diff --git "a/docs/udelartex/capitulos/dise\303\261o.tex" "b/docs/udelartex/capitulos/dise\303\261o.tex"
index ed0790e6d3c20f5d056d7843392efda3f0e06928..641e2168ad555e3abe38e343e99cf96b851b2956 100644
--- "a/docs/udelartex/capitulos/dise\303\261o.tex"
+++ "b/docs/udelartex/capitulos/dise\303\261o.tex"
@@ -145,7 +145,22 @@ En una arquitectura estándar de producción el router TOR físico podría actua
 \end{figure}
 
 \subsection{Distribución de los servicios}
-ESCRIBIR ALGUN VERSO
+Una de las principales características de OpenStack-Ansible es el despliegue de servicios en contenedores. Esto permite escalar horizontalmente los mismos de una forma sencilla evitando la complejidad de utilizar servidores físicos o máquinas virtuales y proporcionan una alta disponibilidad. Mas allá de la facilidad de utilizar contenedores, ciertos servicios continúan teniendo un mejor rendimiento cuando corren directamente sobre el host físico, como por ejemplo Nova, en donde los servicios asociados a dicho módulo utilizan un hipervisor para crear nuevas instancias. 
+
+En cuanto a los servicios a desplegar, los administradores pueden optar por cuales instalar dentro de los opcionales y de que forma con la finalidad de crear un ambiente que se adapte a las necesidades de cada caso. Dicho esto, un aspecto fundamental en todos los servicios y en especial sobre los que interactúan directamente los usuarios finales es la alta disponibilidad.
+
+En este trabajo los servicios que se desplegaron directamente sobre los hosts físicos son los relacionados con Neutron y Nova debido a que agregar una capa de abstracción como son los contenedores no es favorable en ninguno de los casos ya sea por los hipervisores o los recursos de red, en donde ambos requieren tener una comunicación directa con el kernel de Linux. Finalmente los servicios se encuentran distribuidos de la siguiente forma:\\
+\textbf{Nodo de infraestructura}\\
+En contenedores se encuentran los servicios:
+Contenedor ceph-mon:
+ - ceph-crash
+ - ceph-mgr
+ - ceph-mon
+Contenedor 
+VER BIEN COMO PONER ESTO, 
+porque poner cada servicio de cada contenedor capaz que es medio al pedo y con mencionar medio macro alcanza, por ejemplo el galera, basta con decir que el mariadb-galera corre en el contenedore xxx y chau.
+\textbf{Nodo de cómputo}\\
+\textbf{Nodo de storage}
 
 \section{Ambiente de trabajo}\label{diseño:ambiente:trabajo}
 
diff --git a/docs/udelartex/tesis.lof b/docs/udelartex/tesis.lof
index c678a14e66dc06fba16fb4a06b3a3b7e55d12414..409571dda28f36344140d18620367c41fe847824 100644
--- a/docs/udelartex/tesis.lof
+++ b/docs/udelartex/tesis.lof
@@ -27,86 +27,86 @@
 \addvspace {10\p@ }
 \contentsline {figure}{\numberline {6.1}{\ignorespaces Arquitectura diseñada.\relax }}{54}{figure.caption.66}%
 \contentsline {figure}{\numberline {6.2}{\ignorespaces Arquitectura diseñada para instalación Stein\relax }}{57}{figure.caption.67}%
-\contentsline {figure}{\numberline {6.3}{\ignorespaces Acceso remoto al servidor renata.\relax }}{59}{figure.caption.68}%
-\contentsline {figure}{\numberline {6.4}{\ignorespaces Túnel reverso y esquema de servidores.\relax }}{60}{figure.caption.69}%
-\contentsline {figure}{\numberline {6.5}{\ignorespaces Salida a Internet en los nodos de Openstack.\relax }}{61}{figure.caption.70}%
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\contentsline {figure}{\numberline {8.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{84}{figure.caption.92}%
-\contentsline {figure}{\numberline {8.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{89}{figure.caption.95}%
-\contentsline {figure}{\numberline {8.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{89}{figure.caption.96}%
-\contentsline {figure}{\numberline {8.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{91}{figure.caption.97}%
-\contentsline {figure}{\numberline {8.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{92}{figure.caption.98}%
-\contentsline {figure}{\numberline {8.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{92}{figure.caption.100}%
-\contentsline {figure}{\numberline {8.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{93}{figure.caption.101}%
-\contentsline {figure}{\numberline {8.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{94}{figure.caption.103}%
-\contentsline {figure}{\numberline {8.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{101}{figure.caption.107}%
-\contentsline {figure}{\numberline {8.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{102}{figure.caption.111}%
-\contentsline {figure}{\numberline {8.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{102}{figure.caption.113}%
-\contentsline {figure}{\numberline {8.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{107}{figure.caption.117}%
-\contentsline {figure}{\numberline {8.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{108}{figure.caption.120}%
-\contentsline {figure}{\numberline {8.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{109}{figure.caption.122}%
-\contentsline {figure}{\numberline {8.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{110}{figure.caption.124}%
-\contentsline {figure}{\numberline {8.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{113}{figure.caption.128}%
-\contentsline {figure}{\numberline {8.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{113}{figure.caption.129}%
-\contentsline {figure}{\numberline {8.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{114}{figure.caption.132}%
-\contentsline {figure}{\numberline {8.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{115}{figure.caption.134}%
