numberline {8.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{94}{figure.caption.103}%
+\contentsline {figure}{\numberline {8.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{101}{figure.caption.107}%
+\contentsline {figure}{\numberline {8.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{102}{figure.caption.111}%
+\contentsline {figure}{\numberline {8.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{102}{figure.caption.113}%
+\contentsline {figure}{\numberline {8.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{107}{figure.caption.117}%
+\contentsline {figure}{\numberline {8.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{108}{figure.caption.120}%
+\contentsline {figure}{\numberline {8.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{109}{figure.caption.122}%
+\contentsline {figure}{\numberline {8.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{110}{figure.caption.124}%
+\contentsline {figure}{\numberline {8.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{113}{figure.caption.128}%
+\contentsline {figure}{\numberline {8.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{113}{figure.caption.129}%
+\contentsline {figure}{\numberline {8.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{114}{figure.caption.132}%
+\contentsline {figure}{\numberline {8.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{115}{figure.caption.134}%
+\contentsline {figure}{\numberline {8.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{119}{figure.caption.135}%
+\contentsline {figure}{\numberline {8.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{126}{figure.caption.138}%
+\contentsline {figure}{\numberline {8.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{128}{figure.caption.139}%
+\contentsline {figure}{\numberline {8.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{132}{figure.caption.140}%
+\contentsline {figure}{\numberline {8.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{133}{figure.caption.141}%
+\contentsline {figure}{\numberline {8.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{133}{figure.caption.143}%
+\contentsline {figure}{\numberline {8.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{135}{figure.caption.144}%
+\contentsline {figure}{\numberline {8.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{136}{figure.caption.146}%
+\contentsline {figure}{\numberline {8.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{141}{figure.caption.150}%
+\contentsline {figure}{\numberline {8.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{142}{figure.caption.154}%
+\contentsline {figure}{\numberline {8.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{143}{figure.caption.156}%
+\contentsline {figure}{\numberline {8.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{147}{figure.caption.160}%
+\contentsline {figure}{\numberline {8.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{148}{figure.caption.163}%
+\contentsline {figure}{\numberline {8.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{149}{figure.caption.165}%
+\contentsline {figure}{\numberline {8.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{150}{figure.caption.167}%
+\contentsline {figure}{\numberline {8.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{153}{figure.caption.171}%
+\contentsline {figure}{\numberline {8.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{153}{figure.caption.172}%
+\contentsline {figure}{\numberline {8.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{154}{figure.caption.175}%
+\contentsline {figure}{\numberline {8.38}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos funcionales\relax }}{155}{figure.caption.177}%
+\contentsline {figure}{\numberline {8.39}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos luego de un fallo en uno de ellos\relax }}{155}{figure.caption.178}%
