diff --git a/docs/udelartex/tesis.lof b/docs/udelartex/tesis.lof index 8d799caf408c38e60b22d224949c7d9c0cb0ed77..fc1f56d7dde2bcd840d01938bb774b78a654de6a 100644 --- a/docs/udelartex/tesis.lof +++ b/docs/udelartex/tesis.lof @@ -4,109 +4,109 @@ \addvspace {10\p@ } \addvspace {10\p@ } \addvspace {10\p@ } -\contentsline {figure}{\numberline {3.1}{\ignorespaces Hipervisores. ExtraÃda de \cite {redhat-virtualization}.\relax }}{8}{figure.caption.6}% -\contentsline {figure}{\numberline {3.2}{\ignorespaces Virtualización vs Contenerización. ExtraÃda de \cite {redhat-lxc}.\relax }}{10}{figure.caption.8}% -\contentsline {figure}{\numberline {3.3}{\ignorespaces Proceso de replicación en OSDs de Ceph. ExtraÃda de \cite {ceph-architecture}.\relax }}{15}{figure.caption.17}% -\contentsline {figure}{\numberline {3.4}{\ignorespaces Proceso de almacenamiento en pools de Ceph. ExtraÃda de \cite {ceph-architecture}.\relax }}{16}{figure.caption.18}% -\contentsline {figure}{\numberline {3.5}{\ignorespaces Proceso de almacenamiento en PGs de Ceph. ExtraÃda de \cite {ceph-architecture}.\relax }}{16}{figure.caption.19}% -\addvspace {10\p@ } -\contentsline {figure}{\numberline {4.1}{\ignorespaces Relacionamiento entre módulos core\relax }}{19}{figure.caption.20}% -\contentsline {figure}{\numberline {4.2}{\ignorespaces Servicios y backends soportados por Keystone. ExtraÃda de \cite {openstack-idm-book-1}.\relax }}{19}{figure.caption.21}% -\contentsline {figure}{\numberline {4.3}{\ignorespaces Principales componentes de Nova. ExtraÃda de \cite {openstack-nova-architecture}.\relax }}{21}{figure.caption.22}% -\contentsline {figure}{\numberline {4.4}{\ignorespaces Arquitectura simplificada de Neutron. ExtraÃda de \cite {openstack-networking-book-2}\relax }}{24}{figure.caption.28}% -\contentsline {figure}{\numberline {4.5}{\ignorespaces Componentes del módulo Glance. ExtraÃda de \cite {openstack-glance-architecture}.\relax }}{27}{figure.caption.32}% -\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de una VM. ExtraÃda de \cite {openstack-images-instances}.\relax }}{27}{figure.caption.34}% -\contentsline {figure}{\numberline {4.7}{\ignorespaces Principales componentes de Cinder. ExtraÃdo de \cite {redhat-cinder}.\relax }}{29}{figure.caption.35}% -\contentsline {figure}{\numberline {4.8}{\ignorespaces Arquitectura del módulo Swift. ExtraÃda de \cite {openstack-storage-components}.\relax }}{31}{figure.caption.36}% -\contentsline {figure}{\numberline {4.9}{\ignorespaces Arquitectura de Neutron. ExtraÃda de \cite {openstack-networking-book-1}.\relax }}{33}{figure.caption.40}% -\addvspace {10\p@ } -\contentsline {figure}{\numberline {5.1}{\ignorespaces Componentes de red en OpenStack. \cite {openstack-container-networking}.\relax }}{39}{figure.caption.53}% -\contentsline {figure}{\numberline {5.2}{\ignorespaces Diagrama de múltiples interfaces de red. ExtraÃda de \cite {openstack-networking-architecture}.\relax }}{40}{figure.caption.57}% -\contentsline {figure}{\numberline {5.3}{\ignorespaces Diagrama de bonds de múltiples interfaces de red. ExtraÃda de \cite {openstack-networking-architecture}.\relax }}{41}{figure.caption.58}% -\contentsline {figure}{\numberline {5.4}{\ignorespaces Despliegue de servicios OpenStack en contenedores. ExtraÃda de \cite {openstack-appendix-e}.\relax }}{42}{figure.caption.59}% -\addvspace {10\p@ } -\contentsline {figure}{\numberline {6.1}{\ignorespaces Arquitectura diseñada.\relax }}{54}{figure.caption.69}% -\contentsline {figure}{\numberline {6.2}{\ignorespaces Arquitectura diseñada para instalación Stein\relax }}{57}{figure.caption.70}% -\contentsline {figure}{\numberline {6.3}{\ignorespaces Acceso remoto al servidor renata.\relax }}{59}{figure.caption.71}% -\contentsline {figure}{\numberline {6.4}{\ignorespaces Túnel reverso y esquema de servidores.\relax }}{60}{figure.caption.72}% -\contentsline {figure}{\numberline {6.5}{\ignorespaces Salida a Internet en los nodos de Openstack.\relax }}{61}{figure.caption.73}% -\addvspace {10\p@ } -\addvspace {10\p@ } -\contentsline {figure}{\numberline {8.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{83}{figure.caption.94}% -\contentsline {figure}{\numberline {8.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{88}{figure.caption.97}% -\contentsline {figure}{\numberline {8.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{88}{figure.caption.98}% -\contentsline {figure}{\numberline {8.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{90}{figure.caption.99}% -\contentsline {figure}{\numberline {8.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{91}{figure.caption.100}% -\contentsline {figure}{\numberline {8.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{91}{figure.caption.102}% -\contentsline {figure}{\numberline {8.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{92}{figure.caption.103}% -\contentsline {figure}{\numberline {8.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{93}{figure.caption.105}% -\contentsline {figure}{\numberline {8.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{100}{figure.caption.109}% -\contentsline {figure}{\numberline {8.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{101}{figure.caption.113}% -\contentsline {figure}{\numberline {8.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{101}{figure.caption.115}% -\contentsline {figure}{\numberline {8.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{106}{figure.caption.119}% -\contentsline {figure}{\numberline {8.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{107}{figure.caption.122}% -\contentsline {figure}{\numberline {8.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{108}{figure.caption.124}% -\contentsline {figure}{\numberline {8.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{109}{figure.caption.126}% -\contentsline {figure}{\numberline {8.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router fÃsico\relax }}{112}{figure.caption.130}% -\contentsline {figure}{\numberline {8.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{112}{figure.caption.131}% -\contentsline {figure}{\numberline {8.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{113}{figure.caption.134}% -\contentsline {figure}{\numberline {8.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{114}{figure.caption.136}% -\contentsline {figure}{\numberline {8.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{118}{figure.caption.137}% -\contentsline {figure}{\numberline {8.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{125}{figure.caption.140}% -\contentsline {figure}{\numberline {8.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{127}{figure.caption.141}% -\contentsline {figure}{\numberline {8.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{131}{figure.caption.142}% -\contentsline {figure}{\numberline {8.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{132}{figure.caption.143}% -\contentsline {figure}{\numberline {8.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{132}{figure.caption.145}% -\contentsline {figure}{\numberline {8.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{134}{figure.caption.146}% -\contentsline {figure}{\numberline {8.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{135}{figure.caption.148}% -\contentsline {figure}{\numberline {8.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{140}{figure.caption.152}% -\contentsline {figure}{\numberline {8.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{141}{figure.caption.156}% -\contentsline {figure}{\numberline {8.