-\contentsline {figure}{\numberline {8.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{119}{figure.caption.135}%
-\contentsline {figure}{\numberline {8.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{126}{figure.caption.138}%
-\contentsline {figure}{\numberline {8.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{128}{figure.caption.139}%
-\contentsline {figure}{\numberline {8.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{132}{figure.caption.140}%
-\contentsline {figure}{\numberline {8.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{133}{figure.caption.141}%
-\contentsline {figure}{\numberline {8.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{133}{figure.caption.143}%
-\contentsline {figure}{\numberline {8.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{135}{figure.caption.144}%
-\contentsline {figure}{\numberline {8.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{136}{figure.caption.146}%
-\contentsline {figure}{\numberline {8.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{141}{figure.caption.150}%
-\contentsline {figure}{\numberline {8.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{142}{figure.caption.154}%
-\contentsline {figure}{\numberline {8.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{143}{figure.caption.156}%
-\contentsline {figure}{\numberline {8.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{147}{figure.caption.160}%
-\contentsline {figure}{\numberline {8.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{148}{figure.caption.163}%
-\contentsline {figure}{\numberline {8.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{149}{figure.caption.165}%
-\contentsline {figure}{\numberline {8.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{150}{figure.caption.167}%
-\contentsline {figure}{\numberline {8.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{153}{figure.caption.171}%
-\contentsline {figure}{\numberline {8.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{153}{figure.caption.172}%
-\contentsline {figure}{\numberline {8.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{154}{figure.caption.175}%
-\contentsline {figure}{\numberline {8.38}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos funcionales\relax }}{155}{figure.caption.177}%
-\contentsline {figure}{\numberline {8.39}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos luego de un fallo en uno de ellos\relax }}{155}{figure.caption.178}%
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{169}{figure.caption.184}%
-\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{170}{figure.caption.185}%
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{212}{figure.caption.208}%
-\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{213}{figure.caption.209}%
-\addvspace {10\p@ }
-\contentsline {figure}{\numberline {4.1}{\ignorespaces Vista del login de Horizon.\relax }}{220}{figure.caption.223}%
-\contentsline {figure}{\numberline {4.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{221}{figure.caption.225}%
-\contentsline {figure}{\numberline {4.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{222}{figure.caption.226}%
-\contentsline {figure}{\numberline {4.4}{\ignorespaces Creación de un usuario.\relax }}{223}{figure.caption.228}%
-\contentsline {figure}{\numberline {4.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{224}{figure.caption.230}%
-\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{224}{figure.caption.231}%
-\contentsline {figure}{\numberline {4.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{225}{figure.caption.233}%
-\contentsline {figure}{\numberline {4.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{226}{figure.caption.234}%
-\contentsline {figure}{\numberline {4.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{227}{figure.caption.236}%
-\contentsline {figure}{\numberline {4.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{228}{figure.caption.237}%
-\contentsline {figure}{\numberline {4.11}{\ignorespaces Creación de una red (1/3).\relax }}{229}{figure.caption.239}%
-\contentsline {figure}{\numberline {4.12}{\ignorespaces Creación de una red (2/3).\relax }}{229}{figure.caption.240}%
-\contentsline {figure}{\numberline {4.13}{\ignorespaces Creación de una red (3/3).\relax }}{230}{figure.caption.241}%
-\contentsline {figure}{\numberline {4.14}{\ignorespaces Creación de un router.\relax }}{230}{figure.caption.243}%
-\contentsline {figure}{\numberline {4.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{231}{figure.caption.245}%
-\contentsline {figure}{\numberline {4.16}{\ignorespaces Creación de una key pair.\relax }}{231}{figure.caption.247}%
-\contentsline {figure}{\numberline {4.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{232}{figure.caption.249}%
-\contentsline {figure}{\numberline {4.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{232}{figure.caption.250}%
-\contentsline {figure}{\numberline {4.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{233}{figure.caption.251}%
-\contentsline {figure}{\numberline {4.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{233}{figure.caption.252}%
-\contentsline {figure}{\numberline {4.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{234}{figure.caption.253}%
-\contentsline {figure}{\numberline {4.22}{\ignorespaces Asignación de floating IP.\relax }}{235}{figure.caption.254}%
-\contentsline {figure}{\numberline {4.23}{\ignorespaces Asociación de floating IP.\relax }}{236}{figure.caption.255}%
-\contentsline {figure}{\numberline {4.24}{\ignorespaces Reglas security group por defecto.\relax }}{236}{figure.caption.256}%
