diff --git a/docs/udelartex/tesis.lof b/docs/udelartex/tesis.lof
index 8d799caf408c38e60b22d224949c7d9c0cb0ed77..fc1f56d7dde2bcd840d01938bb774b78a654de6a 100644
--- a/docs/udelartex/tesis.lof
+++ b/docs/udelartex/tesis.lof
@@ -4,109 +4,109 @@
 \addvspace {10\p@ }
 \addvspace {10\p@ }
 \addvspace {10\p@ }
-\contentsline {figure}{\numberline {3.1}{\ignorespaces Hipervisores. Extraída de \cite {redhat-virtualization}.\relax }}{8}{figure.caption.6}%
-\contentsline {figure}{\numberline {3.2}{\ignorespaces Virtualización vs Contenerización. Extraída de \cite {redhat-lxc}.\relax }}{10}{figure.caption.8}%
-\contentsline {figure}{\numberline {3.3}{\ignorespaces Proceso de replicación en OSDs de Ceph. Extraída de \cite {ceph-architecture}.\relax }}{15}{figure.caption.17}%
-\contentsline {figure}{\numberline {3.4}{\ignorespaces Proceso de almacenamiento en pools de Ceph. Extraída de \cite {ceph-architecture}.\relax }}{16}{figure.caption.18}%
-\contentsline {figure}{\numberline {3.5}{\ignorespaces Proceso de almacenamiento en PGs de Ceph. Extraída de \cite {ceph-architecture}.\relax }}{16}{figure.caption.19}%
-\addvspace {10\p@ }
-\contentsline {figure}{\numberline {4.1}{\ignorespaces Relacionamiento entre módulos core\relax }}{19}{figure.caption.20}%
-\contentsline {figure}{\numberline {4.2}{\ignorespaces Servicios y backends soportados por Keystone. Extraída de \cite {openstack-idm-book-1}.\relax }}{19}{figure.caption.21}%
-\contentsline {figure}{\numberline {4.3}{\ignorespaces Principales componentes de Nova. Extraída de \cite {openstack-nova-architecture}.\relax }}{21}{figure.caption.22}%
-\contentsline {figure}{\numberline {4.4}{\ignorespaces Arquitectura simplificada de Neutron. Extraída de \cite {openstack-networking-book-2}\relax }}{24}{figure.caption.28}%
-\contentsline {figure}{\numberline {4.5}{\ignorespaces Componentes del módulo Glance. Extraída de \cite {openstack-glance-architecture}.\relax }}{27}{figure.caption.32}%
-\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de una VM. Extraída de \cite {openstack-images-instances}.\relax }}{27}{figure.caption.34}%
-\contentsline {figure}{\numberline {4.7}{\ignorespaces Principales componentes de Cinder. Extraído de \cite {redhat-cinder}.\relax }}{29}{figure.caption.35}%
-\contentsline {figure}{\numberline {4.8}{\ignorespaces Arquitectura del módulo Swift. Extraída de \cite {openstack-storage-components}.\relax }}{31}{figure.caption.36}%
-\contentsline {figure}{\numberline {4.9}{\ignorespaces Arquitectura de Neutron. Extraída de \cite {openstack-networking-book-1}.\relax }}{33}{figure.caption.40}%
-\addvspace {10\p@ }
-\contentsline {figure}{\numberline {5.1}{\ignorespaces Componentes de red en OpenStack. \cite {openstack-container-networking}.\relax }}{39}{figure.caption.53}%
-\contentsline {figure}{\numberline {5.2}{\ignorespaces Diagrama de múltiples interfaces de red. Extraída de \cite {openstack-networking-architecture}.\relax }}{40}{figure.caption.57}%
-\contentsline {figure}{\numberline {5.3}{\ignorespaces Diagrama de bonds de múltiples interfaces de red. Extraída de \cite {openstack-networking-architecture}.\relax }}{41}{figure.caption.58}%
-\contentsline {figure}{\numberline {5.4}{\ignorespaces Despliegue de servicios OpenStack en contenedores. Extraída de \cite {openstack-appendix-e}.\relax }}{42}{figure.caption.59}%
-\addvspace {10\p@ }
-\contentsline {figure}{\numberline {6.1}{\ignorespaces Arquitectura diseñada.\relax }}{54}{figure.caption.69}%
-\contentsline {figure}{\numberline {6.2}{\ignorespaces Arquitectura diseñada para instalación Stein\relax }}{57}{figure.caption.70}%
-\contentsline {figure}{\numberline {6.3}{\ignorespaces Acceso remoto al servidor renata.\relax }}{59}{figure.caption.71}%
-\contentsline {figure}{\numberline {6.4}{\ignorespaces Túnel reverso y esquema de servidores.\relax }}{60}{figure.caption.72}%
-\contentsline {figure}{\numberline {6.5}{\ignorespaces Salida a Internet en los nodos de Openstack.\relax }}{61}{figure.caption.73}%
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\contentsline {figure}{\numberline {8.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{83}{figure.caption.94}%
-\contentsline {figure}{\numberline {8.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{88}{figure.caption.97}%
-\contentsline {figure}{\numberline {8.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{88}{figure.caption.98}%
-\contentsline {figure}{\numberline {8.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{90}{figure.caption.99}%
-\contentsline {figure}{\numberline {8.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{91}{figure.caption.100}%
-\contentsline {figure}{\numberline {8.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{91}{figure.caption.102}%
-\contentsline {figure}{\numberline {8.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{92}{figure.caption.103}%
-\contentsline {figure}{\numberline {8.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{93}{figure.caption.105}%
-\contentsline {figure}{\numberline {8.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{100}{figure.caption.109}%
-\contentsline {figure}{\numberline {8.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{101}{figure.caption.113}%
-\contentsline {figure}{\numberline {8.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{101}{figure.caption.115}%
-\contentsline {figure}{\numberline {8.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{106}{figure.caption.119}%
-\contentsline {figure}{\numberline {8.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{107}{figure.caption.122}%
-\contentsline {figure}{\numberline {8.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{108}{figure.caption.124}%
-\contentsline {figure}{\numberline {8.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{109}{figure.caption.126}%
-\contentsline {figure}{\numberline {8.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{112}{figure.caption.130}%
-\contentsline {figure}{\numberline {8.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{112}{figure.caption.131}%
-\contentsline {figure}{\numberline {8.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{113}{figure.caption.134}%
-\contentsline {figure}{\numberline {8.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{114}{figure.caption.136}%
-\contentsline {figure}{\numberline {8.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{118}{figure.caption.137}%
-\contentsline {figure}{\numberline {8.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{125}{figure.caption.140}%
-\contentsline {figure}{\numberline {8.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{127}{figure.caption.141}%
-\contentsline {figure}{\numberline {8.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{131}{figure.caption.142}%
-\contentsline {figure}{\numberline {8.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{132}{figure.caption.143}%
-\contentsline {figure}{\numberline {8.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{132}{figure.caption.145}%
-\contentsline {figure}{\numberline {8.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{134}{figure.caption.146}%
-\contentsline {figure}{\numberline {8.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{135}{figure.caption.148}%
-\contentsline {figure}{\numberline {8.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{140}{figure.caption.152}%
