diff --git a/docs/udelartex/capitulos/openstack.tex b/docs/udelartex/capitulos/openstack.tex
index 97439d11ed2486044edc08360bc093a570aed953..11a4cba7933332f29432560ec1dcc0da44c024c4 100644
--- a/docs/udelartex/capitulos/openstack.tex
+++ b/docs/udelartex/capitulos/openstack.tex
@@ -1,4 +1,5 @@
 \chapter{OpenStack}
+En este capítulo se presenta la plataforma OpenStack utilizada para desplegar Datacenters. Se comienza con una breve definición e introducción histórica para luego detallar cada uno de los módulos que componen el core de la plataforma junto a una clasificación de los nodos de la infraestructura. Sobre el final del capítulo se mencionan métodos de instalación existentes, poniendo especial énfasis en la herramienta Ansible utilizada durante el proyecto.
 
 \section{Origen y definición}
 OpenStack fue creado en los primeros meses del 2010. En ese momento Rackspace quería reescribir el código de infraestructura que corría en sus servidores cloud y además estaban considerando hacer open source el código cloud existente. En ese entonces, Anso Labs, quienes trabajaban para la NASA, publicaron el código beta para Nova, un proyecto basado en Python descrito como “cloud computing fabric controller”. Dadas las semejanzas en las necesidades de ambas empresas, decidieron en unir fuerzas dando como resultado una base de OpenStack.
@@ -318,4 +319,5 @@ Es la unidad de acción en Ansible.
 \subparagraph{Playbook}
 Contienen una lista ordenada de tareas. Las playbooks se escriben en YAML lo cual beneficia la lectura, escritura y la comprensión de las mismas. Son una forma de organizar las tareas bajo un criterio determinado. En el caso de OSA utiliza varias playbooks para preparar el ambiente inicial, instalar los componentes de infraestructura, entre otros que se especificarán en las próximas secciones.
 
-
+\section*{Conclusión}
+Luego de haber investigado la composición de OpenStack, se observa que se trata de una plataforma de gran porte cuyo funcionamiento y configuración no parece ser sencillo. Sin embargo resulta relevante utilizar alguna de las herramientas de instalación que fueron mencionadas con el fin de tener un primer acercamiento a un despliegue completo. Por otro lado, se destaca como eficaz el hecho de que esté compuesto por módulos descentralizados, brindando la posibilidad de investigar y desarrollar cada uno de ellos en forma aislada. Otro aspecto sumamente positivo es que en su diseño se cuente con un conjunto de módulos core básicos lo que permite realizar un despliegue con lo mínimo indispensable. En caso de buscar funcionalidades más avanzadas, es posible agregar módulos adicionales más específicos.
diff --git a/docs/udelartex/tesis.lof b/docs/udelartex/tesis.lof
index 8237a6341f7b05d1298df7b57cbace1b61547e29..8011e04f559fdc115987bc540f24dda530d72676 100644
--- a/docs/udelartex/tesis.lof
+++ b/docs/udelartex/tesis.lof
@@ -14,96 +14,96 @@
 \contentsline {figure}{\numberline {4.2}{\ignorespaces Servicios y backends soportados por Keystone. Extraída de \cite {openstack-idm-book-1}.\relax }}{19}{figure.caption.21}%
 \contentsline {figure}{\numberline {4.3}{\ignorespaces Principales componentes de Nova. Extraída de \cite {openstack-nova-architecture}.\relax }}{21}{figure.caption.22}%
 \contentsline {figure}{\numberline {4.4}{\ignorespaces Arquitectura simplificada de Neutron. Extraída de \cite {openstack-networking-book-2}\relax }}{24}{figure.caption.28}%
-\contentsline {figure}{\numberline {4.5}{\ignorespaces Componentes del módulo Glance. Extraída de \cite {openstack-glance-architecture}.\relax }}{26}{figure.caption.32}%
+\contentsline {figure}{\numberline {4.5}{\ignorespaces Componentes del módulo Glance. Extraída de \cite {openstack-glance-architecture}.\relax }}{27}{figure.caption.32}%
 \contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de una VM. Extraída de \cite {openstack-images-instances}.\relax }}{27}{figure.caption.34}%
 \contentsline {figure}{\numberline {4.7}{\ignorespaces Principales componentes de Cinder. Extraído de \cite {redhat-cinder}.\relax }}{29}{figure.caption.35}%
 \contentsline {figure}{\numberline {4.8}{\ignorespaces Arquitectura del módulo Swift. Extraída de \cite {openstack-storage-components}.\relax }}{31}{figure.caption.36}%
 \contentsline {figure}{\numberline {4.9}{\ignorespaces Arquitectura de Neutron. Extraída de \cite {openstack-networking-book-1}.\relax }}{33}{figure.caption.40}%
 \addvspace {10\p@ }
-\contentsline {figure}{\numberline {5.1}{\ignorespaces Componentes de red en OpenStack. \cite {openstack-container-networking}.\relax }}{37}{figure.caption.52}%
-\contentsline {figure}{\numberline {5.2}{\ignorespaces Diagrama de múltiples interfaces de red. Extraída de \cite {openstack-networking-architecture}.\relax }}{39}{figure.caption.56}%
-\contentsline {figure}{\numberline {5.3}{\ignorespaces Diagrama de bonds de múltiples interfaces de red. Extraída de \cite {openstack-networking-architecture}.\relax }}{39}{figure.caption.57}%
-\contentsline {figure}{\numberline {5.4}{\ignorespaces Despliegue de servicios OpenStack en contenedores. Extraída de \cite {openstack-appendix-e}.\relax }}{41}{figure.caption.58}%
+\contentsline {figure}{\numberline {5.1}{\ignorespaces Componentes de red en OpenStack. \cite {openstack-container-networking}.\relax }}{38}{figure.caption.53}%
+\contentsline {figure}{\numberline {5.2}{\ignorespaces Diagrama de múltiples interfaces de red. Extraída de \cite {openstack-networking-architecture}.\relax }}{40}{figure.caption.57}%
+\contentsline {figure}{\numberline {5.3}{\ignorespaces Diagrama de bonds de múltiples interfaces de red. Extraída de \cite {openstack-networking-architecture}.\relax }}{40}{figure.caption.58}%
+\contentsline {figure}{\numberline {5.4}{\ignorespaces Despliegue de servicios OpenStack en contenedores. Extraída de \cite {openstack-appendix-e}.\relax }}{42}{figure.caption.59}%
 \addvspace {10\p@ }
-\contentsline {figure}{\numberline {6.1}{\ignorespaces Arquitectura diseñada.\relax }}{49}{figure.caption.59}%
-\contentsline {figure}{\numberline {6.2}{\ignorespaces Arquitectura diseñada para instalación Stein\relax }}{52}{figure.caption.60}%
-\contentsline {figure}{\numberline {6.3}{\ignorespaces Acceso remoto al servidor renata.\relax }}{54}{figure.caption.61}%
-\contentsline {figure}{\numberline {6.4}{\ignorespaces Túnel reverso y esquema de servidores.\relax }}{55}{figure.caption.62}%
-\contentsline {figure}{\numberline {6.5}{\ignorespaces Salida a Internet en los nodos de Openstack.\relax }}{56}{figure.caption.63}%
+\contentsline {figure}{\numberline {6.1}{\ignorespaces Arquitectura diseñada.\relax }}{50}{figure.caption.60}%
+\contentsline {figure}{\numberline {6.2}{\ignorespaces Arquitectura diseñada para instalación Stein\relax }}{53}{figure.caption.61}%
+\contentsline {figure}{\numberline {6.3}{\ignorespaces Acceso remoto al servidor renata.\relax }}{55}{figure.caption.62}%
+\contentsline {figure}{\numberline {6.4}{\ignorespaces Túnel reverso y esquema de servidores.\relax }}{56}{figure.caption.63}%
+\contentsline {figure}{\numberline {6.5}{\ignorespaces Salida a Internet en los nodos de Openstack.\relax }}{57}{figure.caption.64}%
 \addvspace {10\p@ }
-\contentsline {figure}{\numberline {7.1}{\ignorespaces Vista del login de Horizon.\relax }}{58}{figure.caption.64}%
-\contentsline {figure}{\numberline {7.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{59}{figure.caption.65}%
-\contentsline {figure}{\numberline {7.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{60}{figure.caption.66}%
-\contentsline {figure}{\numberline {7.4}{\ignorespaces Creación de un usuario.\relax }}{61}{figure.caption.67}%
-\contentsline {figure}{\numberline {7.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{62}{figure.caption.68}%
-\contentsline {figure}{\numberline {7.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{62}{figure.caption.69}%
-\contentsline {figure}{\numberline {7.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{63}{figure.caption.70}%
-\contentsline {figure}{\numberline {7.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{64}{figure.caption.71}%
-\contentsline {figure}{\numberline {7.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{65}{figure.caption.72}%
-\contentsline {figure}{\numberline {7.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{66}{figure.caption.73}%
-\contentsline {figure}{\numberline {7.11}{\ignorespaces Creación de una red (1/3).\relax }}{67}{figure.caption.74}%
-\contentsline {figure}{\numberline {7.12}{\ignorespaces Creación de una red (2/3).\relax }}{67}{figure.caption.75}%