-\contentsline {figure}{\numberline {4.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{237}{figure.caption.257}%
-\contentsline {figure}{\numberline {4.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{237}{figure.caption.258}%
+\contentsline {figure}{\numberline {6.3}{\ignorespaces Acceso remoto al servidor renata.\relax }}{60}{figure.caption.68}%
+\contentsline {figure}{\numberline {6.4}{\ignorespaces Túnel reverso y esquema de servidores.\relax }}{61}{figure.caption.69}%
+\contentsline {figure}{\numberline {6.5}{\ignorespaces Salida a Internet en los nodos de Openstack.\relax }}{62}{figure.caption.70}%
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\contentsline {figure}{\numberline {8.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{85}{figure.caption.92}%
+\contentsline {figure}{\numberline {8.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{90}{figure.caption.95}%
+\contentsline {figure}{\numberline {8.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{90}{figure.caption.96}%
+\contentsline {figure}{\numberline {8.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{92}{figure.caption.97}%
+\contentsline {figure}{\numberline {8.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{93}{figure.caption.98}%
+\contentsline {figure}{\numberline {8.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{93}{figure.caption.100}%
+\contentsline {figure}{\numberline {8.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{94}{figure.caption.101}%
+\contentsline {figure}{\numberline {8.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{95}{figure.caption.103}%
+\contentsline {figure}{\numberline {8.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{102}{figure.caption.107}%
+\contentsline {figure}{\numberline {8.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{103}{figure.caption.111}%
+\contentsline {figure}{\numberline {8.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{103}{figure.caption.113}%
+\contentsline {figure}{\numberline {8.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{108}{figure.caption.117}%
+\contentsline {figure}{\numberline {8.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{109}{figure.caption.120}%
+\contentsline {figure}{\numberline {8.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{110}{figure.caption.122}%
+\contentsline {figure}{\numberline {8.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{111}{figure.caption.124}%
+\contentsline {figure}{\numberline {8.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{114}{figure.caption.128}%
+\contentsline {figure}{\numberline {8.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{114}{figure.caption.129}%
+\contentsline {figure}{\numberline {8.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{115}{figure.caption.132}%
+\contentsline {figure}{\numberline {8.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{116}{figure.caption.134}%
+\contentsline {figure}{\numberline {8.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{120}{figure.caption.135}%
+\contentsline {figure}{\numberline {8.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{127}{figure.caption.138}%
+\contentsline {figure}{\numberline {8.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{129}{figure.caption.139}%
+\contentsline {figure}{\numberline {8.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{133}{figure.caption.140}%
+\contentsline {figure}{\numberline {8.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{134}{figure.caption.141}%
+\contentsline {figure}{\numberline {8.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{134}{figure.caption.143}%
+\contentsline {figure}{\numberline {8.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{136}{figure.caption.144}%
+\contentsline {figure}{\numberline {8.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{137}{figure.caption.146}%
+\contentsline {figure}{\numberline {8.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{142}{figure.caption.150}%
+\contentsline {figure}{\numberline {8.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{143}{figure.caption.154}%
+\contentsline {figure}{\numberline {8.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{144}{figure.caption.156}%
+\contentsline {figure}{\numberline {8.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{148}{figure.caption.160}%
+\contentsline {figure}{\numberline {8.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{149}{figure.caption.163}%
+\contentsline {figure}{\numberline {8.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{150}{figure.caption.165}%
+\contentsline {figure}{\numberline {8.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{151}{figure.caption.167}%
+\contentsline {figure}{\numberline {8.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{154}{figure.caption.171}%
+\contentsline {figure}{\numberline {8.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{154}{figure.caption.172}%
+\contentsline {figure}{\numberline {8.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{155}{figure.caption.175}%
+\contentsline {figure}{\numberline {8.38}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos funcionales\relax }}{156}{figure.caption.177}%
+\contentsline {figure}{\numberline {8.39}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos luego de un fallo en uno de ellos\relax }}{156}{figure.caption.178}%
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{170}{figure.caption.184}%
+\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{171}{figure.caption.185}%