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{142}{figure.caption.158}% -\contentsline {figure}{\numberline {8.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{146}{figure.caption.162}% -\contentsline {figure}{\numberline {8.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{147}{figure.caption.165}% -\contentsline {figure}{\numberline {8.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{148}{figure.caption.167}% -\contentsline {figure}{\numberline {8.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{149}{figure.caption.169}% -\contentsline {figure}{\numberline {8.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router fÃsico\relax }}{152}{figure.caption.173}% -\contentsline {figure}{\numberline {8.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{152}{figure.caption.174}% -\contentsline {figure}{\numberline {8.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{153}{figure.caption.177}% -\contentsline {figure}{\numberline {8.38}{\ignorespaces Routers virtuales instanciados en múltiples agentes fÃsicos funcionales\relax }}{154}{figure.caption.179}% -\contentsline {figure}{\numberline {8.39}{\ignorespaces Routers virtuales instanciados en múltiples agentes fÃsicos luego de un fallo en uno de ellos\relax }}{154}{figure.caption.180}% -\addvspace {10\p@ } -\addvspace {10\p@ } -\addvspace {10\p@ } -\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{167}{figure.caption.186}% -\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{168}{figure.caption.187}% -\addvspace {10\p@ } -\addvspace {10\p@ } -\addvspace {10\p@ } -\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{210}{figure.caption.208}% -\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{211}{figure.caption.209}% -\addvspace {10\p@ } -\contentsline {figure}{\numberline {4.1}{\ignorespaces Vista del login de Horizon.\relax }}{218}{figure.caption.223}% -\contentsline {figure}{\numberline {4.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{219}{figure.caption.225}% -\contentsline {figure}{\numberline {4.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{220}{figure.caption.226}% -\contentsline {figure}{\numberline {4.4}{\ignorespaces Creación de un usuario.\relax }}{221}{figure.caption.228}% -\contentsline {figure}{\numberline {4.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{222}{figure.caption.230}% -\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{222}{figure.caption.231}% -\contentsline {figure}{\numberline {4.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{223}{figure.caption.233}% -\contentsline {figure}{\numberline {4.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{224}{figure.caption.234}% -\contentsline {figure}{\numberline {4.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{225}{figure.caption.236}% -\contentsline {figure}{\numberline {4.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{226}{figure.caption.237}% -\contentsline {figure}{\numberline {4.11}{\ignorespaces Creación de una red (1/3).\relax }}{227}{figure.caption.239}% -\contentsline {figure}{\numberline {4.12}{\ignorespaces Creación de una red (2/3).\relax }}{227}{figure.caption.240}% -\contentsline {figure}{\numberline {4.13}{\ignorespaces Creación de una red (3/3).\relax }}{228}{figure.caption.241}% -\contentsline {figure}{\numberline {4.14}{\ignorespaces Creación de un router.\relax }}{228}{figure.caption.243}% -\contentsline {figure}{\numberline {4.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{229}{figure.caption.245}% -\contentsline {figure}{\numberline {4.16}{\ignorespaces Creación de una key pair.\relax }}{229}{figure.caption.247}% -\contentsline {figure}{\numberline {4.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{230}{figure.caption.249}% -\contentsline {figure}{\numberline {4.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{230}{figure.caption.250}% -\contentsline {figure}{\numberline {4.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{231}{figure.caption.251}% -\contentsline {figure}{\numberline {4.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{231}{figure.caption.252}% -\contentsline {figure}{\numberline {4.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{232}{figure.caption.253}% -\contentsline {figure}{\numberline {4.22}{\ignorespaces Asignación de floating IP.\relax }}{233}{figure.caption.254}% -\contentsline {figure}{\numberline {4.23}{\ignorespaces Asociación de floating IP.\relax }}{234}{figure.caption.255}% -\contentsline {figure}{\numberline {4.24}{\ignorespaces Reglas security group por defecto.\relax }}{234}{figure.caption.256}% -\contentsline {figure}{\numberline {4.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{235}{figure.caption.257}% -\contentsline {figure}{\numberline {4.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{235}{figure.caption.258}% +\contentsline {figure}{\numberline {3.1}{\ignorespaces Hipervisores. ExtraÃda de \cite {redhat-virtualization}.\relax }}{8}{figure.caption.3}% +\contentsline {figure}{\numberline {3.2}{\ignorespaces Virtualización vs Contenerización. ExtraÃda de \cite {redhat-lxc}.\relax }}{10}{figure.caption.5}% +\contentsline {figure}{\numberline {3.3}{\ignorespaces Proceso de replicación en OSDs de Ceph. ExtraÃda de \cite {ceph-architecture}.\relax }}{15}{figure.caption.14}% +\contentsline {figure}{\numberline {3.4}{\ignorespaces Proceso de almacenamiento en pools de Ceph. ExtraÃda de \cite {ceph-architecture}.\relax }}{16}{figure.caption.15}% +\contentsline {figure}{\numberline {3.5}{\ignorespaces Proceso de almacenamiento en PGs de Ceph. ExtraÃda de \cite {ceph-architecture}.\relax }}{16}{figure.caption.16}% +\addvspace {10\p@ } +\contentsline {figure}{\numberline {4.1}{\ignorespaces Relacionamiento entre módulos core\relax }}{19}{figure.caption.17}% +\contentsline {figure}{\numberline {4.2}{\ignorespaces Servicios y backends soportados por Keystone. ExtraÃda de \cite {openstack-idm-book-1}.\relax }}{19}{figure.caption.18}% +\contentsline {figure}{\numberline {4.3}{\ignorespaces Principales componentes de Nova. ExtraÃda de \cite {openstack-nova-architecture}.\relax }}{21}{figure.caption.19}% +\contentsline {figure}{\numberline {4.4}{\ignorespaces Arquitectura simplificada de Neutron. ExtraÃda de \cite {openstack-networking-book-2}\relax }}{24}{figure.caption.25}% +\contentsline {figure}{\numberline {4.5}{\ignorespaces Componentes del módulo Glance. ExtraÃda de \cite {openstack-glance-architecture}.\relax }}{27}{figure.caption.29}% +\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de una VM. ExtraÃda de \cite {openstack-images-instances}.\relax }}{27}{figure.caption.31}% +\contentsline {figure}{\numberline {4.7}{\ignorespaces Principales componentes de Cinder. ExtraÃdo de \cite {redhat-cinder}.\relax }}{29}{figure.caption.32}% +\contentsline {figure}{\numberline {4.8}{\ignorespaces Arquitectura del módulo Swift. ExtraÃda de \cite {openstack-storage-components}.\relax }}{31}{figure.caption.33}% +\contentsline {figure}{\numberline {4.9}{\ignorespaces Arquitectura de Neutron. ExtraÃda de \cite {openstack-networking-book-1}.\relax }}{33}{figure.caption.37}% +\addvspace {10\p@ } +\contentsline {figure}{\numberline {5.1}{\ignorespaces Componentes de red en OpenStack. \cite {openstack-container-networking}.\relax }}{39}{figure.caption.50}% +\contentsline {figure}{\numberline {5.2}{\ignorespaces Diagrama de múltiples interfaces de red. ExtraÃda de \cite {openstack-networking-architecture}.\relax }}{40}{figure.caption.54}% +\contentsline {figure}{\numberline {5.3}{\ignorespaces Diagrama de bonds de múltiples interfaces de red. ExtraÃda de \cite {openstack-networking-architecture}.