-\contentsline {figure}{\numberline {8.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{141}{figure.caption.156}%
-\contentsline {figure}{\numberline {8.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{142}{figure.caption.158}%
-\contentsline {figure}{\numberline {8.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{146}{figure.caption.162}%
-\contentsline {figure}{\numberline {8.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{147}{figure.caption.165}%
-\contentsline {figure}{\numberline {8.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{148}{figure.caption.167}%
-\contentsline {figure}{\numberline {8.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{149}{figure.caption.169}%
-\contentsline {figure}{\numberline {8.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{152}{figure.caption.173}%
-\contentsline {figure}{\numberline {8.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{152}{figure.caption.174}%
-\contentsline {figure}{\numberline {8.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{153}{figure.caption.177}%
-\contentsline {figure}{\numberline {8.38}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos funcionales\relax }}{154}{figure.caption.179}%
-\contentsline {figure}{\numberline {8.39}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos luego de un fallo en uno de ellos\relax }}{154}{figure.caption.180}%
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{167}{figure.caption.186}%
-\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{168}{figure.caption.187}%
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\addvspace {10\p@ }
-\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{210}{figure.caption.208}%
-\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{211}{figure.caption.209}%
-\addvspace {10\p@ }
-\contentsline {figure}{\numberline {4.1}{\ignorespaces Vista del login de Horizon.\relax }}{218}{figure.caption.223}%
-\contentsline {figure}{\numberline {4.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{219}{figure.caption.225}%
-\contentsline {figure}{\numberline {4.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{220}{figure.caption.226}%
-\contentsline {figure}{\numberline {4.4}{\ignorespaces Creación de un usuario.\relax }}{221}{figure.caption.228}%
-\contentsline {figure}{\numberline {4.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{222}{figure.caption.230}%
-\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{222}{figure.caption.231}%
-\contentsline {figure}{\numberline {4.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{223}{figure.caption.233}%
-\contentsline {figure}{\numberline {4.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{224}{figure.caption.234}%
-\contentsline {figure}{\numberline {4.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{225}{figure.caption.236}%
-\contentsline {figure}{\numberline {4.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{226}{figure.caption.237}%
-\contentsline {figure}{\numberline {4.11}{\ignorespaces Creación de una red (1/3).\relax }}{227}{figure.caption.239}%
-\contentsline {figure}{\numberline {4.12}{\ignorespaces Creación de una red (2/3).\relax }}{227}{figure.caption.240}%
-\contentsline {figure}{\numberline {4.13}{\ignorespaces Creación de una red (3/3).\relax }}{228}{figure.caption.241}%
-\contentsline {figure}{\numberline {4.14}{\ignorespaces Creación de un router.\relax }}{228}{figure.caption.243}%
-\contentsline {figure}{\numberline {4.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{229}{figure.caption.245}%
-\contentsline {figure}{\numberline {4.16}{\ignorespaces Creación de una key pair.\relax }}{229}{figure.caption.247}%
-\contentsline {figure}{\numberline {4.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{230}{figure.caption.249}%
-\contentsline {figure}{\numberline {4.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{230}{figure.caption.250}%
-\contentsline {figure}{\numberline {4.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{231}{figure.caption.251}%
-\contentsline {figure}{\numberline {4.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{231}{figure.caption.252}%
-\contentsline {figure}{\numberline {4.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{232}{figure.caption.253}%
-\contentsline {figure}{\numberline {4.22}{\ignorespaces Asignación de floating IP.\relax }}{233}{figure.caption.254}%
-\contentsline {figure}{\numberline {4.23}{\ignorespaces Asociación de floating IP.\relax }}{234}{figure.caption.255}%
-\contentsline {figure}{\numberline {4.24}{\ignorespaces Reglas security group por defecto.\relax }}{234}{figure.caption.256}%
-\contentsline {figure}{\numberline {4.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{235}{figure.caption.257}%
-\contentsline {figure}{\numberline {4.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{235}{figure.caption.258}%
+\contentsline {figure}{\numberline {3.1}{\ignorespaces Hipervisores. Extraída de \cite {redhat-virtualization}.\relax }}{8}{figure.caption.3}%
+\contentsline {figure}{\numberline {3.2}{\ignorespaces Virtualización vs Contenerización. Extraída de \cite {redhat-lxc}.\relax }}{10}{figure.caption.5}%
+\contentsline {figure}{\numberline {3.3}{\ignorespaces Proceso de replicación en OSDs de Ceph. Extraída de \cite {ceph-architecture}.\relax }}{15}{figure.caption.14}%
+\contentsline {figure}{\numberline {3.4}{\ignorespaces Proceso de almacenamiento en pools de Ceph. Extraída de \cite {ceph-architecture}.\relax }}{16}{figure.caption.15}%
+\contentsline {figure}{\numberline {3.5}{\ignorespaces Proceso de almacenamiento en PGs de Ceph. Extraída de \cite {ceph-architecture}.\relax }}{16}{figure.caption.16}%
+\addvspace {10\p@ }
+\contentsline {figure}{\numberline {4.1}{\ignorespaces Relacionamiento entre módulos core\relax }}{19}{figure.caption.17}%
+\contentsline {figure}{\numberline {4.2}{\ignorespaces Servicios y backends soportados por Keystone. Extraída de \cite {openstack-idm-book-1}.\relax }}{19}{figure.caption.18}%
+\contentsline {figure}{\numberline {4.3}{\ignorespaces Principales componentes de Nova. Extraída de \cite {openstack-nova-architecture}.\relax }}{21}{figure.caption.19}%
+\contentsline {figure}{\numberline {4.4}{\ignorespaces Arquitectura simplificada de Neutron. Extraída de \cite {openstack-networking-book-2}\relax }}{24}{figure.caption.25}%
+\contentsline {figure}{\numberline {4.5}{\ignorespaces Componentes del módulo Glance. Extraída de \cite {openstack-glance-architecture}.\relax }}{27}{figure.caption.29}%
+\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de una VM. Extraída de \cite {openstack-images-instances}.\relax }}{27}{figure.caption.31}%
+\contentsline {figure}{\numberline {4.7}{\ignorespaces Principales componentes de Cinder. Extraído de \cite {redhat-cinder}.\relax }}{29}{figure.caption.32}%
+\contentsline {figure}{\numberline {4.8}{\ignorespaces Arquitectura del módulo Swift. Extraída de \cite {openstack-storage-components}.\relax }}{31}{figure.caption.33}%
+\contentsline {figure}{\numberline {4.9}{\ignorespaces Arquitectura de Neutron. Extraída de \cite {openstack-networking-book-1}.\relax }}{33}{figure.caption.37}%
+\addvspace {10\p@ }
+\contentsline {figure}{\numberline {5.1}{\ignorespaces Componentes de red en OpenStack. \cite {openstack-container-networking}.\relax }}{39}{figure.caption.50}%
