IBM U.S. Sales Manual
Revised:  April 28, 2005.

Table of contents  Document options  IBM U.S. Product Life Cycle Dates Description Program Number Technical Description Abstract Planning Information Product Positioning Publications Highlights Security, Auditability, and Control  
doprint  
 
IBM U.S. Product Life Cycle Dates
Program NumberVRMAnnounced AvailableMarketing Withdrawn Service DiscontinuedReplaced By
5765-G035.03.02004/07/132004/08/20 - - -
5765-E723.02.02004/07/132004/08/20 - - -


 
Program Number

 
Abstract

AIX 5L is emerging as a preferred platform for UNIX users and independent software vendors (ISVs). AIX 5L delivers industrial-strength UNIX reliability, availability, and security while offering flexible system administration and ease of integration with Linux. With innovative support for virtualization and micro-partitioning, AIX 5L allows you to accept no compromises or limits in the on demand world.

AIX 5L V5.3 exploits a 64-bit system and software architecture. This release supports new IBM eServer p5 hardware systems, advanced POWER virtualization and symmetric multi-threaded POWER5 processors for improved system performance and utilization. AIX 5L V5.3 offers scalability for up to 32-way systems.

New system management tools, security enhancements, and support for NFS V4 and POSIX Real-time are key highlights of this AIX 5L release. Additional features for enterprise distributed storage, networking, and advanced accounting build on AIX's strong record of innovation.

AIX 5L V5.3 supports the Advanced POWER Virtualization hardware feature which includes:

AIX 5L V5.3 is also available for IBM eServer i5 systems and supports micro-partitioning, virtual Ethernet, and virtual storage on the IBM eServer i5.
Back to topBack to top
 

Product Positioning

AIX 5L is the IBM strategic UNIX(R) operating system for mission- critical, core business applications.

Industrial-strength features and functions of AIX have been proven in a wide variety of computing environments:

  • Relatively small, single-processor systems

  • Massively parallel IBM RS/6000 (TM) Scalable POWER Parallel (SP) servers

  • Full range of new POWER5 microprocessor-based IBM eServer p5 and eServer i5 systems

AIX 5L features include:

  • State-of-the-art 32-bit and 64-bit kernels
  • Support for 32-bit and 64-bit APIs
  • Dynamic logical partitioning and micro-partitioning
  • Automated CPU and memory reconfiguration
  • Real-time partition configuration and load statistics
  • Support for dedicated and shared processor LPAR groups
  • Support for manual provisioning of resources
  • Integrated security for intrusion detection and user authentication
  • Dynamic configuration and device attachments
  • Robust journaled file system and Logical Volume Manager (LVM) software
  • Tools for managing your systems environment -- System Management Interface Tool (SMIT) and Web-based System Manager graphical user interface.

AIX 5L represents the most advanced version of AIX. Fortified with open technologies from some of the world's top providers, AIX 5L builds on a solid heritage of supplying integrated, enterprise-class support for RS/6000 and IBM eServer pSeries systems.

With AIX 5L, IBM offers a UNIX operating system with increased levels of integration, flexibility, and performance for meeting the high demands of today's mission-critical e-business applications.

AIX 5L is an advanced operating system with a strong affinity with Linux (TM) and built-in capabilities designed to accommodate future IBM POWER-based servers. AIX 5L is the IBM strategic UNIX(R) operating system for mission-critical, core business applications.
Back to topBack to top
 
Highlights

AIX 5L V5.3 offers:

  • Improved POWER5 system performance
  • Improved system resilience
  • Dynamic logical partitioning and micro-partitioning support
  • Networking enhancements
  • Network File System (NFS) V4 protocol
  • Simplified system update process
  • Advanced accounting
  • Affinity with Linux
  • POSIX real-time API support

Back to topBack to top
 
Description

Resource management

AIX 5L V5.3 supports micro-partitioning which enables flexible and efficient use of system hardware resources by allowing physical processors to be shared by up to 10 separate LPARs. pSeries micro- partitioning support is provided for POWER5 processor-based systems by means of the Advanced POWER Virtualization feature.

Among the key customer environments where micro-partitioning is beneficial are ones in which multiple system images are needed due to isolation requirements (security, software fault), each with generally low processor requirements, but capable of requiring more. Historically, each of these system images ran on separate hardware systems, each able to handle spikes in processor requirements, but generally each hardware system was under utilized. Micro-partitioning enables these system images to be consolidated onto a single set of physical processors, which allows more efficient use of hardware resources. The Advanced POWER Virtualization hardware feature is required to run virtualization on eServer p5 servers.

Advanced accounting provides a framework in which charge back and capacity planning activities can be performed. Advanced accounting produces resource usage-based information for processes, file systems, transactions, and hardware resources like processors, memory, disks, and network adapters. Applications and middleware may be instrumented to provide transaction data by means of APIs which are provided for this purpose.