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{168}{figure.caption.184}%
+\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{169}{figure.caption.185}%
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{211}{figure.caption.206}%
+\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{212}{figure.caption.207}%
+\addvspace {10\p@ }
+\contentsline {figure}{\numberline {4.1}{\ignorespaces Vista del login de Horizon.\relax }}{219}{figure.caption.221}%
+\contentsline {figure}{\numberline {4.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{220}{figure.caption.223}%
+\contentsline {figure}{\numberline {4.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{221}{figure.caption.224}%
+\contentsline {figure}{\numberline {4.4}{\ignorespaces Creación de un usuario.\relax }}{222}{figure.caption.226}%
+\contentsline {figure}{\numberline {4.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{223}{figure.caption.228}%
+\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{223}{figure.caption.229}%
+\contentsline {figure}{\numberline {4.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{224}{figure.caption.231}%
+\contentsline {figure}{\numberline {4.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{225}{figure.caption.232}%
+\contentsline {figure}{\numberline {4.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{226}{figure.caption.234}%
+\contentsline {figure}{\numberline {4.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{227}{figure.caption.235}%
+\contentsline {figure}{\numberline {4.11}{\ignorespaces Creación de una red (1/3).\relax }}{228}{figure.caption.237}%
+\contentsline {figure}{\numberline {4.12}{\ignorespaces Creación de una red (2/3).\relax }}{228}{figure.caption.238}%
+\contentsline {figure}{\numberline {4.13}{\ignorespaces Creación de una red (3/3).\relax }}{229}{figure.caption.239}%
+\contentsline {figure}{\numberline {4.14}{\ignorespaces Creación de un router.\relax }}{229}{figure.caption.241}%
+\contentsline {figure}{\numberline {4.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{230}{figure.caption.243}%
+\contentsline {figure}{\numberline {4.16}{\ignorespaces Creación de una key pair.\relax }}{230}{figure.caption.245}%
+\contentsline {figure}{\numberline {4.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{231}{figure.caption.247}%
+\contentsline {figure}{\numberline {4.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{231}{figure.caption.248}%
+\contentsline {figure}{\numberline {4.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{232}{figure.caption.249}%
+\contentsline {figure}{\numberline {4.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{232}{figure.caption.250}%
+\contentsline {figure}{\numberline {4.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{233}{figure.caption.251}%
+\contentsline {figure}{\numberline {4.22}{\ignorespaces Asignación de floating IP.\relax }}{234}{figure.caption.252}%
+\contentsline {figure}{\numberline {4.23}{\ignorespaces Asociación de floating IP.\relax }}{235}{figure.caption.253}%
+\contentsline {figure}{\numberline {4.24}{\ignorespaces Reglas security group por defecto.\relax }}{235}{figure.caption.254}%
+\contentsline {figure}{\numberline {4.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{236}{figure.caption.255}%
+\contentsline {figure}{\numberline {4.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{236}{figure.caption.256}%
 \addvspace {10\p@ }
 \contentsfinish 
diff --git a/docs/udelartex/tesis.out b/docs/udelartex/tesis.out
index 0fa031d602e2bb69ba758408907d0ca06b6b9ae2..692c78a217f0783ce785361dc47123c684f44ca8 100644
--- a/docs/udelartex/tesis.out
+++ b/docs/udelartex/tesis.out
@@ -80,11 +80,11 @@
 \BOOKMARK [2][-]{subsection.8.5.1}{Layer 3 High Availability}{section.8.5}% 80
