diff --git "a/docs/udelartex/capitulos/dise\303\261o.tex" "b/docs/udelartex/capitulos/dise\303\261o.tex"
index e68be8adb82edbaa5584e78fd1ec310a597d2fbd..d93a7297260e724d83ca6ee28d212acc14b02619 100644
--- "a/docs/udelartex/capitulos/dise\303\261o.tex"
+++ "b/docs/udelartex/capitulos/dise\303\261o.tex"
@@ -150,18 +150,14 @@ Una de las principales características de OpenStack-Ansible es el despliegue de
 
 En cuanto a los servicios a desplegar, los administradores pueden optar por cuáles instalar dentro de los opcionales y de qué forma con la finalidad de crear un ambiente que se adapte a las necesidades de cada caso. Dicho esto, un aspecto fundamental en todos los servicios y en especial sobre los que interactúan directamente los usuarios finales es la alta disponibilidad.
 
-En este trabajo los servicios que se desplegaron directamente sobre los hosts físicos son los relacionados con Neutron y Nova debido a que agregar una capa de abstracción como son los contenedores no es favorable en ninguno de los casos ya sea por los hipervisores o los recursos de red, en donde ambos requieren tener una comunicación directa con el kernel de Linux. Finalmente los servicios se encuentran distribuidos de la siguiente forma:\\
-\textbf{Nodo de infraestructura}\\
-En contenedores se encuentran los servicios:
-Contenedor ceph-mon:
- - ceph-crash
- - ceph-mgr
- - ceph-mon
-Contenedor 
-VER BIEN COMO PONER ESTO, 
-porque poner cada servicio de cada contenedor capaz que es medio al pedo y con mencionar medio macro alcanza, por ejemplo el galera, basta con decir que el mariadb-galera corre en el contenedore xxx y chau.
-\textbf{Nodo de cómputo}\\
-\textbf{Nodo de storage}
+En este trabajo los servicios que se desplegaron directamente sobre los hosts físicos son los relacionados con Neutron y Nova debido a que agregar una capa de abstracción como son los contenedores no es favorable en ninguno de los casos ya sea por los hipervisores o los recursos de red, en donde ambos requieren tener una comunicación directa con el kernel de Linux. Finalmente los servicios se encuentran distribuidos de la siguiente forma:
+
+\begin{figure}[H]
+	\centering
+	\includegraphics[width=0.8\columnwidth]{diseño/distribucion-servicios}
+	\caption{Diagrama con la distribución de los servicios.}
+	\label{distribucion-servicios}
+\end{figure}
 
 \section{Ambiente de trabajo}\label{diseño:ambiente:trabajo}
 
diff --git "a/docs/udelartex/imagenes/dise\303\261o/distribucion-servicios.jpg" "b/docs/udelartex/imagenes/dise\303\261o/distribucion-servicios.jpg"
new file mode 100644
index 0000000000000000000000000000000000000000..34282b2428edf96de358cd504d35f8b4a3471162
Binary files /dev/null and "b/docs/udelartex/imagenes/dise\303\261o/distribucion-servicios.jpg" differ
diff --git a/docs/udelartex/tesis.lof b/docs/udelartex/tesis.lof
index 4fa6554f814872fbf95ead3b0e7bb1f06c5fba09..1f57f16bf20e07d8b17d4a0593c402f7b1c5c1d5 100644
--- a/docs/udelartex/tesis.lof
+++ b/docs/udelartex/tesis.lof
@@ -27,86 +27,87 @@
 \addvspace {10\p@ }
 \contentsline {figure}{\numberline {6.1}{\ignorespaces Arquitectura diseñada.\relax }}{56}{figure.caption.69}%
 \contentsline {figure}{\numberline {6.2}{\ignorespaces Arquitectura diseñada para instalación Stein\relax }}{59}{figure.caption.70}%
-\contentsline {figure}{\numberline {6.3}{\ignorespaces Acceso remoto al servidor renata.\relax }}{61}{figure.caption.71}%
-\contentsline {figure}{\numberline {6.4}{\ignorespaces Túnel reverso y esquema de servidores.\relax }}{62}{figure.caption.72}%
-\contentsline {figure}{\numberline {6.5}{\ignorespaces Salida a Internet en los nodos de Openstack.\relax }}{64}{figure.caption.73}%
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\contentsline {figure}{\numberline {8.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{87}{figure.caption.99}%
-\contentsline {figure}{\numberline {8.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{91}{figure.caption.102}%
-\contentsline {figure}{\numberline {8.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{91}{figure.caption.103}%