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{213}{figure.caption.208}%
+\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{214}{figure.caption.209}%
+\addvspace {10\p@ }
+\contentsline {figure}{\numberline {4.1}{\ignorespaces Vista del login de Horizon.\relax }}{221}{figure.caption.223}%
+\contentsline {figure}{\numberline {4.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{222}{figure.caption.225}%
+\contentsline {figure}{\numberline {4.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{223}{figure.caption.226}%
+\contentsline {figure}{\numberline {4.4}{\ignorespaces Creación de un usuario.\relax }}{224}{figure.caption.228}%
+\contentsline {figure}{\numberline {4.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{225}{figure.caption.230}%
+\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{225}{figure.caption.231}%
+\contentsline {figure}{\numberline {4.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{226}{figure.caption.233}%
+\contentsline {figure}{\numberline {4.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{227}{figure.caption.234}%
+\contentsline {figure}{\numberline {4.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{228}{figure.caption.236}%
+\contentsline {figure}{\numberline {4.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{229}{figure.caption.237}%
+\contentsline {figure}{\numberline {4.11}{\ignorespaces Creación de una red (1/3).\relax }}{230}{figure.caption.239}%
+\contentsline {figure}{\numberline {4.12}{\ignorespaces Creación de una red (2/3).\relax }}{230}{figure.caption.240}%
+\contentsline {figure}{\numberline {4.13}{\ignorespaces Creación de una red (3/3).\relax }}{231}{figure.caption.241}%
+\contentsline {figure}{\numberline {4.14}{\ignorespaces Creación de un router.\relax }}{231}{figure.caption.243}%
+\contentsline {figure}{\numberline {4.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{232}{figure.caption.245}%
+\contentsline {figure}{\numberline {4.16}{\ignorespaces Creación de una key pair.\relax }}{232}{figure.caption.247}%
+\contentsline {figure}{\numberline {4.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{233}{figure.caption.249}%
+\contentsline {figure}{\numberline {4.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{233}{figure.caption.250}%
+\contentsline {figure}{\numberline {4.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{234}{figure.caption.251}%
+\contentsline {figure}{\numberline {4.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{234}{figure.caption.252}%
+\contentsline {figure}{\numberline {4.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{235}{figure.caption.253}%
+\contentsline {figure}{\numberline {4.22}{\ignorespaces Asignación de floating IP.\relax }}{236}{figure.caption.254}%
+\contentsline {figure}{\numberline {4.23}{\ignorespaces Asociación de floating IP.\relax }}{237}{figure.caption.255}%
+\contentsline {figure}{\numberline {4.24}{\ignorespaces Reglas security group por defecto.\relax }}{237}{figure.caption.256}%
+\contentsline {figure}{\numberline {4.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{238}{figure.caption.257}%
+\contentsline {figure}{\numberline {4.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{238}{figure.caption.258}%
 \addvspace {10\p@ }
 \contentsfinish 
diff --git a/docs/udelartex/tesis.pdf b/docs/udelartex/tesis.pdf
index 30ee1027f908491fec0f895a9064df2a9a18c969..680634d8e0ecca642b1514439587f9d1c1d8c1b0 100644
Binary files a/docs/udelartex/tesis.pdf and b/docs/udelartex/tesis.pdf differ
diff --git a/docs/udelartex/tesis.synctex.gz b/docs/udelartex/tesis.synctex.gz
index 3746ef3d06459257c6deae88dae53e2b431fcc3e..13554828c2111e941ab0dfdd328ff69d7c713700 100644
Binary files a/docs/udelartex/tesis.synctex.gz and b/docs/udelartex/tesis.synctex.gz differ
diff --git a/docs/udelartex/tesis.toc b/docs/udelartex/tesis.toc
index a9858d63500aefe3905e90e3b463262294bbcae7..fb14a7a198701fdac2f42e54613333232e8488c7 100644
--- a/docs/udelartex/tesis.toc
+++ b/docs/udelartex/tesis.toc
@@ -83,150 +83,150 @@
 \contentsline {section}{\numberline {6.1}Diseño de arquitectura}{52}{section.6.1}%
 \contentsline {subsection}{\numberline {6.1.1}Arquitectura desarrollo}{52}{subsection.6.1.1}%
 \contentsline {subsection}{\numberline {6.1.2}Arquitectura producción}{55}{subsection.6.1.2}%
-\contentsline {subsection}{\numberline {6.1.3}Distribución de los servicios}{57}{subsection.6.1.3}%
+\contentsline {subsection}{\numberline {6.1.3}Distribución de los servicios}{58}{subsection.6.1.3}%
 \contentsline {section}{\numberline {6.2}Ambiente de trabajo}{58}{section.6.2}%
 \contentsline {subsection}{\numberline {6.2.1}Hardware utilizado}{58}{subsection.6.2.1}%
 \contentsline {subsection}{\numberline {6.2.2}Conexión remota hacia el servidor renata}{59}{subsection.6.2.2}%
-\contentsline {subsection}{\numberline {6.2.3}Especificaciones servidor renata}{59}{subsection.6.2.3}%
-\contentsline {subsection}{\numberline {6.2.4}Acceso al exterior desde nodos}{61}{subsection.6.2.4}%
-\contentsline {chapter}{\numberline {7}Gestión del Datacenter}{62}{chapter.7}%
-\contentsline {section}{\numberline {7.1}Recuperación ante fallas}{62}{section.7.1}%
-\contentsline {subsection}{\numberline {7.1.1}Verificar el estado general de OpenStack}{62}{subsection.7.1.1}%
-\contentsline {subsection}{\numberline {7.1.2}Verificar estado de los componentes de la infraestructura}{63}{subsection.7.1.2}%
-\contentsline {subsection}{\numberline {7.1.3}Solucionar problemas}{63}{subsection.7.1.3}%
-\contentsline {subsection}{\numberline {7.1.4}Problemas con Ceph}{64}{subsection.7.1.4}%