+\contentsline {figure}{\numberline {5.2}{\ignorespaces Diagrama de múltiples interfaces de red. Extraída de \cite {openstack-networking-architecture}.\relax }}{40}{figure.caption.54}%
+\contentsline {figure}{\numberline {5.3}{\ignorespaces Diagrama de bonds de múltiples interfaces de red. Extraída de \cite {openstack-networking-architecture}.\relax }}{41}{figure.caption.55}%
+\contentsline {figure}{\numberline {5.4}{\ignorespaces Despliegue de servicios OpenStack en contenedores. Extraída de \cite {openstack-appendix-e}.\relax }}{42}{figure.caption.56}%
+\addvspace {10\p@ }
+\contentsline {figure}{\numberline {6.1}{\ignorespaces Arquitectura diseñada.\relax }}{54}{figure.caption.66}%
+\contentsline {figure}{\numberline {6.2}{\ignorespaces Arquitectura diseñada para instalación Stein\relax }}{57}{figure.caption.67}%
+\contentsline {figure}{\numberline {6.3}{\ignorespaces Acceso remoto al servidor renata.\relax }}{59}{figure.caption.68}%
+\contentsline {figure}{\numberline {6.4}{\ignorespaces Túnel reverso y esquema de servidores.\relax }}{60}{figure.caption.69}%
+\contentsline {figure}{\numberline {6.5}{\ignorespaces Salida a Internet en los nodos de Openstack.\relax }}{61}{figure.caption.70}%
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\contentsline {figure}{\numberline {8.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{83}{figure.caption.91}%
+\contentsline {figure}{\numberline {8.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{88}{figure.caption.94}%
+\contentsline {figure}{\numberline {8.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{88}{figure.caption.95}%
+\contentsline {figure}{\numberline {8.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{90}{figure.caption.96}%
+\contentsline {figure}{\numberline {8.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{91}{figure.caption.97}%
+\contentsline {figure}{\numberline {8.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{91}{figure.caption.99}%
+\contentsline {figure}{\numberline {8.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{92}{figure.caption.100}%
+\contentsline {figure}{\numberline {8.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{93}{figure.caption.102}%
+\contentsline {figure}{\numberline {8.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{100}{figure.caption.106}%
+\contentsline {figure}{\numberline {8.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{101}{figure.caption.110}%
+\contentsline {figure}{\numberline {8.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{101}{figure.caption.112}%
+\contentsline {figure}{\numberline {8.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{106}{figure.caption.116}%
+\contentsline {figure}{\numberline {8.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{107}{figure.caption.119}%
+\contentsline {figure}{\numberline {8.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{108}{figure.caption.121}%
+\contentsline {figure}{\numberline {8.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{109}{figure.caption.123}%
+\contentsline {figure}{\numberline {8.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{112}{figure.caption.127}%
+\contentsline {figure}{\numberline {8.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{112}{figure.caption.128}%
+\contentsline {figure}{\numberline {8.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{113}{figure.caption.131}%
+\contentsline {figure}{\numberline {8.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{114}{figure.caption.133}%
+\contentsline {figure}{\numberline {8.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{118}{figure.caption.134}%
+\contentsline {figure}{\numberline {8.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{125}{figure.caption.137}%
+\contentsline {figure}{\numberline {8.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{127}{figure.caption.138}%
+\contentsline {figure}{\numberline {8.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{131}{figure.caption.139}%
+\contentsline {figure}{\numberline {8.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{132}{figure.caption.140}%
+\contentsline {figure}{\numberline {8.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{132}{figure.caption.142}%
+\contentsline {figure}{\numberline {8.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{134}{figure.caption.143}%
+\contentsline {figure}{\numberline {8.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{135}{figure.caption.145}%
+\contentsline {figure}{\numberline {8.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{140}{figure.caption.149}%
+\contentsline {figure}{\numberline {8.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{141}{figure.caption.153}%
+\contentsline {figure}{\numberline {8.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{142}{figure.caption.155}%
+\contentsline {figure}{\numberline {8.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{146}{figure.caption.159}%
+\contentsline {figure}{\numberline {8.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{147}{figure.caption.162}%
+\contentsline {figure}{\numberline {8.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{148}{figure.caption.164}%
+\contentsline {figure}{\numberline {8.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{149}{figure.caption.166}%
+\contentsline {figure}{\numberline {8.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router físico\relax }}{152}{figure.caption.170}%
+\contentsline {figure}{\numberline {8.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{152}{figure.caption.171}%
+\contentsline {figure}{\numberline {8.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{153}{figure.caption.174}%
+\contentsline {figure}{\numberline {8.38}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos funcionales\relax }}{154}{figure.caption.176}%
+\contentsline {figure}{\numberline {8.39}{\ignorespaces Routers virtuales instanciados en múltiples agentes físicos luego de un fallo en uno de ellos\relax }}{154}{figure.caption.177}%
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{167}{figure.caption.183}%
+\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{168}{figure.caption.184}%
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\addvspace {10\p@ }
+\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{210}{figure.caption.205}%
+\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{211}{figure.caption.206}%
+\addvspace {10\p@ }
+\contentsline {figure}{\numberline {4.1}{\ignorespaces Vista del login de Horizon.\relax }}{218}{figure.caption.220}%
+\contentsline {figure}{\numberline {4.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{219}{figure.caption.222}%
+\contentsline {figure}{\numberline {4.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{220}{figure.caption.223}%
+\contentsline {figure}{\numberline {4.4}{\ignorespaces Creación de un usuario.\relax }}{221}{figure.caption.225}%
+\contentsline {figure}{\numberline {4.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{222}{figure.caption.227}%
+\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{222}{figure.caption.228}%
+\contentsline {figure}{\numberline {4.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{223}{figure.caption.230}%
+\contentsline {figure}{\numberline {4.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{224}{figure.caption.231}%
+\contentsline {figure}{\numberline {4.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{225}{figure.caption.233}%