-\contentsline {figure}{\numberline {7.13}{\ignorespaces Creación de una red (3/3).\relax }}{68}{figure.caption.76}%
-\contentsline {figure}{\numberline {7.14}{\ignorespaces Creación de un router.\relax }}{68}{figure.caption.77}%
-\contentsline {figure}{\numberline {7.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{69}{figure.caption.78}%
-\contentsline {figure}{\numberline {7.16}{\ignorespaces Creación de una key pair.\relax }}{69}{figure.caption.79}%
-\contentsline {figure}{\numberline {7.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{70}{figure.caption.80}%
-\contentsline {figure}{\numberline {7.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{70}{figure.caption.81}%
-\contentsline {figure}{\numberline {7.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{71}{figure.caption.82}%
-\contentsline {figure}{\numberline {7.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{71}{figure.caption.83}%
-\contentsline {figure}{\numberline {7.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{72}{figure.caption.84}%
-\contentsline {figure}{\numberline {7.22}{\ignorespaces Asignación de floating IP.\relax }}{73}{figure.caption.85}%
-\contentsline {figure}{\numberline {7.23}{\ignorespaces Asociación de floating IP.\relax }}{74}{figure.caption.86}%
-\contentsline {figure}{\numberline {7.24}{\ignorespaces Reglas security group por defecto.\relax }}{74}{figure.caption.87}%
-\contentsline {figure}{\numberline {7.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{75}{figure.caption.88}%
-\contentsline {figure}{\numberline {7.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{75}{figure.caption.89}%
+\contentsline {figure}{\numberline {7.1}{\ignorespaces Vista del login de Horizon.\relax }}{59}{figure.caption.65}%
+\contentsline {figure}{\numberline {7.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{60}{figure.caption.66}%
+\contentsline {figure}{\numberline {7.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{61}{figure.caption.67}%
+\contentsline {figure}{\numberline {7.4}{\ignorespaces Creación de un usuario.\relax }}{62}{figure.caption.68}%
+\contentsline {figure}{\numberline {7.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{63}{figure.caption.69}%
+\contentsline {figure}{\numberline {7.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{63}{figure.caption.70}%
+\contentsline {figure}{\numberline {7.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{64}{figure.caption.71}%
+\contentsline {figure}{\numberline {7.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{65}{figure.caption.72}%
+\contentsline {figure}{\numberline {7.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{66}{figure.caption.73}%
+\contentsline {figure}{\numberline {7.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{67}{figure.caption.74}%
+\contentsline {figure}{\numberline {7.11}{\ignorespaces Creación de una red (1/3).\relax }}{68}{figure.caption.75}%
+\contentsline {figure}{\numberline {7.12}{\ignorespaces Creación de una red (2/3).\relax }}{68}{figure.caption.76}%
+\contentsline {figure}{\numberline {7.13}{\ignorespaces Creación de una red (3/3).\relax }}{69}{figure.caption.77}%
+\contentsline {figure}{\numberline {7.14}{\ignorespaces Creación de un router.\relax }}{69}{figure.caption.78}%
+\contentsline {figure}{\numberline {7.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{70}{figure.caption.79}%
+\contentsline {figure}{\numberline {7.16}{\ignorespaces Creación de una key pair.\relax }}{70}{figure.caption.80}%
+\contentsline {figure}{\numberline {7.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{71}{figure.caption.81}%
+\contentsline {figure}{\numberline {7.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{71}{figure.caption.82}%
+\contentsline {figure}{\numberline {7.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{72}{figure.caption.83}%
+\contentsline {figure}{\numberline {7.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{72}{figure.caption.84}%
+\contentsline {figure}{\numberline {7.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{73}{figure.caption.85}%
+\contentsline {figure}{\numberline {7.22}{\ignorespaces Asignación de floating IP.\relax }}{74}{figure.caption.86}%
+\contentsline {figure}{\numberline {7.23}{\ignorespaces Asociación de floating IP.\relax }}{75}{figure.caption.87}%
+\contentsline {figure}{\numberline {7.24}{\ignorespaces Reglas security group por defecto.\relax }}{75}{figure.caption.88}%
+\contentsline {figure}{\numberline {7.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{76}{figure.caption.89}%
+\contentsline {figure}{\numberline {7.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{76}{figure.caption.90}%
 \addvspace {10\p@ }
 \addvspace {10\p@ }
-\contentsline {figure}{\numberline {9.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{89}{figure.caption.108}%
-\contentsline {figure}{\numberline {9.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{94}{figure.caption.111}%
-\contentsline {figure}{\numberline {9.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{94}{figure.caption.112}%
-\contentsline {figure}{\numberline {9.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{96}{figure.caption.113}%
-\contentsline {figure}{\numberline {9.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{97}{figure.caption.114}%
-\contentsline {figure}{\numberline {9.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{97}{figure.caption.116}%
-\contentsline {figure}{\numberline {9.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{98}{figure.caption.117}%
-\contentsline {figure}{\numberline {9.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{99}{figure.caption.119}%
-\contentsline {figure}{\numberline {9.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{106}{figure.caption.123}%
-\contentsline {figure}{\numberline {9.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{107}{figure.caption.127}%
-\contentsline {figure}{\numberline {9.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{107}{figure.caption.129}%
-\contentsline {figure}{\numberline {9.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{112}{figure.caption.133}%
-\contentsline {figure}{\numberline {9.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{113}{figure.caption.136}%
-\contentsline {figure}{\numberline {9.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{114}{figure.caption.138}%
-\contentsline {figure}{\numberline {9.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{115}{figure.caption.140}%
-\contentsline {figure}{\numberline {9.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{118}{figure.caption.144}%
-\contentsline {figure}{\numberline {9.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{118}{figure.caption.145}%
-\contentsline {figure}{\numberline {9.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{119}{figure.caption.148}%
-\contentsline {figure}{\numberline {9.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{120}{figure.caption.150}%
-\contentsline {figure}{\numberline {9.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{124}{figure.caption.151}%
-\contentsline {figure}{\numberline {9.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{131}{figure.caption.154}%
-\contentsline {figure}{\numberline {9.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{133}{figure.caption.155}%
-\contentsline {figure}{\numberline {9.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{137}{figure.caption.156}%
-\contentsline {figure}{\numberline {9.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{138}{figure.caption.157}%
-\contentsline {figure}{\numberline {9.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{138}{figure.caption.159}%
-\contentsline {figure}{\numberline {9.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{140}{figure.caption.160}%
-\contentsline {figure}{\numberline {9.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{141}{figure.caption.162}%
-\contentsline {figure}{\numberline {9.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{146}{figure.caption.166}%
-\contentsline {figure}{\numberline {9.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{147}{figure.caption.170}%
-\contentsline {figure}{\numberline {9.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{148}{figure.caption.172}%
-\contentsline {figure}{\numberline {9.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{152}{figure.caption.176}%
-\contentsline {figure}{\numberline {9.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{153}{figure.caption.179}%