 \BOOKMARK [0][-]{chapter.9}{Trabajo a futuro}{}% 81
 \BOOKMARK [0][-]{chapter.10}{Conclusiones}{}% 82
-\BOOKMARK [0][-]{chapter*.181}{Referencias bibliogr\341ficas}{}% 83
-\BOOKMARK [0][-]{chapter*.181}{Glosario}{}% 84
-\BOOKMARK [0][-]{section*.182}{Ap\351ndices}{}% 85
+\BOOKMARK [0][-]{chapter*.182}{Referencias bibliogr\341ficas}{}% 83
+\BOOKMARK [0][-]{chapter*.182}{Glosario}{}% 84
+\BOOKMARK [0][-]{section*.183}{Ap\351ndices}{}% 85
 \BOOKMARK [0][-]{appendix.Alph1}{Im\341genes}{}% 86
-\BOOKMARK [0][-]{section*.185}{Anexos}{}% 87
+\BOOKMARK [0][-]{section*.186}{Anexos}{}% 87
 \BOOKMARK [0][-]{appendix.Anexo.1}{Instalaci\363n versi\363n Queens}{}% 88
 \BOOKMARK [1][-]{section.Anexo.1.1}{Preparaci\363n de nodos}{appendix.Anexo.1}% 89
 \BOOKMARK [1][-]{section.Anexo.1.2}{Configuraci\363n}{appendix.Anexo.1}% 90
diff --git a/docs/udelartex/tesis.pdf b/docs/udelartex/tesis.pdf
index a5267e67a7c490c029cf9d77020d8adecce51658..9e82457f93ee17b5c399db5ba28476ee9c4a297b 100644
Binary files a/docs/udelartex/tesis.pdf and b/docs/udelartex/tesis.pdf differ
diff --git a/docs/udelartex/tesis.synctex.gz b/docs/udelartex/tesis.synctex.gz
index 08a343c6e535c3ea8c1cc67c1f74c276426ed9df..e69617c0f7377e55e5016f7c06c5fd8dfdbb64a3 100644
Binary files a/docs/udelartex/tesis.synctex.gz and b/docs/udelartex/tesis.synctex.gz differ
diff --git a/docs/udelartex/tesis.toc b/docs/udelartex/tesis.toc
index aaf19a6f9aaa07ec8301007ffde7b9260daf0967..e7c91bf380c5e32d66fef9ace4416c5ab3d59aea 100644
--- a/docs/udelartex/tesis.toc
+++ b/docs/udelartex/tesis.toc
@@ -100,135 +100,135 @@
 \contentsline {subsection}{\numberline {7.2.2}Eliminar un nodo de cómputo}{66}{subsection.7.2.2}%
 \contentsline {subsection}{\numberline {7.2.3}Infraestructura}{68}{subsection.7.2.3}%
 \contentsline {section}{\numberline {7.3}Actualizar versión}{72}{section.7.3}%
-\contentsline {chapter}{\numberline {8}Análisis del módulo de red}{77}{chapter.8}%
-\contentsline {section}{\numberline {8.1}Escenarios de prueba}{77}{section.8.1}%
-\contentsline {subsection}{\numberline {8.1.1}Escenario 1: tráfico este-oeste (misma red tenant)}{78}{subsection.8.1.1}%
-\contentsline {subsubsection}{\numberline {8.1.1.1}Composición del escenario}{78}{subsubsection.8.1.1.1}%
-\contentsline {subsection}{\numberline {8.1.2}Escenario 2: tráfico este-oeste (distintas redes tenant)}{79}{subsection.8.1.2}%
-\contentsline {subsubsection}{\numberline {8.1.2.1}Composición del escenario}{79}{subsubsection.8.1.2.1}%
-\contentsline {subsection}{\numberline {8.1.3}Escenario 3: tráfico norte-sur (acceso hacia el exterior)}{80}{subsection.8.1.3}%
-\contentsline {subsubsection}{\numberline {8.1.3.1}Composición del escenario}{81}{subsubsection.8.1.3.1}%
-\contentsline {subsection}{\numberline {8.1.4}Escenario 4: tráfico norte-sur (acceso desde el exterior)}{82}{subsection.8.1.4}%
-\contentsline {subsubsection}{\numberline {8.1.4.1}Composición del escenario}{82}{subsubsection.8.1.4.1}%
-\contentsline {section}{\numberline {8.2}Linux bridge}{82}{section.8.2}%
-\contentsline {subsection}{\numberline {8.2.1}Escenario 1}{83}{subsection.8.2.1}%
-\contentsline {subsubsection}{\numberline {8.2.1.1}Análisis de componentes}{84}{subsubsection.8.2.1.1}%
-\contentsline {subsubsection}{\numberline {8.2.1.2}Análisis de tráfico}{87}{subsubsection.8.2.1.2}%
-\contentsline {subparagraph}{Paso 1}{87}{section*.92}%
-\contentsline {subparagraph}{Paso 2}{87}{section*.93}%
-\contentsline {subparagraph}{Paso 3}{91}{section*.98}%
-\contentsline {subparagraph}{Paso 4}{92}{section*.101}%
-\contentsline {subsection}{\numberline {8.2.2}Escenario 2}{93}{subsection.8.2.2}%
-\contentsline {subsubsection}{\numberline {8.2.2.1}Análisis de componentes}{93}{subsubsection.8.2.2.1}%
-\contentsline {subsubsection}{\numberline {8.2.2.2}Análisis de tráfico}{99}{subsubsection.8.2.2.2}%