NFS

NFS V4 adds support for core features of the NFS V4 protocol described in IETF RFC 3530. This initial support places an emphasis on security with support of the optional NFS V4 ACL model when using the AIX Enhanced Journaled Filesystem. Support for managing accesses from foreign NFS V4 domains is also included. The NFS V4 provided RPCSEC-GSS RPC authentication flavor supporting the Kerberos V5 security mechanism (may also be used with the NFS V3 protocol).

Reliability, availability, and serviceability

The dump command has been enhanced to support the following:

  • ISVs with custom scripts to collect their custom problem data as part of the snap process.

  • Splitting large outputs into smaller files for ease of transport

  • Extended system failure status information captured as part of the dump success, or failures

    Dump compression is turned on by default.

System trace facility has been enhanced to support process and thread- based tracing. You can restrict the tracing to a process and capture the events in relation to the process for better debugging. Also the trace mechanism supports setting of larger trace buffers for regular users.

Support for better core file management has been implemented. A command provides for management of location of core files.

Refer to the command documentation for more detail on the trace, trcctl, chcore, sysdumpdev commands.

Enterprise storage management

Enterprise storage management tools include:

  • JFS2 to handle extended ACL attributes and finer grain permissions in order to support NFS V4.

  • Support will be provided to limit filesystem space to a specified quota for users and/or groups.

  • AIX support will enhance concurrent mode that allows only a single host to open logical volumes with write access, thus creating an owning host. Support is added to change the owning host so that on failover reserves are not broken on all disks in the volume groups. HACMP would use these to start a volume group and fail it over to another node.

  • AIX support to include the limit on the number of disks in a volume group from 128 to 1024.

LVM enhancements are designed to:

  • Provide ability to shrink a JFS2 filesystem in place
  • Improve LVM HotSpot Management
  • Increase I/O throughput via LVM Large Block I/Os
  • Implement scalable volume group types

Systems management

Service Update Management Assistant (SUMA) will provide flexible options that will automate the download of AIX APARs, PTFs, Security Fixes, Latest Fixes, and Maintenance Levels from the IBM eServer Support Fix Central Web site, and move administrators away from the task of manually retrieving maintenance updates from the Web.

When performing remote execution on clients, NIM makes use of the remote shell server (rshd). The server provides remote execution facilities with authentication based on privileged port numbers from trusted hosts. AIX 5L V5.3 has a new service, NIM Service Handler (nimsh), which will eliminate the need for rsh services during NIM client communication.

Cluster Systems Management (CSM) V1.4 is designed for simple, low-cost management of distributed and clustered IBM eServer, pSeries, and xSeries servers. For organizations with both Linux and AIX applications, a single AIX 5L V5.2 or V5.3 management console can provide management services to AIX 5L and Linux clients in distributed and clustered configurations.

System security

System administrator can setup AIX for supporting long user names (longer than the traditional user name size of 8 characters) for up to 255 characters. The default limit will continue to be eight characters. Refer to chdev command security guide for additional information. Various functions of the operating system have been enhanced to recognize the support for greater than 8 character user name size.

Support for Access Control Lists (ACLs) for file system objects have been enhanced. The operating system now provides infrastructure for support of multiple ACL types based on the underlying physical file system. The JFS2 file system continues to support the existing AIX ACL (now called AIXC type for AIX classical ACL) and also a new ACL type, NFS V4. The NFS V4 ACL type provides access control as per the ACL model described in the NFS V4 protocol. Various ACL management tools and file management tools have been enhanced to support multiple types of ACLs on AIX. Refer to Security Guide documentation for additional details.

LDAP based user management infrastructure on AIX has been enhanced to support the following:

  • LDAP server based authentication is supported. This allows system administrator to manage the passwords on the LDAP server using one of many encryption algorithms.

  • Kerberos bind is enabled for LDAP client to server authentication.

  • Increased control over generation of the directory information tree (DIT) when configuring the server with the mksecldap command.

The csum command has been added to help calculate cryptographic hash values for files.

Default maximum number of user logins supported on the system has been increased to 32,767.

NIS infrastructure has been enhanced to support netgroups with LDAP.

The AIX 5L V5.3 NIS client supports the use of shadow passwords in a passwd.adjunct file. The primary benefits are increased security for NIS environments and increased interoperability with Solaris NIS infrastructure.

Development and performance tools

AIX 5L V5.3 improves dbx application debugging capabilities including additional facilities for examining process information, file descriptors, kernel threads, and core files, as well as new functionality for suspending breakpoints and managing loaded modules.

AIX 5L V5.3 introduces a new memory allocation algorithm, MALLOCTYPE=watson. The Watson malloc() setting can provide improvement over the default malloc in areas of memory fragmentation and performance in massively multi-threaded applications, particularly with respect to small requests. New features have been added to the malloc debugging facility to aid in the diagnosis of memory allocation problems, and malloc debugging capabilities have been integrated into the dbx symbolic debugger.

Added support for using copy-on-write semantics for fork(). This implementation helps reduce overall virtual memory consumption on a system and improve fork() as well as exec() performance for some workloads.

New performance tools are added to AIX 5L V5.3. Enhancements to performance tools and libraries supporting new POWER5 and PowerPC processors have been included as well as micro-partitioning and Simultaneous Multi-threading (SMT).