-\contentsline {figure}{\numberline {9.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{154}{figure.caption.181}%
-\contentsline {figure}{\numberline {9.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{155}{figure.caption.183}%
-\contentsline {figure}{\numberline {9.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{158}{figure.caption.187}%
-\contentsline {figure}{\numberline {9.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{158}{figure.caption.188}%
-\contentsline {figure}{\numberline {9.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{159}{figure.caption.191}%
+\contentsline {figure}{\numberline {9.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{90}{figure.caption.109}%
+\contentsline {figure}{\numberline {9.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{95}{figure.caption.112}%
+\contentsline {figure}{\numberline {9.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{95}{figure.caption.113}%
+\contentsline {figure}{\numberline {9.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{97}{figure.caption.114}%
+\contentsline {figure}{\numberline {9.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{98}{figure.caption.115}%
+\contentsline {figure}{\numberline {9.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{98}{figure.caption.117}%
+\contentsline {figure}{\numberline {9.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{99}{figure.caption.118}%
+\contentsline {figure}{\numberline {9.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{100}{figure.caption.120}%
+\contentsline {figure}{\numberline {9.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{107}{figure.caption.124}%
+\contentsline {figure}{\numberline {9.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{108}{figure.caption.128}%
+\contentsline {figure}{\numberline {9.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{108}{figure.caption.130}%
+\contentsline {figure}{\numberline {9.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{113}{figure.caption.134}%
+\contentsline {figure}{\numberline {9.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{114}{figure.caption.137}%
+\contentsline {figure}{\numberline {9.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{115}{figure.caption.139}%
+\contentsline {figure}{\numberline {9.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{116}{figure.caption.141}%
+\contentsline {figure}{\numberline {9.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{119}{figure.caption.145}%
+\contentsline {figure}{\numberline {9.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{119}{figure.caption.146}%
+\contentsline {figure}{\numberline {9.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{120}{figure.caption.149}%
+\contentsline {figure}{\numberline {9.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{121}{figure.caption.151}%
+\contentsline {figure}{\numberline {9.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{125}{figure.caption.152}%
+\contentsline {figure}{\numberline {9.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{132}{figure.caption.155}%
+\contentsline {figure}{\numberline {9.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{134}{figure.caption.156}%
+\contentsline {figure}{\numberline {9.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{138}{figure.caption.157}%
+\contentsline {figure}{\numberline {9.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{139}{figure.caption.158}%
+\contentsline {figure}{\numberline {9.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{139}{figure.caption.160}%
+\contentsline {figure}{\numberline {9.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{141}{figure.caption.161}%
+\contentsline {figure}{\numberline {9.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{142}{figure.caption.163}%
+\contentsline {figure}{\numberline {9.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{147}{figure.caption.167}%
+\contentsline {figure}{\numberline {9.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{148}{figure.caption.171}%
+\contentsline {figure}{\numberline {9.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{149}{figure.caption.173}%
+\contentsline {figure}{\numberline {9.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{153}{figure.caption.177}%
+\contentsline {figure}{\numberline {9.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{154}{figure.caption.180}%
+\contentsline {figure}{\numberline {9.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{155}{figure.caption.182}%
+\contentsline {figure}{\numberline {9.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{156}{figure.caption.184}%
+\contentsline {figure}{\numberline {9.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{159}{figure.caption.188}%
+\contentsline {figure}{\numberline {9.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{159}{figure.caption.189}%
+\contentsline {figure}{\numberline {9.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{160}{figure.caption.192}%
 \addvspace {10\p@ }
 \addvspace {10\p@ }
 \addvspace {10\p@ }
-\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{172}{figure.caption.195}%
-\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{173}{figure.caption.196}%
+\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{173}{figure.caption.196}%
+\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{174}{figure.caption.197}%
 \addvspace {10\p@ }
 \addvspace {10\p@ }
 \addvspace {10\p@ }
-\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{218}{figure.caption.199}%
-\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{219}{figure.caption.200}%
+\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{219}{figure.caption.200}%
+\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{220}{figure.caption.201}%
 \contentsfinish 
diff --git a/docs/udelartex/tesis.lot b/docs/udelartex/tesis.lot
index ca38beec01ebe26bfeb7e2e414deba3673da581b..08e6d5faa7ad4fee7e5ec1e526c5b09701b9dc52 100644
--- a/docs/udelartex/tesis.lot
+++ b/docs/udelartex/tesis.lot
@@ -10,24 +10,24 @@
 \addvspace {10\p@ }
 \addvspace {10\p@ }
 \addvspace {10\p@ }
-\contentsline {table}{\numberline {9.1}{\ignorespaces Sabores creados para análisis de red\relax }}{83}{table.caption.90}%
-\contentsline {table}{\numberline {9.2}{\ignorespaces Imágenes creadas para análisis de red\relax }}{83}{table.caption.91}%
-\contentsline {table}{\numberline {9.3}{\ignorespaces Redes provider creadas para análisis de red\relax }}{84}{table.caption.92}%
-\contentsline {table}{\numberline {9.4}{\ignorespaces Subredes provider creadas para análisis de red\relax }}{84}{table.caption.93}%
-\contentsline {table}{\numberline {9.5}{\ignorespaces Escenario 1: detalles de la subred 1\relax }}{85}{table.caption.94}%
-\contentsline {table}{\numberline {9.6}{\ignorespaces Escenario 1: detalles de las instancias\relax }}{85}{table.caption.95}%
-\contentsline {table}{\numberline {9.7}{\ignorespaces Escenario 2: detalles de la subred 1\relax }}{86}{table.caption.96}%
-\contentsline {table}{\numberline {9.8}{\ignorespaces Escenario 2: detalles de la subred 2\relax }}{86}{table.caption.97}%
-\contentsline {table}{\numberline {9.9}{\ignorespaces Escenario 2: detalles de las instancias\relax }}{86}{table.caption.98}%
-\contentsline {table}{\numberline {9.10}{\ignorespaces Escenario 2: detalles del router\relax }}{86}{table.caption.99}%
-\contentsline {table}{\numberline {9.11}{\ignorespaces Escenario 3: detalles de la subred 1\relax }}{87}{table.caption.100}%
-\contentsline {table}{\numberline {9.12}{\ignorespaces Escenario 3: detalles de la subred provider vlan\relax }}{87}{table.caption.101}%
-\contentsline {table}{\numberline {9.13}{\ignorespaces Escenario 3: detalles de las instancias\relax }}{87}{table.caption.102}%
-\contentsline {table}{\numberline {9.14}{\ignorespaces Escenario 3: detalles del router\relax }}{87}{table.caption.103}%
-\contentsline {table}{\numberline {9.15}{\ignorespaces Escenario 4: detalles de la subred 1\relax }}{88}{table.caption.104}%
-\contentsline {table}{\numberline {9.16}{\ignorespaces Escenario 4: detalles de la subred provider vlan\relax }}{89}{table.caption.105}%
-\contentsline {table}{\numberline {9.17}{\ignorespaces Escenario 4: detalles de las instancias\relax }}{89}{table.caption.106}%
-\contentsline {table}{\numberline {9.18}{\ignorespaces Escenario 4: detalles del router\relax }}{89}{table.caption.107}%
+\contentsline {table}{\numberline {9.1}{\ignorespaces Sabores creados para análisis de red\relax }}{84}{table.caption.91}%