-\contentsline {figure}{\numberline {8.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{93}{figure.caption.104}%
-\contentsline {figure}{\numberline {8.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{94}{figure.caption.105}%
-\contentsline {figure}{\numberline {8.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{94}{figure.caption.107}%
-\contentsline {figure}{\numberline {8.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{95}{figure.caption.108}%
-\contentsline {figure}{\numberline {8.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{96}{figure.caption.110}%
-\contentsline {figure}{\numberline {8.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{102}{figure.caption.114}%
-\contentsline {figure}{\numberline {8.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{103}{figure.caption.118}%
-\contentsline {figure}{\numberline {8.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{104}{figure.caption.120}%
-\contentsline {figure}{\numberline {8.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{108}{figure.caption.124}%
-\contentsline {figure}{\numberline {8.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{109}{figure.caption.127}%
-\contentsline {figure}{\numberline {8.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{110}{figure.caption.129}%
-\contentsline {figure}{\numberline {8.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{111}{figure.caption.131}%
-\contentsline {figure}{\numberline {8.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{114}{figure.caption.135}%
-\contentsline {figure}{\numberline {8.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{114}{figure.caption.136}%
-\contentsline {figure}{\numberline {8.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{115}{figure.caption.139}%
-\contentsline {figure}{\numberline {8.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{116}{figure.caption.141}%
-\contentsline {figure}{\numberline {8.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{120}{figure.caption.142}%
-\contentsline {figure}{\numberline {8.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{127}{figure.caption.145}%
-\contentsline {figure}{\numberline {8.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{129}{figure.caption.146}%
-\contentsline {figure}{\numberline {8.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{133}{figure.caption.147}%
-\contentsline {figure}{\numberline {8.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{134}{figure.caption.148}%
-\contentsline {figure}{\numberline {8.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{134}{figure.caption.150}%
-\contentsline {figure}{\numberline {8.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{136}{figure.caption.151}%
-\contentsline {figure}{\numberline {8.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{137}{figure.caption.153}%
-\contentsline {figure}{\numberline {8.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{142}{figure.caption.157}%
-\contentsline {figure}{\numberline {8.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{143}{figure.caption.161}%
-\contentsline {figure}{\numberline {8.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{144}{figure.caption.163}%
-\contentsline {figure}{\numberline {8.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{148}{figure.caption.167}%
-\contentsline {figure}{\numberline {8.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{149}{figure.caption.170}%
-\contentsline {figure}{\numberline {8.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{150}{figure.caption.172}%
-\contentsline {figure}{\numberline {8.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{151}{figure.caption.174}%
-\contentsline {figure}{\numberline {8.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{154}{figure.caption.178}%
-\contentsline {figure}{\numberline {8.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{154}{figure.caption.179}%
-\contentsline {figure}{\numberline {8.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{155}{figure.caption.182}%
-\contentsline {figure}{\numberline {8.38}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos funcionales\relax }}{156}{figure.caption.184}%
