diff --git a/docs/udelartex/capitulos/gestion.tex b/docs/udelartex/capitulos/gestion.tex
index 374103d97524dc40abc04398e0bdb7a00e7bb27c..a8ac552635e6688d99217710edc8ef2b40b6a942 100644
--- a/docs/udelartex/capitulos/gestion.tex
+++ b/docs/udelartex/capitulos/gestion.tex
@@ -315,5 +315,133 @@ $ openstack-ansible -vvv setup-everything.yml --limit @/root/add_host.limit >&1
 En la ejecución de la playbooks surgieron múltiples problemas relacionados on los distintos clusters, con el servidor de repositorio, entre otros, imposibilitando culminar con el proceso correctamente y por lo tanto no se pudo lograr agregar un nodo de infraestructura al Datacenter.
 
 \section{Actualizar versión}
+Al igual qe en las tareas previas se explica el proceso para ambas versiones utilizadas de OpenStack. Se explican los procedimientos realizados para llevar a cabo las actualizaciones de versiones mayores, mencionando los problemas que surgieron en el proceso y sus respectivas soluciones.  Las actualización solamente pueden ser realizadas entre liberaciones secuenciales. Dado que en el trabajo fueron utilizadas las versiones Queens y Stein se presenta una subsección para cada de estas.
+Por otro lado, las correcciones que se realizan dentro una versión se refieren como actualizaciones menores. Estas últimas no serán presentadas pero en [\path{https://docs.openstack.org/openstack-ansible/stein/admin/upgrades/minor-upgrades.html}] se detalla el proceso para llevarlas a cabo. 
+
+\subsubsection*{Queens a Rocky}
+En este caso se muestra como actualizar de la versión de Queens a Rocky. Siguiendo la guía [\path{https://docs.openstack.org/openstack-ansible/rocky/admin/upgrades/major-upgrades.html}] se muestran dos opciones para realizar la actualización: mediante un script o en forma manual. Una alerta que se muestra en el documento de referencia utilizado es que las actualizaciones se encuentran en constante desarrollo por lo tanto se recomienda testear el procedimiento en un ambiente de desarrollo.
+
+\textbf{Actualizar mediante un script}
+Para actualizar de versión siguiente este método se tiene que seguir los siguientes pasos:
+\begin{itemize}
+	\item Acceder al directorio raíz del repositorio: \$ cd /opt/openstack-ansible
+    \item Moverse al último tag estable de la versión a actualizar, en este caso la última liberación de Rocky es la 18.1.16:\\
+    \$ git checkout 18.1.16
+	\item Ejecutar el script:\\
+	\$ ./scripts/run-upgrade.sh
+	
+\end{itemize}
+
+Al utilizar este método surgieron varios problemas que no permitieron completar satisfactoriamente el proceso de actualización. Para detectar con mayor precisión los problemas y poder solucionarlos se tuvo que utilizar el método manual.
+
+\textbf{Actualizar en forma manual}
+Los siguientes pasos se corresponden a cada uno de los comandos que se ejecutan en el script \path{]run-upgrade.sh}. A continuación se muestra cada uno, junto a los problemas que surgieron con las respectivas soluciones.
+\begin{enumerate}
+\item Acceder a la última release estable de Rocky:
+\begin{lstlisting}
+$ git checkout 18.1.16
+\end{lstlisting}
+
+\item Definir variables a utilizar en la instalación:
+\begin{lstlisting}
+$ export MAIN_PATH="$(pwd)"
+$ export SCRIPTS_PATH="${MAIN_PATH}/scripts"
+$ export UPGRADE_PLAYBOOKS="${SCRIPTS_PATH}/upgrade-utilities/playbooks"
+\end{lstlisting}
+
+\item Remover variables del entorno existentes:
+\begin{lstlisting}
+$ unset ANSIBLE_INVENTORY
+\end{lstlisting}
+
+\item Preparar el ambiente para la nueva versión:
+\begin{lstlisting}
+$ ${SCRIPTS_PATH}/bootstrap-ansible.sh
+\end{lstlisting}
+
+\item Acceder al directorio playbooks
+\item Preparar el ambiente antes de ejecutar los principales script ejecutando los siguientes comandos:
+\begin{lstlisting}
+$ openstack-ansible "${UPGRADE_PLAYBOOKS}/ansible_fact_cleanup.yml"
+$ openstack-ansible "${UPGRADE_PLAYBOOKS}/deploy-config-changes.yml"
+$ openstack-ansible "${UPGRADE_PLAYBOOKS}/user-secrets-adjustment.yml"
+$ openstack-ansible "${UPGRADE_PLAYBOOKS}/pip-conf-removal.yml"
+$ openstack-ansible "${UPGRADE_PLAYBOOKS}/ceph-galaxy-removal.yml"
+$ openstack-ansible "${UPGRADE_PLAYBOOKS}/molteniron-role-removal.yml"
+\end{lstlisting}
+
+\item Antes de instalar la infraestructura  y OpenStack es necesario actualizar los hosts físicos:
+\begin{lstlisting}
+$ openstack-ansible setup-hosts.yml --limit '!galera_all:!rabbitmq_all'
+\end{lstlisting}
+Se excluyen los grupos de galera y rabbitmq para que los cluster no sufran modificaciones o reseteos.
+
+\item Por la excepción indicada en el paso anterior es necesario actualizar los contenedores correspondientes a galera y RabbitMQ independientemente:
+\begin{lstlisting}
+$ openstack-ansible lxc-containers-create.yml -e \
+'lxc_container_allow_restarts=false' --limit 'galera_all:rabbitmq_all'
+\end{lstlisting}
+
+\item Para que la configuración aplicada en el paso anterior tome efecto es necesario ejecutar el siguiente comando:
+\begin{lstlisting}
+$ openstack-ansible "${UPGRADE_PLAYBOOKS}/galera-cluster-rolling-restart.yml"
+\end{lstlisting}
+
+\item Actualizar la configuración de los servidores de repositorio:
+\begin{lstlisting}
+$ openstack-ansible repo-install.yml
+\end{lstlisting}
+
+\item Actualizar la configuración del HAproxy:
+\begin{lstlisting}
+$ openstack-ansible haproxy-install.yml
+\end{lstlisting}
+
+\item Luego de actualizar el servidor de repositorio se puede utilizar:
+\begin{lstlisting}
+$ openstack-ansible repo-use.yml
+\end{lstlisting}
+
+\item Actualiza la versión de MariaDB:
+\begin{lstlisting}
+$ openstack-ansible galera-install.yml -e 'galera_upgrade=true' 
+\end{lstlisting}
+ 
+\item Actualizar la infraestructura:
+\begin{lstlisting}
+$ openstack-ansible unbound-install.yml
+$ openstack-ansible memcached-install.yml
+$ openstack-ansible rabbitmq-install.yml -e 'rabbitmq_upgrade=true'
+$ openstack-ansible etcd-install.yml
+$ openstack-ansible utility-install.yml
+$ openstack-ansible rsyslog-install.yml
+
+\end{lstlisting}
+
+\item Limpiar todo el cache en Memcached:
+\begin{lstlisting}
+$ openstack-ansible "${UPGRADE_PLAYBOOKS}/memcached-flush.yml"
+\end{lstlisting}
+
+\item Actualizar OpenStack:
+\begin{lstlisting}
+$ openstack-ansible setup-openstack.yml
+\end{lstlisting}
+
+\end{enumerate}
+
+Los problemas que ocurrieron en la ejecución de estos pasos se listan a continuación:
+\begin{itemize}
+\item En el paso 7 se obtiene el siguiente mensaje de error: "msg": "Failure talking to yum: Cannot find a valid baseurl for repo: base/7/x86\_64". Investigando se llegó a que el archivo de /etc/yum.conf de los contenedores tenia configurado el \path{proxy=http://10.0.1.15:3142} indicando que se utilice el servidor de repositorios local. Para solucionarlo se modificó dicha variable en todos los contenedores del servidor de infraestructura. 