+\contentsline {table}{\numberline {9.2}{\ignorespaces Imágenes creadas para análisis de red\relax }}{84}{table.caption.92}%
+\contentsline {table}{\numberline {9.3}{\ignorespaces Redes provider creadas para análisis de red\relax }}{85}{table.caption.93}%
+\contentsline {table}{\numberline {9.4}{\ignorespaces Subredes provider creadas para análisis de red\relax }}{85}{table.caption.94}%
+\contentsline {table}{\numberline {9.5}{\ignorespaces Escenario 1: detalles de la subred 1\relax }}{86}{table.caption.95}%
+\contentsline {table}{\numberline {9.6}{\ignorespaces Escenario 1: detalles de las instancias\relax }}{86}{table.caption.96}%
+\contentsline {table}{\numberline {9.7}{\ignorespaces Escenario 2: detalles de la subred 1\relax }}{87}{table.caption.97}%
+\contentsline {table}{\numberline {9.8}{\ignorespaces Escenario 2: detalles de la subred 2\relax }}{87}{table.caption.98}%
+\contentsline {table}{\numberline {9.9}{\ignorespaces Escenario 2: detalles de las instancias\relax }}{87}{table.caption.99}%
+\contentsline {table}{\numberline {9.10}{\ignorespaces Escenario 2: detalles del router\relax }}{87}{table.caption.100}%
+\contentsline {table}{\numberline {9.11}{\ignorespaces Escenario 3: detalles de la subred 1\relax }}{88}{table.caption.101}%
+\contentsline {table}{\numberline {9.12}{\ignorespaces Escenario 3: detalles de la subred provider vlan\relax }}{88}{table.caption.102}%
+\contentsline {table}{\numberline {9.13}{\ignorespaces Escenario 3: detalles de las instancias\relax }}{88}{table.caption.103}%
+\contentsline {table}{\numberline {9.14}{\ignorespaces Escenario 3: detalles del router\relax }}{88}{table.caption.104}%
+\contentsline {table}{\numberline {9.15}{\ignorespaces Escenario 4: detalles de la subred 1\relax }}{89}{table.caption.105}%
+\contentsline {table}{\numberline {9.16}{\ignorespaces Escenario 4: detalles de la subred provider vlan\relax }}{90}{table.caption.106}%
+\contentsline {table}{\numberline {9.17}{\ignorespaces Escenario 4: detalles de las instancias\relax }}{90}{table.caption.107}%
+\contentsline {table}{\numberline {9.18}{\ignorespaces Escenario 4: detalles del router\relax }}{90}{table.caption.108}%
 \addvspace {10\p@ }
 \addvspace {10\p@ }
 \addvspace {10\p@ }
diff --git a/docs/udelartex/tesis.out b/docs/udelartex/tesis.out
index fe1a2a9eb025573313c871e07b7c366d06fbc81f..e499f01de4afccd21d956dfe14f80cac41f2e78a 100644
--- a/docs/udelartex/tesis.out
+++ b/docs/udelartex/tesis.out
@@ -89,11 +89,11 @@
 \BOOKMARK [2][-]{subsection.9.5.1}{Layer 3 High Availability}{section.9.5}% 89
 \BOOKMARK [0][-]{chapter.10}{Trabajo a futuro}{}% 90
 \BOOKMARK [0][-]{chapter.11}{Conclusiones}{}% 91
-\BOOKMARK [0][-]{chapter*.193}{Referencias bibliogr\341ficas}{}% 92
-\BOOKMARK [0][-]{chapter*.193}{Glosario}{}% 93
-\BOOKMARK [0][-]{section*.194}{Ap\351ndices}{}% 94
+\BOOKMARK [0][-]{chapter*.194}{Referencias bibliogr\341ficas}{}% 92
+\BOOKMARK [0][-]{chapter*.194}{Glosario}{}% 93
+\BOOKMARK [0][-]{section*.195}{Ap\351ndices}{}% 94
 \BOOKMARK [0][-]{appendix.Alph1}{Im\341genes}{}% 95
-\BOOKMARK [0][-]{section*.197}{Anexos}{}% 96
+\BOOKMARK [0][-]{section*.198}{Anexos}{}% 96
 \BOOKMARK [0][-]{appendix.Anexo.1}{Instalaci\363n versi\363n Queens}{}% 97
 \BOOKMARK [1][-]{section.Anexo.1.1}{Preparaci\363n de nodos}{appendix.Anexo.1}% 98
 \BOOKMARK [1][-]{section.Anexo.1.2}{Configuraci\363n}{appendix.Anexo.1}% 99
diff --git a/docs/udelartex/tesis.pdf b/docs/udelartex/tesis.pdf
index 484fbac73c98df2ecc9484dc39c71e3829890bbb..d523d5bce10b9baf669aa85434ed9bb8f092afd1 100644
Binary files a/docs/udelartex/tesis.pdf and b/docs/udelartex/tesis.pdf differ
diff --git a/docs/udelartex/tesis.synctex.gz b/docs/udelartex/tesis.synctex.gz
index 32df3cb2d1fd291ff0846f67279cfd2a4a0a3798..fffe7cca158d7fda12a9df43130e89de5145d054 100644
Binary files a/docs/udelartex/tesis.synctex.gz and b/docs/udelartex/tesis.synctex.gz differ
diff --git a/docs/udelartex/tesis.toc b/docs/udelartex/tesis.toc
index 9e78f5881a2eb4fdb5532137374167f15795c357..366f5b8ba950e5fe12a84bbafa565d76517b48cd 100644
--- a/docs/udelartex/tesis.toc
+++ b/docs/udelartex/tesis.toc
@@ -28,32 +28,32 @@
 \contentsline {chapter}{\numberline {4}OpenStack}{17}{chapter.4}%
 \contentsline {section}{\numberline {4.1}Origen y definición}{17}{section.4.1}%
 \contentsline {section}{\numberline {4.2}Módulos Core}{18}{section.4.2}%
-\contentsline {subsection}{\numberline {4.2.1}Keystone}{18}{subsection.4.2.1}%
-\contentsline {subsection}{\numberline {4.2.2}Nova}{20}{subsection.4.2.2}%
-\contentsline {subparagraph}{API}{21}{section*.23}%
-\contentsline {subparagraph}{Scheduler}{21}{section*.24}%
+\contentsline {subsection}{\numberline {4.2.1}Keystone}{19}{subsection.4.2.1}%
+\contentsline {subsection}{\numberline {4.2.2}Nova}{21}{subsection.4.2.2}%
+\contentsline {subparagraph}{API}{22}{section*.23}%
+\contentsline {subparagraph}{Scheduler}{22}{section*.24}%
 \contentsline {subparagraph}{Compute}{22}{section*.25}%
 \contentsline {subparagraph}{Conductor}{22}{section*.26}%
 \contentsline {subparagraph}{Placement}{23}{section*.27}%
 \contentsline {subsection}{\numberline {4.2.3}Neutron}{23}{subsection.4.2.3}%
 \contentsline {subparagraph}{Neutron-server}{23}{section*.29}%
-\contentsline {subparagraph}{Plugins y agentes}{23}{section*.30}%
-\contentsline {subparagraph}{Cola de mensajes}{23}{section*.31}%
+\contentsline {subparagraph}{Plugins y agentes}{24}{section*.30}%
+\contentsline {subparagraph}{Cola de mensajes}{24}{section*.31}%
 \contentsline {subsubsection}{\numberline {4.2.3.1}Tipos de redes en OpenStack}{24}{subsubsection.4.2.3.1}%
 \contentsline {subsubsection}{\numberline {4.2.3.2}Tipo de tráfico}{25}{subsubsection.4.2.3.2}%
 \contentsline {subsection}{\numberline {4.2.4}Glance}{25}{subsection.4.2.4}%
-\contentsline {subparagraph}{Creación de una VM}{27}{section*.33}%
+\contentsline {subparagraph}{Creación de una VM}{26}{section*.33}%
 \contentsline {subsection}{\numberline {4.2.5}Cinder}{28}{subsection.4.2.5}%
 \contentsline {subsection}{\numberline {4.2.6}Swift}{30}{subsection.4.2.6}%
 \contentsline {subparagraph}{Principales componentes}{30}{section*.37}%
 \contentsline {section}{\numberline {4.3}Tipos de nodos}{32}{section.4.3}%
 \contentsline {subparagraph}{Nodo de control}{32}{section*.38}%
 \contentsline {subparagraph}{Nodo de red}{32}{section*.39}%
-\contentsline {subparagraph}{Nodo de cómputo}{32}{section*.41}%
+\contentsline {subparagraph}{Nodo de cómputo}{33}{section*.41}%
 \contentsline {subparagraph}{Nodo de almacenamiento}{33}{section*.42}%
 \contentsline {subparagraph}{Nodo de balanceamiento de carga}{33}{section*.43}%
-\contentsline {section}{\numberline {4.4}Servicios de infraestructura}{33}{section.4.4}%
-\contentsline {subparagraph}{Galera - MariaDB}{33}{section*.44}%
+\contentsline {section}{\numberline {4.4}Servicios de infraestructura}{34}{section.4.4}%
+\contentsline {subparagraph}{Galera - MariaDB}{34}{section*.44}%
 \contentsline {subparagraph}{Message queue}{34}{section*.45}%
 \contentsline {subparagraph}{Memcached}{34}{section*.46}%
 \contentsline {section}{\numberline {4.5}Métodos de instalación}{34}{section.4.5}%
@@ -63,212 +63,212 @@
 \contentsline {subparagraph}{Módulos}{36}{section*.49}%
 \contentsline {subparagraph}{Tarea}{36}{section*.50}%
 \contentsline {subparagraph}{Playbook}{36}{section*.51}%
-\contentsline {chapter}{\numberline {5}OpenStack-Ansible}{37}{chapter.5}%
-\contentsline {section}{\numberline {5.1}Arquitectura}{37}{section.5.1}%
-\contentsline {subsection}{\numberline {5.1.1}Arquitectura de red}{38}{subsection.5.1.1}%
-\contentsline {subparagraph}{Management Network}{38}{section*.53}%
-\contentsline {subparagraph}{Overlay Network}{38}{section*.54}%
-\contentsline {subparagraph}{Storage Network}{38}{section*.55}%
-\contentsline {subsubsection}{\numberline {5.1.1.1}Interfaces de red}{38}{subsubsection.5.1.1.1}%
-\contentsline {section}{\numberline {5.2}Configuración OSA}{40}{section.5.2}%
-\contentsline {subsection}{\numberline {5.2.1}Convenciones}{40}{subsection.5.2.1}%
-\contentsline {subsection}{\numberline {5.2.2}Inventario}{41}{subsection.5.2.2}%
-\contentsline {subsection}{\numberline {5.2.3}openstack\_user\_config.yml}{42}{subsection.5.2.3}%
-\contentsline {subsection}{\numberline {5.2.4}user\_variables.yml}{43}{subsection.5.2.4}%
-\contentsline {section}{\numberline {5.3}Proceso de instalación}{43}{section.5.3}%
-\contentsline {subsection}{\numberline {5.3.1}setup-hosts.yml}{43}{subsection.5.3.1}%
-\contentsline {subsection}{\numberline {5.3.2}setup-infrastructure.yml}{44}{subsection.5.3.2}%