-\contentsline {figure}{\numberline {8.39}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos luego de un fallo en uno de ellos\relax }}{156}{figure.caption.185}%
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{170}{figure.caption.191}%
-\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{171}{figure.caption.192}%
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{213}{figure.caption.215}%
-\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{214}{figure.caption.216}%
-\addvspace {10\p@ }
-\contentsline {figure}{\numberline {4.1}{\ignorespaces Vista del login de Horizon.\relax }}{221}{figure.caption.230}%
-\contentsline {figure}{\numberline {4.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{222}{figure.caption.232}%
-\contentsline {figure}{\numberline {4.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{223}{figure.caption.233}%
-\contentsline {figure}{\numberline {4.4}{\ignorespaces Creación de un usuario.\relax }}{224}{figure.caption.235}%
-\contentsline {figure}{\numberline {4.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{225}{figure.caption.237}%
-\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{225}{figure.caption.238}%
-\contentsline {figure}{\numberline {4.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{226}{figure.caption.240}%
-\contentsline {figure}{\numberline {4.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{227}{figure.caption.241}%
-\contentsline {figure}{\numberline {4.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{228}{figure.caption.243}%
-\contentsline {figure}{\numberline {4.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{229}{figure.caption.244}%
-\contentsline {figure}{\numberline {4.11}{\ignorespaces Creación de una red (1/3).\relax }}{230}{figure.caption.246}%
-\contentsline {figure}{\numberline {4.12}{\ignorespaces Creación de una red (2/3).\relax }}{230}{figure.caption.247}%
-\contentsline {figure}{\numberline {4.13}{\ignorespaces Creación de una red (3/3).\relax }}{231}{figure.caption.248}%
-\contentsline {figure}{\numberline {4.14}{\ignorespaces Creación de un router.\relax }}{231}{figure.caption.250}%
-\contentsline {figure}{\numberline {4.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{232}{figure.caption.252}%
-\contentsline {figure}{\numberline {4.16}{\ignorespaces Creación de una key pair.\relax }}{232}{figure.caption.254}%
-\contentsline {figure}{\numberline {4.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{233}{figure.caption.256}%
-\contentsline {figure}{\numberline {4.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{233}{figure.caption.257}%
-\contentsline {figure}{\numberline {4.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{234}{figure.caption.258}%
-\contentsline {figure}{\numberline {4.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{234}{figure.caption.259}%
-\contentsline {figure}{\numberline {4.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{235}{figure.caption.260}%
-\contentsline {figure}{\numberline {4.22}{\ignorespaces Asignación de floating IP.\relax }}{236}{figure.caption.261}%
-\contentsline {figure}{\numberline {4.23}{\ignorespaces Asociación de floating IP.\relax }}{237}{figure.caption.262}%
-\contentsline {figure}{\numberline {4.24}{\ignorespaces Reglas security group por defecto.\relax }}{237}{figure.caption.263}%
-\contentsline {figure}{\numberline {4.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{238}{figure.caption.264}%
-\contentsline {figure}{\numberline {4.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{238}{figure.caption.265}%
+\contentsline {figure}{\numberline {6.3}{\ignorespaces Diagrama con la distribución de los servicios.\relax }}{60}{figure.caption.71}%
+\contentsline {figure}{\numberline {6.4}{\ignorespaces Acceso remoto al servidor renata.\relax }}{62}{figure.caption.72}%
+\contentsline {figure}{\numberline {6.5}{\ignorespaces Túnel reverso y esquema de servidores.\relax }}{63}{figure.caption.73}%
+\contentsline {figure}{\numberline {6.6}{\ignorespaces Salida a Internet en los nodos de Openstack.\relax }}{64}{figure.caption.74}%