+\contentsline {figure}{\numberline {4.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{226}{figure.caption.234}%
+\contentsline {figure}{\numberline {4.11}{\ignorespaces Creación de una red (1/3).\relax }}{227}{figure.caption.236}%
+\contentsline {figure}{\numberline {4.12}{\ignorespaces Creación de una red (2/3).\relax }}{227}{figure.caption.237}%
+\contentsline {figure}{\numberline {4.13}{\ignorespaces Creación de una red (3/3).\relax }}{228}{figure.caption.238}%
+\contentsline {figure}{\numberline {4.14}{\ignorespaces Creación de un router.\relax }}{228}{figure.caption.240}%
+\contentsline {figure}{\numberline {4.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{229}{figure.caption.242}%
+\contentsline {figure}{\numberline {4.16}{\ignorespaces Creación de una key pair.\relax }}{229}{figure.caption.244}%
+\contentsline {figure}{\numberline {4.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{230}{figure.caption.246}%
+\contentsline {figure}{\numberline {4.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{230}{figure.caption.247}%
+\contentsline {figure}{\numberline {4.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{231}{figure.caption.248}%
+\contentsline {figure}{\numberline {4.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{231}{figure.caption.249}%
+\contentsline {figure}{\numberline {4.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{232}{figure.caption.250}%
+\contentsline {figure}{\numberline {4.22}{\ignorespaces Asignación de floating IP.\relax }}{233}{figure.caption.251}%
+\contentsline {figure}{\numberline {4.23}{\ignorespaces Asociación de floating IP.\relax }}{234}{figure.caption.252}%
+\contentsline {figure}{\numberline {4.24}{\ignorespaces Reglas security group por defecto.\relax }}{234}{figure.caption.253}%
+\contentsline {figure}{\numberline {4.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{235}{figure.caption.254}%
+\contentsline {figure}{\numberline {4.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{235}{figure.caption.255}%
 \addvspace {10\p@ }
 \contentsfinish 
diff --git a/docs/udelartex/tesis.out b/docs/udelartex/tesis.out
index a3c5e33d7cb0f01fbbaed5e21ac8978f861076ea..0fa031d602e2bb69ba758408907d0ca06b6b9ae2 100644
--- a/docs/udelartex/tesis.out
+++ b/docs/udelartex/tesis.out
@@ -1,114 +1,112 @@
 \BOOKMARK [0][-]{chapter*.1}{Lista de figuras}{}% 1
-\BOOKMARK [0][-]{chapter*.2}{Lista de tablas}{}% 2
-\BOOKMARK [0][-]{chapter*.4}{Lista de siglas}{}% 3
-\BOOKMARK [0][-]{chapter.1}{Introducci\363n}{}% 4
-\BOOKMARK [0][-]{chapter.2}{Plan de proyecto}{}% 5
-\BOOKMARK [0][-]{chapter.3}{Fundamentos te\363ricos}{}% 6
-\BOOKMARK [1][-]{section.3.1}{Cloud computing}{chapter.3}% 7
-\BOOKMARK [1][-]{section.3.2}{Virtualizaci\363n}{chapter.3}% 8
-\BOOKMARK [1][-]{section.3.3}{Contenerizaci\363n}{chapter.3}% 9
-\BOOKMARK [1][-]{section.3.4}{Datacenters}{chapter.3}% 10
-\BOOKMARK [1][-]{section.3.5}{Redes}{chapter.3}% 11
-\BOOKMARK [1][-]{section.3.6}{Interfaces y bridges}{chapter.3}% 12
-\BOOKMARK [1][-]{section.3.7}{Backends de almacenamiento}{chapter.3}% 13
-\BOOKMARK [2][-]{subsection.3.7.1}{LVM}{section.3.7}% 14
-\BOOKMARK [2][-]{subsection.3.7.2}{Ceph}{section.3.7}% 15
-\BOOKMARK [0][-]{chapter.4}{OpenStack}{}% 16
-\BOOKMARK [1][-]{section.4.1}{Origen y definici\363n}{chapter.4}% 17
-\BOOKMARK [1][-]{section.4.2}{M\363dulos Core}{chapter.4}% 18
-\BOOKMARK [2][-]{subsection.4.2.1}{Keystone}{section.4.2}% 19
-\BOOKMARK [2][-]{subsection.4.2.2}{Nova}{section.4.2}% 20
-\BOOKMARK [2][-]{subsection.4.2.3}{Neutron}{section.4.2}% 21
-\BOOKMARK [2][-]{subsection.4.2.4}{Glance}{section.4.2}% 22
-\BOOKMARK [2][-]{subsection.4.2.5}{Cinder}{section.4.2}% 23
-\BOOKMARK [2][-]{subsection.4.2.6}{Swift}{section.4.2}% 24
-\BOOKMARK [1][-]{section.4.3}{Tipos de nodos}{chapter.4}% 25
-\BOOKMARK [1][-]{section.4.4}{Servicios de infraestructura}{chapter.4}% 26
-\BOOKMARK [1][-]{section.4.5}{M\351todos de instalaci\363n}{chapter.4}% 27
-\BOOKMARK [2][-]{subsection.4.5.1}{Ansible}{section.4.5}% 28
-\BOOKMARK [0][-]{chapter.5}{OpenStack-Ansible}{}% 29
-\BOOKMARK [1][-]{section.5.1}{Arquitectura}{chapter.5}% 30
-\BOOKMARK [2][-]{subsection.5.1.1}{Arquitectura de red}{section.5.1}% 31
-\BOOKMARK [1][-]{section.5.2}{Configuraci\363n OSA}{chapter.5}% 32
-\BOOKMARK [2][-]{subsection.5.2.1}{Convenciones}{section.5.2}% 33
-\BOOKMARK [2][-]{subsection.5.2.2}{Inventario}{section.5.2}% 34
-\BOOKMARK [2][-]{subsection.5.2.3}{openstack\137user\137config.yml}{section.5.2}% 35
-\BOOKMARK [2][-]{subsection.5.2.4}{user\137variables.yml}{section.5.2}% 36
-\BOOKMARK [1][-]{section.5.3}{Proceso de instalaci\363n}{chapter.5}% 37
-\BOOKMARK [2][-]{subsection.5.3.1}{setup-hosts.yml}{section.5.3}% 38
-\BOOKMARK [2][-]{subsection.5.3.2}{setup-infrastructure.yml}{section.5.3}% 39
-\BOOKMARK [2][-]{subsection.5.3.3}{setup-openstack.yml}{section.5.3}% 40
-\BOOKMARK [1][-]{section.5.4}{Verificaci\363n}{chapter.5}% 41
-\BOOKMARK [1][-]{section.5.5}{Inconvenientes}{chapter.5}% 42
-\BOOKMARK [0][-]{chapter.6}{Dise\361o}{}% 43
-\BOOKMARK [1][-]{section.6.1}{Dise\361o de arquitectura}{chapter.6}% 44
-\BOOKMARK [2][-]{subsection.6.1.1}{Arquitectura desarrollo}{section.6.1}% 45
-\BOOKMARK [2][-]{subsection.6.1.2}{Arquitectura producci\363n}{section.6.1}% 46
-\BOOKMARK [2][-]{subsection.6.1.3}{Distribuci\363n de los servicios}{section.6.1}% 47
-\BOOKMARK [1][-]{section.6.2}{Ambiente de trabajo}{chapter.6}% 48
-\BOOKMARK [2][-]{subsection.6.2.1}{Hardware utilizado}{section.6.2}% 49
-\BOOKMARK [2][-]{subsection.6.2.2}{Conexi\363n remota hacia el servidor renata}{section.6.2}% 50
-\BOOKMARK [2][-]{subsection.6.2.3}{Especificaciones servidor renata}{section.6.2}% 51
-\BOOKMARK [2][-]{subsection.6.2.4}{Acceso al exterior desde nodos}{section.6.2}% 52
-\BOOKMARK [0][-]{chapter.7}{Gesti\363n del Datacenter}{}% 53
-\BOOKMARK [1][-]{section.7.1}{Recuperaci\363n ante fallas}{chapter.7}% 54
-\BOOKMARK [2][-]{subsection.7.1.1}{Verificar el estado general de OpenStack}{section.7.1}% 55
-\BOOKMARK [2][-]{subsection.7.1.2}{Verificar estado de los componentes de la infraestructura}{section.7.1}% 56
-\BOOKMARK [2][-]{subsection.7.1.3}{Solucionar problemas}{section.7.1}% 57
-\BOOKMARK [2][-]{subsection.7.1.4}{Problemas con Ceph}{section.7.1}% 58
-\BOOKMARK [1][-]{section.7.2}{Escalamiento horizontal}{chapter.7}% 59
-\BOOKMARK [2][-]{subsection.7.2.1}{Agregar nodo de C\363mputo}{section.7.2}% 60
-\BOOKMARK [2][-]{subsection.7.2.2}{Eliminar un nodo de c\363mputo}{section.7.2}% 61
-\BOOKMARK [2][-]{subsection.7.2.3}{Infraestructura}{section.7.2}% 62
-\BOOKMARK [1][-]{section.7.3}{Actualizar versi\363n}{chapter.7}% 63
-\BOOKMARK [0][-]{chapter.8}{An\341lisis del m\363dulo de red}{}% 64
-\BOOKMARK [1][-]{section.8.1}{Escenarios de prueba}{chapter.8}% 65
-\BOOKMARK [2][-]{subsection.8.1.1}{Escenario 1: tr\341fico este-oeste \(misma red tenant\)}{section.8.1}% 66
-\BOOKMARK [2][-]{subsection.8.1.2}{Escenario 2: tr\341fico este-oeste \(distintas redes tenant\)}{section.8.1}% 67
-\BOOKMARK [2][-]{subsection.8.1.3}{Escenario 3: tr\341fico norte-sur \(acceso hacia el exterior\)}{section.8.1}% 68
-\BOOKMARK [2][-]{subsection.8.1.4}{Escenario 4: tr\341fico norte-sur \(acceso desde el exterior\)}{section.8.1}% 69
-\BOOKMARK [1][-]{section.8.2}{Linux bridge}{chapter.8}% 70
-\BOOKMARK [2][-]{subsection.8.2.1}{Escenario 1}{section.8.2}% 71