-\contentsline {section}{\numberline {7.2}Escalamiento horizontal}{65}{section.7.2}%
-\contentsline {subsection}{\numberline {7.2.1}Agregar nodo de Cómputo}{65}{subsection.7.2.1}%
-\contentsline {subsection}{\numberline {7.2.2}Eliminar un nodo de cómputo}{66}{subsection.7.2.2}%
-\contentsline {subsection}{\numberline {7.2.3}Infraestructura}{68}{subsection.7.2.3}%
-\contentsline {section}{\numberline {7.3}Actualizar versión}{72}{section.7.3}%
-\contentsline {chapter}{\numberline {8}Análisis del módulo de red}{78}{chapter.8}%
-\contentsline {section}{\numberline {8.1}Escenarios de prueba}{78}{section.8.1}%
-\contentsline {subsection}{\numberline {8.1.1}Escenario 1: tráfico este-oeste (misma red tenant)}{79}{subsection.8.1.1}%
-\contentsline {subsubsection}{\numberline {8.1.1.1}Composición del escenario}{79}{subsubsection.8.1.1.1}%
-\contentsline {subsection}{\numberline {8.1.2}Escenario 2: tráfico este-oeste (distintas redes tenant)}{80}{subsection.8.1.2}%
-\contentsline {subsubsection}{\numberline {8.1.2.1}Composición del escenario}{80}{subsubsection.8.1.2.1}%
-\contentsline {subsection}{\numberline {8.1.3}Escenario 3: tráfico norte-sur (acceso hacia el exterior)}{81}{subsection.8.1.3}%
-\contentsline {subsubsection}{\numberline {8.1.3.1}Composición del escenario}{82}{subsubsection.8.1.3.1}%
-\contentsline {subsection}{\numberline {8.1.4}Escenario 4: tráfico norte-sur (acceso desde el exterior)}{83}{subsection.8.1.4}%
-\contentsline {subsubsection}{\numberline {8.1.4.1}Composición del escenario}{83}{subsubsection.8.1.4.1}%
-\contentsline {section}{\numberline {8.2}Linux bridge}{83}{section.8.2}%
-\contentsline {subsection}{\numberline {8.2.1}Escenario 1}{84}{subsection.8.2.1}%
-\contentsline {subsubsection}{\numberline {8.2.1.1}Análisis de componentes}{85}{subsubsection.8.2.1.1}%
-\contentsline {subsubsection}{\numberline {8.2.1.2}Análisis de tráfico}{88}{subsubsection.8.2.1.2}%
-\contentsline {subparagraph}{Paso 1}{88}{section*.93}%
-\contentsline {subparagraph}{Paso 2}{88}{section*.94}%
-\contentsline {subparagraph}{Paso 3}{92}{section*.99}%
-\contentsline {subparagraph}{Paso 4}{93}{section*.102}%
-\contentsline {subsection}{\numberline {8.2.2}Escenario 2}{94}{subsection.8.2.2}%
-\contentsline {subsubsection}{\numberline {8.2.2.1}Análisis de componentes}{94}{subsubsection.8.2.2.1}%
-\contentsline {subsubsection}{\numberline {8.2.2.2}Análisis de tráfico}{100}{subsubsection.8.2.2.2}%
-\contentsline {subparagraph}{Paso 1}{100}{section*.104}%
-\contentsline {subparagraph}{Paso 2}{100}{section*.105}%
-\contentsline {subparagraph}{Paso 3}{100}{section*.106}%
-\contentsline {subparagraph}{Paso 4}{101}{section*.108}%
-\contentsline {subparagraph}{Paso 5}{101}{section*.109}%
-\contentsline {subparagraph}{Paso 6}{101}{section*.110}%
-\contentsline {subparagraph}{Paso 7}{101}{section*.112}%
-\contentsline {subsection}{\numberline {8.2.3}Escenario 3}{102}{subsection.8.2.3}%
-\contentsline {subsubsection}{\numberline {8.2.3.1}Análisis de componentes}{103}{subsubsection.8.2.3.1}%
-\contentsline {subsubsection}{\numberline {8.2.3.2}Análisis de tráfico}{106}{subsubsection.8.2.3.2}%
-\contentsline {subparagraph}{Paso 1}{106}{section*.114}%
-\contentsline {subparagraph}{Paso 2}{106}{section*.115}%
-\contentsline {subparagraph}{Paso 3}{106}{section*.116}%
-\contentsline {subparagraph}{Paso 4}{107}{section*.118}%
-\contentsline {subparagraph}{Paso 5}{107}{section*.119}%
-\contentsline {subparagraph}{Paso 6}{108}{section*.121}%
-\contentsline {subparagraph}{Paso 7}{109}{section*.123}%
-\contentsline {subsection}{\numberline {8.2.4}Escenario 4}{110}{subsection.8.2.4}%
-\contentsline {subsubsection}{\numberline {8.2.4.1}Análisis de componentes}{110}{subsubsection.8.2.4.1}%
-\contentsline {subsubsection}{\numberline {8.2.4.2}Análisis de tráfico}{112}{subsubsection.8.2.4.2}%
-\contentsline {subparagraph}{Paso 1}{112}{section*.125}%
-\contentsline {subparagraph}{Paso 2}{112}{section*.126}%
-\contentsline {subparagraph}{Paso 3}{112}{section*.127}%
-\contentsline {subparagraph}{Paso 4}{113}{section*.130}%
-\contentsline {subparagraph}{Paso 5}{113}{section*.131}%
-\contentsline {subparagraph}{Paso 6}{114}{section*.133}%
-\contentsline {section}{\numberline {8.3}Open vSwitch}{114}{section.8.3}%
-\contentsline {subsubsection}{\numberline {8.3.0.1}Archivos de configuración}{116}{subsubsection.8.3.0.1}%
-\contentsline {subsection}{\numberline {8.3.1}Escenario 1}{119}{subsection.8.3.1}%
-\contentsline {subsubsection}{\numberline {8.3.1.1}Análisis de componentes}{119}{subsubsection.8.3.1.1}%
-\contentsline {subsubsection}{\numberline {8.3.1.2}Análisis de tráfico}{125}{subsubsection.8.3.1.2}%
-\contentsline {subparagraph}{Paso 1}{125}{section*.136}%
-\contentsline {subparagraph}{Paso 2}{126}{section*.137}%
-\contentsline {subparagraph}{Paso 3}{133}{section*.142}%
-\contentsline {subparagraph}{Paso 4}{135}{section*.145}%
-\contentsline {subsection}{\numberline {8.3.2}Escenario 2}{136}{subsection.8.3.2}%
-\contentsline {subsubsection}{\numberline {8.3.2.1}Análisis de componentes}{136}{subsubsection.8.3.2.1}%
-\contentsline {subsubsection}{\numberline {8.3.2.2}Análisis de tráfico}{140}{subsubsection.8.3.2.2}%
-\contentsline {subparagraph}{Paso 1}{141}{section*.147}%
-\contentsline {subparagraph}{Paso 2}{141}{section*.148}%
-\contentsline {subparagraph}{Paso 3}{141}{section*.149}%
-\contentsline {subparagraph}{Paso 4}{141}{section*.151}%
-\contentsline {subparagraph}{Paso 5}{142}{section*.152}%
-\contentsline {subparagraph}{Paso 6}{142}{section*.153}%