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\contentsline {figure}{\numberline {8.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{87}{figure.caption.100}%
+\contentsline {figure}{\numberline {8.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{91}{figure.caption.103}%
+\contentsline {figure}{\numberline {8.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{91}{figure.caption.104}%
+\contentsline {figure}{\numberline {8.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{93}{figure.caption.105}%
+\contentsline {figure}{\numberline {8.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{94}{figure.caption.106}%
+\contentsline {figure}{\numberline {8.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{94}{figure.caption.108}%
+\contentsline {figure}{\numberline {8.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{95}{figure.caption.109}%
+\contentsline {figure}{\numberline {8.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{96}{figure.caption.111}%
+\contentsline {figure}{\numberline {8.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{102}{figure.caption.115}%
+\contentsline {figure}{\numberline {8.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{103}{figure.caption.119}%
+\contentsline {figure}{\numberline {8.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{104}{figure.caption.121}%
+\contentsline {figure}{\numberline {8.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{108}{figure.caption.125}%
+\contentsline {figure}{\numberline {8.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{109}{figure.caption.128}%
+\contentsline {figure}{\numberline {8.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{110}{figure.caption.130}%
+\contentsline {figure}{\numberline {8.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{111}{figure.caption.132}%
+\contentsline {figure}{\numberline {8.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{114}{figure.caption.136}%
+\contentsline {figure}{\numberline {8.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{114}{figure.caption.137}%
+\contentsline {figure}{\numberline {8.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{115}{figure.caption.140}%
+\contentsline {figure}{\numberline {8.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{116}{figure.caption.142}%
+\contentsline {figure}{\numberline {8.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{120}{figure.caption.143}%
+\contentsline {figure}{\numberline {8.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{127}{figure.caption.146}%
+\contentsline {figure}{\numberline {8.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{129}{figure.caption.147}%
+\contentsline {figure}{\numberline {8.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{133}{figure.caption.148}%
+\contentsline {figure}{\numberline {8.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{134}{figure.caption.149}%
+\contentsline {figure}{\numberline {8.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{134}{figure.caption.151}%
+\contentsline {figure}{\numberline {8.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{136}{figure.caption.152}%
+\contentsline {figure}{\numberline {8.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{137}{figure.caption.154}%
+\contentsline {figure}{\numberline {8.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{142}{figure.caption.158}%
+\contentsline {figure}{\numberline {8.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{143}{figure.caption.162}%
+\contentsline {figure}{\numberline {8.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{144}{figure.caption.164}%
+\contentsline {figure}{\numberline {8.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{148}{figure.caption.168}%
+\contentsline {figure}{\numberline {8.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{149}{figure.caption.171}%
+\contentsline {figure}{\numberline {8.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{150}{figure.caption.173}%
+\contentsline {figure}{\numberline {8.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{151}{figure.caption.175}%