-\contentsline {subsection}{\numberline {5.3.3}setup-openstack.yml}{44}{subsection.5.3.3}%
-\contentsline {section}{\numberline {5.4}Verificación}{44}{section.5.4}%
-\contentsline {chapter}{\numberline {6}Diseño}{47}{chapter.6}%
-\contentsline {section}{\numberline {6.1}Diseño de arquitectura}{47}{section.6.1}%
-\contentsline {subsection}{\numberline {6.1.1}Arquitectura desarrollo}{47}{subsection.6.1.1}%
-\contentsline {subsection}{\numberline {6.1.2}Arquitectura producción}{50}{subsection.6.1.2}%
-\contentsline {subsection}{\numberline {6.1.3}Distribución de los servicios}{52}{subsection.6.1.3}%
-\contentsline {section}{\numberline {6.2}Ambiente de trabajo}{53}{section.6.2}%
-\contentsline {subsection}{\numberline {6.2.1}Hardware utilizado}{53}{subsection.6.2.1}%
-\contentsline {subsection}{\numberline {6.2.2}Conexión remota hacia el servidor renata}{54}{subsection.6.2.2}%
-\contentsline {subsection}{\numberline {6.2.3}Especificaciones servidor renata}{54}{subsection.6.2.3}%
-\contentsline {subsection}{\numberline {6.2.4}Acceso al exterior desde nodos}{56}{subsection.6.2.4}%
-\contentsline {chapter}{\numberline {7}Interaccción}{57}{chapter.7}%
-\contentsline {section}{\numberline {7.1}Configuraciones de administrador}{58}{section.7.1}%
-\contentsline {subsubsection}{\numberline {7.1.0.1}Crear proyecto}{58}{subsubsection.7.1.0.1}%
-\contentsline {subsubsection}{\numberline {7.1.0.2}Crear usuario}{60}{subsubsection.7.1.0.2}%
-\contentsline {subsubsection}{\numberline {7.1.0.3}Crear flavor}{61}{subsubsection.7.1.0.3}%
-\contentsline {subsubsection}{\numberline {7.1.0.4}Crear provider network}{63}{subsubsection.7.1.0.4}%
-\contentsline {section}{\numberline {7.2}Interacción de un usuario}{64}{section.7.2}%
-\contentsline {subsubsection}{\numberline {7.2.0.1}Crear imagen}{64}{subsubsection.7.2.0.1}%
-\contentsline {subsubsection}{\numberline {7.2.0.2}Crear red}{66}{subsubsection.7.2.0.2}%
-\contentsline {subsubsection}{\numberline {7.2.0.3}Crear router}{68}{subsubsection.7.2.0.3}%
-\contentsline {subsubsection}{\numberline {7.2.0.4}Crear interfaz de router}{69}{subsubsection.7.2.0.4}%
-\contentsline {subsubsection}{\numberline {7.2.0.5}Crear key pair}{69}{subsubsection.7.2.0.5}%
-\contentsline {subsubsection}{\numberline {7.2.0.6}Lanzar una instancia}{69}{subsubsection.7.2.0.6}%
-\contentsline {section}{\numberline {7.3}Acceso a una instancia}{72}{section.7.3}%
-\contentsline {subsection}{\numberline {7.3.1}Por SPICE}{72}{subsection.7.3.1}%
-\contentsline {subsection}{\numberline {7.3.2}Por SSH}{73}{subsection.7.3.2}%
-\contentsline {subsubsection}{\numberline {7.3.2.1}Asociar una Floating IP a la instancia}{73}{subsubsection.7.3.2.1}%
-\contentsline {subsubsection}{\numberline {7.3.2.2}Modificar security group}{74}{subsubsection.7.3.2.2}%
-\contentsline {subsubsection}{\numberline {7.3.2.3}SSH}{75}{subsubsection.7.3.2.3}%
-\contentsline {subsection}{\numberline {7.3.3}Por virsh}{76}{subsection.7.3.3}%
-\contentsline {chapter}{\numberline {8}Gestión del Datacenter}{77}{chapter.8}%
-\contentsline {section}{\numberline {8.1}Recuperación ante fallas}{77}{section.8.1}%
-\contentsline {subsection}{\numberline {8.1.1}Verificar el estado general de OpenStack}{77}{subsection.8.1.1}%
-\contentsline {subsection}{\numberline {8.1.2}Verificar estado de los componentes de la infraestructura}{78}{subsection.8.1.2}%
-\contentsline {subsection}{\numberline {8.1.3}Solucionar problemas}{78}{subsection.8.1.3}%
-\contentsline {subsection}{\numberline {8.1.4}Problemas con Ceph}{79}{subsection.8.1.4}%
-\contentsline {section}{\numberline {8.2}Agregar y remover nodos}{80}{section.8.2}%
-\contentsline {subsection}{\numberline {8.2.1}Agregar nodo de Cómputo}{80}{subsection.8.2.1}%
-\contentsline {subsection}{\numberline {8.2.2}Eliminar un nodo de cómputo}{82}{subsection.8.2.2}%
-\contentsline {subsection}{\numberline {8.2.3}Infraestructura}{82}{subsection.8.2.3}%
-\contentsline {subsection}{\numberline {8.2.4}Storage}{82}{subsection.8.2.4}%
-\contentsline {section}{\numberline {8.3}Actualizar versión}{82}{section.8.3}%
-\contentsline {chapter}{\numberline {9}Análisis del módulo de red}{83}{chapter.9}%
-\contentsline {section}{\numberline {9.1}Escenarios de prueba}{83}{section.9.1}%
-\contentsline {subsection}{\numberline {9.1.1}Escenario 1: tráfico este-oeste (misma red tenant)}{84}{subsection.9.1.1}%
-\contentsline {subsubsection}{\numberline {9.1.1.1}Composición del escenario}{84}{subsubsection.9.1.1.1}%
-\contentsline {subsection}{\numberline {9.1.2}Escenario 2: tráfico este-oeste (distintas redes tenant)}{85}{subsection.9.1.2}%
-\contentsline {subsubsection}{\numberline {9.1.2.1}Composición del escenario}{85}{subsubsection.9.1.2.1}%
-\contentsline {subsection}{\numberline {9.1.3}Escenario 3: tráfico norte-sur (acceso hacia el exterior)}{86}{subsection.9.1.3}%
-\contentsline {subsubsection}{\numberline {9.1.3.1}Composición del escenario}{87}{subsubsection.9.1.3.1}%
-\contentsline {subsection}{\numberline {9.1.4}Escenario 4: tráfico norte-sur (acceso desde el exterior)}{88}{subsection.9.1.4}%
-\contentsline {subsubsection}{\numberline {9.1.4.1}Composición del escenario}{88}{subsubsection.9.1.4.1}%
-\contentsline {section}{\numberline {9.2}Linux bridge}{88}{section.9.2}%
-\contentsline {subsection}{\numberline {9.2.1}Escenario 1}{89}{subsection.9.2.1}%
-\contentsline {subsubsection}{\numberline {9.2.1.1}Análisis de componentes}{90}{subsubsection.9.2.1.1}%
-\contentsline {subsubsection}{\numberline {9.2.1.2}Análisis de tráfico}{93}{subsubsection.9.2.1.2}%
-\contentsline {subparagraph}{Paso 1}{93}{section*.109}%
-\contentsline {subparagraph}{Paso 2}{93}{section*.110}%
-\contentsline {subparagraph}{Paso 3}{97}{section*.115}%
-\contentsline {subparagraph}{Paso 4}{98}{section*.118}%
-\contentsline {subsection}{\numberline {9.2.2}Escenario 2}{99}{subsection.9.2.2}%
-\contentsline {subsubsection}{\numberline {9.2.2.1}Análisis de componentes}{99}{subsubsection.9.2.2.1}%
-\contentsline {subsubsection}{\numberline {9.2.2.2}Análisis de tráfico}{105}{subsubsection.9.2.2.2}%
-\contentsline {subparagraph}{Paso 1}{105}{section*.120}%
-\contentsline {subparagraph}{Paso 2}{105}{section*.121}%
-\contentsline {subparagraph}{Paso 3}{105}{section*.122}%
-\contentsline {subparagraph}{Paso 4}{106}{section*.124}%
-\contentsline {subparagraph}{Paso 5}{106}{section*.125}%
-\contentsline {subparagraph}{Paso 6}{106}{section*.126}%
-\contentsline {subparagraph}{Paso 7}{106}{section*.128}%
-\contentsline {subsection}{\numberline {9.2.3}Escenario 3}{107}{subsection.9.2.3}%
-\contentsline {subsubsection}{\numberline {9.2.3.1}Análisis de componentes}{108}{subsubsection.9.2.3.1}%
-\contentsline {subsubsection}{\numberline {9.2.3.2}Análisis de tráfico}{111}{subsubsection.9.2.3.2}%
-\contentsline {subparagraph}{Paso 1}{111}{section*.130}%
-\contentsline {subparagraph}{Paso 2}{111}{section*.131}%
-\contentsline {subparagraph}{Paso 3}{111}{section*.132}%
-\contentsline {subparagraph}{Paso 4}{112}{section*.134}%
-\contentsline {subparagraph}{Paso 5}{112}{section*.135}%
-\contentsline {subparagraph}{Paso 6}{113}{section*.137}%
-\contentsline {subparagraph}{Paso 7}{114}{section*.139}%
-\contentsline {subsection}{\numberline {9.2.4}Escenario 4}{115}{subsection.9.2.4}%
-\contentsline {subsubsection}{\numberline {9.2.4.1}Análisis de componentes}{115}{subsubsection.9.2.4.1}%
-\contentsline {subsubsection}{\numberline {9.2.4.2}Análisis de tráfico}{117}{subsubsection.9.2.4.2}%
-\contentsline {subparagraph}{Paso 1}{117}{section*.141}%
-\contentsline {subparagraph}{Paso 2}{117}{section*.142}%
-\contentsline {subparagraph}{Paso 3}{117}{section*.143}%
-\contentsline {subparagraph}{Paso 4}{118}{section*.146}%
-\contentsline {subparagraph}{Paso 5}{118}{section*.147}%
-\contentsline {subparagraph}{Paso 6}{119}{section*.149}%
-\contentsline {section}{\numberline {9.3}Open vSwitch}{119}{section.9.3}%
-\contentsline {subsubsection}{\numberline {9.3.0.1}Archivos de configuración}{121}{subsubsection.9.3.0.1}%
-\contentsline {subsection}{\numberline {9.3.1}Escenario 1}{124}{subsection.9.3.1}%
-\contentsline {subsubsection}{\numberline {9.3.1.1}Análisis de componentes}{124}{subsubsection.9.3.1.1}%
-\contentsline {subsubsection}{\numberline {9.3.1.2}Análisis de tráfico}{130}{subsubsection.9.3.1.2}%
-\contentsline {subparagraph}{Paso 1}{130}{section*.152}%
-\contentsline {subparagraph}{Paso 2}{131}{section*.153}%
-\contentsline {subparagraph}{Paso 3}{138}{section*.158}%
-\contentsline {subparagraph}{Paso 4}{140}{section*.161}%