-\BOOKMARK [2][-]{subsection.8.2.2}{Escenario 2}{section.8.2}% 72
-\BOOKMARK [2][-]{subsection.8.2.3}{Escenario 3}{section.8.2}% 73
-\BOOKMARK [2][-]{subsection.8.2.4}{Escenario 4}{section.8.2}% 74
-\BOOKMARK [1][-]{section.8.3}{Open vSwitch}{chapter.8}% 75
-\BOOKMARK [2][-]{subsection.8.3.1}{Escenario 1}{section.8.3}% 76
-\BOOKMARK [2][-]{subsection.8.3.2}{Escenario 2}{section.8.3}% 77
-\BOOKMARK [2][-]{subsection.8.3.3}{Escenario 3}{section.8.3}% 78
-\BOOKMARK [2][-]{subsection.8.3.4}{Escenario 4}{section.8.3}% 79
-\BOOKMARK [1][-]{section.8.4}{Comparativa de drivers}{chapter.8}% 80
-\BOOKMARK [1][-]{section.8.5}{Funcionalidades avanzadas}{chapter.8}% 81
-\BOOKMARK [2][-]{subsection.8.5.1}{Layer 3 High Availability}{section.8.5}% 82
-\BOOKMARK [0][-]{chapter.9}{Trabajo a futuro}{}% 83
-\BOOKMARK [0][-]{chapter.10}{Conclusiones}{}% 84
-\BOOKMARK [0][-]{chapter*.184}{Referencias bibliogr\341ficas}{}% 85
-\BOOKMARK [0][-]{chapter*.184}{Glosario}{}% 86
-\BOOKMARK [0][-]{section*.185}{Ap\351ndices}{}% 87
-\BOOKMARK [0][-]{appendix.Alph1}{Im\341genes}{}% 88
-\BOOKMARK [0][-]{section*.188}{Anexos}{}% 89
-\BOOKMARK [0][-]{appendix.Anexo.1}{Instalaci\363n versi\363n Queens}{}% 90
-\BOOKMARK [1][-]{section.Anexo.1.1}{Preparaci\363n de nodos}{appendix.Anexo.1}% 91
-\BOOKMARK [1][-]{section.Anexo.1.2}{Configuraci\363n}{appendix.Anexo.1}% 92
-\BOOKMARK [2][-]{subsection.Anexo.1.2.1}{Configuraci\363n claves SSH}{section.Anexo.1.2}% 93
-\BOOKMARK [2][-]{subsection.Anexo.1.2.2}{Archivos de configuraci\363n OSA}{section.Anexo.1.2}% 94
-\BOOKMARK [2][-]{subsection.Anexo.1.2.3}{Generaci\363n de claves}{section.Anexo.1.2}% 95
-\BOOKMARK [2][-]{subsection.Anexo.1.2.4}{Correcciones}{section.Anexo.1.2}% 96
-\BOOKMARK [0][-]{appendix.Anexo.2}{Instalaci\363n versi\363n Stein}{}% 97
-\BOOKMARK [1][-]{section.Anexo.2.1}{Preparaci\363n de nodos}{appendix.Anexo.2}% 98
-\BOOKMARK [1][-]{section.Anexo.2.2}{Configuraci\363n archivos OSA}{appendix.Anexo.2}% 99
-\BOOKMARK [1][-]{section.Anexo.2.3}{Ejecuci\363n de playbooks}{appendix.Anexo.2}% 100
-\BOOKMARK [1][-]{section.Anexo.2.4}{Cambios para driver OVS}{appendix.Anexo.2}% 101
-\BOOKMARK [0][-]{appendix.Anexo.3}{Virtualizaci\363n con KVM}{}% 102
-\BOOKMARK [1][-]{section.Anexo.3.1}{Utilizaci\363n virt-manager}{appendix.Anexo.3}% 103
-\BOOKMARK [2][-]{subsection.Anexo.3.1.1}{Conexi\363n remota}{section.Anexo.3.1}% 104
-\BOOKMARK [2][-]{subsection.Anexo.3.1.2}{Creaci\363n de una red}{section.Anexo.3.1}% 105
-\BOOKMARK [2][-]{subsection.Anexo.3.1.3}{Crear nodo}{section.Anexo.3.1}% 106
-\BOOKMARK [0][-]{appendix.Anexo.4}{Interacci\363n}{}% 107
-\BOOKMARK [1][-]{section.Anexo.4.1}{Configuraciones de administrador}{appendix.Anexo.4}% 108
-\BOOKMARK [1][-]{section.Anexo.4.2}{Interacci\363n de un usuario}{appendix.Anexo.4}% 109
-\BOOKMARK [1][-]{section.Anexo.4.3}{Acceso a una instancia}{appendix.Anexo.4}% 110
-\BOOKMARK [2][-]{subsection.Anexo.4.3.1}{Por SPICE}{section.Anexo.4.3}% 111
-\BOOKMARK [2][-]{subsection.Anexo.4.3.2}{Por SSH}{section.Anexo.4.3}% 112
-\BOOKMARK [2][-]{subsection.Anexo.4.3.3}{Por virsh}{section.Anexo.4.3}% 113
-\BOOKMARK [0][-]{appendix.Anexo.5}{migrate\137instance.sh}{}% 114
+\BOOKMARK [0][-]{chapter.1}{Introducci\363n}{}% 2
+\BOOKMARK [0][-]{chapter.2}{Plan de proyecto}{}% 3
+\BOOKMARK [0][-]{chapter.3}{Fundamentos te\363ricos}{}% 4
+\BOOKMARK [1][-]{section.3.1}{Cloud computing}{chapter.3}% 5
+\BOOKMARK [1][-]{section.3.2}{Virtualizaci\363n}{chapter.3}% 6
+\BOOKMARK [1][-]{section.3.3}{Contenerizaci\363n}{chapter.3}% 7
+\BOOKMARK [1][-]{section.3.4}{Datacenters}{chapter.3}% 8
+\BOOKMARK [1][-]{section.3.5}{Redes}{chapter.3}% 9
+\BOOKMARK [1][-]{section.3.6}{Interfaces y bridges}{chapter.3}% 10
+\BOOKMARK [1][-]{section.3.7}{Backends de almacenamiento}{chapter.3}% 11
+\BOOKMARK [2][-]{subsection.3.7.1}{LVM}{section.3.7}% 12
+\BOOKMARK [2][-]{subsection.3.7.2}{Ceph}{section.3.7}% 13
+\BOOKMARK [0][-]{chapter.4}{OpenStack}{}% 14
+\BOOKMARK [1][-]{section.4.1}{Origen y definici\363n}{chapter.4}% 15
+\BOOKMARK [1][-]{section.4.2}{M\363dulos Core}{chapter.4}% 16
+\BOOKMARK [2][-]{subsection.4.2.1}{Keystone}{section.4.2}% 17
+\BOOKMARK [2][-]{subsection.4.2.2}{Nova}{section.4.2}% 18
+\BOOKMARK [2][-]{subsection.4.2.3}{Neutron}{section.4.2}% 19
+\BOOKMARK [2][-]{subsection.4.2.4}{Glance}{section.4.2}% 20
+\BOOKMARK [2][-]{subsection.4.2.5}{Cinder}{section.4.2}% 21
+\BOOKMARK [2][-]{subsection.4.2.6}{Swift}{section.4.2}% 22
+\BOOKMARK [1][-]{section.4.3}{Tipos de nodos}{chapter.4}% 23
+\BOOKMARK [1][-]{section.4.4}{Servicios de infraestructura}{chapter.4}% 24
+\BOOKMARK [1][-]{section.4.5}{M\351todos de instalaci\363n}{chapter.4}% 25
+\BOOKMARK [2][-]{subsection.4.5.1}{Ansible}{section.4.5}% 26
+\BOOKMARK [0][-]{chapter.5}{OpenStack-Ansible}{}% 27
+\BOOKMARK [1][-]{section.5.1}{Arquitectura}{chapter.5}% 28
+\BOOKMARK [2][-]{subsection.5.1.1}{Arquitectura de red}{section.5.1}% 29
+\BOOKMARK [1][-]{section.5.2}{Configuraci\363n OSA}{chapter.5}% 30
+\BOOKMARK [2][-]{subsection.5.2.1}{Convenciones}{section.5.2}% 31
+\BOOKMARK [2][-]{subsection.5.2.2}{Inventario}{section.5.2}% 32
+\BOOKMARK [2][-]{subsection.5.2.3}{openstack\137user\137config.yml}{section.5.2}% 33
+\BOOKMARK [2][-]{subsection.5.2.4}{user\137variables.yml}{section.5.2}% 34
+\BOOKMARK [1][-]{section.5.3}{Proceso de instalaci\363n}{chapter.5}% 35
+\BOOKMARK [2][-]{subsection.5.3.1}{setup-hosts.yml}{section.5.3}% 36
+\BOOKMARK [2][-]{subsection.5.3.2}{setup-infrastructure.yml}{section.5.3}% 37
+\BOOKMARK [2][-]{subsection.5.3.3}{setup-openstack.yml}{section.5.3}% 38
+\BOOKMARK [1][-]{section.5.4}{Verificaci\363n}{chapter.5}% 39
+\BOOKMARK [1][-]{section.5.5}{Inconvenientes}{chapter.5}% 40
+\BOOKMARK [0][-]{chapter.6}{Dise\361o}{}% 41
+\BOOKMARK [1][-]{section.6.1}{Dise\361o de arquitectura}{chapter.6}% 42
+\BOOKMARK [2][-]{subsection.6.1.1}{Arquitectura desarrollo}{section.6.1}% 43
+\BOOKMARK [2][-]{subsection.6.1.2}{Arquitectura producci\363n}{section.6.1}% 44
+\BOOKMARK [2][-]{subsection.6.1.3}{Distribuci\363n de los servicios}{section.6.1}% 45
+\BOOKMARK [1][-]{section.6.2}{Ambiente de trabajo}{chapter.6}% 46
+\BOOKMARK [2][-]{subsection.6.2.1}{Hardware utilizado}{section.6.2}% 47
+\BOOKMARK [2][-]{subsection.6.2.2}{Conexi\363n remota hacia el servidor renata}{section.6.2}% 48
+\BOOKMARK [2][-]{subsection.6.2.3}{Especificaciones servidor renata}{section.6.2}% 49
+\BOOKMARK [2][-]{subsection.6.2.4}{Acceso al exterior desde nodos}{section.6.2}% 50
+\BOOKMARK [0][-]{chapter.7}{Gesti\363n del Datacenter}{}% 51
+\BOOKMARK [1][-]{section.7.1}{Recuperaci\363n ante fallas}{chapter.7}% 52
+\BOOKMARK [2][-]{subsection.7.1.1}{Verificar el estado general de OpenStack}{section.7.1}% 53
+\BOOKMARK [2][-]{subsection.7.1.2}{Verificar estado de los componentes de la infraestructura}{section.7.1}% 54
+\BOOKMARK [2][-]{subsection.7.1.3}{Solucionar problemas}{section.7.1}% 55
+\BOOKMARK [2][-]{subsection.7.1.4}{Problemas con Ceph}{section.7.1}% 56
+\BOOKMARK [1][-]{section.7.2}{Escalamiento horizontal}{chapter.7}% 57
+\BOOKMARK [2][-]{subsection.7.2.1}{Agregar nodo de C\363mputo}{section.7.2}% 58
+\BOOKMARK [2][-]{subsection.7.2.2}{Eliminar un nodo de c\363mputo}{section.7.2}% 59
+\BOOKMARK [2][-]{subsection.7.2.3}{Infraestructura}{section.7.2}% 60
+\BOOKMARK [1][-]{section.7.3}{Actualizar versi\363n}{chapter.7}% 61
+\BOOKMARK [0][-]{chapter.8}{An\341lisis del m\363dulo de red}{}% 62