+\contentsline {figure}{\numberline {8.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{154}{figure.caption.179}%
+\contentsline {figure}{\numberline {8.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{154}{figure.caption.180}%
+\contentsline {figure}{\numberline {8.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{155}{figure.caption.183}%
+\contentsline {figure}{\numberline {8.38}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos funcionales\relax }}{156}{figure.caption.185}%
+\contentsline {figure}{\numberline {8.39}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos luego de un fallo en uno de ellos\relax }}{156}{figure.caption.186}%
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{170}{figure.caption.192}%
+\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{171}{figure.caption.193}%
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{213}{figure.caption.216}%
+\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{214}{figure.caption.217}%
+\addvspace {10\p@ }
+\contentsline {figure}{\numberline {4.1}{\ignorespaces Vista del login de Horizon.\relax }}{221}{figure.caption.231}%
+\contentsline {figure}{\numberline {4.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{222}{figure.caption.233}%
+\contentsline {figure}{\numberline {4.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{223}{figure.caption.234}%
+\contentsline {figure}{\numberline {4.4}{\ignorespaces Creación de un usuario.\relax }}{224}{figure.caption.236}%
+\contentsline {figure}{\numberline {4.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{225}{figure.caption.238}%
+\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{225}{figure.caption.239}%
+\contentsline {figure}{\numberline {4.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{226}{figure.caption.241}%
+\contentsline {figure}{\numberline {4.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{227}{figure.caption.242}%
+\contentsline {figure}{\numberline {4.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{228}{figure.caption.244}%
+\contentsline {figure}{\numberline {4.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{229}{figure.caption.245}%
+\contentsline {figure}{\numberline {4.11}{\ignorespaces Creación de una red (1/3).\relax }}{230}{figure.caption.247}%
+\contentsline {figure}{\numberline {4.12}{\ignorespaces Creación de una red (2/3).\relax }}{230}{figure.caption.248}%
+\contentsline {figure}{\numberline {4.13}{\ignorespaces Creación de una red (3/3).\relax }}{231}{figure.caption.249}%
+\contentsline {figure}{\numberline {4.14}{\ignorespaces Creación de un router.\relax }}{231}{figure.caption.251}%
+\contentsline {figure}{\numberline {4.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{232}{figure.caption.253}%
+\contentsline {figure}{\numberline {4.16}{\ignorespaces Creación de una key pair.\relax }}{232}{figure.caption.255}%
+\contentsline {figure}{\numberline {4.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{233}{figure.caption.257}%
+\contentsline {figure}{\numberline {4.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{233}{figure.caption.258}%
+\contentsline {figure}{\numberline {4.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{234}{figure.caption.259}%
+\contentsline {figure}{\numberline {4.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{234}{figure.caption.260}%
+\contentsline {figure}{\numberline {4.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{235}{figure.caption.261}%
+\contentsline {figure}{\numberline {4.22}{\ignorespaces Asignación de floating IP.\relax }}{236}{figure.caption.262}%
+\contentsline {figure}{\numberline {4.23}{\ignorespaces Asociación de floating IP.\relax }}{237}{figure.caption.263}%
+\contentsline {figure}{\numberline {4.24}{\ignorespaces Reglas security group por defecto.\relax }}{237}{figure.caption.264}%
+\contentsline {figure}{\numberline {4.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{238}{figure.caption.265}%
+\contentsline {figure}{\numberline {4.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{238}{figure.caption.266}%
 \addvspace {10\p@ }