+
+\item En el paso 13 en donde se actualiza el MariaDB, a grandes rasgos lo que realiza es bajar el servicio, actualizar el MariaDB y luego continua haciendo modificaciones en la base. El problema es que el script no vuelve a iniciar el servicio de de bases de datos y por lo tanto al querer realizar cualquier operación sobre la base retorna un error. Para solucionarlo en el momento que finaliza la actualización en forma manual se inicializa el servicio mencionado en el contenedor de galera con el siguiente comando: \$ service mysql start.
+
+\item En el paso 15 se obtuvo un error debido a que el script proporcionado está pensado para ejecutar sobre un sistema Ubuntu, no contemplado que el archivo que se requiere parsear tiene un formato distinto en el sistema CentOS. Este bug fue reportado en [\path{https://bugs.launchpad.net/openstack-ansible/+bug/1783423}]. La solución fue cambiar el código de la última task en la playbook: 
+\begin{lstlisting}
+/opt/openstack-ansible/scripts/upgrade-utilities/playbooks/memcached-flush.yml por los siguientes comandos:
+echo 'flush_all' | nc $(awk -F '-l' '/^OPTIONS/ {print $2}' {{ memcached_conf_dest.get(ansible_os_family | lower) }} | awk '{ print $1 }') $(awk -F '"' '/^PORT/ {print $2}' {{ memcached_conf_dest.get(ansible_os_family | lower) }} )
+\end{lstlisting}
+
+\end{itemize}
 
 
diff --git a/docs/udelartex/tesis.lof b/docs/udelartex/tesis.lof
index 147e31f773c3faa3a5c9e91c1e475678cca760b0..8d799caf408c38e60b22d224949c7d9c0cb0ed77 100644
--- a/docs/udelartex/tesis.lof
+++ b/docs/udelartex/tesis.lof
@@ -32,81 +32,81 @@
 \contentsline {figure}{\numberline {6.5}{\ignorespaces Salida a Internet en los nodos de Openstack.\relax }}{61}{figure.caption.73}%
 \addvspace {10\p@ }
 \addvspace {10\p@ }
-\contentsline {figure}{\numberline {8.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{79}{figure.caption.93}%
-\contentsline {figure}{\numberline {8.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{84}{figure.caption.96}%
-\contentsline {figure}{\numberline {8.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{84}{figure.caption.97}%
-\contentsline {figure}{\numberline {8.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{86}{figure.caption.98}%
-\contentsline {figure}{\numberline {8.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{87}{figure.caption.99}%
-\contentsline {figure}{\numberline {8.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{87}{figure.caption.101}%
-\contentsline {figure}{\numberline {8.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{88}{figure.caption.102}%
-\contentsline {figure}{\numberline {8.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{89}{figure.caption.104}%
-\contentsline {figure}{\numberline {8.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{96}{figure.caption.108}%
-\contentsline {figure}{\numberline {8.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{97}{figure.caption.112}%
-\contentsline {figure}{\numberline {8.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{97}{figure.caption.114}%
-\contentsline {figure}{\numberline {8.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{102}{figure.caption.118}%
-\contentsline {figure}{\numberline {8.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{103}{figure.caption.121}%
-\contentsline {figure}{\numberline {8.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{104}{figure.caption.123}%
-\contentsline {figure}{\numberline {8.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{105}{figure.caption.125}%
-\contentsline {figure}{\numberline {8.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{108}{figure.caption.129}%
-\contentsline {figure}{\numberline {8.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{108}{figure.caption.130}%
-\contentsline {figure}{\numberline {8.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{109}{figure.caption.133}%
-\contentsline {figure}{\numberline {8.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{110}{figure.caption.135}%
-\contentsline {figure}{\numberline {8.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{114}{figure.caption.136}%
-\contentsline {figure}{\numberline {8.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{121}{figure.caption.139}%
-\contentsline {figure}{\numberline {8.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{123}{figure.caption.140}%
-\contentsline {figure}{\numberline {8.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{127}{figure.caption.141}%
-\contentsline {figure}{\numberline {8.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{128}{figure.caption.142}%
-\contentsline {figure}{\numberline {8.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{128}{figure.caption.144}%
-\contentsline {figure}{\numberline {8.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{130}{figure.caption.145}%
-\contentsline {figure}{\numberline {8.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{131}{figure.caption.147}%
-\contentsline {figure}{\numberline {8.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{136}{figure.caption.151}%
-\contentsline {figure}{\numberline {8.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{137}{figure.caption.155}%
-\contentsline {figure}{\numberline {8.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{138}{figure.caption.157}%
-\contentsline {figure}{\numberline {8.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{142}{figure.caption.161}%
-\contentsline {figure}{\numberline {8.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{143}{figure.caption.164}%
-\contentsline {figure}{\numberline {8.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{144}{figure.caption.166}%
-\contentsline {figure}{\numberline {8.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{145}{figure.caption.168}%
-\contentsline {figure}{\numberline {8.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{148}{figure.caption.172}%
-\contentsline {figure}{\numberline {8.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{148}{figure.caption.173}%
-\contentsline {figure}{\numberline {8.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{149}{figure.caption.176}%
-\contentsline {figure}{\numberline {8.38}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos funcionales\relax }}{150}{figure.caption.178}%
-\contentsline {figure}{\numberline {8.39}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos luego de un fallo en uno de ellos\relax }}{150}{figure.caption.179}%
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{163}{figure.caption.185}%