-\contentsline {subparagraph}{Paso 7}{142}{section*.155}%
-\contentsline {subsection}{\numberline {8.3.3}Escenario 3}{143}{subsection.8.3.3}%
-\contentsline {subsubsection}{\numberline {8.3.3.1}Análisis de componentes}{143}{subsubsection.8.3.3.1}%
-\contentsline {subsubsection}{\numberline {8.3.3.2}Análisis de tráfico}{146}{subsubsection.8.3.3.2}%
-\contentsline {subparagraph}{Paso 1}{146}{section*.157}%
-\contentsline {subparagraph}{Paso 2}{146}{section*.158}%
-\contentsline {subparagraph}{Paso 3}{147}{section*.159}%
-\contentsline {subparagraph}{Paso 4}{147}{section*.161}%
-\contentsline {subparagraph}{Paso 5}{147}{section*.162}%
-\contentsline {subparagraph}{Paso 6}{149}{section*.164}%
-\contentsline {subparagraph}{Paso 7}{149}{section*.166}%
-\contentsline {subsection}{\numberline {8.3.4}Escenario 4}{150}{subsection.8.3.4}%
-\contentsline {subsubsection}{\numberline {8.3.4.1}Análisis de componentes}{150}{subsubsection.8.3.4.1}%
-\contentsline {subsubsection}{\numberline {8.3.4.2}Análisis de tráfico}{151}{subsubsection.8.3.4.2}%
-\contentsline {subparagraph}{Paso 1}{152}{section*.168}%
-\contentsline {subparagraph}{Paso 2}{152}{section*.169}%
-\contentsline {subparagraph}{Paso 3}{152}{section*.170}%
-\contentsline {subparagraph}{Paso 4}{154}{section*.173}%
-\contentsline {subparagraph}{Paso 5}{154}{section*.174}%
-\contentsline {subparagraph}{Paso 6}{154}{section*.176}%
-\contentsline {section}{\numberline {8.4}Comparativa de drivers}{154}{section.8.4}%
-\contentsline {section}{\numberline {8.5}Funcionalidades avanzadas}{154}{section.8.5}%
-\contentsline {subsection}{\numberline {8.5.1}Layer 3 High Availability}{154}{subsection.8.5.1}%
-\contentsline {chapter}{\numberline {9}Trabajo a futuro}{156}{chapter.9}%
-\contentsline {chapter}{\numberline {10}Conclusiones}{158}{chapter.10}%
-\contentsline {chapter}{Referencias bibliográficas}{159}{chapter*.182}%
-\contentsline {chapter}{Glosario}{166}{chapter*.182}%
-\contentsline {chapter}{\textbf {Apéndices}}{167}{section*.183}%
+\contentsline {subsection}{\numberline {6.2.3}Especificaciones servidor renata}{60}{subsection.6.2.3}%
+\contentsline {subsection}{\numberline {6.2.4}Acceso al exterior desde nodos}{62}{subsection.6.2.4}%
+\contentsline {chapter}{\numberline {7}Gestión del Datacenter}{63}{chapter.7}%
+\contentsline {section}{\numberline {7.1}Recuperación ante fallas}{63}{section.7.1}%
+\contentsline {subsection}{\numberline {7.1.1}Verificar el estado general de OpenStack}{63}{subsection.7.1.1}%
+\contentsline {subsection}{\numberline {7.1.2}Verificar estado de los componentes de la infraestructura}{64}{subsection.7.1.2}%
+\contentsline {subsection}{\numberline {7.1.3}Solucionar problemas}{64}{subsection.7.1.3}%
+\contentsline {subsection}{\numberline {7.1.4}Problemas con Ceph}{65}{subsection.7.1.4}%
+\contentsline {section}{\numberline {7.2}Escalamiento horizontal}{66}{section.7.2}%
+\contentsline {subsection}{\numberline {7.2.1}Agregar nodo de Cómputo}{66}{subsection.7.2.1}%
+\contentsline {subsection}{\numberline {7.2.2}Eliminar un nodo de cómputo}{67}{subsection.7.2.2}%
+\contentsline {subsection}{\numberline {7.2.3}Infraestructura}{69}{subsection.7.2.3}%
+\contentsline {section}{\numberline {7.3}Actualizar versión}{73}{section.7.3}%
+\contentsline {chapter}{\numberline {8}Análisis del módulo de red}{79}{chapter.8}%
+\contentsline {section}{\numberline {8.1}Escenarios de prueba}{79}{section.8.1}%
+\contentsline {subsection}{\numberline {8.1.1}Escenario 1: tráfico este-oeste (misma red tenant)}{80}{subsection.8.1.1}%
+\contentsline {subsubsection}{\numberline {8.1.1.1}Composición del escenario}{80}{subsubsection.8.1.1.1}%
+\contentsline {subsection}{\numberline {8.1.2}Escenario 2: tráfico este-oeste (distintas redes tenant)}{81}{subsection.8.1.2}%
+\contentsline {subsubsection}{\numberline {8.1.2.1}Composición del escenario}{81}{subsubsection.8.1.2.1}%
+\contentsline {subsection}{\numberline {8.1.3}Escenario 3: tráfico norte-sur (acceso hacia el exterior)}{82}{subsection.8.1.3}%
+\contentsline {subsubsection}{\numberline {8.1.3.1}Composición del escenario}{83}{subsubsection.8.1.3.1}%
+\contentsline {subsection}{\numberline {8.1.4}Escenario 4: tráfico norte-sur (acceso desde el exterior)}{84}{subsection.8.1.4}%
+\contentsline {subsubsection}{\numberline {8.1.4.1}Composición del escenario}{84}{subsubsection.8.1.4.1}%
+\contentsline {section}{\numberline {8.2}Linux bridge}{84}{section.8.2}%
+\contentsline {subsection}{\numberline {8.2.1}Escenario 1}{85}{subsection.8.2.1}%
+\contentsline {subsubsection}{\numberline {8.2.1.1}Análisis de componentes}{86}{subsubsection.8.2.1.1}%
+\contentsline {subsubsection}{\numberline {8.2.1.2}Análisis de tráfico}{89}{subsubsection.8.2.1.2}%
+\contentsline {subparagraph}{Paso 1}{89}{section*.93}%
+\contentsline {subparagraph}{Paso 2}{89}{section*.94}%
+\contentsline {subparagraph}{Paso 3}{93}{section*.99}%
+\contentsline {subparagraph}{Paso 4}{94}{section*.102}%
+\contentsline {subsection}{\numberline {8.2.2}Escenario 2}{95}{subsection.8.2.2}%
+\contentsline {subsubsection}{\numberline {8.2.2.1}Análisis de componentes}{95}{subsubsection.8.2.2.1}%
+\contentsline {subsubsection}{\numberline {8.2.2.2}Análisis de tráfico}{101}{subsubsection.8.2.2.2}%
+\contentsline {subparagraph}{Paso 1}{101}{section*.104}%
+\contentsline {subparagraph}{Paso 2}{101}{section*.105}%
+\contentsline {subparagraph}{Paso 3}{101}{section*.106}%
+\contentsline {subparagraph}{Paso 4}{102}{section*.108}%
+\contentsline {subparagraph}{Paso 5}{102}{section*.109}%
+\contentsline {subparagraph}{Paso 6}{102}{section*.110}%