-\contentsline {subparagraph}{Paso 1}{99}{section*.103}%
-\contentsline {subparagraph}{Paso 2}{99}{section*.104}%
-\contentsline {subparagraph}{Paso 3}{99}{section*.105}%
-\contentsline {subparagraph}{Paso 4}{100}{section*.107}%
-\contentsline {subparagraph}{Paso 5}{100}{section*.108}%
-\contentsline {subparagraph}{Paso 6}{100}{section*.109}%
-\contentsline {subparagraph}{Paso 7}{100}{section*.111}%
-\contentsline {subsection}{\numberline {8.2.3}Escenario 3}{101}{subsection.8.2.3}%
-\contentsline {subsubsection}{\numberline {8.2.3.1}Análisis de componentes}{102}{subsubsection.8.2.3.1}%
-\contentsline {subsubsection}{\numberline {8.2.3.2}Análisis de tráfico}{105}{subsubsection.8.2.3.2}%
-\contentsline {subparagraph}{Paso 1}{105}{section*.113}%
-\contentsline {subparagraph}{Paso 2}{105}{section*.114}%
-\contentsline {subparagraph}{Paso 3}{105}{section*.115}%
-\contentsline {subparagraph}{Paso 4}{106}{section*.117}%
-\contentsline {subparagraph}{Paso 5}{106}{section*.118}%
-\contentsline {subparagraph}{Paso 6}{107}{section*.120}%
-\contentsline {subparagraph}{Paso 7}{108}{section*.122}%
-\contentsline {subsection}{\numberline {8.2.4}Escenario 4}{109}{subsection.8.2.4}%
-\contentsline {subsubsection}{\numberline {8.2.4.1}Análisis de componentes}{109}{subsubsection.8.2.4.1}%
-\contentsline {subsubsection}{\numberline {8.2.4.2}Análisis de tráfico}{111}{subsubsection.8.2.4.2}%
-\contentsline {subparagraph}{Paso 1}{111}{section*.124}%
-\contentsline {subparagraph}{Paso 2}{111}{section*.125}%
-\contentsline {subparagraph}{Paso 3}{111}{section*.126}%
-\contentsline {subparagraph}{Paso 4}{112}{section*.129}%
-\contentsline {subparagraph}{Paso 5}{112}{section*.130}%
-\contentsline {subparagraph}{Paso 6}{113}{section*.132}%
-\contentsline {section}{\numberline {8.3}Open vSwitch}{113}{section.8.3}%
-\contentsline {subsubsection}{\numberline {8.3.0.1}Archivos de configuración}{115}{subsubsection.8.3.0.1}%
-\contentsline {subsection}{\numberline {8.3.1}Escenario 1}{118}{subsection.8.3.1}%
-\contentsline {subsubsection}{\numberline {8.3.1.1}Análisis de componentes}{118}{subsubsection.8.3.1.1}%
-\contentsline {subsubsection}{\numberline {8.3.1.2}Análisis de tráfico}{124}{subsubsection.8.3.1.2}%
-\contentsline {subparagraph}{Paso 1}{124}{section*.135}%
-\contentsline {subparagraph}{Paso 2}{125}{section*.136}%
-\contentsline {subparagraph}{Paso 3}{132}{section*.141}%
-\contentsline {subparagraph}{Paso 4}{134}{section*.144}%
-\contentsline {subsection}{\numberline {8.3.2}Escenario 2}{135}{subsection.8.3.2}%
-\contentsline {subsubsection}{\numberline {8.3.2.1}Análisis de componentes}{135}{subsubsection.8.3.2.1}%
-\contentsline {subsubsection}{\numberline {8.3.2.2}Análisis de tráfico}{139}{subsubsection.8.3.2.2}%
-\contentsline {subparagraph}{Paso 1}{140}{section*.146}%
-\contentsline {subparagraph}{Paso 2}{140}{section*.147}%
-\contentsline {subparagraph}{Paso 3}{140}{section*.148}%
-\contentsline {subparagraph}{Paso 4}{140}{section*.150}%
-\contentsline {subparagraph}{Paso 5}{141}{section*.151}%
-\contentsline {subparagraph}{Paso 6}{141}{section*.152}%
-\contentsline {subparagraph}{Paso 7}{141}{section*.154}%
-\contentsline {subsection}{\numberline {8.3.3}Escenario 3}{142}{subsection.8.3.3}%
-\contentsline {subsubsection}{\numberline {8.3.3.1}Análisis de componentes}{142}{subsubsection.8.3.3.1}%
-\contentsline {subsubsection}{\numberline {8.3.3.2}Análisis de tráfico}{145}{subsubsection.8.3.3.2}%
-\contentsline {subparagraph}{Paso 1}{145}{section*.156}%
-\contentsline {subparagraph}{Paso 2}{145}{section*.157}%
-\contentsline {subparagraph}{Paso 3}{146}{section*.158}%
-\contentsline {subparagraph}{Paso 4}{146}{section*.160}%
-\contentsline {subparagraph}{Paso 5}{146}{section*.161}%
-\contentsline {subparagraph}{Paso 6}{148}{section*.163}%