-\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{164}{figure.caption.186}%
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{206}{figure.caption.207}%
-\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{207}{figure.caption.208}%
-\addvspace {10\p@ }
-\contentsline {figure}{\numberline {4.1}{\ignorespaces Vista del login de Horizon.\relax }}{214}{figure.caption.222}%
-\contentsline {figure}{\numberline {4.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{215}{figure.caption.224}%
-\contentsline {figure}{\numberline {4.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{216}{figure.caption.225}%
-\contentsline {figure}{\numberline {4.4}{\ignorespaces Creación de un usuario.\relax }}{217}{figure.caption.227}%
-\contentsline {figure}{\numberline {4.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{218}{figure.caption.229}%
-\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{218}{figure.caption.230}%
-\contentsline {figure}{\numberline {4.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{219}{figure.caption.232}%
-\contentsline {figure}{\numberline {4.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{220}{figure.caption.233}%
-\contentsline {figure}{\numberline {4.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{221}{figure.caption.235}%
-\contentsline {figure}{\numberline {4.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{222}{figure.caption.236}%
-\contentsline {figure}{\numberline {4.11}{\ignorespaces Creación de una red (1/3).\relax }}{223}{figure.caption.238}%
-\contentsline {figure}{\numberline {4.12}{\ignorespaces Creación de una red (2/3).\relax }}{223}{figure.caption.239}%
-\contentsline {figure}{\numberline {4.13}{\ignorespaces Creación de una red (3/3).\relax }}{224}{figure.caption.240}%
-\contentsline {figure}{\numberline {4.14}{\ignorespaces Creación de un router.\relax }}{224}{figure.caption.242}%
-\contentsline {figure}{\numberline {4.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{225}{figure.caption.244}%
-\contentsline {figure}{\numberline {4.16}{\ignorespaces Creación de una key pair.\relax }}{225}{figure.caption.246}%
-\contentsline {figure}{\numberline {4.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{226}{figure.caption.248}%
-\contentsline {figure}{\numberline {4.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{226}{figure.caption.249}%
-\contentsline {figure}{\numberline {4.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{227}{figure.caption.250}%
-\contentsline {figure}{\numberline {4.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{227}{figure.caption.251}%
-\contentsline {figure}{\numberline {4.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{228}{figure.caption.252}%
-\contentsline {figure}{\numberline {4.22}{\ignorespaces Asignación de floating IP.\relax }}{229}{figure.caption.253}%
-\contentsline {figure}{\numberline {4.23}{\ignorespaces Asociación de floating IP.\relax }}{230}{figure.caption.254}%
-\contentsline {figure}{\numberline {4.24}{\ignorespaces Reglas security group por defecto.\relax }}{230}{figure.caption.255}%
-\contentsline {figure}{\numberline {4.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{231}{figure.caption.256}%
-\contentsline {figure}{\numberline {4.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{231}{figure.caption.257}%
+\contentsline {figure}{\numberline {8.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{83}{figure.caption.94}%
+\contentsline {figure}{\numberline {8.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{88}{figure.caption.97}%
+\contentsline {figure}{\numberline {8.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{88}{figure.caption.98}%
+\contentsline {figure}{\numberline {8.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{90}{figure.caption.99}%
+\contentsline {figure}{\numberline {8.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{91}{figure.caption.100}%
+\contentsline {figure}{\numberline {8.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{91}{figure.caption.102}%
+\contentsline {figure}{\numberline {8.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{92}{figure.caption.103}%
+\contentsline {figure}{\numberline {8.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{93}{figure.caption.105}%
+\contentsline {figure}{\numberline {8.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{100}{figure.caption.109}%
+\contentsline {figure}{\numberline {8.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{101}{figure.caption.113}%
+\contentsline {figure}{\numberline {8.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{101}{figure.caption.115}%
+\contentsline {figure}{\numberline {8.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{106}{figure.caption.119}%
+\contentsline {figure}{\numberline {8.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{107}{figure.caption.122}%
+\contentsline {figure}{\numberline {8.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{108}{figure.caption.124}%
+\contentsline {figure}{\numberline {8.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{109}{figure.caption.126}%
+\contentsline {figure}{\numberline {8.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{112}{figure.caption.130}%
+\contentsline {figure}{\numberline {8.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{112}{figure.caption.131}%
+\contentsline {figure}{\numberline {8.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{113}{figure.caption.134}%
+\contentsline {figure}{\numberline {8.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{114}{figure.caption.136}%
+\contentsline {figure}{\numberline {8.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{118}{figure.caption.137}%
+\contentsline {figure}{\numberline {8.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{125}{figure.caption.140}%
+\contentsline {figure}{\numberline {8.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{127}{figure.caption.141}%
+\contentsline {figure}{\numberline {8.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{131}{figure.caption.142}%
+\contentsline {figure}{\numberline {8.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{132}{figure.caption.143}%
+\contentsline {figure}{\numberline {8.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{132}{figure.caption.145}%
+\contentsline {figure}{\numberline {8.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{134}{figure.caption.146}%
+\contentsline {figure}{\numberline {8.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{135}{figure.caption.148}%
+\contentsline {figure}{\numberline {8.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{140}{figure.caption.152}%