-\contentsline {subsection}{\numberline {9.3.2}Escenario 2}{141}{subsection.9.3.2}%
-\contentsline {subsubsection}{\numberline {9.3.2.1}Análisis de componentes}{141}{subsubsection.9.3.2.1}%
-\contentsline {subsubsection}{\numberline {9.3.2.2}Análisis de tráfico}{145}{subsubsection.9.3.2.2}%
-\contentsline {subparagraph}{Paso 1}{146}{section*.163}%
-\contentsline {subparagraph}{Paso 2}{146}{section*.164}%
-\contentsline {subparagraph}{Paso 3}{146}{section*.165}%
-\contentsline {subparagraph}{Paso 4}{146}{section*.167}%
-\contentsline {subparagraph}{Paso 5}{147}{section*.168}%
-\contentsline {subparagraph}{Paso 6}{147}{section*.169}%
-\contentsline {subparagraph}{Paso 7}{147}{section*.171}%
-\contentsline {subsection}{\numberline {9.3.3}Escenario 3}{148}{subsection.9.3.3}%
-\contentsline {subsubsection}{\numberline {9.3.3.1}Análisis de componentes}{148}{subsubsection.9.3.3.1}%
-\contentsline {subsubsection}{\numberline {9.3.3.2}Análisis de tráfico}{151}{subsubsection.9.3.3.2}%
-\contentsline {subparagraph}{Paso 1}{151}{section*.173}%
-\contentsline {subparagraph}{Paso 2}{151}{section*.174}%
-\contentsline {subparagraph}{Paso 3}{152}{section*.175}%
-\contentsline {subparagraph}{Paso 4}{152}{section*.177}%
-\contentsline {subparagraph}{Paso 5}{152}{section*.178}%
-\contentsline {subparagraph}{Paso 6}{154}{section*.180}%
-\contentsline {subparagraph}{Paso 7}{154}{section*.182}%
-\contentsline {subsection}{\numberline {9.3.4}Escenario 4}{155}{subsection.9.3.4}%
-\contentsline {subsubsection}{\numberline {9.3.4.1}Análisis de componentes}{155}{subsubsection.9.3.4.1}%
-\contentsline {subsubsection}{\numberline {9.3.4.2}Análisis de tráfico}{156}{subsubsection.9.3.4.2}%
-\contentsline {subparagraph}{Paso 1}{157}{section*.184}%
-\contentsline {subparagraph}{Paso 2}{157}{section*.185}%
-\contentsline {subparagraph}{Paso 3}{157}{section*.186}%
-\contentsline {subparagraph}{Paso 4}{159}{section*.189}%
-\contentsline {subparagraph}{Paso 5}{159}{section*.190}%
-\contentsline {subparagraph}{Paso 6}{159}{section*.192}%
-\contentsline {section}{\numberline {9.4}Comparativa de drivers}{159}{section.9.4}%
-\contentsline {section}{\numberline {9.5}Funcionalidades avanzadas}{159}{section.9.5}%
-\contentsline {subsection}{\numberline {9.5.1}Layer 3 High Availability}{159}{subsection.9.5.1}%
-\contentsline {chapter}{\numberline {10}Trabajo a futuro}{160}{chapter.10}%
-\contentsline {subsubsection}{\numberline {10.0.0.1}Firewall}{160}{subsubsection.10.0.0.1}%
-\contentsline {subsubsection}{\numberline {10.0.0.2}Arquitectura segura}{160}{subsubsection.10.0.0.2}%
-\contentsline {subsubsection}{\numberline {10.0.0.3}Brindar conexión directa a Internet}{161}{subsubsection.10.0.0.3}%
-\contentsline {subsubsection}{\numberline {10.0.0.4}Gestión de Openstack en operación}{161}{subsubsection.10.0.0.4}%
-\contentsline {chapter}{\numberline {11}Conclusiones}{162}{chapter.11}%
-\contentsline {chapter}{Referencias bibliográficas}{163}{chapter*.193}%
-\contentsline {chapter}{Glosario}{169}{chapter*.193}%
-\contentsline {chapter}{\textbf {Apéndices}}{170}{section*.194}%
+\contentsline {chapter}{\numberline {5}OpenStack-Ansible}{38}{chapter.5}%
+\contentsline {section}{\numberline {5.1}Arquitectura}{38}{section.5.1}%
+\contentsline {subsection}{\numberline {5.1.1}Arquitectura de red}{39}{subsection.5.1.1}%
+\contentsline {subparagraph}{Management Network}{39}{section*.54}%
+\contentsline {subparagraph}{Overlay Network}{39}{section*.55}%
+\contentsline {subparagraph}{Storage Network}{39}{section*.56}%
+\contentsline {subsubsection}{\numberline {5.1.1.1}Interfaces de red}{39}{subsubsection.5.1.1.1}%
+\contentsline {section}{\numberline {5.2}Configuración OSA}{41}{section.5.2}%
+\contentsline {subsection}{\numberline {5.2.1}Convenciones}{41}{subsection.5.2.1}%
+\contentsline {subsection}{\numberline {5.2.2}Inventario}{42}{subsection.5.2.2}%
+\contentsline {subsection}{\numberline {5.2.3}openstack\_user\_config.yml}{43}{subsection.5.2.3}%
+\contentsline {subsection}{\numberline {5.2.4}user\_variables.yml}{44}{subsection.5.2.4}%
+\contentsline {section}{\numberline {5.3}Proceso de instalación}{44}{section.5.3}%
+\contentsline {subsection}{\numberline {5.3.1}setup-hosts.yml}{44}{subsection.5.3.1}%
+\contentsline {subsection}{\numberline {5.3.2}setup-infrastructure.yml}{45}{subsection.5.3.2}%
+\contentsline {subsection}{\numberline {5.3.3}setup-openstack.yml}{45}{subsection.5.3.3}%
+\contentsline {section}{\numberline {5.4}Verificación}{45}{section.5.4}%
+\contentsline {chapter}{\numberline {6}Diseño}{48}{chapter.6}%
+\contentsline {section}{\numberline {6.1}Diseño de arquitectura}{48}{section.6.1}%
+\contentsline {subsection}{\numberline {6.1.1}Arquitectura desarrollo}{48}{subsection.6.1.1}%
+\contentsline {subsection}{\numberline {6.1.2}Arquitectura producción}{51}{subsection.6.1.2}%
+\contentsline {subsection}{\numberline {6.1.3}Distribución de los servicios}{53}{subsection.6.1.3}%
+\contentsline {section}{\numberline {6.2}Ambiente de trabajo}{54}{section.6.2}%
+\contentsline {subsection}{\numberline {6.2.1}Hardware utilizado}{54}{subsection.6.2.1}%
+\contentsline {subsection}{\numberline {6.2.2}Conexión remota hacia el servidor renata}{55}{subsection.6.2.2}%
+\contentsline {subsection}{\numberline {6.2.3}Especificaciones servidor renata}{55}{subsection.6.2.3}%
+\contentsline {subsection}{\numberline {6.2.4}Acceso al exterior desde nodos}{57}{subsection.6.2.4}%
+\contentsline {chapter}{\numberline {7}Interaccción}{58}{chapter.7}%
+\contentsline {section}{\numberline {7.1}Configuraciones de administrador}{59}{section.7.1}%
+\contentsline {subsubsection}{\numberline {7.1.0.1}Crear proyecto}{59}{subsubsection.7.1.0.1}%
+\contentsline {subsubsection}{\numberline {7.1.0.2}Crear usuario}{61}{subsubsection.7.1.0.2}%
+\contentsline {subsubsection}{\numberline {7.1.0.3}Crear flavor}{62}{subsubsection.7.1.0.3}%
+\contentsline {subsubsection}{\numberline {7.1.0.4}Crear provider network}{64}{subsubsection.7.1.0.4}%
+\contentsline {section}{\numberline {7.2}Interacción de un usuario}{65}{section.7.2}%
+\contentsline {subsubsection}{\numberline {7.2.0.1}Crear imagen}{65}{subsubsection.7.2.0.1}%
+\contentsline {subsubsection}{\numberline {7.2.0.2}Crear red}{67}{subsubsection.7.2.0.2}%
+\contentsline {subsubsection}{\numberline {7.2.0.3}Crear router}{69}{subsubsection.7.2.0.3}%
+\contentsline {subsubsection}{\numberline {7.2.0.4}Crear interfaz de router}{70}{subsubsection.7.2.0.4}%
+\contentsline {subsubsection}{\numberline {7.2.0.5}Crear key pair}{70}{subsubsection.7.2.0.5}%
+\contentsline {subsubsection}{\numberline {7.2.0.6}Lanzar una instancia}{70}{subsubsection.7.2.0.6}%
+\contentsline {section}{\numberline {7.3}Acceso a una instancia}{73}{section.7.3}%
+\contentsline {subsection}{\numberline {7.3.1}Por SPICE}{73}{subsection.7.3.1}%
+\contentsline {subsection}{\numberline {7.3.2}Por SSH}{74}{subsection.7.3.2}%
+\contentsline {subsubsection}{\numberline {7.3.2.1}Asociar una Floating IP a la instancia}{74}{subsubsection.7.3.2.1}%
+\contentsline {subsubsection}{\numberline {7.3.2.2}Modificar security group}{75}{subsubsection.7.3.2.2}%
+\contentsline {subsubsection}{\numberline {7.3.2.3}SSH}{76}{subsubsection.7.3.2.3}%
+\contentsline {subsection}{\numberline {7.3.3}Por virsh}{77}{subsection.7.3.3}%
+\contentsline {chapter}{\numberline {8}Gestión del Datacenter}{78}{chapter.8}%
+\contentsline {section}{\numberline {8.1}Recuperación ante fallas}{78}{section.8.1}%
+\contentsline {subsection}{\numberline {8.1.1}Verificar el estado general de OpenStack}{78}{subsection.8.1.1}%
+\contentsline {subsection}{\numberline {8.1.2}Verificar estado de los componentes de la infraestructura}{79}{subsection.8.1.2}%
+\contentsline {subsection}{\numberline {8.1.3}Solucionar problemas}{79}{subsection.8.1.3}%
+\contentsline {subsection}{\numberline {8.1.4}Problemas con Ceph}{80}{subsection.8.1.4}%
+\contentsline {section}{\numberline {8.2}Agregar y remover nodos}{81}{section.8.2}%
+\contentsline {subsection}{\numberline {8.2.1}Agregar nodo de Cómputo}{81}{subsection.8.2.1}%
+\contentsline {subsection}{\numberline {8.2.2}Eliminar un nodo de cómputo}{83}{subsection.8.2.2}%
+\contentsline {subsection}{\numberline {8.2.3}Infraestructura}{83}{subsection.8.2.3}%
+\contentsline {subsection}{\numberline {8.2.4}Storage}{83}{subsection.8.2.4}%
+\contentsline {section}{\numberline {8.3}Actualizar versión}{83}{section.8.3}%
+\contentsline {chapter}{\numberline {9}Análisis del módulo de red}{84}{chapter.9}%
+\contentsline {section}{\numberline {9.1}Escenarios de prueba}{84}{section.9.1}%