+\contentsline {subparagraph}{Paso 7}{102}{section*.112}%
+\contentsline {subsection}{\numberline {8.2.3}Escenario 3}{103}{subsection.8.2.3}%
+\contentsline {subsubsection}{\numberline {8.2.3.1}Análisis de componentes}{104}{subsubsection.8.2.3.1}%
+\contentsline {subsubsection}{\numberline {8.2.3.2}Análisis de tráfico}{107}{subsubsection.8.2.3.2}%
+\contentsline {subparagraph}{Paso 1}{107}{section*.114}%
+\contentsline {subparagraph}{Paso 2}{107}{section*.115}%
+\contentsline {subparagraph}{Paso 3}{107}{section*.116}%
+\contentsline {subparagraph}{Paso 4}{108}{section*.118}%
+\contentsline {subparagraph}{Paso 5}{108}{section*.119}%
+\contentsline {subparagraph}{Paso 6}{109}{section*.121}%
+\contentsline {subparagraph}{Paso 7}{110}{section*.123}%
+\contentsline {subsection}{\numberline {8.2.4}Escenario 4}{111}{subsection.8.2.4}%
+\contentsline {subsubsection}{\numberline {8.2.4.1}Análisis de componentes}{111}{subsubsection.8.2.4.1}%
+\contentsline {subsubsection}{\numberline {8.2.4.2}Análisis de tráfico}{113}{subsubsection.8.2.4.2}%
+\contentsline {subparagraph}{Paso 1}{113}{section*.125}%
+\contentsline {subparagraph}{Paso 2}{113}{section*.126}%
+\contentsline {subparagraph}{Paso 3}{113}{section*.127}%
+\contentsline {subparagraph}{Paso 4}{114}{section*.130}%
+\contentsline {subparagraph}{Paso 5}{114}{section*.131}%
+\contentsline {subparagraph}{Paso 6}{115}{section*.133}%
+\contentsline {section}{\numberline {8.3}Open vSwitch}{115}{section.8.3}%
+\contentsline {subsubsection}{\numberline {8.3.0.1}Archivos de configuración}{117}{subsubsection.8.3.0.1}%
+\contentsline {subsection}{\numberline {8.3.1}Escenario 1}{120}{subsection.8.3.1}%
+\contentsline {subsubsection}{\numberline {8.3.1.1}Análisis de componentes}{120}{subsubsection.8.3.1.1}%
+\contentsline {subsubsection}{\numberline {8.3.1.2}Análisis de tráfico}{126}{subsubsection.8.3.1.2}%
+\contentsline {subparagraph}{Paso 1}{126}{section*.136}%
+\contentsline {subparagraph}{Paso 2}{127}{section*.137}%
+\contentsline {subparagraph}{Paso 3}{134}{section*.142}%
+\contentsline {subparagraph}{Paso 4}{136}{section*.145}%
+\contentsline {subsection}{\numberline {8.3.2}Escenario 2}{137}{subsection.8.3.2}%
+\contentsline {subsubsection}{\numberline {8.3.2.1}Análisis de componentes}{137}{subsubsection.8.3.2.1}%
+\contentsline {subsubsection}{\numberline {8.3.2.2}Análisis de tráfico}{141}{subsubsection.8.3.2.2}%
+\contentsline {subparagraph}{Paso 1}{142}{section*.147}%
+\contentsline {subparagraph}{Paso 2}{142}{section*.148}%
+\contentsline {subparagraph}{Paso 3}{142}{section*.149}%
+\contentsline {subparagraph}{Paso 4}{142}{section*.151}%
+\contentsline {subparagraph}{Paso 5}{143}{section*.152}%
+\contentsline {subparagraph}{Paso 6}{143}{section*.153}%
+\contentsline {subparagraph}{Paso 7}{143}{section*.155}%
+\contentsline {subsection}{\numberline {8.3.3}Escenario 3}{144}{subsection.8.3.3}%
+\contentsline {subsubsection}{\numberline {8.3.3.1}Análisis de componentes}{144}{subsubsection.8.3.3.1}%
+\contentsline {subsubsection}{\numberline {8.3.3.2}Análisis de tráfico}{147}{subsubsection.8.3.3.2}%
+\contentsline {subparagraph}{Paso 1}{147}{section*.157}%
+\contentsline {subparagraph}{Paso 2}{147}{section*.158}%
+\contentsline {subparagraph}{Paso 3}{148}{section*.159}%
+\contentsline {subparagraph}{Paso 4}{148}{section*.161}%
+\contentsline {subparagraph}{Paso 5}{148}{section*.162}%
+\contentsline {subparagraph}{Paso 6}{150}{section*.164}%
+\contentsline {subparagraph}{Paso 7}{150}{section*.166}%
+\contentsline {subsection}{\numberline {8.3.4}Escenario 4}{151}{subsection.8.3.4}%
+\contentsline {subsubsection}{\numberline {8.3.4.1}Análisis de componentes}{151}{subsubsection.8.3.4.1}%
+\contentsline {subsubsection}{\numberline {8.3.4.2}Análisis de tráfico}{152}{subsubsection.8.3.4.2}%
+\contentsline {subparagraph}{Paso 1}{153}{section*.168}%
+\contentsline {subparagraph}{Paso 2}{153}{section*.169}%
+\contentsline {subparagraph}{Paso 3}{153}{section*.170}%
+\contentsline {subparagraph}{Paso 4}{155}{section*.173}%
+\contentsline {subparagraph}{Paso 5}{155}{section*.174}%
+\contentsline {subparagraph}{Paso 6}{155}{section*.176}%
+\contentsline {section}{\numberline {8.4}Comparativa de drivers}{155}{section.8.4}%
+\contentsline {section}{\numberline {8.5}Funcionalidades avanzadas}{155}{section.8.5}%
+\contentsline {subsection}{\numberline {8.5.1}Layer 3 High Availability}{155}{subsection.8.5.1}%
+\contentsline {chapter}{\numberline {9}Trabajo a futuro}{157}{chapter.9}%
+\contentsline {chapter}{\numberline {10}Conclusiones}{159}{chapter.10}%
+\contentsline {chapter}{Referencias bibliográficas}{160}{chapter*.182}%
+\contentsline {chapter}{Glosario}{167}{chapter*.182}%
+\contentsline {chapter}{\textbf {Apéndices}}{168}{section*.183}%
 \ttl@change@i {\@ne }{chapter}{13pt}{}{ Apéndice\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax 
 \ttl@change@v {chapter}{}{}{}\relax 
-\contentsline {chapter}{\numberline {1}Imágenes}{168}{appendix.Alph1}%
+\contentsline {chapter}{\numberline {1}Imágenes}{169}{appendix.Alph1}%
 \ttl@change@i {\@ne }{chapter}{0pt}{\vspace *{0.45cm}}{\thecontentslabel \quad }{}{\bfseries \hfill \contentspage }\relax 
 \ttl@change@v {chapter}{}{}{}\relax 
-\contentsline {chapter}{\textbf {Anexos}}{171}{section*.186}%
+\contentsline {chapter}{\textbf {Anexos}}{172}{section*.186}%
 \ttl@change@i {\@ne }{chapter}{13pt}{}{ Anexo\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax 
 \ttl@change@v {chapter}{}{}{}\relax 
-\contentsline {chapter}{\numberline {1}Instalación versión Queens}{172}{appendix.Anexo.1}%