+\contentsline {figure}{\numberline {8.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{141}{figure.caption.156}%
+\contentsline {figure}{\numberline {8.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{142}{figure.caption.158}%
+\contentsline {figure}{\numberline {8.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{146}{figure.caption.162}%
+\contentsline {figure}{\numberline {8.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{147}{figure.caption.165}%
+\contentsline {figure}{\numberline {8.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{148}{figure.caption.167}%
+\contentsline {figure}{\numberline {8.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{149}{figure.caption.169}%
+\contentsline {figure}{\numberline {8.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{152}{figure.caption.173}%
+\contentsline {figure}{\numberline {8.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{152}{figure.caption.174}%
+\contentsline {figure}{\numberline {8.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{153}{figure.caption.177}%
+\contentsline {figure}{\numberline {8.38}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos funcionales\relax }}{154}{figure.caption.179}%
+\contentsline {figure}{\numberline {8.39}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos luego de un fallo en uno de ellos\relax }}{154}{figure.caption.180}%
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{167}{figure.caption.186}%
+\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{168}{figure.caption.187}%
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{210}{figure.caption.208}%
+\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{211}{figure.caption.209}%
+\addvspace {10\p@ }
+\contentsline {figure}{\numberline {4.1}{\ignorespaces Vista del login de Horizon.\relax }}{218}{figure.caption.223}%
+\contentsline {figure}{\numberline {4.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{219}{figure.caption.225}%
+\contentsline {figure}{\numberline {4.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{220}{figure.caption.226}%
+\contentsline {figure}{\numberline {4.4}{\ignorespaces Creación de un usuario.\relax }}{221}{figure.caption.228}%
+\contentsline {figure}{\numberline {4.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{222}{figure.caption.230}%
+\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{222}{figure.caption.231}%
+\contentsline {figure}{\numberline {4.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{223}{figure.caption.233}%
+\contentsline {figure}{\numberline {4.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{224}{figure.caption.234}%
+\contentsline {figure}{\numberline {4.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{225}{figure.caption.236}%
+\contentsline {figure}{\numberline {4.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{226}{figure.caption.237}%
+\contentsline {figure}{\numberline {4.11}{\ignorespaces Creación de una red (1/3).\relax }}{227}{figure.caption.239}%
+\contentsline {figure}{\numberline {4.12}{\ignorespaces Creación de una red (2/3).\relax }}{227}{figure.caption.240}%
+\contentsline {figure}{\numberline {4.13}{\ignorespaces Creación de una red (3/3).\relax }}{228}{figure.caption.241}%
+\contentsline {figure}{\numberline {4.14}{\ignorespaces Creación de un router.\relax }}{228}{figure.caption.243}%
+\contentsline {figure}{\numberline {4.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{229}{figure.caption.245}%
+\contentsline {figure}{\numberline {4.16}{\ignorespaces Creación de una key pair.\relax }}{229}{figure.caption.247}%
+\contentsline {figure}{\numberline {4.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{230}{figure.caption.249}%
+\contentsline {figure}{\numberline {4.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{230}{figure.caption.250}%
+\contentsline {figure}{\numberline {4.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{231}{figure.caption.251}%
+\contentsline {figure}{\numberline {4.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{231}{figure.caption.252}%
+\contentsline {figure}{\numberline {4.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{232}{figure.caption.253}%
+\contentsline {figure}{\numberline {4.22}{\ignorespaces Asignación de floating IP.\relax }}{233}{figure.caption.254}%
+\contentsline {figure}{\numberline {4.23}{\ignorespaces Asociación de floating IP.\relax }}{234}{figure.caption.255}%
+\contentsline {figure}{\numberline {4.24}{\ignorespaces Reglas security group por defecto.\relax }}{234}{figure.caption.256}%
+\contentsline {figure}{\numberline {4.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{235}{figure.caption.257}%
+\contentsline {figure}{\numberline {4.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{235}{figure.caption.258}%
 \addvspace {10\p@ }
 \contentsfinish 
diff --git a/docs/udelartex/tesis.lot b/docs/udelartex/tesis.lot
index fbc63fbdc19d6eda3cf17cc73762f996f5e93a3d..0962ac17ebdebd00b22f3589a45a084ba8810b47 100644
--- a/docs/udelartex/tesis.lot
+++ b/docs/udelartex/tesis.lot
@@ -9,24 +9,24 @@
 \addvspace {10\p@ }
 \addvspace {10\p@ }
 \addvspace {10\p@ }
-\contentsline {table}{\numberline {8.1}{\ignorespaces Sabores creados para análisis de red\relax }}{73}{table.caption.75}%
-\contentsline {table}{\numberline {8.2}{\ignorespaces Imágenes creadas para análisis de red\relax }}{73}{table.caption.76}%
-\contentsline {table}{\numberline {8.3}{\ignorespaces Redes provider creadas para análisis de red\relax }}{74}{table.caption.77}%
-\contentsline {table}{\numberline {8.4}{\ignorespaces Subredes provider creadas para análisis de red\relax }}{74}{table.caption.78}%
-\contentsline {table}{\numberline {8.5}{\ignorespaces Escenario 1: detalles de la subred 1\relax }}{75}{table.caption.79}%
-\contentsline {table}{\numberline {8.6}{\ignorespaces Escenario 1: detalles de las instancias\relax }}{75}{table.caption.80}%
-\contentsline {table}{\numberline {8.7}{\ignorespaces Escenario 2: detalles de la subred 1\relax }}{76}{table.caption.81}%
-\contentsline {table}{\numberline {8.8}{\ignorespaces Escenario 2: detalles de la subred 2\relax }}{76}{table.caption.82}%
-\contentsline {table}{\numberline {8.9}{\ignorespaces Escenario 2: detalles de las instancias\relax }}{76}{table.caption.83}%
-\contentsline {table}{\numberline {8.10}{\ignorespaces Escenario 2: detalles del router\relax }}{76}{table.caption.84}%
-\contentsline {table}{\numberline {8.11}{\ignorespaces Escenario 3: detalles de la subred 1\relax }}{77}{table.caption.85}%