-\contentsline {subparagraph}{Paso 7}{148}{section*.165}%
-\contentsline {subsection}{\numberline {8.3.4}Escenario 4}{149}{subsection.8.3.4}%
-\contentsline {subsubsection}{\numberline {8.3.4.1}Análisis de componentes}{149}{subsubsection.8.3.4.1}%
-\contentsline {subsubsection}{\numberline {8.3.4.2}Análisis de tráfico}{150}{subsubsection.8.3.4.2}%
-\contentsline {subparagraph}{Paso 1}{151}{section*.167}%
-\contentsline {subparagraph}{Paso 2}{151}{section*.168}%
-\contentsline {subparagraph}{Paso 3}{151}{section*.169}%
-\contentsline {subparagraph}{Paso 4}{153}{section*.172}%
-\contentsline {subparagraph}{Paso 5}{153}{section*.173}%
-\contentsline {subparagraph}{Paso 6}{153}{section*.175}%
-\contentsline {section}{\numberline {8.4}Comparativa de drivers}{153}{section.8.4}%
-\contentsline {section}{\numberline {8.5}Funcionalidades avanzadas}{153}{section.8.5}%
-\contentsline {subsection}{\numberline {8.5.1}Layer 3 High Availability}{153}{subsection.8.5.1}%
-\contentsline {chapter}{\numberline {9}Trabajo a futuro}{155}{chapter.9}%
-\contentsline {chapter}{\numberline {10}Conclusiones}{157}{chapter.10}%
-\contentsline {chapter}{Referencias bibliográficas}{158}{chapter*.181}%
-\contentsline {chapter}{Glosario}{164}{chapter*.181}%
-\contentsline {chapter}{\textbf {Apéndices}}{165}{section*.182}%
+\contentsline {chapter}{\numberline {8}Análisis del módulo de red}{78}{chapter.8}%
+\contentsline {section}{\numberline {8.1}Escenarios de prueba}{78}{section.8.1}%
+\contentsline {subsection}{\numberline {8.1.1}Escenario 1: tráfico este-oeste (misma red tenant)}{79}{subsection.8.1.1}%
+\contentsline {subsubsection}{\numberline {8.1.1.1}Composición del escenario}{79}{subsubsection.8.1.1.1}%
+\contentsline {subsection}{\numberline {8.1.2}Escenario 2: tráfico este-oeste (distintas redes tenant)}{80}{subsection.8.1.2}%
+\contentsline {subsubsection}{\numberline {8.1.2.1}Composición del escenario}{80}{subsubsection.8.1.2.1}%
+\contentsline {subsection}{\numberline {8.1.3}Escenario 3: tráfico norte-sur (acceso hacia el exterior)}{81}{subsection.8.1.3}%
+\contentsline {subsubsection}{\numberline {8.1.3.1}Composición del escenario}{82}{subsubsection.8.1.3.1}%
+\contentsline {subsection}{\numberline {8.1.4}Escenario 4: tráfico norte-sur (acceso desde el exterior)}{83}{subsection.8.1.4}%
+\contentsline {subsubsection}{\numberline {8.1.4.1}Composición del escenario}{83}{subsubsection.8.1.4.1}%
+\contentsline {section}{\numberline {8.2}Linux bridge}{83}{section.8.2}%
+\contentsline {subsection}{\numberline {8.2.1}Escenario 1}{84}{subsection.8.2.1}%
+\contentsline {subsubsection}{\numberline {8.2.1.1}Análisis de componentes}{85}{subsubsection.8.2.1.1}%
+\contentsline {subsubsection}{\numberline {8.2.1.2}Análisis de tráfico}{88}{subsubsection.8.2.1.2}%
+\contentsline {subparagraph}{Paso 1}{88}{section*.93}%
+\contentsline {subparagraph}{Paso 2}{88}{section*.94}%
+\contentsline {subparagraph}{Paso 3}{92}{section*.99}%
+\contentsline {subparagraph}{Paso 4}{93}{section*.102}%
+\contentsline {subsection}{\numberline {8.2.2}Escenario 2}{94}{subsection.8.2.2}%
+\contentsline {subsubsection}{\numberline {8.2.2.1}Análisis de componentes}{94}{subsubsection.8.2.2.1}%
+\contentsline {subsubsection}{\numberline {8.2.2.2}Análisis de tráfico}{100}{subsubsection.8.2.2.2}%
+\contentsline {subparagraph}{Paso 1}{100}{section*.104}%
+\contentsline {subparagraph}{Paso 2}{100}{section*.105}%
+\contentsline {subparagraph}{Paso 3}{100}{section*.106}%
+\contentsline {subparagraph}{Paso 4}{101}{section*.108}%
+\contentsline {subparagraph}{Paso 5}{101}{section*.109}%
+\contentsline {subparagraph}{Paso 6}{101}{section*.110}%
+\contentsline {subparagraph}{Paso 7}{101}{section*.112}%
+\contentsline {subsection}{\numberline {8.2.3}Escenario 3}{102}{subsection.8.2.3}%