 \contentsfinish 
diff --git a/docs/udelartex/tesis.out b/docs/udelartex/tesis.out
index f84b40ea9d4fa47eb1ea6f7217476af0c2f3636c..5097e810176effc036e1065b8e61399eeb392106 100644
--- a/docs/udelartex/tesis.out
+++ b/docs/udelartex/tesis.out
@@ -80,11 +80,11 @@
 \BOOKMARK [2][-]{subsection.8.5.1}{Layer 3 High Availability}{section.8.5}% 80
 \BOOKMARK [0][-]{chapter.9}{Trabajo a futuro}{}% 81
 \BOOKMARK [0][-]{chapter.10}{Conclusiones}{}% 82
-\BOOKMARK [0][-]{chapter*.189}{Referencias bibliogr\341ficas}{}% 83
-\BOOKMARK [0][-]{chapter*.189}{Glosario}{}% 84
-\BOOKMARK [0][-]{section*.190}{Ap\351ndices}{}% 85
+\BOOKMARK [0][-]{chapter*.190}{Referencias bibliogr\341ficas}{}% 83
+\BOOKMARK [0][-]{chapter*.190}{Glosario}{}% 84
+\BOOKMARK [0][-]{section*.191}{Ap\351ndices}{}% 85
 \BOOKMARK [0][-]{appendix.Alph1}{Im\341genes}{}% 86
-\BOOKMARK [0][-]{section*.193}{Anexos}{}% 87
+\BOOKMARK [0][-]{section*.194}{Anexos}{}% 87
 \BOOKMARK [0][-]{appendix.Anexo.1}{Instalaci\363n versi\363n Queens}{}% 88
 \BOOKMARK [1][-]{section.Anexo.1.1}{Preparaci\363n de nodos}{appendix.Anexo.1}% 89
 \BOOKMARK [1][-]{section.Anexo.1.2}{Configuraci\363n}{appendix.Anexo.1}% 90
diff --git a/docs/udelartex/tesis.pdf b/docs/udelartex/tesis.pdf
index 97043f37e2bef07d4cbf4da47b00b00a0581ef35..673a20b43ff979fe8f81743b95c5a2c0fa42ee94 100644
Binary files a/docs/udelartex/tesis.pdf and b/docs/udelartex/tesis.pdf differ
diff --git a/docs/udelartex/tesis.synctex.gz b/docs/udelartex/tesis.synctex.gz
index 25a4caf4358d12ce03b58e5cd85a07dc4586a5fa..e760de8e63ce73656debb5ca795902c9bd6aa50d 100644
Binary files a/docs/udelartex/tesis.synctex.gz and b/docs/udelartex/tesis.synctex.gz differ
diff --git a/docs/udelartex/tesis.toc b/docs/udelartex/tesis.toc
index cad01eba248192c42edf8342cf669cba0232a146..010c50cbd68744785e551386d1c2c3f19e390774 100644
--- a/docs/udelartex/tesis.toc
+++ b/docs/udelartex/tesis.toc
@@ -91,7 +91,7 @@
 \contentsline {subsection}{\numberline {6.2.1}Hardware utilizado}{60}{subsection.6.2.1}%
 \contentsline {subsection}{\numberline {6.2.2}Conexión remota hacia el servidor renata}{61}{subsection.6.2.2}%
 \contentsline {subsection}{\numberline {6.2.3}Especificaciones servidor renata}{62}{subsection.6.2.3}%
-\contentsline {subsection}{\numberline {6.2.4}Acceso al exterior desde nodos}{63}{subsection.6.2.4}%
+\contentsline {subsection}{\numberline {6.2.4}Acceso al exterior desde nodos}{64}{subsection.6.2.4}%
 \contentsline {chapter}{\numberline {7}Gestión del Datacenter}{65}{chapter.7}%
 \contentsline {section}{\numberline {7.1}Recuperación ante fallas}{65}{section.7.1}%
 \contentsline {subsection}{\numberline {7.1.1}Verificación general}{65}{subsection.7.1.1}%
@@ -117,91 +117,91 @@
 \contentsline {subsection}{\numberline {8.2.1}Escenario 1}{87}{subsection.8.2.1}%
 \contentsline {subsubsection}{\numberline {8.2.1.1}Análisis de componentes}{87}{subsubsection.8.2.1.1}%
 \contentsline {subsubsection}{\numberline {8.2.1.2}Análisis de tráfico}{90}{subsubsection.8.2.1.2}%
-\contentsline {subparagraph}{Paso 1}{90}{section*.100}%
-\contentsline {subparagraph}{Paso 2}{90}{section*.101}%
-\contentsline {subparagraph}{Paso 3}{94}{section*.106}%
-\contentsline {subparagraph}{Paso 4}{95}{section*.109}%
+\contentsline {subparagraph}{Paso 1}{90}{section*.101}%
+\contentsline {subparagraph}{Paso 2}{90}{section*.102}%
+\contentsline {subparagraph}{Paso 3}{94}{section*.107}%
+\contentsline {subparagraph}{Paso 4}{95}{section*.110}%
 \contentsline {subsection}{\numberline {8.2.2}Escenario 2}{96}{subsection.8.2.2}%
 \contentsline {subsubsection}{\numberline {8.2.2.1}Análisis de componentes}{96}{subsubsection.8.2.2.1}%
 \contentsline {subsubsection}{\numberline {8.2.2.2}Análisis de tráfico}{101}{subsubsection.8.2.2.2}%
-\contentsline {subparagraph}{Paso 1}{101}{section*.111}%
-\contentsline {subparagraph}{Paso 2}{102}{section*.112}%
-\contentsline {subparagraph}{Paso 3}{102}{section*.113}%
-\contentsline {subparagraph}{Paso 4}{102}{section*.115}%
-\contentsline {subparagraph}{Paso 5}{103}{section*.116}%
-\contentsline {subparagraph}{Paso 6}{103}{section*.117}%