-\contentsline {table}{\numberline {8.12}{\ignorespaces Escenario 3: detalles de la subred provider vlan\relax }}{77}{table.caption.86}%
-\contentsline {table}{\numberline {8.13}{\ignorespaces Escenario 3: detalles de las instancias\relax }}{77}{table.caption.87}%
-\contentsline {table}{\numberline {8.14}{\ignorespaces Escenario 3: detalles del router\relax }}{77}{table.caption.88}%
-\contentsline {table}{\numberline {8.15}{\ignorespaces Escenario 4: detalles de la subred 1\relax }}{78}{table.caption.89}%
-\contentsline {table}{\numberline {8.16}{\ignorespaces Escenario 4: detalles de la subred provider vlan\relax }}{79}{table.caption.90}%
-\contentsline {table}{\numberline {8.17}{\ignorespaces Escenario 4: detalles de las instancias\relax }}{79}{table.caption.91}%
-\contentsline {table}{\numberline {8.18}{\ignorespaces Escenario 4: detalles del router\relax }}{79}{table.caption.92}%
+\contentsline {table}{\numberline {8.1}{\ignorespaces Sabores creados para análisis de red\relax }}{77}{table.caption.76}%
+\contentsline {table}{\numberline {8.2}{\ignorespaces Imágenes creadas para análisis de red\relax }}{77}{table.caption.77}%
+\contentsline {table}{\numberline {8.3}{\ignorespaces Redes provider creadas para análisis de red\relax }}{78}{table.caption.78}%
+\contentsline {table}{\numberline {8.4}{\ignorespaces Subredes provider creadas para análisis de red\relax }}{78}{table.caption.79}%
+\contentsline {table}{\numberline {8.5}{\ignorespaces Escenario 1: detalles de la subred 1\relax }}{79}{table.caption.80}%
+\contentsline {table}{\numberline {8.6}{\ignorespaces Escenario 1: detalles de las instancias\relax }}{79}{table.caption.81}%
+\contentsline {table}{\numberline {8.7}{\ignorespaces Escenario 2: detalles de la subred 1\relax }}{80}{table.caption.82}%
+\contentsline {table}{\numberline {8.8}{\ignorespaces Escenario 2: detalles de la subred 2\relax }}{80}{table.caption.83}%
+\contentsline {table}{\numberline {8.9}{\ignorespaces Escenario 2: detalles de las instancias\relax }}{80}{table.caption.84}%
+\contentsline {table}{\numberline {8.10}{\ignorespaces Escenario 2: detalles del router\relax }}{80}{table.caption.85}%
+\contentsline {table}{\numberline {8.11}{\ignorespaces Escenario 3: detalles de la subred 1\relax }}{81}{table.caption.86}%
+\contentsline {table}{\numberline {8.12}{\ignorespaces Escenario 3: detalles de la subred provider vlan\relax }}{81}{table.caption.87}%
+\contentsline {table}{\numberline {8.13}{\ignorespaces Escenario 3: detalles de las instancias\relax }}{81}{table.caption.88}%
+\contentsline {table}{\numberline {8.14}{\ignorespaces Escenario 3: detalles del router\relax }}{81}{table.caption.89}%
+\contentsline {table}{\numberline {8.15}{\ignorespaces Escenario 4: detalles de la subred 1\relax }}{82}{table.caption.90}%
+\contentsline {table}{\numberline {8.16}{\ignorespaces Escenario 4: detalles de la subred provider vlan\relax }}{83}{table.caption.91}%
+\contentsline {table}{\numberline {8.17}{\ignorespaces Escenario 4: detalles de las instancias\relax }}{83}{table.caption.92}%
+\contentsline {table}{\numberline {8.18}{\ignorespaces Escenario 4: detalles del router\relax }}{83}{table.caption.93}%
 \addvspace {10\p@ }
 \addvspace {10\p@ }
 \addvspace {10\p@ }
diff --git a/docs/udelartex/tesis.out b/docs/udelartex/tesis.out
index 3fb8489bb34b3373d5d0533769400367738f49e1..a3c5e33d7cb0f01fbbaed5e21ac8978f861076ea 100644
--- a/docs/udelartex/tesis.out
+++ b/docs/udelartex/tesis.out
@@ -82,11 +82,11 @@
 \BOOKMARK [2][-]{subsection.8.5.1}{Layer 3 High Availability}{section.8.5}% 82
 \BOOKMARK [0][-]{chapter.9}{Trabajo a futuro}{}% 83
 \BOOKMARK [0][-]{chapter.10}{Conclusiones}{}% 84
-\BOOKMARK [0][-]{chapter*.183}{Referencias bibliogr\341ficas}{}% 85
-\BOOKMARK [0][-]{chapter*.183}{Glosario}{}% 86
-\BOOKMARK [0][-]{section*.184}{Ap\351ndices}{}% 87
+\BOOKMARK [0][-]{chapter*.184}{Referencias bibliogr\341ficas}{}% 85
+\BOOKMARK [0][-]{chapter*.184}{Glosario}{}% 86
+\BOOKMARK [0][-]{section*.185}{Ap\351ndices}{}% 87
 \BOOKMARK [0][-]{appendix.Alph1}{Im\341genes}{}% 88
-\BOOKMARK [0][-]{section*.187}{Anexos}{}% 89
+\BOOKMARK [0][-]{section*.188}{Anexos}{}% 89
 \BOOKMARK [0][-]{appendix.Anexo.1}{Instalaci\363n versi\363n Queens}{}% 90
 \BOOKMARK [1][-]{section.Anexo.1.1}{Preparaci\363n de nodos}{appendix.Anexo.1}% 91
 \BOOKMARK [1][-]{section.Anexo.1.2}{Configuraci\363n}{appendix.Anexo.1}% 92
diff --git a/docs/udelartex/tesis.pdf b/docs/udelartex/tesis.pdf
index 979c78773923b4567443ca6c9798f912c7ad26d0..57f05d0daa8b8133db24086db17f9fa23aafc258 100644
Binary files a/docs/udelartex/tesis.pdf and b/docs/udelartex/tesis.pdf differ
diff --git a/docs/udelartex/tesis.synctex.gz b/docs/udelartex/tesis.synctex.gz
index ca7df2b81814a0b1fb3f9d84a75f753e752816c8..928b8d87b16d5075cefe4615701d83b1823c1f97 100644
Binary files a/docs/udelartex/tesis.synctex.gz and b/docs/udelartex/tesis.synctex.gz differ
diff --git a/docs/udelartex/tesis.toc b/docs/udelartex/tesis.toc
index d65c6ead51876f6884c6100303e830f1865c3ec1..cca51f6278f2ce5f8b5a9c83e383134584bd8389 100644
--- a/docs/udelartex/tesis.toc
+++ b/docs/udelartex/tesis.toc
@@ -102,135 +102,135 @@
 \contentsline {subsection}{\numberline {7.2.2}Eliminar un nodo de cómputo}{66}{subsection.7.2.2}%
 \contentsline {subsection}{\numberline {7.2.3}Infraestructura}{68}{subsection.7.2.3}%
 \contentsline {section}{\numberline {7.3}Actualizar versión}{72}{section.7.3}%
-\contentsline {chapter}{\numberline {8}Análisis del módulo de red}{73}{chapter.8}%
-\contentsline {section}{\numberline {8.1}Escenarios de prueba}{73}{section.8.1}%
-\contentsline {subsection}{\numberline {8.1.1}Escenario 1: tráfico este-oeste (misma red tenant)}{74}{subsection.8.1.1}%
-\contentsline {subsubsection}{\numberline {8.1.1.1}Composición del escenario}{74}{subsubsection.8.1.1.1}%
-\contentsline {subsection}{\numberline {8.1.2}Escenario 2: tráfico este-oeste (distintas redes tenant)}{75}{subsection.8.1.2}%
-\contentsline {subsubsection}{\numberline {8.1.2.1}Composición del escenario}{75}{subsubsection.8.1.2.1}%
-\contentsline {subsection}{\numberline {8.1.3}Escenario 3: tráfico norte-sur (acceso hacia el exterior)}{76}{subsection.8.1.3}%
-\contentsline {subsubsection}{\numberline {8.1.3.1}Composición del escenario}{77}{subsubsection.8.1.3.1}%
-\contentsline {subsection}{\numberline {8.1.4}Escenario 4: tráfico norte-sur (acceso desde el exterior)}{78}{subsection.8.1.4}%
-\contentsline {subsubsection}{\numberline {8.1.4.1}Composición del escenario}{78}{subsubsection.8.1.4.1}%
-\contentsline {section}{\numberline {8.2}Linux bridge}{78}{section.8.2}%
-\contentsline {subsection}{\numberline {8.2.1}Escenario 1}{79}{subsection.8.2.1}%