+\contentsline {subsection}{\numberline {9.1.1}Escenario 1: tráfico este-oeste (misma red tenant)}{85}{subsection.9.1.1}%
+\contentsline {subsubsection}{\numberline {9.1.1.1}Composición del escenario}{85}{subsubsection.9.1.1.1}%
+\contentsline {subsection}{\numberline {9.1.2}Escenario 2: tráfico este-oeste (distintas redes tenant)}{86}{subsection.9.1.2}%
+\contentsline {subsubsection}{\numberline {9.1.2.1}Composición del escenario}{86}{subsubsection.9.1.2.1}%
+\contentsline {subsection}{\numberline {9.1.3}Escenario 3: tráfico norte-sur (acceso hacia el exterior)}{87}{subsection.9.1.3}%
+\contentsline {subsubsection}{\numberline {9.1.3.1}Composición del escenario}{88}{subsubsection.9.1.3.1}%
+\contentsline {subsection}{\numberline {9.1.4}Escenario 4: tráfico norte-sur (acceso desde el exterior)}{89}{subsection.9.1.4}%
+\contentsline {subsubsection}{\numberline {9.1.4.1}Composición del escenario}{89}{subsubsection.9.1.4.1}%
+\contentsline {section}{\numberline {9.2}Linux bridge}{89}{section.9.2}%
+\contentsline {subsection}{\numberline {9.2.1}Escenario 1}{90}{subsection.9.2.1}%
+\contentsline {subsubsection}{\numberline {9.2.1.1}Análisis de componentes}{91}{subsubsection.9.2.1.1}%
+\contentsline {subsubsection}{\numberline {9.2.1.2}Análisis de tráfico}{94}{subsubsection.9.2.1.2}%
+\contentsline {subparagraph}{Paso 1}{94}{section*.110}%
+\contentsline {subparagraph}{Paso 2}{94}{section*.111}%
+\contentsline {subparagraph}{Paso 3}{98}{section*.116}%
+\contentsline {subparagraph}{Paso 4}{99}{section*.119}%
+\contentsline {subsection}{\numberline {9.2.2}Escenario 2}{100}{subsection.9.2.2}%
+\contentsline {subsubsection}{\numberline {9.2.2.1}Análisis de componentes}{100}{subsubsection.9.2.2.1}%
+\contentsline {subsubsection}{\numberline {9.2.2.2}Análisis de tráfico}{106}{subsubsection.9.2.2.2}%
+\contentsline {subparagraph}{Paso 1}{106}{section*.121}%
+\contentsline {subparagraph}{Paso 2}{106}{section*.122}%
+\contentsline {subparagraph}{Paso 3}{106}{section*.123}%
+\contentsline {subparagraph}{Paso 4}{107}{section*.125}%
+\contentsline {subparagraph}{Paso 5}{107}{section*.126}%
+\contentsline {subparagraph}{Paso 6}{107}{section*.127}%
+\contentsline {subparagraph}{Paso 7}{107}{section*.129}%
+\contentsline {subsection}{\numberline {9.2.3}Escenario 3}{108}{subsection.9.2.3}%
+\contentsline {subsubsection}{\numberline {9.2.3.1}Análisis de componentes}{109}{subsubsection.9.2.3.1}%
+\contentsline {subsubsection}{\numberline {9.2.3.2}Análisis de tráfico}{112}{subsubsection.9.2.3.2}%
+\contentsline {subparagraph}{Paso 1}{112}{section*.131}%
+\contentsline {subparagraph}{Paso 2}{112}{section*.132}%
+\contentsline {subparagraph}{Paso 3}{112}{section*.133}%
+\contentsline {subparagraph}{Paso 4}{113}{section*.135}%
+\contentsline {subparagraph}{Paso 5}{113}{section*.136}%
+\contentsline {subparagraph}{Paso 6}{114}{section*.138}%
+\contentsline {subparagraph}{Paso 7}{115}{section*.140}%
+\contentsline {subsection}{\numberline {9.2.4}Escenario 4}{116}{subsection.9.2.4}%
+\contentsline {subsubsection}{\numberline {9.2.4.1}Análisis de componentes}{116}{subsubsection.9.2.4.1}%
+\contentsline {subsubsection}{\numberline {9.2.4.2}Análisis de tráfico}{118}{subsubsection.9.2.4.2}%
+\contentsline {subparagraph}{Paso 1}{118}{section*.142}%
+\contentsline {subparagraph}{Paso 2}{118}{section*.143}%
+\contentsline {subparagraph}{Paso 3}{118}{section*.144}%
+\contentsline {subparagraph}{Paso 4}{119}{section*.147}%
+\contentsline {subparagraph}{Paso 5}{119}{section*.148}%
+\contentsline {subparagraph}{Paso 6}{120}{section*.150}%
+\contentsline {section}{\numberline {9.3}Open vSwitch}{120}{section.9.3}%
+\contentsline {subsubsection}{\numberline {9.3.0.1}Archivos de configuración}{122}{subsubsection.9.3.0.1}%
+\contentsline {subsection}{\numberline {9.3.1}Escenario 1}{125}{subsection.9.3.1}%
+\contentsline {subsubsection}{\numberline {9.3.1.1}Análisis de componentes}{125}{subsubsection.9.3.1.1}%
+\contentsline {subsubsection}{\numberline {9.3.1.2}Análisis de tráfico}{131}{subsubsection.9.3.1.2}%
+\contentsline {subparagraph}{Paso 1}{131}{section*.153}%
+\contentsline {subparagraph}{Paso 2}{132}{section*.154}%
+\contentsline {subparagraph}{Paso 3}{139}{section*.159}%
+\contentsline {subparagraph}{Paso 4}{141}{section*.162}%
+\contentsline {subsection}{\numberline {9.3.2}Escenario 2}{142}{subsection.9.3.2}%
+\contentsline {subsubsection}{\numberline {9.3.2.1}Análisis de componentes}{142}{subsubsection.9.3.2.1}%
+\contentsline {subsubsection}{\numberline {9.3.2.2}Análisis de tráfico}{146}{subsubsection.9.3.2.2}%
+\contentsline {subparagraph}{Paso 1}{147}{section*.164}%
+\contentsline {subparagraph}{Paso 2}{147}{section*.165}%
+\contentsline {subparagraph}{Paso 3}{147}{section*.166}%
+\contentsline {subparagraph}{Paso 4}{147}{section*.168}%
+\contentsline {subparagraph}{Paso 5}{148}{section*.169}%
+\contentsline {subparagraph}{Paso 6}{148}{section*.170}%
+\contentsline {subparagraph}{Paso 7}{148}{section*.172}%
+\contentsline {subsection}{\numberline {9.3.3}Escenario 3}{149}{subsection.9.3.3}%
+\contentsline {subsubsection}{\numberline {9.3.3.1}Análisis de componentes}{149}{subsubsection.9.3.3.1}%
+\contentsline {subsubsection}{\numberline {9.3.3.2}Análisis de tráfico}{152}{subsubsection.9.3.3.2}%
+\contentsline {subparagraph}{Paso 1}{152}{section*.174}%
+\contentsline {subparagraph}{Paso 2}{152}{section*.175}%
+\contentsline {subparagraph}{Paso 3}{153}{section*.176}%
+\contentsline {subparagraph}{Paso 4}{153}{section*.178}%
+\contentsline {subparagraph}{Paso 5}{153}{section*.179}%
+\contentsline {subparagraph}{Paso 6}{155}{section*.181}%
+\contentsline {subparagraph}{Paso 7}{155}{section*.183}%
+\contentsline {subsection}{\numberline {9.3.4}Escenario 4}{156}{subsection.9.3.4}%
+\contentsline {subsubsection}{\numberline {9.3.4.1}Análisis de componentes}{156}{subsubsection.9.3.4.1}%
+\contentsline {subsubsection}{\numberline {9.3.4.2}Análisis de tráfico}{157}{subsubsection.9.3.4.2}%
+\contentsline {subparagraph}{Paso 1}{158}{section*.185}%
+\contentsline {subparagraph}{Paso 2}{158}{section*.186}%
+\contentsline {subparagraph}{Paso 3}{158}{section*.187}%
+\contentsline {subparagraph}{Paso 4}{160}{section*.190}%
+\contentsline {subparagraph}{Paso 5}{160}{section*.191}%
+\contentsline {subparagraph}{Paso 6}{160}{section*.193}%
+\contentsline {section}{\numberline {9.4}Comparativa de drivers}{160}{section.9.4}%
+\contentsline {section}{\numberline {9.5}Funcionalidades avanzadas}{160}{section.9.5}%
+\contentsline {subsection}{\numberline {9.5.1}Layer 3 High Availability}{160}{subsection.9.5.1}%
+\contentsline {chapter}{\numberline {10}Trabajo a futuro}{161}{chapter.10}%
+\contentsline {subsubsection}{\numberline {10.0.0.1}Firewall}{161}{subsubsection.10.0.0.1}%
+\contentsline {subsubsection}{\numberline {10.0.0.2}Arquitectura segura}{161}{subsubsection.10.0.0.2}%
+\contentsline {subsubsection}{\numberline {10.0.0.3}Brindar conexión directa a Internet}{162}{subsubsection.10.0.0.3}%
+\contentsline {subsubsection}{\numberline {10.0.0.4}Gestión de Openstack en operación}{162}{subsubsection.10.0.0.4}%
+\contentsline {chapter}{\numberline {11}Conclusiones}{163}{chapter.11}%
+\contentsline {chapter}{Referencias bibliográficas}{164}{chapter*.194}%
+\contentsline {chapter}{Glosario}{170}{chapter*.194}%
+\contentsline {chapter}{\textbf {Apéndices}}{171}{section*.195}%
 \ttl@change@i {\@ne }{chapter}{13pt}{}{ Apéndice\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax 
 \ttl@change@v {chapter}{}{}{}\relax 
-\contentsline {chapter}{\numberline {1}Imágenes}{171}{appendix.Alph1}%
+\contentsline {chapter}{\numberline {1}Imágenes}{172}{appendix.Alph1}%
 \ttl@change@i {\@ne }{chapter}{0pt}{\vspace *{0.45cm}}{\thecontentslabel \quad }{}{\bfseries \hfill \contentspage }\relax 
 \ttl@change@v {chapter}{}{}{}\relax 
-\contentsline {chapter}{\textbf {Anexos}}{174}{section*.197}%
+\contentsline {chapter}{\textbf {Anexos}}{175}{section*.198}%
 \ttl@change@i {\@ne }{chapter}{13pt}{}{ Anexo\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax 
 \ttl@change@v {chapter}{}{}{}\relax 
-\contentsline {chapter}{\numberline {1}Instalación versión Queens}{175}{appendix.Anexo.1}%
-\contentsline {section}{\numberline {1.1}Preparación de nodos}{175}{section.Anexo.1.1}%
-\contentsline {subsubsection}{\numberline {1.1.0.1}Deploy}{175}{subsubsection.Anexo.1.1.0.1}%
-\contentsline {subsubsection}{\numberline {1.1.0.2}Infra1}{178}{subsubsection.Anexo.1.1.0.2}%
-\contentsline {subsubsection}{\numberline {1.1.0.3}Compute1}{180}{subsubsection.Anexo.1.1.0.3}%