+\BOOKMARK [1][-]{section.8.1}{Escenarios de prueba}{chapter.8}% 63
+\BOOKMARK [2][-]{subsection.8.1.1}{Escenario 1: tr\341fico este-oeste \(misma red tenant\)}{section.8.1}% 64
+\BOOKMARK [2][-]{subsection.8.1.2}{Escenario 2: tr\341fico este-oeste \(distintas redes tenant\)}{section.8.1}% 65
+\BOOKMARK [2][-]{subsection.8.1.3}{Escenario 3: tr\341fico norte-sur \(acceso hacia el exterior\)}{section.8.1}% 66
+\BOOKMARK [2][-]{subsection.8.1.4}{Escenario 4: tr\341fico norte-sur \(acceso desde el exterior\)}{section.8.1}% 67
+\BOOKMARK [1][-]{section.8.2}{Linux bridge}{chapter.8}% 68
+\BOOKMARK [2][-]{subsection.8.2.1}{Escenario 1}{section.8.2}% 69
+\BOOKMARK [2][-]{subsection.8.2.2}{Escenario 2}{section.8.2}% 70
+\BOOKMARK [2][-]{subsection.8.2.3}{Escenario 3}{section.8.2}% 71
+\BOOKMARK [2][-]{subsection.8.2.4}{Escenario 4}{section.8.2}% 72
+\BOOKMARK [1][-]{section.8.3}{Open vSwitch}{chapter.8}% 73
+\BOOKMARK [2][-]{subsection.8.3.1}{Escenario 1}{section.8.3}% 74
+\BOOKMARK [2][-]{subsection.8.3.2}{Escenario 2}{section.8.3}% 75
+\BOOKMARK [2][-]{subsection.8.3.3}{Escenario 3}{section.8.3}% 76
+\BOOKMARK [2][-]{subsection.8.3.4}{Escenario 4}{section.8.3}% 77
+\BOOKMARK [1][-]{section.8.4}{Comparativa de drivers}{chapter.8}% 78
+\BOOKMARK [1][-]{section.8.5}{Funcionalidades avanzadas}{chapter.8}% 79
+\BOOKMARK [2][-]{subsection.8.5.1}{Layer 3 High Availability}{section.8.5}% 80
+\BOOKMARK [0][-]{chapter.9}{Trabajo a futuro}{}% 81
+\BOOKMARK [0][-]{chapter.10}{Conclusiones}{}% 82
+\BOOKMARK [0][-]{chapter*.181}{Referencias bibliogr\341ficas}{}% 83
+\BOOKMARK [0][-]{chapter*.181}{Glosario}{}% 84
+\BOOKMARK [0][-]{section*.182}{Ap\351ndices}{}% 85
+\BOOKMARK [0][-]{appendix.Alph1}{Im\341genes}{}% 86
+\BOOKMARK [0][-]{section*.185}{Anexos}{}% 87
+\BOOKMARK [0][-]{appendix.Anexo.1}{Instalaci\363n versi\363n Queens}{}% 88
+\BOOKMARK [1][-]{section.Anexo.1.1}{Preparaci\363n de nodos}{appendix.Anexo.1}% 89
+\BOOKMARK [1][-]{section.Anexo.1.2}{Configuraci\363n}{appendix.Anexo.1}% 90
+\BOOKMARK [2][-]{subsection.Anexo.1.2.1}{Configuraci\363n claves SSH}{section.Anexo.1.2}% 91
+\BOOKMARK [2][-]{subsection.Anexo.1.2.2}{Archivos de configuraci\363n OSA}{section.Anexo.1.2}% 92
+\BOOKMARK [2][-]{subsection.Anexo.1.2.3}{Generaci\363n de claves}{section.Anexo.1.2}% 93
+\BOOKMARK [2][-]{subsection.Anexo.1.2.4}{Correcciones}{section.Anexo.1.2}% 94
+\BOOKMARK [0][-]{appendix.Anexo.2}{Instalaci\363n versi\363n Stein}{}% 95
+\BOOKMARK [1][-]{section.Anexo.2.1}{Preparaci\363n de nodos}{appendix.Anexo.2}% 96
+\BOOKMARK [1][-]{section.Anexo.2.2}{Configuraci\363n archivos OSA}{appendix.Anexo.2}% 97
+\BOOKMARK [1][-]{section.Anexo.2.3}{Ejecuci\363n de playbooks}{appendix.Anexo.2}% 98
+\BOOKMARK [1][-]{section.Anexo.2.4}{Cambios para driver OVS}{appendix.Anexo.2}% 99
+\BOOKMARK [0][-]{appendix.Anexo.3}{Virtualizaci\363n con KVM}{}% 100
+\BOOKMARK [1][-]{section.Anexo.3.1}{Utilizaci\363n virt-manager}{appendix.Anexo.3}% 101
+\BOOKMARK [2][-]{subsection.Anexo.3.1.1}{Conexi\363n remota}{section.Anexo.3.1}% 102
+\BOOKMARK [2][-]{subsection.Anexo.3.1.2}{Creaci\363n de una red}{section.Anexo.3.1}% 103
+\BOOKMARK [2][-]{subsection.Anexo.3.1.3}{Crear nodo}{section.Anexo.3.1}% 104
+\BOOKMARK [0][-]{appendix.Anexo.4}{Interacci\363n}{}% 105
+\BOOKMARK [1][-]{section.Anexo.4.1}{Configuraciones de administrador}{appendix.Anexo.4}% 106
+\BOOKMARK [1][-]{section.Anexo.4.2}{Interacci\363n de un usuario}{appendix.Anexo.4}% 107
+\BOOKMARK [1][-]{section.Anexo.4.3}{Acceso a una instancia}{appendix.Anexo.4}% 108
+\BOOKMARK [2][-]{subsection.Anexo.4.3.1}{Por SPICE}{section.Anexo.4.3}% 109
+\BOOKMARK [2][-]{subsection.Anexo.4.3.2}{Por SSH}{section.Anexo.4.3}% 110
+\BOOKMARK [2][-]{subsection.Anexo.4.3.3}{Por virsh}{section.Anexo.4.3}% 111
+\BOOKMARK [0][-]{appendix.Anexo.5}{migrate\137instance.sh}{}% 112
diff --git a/docs/udelartex/tesis.pdf b/docs/udelartex/tesis.pdf
index 57f05d0daa8b8133db24086db17f9fa23aafc258..a5267e67a7c490c029cf9d77020d8adecce51658 100644
Binary files a/docs/udelartex/tesis.pdf and b/docs/udelartex/tesis.pdf differ
diff --git a/docs/udelartex/tesis.synctex.gz b/docs/udelartex/tesis.synctex.gz
index 928b8d87b16d5075cefe4615701d83b1823c1f97..08a343c6e535c3ea8c1cc67c1f74c276426ed9df 100644
Binary files a/docs/udelartex/tesis.synctex.gz and b/docs/udelartex/tesis.synctex.gz differ
diff --git a/docs/udelartex/tesis.tex b/docs/udelartex/tesis.tex
index 295131763deb1acfb2dbdc6abe4877ca5ab3676e..0f4cb8215ea130eeb4cc2f7b9f4de27ddb034407 100644
--- a/docs/udelartex/tesis.tex
+++ b/docs/udelartex/tesis.tex
@@ -102,10 +102,10 @@ nopostdot, 											 %quita el punto final en los acrónimos         .
   \include{resumen/abstract}
   %
   \listoffigures	         % Lista de figuras
-  \listoftables	         % Lista de tablas
+  %\listoftables	         % Lista de tablas
   %\listadesimbolos 		     % Lista de símbolos
   %\listadenotaciones 	     % Lista de notaciones
-  \listadesiglas 		     % Lista de siglas
+  %\listadesiglas 		     % Lista de siglas
   %
   \tableofcontents           % Tabla de contenidos. Compilar dos veces para ver los cambios completos.
   %
diff --git a/docs/udelartex/tesis.toc b/docs/udelartex/tesis.toc
index cca51f6278f2ce5f8b5a9c83e383134584bd8389..aaf19a6f9aaa07ec8301007ffde7b9260daf0967 100644
--- a/docs/udelartex/tesis.toc
+++ b/docs/udelartex/tesis.toc
@@ -2,26 +2,24 @@
 \babel@toc {english}{}
 \babel@toc {spanish}{}
 \contentsline {chapter}{Lista de figuras}{\es@scroman {vi}}{chapter*.1}%
-\contentsline {chapter}{Lista de tablas}{\es@scroman {x}}{chapter*.2}%
-\contentsline {chapter}{Lista de siglas}{\es@scroman {xi}}{chapter*.4}%
 \contentsline {chapter}{\numberline {1}Introducción}{1}{chapter.1}%
 \contentsline {chapter}{\numberline {2}Plan de proyecto}{2}{chapter.2}%
 \contentsline {chapter}{\numberline {3}Fundamentos teóricos}{6}{chapter.3}%
 \contentsline {section}{\numberline {3.1}Cloud computing}{6}{section.3.1}%
 \contentsline {section}{\numberline {3.2}Virtualización}{8}{section.3.2}%
-\contentsline {subparagraph}{KVM}{9}{section*.7}%
+\contentsline {subparagraph}{KVM}{9}{section*.4}%
 \contentsline {section}{\numberline {3.3}Contenerización}{9}{section.3.3}%
-\contentsline {subparagraph}{LXC}{10}{section*.9}%
+\contentsline {subparagraph}{LXC}{10}{section*.6}%
 \contentsline {section}{\numberline {3.4}Datacenters}{11}{section.3.4}%
 \contentsline {section}{\numberline {3.5}Redes}{12}{section.3.5}%
-\contentsline {subparagraph}{Flat}{12}{section*.10}%
-\contentsline {subparagraph}{VLAN}{12}{section*.11}%
-\contentsline {subparagraph}{VXLAN}{12}{section*.12}%
-\contentsline {subparagraph}{Network namespaces}{13}{section*.13}%
+\contentsline {subparagraph}{Flat}{12}{section*.7}%
+\contentsline {subparagraph}{VLAN}{12}{section*.8}%
+\contentsline {subparagraph}{VXLAN}{12}{section*.9}%
+\contentsline {subparagraph}{Network namespaces}{13}{section*.10}%
 \contentsline {section}{\numberline {3.6}Interfaces y bridges}{13}{section.3.6}%
-\contentsline {subparagraph}{Interfaces tap}{13}{section*.14}%
-\contentsline {subparagraph}{Linux bridge}{13}{section*.15}%
-\contentsline {subparagraph}{Veth cables}{14}{section*.16}%
+\contentsline {subparagraph}{Interfaces tap}{13}{section*.11}%
+\contentsline {subparagraph}{Linux bridge}{13}{section*.12}%
+\contentsline {subparagraph}{Veth cables}{14}{section*.13}%