-\contentsline {subsubsection}{\numberline {8.2.1.1}Análisis de componentes}{80}{subsubsection.8.2.1.1}%
-\contentsline {subsubsection}{\numberline {8.2.1.2}Análisis de tráfico}{83}{subsubsection.8.2.1.2}%
-\contentsline {subparagraph}{Paso 1}{83}{section*.94}%
-\contentsline {subparagraph}{Paso 2}{83}{section*.95}%
-\contentsline {subparagraph}{Paso 3}{87}{section*.100}%
-\contentsline {subparagraph}{Paso 4}{88}{section*.103}%
-\contentsline {subsection}{\numberline {8.2.2}Escenario 2}{89}{subsection.8.2.2}%
-\contentsline {subsubsection}{\numberline {8.2.2.1}Análisis de componentes}{89}{subsubsection.8.2.2.1}%
-\contentsline {subsubsection}{\numberline {8.2.2.2}Análisis de tráfico}{95}{subsubsection.8.2.2.2}%
-\contentsline {subparagraph}{Paso 1}{95}{section*.105}%
-\contentsline {subparagraph}{Paso 2}{95}{section*.106}%
-\contentsline {subparagraph}{Paso 3}{95}{section*.107}%
-\contentsline {subparagraph}{Paso 4}{96}{section*.109}%
-\contentsline {subparagraph}{Paso 5}{96}{section*.110}%
-\contentsline {subparagraph}{Paso 6}{96}{section*.111}%
-\contentsline {subparagraph}{Paso 7}{96}{section*.113}%
-\contentsline {subsection}{\numberline {8.2.3}Escenario 3}{97}{subsection.8.2.3}%
-\contentsline {subsubsection}{\numberline {8.2.3.1}Análisis de componentes}{98}{subsubsection.8.2.3.1}%
-\contentsline {subsubsection}{\numberline {8.2.3.2}Análisis de tráfico}{101}{subsubsection.8.2.3.2}%
-\contentsline {subparagraph}{Paso 1}{101}{section*.115}%
-\contentsline {subparagraph}{Paso 2}{101}{section*.116}%
-\contentsline {subparagraph}{Paso 3}{101}{section*.117}%
-\contentsline {subparagraph}{Paso 4}{102}{section*.119}%
-\contentsline {subparagraph}{Paso 5}{102}{section*.120}%
-\contentsline {subparagraph}{Paso 6}{103}{section*.122}%
-\contentsline {subparagraph}{Paso 7}{104}{section*.124}%
-\contentsline {subsection}{\numberline {8.2.4}Escenario 4}{105}{subsection.8.2.4}%
-\contentsline {subsubsection}{\numberline {8.2.4.1}Análisis de componentes}{105}{subsubsection.8.2.4.1}%
-\contentsline {subsubsection}{\numberline {8.2.4.2}Análisis de tráfico}{107}{subsubsection.8.2.4.2}%
-\contentsline {subparagraph}{Paso 1}{107}{section*.126}%
-\contentsline {subparagraph}{Paso 2}{107}{section*.127}%
-\contentsline {subparagraph}{Paso 3}{107}{section*.128}%
-\contentsline {subparagraph}{Paso 4}{108}{section*.131}%
-\contentsline {subparagraph}{Paso 5}{108}{section*.132}%
-\contentsline {subparagraph}{Paso 6}{109}{section*.134}%
-\contentsline {section}{\numberline {8.3}Open vSwitch}{109}{section.8.3}%
-\contentsline {subsubsection}{\numberline {8.3.0.1}Archivos de configuración}{111}{subsubsection.8.3.0.1}%
-\contentsline {subsection}{\numberline {8.3.1}Escenario 1}{114}{subsection.8.3.1}%
-\contentsline {subsubsection}{\numberline {8.3.1.1}Análisis de componentes}{114}{subsubsection.8.3.1.1}%
-\contentsline {subsubsection}{\numberline {8.3.1.2}Análisis de tráfico}{120}{subsubsection.8.3.1.2}%
-\contentsline {subparagraph}{Paso 1}{120}{section*.137}%
-\contentsline {subparagraph}{Paso 2}{121}{section*.138}%
-\contentsline {subparagraph}{Paso 3}{128}{section*.143}%
-\contentsline {subparagraph}{Paso 4}{130}{section*.146}%
-\contentsline {subsection}{\numberline {8.3.2}Escenario 2}{131}{subsection.8.3.2}%
-\contentsline {subsubsection}{\numberline {8.3.2.1}Análisis de componentes}{131}{subsubsection.8.3.2.1}%
-\contentsline {subsubsection}{\numberline {8.3.2.2}Análisis de tráfico}{135}{subsubsection.8.3.2.2}%
-\contentsline {subparagraph}{Paso 1}{136}{section*.148}%
-\contentsline {subparagraph}{Paso 2}{136}{section*.149}%
-\contentsline {subparagraph}{Paso 3}{136}{section*.150}%
-\contentsline {subparagraph}{Paso 4}{136}{section*.152}%
-\contentsline {subparagraph}{Paso 5}{137}{section*.153}%
-\contentsline {subparagraph}{Paso 6}{137}{section*.154}%
-\contentsline {subparagraph}{Paso 7}{137}{section*.156}%
-\contentsline {subsection}{\numberline {8.3.3}Escenario 3}{138}{subsection.8.3.3}%
-\contentsline {subsubsection}{\numberline {8.3.3.1}Análisis de componentes}{138}{subsubsection.8.3.3.1}%
-\contentsline {subsubsection}{\numberline {8.3.3.2}Análisis de tráfico}{141}{subsubsection.8.3.3.2}%
-\contentsline {subparagraph}{Paso 1}{141}{section*.158}%
-\contentsline {subparagraph}{Paso 2}{141}{section*.159}%
-\contentsline {subparagraph}{Paso 3}{142}{section*.160}%
-\contentsline {subparagraph}{Paso 4}{142}{section*.162}%
-\contentsline {subparagraph}{Paso 5}{142}{section*.163}%
-\contentsline {subparagraph}{Paso 6}{144}{section*.165}%
-\contentsline {subparagraph}{Paso 7}{144}{section*.167}%
-\contentsline {subsection}{\numberline {8.3.4}Escenario 4}{145}{subsection.8.3.4}%
-\contentsline {subsubsection}{\numberline {8.3.4.1}Análisis de componentes}{145}{subsubsection.8.3.4.1}%
-\contentsline {subsubsection}{\numberline {8.3.4.2}Análisis de tráfico}{146}{subsubsection.8.3.4.2}%
-\contentsline {subparagraph}{Paso 1}{147}{section*.169}%
-\contentsline {subparagraph}{Paso 2}{147}{section*.170}%
-\contentsline {subparagraph}{Paso 3}{147}{section*.171}%
-\contentsline {subparagraph}{Paso 4}{149}{section*.174}%
-\contentsline {subparagraph}{Paso 5}{149}{section*.175}%
-\contentsline {subparagraph}{Paso 6}{149}{section*.177}%
-\contentsline {section}{\numberline {8.4}Comparativa de drivers}{149}{section.8.4}%
-\contentsline {section}{\numberline {8.5}Funcionalidades avanzadas}{149}{section.8.5}%
-\contentsline {subsection}{\numberline {8.5.1}Layer 3 High Availability}{149}{subsection.8.5.1}%
-\contentsline {chapter}{\numberline {9}Trabajo a futuro}{151}{chapter.9}%
-\contentsline {chapter}{\numberline {10}Conclusiones}{153}{chapter.10}%
-\contentsline {chapter}{Referencias bibliográficas}{154}{chapter*.183}%
-\contentsline {chapter}{Glosario}{160}{chapter*.183}%
-\contentsline {chapter}{\textbf {Apéndices}}{161}{section*.184}%
+\contentsline {chapter}{\numberline {8}Análisis del módulo de red}{77}{chapter.8}%
+\contentsline {section}{\numberline {8.1}Escenarios de prueba}{77}{section.8.1}%
+\contentsline {subsection}{\numberline {8.1.1}Escenario 1: tráfico este-oeste (misma red tenant)}{78}{subsection.8.1.1}%
+\contentsline {subsubsection}{\numberline {8.1.1.1}Composición del escenario}{78}{subsubsection.8.1.1.1}%
+\contentsline {subsection}{\numberline {8.1.2}Escenario 2: tráfico este-oeste (distintas redes tenant)}{79}{subsection.8.1.2}%
+\contentsline {subsubsection}{\numberline {8.1.2.1}Composición del escenario}{79}{subsubsection.8.1.2.1}%
+\contentsline {subsection}{\numberline {8.1.3}Escenario 3: tráfico norte-sur (acceso hacia el exterior)}{80}{subsection.8.1.3}%