+\contentsline {subsubsection}{\numberline {8.2.3.1}Análisis de componentes}{103}{subsubsection.8.2.3.1}%
+\contentsline {subsubsection}{\numberline {8.2.3.2}Análisis de tráfico}{106}{subsubsection.8.2.3.2}%
+\contentsline {subparagraph}{Paso 1}{106}{section*.114}%
+\contentsline {subparagraph}{Paso 2}{106}{section*.115}%
+\contentsline {subparagraph}{Paso 3}{106}{section*.116}%
+\contentsline {subparagraph}{Paso 4}{107}{section*.118}%
+\contentsline {subparagraph}{Paso 5}{107}{section*.119}%
+\contentsline {subparagraph}{Paso 6}{108}{section*.121}%
+\contentsline {subparagraph}{Paso 7}{109}{section*.123}%
+\contentsline {subsection}{\numberline {8.2.4}Escenario 4}{110}{subsection.8.2.4}%
+\contentsline {subsubsection}{\numberline {8.2.4.1}Análisis de componentes}{110}{subsubsection.8.2.4.1}%
+\contentsline {subsubsection}{\numberline {8.2.4.2}Análisis de tráfico}{112}{subsubsection.8.2.4.2}%
+\contentsline {subparagraph}{Paso 1}{112}{section*.125}%
+\contentsline {subparagraph}{Paso 2}{112}{section*.126}%
+\contentsline {subparagraph}{Paso 3}{112}{section*.127}%
+\contentsline {subparagraph}{Paso 4}{113}{section*.130}%
+\contentsline {subparagraph}{Paso 5}{113}{section*.131}%
+\contentsline {subparagraph}{Paso 6}{114}{section*.133}%
+\contentsline {section}{\numberline {8.3}Open vSwitch}{114}{section.8.3}%
+\contentsline {subsubsection}{\numberline {8.3.0.1}Archivos de configuración}{116}{subsubsection.8.3.0.1}%
+\contentsline {subsection}{\numberline {8.3.1}Escenario 1}{119}{subsection.8.3.1}%
+\contentsline {subsubsection}{\numberline {8.3.1.1}Análisis de componentes}{119}{subsubsection.8.3.1.1}%
+\contentsline {subsubsection}{\numberline {8.3.1.2}Análisis de tráfico}{125}{subsubsection.8.3.1.2}%
+\contentsline {subparagraph}{Paso 1}{125}{section*.136}%
+\contentsline {subparagraph}{Paso 2}{126}{section*.137}%
+\contentsline {subparagraph}{Paso 3}{133}{section*.142}%
+\contentsline {subparagraph}{Paso 4}{135}{section*.145}%
+\contentsline {subsection}{\numberline {8.3.2}Escenario 2}{136}{subsection.8.3.2}%
+\contentsline {subsubsection}{\numberline {8.3.2.1}Análisis de componentes}{136}{subsubsection.8.3.2.1}%
+\contentsline {subsubsection}{\numberline {8.3.2.2}Análisis de tráfico}{140}{subsubsection.8.3.2.2}%
+\contentsline {subparagraph}{Paso 1}{141}{section*.147}%
+\contentsline {subparagraph}{Paso 2}{141}{section*.148}%
+\contentsline {subparagraph}{Paso 3}{141}{section*.149}%
+\contentsline {subparagraph}{Paso 4}{141}{section*.151}%
+\contentsline {subparagraph}{Paso 5}{142}{section*.152}%
+\contentsline {subparagraph}{Paso 6}{142}{section*.153}%
+\contentsline {subparagraph}{Paso 7}{142}{section*.155}%
+\contentsline {subsection}{\numberline {8.3.3}Escenario 3}{143}{subsection.8.3.3}%
+\contentsline {subsubsection}{\numberline {8.3.3.1}Análisis de componentes}{143}{subsubsection.8.3.3.1}%
+\contentsline {subsubsection}{\numberline {8.3.3.2}Análisis de tráfico}{146}{subsubsection.8.3.3.2}%
+\contentsline {subparagraph}{Paso 1}{146}{section*.157}%
+\contentsline {subparagraph}{Paso 2}{146}{section*.158}%
+\contentsline {subparagraph}{Paso 3}{147}{section*.159}%
+\contentsline {subparagraph}{Paso 4}{147}{section*.161}%
+\contentsline {subparagraph}{Paso 5}{147}{section*.162}%
+\contentsline {subparagraph}{Paso 6}{149}{section*.164}%
+\contentsline {subparagraph}{Paso 7}{149}{section*.166}%
+\contentsline {subsection}{\numberline {8.3.4}Escenario 4}{150}{subsection.8.3.4}%
+\contentsline {subsubsection}{\numberline {8.3.4.1}Análisis de componentes}{150}{subsubsection.8.3.4.1}%
+\contentsline {subsubsection}{\numberline {8.3.4.2}Análisis de tráfico}{151}{subsubsection.8.3.4.2}%
+\contentsline {subparagraph}{Paso 1}{152}{section*.168}%
+\contentsline {subparagraph}{Paso 2}{152}{section*.169}%
+\contentsline {subparagraph}{Paso 3}{152}{section*.170}%