-\contentsline {subparagraph}{Paso 7}{103}{section*.119}%
+\contentsline {subparagraph}{Paso 1}{101}{section*.112}%
+\contentsline {subparagraph}{Paso 2}{102}{section*.113}%
+\contentsline {subparagraph}{Paso 3}{102}{section*.114}%
+\contentsline {subparagraph}{Paso 4}{102}{section*.116}%
+\contentsline {subparagraph}{Paso 5}{103}{section*.117}%
+\contentsline {subparagraph}{Paso 6}{103}{section*.118}%
+\contentsline {subparagraph}{Paso 7}{103}{section*.120}%
 \contentsline {subsection}{\numberline {8.2.3}Escenario 3}{104}{subsection.8.2.3}%
 \contentsline {subsubsection}{\numberline {8.2.3.1}Análisis de componentes}{104}{subsubsection.8.2.3.1}%
 \contentsline {subsubsection}{\numberline {8.2.3.2}Análisis de tráfico}{107}{subsubsection.8.2.3.2}%
-\contentsline {subparagraph}{Paso 1}{108}{section*.121}%
-\contentsline {subparagraph}{Paso 2}{108}{section*.122}%
-\contentsline {subparagraph}{Paso 3}{108}{section*.123}%
-\contentsline {subparagraph}{Paso 4}{108}{section*.125}%
-\contentsline {subparagraph}{Paso 5}{109}{section*.126}%
-\contentsline {subparagraph}{Paso 6}{110}{section*.128}%
-\contentsline {subparagraph}{Paso 7}{110}{section*.130}%
+\contentsline {subparagraph}{Paso 1}{108}{section*.122}%
+\contentsline {subparagraph}{Paso 2}{108}{section*.123}%
+\contentsline {subparagraph}{Paso 3}{108}{section*.124}%
+\contentsline {subparagraph}{Paso 4}{108}{section*.126}%
+\contentsline {subparagraph}{Paso 5}{109}{section*.127}%
+\contentsline {subparagraph}{Paso 6}{110}{section*.129}%
+\contentsline {subparagraph}{Paso 7}{110}{section*.131}%
 \contentsline {subsection}{\numberline {8.2.4}Escenario 4}{111}{subsection.8.2.4}%
 \contentsline {subsubsection}{\numberline {8.2.4.1}Análisis de componentes}{111}{subsubsection.8.2.4.1}%
 \contentsline {subsubsection}{\numberline {8.2.4.2}Análisis de tráfico}{113}{subsubsection.8.2.4.2}%
-\contentsline {subparagraph}{Paso 1}{113}{section*.132}%
-\contentsline {subparagraph}{Paso 2}{113}{section*.133}%
-\contentsline {subparagraph}{Paso 3}{113}{section*.134}%
-\contentsline {subparagraph}{Paso 4}{114}{section*.137}%
-\contentsline {subparagraph}{Paso 5}{114}{section*.138}%
-\contentsline {subparagraph}{Paso 6}{115}{section*.140}%
+\contentsline {subparagraph}{Paso 1}{113}{section*.133}%
+\contentsline {subparagraph}{Paso 2}{113}{section*.134}%
+\contentsline {subparagraph}{Paso 3}{113}{section*.135}%
+\contentsline {subparagraph}{Paso 4}{114}{section*.138}%
+\contentsline {subparagraph}{Paso 5}{114}{section*.139}%
+\contentsline {subparagraph}{Paso 6}{115}{section*.141}%
 \contentsline {section}{\numberline {8.3}Open vSwitch}{115}{section.8.3}%
 \contentsline {subsubsection}{\numberline {8.3.0.1}Archivos de configuración}{117}{subsubsection.8.3.0.1}%
 \contentsline {subsection}{\numberline {8.3.1}Escenario 1}{120}{subsection.8.3.1}%
 \contentsline {subsubsection}{\numberline {8.3.1.1}Análisis de componentes}{120}{subsubsection.8.3.1.1}%
 \contentsline {subsubsection}{\numberline {8.3.1.2}Análisis de tráfico}{126}{subsubsection.8.3.1.2}%
-\contentsline {subparagraph}{Paso 1}{126}{section*.143}%
-\contentsline {subparagraph}{Paso 2}{127}{section*.144}%
-\contentsline {subparagraph}{Paso 3}{134}{section*.149}%
-\contentsline {subparagraph}{Paso 4}{136}{section*.152}%
+\contentsline {subparagraph}{Paso 1}{126}{section*.144}%
+\contentsline {subparagraph}{Paso 2}{127}{section*.145}%
+\contentsline {subparagraph}{Paso 3}{134}{section*.150}%
+\contentsline {subparagraph}{Paso 4}{136}{section*.153}%
 \contentsline {subsection}{\numberline {8.3.2}Escenario 2}{137}{subsection.8.3.2}%
 \contentsline {subsubsection}{\numberline {8.3.2.1}Análisis de componentes}{137}{subsubsection.8.3.2.1}%
 \contentsline {subsubsection}{\numberline {8.3.2.2}Análisis de tráfico}{141}{subsubsection.8.3.2.2}%
-\contentsline {subparagraph}{Paso 1}{142}{section*.154}%
-\contentsline {subparagraph}{Paso 2}{142}{section*.155}%
-\contentsline {subparagraph}{Paso 3}{142}{section*.156}%
-\contentsline {subparagraph}{Paso 4}{142}{section*.158}%
-\contentsline {subparagraph}{Paso 5}{143}{section*.159}%
-\contentsline {subparagraph}{Paso 6}{143}{section*.160}%