+\contentsline {subsubsection}{\numberline {8.1.3.1}Composición del escenario}{81}{subsubsection.8.1.3.1}%
+\contentsline {subsection}{\numberline {8.1.4}Escenario 4: tráfico norte-sur (acceso desde el exterior)}{82}{subsection.8.1.4}%
+\contentsline {subsubsection}{\numberline {8.1.4.1}Composición del escenario}{82}{subsubsection.8.1.4.1}%
+\contentsline {section}{\numberline {8.2}Linux bridge}{82}{section.8.2}%
+\contentsline {subsection}{\numberline {8.2.1}Escenario 1}{83}{subsection.8.2.1}%
+\contentsline {subsubsection}{\numberline {8.2.1.1}Análisis de componentes}{84}{subsubsection.8.2.1.1}%
+\contentsline {subsubsection}{\numberline {8.2.1.2}Análisis de tráfico}{87}{subsubsection.8.2.1.2}%
+\contentsline {subparagraph}{Paso 1}{87}{section*.95}%
+\contentsline {subparagraph}{Paso 2}{87}{section*.96}%
+\contentsline {subparagraph}{Paso 3}{91}{section*.101}%
+\contentsline {subparagraph}{Paso 4}{92}{section*.104}%
+\contentsline {subsection}{\numberline {8.2.2}Escenario 2}{93}{subsection.8.2.2}%
+\contentsline {subsubsection}{\numberline {8.2.2.1}Análisis de componentes}{93}{subsubsection.8.2.2.1}%
+\contentsline {subsubsection}{\numberline {8.2.2.2}Análisis de tráfico}{99}{subsubsection.8.2.2.2}%
+\contentsline {subparagraph}{Paso 1}{99}{section*.106}%
+\contentsline {subparagraph}{Paso 2}{99}{section*.107}%
+\contentsline {subparagraph}{Paso 3}{99}{section*.108}%
+\contentsline {subparagraph}{Paso 4}{100}{section*.110}%
+\contentsline {subparagraph}{Paso 5}{100}{section*.111}%
+\contentsline {subparagraph}{Paso 6}{100}{section*.112}%
+\contentsline {subparagraph}{Paso 7}{100}{section*.114}%
+\contentsline {subsection}{\numberline {8.2.3}Escenario 3}{101}{subsection.8.2.3}%
+\contentsline {subsubsection}{\numberline {8.2.3.1}Análisis de componentes}{102}{subsubsection.8.2.3.1}%
+\contentsline {subsubsection}{\numberline {8.2.3.2}Análisis de tráfico}{105}{subsubsection.8.2.3.2}%
+\contentsline {subparagraph}{Paso 1}{105}{section*.116}%
+\contentsline {subparagraph}{Paso 2}{105}{section*.117}%
+\contentsline {subparagraph}{Paso 3}{105}{section*.118}%
+\contentsline {subparagraph}{Paso 4}{106}{section*.120}%
+\contentsline {subparagraph}{Paso 5}{106}{section*.121}%
+\contentsline {subparagraph}{Paso 6}{107}{section*.123}%
+\contentsline {subparagraph}{Paso 7}{108}{section*.125}%
+\contentsline {subsection}{\numberline {8.2.4}Escenario 4}{109}{subsection.8.2.4}%
+\contentsline {subsubsection}{\numberline {8.2.4.1}Análisis de componentes}{109}{subsubsection.8.2.4.1}%
+\contentsline {subsubsection}{\numberline {8.2.4.2}Análisis de tráfico}{111}{subsubsection.8.2.4.2}%
+\contentsline {subparagraph}{Paso 1}{111}{section*.127}%
+\contentsline {subparagraph}{Paso 2}{111}{section*.128}%
+\contentsline {subparagraph}{Paso 3}{111}{section*.129}%
+\contentsline {subparagraph}{Paso 4}{112}{section*.132}%
+\contentsline {subparagraph}{Paso 5}{112}{section*.133}%
+\contentsline {subparagraph}{Paso 6}{113}{section*.135}%
+\contentsline {section}{\numberline {8.3}Open vSwitch}{113}{section.8.3}%
+\contentsline {subsubsection}{\numberline {8.3.0.1}Archivos de configuración}{115}{subsubsection.8.3.0.1}%
+\contentsline {subsection}{\numberline {8.3.1}Escenario 1}{118}{subsection.8.3.1}%
+\contentsline {subsubsection}{\numberline {8.3.1.1}Análisis de componentes}{118}{subsubsection.8.3.1.1}%
+\contentsline {subsubsection}{\numberline {8.3.1.2}Análisis de tráfico}{124}{subsubsection.8.3.1.2}%
+\contentsline {subparagraph}{Paso 1}{124}{section*.138}%
+\contentsline {subparagraph}{Paso 2}{125}{section*.139}%
+\contentsline {subparagraph}{Paso 3}{132}{section*.144}%
+\contentsline {subparagraph}{Paso 4}{134}{section*.147}%
+\contentsline {subsection}{\numberline {8.3.2}Escenario 2}{135}{subsection.8.3.2}%
+\contentsline {subsubsection}{\numberline {8.3.2.1}Análisis de componentes}{135}{subsubsection.8.3.2.1}%
+\contentsline {subsubsection}{\numberline {8.3.2.2}Análisis de tráfico}{139}{subsubsection.8.3.2.2}%
+\contentsline {subparagraph}{Paso 1}{140}{section*.149}%
+\contentsline {subparagraph}{Paso 2}{140}{section*.150}%
+\contentsline {subparagraph}{Paso 3}{140}{section*.151}%
+\contentsline {subparagraph}{Paso 4}{140}{section*.153}%
+\contentsline {subparagraph}{Paso 5}{141}{section*.154}%
+\contentsline {subparagraph}{Paso 6}{141}{section*.155}%
+\contentsline {subparagraph}{Paso 7}{141}{section*.157}%
+\contentsline {subsection}{\numberline {8.3.3}Escenario 3}{142}{subsection.8.3.3}%
+\contentsline {subsubsection}{\numberline {8.3.3.1}Análisis de componentes}{142}{subsubsection.8.3.3.1}%
+\contentsline {subsubsection}{\numberline {8.3.3.2}Análisis de tráfico}{145}{subsubsection.8.3.3.2}%
+\contentsline {subparagraph}{Paso 1}{145}{section*.159}%
+\contentsline {subparagraph}{Paso 2}{145}{section*.160}%
+\contentsline {subparagraph}{Paso 3}{146}{section*.161}%
+\contentsline {subparagraph}{Paso 4}{146}{section*.163}%
+\contentsline {subparagraph}{Paso 5}{146}{section*.164}%
+\contentsline {subparagraph}{Paso 6}{148}{section*.166}%
+\contentsline {subparagraph}{Paso 7}{148}{section*.168}%
+\contentsline {subsection}{\numberline {8.3.4}Escenario 4}{149}{subsection.8.3.4}%
+\contentsline {subsubsection}{\numberline {8.3.4.1}Análisis de componentes}{149}{subsubsection.8.3.4.1}%
+\contentsline {subsubsection}{\numberline {8.3.4.2}Análisis de tráfico}{150}{subsubsection.8.3.4.2}%
+\contentsline {subparagraph}{Paso 1}{151}{section*.170}%
+\contentsline {subparagraph}{Paso 2}{151}{section*.171}%
+\contentsline {subparagraph}{Paso 3}{151}{section*.172}%
+\contentsline {subparagraph}{Paso 4}{153}{section*.175}%
+\contentsline {subparagraph}{Paso 5}{153}{section*.176}%
+\contentsline {subparagraph}{Paso 6}{153}{section*.178}%
+\contentsline {section}{\numberline {8.4}Comparativa de drivers}{153}{section.8.4}%
+\contentsline {section}{\numberline {8.5}Funcionalidades avanzadas}{153}{section.8.5}%
+\contentsline {subsection}{\numberline {8.5.1}Layer 3 High Availability}{153}{subsection.8.5.1}%
+\contentsline {chapter}{\numberline {9}Trabajo a futuro}{155}{chapter.9}%
+\contentsline {chapter}{\numberline {10}Conclusiones}{157}{chapter.10}%
+\contentsline {chapter}{Referencias bibliográficas}{158}{chapter*.184}%
+\contentsline {chapter}{Glosario}{164}{chapter*.184}%
+\contentsline {chapter}{\textbf {Apéndices}}{165}{section*.185}%
 \ttl@change@i {\@ne }{chapter}{13pt}{}{ Apéndice\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax 
 \ttl@change@v {chapter}{}{}{}\relax 
-\contentsline {chapter}{\numberline {1}Imágenes}{162}{appendix.Alph1}%