+\contentsline {subparagraph}{Paso 4}{154}{section*.173}%
+\contentsline {subparagraph}{Paso 5}{154}{section*.174}%
+\contentsline {subparagraph}{Paso 6}{154}{section*.176}%
+\contentsline {section}{\numberline {8.4}Comparativa de drivers}{154}{section.8.4}%
+\contentsline {section}{\numberline {8.5}Funcionalidades avanzadas}{154}{section.8.5}%
+\contentsline {subsection}{\numberline {8.5.1}Layer 3 High Availability}{154}{subsection.8.5.1}%
+\contentsline {chapter}{\numberline {9}Trabajo a futuro}{156}{chapter.9}%
+\contentsline {chapter}{\numberline {10}Conclusiones}{158}{chapter.10}%
+\contentsline {chapter}{Referencias bibliográficas}{159}{chapter*.182}%
+\contentsline {chapter}{Glosario}{165}{chapter*.182}%
+\contentsline {chapter}{\textbf {Apéndices}}{166}{section*.183}%
 \ttl@change@i {\@ne }{chapter}{13pt}{}{ Apéndice\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax 
 \ttl@change@v {chapter}{}{}{}\relax 
-\contentsline {chapter}{\numberline {1}Imágenes}{166}{appendix.Alph1}%
+\contentsline {chapter}{\numberline {1}Imágenes}{167}{appendix.Alph1}%
 \ttl@change@i {\@ne }{chapter}{0pt}{\vspace *{0.45cm}}{\thecontentslabel \quad }{}{\bfseries \hfill \contentspage }\relax 
 \ttl@change@v {chapter}{}{}{}\relax 
-\contentsline {chapter}{\textbf {Anexos}}{169}{section*.185}%
+\contentsline {chapter}{\textbf {Anexos}}{170}{section*.186}%
 \ttl@change@i {\@ne }{chapter}{13pt}{}{ Anexo\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax 
 \ttl@change@v {chapter}{}{}{}\relax 
-\contentsline {chapter}{\numberline {1}Instalación versión Queens}{170}{appendix.Anexo.1}%
-\contentsline {section}{\numberline {1.1}Preparación de nodos}{170}{section.Anexo.1.1}%
-\contentsline {section}{\numberline {1.2}Configuración}{179}{section.Anexo.1.2}%
-\contentsline {subsection}{\numberline {1.2.1}Configuración claves SSH}{179}{subsection.Anexo.1.2.1}%
-\contentsline {subsection}{\numberline {1.2.2}Archivos de configuración OSA}{180}{subsection.Anexo.1.2.2}%
-\contentsline {subsection}{\numberline {1.2.3}Generación de claves}{185}{subsection.Anexo.1.2.3}%
-\contentsline {subsection}{\numberline {1.2.4}Correcciones}{185}{subsection.Anexo.1.2.4}%
-\contentsline {subsubsection}{\numberline {1.2.4.1}SELinux}{185}{subsubsection.Anexo.1.2.4.1}%
-\contentsline {chapter}{\numberline {2}Instalación versión Stein}{186}{appendix.Anexo.2}%
-\contentsline {section}{\numberline {2.1}Preparación de nodos}{186}{section.Anexo.2.1}%
-\contentsline {section}{\numberline {2.2}Configuración archivos OSA}{199}{section.Anexo.2.2}%
-\contentsline {subsubsection}{\numberline {2.2.0.1}user\_variables.yml}{204}{subsubsection.Anexo.2.2.0.1}%
-\contentsline {section}{\numberline {2.3}Ejecución de playbooks}{206}{section.Anexo.2.3}%
-\contentsline {section}{\numberline {2.4}Cambios para driver OVS}{207}{section.Anexo.2.4}%
-\contentsline {chapter}{\numberline {3}Virtualización con KVM}{210}{appendix.Anexo.3}%
-\contentsline {section}{\numberline {3.1}Utilización virt-manager}{210}{section.Anexo.3.1}%
-\contentsline {subsection}{\numberline {3.1.1}Conexión remota}{210}{subsection.Anexo.3.1.1}%
-\contentsline {subsection}{\numberline {3.1.2}Creación de una red}{211}{subsection.Anexo.3.1.2}%
-\contentsline {subsection}{\numberline {3.1.3}Crear nodo}{213}{subsection.Anexo.3.1.3}%
-\contentsline {chapter}{\numberline {4}Interacción}{217}{appendix.Anexo.4}%
-\contentsline {section}{\numberline {4.1}Configuraciones de administrador}{218}{section.Anexo.4.1}%
-\contentsline {section}{\numberline {4.2}Interacción de un usuario}{224}{section.Anexo.4.2}%
-\contentsline {section}{\numberline {4.3}Acceso a una instancia}{232}{section.Anexo.4.3}%
-\contentsline {subsection}{\numberline {4.3.1}Por SPICE}{232}{subsection.Anexo.4.3.1}%
-\contentsline {subsection}{\numberline {4.3.2}Por SSH}{233}{subsection.Anexo.4.3.2}%