-\contentsline {subsubsection}{\numberline {1.1.0.4}Storage1}{182}{subsubsection.Anexo.1.1.0.4}%
-\contentsline {subsubsection}{\numberline {1.1.0.5}HAproxy1}{183}{subsubsection.Anexo.1.1.0.5}%
-\contentsline {section}{\numberline {1.2}Configuración}{184}{section.Anexo.1.2}%
-\contentsline {subsection}{\numberline {1.2.1}Configuración claves SSH}{184}{subsection.Anexo.1.2.1}%
-\contentsline {subsection}{\numberline {1.2.2}Archivos de configuración OSA}{185}{subsection.Anexo.1.2.2}%
-\contentsline {subsubsection}{\numberline {1.2.2.1}openstack\_user\_config.yml}{185}{subsubsection.Anexo.1.2.2.1}%
-\contentsline {subsubsection}{\numberline {1.2.2.2}user\_variables.yml}{188}{subsubsection.Anexo.1.2.2.2}%
-\contentsline {subsubsection}{\numberline {1.2.2.3}cinder.yml}{190}{subsubsection.Anexo.1.2.2.3}%
-\contentsline {subsection}{\numberline {1.2.3}Generación de claves}{190}{subsection.Anexo.1.2.3}%
-\contentsline {subsection}{\numberline {1.2.4}Correcciones}{190}{subsection.Anexo.1.2.4}%
-\contentsline {subsubsection}{\numberline {1.2.4.1}SELinux}{190}{subsubsection.Anexo.1.2.4.1}%
-\contentsline {section}{\numberline {1.3}Inconvenientes}{191}{section.Anexo.1.3}%
-\contentsline {subsection}{\numberline {1.3.1}Bloqueo de paquetes}{191}{subsection.Anexo.1.3.1}%
-\contentsline {subsection}{\numberline {1.3.2}Módulo de seguridad SELinux}{191}{subsection.Anexo.1.3.2}%
-\contentsline {subsection}{\numberline {1.3.3}Percona-release en playbook setup-infrastructure}{191}{subsection.Anexo.1.3.3}%
-\contentsline {subsection}{\numberline {1.3.4}Subred reservada}{192}{subsection.Anexo.1.3.4}%
-\contentsline {subsection}{\numberline {1.3.5}Versiones de librerías y SO}{192}{subsection.Anexo.1.3.5}%
-\contentsline {subsection}{\numberline {1.3.6}Soporte para CentOS}{193}{subsection.Anexo.1.3.6}%
-\contentsline {chapter}{\numberline {2}Instalación versión Stein}{194}{appendix.Anexo.2}%
-\contentsline {section}{\numberline {2.1}Preparación de nodos}{194}{section.Anexo.2.1}%
-\contentsline {subsubsection}{\numberline {2.1.0.1}Deploy}{194}{subsubsection.Anexo.2.1.0.1}%
-\contentsline {subsubsection}{\numberline {2.1.0.2}Infra1}{197}{subsubsection.Anexo.2.1.0.2}%
-\contentsline {subsubsection}{\numberline {2.1.0.3}Compute1}{199}{subsubsection.Anexo.2.1.0.3}%
-\contentsline {subsubsection}{\numberline {2.1.0.4}Compute2}{201}{subsubsection.Anexo.2.1.0.4}%
-\contentsline {subsubsection}{\numberline {2.1.0.5}Storage1}{201}{subsubsection.Anexo.2.1.0.5}%
-\contentsline {subsubsection}{\numberline {2.1.0.6}Storage2}{202}{subsubsection.Anexo.2.1.0.6}%
-\contentsline {subsubsection}{\numberline {2.1.0.7}HAproxy1}{202}{subsubsection.Anexo.2.1.0.7}%
-\contentsline {subsubsection}{\numberline {2.1.0.8}Router}{203}{subsubsection.Anexo.2.1.0.8}%
-\contentsline {section}{\numberline {2.2}Configuración archivos OSA}{207}{section.Anexo.2.2}%
-\contentsline {subsubsection}{\numberline {2.2.0.1}openstack\_user\_config.yml}{207}{subsubsection.Anexo.2.2.0.1}%
-\contentsline {subsubsection}{\numberline {2.2.0.2}user\_variables.yml}{212}{subsubsection.Anexo.2.2.0.2}%
-\contentsline {subsubsection}{\numberline {2.2.0.3}cinder.yml}{214}{subsubsection.Anexo.2.2.0.3}%
-\contentsline {section}{\numberline {2.3}Ejecución de playbooks}{214}{section.Anexo.2.3}%
-\contentsline {section}{\numberline {2.4}Cambios para driver OVS}{215}{section.Anexo.2.4}%
-\contentsline {chapter}{\numberline {3}Virtualización con KVM}{218}{appendix.Anexo.3}%
-\contentsline {section}{\numberline {3.1}Utilización virt-manager}{218}{section.Anexo.3.1}%
-\contentsline {subsection}{\numberline {3.1.1}Conexión remota}{218}{subsection.Anexo.3.1.1}%
-\contentsline {subsection}{\numberline {3.1.2}Creación de una red}{219}{subsection.Anexo.3.1.2}%
-\contentsline {subsection}{\numberline {3.1.3}Crear nodo}{221}{subsection.Anexo.3.1.3}%
+\contentsline {chapter}{\numberline {1}Instalación versión Queens}{176}{appendix.Anexo.1}%
+\contentsline {section}{\numberline {1.1}Preparación de nodos}{176}{section.Anexo.1.1}%
+\contentsline {subsubsection}{\numberline {1.1.0.1}Deploy}{176}{subsubsection.Anexo.1.1.0.1}%
+\contentsline {subsubsection}{\numberline {1.1.0.2}Infra1}{179}{subsubsection.Anexo.1.1.0.2}%
+\contentsline {subsubsection}{\numberline {1.1.0.3}Compute1}{181}{subsubsection.Anexo.1.1.0.3}%
+\contentsline {subsubsection}{\numberline {1.1.0.4}Storage1}{183}{subsubsection.Anexo.1.1.0.4}%
+\contentsline {subsubsection}{\numberline {1.1.0.5}HAproxy1}{184}{subsubsection.Anexo.1.1.0.5}%
+\contentsline {section}{\numberline {1.2}Configuración}{185}{section.Anexo.1.2}%
+\contentsline {subsection}{\numberline {1.2.1}Configuración claves SSH}{185}{subsection.Anexo.1.2.1}%
+\contentsline {subsection}{\numberline {1.2.2}Archivos de configuración OSA}{186}{subsection.Anexo.1.2.2}%
+\contentsline {subsubsection}{\numberline {1.2.2.1}openstack\_user\_config.yml}{186}{subsubsection.Anexo.1.2.2.1}%
+\contentsline {subsubsection}{\numberline {1.2.2.2}user\_variables.yml}{189}{subsubsection.Anexo.1.2.2.2}%
+\contentsline {subsubsection}{\numberline {1.2.2.3}cinder.yml}{191}{subsubsection.Anexo.1.2.2.3}%
+\contentsline {subsection}{\numberline {1.2.3}Generación de claves}{191}{subsection.Anexo.1.2.3}%
+\contentsline {subsection}{\numberline {1.2.4}Correcciones}{191}{subsection.Anexo.1.2.4}%
+\contentsline {subsubsection}{\numberline {1.2.4.1}SELinux}{191}{subsubsection.Anexo.1.2.4.1}%
+\contentsline {section}{\numberline {1.3}Inconvenientes}{192}{section.Anexo.1.3}%
+\contentsline {subsection}{\numberline {1.3.1}Bloqueo de paquetes}{192}{subsection.Anexo.1.3.1}%
+\contentsline {subsection}{\numberline {1.3.2}Módulo de seguridad SELinux}{192}{subsection.Anexo.1.3.2}%
+\contentsline {subsection}{\numberline {1.3.3}Percona-release en playbook setup-infrastructure}{192}{subsection.Anexo.1.3.3}%
+\contentsline {subsection}{\numberline {1.3.4}Subred reservada}{193}{subsection.Anexo.1.3.4}%
+\contentsline {subsection}{\numberline {1.3.5}Versiones de librerías y SO}{193}{subsection.Anexo.1.3.5}%
+\contentsline {subsection}{\numberline {1.3.6}Soporte para CentOS}{194}{subsection.Anexo.1.3.6}%
+\contentsline {chapter}{\numberline {2}Instalación versión Stein}{195}{appendix.Anexo.2}%
+\contentsline {section}{\numberline {2.1}Preparación de nodos}{195}{section.Anexo.2.1}%
+\contentsline {subsubsection}{\numberline {2.1.0.1}Deploy}{195}{subsubsection.Anexo.2.1.0.1}%
+\contentsline {subsubsection}{\numberline {2.1.0.2}Infra1}{198}{subsubsection.Anexo.2.1.0.2}%
+\contentsline {subsubsection}{\numberline {2.1.0.3}Compute1}{200}{subsubsection.Anexo.2.1.0.3}%
+\contentsline {subsubsection}{\numberline {2.1.0.4}Compute2}{202}{subsubsection.Anexo.2.1.0.4}%
+\contentsline {subsubsection}{\numberline {2.1.0.5}Storage1}{202}{subsubsection.Anexo.2.1.0.5}%
+\contentsline {subsubsection}{\numberline {2.1.0.6}Storage2}{203}{subsubsection.Anexo.2.1.0.6}%
+\contentsline {subsubsection}{\numberline {2.1.0.7}HAproxy1}{203}{subsubsection.Anexo.2.1.0.7}%
+\contentsline {subsubsection}{\numberline {2.1.0.8}Router}{204}{subsubsection.Anexo.2.1.0.8}%
+\contentsline {section}{\numberline {2.2}Configuración archivos OSA}{208}{section.Anexo.2.2}%
+\contentsline {subsubsection}{\numberline {2.2.0.1}openstack\_user\_config.yml}{208}{subsubsection.Anexo.2.2.0.1}%
+\contentsline {subsubsection}{\numberline {2.2.0.2}user\_variables.yml}{213}{subsubsection.Anexo.2.2.0.2}%
+\contentsline {subsubsection}{\numberline {2.2.0.3}cinder.yml}{215}{subsubsection.Anexo.2.2.0.3}%
+\contentsline {section}{\numberline {2.3}Ejecución de playbooks}{215}{section.Anexo.2.3}%
+\contentsline {section}{\numberline {2.4}Cambios para driver OVS}{216}{section.Anexo.2.4}%
+\contentsline {chapter}{\numberline {3}Virtualización con KVM}{219}{appendix.Anexo.3}%
+\contentsline {section}{\numberline {3.1}Utilización virt-manager}{219}{section.Anexo.3.1}%
+\contentsline {subsection}{\numberline {3.1.1}Conexión remota}{219}{subsection.Anexo.3.1.1}%
+\contentsline {subsection}{\numberline {3.1.2}Creación de una red}{220}{subsection.Anexo.3.1.2}%
+\contentsline {subsection}{\numberline {3.1.3}Crear nodo}{222}{subsection.Anexo.3.1.3}%
 \contentsfinish 
diff --git a/docs/udelartex/tesis.xwm b/docs/udelartex/tesis.xwm
index 76f79d06ae3dbc1b532e9c0a617c8f4945f759a8..18f4bd9c0934073af8ae4392871dd254662ba4ff 100644
--- a/docs/udelartex/tesis.xwm
+++ b/docs/udelartex/tesis.xwm
@@ -1,2 +1,2 @@
 \relax 
-\xwmnewlabel{xwmlastpage}{{3.1.3}{224}{Crear nodo\relax }{Item.265}{}}
+\xwmnewlabel{xwmlastpage}{{3.1.3}{225}{Crear nodo\relax }{Item.265}{}}