+\contentsline {chapter}{\numberline {1}Imágenes}{166}{appendix.Alph1}%
 \ttl@change@i {\@ne }{chapter}{0pt}{\vspace *{0.45cm}}{\thecontentslabel \quad }{}{\bfseries \hfill \contentspage }\relax 
 \ttl@change@v {chapter}{}{}{}\relax 
-\contentsline {chapter}{\textbf {Anexos}}{165}{section*.187}%
+\contentsline {chapter}{\textbf {Anexos}}{169}{section*.188}%
 \ttl@change@i {\@ne }{chapter}{13pt}{}{ Anexo\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax 
 \ttl@change@v {chapter}{}{}{}\relax 
-\contentsline {chapter}{\numberline {1}Instalación versión Queens}{166}{appendix.Anexo.1}%
-\contentsline {section}{\numberline {1.1}Preparación de nodos}{166}{section.Anexo.1.1}%
-\contentsline {section}{\numberline {1.2}Configuración}{175}{section.Anexo.1.2}%
-\contentsline {subsection}{\numberline {1.2.1}Configuración claves SSH}{175}{subsection.Anexo.1.2.1}%
-\contentsline {subsection}{\numberline {1.2.2}Archivos de configuración OSA}{176}{subsection.Anexo.1.2.2}%
-\contentsline {subsection}{\numberline {1.2.3}Generación de claves}{181}{subsection.Anexo.1.2.3}%
-\contentsline {subsection}{\numberline {1.2.4}Correcciones}{181}{subsection.Anexo.1.2.4}%
-\contentsline {subsubsection}{\numberline {1.2.4.1}SELinux}{181}{subsubsection.Anexo.1.2.4.1}%
-\contentsline {chapter}{\numberline {2}Instalación versión Stein}{182}{appendix.Anexo.2}%
-\contentsline {section}{\numberline {2.1}Preparación de nodos}{182}{section.Anexo.2.1}%
-\contentsline {section}{\numberline {2.2}Configuración archivos OSA}{195}{section.Anexo.2.2}%
-\contentsline {subsubsection}{\numberline {2.2.0.1}user\_variables.yml}{200}{subsubsection.Anexo.2.2.0.1}%
-\contentsline {section}{\numberline {2.3}Ejecución de playbooks}{202}{section.Anexo.2.3}%
-\contentsline {section}{\numberline {2.4}Cambios para driver OVS}{203}{section.Anexo.2.4}%
-\contentsline {chapter}{\numberline {3}Virtualización con KVM}{206}{appendix.Anexo.3}%
-\contentsline {section}{\numberline {3.1}Utilización virt-manager}{206}{section.Anexo.3.1}%
-\contentsline {subsection}{\numberline {3.1.1}Conexión remota}{206}{subsection.Anexo.3.1.1}%
-\contentsline {subsection}{\numberline {3.1.2}Creación de una red}{207}{subsection.Anexo.3.1.2}%
-\contentsline {subsection}{\numberline {3.1.3}Crear nodo}{209}{subsection.Anexo.3.1.3}%
-\contentsline {chapter}{\numberline {4}Interacción}{213}{appendix.Anexo.4}%
-\contentsline {section}{\numberline {4.1}Configuraciones de administrador}{214}{section.Anexo.4.1}%
-\contentsline {section}{\numberline {4.2}Interacción de un usuario}{220}{section.Anexo.4.2}%
-\contentsline {section}{\numberline {4.3}Acceso a una instancia}{228}{section.Anexo.4.3}%
-\contentsline {subsection}{\numberline {4.3.1}Por SPICE}{228}{subsection.Anexo.4.3.1}%
-\contentsline {subsection}{\numberline {4.3.2}Por SSH}{229}{subsection.Anexo.4.3.2}%
-\contentsline {subsubsection}{\numberline {4.3.2.1}Asociar una Floating IP a la instancia}{229}{subsubsection.Anexo.4.3.2.1}%
-\contentsline {subsubsection}{\numberline {4.3.2.2}Modificar security group}{230}{subsubsection.Anexo.4.3.2.2}%
-\contentsline {subsubsection}{\numberline {4.3.2.3}SSH}{231}{subsubsection.Anexo.4.3.2.3}%
-\contentsline {subsection}{\numberline {4.3.3}Por virsh}{232}{subsection.Anexo.4.3.3}%
-\contentsline {chapter}{\numberline {5}migrate\_instance.sh}{233}{appendix.Anexo.5}%
+\contentsline {chapter}{\numberline {1}Instalación versión Queens}{170}{appendix.Anexo.1}%
+\contentsline {section}{\numberline {1.1}Preparación de nodos}{170}{section.Anexo.1.1}%
+\contentsline {section}{\numberline {1.2}Configuración}{179}{section.Anexo.1.2}%
+\contentsline {subsection}{\numberline {1.2.1}Configuración claves SSH}{179}{subsection.Anexo.1.2.1}%
+\contentsline {subsection}{\numberline {1.2.2}Archivos de configuración OSA}{180}{subsection.Anexo.1.2.2}%
+\contentsline {subsection}{\numberline {1.2.3}Generación de claves}{185}{subsection.Anexo.1.2.3}%
+\contentsline {subsection}{\numberline {1.2.4}Correcciones}{185}{subsection.Anexo.1.2.4}%
+\contentsline {subsubsection}{\numberline {1.2.4.1}SELinux}{185}{subsubsection.Anexo.1.2.4.1}%
+\contentsline {chapter}{\numberline {2}Instalación versión Stein}{186}{appendix.Anexo.2}%
+\contentsline {section}{\numberline {2.1}Preparación de nodos}{186}{section.Anexo.2.1}%
+\contentsline {section}{\numberline {2.2}Configuración archivos OSA}{199}{section.Anexo.2.2}%
+\contentsline {subsubsection}{\numberline {2.2.0.1}user\_variables.yml}{204}{subsubsection.Anexo.2.2.0.1}%
+\contentsline {section}{\numberline {2.3}Ejecución de playbooks}{206}{section.Anexo.2.3}%
+\contentsline {section}{\numberline {2.4}Cambios para driver OVS}{207}{section.Anexo.2.4}%
+\contentsline {chapter}{\numberline {3}Virtualización con KVM}{210}{appendix.Anexo.3}%
+\contentsline {section}{\numberline {3.1}Utilización virt-manager}{210}{section.Anexo.3.1}%
+\contentsline {subsection}{\numberline {3.1.1}Conexión remota}{210}{subsection.Anexo.3.1.1}%
+\contentsline {subsection}{\numberline {3.1.2}Creación de una red}{211}{subsection.Anexo.3.1.2}%
+\contentsline {subsection}{\numberline {3.1.3}Crear nodo}{213}{subsection.Anexo.3.1.3}%
+\contentsline {chapter}{\numberline {4}Interacción}{217}{appendix.Anexo.4}%
+\contentsline {section}{\numberline {4.1}Configuraciones de administrador}{218}{section.Anexo.4.1}%
+\contentsline {section}{\numberline {4.2}Interacción de un usuario}{224}{section.Anexo.4.2}%
+\contentsline {section}{\numberline {4.3}Acceso a una instancia}{232}{section.Anexo.4.3}%
+\contentsline {subsection}{\numberline {4.3.1}Por SPICE}{232}{subsection.Anexo.4.3.1}%
+\contentsline {subsection}{\numberline {4.3.2}Por SSH}{233}{subsection.Anexo.4.3.2}%
+\contentsline {subsubsection}{\numberline {4.3.2.1}Asociar una Floating IP a la instancia}{233}{subsubsection.Anexo.4.3.2.1}%
+\contentsline {subsubsection}{\numberline {4.3.2.2}Modificar security group}{234}{subsubsection.Anexo.4.3.2.2}%
+\contentsline {subsubsection}{\numberline {4.3.2.3}SSH}{235}{subsubsection.Anexo.4.3.2.3}%
+\contentsline {subsection}{\numberline {4.3.3}Por virsh}{236}{subsection.Anexo.4.3.3}%
+\contentsline {chapter}{\numberline {5}migrate\_instance.sh}{237}{appendix.Anexo.5}%
 \contentsfinish 
diff --git a/docs/udelartex/tesis.xwm b/docs/udelartex/tesis.xwm
index b3685d3ce432bdc5863208000e91ea6e7a34b4fd..a817c744382c5f7100cc8388460aded3198f966b 100644
--- a/docs/udelartex/tesis.xwm
+++ b/docs/udelartex/tesis.xwm
@@ -1,2 +1,2 @@
 \relax 
-\xwmnewlabel{xwmlastpage}{{5}{234}{migrate\_instance.sh\relax }{lstnumber.-296.31}{}}
+\xwmnewlabel{xwmlastpage}{{5}{238}{migrate\_instance.sh\relax }{lstnumber.-312.31}{}}