-\contentsline {subsubsection}{\numberline {4.3.2.1}Asociar una Floating IP a la instancia}{233}{subsubsection.Anexo.4.3.2.1}%
-\contentsline {subsubsection}{\numberline {4.3.2.2}Modificar security group}{234}{subsubsection.Anexo.4.3.2.2}%
-\contentsline {subsubsection}{\numberline {4.3.2.3}SSH}{235}{subsubsection.Anexo.4.3.2.3}%
-\contentsline {subsection}{\numberline {4.3.3}Por virsh}{236}{subsection.Anexo.4.3.3}%
-\contentsline {chapter}{\numberline {5}migrate\_instance.sh}{237}{appendix.Anexo.5}%
+\contentsline {chapter}{\numberline {1}Instalación versión Queens}{171}{appendix.Anexo.1}%
+\contentsline {section}{\numberline {1.1}Preparación de nodos}{171}{section.Anexo.1.1}%
+\contentsline {section}{\numberline {1.2}Configuración}{180}{section.Anexo.1.2}%
+\contentsline {subsection}{\numberline {1.2.1}Configuración claves SSH}{180}{subsection.Anexo.1.2.1}%
+\contentsline {subsection}{\numberline {1.2.2}Archivos de configuración OSA}{181}{subsection.Anexo.1.2.2}%
+\contentsline {subsection}{\numberline {1.2.3}Generación de claves}{186}{subsection.Anexo.1.2.3}%
+\contentsline {subsection}{\numberline {1.2.4}Correcciones}{186}{subsection.Anexo.1.2.4}%
+\contentsline {subsubsection}{\numberline {1.2.4.1}SELinux}{186}{subsubsection.Anexo.1.2.4.1}%
+\contentsline {chapter}{\numberline {2}Instalación versión Stein}{187}{appendix.Anexo.2}%
+\contentsline {section}{\numberline {2.1}Preparación de nodos}{187}{section.Anexo.2.1}%
+\contentsline {section}{\numberline {2.2}Configuración archivos OSA}{200}{section.Anexo.2.2}%
+\contentsline {subsubsection}{\numberline {2.2.0.1}user\_variables.yml}{205}{subsubsection.Anexo.2.2.0.1}%
+\contentsline {section}{\numberline {2.3}Ejecución de playbooks}{207}{section.Anexo.2.3}%
+\contentsline {section}{\numberline {2.4}Cambios para driver OVS}{208}{section.Anexo.2.4}%
+\contentsline {chapter}{\numberline {3}Virtualización con KVM}{211}{appendix.Anexo.3}%
+\contentsline {section}{\numberline {3.1}Utilización virt-manager}{211}{section.Anexo.3.1}%
+\contentsline {subsection}{\numberline {3.1.1}Conexión remota}{211}{subsection.Anexo.3.1.1}%
+\contentsline {subsection}{\numberline {3.1.2}Creación de una red}{212}{subsection.Anexo.3.1.2}%
+\contentsline {subsection}{\numberline {3.1.3}Crear nodo}{214}{subsection.Anexo.3.1.3}%
+\contentsline {chapter}{\numberline {4}Interacción}{218}{appendix.Anexo.4}%
+\contentsline {section}{\numberline {4.1}Configuraciones de administrador}{219}{section.Anexo.4.1}%
+\contentsline {section}{\numberline {4.2}Interacción de un usuario}{225}{section.Anexo.4.2}%
+\contentsline {section}{\numberline {4.3}Acceso a una instancia}{233}{section.Anexo.4.3}%
+\contentsline {subsection}{\numberline {4.3.1}Por SPICE}{233}{subsection.Anexo.4.3.1}%
+\contentsline {subsection}{\numberline {4.3.2}Por SSH}{234}{subsection.Anexo.4.3.2}%
+\contentsline {subsubsection}{\numberline {4.3.2.1}Asociar una Floating IP a la instancia}{234}{subsubsection.Anexo.4.3.2.1}%
+\contentsline {subsubsection}{\numberline {4.3.2.2}Modificar security group}{235}{subsubsection.Anexo.4.3.2.2}%
+\contentsline {subsubsection}{\numberline {4.3.2.3}SSH}{236}{subsubsection.Anexo.4.3.2.3}%
+\contentsline {subsection}{\numberline {4.3.3}Por virsh}{237}{subsection.Anexo.4.3.3}%
+\contentsline {chapter}{\numberline {5}migrate\_instance.sh}{238}{appendix.Anexo.5}%
 \contentsfinish 
diff --git a/docs/udelartex/tesis.xwm b/docs/udelartex/tesis.xwm
index a817c744382c5f7100cc8388460aded3198f966b..6d630b90abdec2753c891f54995ffd7d7e4af09e 100644
--- a/docs/udelartex/tesis.xwm
+++ b/docs/udelartex/tesis.xwm
@@ -1,2 +1,2 @@
 \relax 
-\xwmnewlabel{xwmlastpage}{{5}{238}{migrate\_instance.sh\relax }{lstnumber.-312.31}{}}
+\xwmnewlabel{xwmlastpage}{{5}{239}{migrate\_instance.sh\relax }{lstnumber.-312.31}{}}