\relax }}{41}{figure.caption.55}% +\contentsline {figure}{\numberline {5.4}{\ignorespaces Despliegue de servicios OpenStack en contenedores. ExtraÃda de \cite {openstack-appendix-e}.\relax }}{42}{figure.caption.56}% +\addvspace {10\p@ } +\contentsline {figure}{\numberline {6.1}{\ignorespaces Arquitectura diseñada.\relax }}{54}{figure.caption.66}% +\contentsline {figure}{\numberline {6.2}{\ignorespaces Arquitectura diseñada para instalación Stein\relax }}{57}{figure.caption.67}% +\contentsline {figure}{\numberline {6.3}{\ignorespaces Acceso remoto al servidor renata.\relax }}{59}{figure.caption.68}% +\contentsline {figure}{\numberline {6.4}{\ignorespaces Túnel reverso y esquema de servidores.\relax }}{60}{figure.caption.69}% +\contentsline {figure}{\numberline {6.5}{\ignorespaces Salida a Internet en los nodos de Openstack.\relax }}{61}{figure.caption.70}% +\addvspace {10\p@ } +\addvspace {10\p@ } +\contentsline {figure}{\numberline {8.1}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Linux Bridge\relax }}{83}{figure.caption.91}% +\contentsline {figure}{\numberline {8.2}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{88}{figure.caption.94}% +\contentsline {figure}{\numberline {8.3}{\ignorespaces Paquete ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{88}{figure.caption.95}% +\contentsline {figure}{\numberline {8.4}{\ignorespaces Paquete ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{90}{figure.caption.96}% +\contentsline {figure}{\numberline {8.5}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{91}{figure.caption.97}% +\contentsline {figure}{\numberline {8.6}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{91}{figure.caption.99}% +\contentsline {figure}{\numberline {8.7}{\ignorespaces Paquete ICMP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{92}{figure.caption.100}% +\contentsline {figure}{\numberline {8.8}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Linux Bridge\relax }}{93}{figure.caption.102}% +\contentsline {figure}{\numberline {8.9}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{100}{figure.caption.106}% +\contentsline {figure}{\numberline {8.10}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{101}{figure.caption.110}% +\contentsline {figure}{\numberline {8.11}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Linux Bridge\relax }}{101}{figure.caption.112}% +\contentsline {figure}{\numberline {8.12}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{106}{figure.caption.116}% +\contentsline {figure}{\numberline {8.13}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{107}{figure.caption.119}% +\contentsline {figure}{\numberline {8.14}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{108}{figure.caption.121}% +\contentsline {figure}{\numberline {8.15}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Linux Bridge\relax }}{109}{figure.caption.123}% +\contentsline {figure}{\numberline {8.16}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router fÃsico\relax }}{112}{figure.caption.127}% +\contentsline {figure}{\numberline {8.17}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{112}{figure.caption.128}% +\contentsline {figure}{\numberline {8.18}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{113}{figure.caption.131}% +\contentsline {figure}{\numberline {8.19}{\ignorespaces Diagrama de componentes de Open vSwitch\relax }}{114}{figure.caption.133}% +\contentsline {figure}{\numberline {8.20}{\ignorespaces Diagrama de arquitectura para el escenario 1 de Open vSwitch\relax }}{118}{figure.caption.134}% +\contentsline {figure}{\numberline {8.21}{\ignorespaces Paquete ARP request capturado en la interfaz eth0 de la instancia 1\relax }}{125}{figure.caption.137}% +\contentsline {figure}{\numberline {8.22}{\ignorespaces ARP request encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{127}{figure.caption.138}% +\contentsline {figure}{\numberline {8.23}{\ignorespaces ARP reply encapsulado en VXLAN capturado en la interfaz br-vxlan del nodo de cómputo 1\relax }}{131}{figure.caption.139}% +\contentsline {figure}{\numberline {8.24}{\ignorespaces Paquete ARP reply capturado en la interfaz eth0 de la instancia 1\relax }}{132}{figure.caption.140}% +\contentsline {figure}{\numberline {8.25}{\ignorespaces Paquete ICMP request capturado en la interfaz eth0 de la instancia 1\relax }}{132}{figure.caption.142}% +\contentsline {figure}{\numberline {8.26}{\ignorespaces Paquete ICMP request encapsulado en VXLAN 19 capturado en el bridge br-vxlan en el nodo de cómputo 1\relax }}{134}{figure.caption.143}% +\contentsline {figure}{\numberline {8.27}{\ignorespaces Diagrama de arquitectura para el escenario 2 de Open vSwitch\relax }}{135}{figure.caption.145}% +\contentsline {figure}{\numberline {8.28}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{140}{figure.caption.149}% +\contentsline {figure}{\numberline {8.29}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 2\relax }}{141}{figure.caption.153}% +\contentsline {figure}{\numberline {8.30}{\ignorespaces Diagrama de arquitectura para el escenario 3 de Open vSwitch\relax }}{142}{figure.caption.155}% +\contentsline {figure}{\numberline {8.31}{\ignorespaces Paquete ICMP echo request encapsulado en VXLAN capturado en la interfaz br-vxlan en el nodo de cómputo 1\relax }}{146}{figure.caption.159}% +\contentsline {figure}{\numberline {8.32}{\ignorespaces Paquete ARP request taggeado con el VLAN ID 100 capturado en la interfaz br-vlan en el nodo de red\relax }}{147}{figure.caption.162}% +\contentsline {figure}{\numberline {8.33}{\ignorespaces Paquete ICMP echo request capturado en la interfaz br-vlan del nodo de red\relax }}{148}{figure.caption.164}% +\contentsline {figure}{\numberline {8.34}{\ignorespaces Diagrama de arquitectura para el escenario 4 de Open vSwitch\relax }}{149}{figure.caption.166}% +\contentsline {figure}{\numberline {8.35}{\ignorespaces Paquete ICMP echo request taggeado con el VLAN ID 100 capturado en la interfaz eth3 del router fÃsico\relax }}{152}{figure.caption.170}% +\contentsline {figure}{\numberline {8.36}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qg del router de Neutron\relax }}{152}{figure.caption.171}% +\contentsline {figure}{\numberline {8.37}{\ignorespaces Paquete ICMP echo request capturado en la interfaz qr del router de Neutron\relax }}{153}{figure.caption.174}% +\contentsline {figure}{\numberline {8.38}{\ignorespaces Routers virtuales instanciados en múltiples agentes fÃsicos funcionales\relax }}{154}{figure.caption.176}% +\contentsline {figure}{\numberline {8.39}{\ignorespaces Routers virtuales instanciados en múltiples agentes fÃsicos luego de un fallo en uno de ellos\relax }}{154}{figure.caption.177}% +\addvspace {10\p@ } +\addvspace {10\p@ } +\addvspace {10\p@ } +\contentsline {figure}{\numberline {1.1}{\ignorespaces Arquitectura diseñada para desarrollo\relax }}{167}{figure.caption.183}% +\contentsline {figure}{\numberline {1.2}{\ignorespaces Arquitectura diseñada para producción\relax }}{168}{figure.caption.184}% +\addvspace {10\p@ } +\addvspace {10\p@ } +\addvspace {10\p@ } +\contentsline {figure}{\numberline {3.1}{\ignorespaces Nueva conexión en virt-manager.\relax }}{210}{figure.caption.205}% +\contentsline {figure}{\numberline {3.2}{\ignorespaces Configuración de redes virtuales en virt-manager.\relax }}{211}{figure.caption.206}% +\addvspace {10\p@ } +\contentsline {figure}{\numberline {4.1}{\ignorespaces Vista del login de Horizon.