 \contentsline {section}{\numberline {3.7}Backends de almacenamiento}{14}{section.3.7}%
 \contentsline {subsection}{\numberline {3.7.1}LVM}{14}{subsection.3.7.1}%
 \contentsline {subsection}{\numberline {3.7.2}Ceph}{14}{subsection.3.7.2}%
@@ -30,45 +28,45 @@
 \contentsline {section}{\numberline {4.2}Módulos Core}{18}{section.4.2}%
 \contentsline {subsection}{\numberline {4.2.1}Keystone}{19}{subsection.4.2.1}%
 \contentsline {subsection}{\numberline {4.2.2}Nova}{21}{subsection.4.2.2}%
-\contentsline {subparagraph}{API}{22}{section*.23}%
-\contentsline {subparagraph}{Scheduler}{22}{section*.24}%
-\contentsline {subparagraph}{Compute}{22}{section*.25}%
-\contentsline {subparagraph}{Conductor}{22}{section*.26}%
-\contentsline {subparagraph}{Placement}{23}{section*.27}%
+\contentsline {subparagraph}{API}{22}{section*.20}%
+\contentsline {subparagraph}{Scheduler}{22}{section*.21}%
+\contentsline {subparagraph}{Compute}{22}{section*.22}%
+\contentsline {subparagraph}{Conductor}{22}{section*.23}%
+\contentsline {subparagraph}{Placement}{23}{section*.24}%
 \contentsline {subsection}{\numberline {4.2.3}Neutron}{23}{subsection.4.2.3}%
-\contentsline {subparagraph}{Neutron-server}{23}{section*.29}%
-\contentsline {subparagraph}{Plugins y agentes}{24}{section*.30}%
-\contentsline {subparagraph}{Cola de mensajes}{24}{section*.31}%
+\contentsline {subparagraph}{Neutron-server}{23}{section*.26}%
+\contentsline {subparagraph}{Plugins y agentes}{24}{section*.27}%
+\contentsline {subparagraph}{Cola de mensajes}{24}{section*.28}%
 \contentsline {subsubsection}{\numberline {4.2.3.1}Tipos de redes en OpenStack}{24}{subsubsection.4.2.3.1}%
 \contentsline {subsubsection}{\numberline {4.2.3.2}Tipo de tráfico}{25}{subsubsection.4.2.3.2}%
 \contentsline {subsection}{\numberline {4.2.4}Glance}{25}{subsection.4.2.4}%
-\contentsline {subparagraph}{Creación de una VM}{26}{section*.33}%
+\contentsline {subparagraph}{Creación de una VM}{26}{section*.30}%
 \contentsline {subsection}{\numberline {4.2.5}Cinder}{28}{subsection.4.2.5}%
 \contentsline {subsection}{\numberline {4.2.6}Swift}{30}{subsection.4.2.6}%
-\contentsline {subparagraph}{Principales componentes}{30}{section*.37}%
+\contentsline {subparagraph}{Principales componentes}{30}{section*.34}%
 \contentsline {section}{\numberline {4.3}Tipos de nodos}{32}{section.4.3}%
-\contentsline {subparagraph}{Nodo de control}{32}{section*.38}%
-\contentsline {subparagraph}{Nodo de red}{32}{section*.39}%
-\contentsline {subparagraph}{Nodo de cómputo}{33}{section*.41}%
-\contentsline {subparagraph}{Nodo de almacenamiento}{33}{section*.42}%
-\contentsline {subparagraph}{Nodo de balanceamiento de carga}{33}{section*.43}%
+\contentsline {subparagraph}{Nodo de control}{32}{section*.35}%
+\contentsline {subparagraph}{Nodo de red}{32}{section*.36}%
+\contentsline {subparagraph}{Nodo de cómputo}{33}{section*.38}%
+\contentsline {subparagraph}{Nodo de almacenamiento}{33}{section*.39}%
+\contentsline {subparagraph}{Nodo de balanceamiento de carga}{33}{section*.40}%
 \contentsline {section}{\numberline {4.4}Servicios de infraestructura}{34}{section.4.4}%
-\contentsline {subparagraph}{Galera - MariaDB}{34}{section*.44}%
-\contentsline {subparagraph}{Message queue}{34}{section*.45}%
-\contentsline {subparagraph}{Memcached}{34}{section*.46}%
+\contentsline {subparagraph}{Galera - MariaDB}{34}{section*.41}%
+\contentsline {subparagraph}{Message queue}{34}{section*.42}%
+\contentsline {subparagraph}{Memcached}{34}{section*.43}%
 \contentsline {section}{\numberline {4.5}Métodos de instalación}{34}{section.4.5}%
 \contentsline {subsection}{\numberline {4.5.1}Ansible}{35}{subsection.4.5.1}%
-\contentsline {subparagraph}{Nodo de control}{36}{section*.47}%
-\contentsline {subparagraph}{Inventario}{36}{section*.48}%
-\contentsline {subparagraph}{Módulos}{36}{section*.49}%
-\contentsline {subparagraph}{Tarea}{36}{section*.50}%
-\contentsline {subparagraph}{Playbook}{36}{section*.51}%
+\contentsline {subparagraph}{Nodo de control}{36}{section*.44}%
+\contentsline {subparagraph}{Inventario}{36}{section*.45}%
+\contentsline {subparagraph}{Módulos}{36}{section*.46}%
+\contentsline {subparagraph}{Tarea}{36}{section*.47}%
+\contentsline {subparagraph}{Playbook}{36}{section*.48}%
 \contentsline {chapter}{\numberline {5}OpenStack-Ansible}{38}{chapter.5}%
 \contentsline {section}{\numberline {5.1}Arquitectura}{38}{section.5.1}%
 \contentsline {subsection}{\numberline {5.1.1}Arquitectura de red}{39}{subsection.5.1.1}%
-\contentsline {subparagraph}{Management Network}{39}{section*.54}%
-\contentsline {subparagraph}{Overlay Network}{39}{section*.55}%
-\contentsline {subparagraph}{Storage Network}{40}{section*.56}%
+\contentsline {subparagraph}{Management Network}{39}{section*.51}%
+\contentsline {subparagraph}{Overlay Network}{39}{section*.52}%
+\contentsline {subparagraph}{Storage Network}{40}{section*.53}%
 \contentsline {subsubsection}{\numberline {5.1.1.1}Interfaces de red}{40}{subsubsection.5.1.1.1}%
 \contentsline {section}{\numberline {5.2}Configuración OSA}{41}{section.5.2}%
 \contentsline {subsection}{\numberline {5.2.1}Convenciones}{43}{subsection.5.2.1}%
@@ -116,91 +114,91 @@
 \contentsline {subsection}{\numberline {8.2.1}Escenario 1}{83}{subsection.8.2.1}%
 \contentsline {subsubsection}{\numberline {8.2.1.1}Análisis de componentes}{84}{subsubsection.8.2.1.1}%
 \contentsline {subsubsection}{\numberline {8.2.1.2}Análisis de tráfico}{87}{subsubsection.8.2.1.2}%
-\contentsline {subparagraph}{Paso 1}{87}{section*.95}%
-\contentsline {subparagraph}{Paso 2}{87}{section*.96}%
-\contentsline {subparagraph}{Paso 3}{91}{section*.101}%
-\contentsline {subparagraph}{Paso 4}{92}{section*.104}%
+\contentsline {subparagraph}{Paso 1}{87}{section*.92}%
+\contentsline {subparagraph}{Paso 2}{87}{section*.93}%
+\contentsline {subparagraph}{Paso 3}{91}{section*.98}%
+\contentsline {subparagraph}{Paso 4}{92}{section*.101}%
 \contentsline {subsection}{\numberline {8.2.2}Escenario 2}{93}{subsection.8.2.2}%
 \contentsline {subsubsection}{\numberline {8.2.2.1}Análisis de componentes}{93}{subsubsection.8.2.2.1}%
 \contentsline {subsubsection}{\numberline {8.2.2.2}Análisis de tráfico}{99}{subsubsection.8.2.2.2}%
-\contentsline {subparagraph}{Paso 1}{99}{section*.106}%
-\contentsline {subparagraph}{Paso 2}{99}{section*.107}%
-\contentsline {subparagraph}{Paso 3}{99}{section*.108}%
-\contentsline {subparagraph}{Paso 4}{100}{section*.110}%
-\contentsline {subparagraph}{Paso 5}{100}{section*.111}%
-\contentsline {subparagraph}{Paso 6}{100}{section*.112}%
-\contentsline {subparagraph}{Paso 7}{100}{section*.114}%
+\contentsline {subparagraph}{Paso 1}{99}{section*.103}%
+\contentsline {subparagraph}{Paso 2}{99}{section*.104}%
+\contentsline {subparagraph}{Paso 3}{99}{section*.105}%
+\contentsline {subparagraph}{Paso 4}{100}{section*.107}%
+\contentsline {subparagraph}{Paso 5}{100}{section*.108}%
+\contentsline {subparagraph}{Paso 6}{100}{section*.109}%
+\contentsline {subparagraph}{Paso 7}{100}{section*.111}%
 \contentsline {subsection}{\numberline {8.2.3}Escenario 3}{101}{subsection.8.2.3}%
 \contentsline {subsubsection}{\numberline {8.2.3.1}Análisis de componentes}{102}{subsubsection.8.2.3.1}%
 \contentsline {subsubsection}{\numberline {8.2.3.2}Análisis de tráfico}{105}{subsubsection.8.2.3.2}%
-\contentsline {subparagraph}{Paso 1}{105}{section*.116}%
-\contentsline {subparagraph}{Paso 2}{105}{section*.117}%