-\contentsline {subparagraph}{Paso 7}{143}{section*.162}%
+\contentsline {subparagraph}{Paso 1}{142}{section*.155}%
+\contentsline {subparagraph}{Paso 2}{142}{section*.156}%
+\contentsline {subparagraph}{Paso 3}{142}{section*.157}%
+\contentsline {subparagraph}{Paso 4}{142}{section*.159}%
+\contentsline {subparagraph}{Paso 5}{143}{section*.160}%
+\contentsline {subparagraph}{Paso 6}{143}{section*.161}%
+\contentsline {subparagraph}{Paso 7}{143}{section*.163}%
 \contentsline {subsection}{\numberline {8.3.3}Escenario 3}{144}{subsection.8.3.3}%
 \contentsline {subsubsection}{\numberline {8.3.3.1}Análisis de componentes}{144}{subsubsection.8.3.3.1}%
 \contentsline {subsubsection}{\numberline {8.3.3.2}Análisis de tráfico}{147}{subsubsection.8.3.3.2}%
-\contentsline {subparagraph}{Paso 1}{147}{section*.164}%
-\contentsline {subparagraph}{Paso 2}{147}{section*.165}%
-\contentsline {subparagraph}{Paso 3}{148}{section*.166}%
-\contentsline {subparagraph}{Paso 4}{148}{section*.168}%
-\contentsline {subparagraph}{Paso 5}{148}{section*.169}%
-\contentsline {subparagraph}{Paso 6}{150}{section*.171}%
-\contentsline {subparagraph}{Paso 7}{150}{section*.173}%
+\contentsline {subparagraph}{Paso 1}{147}{section*.165}%
+\contentsline {subparagraph}{Paso 2}{147}{section*.166}%
+\contentsline {subparagraph}{Paso 3}{148}{section*.167}%
+\contentsline {subparagraph}{Paso 4}{148}{section*.169}%
+\contentsline {subparagraph}{Paso 5}{148}{section*.170}%
+\contentsline {subparagraph}{Paso 6}{150}{section*.172}%
+\contentsline {subparagraph}{Paso 7}{150}{section*.174}%
 \contentsline {subsection}{\numberline {8.3.4}Escenario 4}{151}{subsection.8.3.4}%
 \contentsline {subsubsection}{\numberline {8.3.4.1}Análisis de componentes}{151}{subsubsection.8.3.4.1}%
 \contentsline {subsubsection}{\numberline {8.3.4.2}Análisis de tráfico}{152}{subsubsection.8.3.4.2}%
-\contentsline {subparagraph}{Paso 1}{153}{section*.175}%
-\contentsline {subparagraph}{Paso 2}{153}{section*.176}%
-\contentsline {subparagraph}{Paso 3}{153}{section*.177}%
-\contentsline {subparagraph}{Paso 4}{155}{section*.180}%
-\contentsline {subparagraph}{Paso 5}{155}{section*.181}%
-\contentsline {subparagraph}{Paso 6}{155}{section*.183}%
+\contentsline {subparagraph}{Paso 1}{153}{section*.176}%
+\contentsline {subparagraph}{Paso 2}{153}{section*.177}%
+\contentsline {subparagraph}{Paso 3}{153}{section*.178}%
+\contentsline {subparagraph}{Paso 4}{155}{section*.181}%
+\contentsline {subparagraph}{Paso 5}{155}{section*.182}%
+\contentsline {subparagraph}{Paso 6}{155}{section*.184}%
 \contentsline {section}{\numberline {8.4}Comparativa de drivers}{155}{section.8.4}%
 \contentsline {section}{\numberline {8.5}Funcionalidades avanzadas}{155}{section.8.5}%
 \contentsline {subsection}{\numberline {8.5.1}Layer 3 High Availability}{155}{subsection.8.5.1}%
 \contentsline {chapter}{\numberline {9}Trabajo a futuro}{157}{chapter.9}%
 \contentsline {chapter}{\numberline {10}Conclusiones}{159}{chapter.10}%
-\contentsline {chapter}{Referencias bibliográficas}{160}{chapter*.189}%
-\contentsline {chapter}{Glosario}{167}{chapter*.189}%
-\contentsline {chapter}{\textbf {Apéndices}}{168}{section*.190}%
+\contentsline {chapter}{Referencias bibliográficas}{160}{chapter*.190}%
+\contentsline {chapter}{Glosario}{167}{chapter*.190}%
+\contentsline {chapter}{\textbf {Apéndices}}{168}{section*.191}%
 \ttl@change@i {\@ne }{chapter}{13pt}{}{ Apéndice\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax 
 \ttl@change@v {chapter}{}{}{}\relax 
 \contentsline {chapter}{\numberline {1}Imágenes}{169}{appendix.Alph1}%
 \ttl@change@i {\@ne }{chapter}{0pt}{\vspace *{0.45cm}}{\thecontentslabel \quad }{}{\bfseries \hfill \contentspage }\relax 
 \ttl@change@v {chapter}{}{}{}\relax 
-\contentsline {chapter}{\textbf {Anexos}}{172}{section*.193}%
+\contentsline {chapter}{\textbf {Anexos}}{172}{section*.194}%
 \ttl@change@i {\@ne }{chapter}{13pt}{}{ Anexo\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax 
 \ttl@change@v {chapter}{}{}{}\relax 
 \contentsline {chapter}{\numberline {1}Instalación versión Queens}{173}{appendix.Anexo.1}%