\relax }}{218}{figure.caption.220}% +\contentsline {figure}{\numberline {4.2}{\ignorespaces Creación de un proyecto (1/2).\relax }}{219}{figure.caption.222}% +\contentsline {figure}{\numberline {4.3}{\ignorespaces Creación de un proyecto (2/2).\relax }}{220}{figure.caption.223}% +\contentsline {figure}{\numberline {4.4}{\ignorespaces Creación de un usuario.\relax }}{221}{figure.caption.225}% +\contentsline {figure}{\numberline {4.5}{\ignorespaces Creación de un flavor (1/2).\relax }}{222}{figure.caption.227}% +\contentsline {figure}{\numberline {4.6}{\ignorespaces Creación de un flavor (2/2).\relax }}{222}{figure.caption.228}% +\contentsline {figure}{\numberline {4.7}{\ignorespaces Creación de una red provider (1/2).\relax }}{223}{figure.caption.230}% +\contentsline {figure}{\numberline {4.8}{\ignorespaces Creación de una red provider (2/2).\relax }}{224}{figure.caption.231}% +\contentsline {figure}{\numberline {4.9}{\ignorespaces Creación de una imagen (1/2).\relax }}{225}{figure.caption.233}% +\contentsline {figure}{\numberline {4.10}{\ignorespaces Creación de una imagen (2/2).\relax }}{226}{figure.caption.234}% +\contentsline {figure}{\numberline {4.11}{\ignorespaces Creación de una red (1/3).\relax }}{227}{figure.caption.236}% +\contentsline {figure}{\numberline {4.12}{\ignorespaces Creación de una red (2/3).\relax }}{227}{figure.caption.237}% +\contentsline {figure}{\numberline {4.13}{\ignorespaces Creación de una red (3/3).\relax }}{228}{figure.caption.238}% +\contentsline {figure}{\numberline {4.14}{\ignorespaces Creación de un router.\relax }}{228}{figure.caption.240}% +\contentsline {figure}{\numberline {4.15}{\ignorespaces Creación de una interfaz en un router.\relax }}{229}{figure.caption.242}% +\contentsline {figure}{\numberline {4.16}{\ignorespaces Creación de una key pair.\relax }}{229}{figure.caption.244}% +\contentsline {figure}{\numberline {4.17}{\ignorespaces Lanzar una nueva instancia (1/5).\relax }}{230}{figure.caption.246}% +\contentsline {figure}{\numberline {4.18}{\ignorespaces Lanzar una nueva instancia (2/5).\relax }}{230}{figure.caption.247}% +\contentsline {figure}{\numberline {4.19}{\ignorespaces Lanzar una nueva instancia (3/5).\relax }}{231}{figure.caption.248}% +\contentsline {figure}{\numberline {4.20}{\ignorespaces Lanzar una nueva instancia (4/5).\relax }}{231}{figure.caption.249}% +\contentsline {figure}{\numberline {4.21}{\ignorespaces Lanzar una nueva instancia (5/5).\relax }}{232}{figure.caption.250}% +\contentsline {figure}{\numberline {4.22}{\ignorespaces Asignación de floating IP.\relax }}{233}{figure.caption.251}% +\contentsline {figure}{\numberline {4.23}{\ignorespaces Asociación de floating IP.\relax }}{234}{figure.caption.252}% +\contentsline {figure}{\numberline {4.24}{\ignorespaces Reglas security group por defecto.\relax }}{234}{figure.caption.253}% +\contentsline {figure}{\numberline {4.25}{\ignorespaces Agregar regla para tráfico ICMP.\relax }}{235}{figure.caption.254}% +\contentsline {figure}{\numberline {4.26}{\ignorespaces Agregar regla para tráfico SSH.\relax }}{235}{figure.caption.255}% \addvspace {10\p@ } \contentsfinish diff --git a/docs/udelartex/tesis.out b/docs/udelartex/tesis.out index a3c5e33d7cb0f01fbbaed5e21ac8978f861076ea..0fa031d602e2bb69ba758408907d0ca06b6b9ae2 100644 --- a/docs/udelartex/tesis.out +++ b/docs/udelartex/tesis.out @@ -1,114 +1,112 @@ \BOOKMARK [0][-]{chapter*.1}{Lista de figuras}{}% 1 -\BOOKMARK [0][-]{chapter*.2}{Lista de tablas}{}% 2 -\BOOKMARK [0][-]{chapter*.4}{Lista de siglas}{}% 3 -\BOOKMARK [0][-]{chapter.1}{Introducci\363n}{}% 4 -\BOOKMARK [0][-]{chapter.2}{Plan de proyecto}{}% 5 -\BOOKMARK [0][-]{chapter.3}{Fundamentos te\363ricos}{}% 6 -\BOOKMARK [1][-]{section.3.1}{Cloud computing}{chapter.3}% 7 -\BOOKMARK [1][-]{section.3.2}{Virtualizaci\363n}{chapter.3}% 8 -\BOOKMARK [1][-]{section.3.3}{Contenerizaci\363n}{chapter.3}% 9 -\BOOKMARK [1][-]{section.3.4}{Datacenters}{chapter.3}% 10 -\BOOKMARK [1][-]{section.3.5}{Redes}{chapter.3}% 11 -\BOOKMARK [1][-]{section.3.6}{Interfaces y bridges}{chapter.3}% 12 -\BOOKMARK [1][-]{section.3.7}{Backends de almacenamiento}{chapter.3}% 13 -\BOOKMARK [2][-]{subsection.3.7.1}{LVM}{section.3.7}% 14 -\BOOKMARK [2][-]{subsection.3.7.2}{Ceph}{section.3.7}% 15 -\BOOKMARK [0][-]{chapter.4}{OpenStack}{}% 16 -\BOOKMARK [1][-]{section.4.1}{Origen y definici\363n}{chapter.4}% 17 -\BOOKMARK [1][-]{section.4.2}{M\363dulos Core}{chapter.4}% 18 -\BOOKMARK [2][-]{subsection.4.2.1}{Keystone}{section.4.2}% 19 -\BOOKMARK [2][-]{subsection.4.2.2}{Nova}{section.4.2}% 20 -\BOOKMARK [2][-]{subsection.4.2.3}{Neutron}{section.4.2}% 21 -\BOOKMARK [2][-]{subsection.4.2.4}{Glance}{section.4.2}% 22 -\BOOKMARK [2][-]{subsection.4.2.5}{Cinder}{section.4.2}% 23 -\BOOKMARK [2][-]{subsection.4.2.6}{Swift}{section.4.2}% 24 -\BOOKMARK [1][-]{section.4.3}{Tipos de nodos}{chapter.4}% 25 -\BOOKMARK [1][-]{section.4.4}{Servicios de infraestructura}{chapter.4}% 26 -\BOOKMARK [1][-]{section.4.5}{M\351todos de instalaci\363n}{chapter.4}% 27 -\BOOKMARK [2][-]{subsection.4.5.1}{Ansible}{section.4.5}% 28 -\BOOKMARK [0][-]{chapter.5}{OpenStack-Ansible}{}% 29 -\BOOKMARK [1][-]{section.5.1}{Arquitectura}{chapter.5}% 30 -\BOOKMARK [2][-]{subsection.5.1.1}{Arquitectura de red}{section.5.1}% 31 -\BOOKMARK [1][-]{section.5.2}{Configuraci\363n OSA}{chapter.5}% 32 -\BOOKMARK [2][-]{subsection.5.2.1}{Convenciones}{section.5.2}% 33 -\BOOKMARK [2][-]{subsection.5.2.2}{Inventario}{section.5.2}% 34 -\BOOKMARK [2][-]{subsection.5.2.3}{openstack\137user\137config.yml}{section.5.2}% 35 -\BOOKMARK [2][-]{subsection.5.2.4}{user\137variables.yml}{section.5.2}% 36 -\BOOKMARK [1][-]{section.5.3}{Proceso de instalaci\363n}{chapter.5}% 37 -\BOOKMARK [2][-]{subsection.5.3.1}{setup-hosts.yml}{section.5.3}% 38 -\BOOKMARK [2][-]{subsection.5.3.2}{setup-infrastructure.yml}{section.5.3}% 39 -\BOOKMARK [2][-]{subsection.5.3.3}{setup-openstack.yml}{section.5.3}% 40 -\BOOKMARK [1][-]{section.5.4}{Verificaci\363n}{chapter.5}% 41 -\BOOKMARK [1][-]{section.5.5}{Inconvenientes}{chapter.5}% 42 -\BOOKMARK [0][-]{chapter.6}{Dise\361o}{}% 43 -\BOOKMARK [1][-]{section.6.1}{Dise\361o de arquitectura}{chapter.6}% 44 -\BOOKMARK [2][-]{subsection.6.1.1}{Arquitectura desarrollo}{section.6.1}% 45 -\BOOKMARK [2][-]{subsection.6.1.2}{Arquitectura producci\363n}{section.6.1}% 46 -\BOOKMARK [2][-]{subsection.6.1.3}{Distribuci\363n de los servicios}{section.6.1}% 47 -\BOOKMARK [1][-]{section.6.2}{Ambiente de trabajo}{chapter.6}% 48 -\BOOKMARK [2][-]{subsection.6.2.1}{Hardware utilizado}{section.6.2}% 49 -\BOOKMARK [2][-]{subsection.6.2.2}{Conexi\363n remota hacia el servidor renata}{section.6.2}% 50 -\BOOKMARK [2][-]{subsection.6.2.3}{Especificaciones servidor renata}{section.6.2}% 51 -\BOOKMARK [2][-]{subsection.6.2.4}{Acceso al exterior desde nodos}{section.6.2}% 52 -\BOOKMARK [0][-]{chapter.7}{Gesti\363n del Datacenter}{}% 53 -\BOOKMARK [1][-]{section.7.1}{Recuperaci\363n ante fallas}{chapter.7}% 54 -\BOOKMARK [2][-]{subsection.7.1.1}{Verificar el estado general de OpenStack}{section.7.1}% 55 -\BOOKMARK [2][-]{subsection.7.1.2}{Verificar estado de los componentes de la infraestructura}{section.7.1}% 56 -\BOOKMARK [2][-]{subsection.7.1.3}{Solucionar problemas}{section.7.1}% 57 -\BOOKMARK [2][-]{subsection.7.1.4}{Problemas con Ceph}{section.7.1}% 58 -\BOOKMARK [1][-]{section.7.2}{Escalamiento horizontal}{chapter.7}% 59 -\BOOKMARK [2][-]{subsection.7.2.1}{Agregar nodo de C\363mputo}{section.7.2}% 60 -\BOOKMARK [2][-]{subsection.7.2.2}{Eliminar un nodo de c\363mputo}{section.7.2}% 61 -\BOOKMARK [2][-]{subsection.7.2.3}{Infraestructura}{section.7.2}% 62 -\BOOKMARK [1][-]{section.7.3}{Actualizar versi\363n}{chapter.7}% 63 -\BOOKMARK [0][-]{chapter.8}{An\341lisis del m\363dulo de red}{}% 64 -\BOOKMARK [1][-]{section.8.1}{Escenarios de prueba}{chapter.8}% 65 -\BOOKMARK [2][-]{subsection.8.1.1}{Escenario 1: tr\341fico este-oeste \(misma red tenant\)}{section.8.1}% 66 -\BOOKMARK [2][-]{subsection.8.1.2}{Escenario 2: tr\341fico este-oeste \(distintas redes tenant\)}{section.8.1}% 67 -\BOOKMARK [2][-]{subsection.8.1.3}{Escenario 3: tr\341fico norte-sur \(acceso hacia el exterior\)}{section.8.1}% 68 -\BOOKMARK [2][-]{subsection.8.1.4}{Escenario 4: tr\341fico norte-sur \(acceso desde el exterior\)}{section.8.1}% 69 -\BOOKMARK [1][-]{section.8.2}{Linux bridge}{chapter.8}% 70 -\BOOKMARK [2][-]{subsection.8.2.1}{Escenario 1}{section.8.2}% 71 -\BOOKMARK [2][-]{subsection.8.2.2}{Escenario 2}{section.8.2}% 72 -\BOOKMARK [2][-]{subsection.8.2.3}{Escenario 3}{section.8.2}% 73 -\BOOKMARK [2][-]{subsection.8.2.4}{Escenario 4}{section.8.2}% 74 -\BOOKMARK [1][-]{section.8.3}{Open vSwitch}{chapter.8}% 75 -\BOOKMARK [2][-]{subsection.8.3.1}{Escenario 1}{section.8.3}% 76 -\BOOKMARK [2][-]{subsection.8.3.2}{Escenario 2}{section.8.3}% 77 -\BOOKMARK [2][-]{subsection.8.3.3}{Escenario 3}{section.8.3}% 78 -\BOOKMARK [2][-]{subsection.8.3.4}{Escenario 4}{section.8.3}% 79 -\BOOKMARK [1][-]{section.8.4}{Comparativa de drivers}{chapter.8}% 80 -\BOOKMARK [1][-]{section.8.5}{Funcionalidades avanzadas}{chapter.8}% 81 -\BOOKMARK [2][-]{subsection.8.5.1}{Layer 3 High Availability}{section.8.5}% 82 -\BOOKMARK [0][-]{chapter.9}{Trabajo a futuro}{}% 83 -\BOOKMARK [0][-]{chapter.10}{Conclusiones}{}% 84 -\BOOKMARK [0][-]{chapter*.184}{Referencias bibliogr\341ficas}{}% 85 -\BOOKMARK [0][-]{chapter*.184}{Glosario}{}% 86 -\BOOKMARK [0][-]{section*.185}{Ap\351ndices}{}% 87 -\BOOKMARK [0][-]{appendix.Alph1}{Im\341genes}{}% 88 -\BOOKMARK [0][-]{section*.188}{Anexos}{}% 89 -\BOOKMARK [0][-]{appendix.Anexo.1}{Instalaci\363n versi\363n Queens}{}% 90 -\BOOKMARK [1][-]{section.Anexo.1.1}{Preparaci\363n de nodos}{appendix.Anexo.1}% 91 -\BOOKMARK [1][-]{section.Anexo.1.2}{Configuraci\363n}{appendix.Anexo.1}% 92 -\BOOKMARK [2][-]{subsection.Anexo.1.2.1}{Configuraci\363n claves SSH}{section.Anexo.1.2}% 93 -\BOOKMARK [2][-]{subsection.Anexo.1.2.2}{Archivos de configuraci\363n OSA}{section.Anexo.1.2}% 94 -\BOOKMARK [2][-]{subsection.Anexo.1.2.3}{Generaci\363n de claves}{section.Anexo.1.2}% 95 -\BOOKMARK [2][-]{subsection.Anexo.1.2.4}{Correcciones}{section.Anexo.1.2}% 96 -\BOOKMARK [0][-]{appendix.Anexo.2}{Instalaci\363n versi\363n Stein}{}% 97 -\BOOKMARK [1][-]{section.Anexo.2.1}{Preparaci\363n de nodos}{appendix.Anexo.2}% 98 -\BOOKMARK [1][-]{section.Anexo.2.2}{Configuraci\363n archivos OSA}{appendix.Anexo.2}% 99 -\BOOKMARK [1][-]{section.Anexo.2.3}{Ejecuci\363n de playbooks}{appendix.Anexo.2}% 100 -\BOOKMARK [1][-]{section.Anexo.2.4}{Cambios para driver OVS}{appendix.Anexo.2}% 101 -\BOOKMARK [0][-]{appendix.Anexo.3}{Virtualizaci\363n con KVM}{}% 102 -\BOOKMARK [1][-]{section.Anexo.3.1}{Utilizaci\363n virt-manager}{appendix.Anexo.3}% 103 -\BOOKMARK [2][-]{subsection.Anexo.3.1.1}{Conexi\363n remota}{section.Anexo.3.1}% 104 -\BOOKMARK [2][-]{subsection.Anexo.3.1.2}{Creaci\363n de una red}{section.Anexo.3.1}% 105 -\BOOKMARK [2][-]{subsection.Anexo.3.1.3}{Crear nodo}{section.Anexo.3.1}% 106 -\BOOKMARK [0][-]{appendix.Anexo.4}{Interacci\363n}{}% 107 -\BOOKMARK [1][-]{section.Anexo.4.1}{Configuraciones de administrador}{appendix.Anexo.4}% 108 -\BOOKMARK [1][-]{section.Anexo.4.2}{Interacci\363n de un usuario}{appendix.Anexo.4}% 109 -\BOOKMARK [1][-]{section.Anexo.4.3}{Acceso a una instancia}{appendix.Anexo.4}% 110 -\BOOKMARK [2][-]{subsection.Anexo.4.3.1}{Por SPICE}{section.Anexo.4.3}% 111 -\BOOKMARK [2][-]{subsection.Anexo.4.3.2}{Por SSH}{section.Anexo.4.3}% 112 -\BOOKMARK [2][-]{subsection.Anexo.4.3.3}{Por virsh}{section.Anexo.4.3}% 113 -\BOOKMARK [0][-]{appendix.Anexo.5}{migrate\137instance.sh}{}% 114 +\BOOKMARK [0][-]{chapter.1}{Introducci\363n}{}% 2 +\BOOKMARK [0][-]{chapter.2}{Plan de proyecto}{}% 3 +\BOOKMARK [0][-]{chapter.3}{Fundamentos te\363ricos}{}% 4 +\BOOKMARK [1][-]{section.3.1}{Cloud computing}{chapter.3}% 5 +\BOOKMARK [1][-]{section.3.2}{Virtualizaci\363n}{chapter.3}% 6 +\BOOKMARK [1][-]{section.3.3}{Contenerizaci\363n}{chapter.3}% 7 +\BOOKMARK [1][-]{section.3.4}{Datacenters}{chapter.3}% 8 +\BOOKMARK [1][-]{section.3.5}{Redes}{chapter.3}% 9 +\BOOKMARK [1][-]{section.3.6}{Interfaces y bridges}{chapter.3}% 10 +\BOOKMARK [1][-]{section.3.7}{Backends de almacenamiento}{chapter.3}% 11 +\BOOKMARK [2][-]{subsection.3.7.1}{LVM}{section.3.7}% 12 +\BOOKMARK [2][-]{subsection.3.7.2}{Ceph}{section.3.7}% 13 +\BOOKMARK [0][-]{chapter.4}{OpenStack}{}% 14 +\BOOKMARK [1][-]{section.4.1}{Origen y definici\363n}{chapter.4}% 15 +\BOOKMARK [1][-]{section.4.2}{M\363dulos Core}{chapter.4}% 16 +\BOOKMARK [2][-]{subsection.4.2.1}{Keystone}{section.4.2}% 17 +\BOOKMARK [2][-]{subsection.4.2.2}{Nova}{section.4.2}% 18 +\BOOKMARK [2][-]{subsection.4.2.3}{Neutron}{section.4.2}% 19 +\BOOKMARK [2][-]{subsection.4.2.4}{Glance}{section.4.2}% 20 +\BOOKMARK [2][-]{subsection.4.2.5}{Cinder}{section.4.2}% 21 +\BOOKMARK [2][-]{subsection.4.2.6}{Swift}{section.4.2}% 22 +\BOOKMARK [1][-]{section.4.3}{Tipos de nodos}{chapter.4}% 23 +\BOOKMARK [1][-]{section.4.4}{Servicios de infraestructura}{chapter.4}% 24 +\BOOKMARK [1][-]{section.4.5}{M\351todos de instalaci\363n}{chapter.4}% 25 +\BOOKMARK [2][-]{subsection.4.5.1}{Ansible}{section.4.5}% 26 +\BOOKMARK [0][-]{chapter.5}{OpenStack-Ansible}{}% 27 +\BOOKMARK [1][-]{section.5.1}{Arquitectura}{chapter.5}% 28 +\BOOKMARK [2][-]{subsection.5.1.1}{Arquitectura de red}{section.5.1}% 29 +\BOOKMARK [1][-]{section.5.2}{Configuraci\363n OSA}{chapter.5}% 30 +\BOOKMARK [2][-]{subsection.5.2.1}{Convenciones}{section.5.2}% 31 +\BOOKMARK [2][-]{subsection.5.2.2}{Inventario}{section.5.2}% 32 +\BOOKMARK [2][-]{subsection.5.2.3}{openstack\137user\137config.yml}{section.5.2}% 33 +\BOOKMARK [2][-]{subsection.5.2.4}{user\137variables.yml}{section.5.2}% 34 +\BOOKMARK [1][-]{section.5.3}{Proceso de instalaci\363n}{chapter.5}% 35 +\BOOKMARK [2][-]{subsection.5.3.1}{setup-hosts.yml}{section.5.3}% 36 +\BOOKMARK [2][-]{subsection.5.3.2}{setup-infrastructure.yml}{section.5.3}% 37 +\BOOKMARK [2][-]{subsection.5.3.3}{setup-openstack.yml}{section.5.3}% 38 +\BOOKMARK [1][-]{section.5.4}{Verificaci\363n}{chapter.5}% 39 +\BOOKMARK [1][-]{section.5.5}{Inconvenientes}{chapter.5}% 40 +\BOOKMARK [0][-]{chapter.6}{Dise\361o}{}% 41 +\BOOKMARK [1][-]{section.6.1}{Dise\361o de arquitectura}{chapter.6}% 42 +\BOOKMARK [2][-]{subsection.6.1.1}{Arquitectura desarrollo}{section.6.1}% 43 +\BOOKMARK [2][-]{subsection.6.1.2}{Arquitectura producci\363n}{section.6.1}% 44 +\BOOKMARK [2][-]{subsection.6.1.3}{Distribuci\363n de los servicios}{section.6.1}% 45 +\BOOKMARK [1][-]{section.6.2}{Ambiente de trabajo}{chapter.6}% 46 +\BOOKMARK [2][-]{subsection.6.2.1}{Hardware utilizado}{section.6.2}% 47 +\BOOKMARK [2][-]{subsection.6.2.2}{Conexi\363n remota hacia el servidor renata}{section.6.2}% 48 +\BOOKMARK [2][-]{subsection.6.2.3}{Especificaciones servidor renata}{section.6.2}% 49 +\BOOKMARK [2][-]{subsection.6.2.4}{Acceso al exterior desde nodos}{section.6.2}% 50 +\BOOKMARK [0][-]{chapter.7}{Gesti\363n del Datacenter}{}% 51 +\BOOKMARK [1][-]{section.7.1}{Recuperaci\363n ante fallas}{chapter.7}% 52 +\BOOKMARK [2][-]{subsection.7.1.1}{Verificar el estado general de OpenStack}{section.7.1}% 53 +\BOOKMARK [2][-]{subsection.7.1.2}{Verificar estado de los componentes de la infraestructura}{section.7.1}% 54 +\BOOKMARK [2][-]{subsection.7.1.3}{Solucionar problemas}{section.7.1}% 55 +\BOOKMARK [2][-]{subsection.7.1.4}{Problemas con Ceph}{section.7.1}% 56 +\BOOKMARK [1][-]{section.7.2}{Escalamiento horizontal}{chapter.7}% 57 +\BOOKMARK [2][-]{subsection.7.2.1}{Agregar nodo de C\363mputo}{section.7.2}% 58 +\BOOKMARK [2][-]{subsection.7.2.2}{Eliminar un nodo de c\363mputo}{section.7.2}% 59 +\BOOKMARK [2][-]{subsection.7.2.3}{Infraestructura}{section.7.2}% 60 +\BOOKMARK [1][-]{section.7.3}{Actualizar versi\363n}{chapter.7}% 61 +\BOOKMARK [0][-]{chapter.8}{An\341lisis del m\363dulo de red}{}% 62 +\BOOKMARK [1][-]{section.8.1}{Escenarios de prueba}{chapter.8}% 63 +\BOOKMARK [2][-]{subsection.8.1.1}{Escenario 1: tr\341fico este-oeste \(misma red tenant\)}{section.8.1}% 64 +\BOOKMARK [2][-]{subsection.8.1.2}{Escenario 2: tr\341fico este-oeste \(distintas redes tenant\)}{section.8.1}% 65 +\BOOKMARK [2][-]{subsection.8.1.3}{Escenario 3: tr\341fico norte-sur \(acceso hacia el exterior\)}{section.8.1}% 66 +\BOOKMARK [2][-]{subsection.8.1.4}{Escenario 4: tr\341fico norte-sur \(acceso desde el exterior\)}{section.8.1}% 67 +\BOOKMARK [1][-]{section.8.2}{Linux bridge}{chapter.8}% 68 +\BOOKMARK [2][-]{subsection.8.2.1}{Escenario 1}{section.8.2}% 69 +\BOOKMARK [2][-]{subsection.8.2.2}{Escenario 2}{section.8.2}% 70 +\BOOKMARK [2][-]{subsection.8.2.3}{Escenario 3}{section.8.2}% 71 +\BOOKMARK [2][-]{subsection.8.2.4}{Escenario 4}{section.8.2}% 72 +\BOOKMARK [1][-]{section.8.3}{Open vSwitch}{chapter.8}% 73 +\BOOKMARK [2][-]{subsection.8.3.1}{Escenario 1}{section.8.3}% 74 +\BOOKMARK [2][-]{subsection.8.3.2}{Escenario 2}{section.8.3}% 75 +\BOOKMARK [2][-]{subsection.8.3.3}{Escenario 3}{section.8.3}% 76 +\BOOKMARK [2][-]{subsection.8.3.4}{Escenario 4}{section.8.3}% 77 +\BOOKMARK [1][-]{section.8.4}{Comparativa de drivers}{chapter.8}% 78 +\BOOKMARK [1][-]{section.8.5}{Funcionalidades avanzadas}{chapter.8}% 79 +\BOOKMARK [2][-]{subsection.8.5.1}{Layer 3 High Availability}{section.8.5}% 80 +\BOOKMARK [0][-]{chapter.9}{Trabajo a futuro}{}% 81 +\BOOKMARK [0][-]{chapter.10}{Conclusiones}{}% 82 +\BOOKMARK [0][-]{chapter*.181}{Referencias bibliogr\341ficas}{}% 83 +\BOOKMARK [0][-]{chapter*.181}{Glosario}{}% 84 +\BOOKMARK [0][-]{section*.182}{Ap\351ndices}{}% 85 +\BOOKMARK [0][-]{appendix.Alph1}{Im\341genes}{}% 86 +\BOOKMARK [0][-]{section*.185}{Anexos}{}% 87 +\BOOKMARK [0][-]{appendix.Anexo.1}{Instalaci\363n versi\363n Queens}{}% 88 +\BOOKMARK [1][-]{section.Anexo.1.1}{Preparaci\363n de nodos}{appendix.Anexo.1}% 89 +\BOOKMARK [1][-]{section.Anexo.1.2}{Configuraci\363n}{appendix.Anexo.1}% 90 +\BOOKMARK [2][-]{subsection.Anexo.1.2.1}{Configuraci\363n claves SSH}{section.Anexo.1.2}% 91 +\BOOKMARK [2][-]{subsection.Anexo.1.2.2}{Archivos de configuraci\363n OSA}{section.Anexo.1.2}% 92 +\BOOKMARK [2][-]{subsection.Anexo.1.2.3}{Generaci\363n de claves}{section.Anexo.1.2}% 93 +\BOOKMARK [2][-]{subsection.Anexo.1.2.4}{Correcciones}{section.Anexo.1.2}% 94 +\BOOKMARK [0][-]{appendix.Anexo.2}{Instalaci\363n versi\363n Stein}{}% 95 +\BOOKMARK [1][-]{section.Anexo.2.1}{Preparaci\363n de nodos}{appendix.Anexo.2}% 96 +\BOOKMARK [1][-]{section.Anexo.2.2}{Configuraci\363n archivos OSA}{appendix.Anexo.2}% 97 +\BOOKMARK [1][-]{section.Anexo.2.3}{Ejecuci\363n de playbooks}{appendix.Anexo.2}% 98 +\BOOKMARK [1][-]{section.Anexo.2.4}{Cambios para driver OVS}{appendix.Anexo.2}% 99 +\BOOKMARK [0][-]{appendix.Anexo.3}{Virtualizaci\363n con KVM}{}% 100 +\BOOKMARK [1][-]{section.Anexo.3.1}{Utilizaci\363n virt-manager}{appendix.Anexo.3}% 101 +\BOOKMARK [2][-]{subsection.Anexo.3.1.1}{Conexi\363n remota}{section.Anexo.3.1}% 102 +\BOOKMARK [2][-]{subsection.Anexo.3.1.2}{Creaci\363n de una red}{section.Anexo.3.1}% 103 +\BOOKMARK [2][-]{subsection.Anexo.3.1.3}{Crear nodo}{section.Anexo.3.1}% 104 +\BOOKMARK [0][-]{appendix.Anexo.4}{Interacci\363n}{}% 105 +\BOOKMARK [1][-]{section.Anexo.4.1}{Configuraciones de administrador}{appendix.Anexo.4}% 106 +\BOOKMARK [1][-]{section.Anexo.4.2}{Interacci\363n de un usuario}{appendix.Anexo.4}% 107 +\BOOKMARK [1][-]{section.Anexo.4.3}{Acceso a una instancia}{appendix.Anexo.4}% 108 +\BOOKMARK [2][-]{subsection.Anexo.4.3.1}{Por SPICE}{section.Anexo.4.3}% 109 +\BOOKMARK [2][-]{subsection.Anexo.4.3.2}{Por SSH}{section.Anexo.4.3}% 110 +\BOOKMARK [2][-]{subsection.Anexo.4.3.3}{Por virsh}{section.Anexo.4.3}% 111 +\BOOKMARK [0][-]{appendix.Anexo.5}{migrate\137instance.sh}{}% 112 diff --git a/docs/udelartex/tesis.pdf b/docs/udelartex/tesis.pdf index 57f05d0daa8b8133db24086db17f9fa23aafc258..a5267e67a7c490c029cf9d77020d8adecce51658 100644 Binary files a/docs/udelartex/tesis.pdf and b/docs/udelartex/tesis.pdf differ diff --git a/docs/udelartex/tesis.synctex.gz b/docs/udelartex/tesis.synctex.gz index 928b8d87b16d5075cefe4615701d83b1823c1f97..08a343c6e535c3ea8c1cc67c1f74c276426ed9df 100644 Binary files a/docs/udelartex/tesis.synctex.gz and b/docs/udelartex/tesis.synctex.gz differ diff --git a/docs/udelartex/tesis.tex b/docs/udelartex/tesis.tex index 295131763deb1acfb2dbdc6abe4877ca5ab3676e..0f4cb8215ea130eeb4cc2f7b9f4de27ddb034407 100644 --- a/docs/udelartex/tesis.tex +++ b/docs/udelartex/tesis.tex @@ -102,10 +102,10 @@ nopostdot, %quita el punto final en los acrónimos . \include{resumen/abstract} % \listoffigures % Lista de figuras - \listoftables % Lista de tablas + %\listoftables % Lista de tablas %\listadesimbolos % Lista de sÃmbolos %\listadenotaciones % Lista de notaciones - \listadesiglas % Lista de siglas + %\listadesiglas % Lista de siglas % \tableofcontents % Tabla de contenidos. Compilar dos veces para ver los cambios completos. % diff --git a/docs/udelartex/tesis.toc b/docs/udelartex/tesis.toc index cca51f6278f2ce5f8b5a9c83e383134584bd8389..aaf19a6f9aaa07ec8301007ffde7b9260daf0967 100644 --- a/docs/udelartex/tesis.toc +++ b/docs/udelartex/tesis.toc @@ -2,26 +2,24 @@ \babel@toc {english}{} \babel@toc {spanish}{} \contentsline {chapter}{Lista de figuras}{\es@scroman {vi}}{chapter*.1}% -\contentsline {chapter}{Lista de tablas}{\es@scroman {x}}{chapter*.2}% -\contentsline {chapter}{Lista de siglas}{\es@scroman {xi}}{chapter*.4}% \contentsline {chapter}{\numberline {1}Introducción}{1}{chapter.1}% \contentsline {chapter}{\numberline {2}Plan de proyecto}{2}{chapter.2}% \contentsline {chapter}{\numberline {3}Fundamentos teóricos}{6}{chapter.3}% \contentsline {section}{\numberline {3.1}Cloud computing}{6}{section.3.1}% \contentsline {section}{\numberline {3.2}Virtualización}{8}{section.3.2}% -\contentsline {subparagraph}{KVM}{9}{section*.7}% +\contentsline {subparagraph}{KVM}{9}{section*.4}% \contentsline {section}{\numberline {3.3}Contenerización}{9}{section.3.3}% -\contentsline {subparagraph}{LXC}{10}{section*.9}% +\contentsline {subparagraph}{LXC}{10}{section*.6}% \contentsline {section}{\numberline {3.4}Datacenters}{11}{section.3.4}% \contentsline {section}{\numberline {3.5}Redes}{12}{section.3.5}% -\contentsline {subparagraph}{Flat}{12}{section*.10}% -\contentsline {subparagraph}{VLAN}{12}{section*.11}% -\contentsline {subparagraph}{VXLAN}{12}{section*.12}% -\contentsline {subparagraph}{Network namespaces}{13}{section*.13}% +\contentsline {subparagraph}{Flat}{12}{section*.7}% +\contentsline {subparagraph}{VLAN}{12}{section*.8}% +\contentsline {subparagraph}{VXLAN}{12}{section*.9}% +\contentsline {subparagraph}{Network namespaces}{13}{section*.10}% \contentsline {section}{\numberline {3.6}Interfaces y bridges}{13}{section.3.6}% -\contentsline {subparagraph}{Interfaces tap}{13}{section*.14}% -\contentsline {subparagraph}{Linux bridge}{13}{section*.15}% -\contentsline {subparagraph}{Veth cables}{14}{section*.16}% +\contentsline {subparagraph}{Interfaces tap}{13}{section*.11}% +\contentsline {subparagraph}{Linux bridge}{13}{section*.12}% +\contentsline {subparagraph}{Veth cables}{14}{section*.13}% \contentsline {section}{\numberline {3.7}Backends de almacenamiento}{14}{section.3.7}% \contentsline {subsection}{\numberline {3.7.1}LVM}{14}{subsection.3.7.1}% \contentsline {subsection}{\numberline {3.7.2}Ceph}{14}{subsection.3.7.2}% @@ -30,45 +28,45 @@ \contentsline {section}{\numberline {4.2}Módulos Core}{18}{section.4.2}% \contentsline {subsection}{\numberline {4.2.1}Keystone}{19}{subsection.4.2.1}% \contentsline {subsection}{\numberline {4.2.2}Nova}{21}{subsection.4.2.2}% -\contentsline {subparagraph}{API}{22}{section*.23}% -\contentsline {subparagraph}{Scheduler}{22}{section*.24}% -\contentsline {subparagraph}{Compute}{22}{section*.25}% -\contentsline {subparagraph}{Conductor}{22}{section*.26}% -\contentsline {subparagraph}{Placement}{23}{section*.27}% +\contentsline {subparagraph}{API}{22}{section*.20}% +\contentsline {subparagraph}{Scheduler}{22}{section*.21}% +\contentsline {subparagraph}{Compute}{22}{section*.22}% +\contentsline {subparagraph}{Conductor}{22}{section*.23}% +\contentsline {subparagraph}{Placement}{23}{section*.24}% \contentsline {subsection}{\numberline {4.2.3}Neutron}{23}{subsection.4.2.3}% -\contentsline {subparagraph}{Neutron-server}{23}{section*.29}% -\contentsline {subparagraph}{Plugins y agentes}{24}{section*.30}% -\contentsline {subparagraph}{Cola de mensajes}{24}{section*.31}% +\contentsline {subparagraph}{Neutron-server}{23}{section*.26}% +\contentsline {subparagraph}{Plugins y agentes}{24}{section*.27}% +\contentsline {subparagraph}{Cola de mensajes}{24}{section*.28}% \contentsline {subsubsection}{\numberline {4.2.3.1}Tipos de redes en OpenStack}{24}{subsubsection.4.2.3.1}% \contentsline {subsubsection}{\numberline {4.2.3.2}Tipo de tráfico}{25}{subsubsection.4.2.3.2}% \contentsline {subsection}{\numberline {4.2.4}Glance}{25}{subsection.4.2.4}% -\contentsline {subparagraph}{Creación de una VM}{26}{section*.33}% +\contentsline {subparagraph}{Creación de una VM}{26}{section*.30}% \contentsline {subsection}{\numberline {4.2.5}Cinder}{28}{subsection.4.2.5}% \contentsline {subsection}{\numberline {4.2.6}Swift}{30}{subsection.4.2.6}% -\contentsline {subparagraph}{Principales componentes}{30}{section*.37}% +\contentsline {subparagraph}{Principales componentes}{30}{section*.34}% \contentsline {section}{\numberline {4.3}Tipos de nodos}{32}{section.4.3}% -\contentsline {subparagraph}{Nodo de control}{32}{section*.38}% -\contentsline {subparagraph}{Nodo de red}{32}{section*.39}% -\contentsline {subparagraph}{Nodo de cómputo}{33}{section*.41}% -\contentsline {subparagraph}{Nodo de almacenamiento}{33}{section*.42}% -\contentsline {subparagraph}{Nodo de balanceamiento de carga}{33}{section*.43}% +\contentsline {subparagraph}{Nodo de control}{32}{section*.35}% +\contentsline {subparagraph}{Nodo de red}{32}{section*.36}% +\contentsline {subparagraph}{Nodo de cómputo}{33}{section*.38}% +\contentsline {subparagraph}{Nodo de almacenamiento}{33}{section*.39}% +\contentsline {subparagraph}{Nodo de balanceamiento de carga}{33}{section*.40}% \contentsline {section}{\numberline {4.4}Servicios de infraestructura}{34}{section.4.4}% -\contentsline {subparagraph}{Galera - MariaDB}{34}{section*.44}% -\contentsline {subparagraph}{Message queue}{34}{section*.45}% -\contentsline {subparagraph}{Memcached}{34}{section*.46}% +\contentsline {subparagraph}{Galera - MariaDB}{34}{section*.41}% +\contentsline {subparagraph}{Message queue}{34}{section*.42}% +\contentsline {subparagraph}{Memcached}{34}{section*.43}% \contentsline {section}{\numberline {4.5}Métodos de instalación}{34}{section.4.5}% \contentsline {subsection}{\numberline {4.5.1}Ansible}{35}{subsection.4.5.1}% -\contentsline {subparagraph}{Nodo de control}{36}{section*.47}% -\contentsline {subparagraph}{Inventario}{36}{section*.48}% -\contentsline {subparagraph}{Módulos}{36}{section*.49}% -\contentsline {subparagraph}{Tarea}{36}{section*.50}% -\contentsline {subparagraph}{Playbook}{36}{section*.51}% +\contentsline {subparagraph}{Nodo de control}{36}{section*.44}% +\contentsline {subparagraph}{Inventario}{36}{section*.45}% +\contentsline {subparagraph}{Módulos}{36}{section*.46}% +\contentsline {subparagraph}{Tarea}{36}{section*.47}% +\contentsline {subparagraph}{Playbook}{36}{section*.48}% \contentsline {chapter}{\numberline {5}OpenStack-Ansible}{38}{chapter.5}% \contentsline {section}{\numberline {5.1}Arquitectura}{38}{section.5.1}% \contentsline {subsection}{\numberline {5.1.1}Arquitectura de red}{39}{subsection.5.1.1}% -\contentsline {subparagraph}{Management Network}{39}{section*.54}% -\contentsline {subparagraph}{Overlay Network}{39}{section*.55}% -\contentsline {subparagraph}{Storage Network}{40}{section*.56}% +\contentsline {subparagraph}{Management Network}{39}{section*.51}% +\contentsline {subparagraph}{Overlay Network}{39}{section*.52}% +\contentsline {subparagraph}{Storage Network}{40}{section*.53}% \contentsline {subsubsection}{\numberline {5.1.1.1}Interfaces de red}{40}{subsubsection.5.1.1.1}% \contentsline {section}{\numberline {5.2}Configuración OSA}{41}{section.5.2}% \contentsline {subsection}{\numberline {5.2.1}Convenciones}{43}{subsection.5.2.1}% @@ -116,91 +114,91 @@ \contentsline {subsection}{\numberline {8.2.1}Escenario 1}{83}{subsection.8.2.1}% \contentsline {subsubsection}{\numberline {8.2.1.1}Análisis de componentes}{84}{subsubsection.8.2.1.1}% \contentsline {subsubsection}{\numberline {8.2.1.2}Análisis de tráfico}{87}{subsubsection.8.2.1.2}% -\contentsline {subparagraph}{Paso 1}{87}{section*.95}% -\contentsline {subparagraph}{Paso 2}{87}{section*.96}% -\contentsline {subparagraph}{Paso 3}{91}{section*.101}% -\contentsline {subparagraph}{Paso 4}{92}{section*.104}% +\contentsline {subparagraph}{Paso 1}{87}{section*.92}% +\contentsline {subparagraph}{Paso 2}{87}{section*.93}% +\contentsline {subparagraph}{Paso 3}{91}{section*.98}% +\contentsline {subparagraph}{Paso 4}{92}{section*.101}% \contentsline {subsection}{\numberline {8.2.2}Escenario 2}{93}{subsection.8.2.2}% \contentsline {subsubsection}{\numberline {8.2.2.1}Análisis de componentes}{93}{subsubsection.8.2.2.1}% \contentsline {subsubsection}{\numberline {8.2.2.2}Análisis de tráfico}{99}{subsubsection.8.2.2.2}% -\contentsline {subparagraph}{Paso 1}{99}{section*.106}% -\contentsline {subparagraph}{Paso 2}{99}{section*.107}% -\contentsline {subparagraph}{Paso 3}{99}{section*.108}% -\contentsline {subparagraph}{Paso 4}{100}{section*.110}% -\contentsline {subparagraph}{Paso 5}{100}{section*.111}% -\contentsline {subparagraph}{Paso 6}{100}{section*.112}% -\contentsline {subparagraph}{Paso 7}{100}{section*.114}% +\contentsline {subparagraph}{Paso 1}{99}{section*.103}% +\contentsline {subparagraph}{Paso 2}{99}{section*.104}% +\contentsline {subparagraph}{Paso 3}{99}{section*.105}% +\contentsline {subparagraph}{Paso 4}{100}{section*.107}% +\contentsline {subparagraph}{Paso 5}{100}{section*.108}% +\contentsline {subparagraph}{Paso 6}{100}{section*.109}% +\contentsline {subparagraph}{Paso 7}{100}{section*.111}% \contentsline {subsection}{\numberline {8.2.3}Escenario 3}{101}{subsection.8.2.3}% \contentsline {subsubsection}{\numberline {8.2.3.1}Análisis de componentes}{102}{subsubsection.8.2.3.1}% \contentsline {subsubsection}{\numberline {8.2.3.2}Análisis de tráfico}{105}{subsubsection.8.2.3.2}% -\contentsline {subparagraph}{Paso 1}{105}{section*.116}% -\contentsline {subparagraph}{Paso 2}{105}{section*.117}% -\contentsline {subparagraph}{Paso 3}{105}{section*.118}% -\contentsline {subparagraph}{Paso 4}{106}{section*.120}% -\contentsline {subparagraph}{Paso 5}{106}{section*.121}% -\contentsline {subparagraph}{Paso 6}{107}{section*.123}% -\contentsline {subparagraph}{Paso 7}{108}{section*.125}% +\contentsline {subparagraph}{Paso 1}{105}{section*.113}% +\contentsline {subparagraph}{Paso 2}{105}{section*.114}% +\contentsline {subparagraph}{Paso 3}{105}{section*.115}% +\contentsline {subparagraph}{Paso 4}{106}{section*.117}% +\contentsline {subparagraph}{Paso 5}{106}{section*.118}% +\contentsline {subparagraph}{Paso 6}{107}{section*.120}% +\contentsline {subparagraph}{Paso 7}{108}{section*.122}% \contentsline {subsection}{\numberline {8.2.4}Escenario 4}{109}{subsection.8.2.4}% \contentsline {subsubsection}{\numberline {8.2.4.1}Análisis de componentes}{109}{subsubsection.8.2.4.1}% \contentsline {subsubsection}{\numberline {8.2.4.2}Análisis de tráfico}{111}{subsubsection.8.2.4.2}% -\contentsline {subparagraph}{Paso 1}{111}{section*.127}% -\contentsline {subparagraph}{Paso 2}{111}{section*.128}% -\contentsline {subparagraph}{Paso 3}{111}{section*.129}% -\contentsline {subparagraph}{Paso 4}{112}{section*.132}% -\contentsline {subparagraph}{Paso 5}{112}{section*.133}% -\contentsline {subparagraph}{Paso 6}{113}{section*.135}% +\contentsline {subparagraph}{Paso 1}{111}{section*.124}% +\contentsline {subparagraph}{Paso 2}{111}{section*.125}% +\contentsline {subparagraph}{Paso 3}{111}{section*.126}% +\contentsline {subparagraph}{Paso 4}{112}{section*.129}% +\contentsline {subparagraph}{Paso 5}{112}{section*.130}% +\contentsline {subparagraph}{Paso 6}{113}{section*.132}% \contentsline {section}{\numberline {8.3}Open vSwitch}{113}{section.8.3}% \contentsline {subsubsection}{\numberline {8.3.0.1}Archivos de configuración}{115}{subsubsection.8.3.0.1}% \contentsline {subsection}{\numberline {8.3.1}Escenario 1}{118}{subsection.8.3.1}% \contentsline {subsubsection}{\numberline {8.3.1.1}Análisis de componentes}{118}{subsubsection.8.3.1.1}% \contentsline {subsubsection}{\numberline {8.3.1.2}Análisis de tráfico}{124}{subsubsection.8.3.1.2}% -\contentsline {subparagraph}{Paso 1}{124}{section*.138}% -\contentsline {subparagraph}{Paso 2}{125}{section*.139}% -\contentsline {subparagraph}{Paso 3}{132}{section*.144}% -\contentsline {subparagraph}{Paso 4}{134}{section*.147}% +\contentsline {subparagraph}{Paso 1}{124}{section*.135}% +\contentsline {subparagraph}{Paso 2}{125}{section*.136}% +\contentsline {subparagraph}{Paso 3}{132}{section*.141}% +\contentsline {subparagraph}{Paso 4}{134}{section*.144}% \contentsline {subsection}{\numberline {8.3.2}Escenario 2}{135}{subsection.8.3.2}% \contentsline {subsubsection}{\numberline {8.3.2.1}Análisis de componentes}{135}{subsubsection.8.3.2.1}% \contentsline {subsubsection}{\numberline {8.3.2.2}Análisis de tráfico}{139}{subsubsection.8.3.2.2}% -\contentsline {subparagraph}{Paso 1}{140}{section*.149}% -\contentsline {subparagraph}{Paso 2}{140}{section*.150}% -\contentsline {subparagraph}{Paso 3}{140}{section*.151}% -\contentsline {subparagraph}{Paso 4}{140}{section*.153}% -\contentsline {subparagraph}{Paso 5}{141}{section*.154}% -\contentsline {subparagraph}{Paso 6}{141}{section*.155}% -\contentsline {subparagraph}{Paso 7}{141}{section*.157}% +\contentsline {subparagraph}{Paso 1}{140}{section*.146}% +\contentsline {subparagraph}{Paso 2}{140}{section*.147}% +\contentsline {subparagraph}{Paso 3}{140}{section*.148}% +\contentsline {subparagraph}{Paso 4}{140}{section*.150}% +\contentsline {subparagraph}{Paso 5}{141}{section*.151}% +\contentsline {subparagraph}{Paso 6}{141}{section*.152}% +\contentsline {subparagraph}{Paso 7}{141}{section*.154}% \contentsline {subsection}{\numberline {8.3.3}Escenario 3}{142}{subsection.8.3.3}% \contentsline {subsubsection}{\numberline {8.3.3.1}Análisis de componentes}{142}{subsubsection.8.3.3.1}% \contentsline {subsubsection}{\numberline {8.3.3.2}Análisis de tráfico}{145}{subsubsection.8.3.3.2}% -\contentsline {subparagraph}{Paso 1}{145}{section*.159}% -\contentsline {subparagraph}{Paso 2}{145}{section*.160}% -\contentsline {subparagraph}{Paso 3}{146}{section*.161}% -\contentsline {subparagraph}{Paso 4}{146}{section*.163}% -\contentsline {subparagraph}{Paso 5}{146}{section*.164}% -\contentsline {subparagraph}{Paso 6}{148}{section*.166}% -\contentsline {subparagraph}{Paso 7}{148}{section*.168}% +\contentsline {subparagraph}{Paso 1}{145}{section*.156}% +\contentsline {subparagraph}{Paso 2}{145}{section*.157}% +\contentsline {subparagraph}{Paso 3}{146}{section*.158}% +\contentsline {subparagraph}{Paso 4}{146}{section*.160}% +\contentsline {subparagraph}{Paso 5}{146}{section*.161}% +\contentsline {subparagraph}{Paso 6}{148}{section*.163}% +\contentsline {subparagraph}{Paso 7}{148}{section*.165}% \contentsline {subsection}{\numberline {8.3.4}Escenario 4}{149}{subsection.8.3.4}% \contentsline {subsubsection}{\numberline {8.3.4.1}Análisis de componentes}{149}{subsubsection.8.3.4.1}% \contentsline {subsubsection}{\numberline {8.3.4.2}Análisis de tráfico}{150}{subsubsection.8.3.4.2}% -\contentsline {subparagraph}{Paso 1}{151}{section*.170}% -\contentsline {subparagraph}{Paso 2}{151}{section*.171}% -\contentsline {subparagraph}{Paso 3}{151}{section*.172}% -\contentsline {subparagraph}{Paso 4}{153}{section*.175}% -\contentsline {subparagraph}{Paso 5}{153}{section*.176}% -\contentsline {subparagraph}{Paso 6}{153}{section*.178}% +\contentsline {subparagraph}{Paso 1}{151}{section*.167}% +\contentsline {subparagraph}{Paso 2}{151}{section*.168}% +\contentsline {subparagraph}{Paso 3}{151}{section*.169}% +\contentsline {subparagraph}{Paso 4}{153}{section*.172}% +\contentsline {subparagraph}{Paso 5}{153}{section*.173}% +\contentsline {subparagraph}{Paso 6}{153}{section*.175}% \contentsline {section}{\numberline {8.4}Comparativa de drivers}{153}{section.8.4}% \contentsline {section}{\numberline {8.5}Funcionalidades avanzadas}{153}{section.8.5}% \contentsline {subsection}{\numberline {8.5.1}Layer 3 High Availability}{153}{subsection.8.5.1}% \contentsline {chapter}{\numberline {9}Trabajo a futuro}{155}{chapter.9}% \contentsline {chapter}{\numberline {10}Conclusiones}{157}{chapter.10}% -\contentsline {chapter}{Referencias bibliográficas}{158}{chapter*.184}% -\contentsline {chapter}{Glosario}{164}{chapter*.184}% -\contentsline {chapter}{\textbf {Apéndices}}{165}{section*.185}% +\contentsline {chapter}{Referencias bibliográficas}{158}{chapter*.181}% +\contentsline {chapter}{Glosario}{164}{chapter*.181}% +\contentsline {chapter}{\textbf {Apéndices}}{165}{section*.182}% \ttl@change@i {\@ne }{chapter}{13pt}{}{ Apéndice\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax \ttl@change@v {chapter}{}{}{}\relax \contentsline {chapter}{\numberline {1}Imágenes}{166}{appendix.Alph1}% \ttl@change@i {\@ne }{chapter}{0pt}{\vspace *{0.45cm}}{\thecontentslabel \quad }{}{\bfseries \hfill \contentspage }\relax \ttl@change@v {chapter}{}{}{}\relax -\contentsline {chapter}{\textbf {Anexos}}{169}{section*.188}% +\contentsline {chapter}{\textbf {Anexos}}{169}{section*.185}% \ttl@change@i {\@ne }{chapter}{13pt}{}{ Anexo\ \thecontentslabel \quad }{}{\titlerule *[1pc]{.}\contentspage }\relax \ttl@change@v {chapter}{}{}{}\relax \contentsline {chapter}{\numberline {1}Instalación versión Queens}{170}{appendix.Anexo.1}%