-\contentsline {subparagraph}{Paso 3}{105}{section*.118}%
-\contentsline {subparagraph}{Paso 4}{106}{section*.120}%
-\contentsline {subparagraph}{Paso 5}{106}{section*.121}%
-\contentsline {subparagraph}{Paso 6}{107}{section*.123}%
-\contentsline {subparagraph}{Paso 7}{108}{section*.125}%
+\contentsline {subparagraph}{Paso 1}{105}{section*.113}%
+\contentsline {subparagraph}{Paso 2}{105}{section*.114}%
+\contentsline {subparagraph}{Paso 3}{105}{section*.115}%
+\contentsline {subparagraph}{Paso 4}{106}{section*.117}%
+\contentsline {subparagraph}{Paso 5}{106}{section*.118}%
+\contentsline {subparagraph}{Paso 6}{107}{section*.120}%
+\contentsline {subparagraph}{Paso 7}{108}{section*.122}%
 \contentsline {subsection}{\numberline {8.2.4}Escenario 4}{109}{subsection.8.2.4}%
 \contentsline {subsubsection}{\numberline {8.2.4.1}Análisis de componentes}{109}{subsubsection.8.2.4.1}%
 \contentsline {subsubsection}{\numberline {8.2.4.2}Análisis de tráfico}{111}{subsubsection.8.2.4.2}%
-\contentsline {subparagraph}{Paso 1}{111}{section*.127}%
-\contentsline {subparagraph}{Paso 2}{111}{section*.128}%
-\contentsline {subparagraph}{Paso 3}{111}{section*.129}%
-\contentsline {subparagraph}{Paso 4}{112}{section*.132}%
-\contentsline {subparagraph}{Paso 5}{112}{section*.133}%
-\contentsline {subparagraph}{Paso 6}{113}{section*.135}%
+\contentsline {subparagraph}{Paso 1}{111}{section*.124}%
+\contentsline {subparagraph}{Paso 2}{111}{section*.125}%
+\contentsline {subparagraph}{Paso 3}{111}{section*.126}%
+\contentsline {subparagraph}{Paso 4}{112}{section*.129}%
+\contentsline {subparagraph}{Paso 5}{112}{section*.130}%
+\contentsline {subparagraph}{Paso 6}{113}{section*.132}%
 \contentsline {section}{\numberline {8.3}Open vSwitch}{113}{section.8.3}%
 \contentsline {subsubsection}{\numberline {8.3.0.1}Archivos de configuración}{115}{subsubsection.8.3.0.1}%
 \contentsline {subsection}{\numberline {8.3.1}Escenario 1}{118}{subsection.8.3.1}%
 \contentsline {subsubsection}{\numberline {8.3.1.1}Análisis de componentes}{118}{subsubsection.8.3.1.1}%
 \contentsline {subsubsection}{\numberline {8.3.1.2}Análisis de tráfico}{124}{subsubsection.8.3.1.2}%
-\contentsline {subparagraph}{Paso 1}{124}{section*.138}%
-\contentsline {subparagraph}{Paso 2}{125}{section*.139}%
-\contentsline {subparagraph}{Paso 3}{132}{section*.144}%
-\contentsline {subparagraph}{Paso 4}{134}{section*.147}%
+\contentsline {subparagraph}{Paso 1}{124}{section*.135}%
+\contentsline {subparagraph}{Paso 2}{125}{section*.136}%
+\contentsline {subparagraph}{Paso 3}{132}{section*.141}%
+\contentsline {subparagraph}{Paso 4}{134}{section*.144}%
 \contentsline {subsection}{\numberline {8.3.2}Escenario 2}{135}{subsection.8.3.2}%
 \contentsline {subsubsection}{\numberline {8.3.2.1}Análisis de componentes}{135}{subsubsection.8.3.2.1}%
 \contentsline {subsubsection}{\numberline {8.3.2.2}Análisis de tráfico}{139}{subsubsection.8.3.2.2}%
-\contentsline {subparagraph}{Paso 1}{140}{section*.149}%
-\contentsline {subparagraph}{Paso 2}{140}{section*.150}%
-\contentsline {subparagraph}{Paso 3}{140}{section*.151}%
-\contentsline {subparagraph}{Paso 4}{140}{section*.153}%
-\contentsline {subparagraph}{Paso 5}{141}{section*.154}%
-\contentsline {subparagraph}{Paso 6}{141}{section*.155}%
-\contentsline {subparagraph}{Paso 7}{141}{section*.157}%
+\contentsline {subparagraph}{Paso 1}{140}{section*.146}%
+\contentsline {subparagraph}{Paso 2}{140}{section*.147}%
+\contentsline {subparagraph}{Paso 3}{140}{section*.148}%
+\contentsline {subparagraph}{Paso 4}{140}{section*.150}%
+\contentsline {subparagraph}{Paso 5}{141}{section*.151}%
+\contentsline {subparagraph}{Paso 6}{141}{section*.152}%
+\contentsline {subparagraph}{Paso 7}{141}{section*.154}%
 \contentsline {subsection}{\numberline {8.3.3}Escenario 3}{142}{subsection.8.3.3}%
 \contentsline {subsubsection}{\numberline {8.3.3.1}Análisis de componentes}{142}{subsubsection.8.3.3.1}%
 \contentsline {subsubsection}{\numberline {8.3.3.2}Análisis de tráfico}{145}{subsubsection.8.3.3.2}%
-\contentsline {subparagraph}{Paso 1}{145}{section*.159}%
-\contentsline {subparagraph}{Paso 2}{145}{section*.160}%
-\contentsline {subparagraph}{Paso 3}{146}{section*.161}%
-\contentsline {subparagraph}{Paso 4}{146}{section*.163}%
-\contentsline {subparagraph}{Paso 5}{146}{section*.164}%
-\contentsline {subparagraph}{Paso 6}{148}{section*.166}%
-\contentsline {subparagraph}{Paso 7}{148}{section*.168}%
+\contentsline {subparagraph}{Paso 1}{145}{section*.156}%
+\contentsline {subparagraph}{Paso 2}{145}{section*.157}%
+\contentsline {subparagraph}{Paso 3}{146}{section*.158}%
+\contentsline {subparagraph}{Paso 4}{146}{section*.160}%
+\contentsline {subparagraph}{Paso 5}{146}{section*.161}%
+\contentsline {subparagraph}{Paso 6}{148}{section*.163}%
+\contentsline {subparagraph}{Paso 7}{148}{section*.165}%
 \contentsline {subsection}{\numberline {8.3.4}Escenario 4}{149}{subsection.8.3.4}%
 \contentsline {subsubsection}{\numberline {8.3.4.1}Análisis de componentes}{149}{subsubsection.8.3.4.1}%
 \contentsline {subsubsection}{\numberline {8.3.4.2}Análisis de tráfico}{150}{subsubsection.8.3.4.2}%
-\contentsline {subparagraph}{Paso 1}{151}{section*.170}%
-\contentsline {subparagraph}{Paso 2}{151}{section*.171}%
-\contentsline {subparagraph}{Paso 3}{151}{section*.172}%
-\contentsline {subparagraph}{Paso 4}{153}{section*.175}%
-\contentsline {subparagraph}{Paso 5}{153}{section*.176}%
-\contentsline {subparagraph}{Paso 6}{153}{section*.178}%
+\contentsline {subparagraph}{Paso 1}{151}{section*.167}%
+\contentsline {subparagraph}{Paso 2}{151}{section*.168}%
+\contentsline {subparagraph}{Paso 3}{151}{section*.169}%
+\contentsline {subparagraph}{Paso 4}{153}{section*.172}%
+\contentsline {subparagraph}{Paso 5}{153}{section*.173}%
+\contentsline {subparagraph}{Paso 6}{153}{section*.175}%
 \contentsline {section}{\numberline {8.4}Comparativa de drivers}{153}{section.8.4}%
 \contentsline {section}{\numberline {8.5}Funcionalidades avanzadas}{153}{section.8.5}%
 \contentsline {subsection}{\numberline {8.5.1}Layer 3 High Availability}{153}{subsection.8.5.1}%
 \contentsline {chapter}{\numberline {9}Trabajo a futuro}{155}{chapter.9}%
 \contentsline {chapter}{\numberline {10}Conclusiones}{157}{chapter.10}%
-\contentsline {chapter}{Referencias bibliográficas}{158}{chapter*.184}%
-\contentsline {chapter}{Glosario}{164}{chapter*.184}%
-\contentsline {chapter}{\textbf {Apéndices}}{165}{section*.185}%
+\contentsline {chapter}{Referencias bibliográficas}{158}{chapter*.181}%
+\contentsline {chapter}{Glosario}{164}{chapter*.181}%
+\contentsline {chapter}{\textbf {Apéndices}}{165}{section*.182}%
 \ttl@change@i {\@ne }{chapter}{13pt}{}{ Apéndice\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax 
 \ttl@change@v {chapter}{}{}{}\relax 
 \contentsline {chapter}{\numberline {1}Imágenes}{166}{appendix.Alph1}%
 \ttl@change@i {\@ne }{chapter}{0pt}{\vspace *{0.45cm}}{\thecontentslabel \quad }{}{\bfseries \hfill \contentspage }\relax 
 \ttl@change@v {chapter}{}{}{}\relax 
-\contentsline {chapter}{\textbf {Anexos}}{169}{section*.188}%
+\contentsline {chapter}{\textbf {Anexos}}{169}{section*.185}%
 \ttl@change@i {\@ne }{chapter}{13pt}{}{ Anexo\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax 
 \ttl@change@v {chapter}{}{}{}\relax 
 \contentsline {chapter}{\numberline {1}Instalación versión Queens}{170}{appendix.Anexo.1}%