-\contentsline {section}{\numberline {1.1}Preparación de nodos}{172}{section.Anexo.1.1}%
-\contentsline {section}{\numberline {1.2}Configuración}{181}{section.Anexo.1.2}%
-\contentsline {subsection}{\numberline {1.2.1}Configuración claves SSH}{181}{subsection.Anexo.1.2.1}%
-\contentsline {subsection}{\numberline {1.2.2}Archivos de configuración OSA}{182}{subsection.Anexo.1.2.2}%
-\contentsline {subsection}{\numberline {1.2.3}Generación de claves}{187}{subsection.Anexo.1.2.3}%
-\contentsline {subsection}{\numberline {1.2.4}Correcciones}{187}{subsection.Anexo.1.2.4}%
-\contentsline {subsubsection}{\numberline {1.2.4.1}SELinux}{187}{subsubsection.Anexo.1.2.4.1}%
-\contentsline {chapter}{\numberline {2}Instalación versión Stein}{189}{appendix.Anexo.2}%
-\contentsline {section}{\numberline {2.1}Preparación de nodos}{189}{section.Anexo.2.1}%
-\contentsline {section}{\numberline {2.2}Configuración archivos OSA}{202}{section.Anexo.2.2}%
-\contentsline {section}{\numberline {2.3}Cambios para driver OVS}{209}{section.Anexo.2.3}%
-\contentsline {chapter}{\numberline {3}Virtualización con KVM}{212}{appendix.Anexo.3}%
-\contentsline {section}{\numberline {3.1}Utilización virt-manager}{212}{section.Anexo.3.1}%
-\contentsline {subsection}{\numberline {3.1.1}Conexión remota}{212}{subsection.Anexo.3.1.1}%
-\contentsline {subsection}{\numberline {3.1.2}Creación de una red}{213}{subsection.Anexo.3.1.2}%
-\contentsline {subsection}{\numberline {3.1.3}Crear nodo}{215}{subsection.Anexo.3.1.3}%
-\contentsline {chapter}{\numberline {4}Interacción}{219}{appendix.Anexo.4}%
-\contentsline {section}{\numberline {4.1}Configuraciones de administrador}{220}{section.Anexo.4.1}%
-\contentsline {section}{\numberline {4.2}Interacción de un usuario}{226}{section.Anexo.4.2}%
-\contentsline {section}{\numberline {4.3}Acceso a una instancia}{234}{section.Anexo.4.3}%
-\contentsline {subsection}{\numberline {4.3.1}Por SPICE}{234}{subsection.Anexo.4.3.1}%
-\contentsline {subsection}{\numberline {4.3.2}Por SSH}{235}{subsection.Anexo.4.3.2}%
-\contentsline {subsubsection}{\numberline {4.3.2.1}Asociar una Floating IP a la instancia}{235}{subsubsection.Anexo.4.3.2.1}%
-\contentsline {subsubsection}{\numberline {4.3.2.2}Modificar security group}{236}{subsubsection.Anexo.4.3.2.2}%
-\contentsline {subsubsection}{\numberline {4.3.2.3}SSH}{237}{subsubsection.Anexo.4.3.2.3}%
-\contentsline {subsection}{\numberline {4.3.3}Por virsh}{238}{subsection.Anexo.4.3.3}%
-\contentsline {chapter}{\numberline {5}migrate\_instance.sh}{239}{appendix.Anexo.5}%
+\contentsline {chapter}{\numberline {1}Instalación versión Queens}{173}{appendix.Anexo.1}%
+\contentsline {section}{\numberline {1.1}Preparación de nodos}{173}{section.Anexo.1.1}%
+\contentsline {section}{\numberline {1.2}Configuración}{182}{section.Anexo.1.2}%
+\contentsline {subsection}{\numberline {1.2.1}Configuración claves SSH}{182}{subsection.Anexo.1.2.1}%
+\contentsline {subsection}{\numberline {1.2.2}Archivos de configuración OSA}{183}{subsection.Anexo.1.2.2}%
+\contentsline {subsection}{\numberline {1.2.3}Generación de claves}{188}{subsection.Anexo.1.2.3}%
+\contentsline {subsection}{\numberline {1.2.4}Correcciones}{188}{subsection.Anexo.1.2.4}%
+\contentsline {subsubsection}{\numberline {1.2.4.1}SELinux}{188}{subsubsection.Anexo.1.2.4.1}%
+\contentsline {chapter}{\numberline {2}Instalación versión Stein}{190}{appendix.Anexo.2}%
+\contentsline {section}{\numberline {2.1}Preparación de nodos}{190}{section.Anexo.2.1}%
+\contentsline {section}{\numberline {2.2}Configuración archivos OSA}{203}{section.Anexo.2.2}%
+\contentsline {section}{\numberline {2.3}Cambios para driver OVS}{210}{section.Anexo.2.3}%
+\contentsline {chapter}{\numberline {3}Virtualización con KVM}{213}{appendix.Anexo.3}%
+\contentsline {section}{\numberline {3.1}Utilización virt-manager}{213}{section.Anexo.3.1}%
+\contentsline {subsection}{\numberline {3.1.1}Conexión remota}{213}{subsection.Anexo.3.1.1}%
+\contentsline {subsection}{\numberline {3.1.2}Creación de una red}{214}{subsection.Anexo.3.1.2}%
+\contentsline {subsection}{\numberline {3.1.3}Crear nodo}{216}{subsection.Anexo.3.1.3}%
+\contentsline {chapter}{\numberline {4}Interacción}{220}{appendix.Anexo.4}%
+\contentsline {section}{\numberline {4.1}Configuraciones de administrador}{221}{section.Anexo.4.1}%
+\contentsline {section}{\numberline {4.2}Interacción de un usuario}{227}{section.Anexo.4.2}%
+\contentsline {section}{\numberline {4.3}Acceso a una instancia}{235}{section.Anexo.4.3}%
+\contentsline {subsection}{\numberline {4.3.1}Por SPICE}{235}{subsection.Anexo.4.3.1}%
+\contentsline {subsection}{\numberline {4.3.2}Por SSH}{236}{subsection.Anexo.4.3.2}%
+\contentsline {subsubsection}{\numberline {4.3.2.1}Asociar una Floating IP a la instancia}{236}{subsubsection.Anexo.4.3.2.1}%
+\contentsline {subsubsection}{\numberline {4.3.2.2}Modificar security group}{237}{subsubsection.Anexo.4.3.2.2}%
+\contentsline {subsubsection}{\numberline {4.3.2.3}SSH}{238}{subsubsection.Anexo.4.3.2.3}%
+\contentsline {subsection}{\numberline {4.3.3}Por virsh}{239}{subsection.Anexo.4.3.3}%
+\contentsline {chapter}{\numberline {5}migrate\_instance.sh}{240}{appendix.Anexo.5}%
 \contentsfinish 
diff --git a/docs/udelartex/tesis.xwm b/docs/udelartex/tesis.xwm
index a7c91424b954bf148de089a4a7b01910c5abe714..c95cf0b6eff1d7ad0ef2b562be8738f7b49be236 100644
--- a/docs/udelartex/tesis.xwm
+++ b/docs/udelartex/tesis.xwm
@@ -1,2 +1,2 @@
 \relax 
-\xwmnewlabel{xwmlastpage}{{5}{240}{migrate\_instance.sh\relax }{lstnumber.-305.31}{}}
+\xwmnewlabel{xwmlastpage}{{5}{241}{migrate\_instance.sh\relax }{lstnumber.-305.31}{}}