The following programs are the fully supported versions:

  • VisualAge C++ Professional for AIX, V6.0
  • C for AIX, V6.0
  • XL Fortran for AIX, V8.1.1

The IBM 32-bit SDK for AIX, Java 2 Technology Edition, V1.4 ships with AIX 5L V5.3. The IBM 64-bit SDK for AIX, Java 2 Technology Edition, V1.4 is available on the AIX 5L V5.3 Expansion Pack and the AIX Java Web site:

http://www.ibm.com/developerworks/java/jdk/aix

Click on the download and service information link. For more information, consult the User's Guide which is available from the AIX Java Web site.

Performance Toolbox V3.1

Performance Toolbox (PTX) V3.1 adds support for new pSeries Partition Load Manager and Advanced POWER Virtualization technology.

On system running Partition Load Manager, PTX can monitor special load/utilization averages, active processor counts and memory allocations that control the operation of the Load Manager. This allows customers to visualize the system performance as Partition Load Manager dynamically controls and adjusts resources to the system workload. For Advanced POWER Virtualization, the PTX instrumentation can now collect over 30 new performance metrics related to SMT and micro-partitioned environments. These metrics include processor allocations (logical, physical, virtual counts, and capacities), memory allocations and capacities, and defined partition entitlements. The PTX jtopas and 3dmon applications have been updated to provide views of the new Advanced POWER Virtualization metrics.

The 3dmon application will automatically identify the set of partitions residing on the same pSeries hardware platform. Multiple partitions can be viewed simultaneously in relationship to one another, for an overall view of system utilization. Changes in partition allocations are dynamically discovered and displayed for monitoring, recording, and playback.

The Performance Aide V3.1 fully supports the collection and recording of the new Partition Load Manager and Virtualization metrics identified above.

Network technology and communications

  • The AIX multi-path routing capability has been extended to add new schemes, besides round-robin, for route selection which would allow for more fine-grained control of the route selection policy.

  • The AIX Path MTU discovery mechanism discovers PMTU using TCP packets and UDP datagrams rather than using extra ICMP packets.

  • Support has been added for the Advanced Sockets API for IP V6.

  • Support has been added for the Streams Control Transmission Protocol (SCTP) in AIX.

  • AIX now supports Dynamic Host Configuration Protocol (DHCP) for IPV6 as described by RFC 3315.

  • Dynamic membership in EtherChannel support allows users to add or remove an adapter from a running EtherChannel without having to first detach its interface. This is useful when hot-swapping adapters that belong to an EtherChannel.

  • AIX supports TCP/IP over Fibre Channel interface (IP over FC). This is the AIX implementation of IETF's RFC 2625, which specifies encapsulation of IP and Address Resolution Protocol (ARP) over Fibre Channel (FC).

Network interoperability

AIX Fast Connect V3.2.0 offers the following enhancements:

  • Implementation of directory change notification
  • Support of direct hosting of Server Message Block (SMB) over TCP/IP
  • Implementation of level II oplocks
  • Support of large files
  • Support of 32-bit Microsoft Windows NT status codes
  • Implementation of SMB signing
  • Support of long user names
  • Support of complete Microsoft Windows NT ACLs and ACL inheritance
  • Dynamic user creation on AIX

Base operating system

System libraries and headers incorporate APIs from the ISO/IEC 9899:1999 C language standard and the single UNIX specification Version 3.

A device mount facility, explicitly enabled, provides a mechanism to mount CD and DVD filesystems. The facility is included in the bos.cdmount fileset.

The Perl V5.8.2 language is installed with AIX.

System V proc commands display information in the /proc filesystem in the System V format.

AIX 5L V5.3 provides new functionality in base commands including tree-based process listing, time stamped shell histories, cron logging controls, recursive file searching, restricted Korn shells, tar recursion control, new date formats, and vi backtagging, as well as other new capabilities for the make, find, fuser, restore, man, tar, at, nohup, and cron commands. The awk, ed, grep, head, and vi commands can now process lines of at least 8192 characters.

IBM eServer BladeCenter JS20

The recently announced POWER processor-based IBM eServer BladeCenter JS20 will support AIX 5L V5.2. This enables customers to consolidate and integrate AIX-based applications such as database, IT infrastructure, e-mail, and Web serving onto the BladeCenter platform. With its low price point the IBM eServer BladeCenter JS20 is IBM's entry level POWER processor-based product into the AIX market.

Models 8842-21x are supported on the IBM eServer BladeCenter JS20. eServer BladeCenter JS20 is in AIX 5L processor group classification E5. The quantity of AIX 5L V5.2 licenses ordered for use on either single or multiple BladeCenter JS20s must be equal to the number of processors on which the AIX 5L V5.2 is intended to be used at a single end user customer (single IBM customer number) location. Additionally, ordering of AIX 5L V5.2 (processor group E5) licenses for BladeCenter JS20 require order placement for either a one-year or three-year SWMA for AIX 5L Operating Systems contract at the same time of order placement for AIX 5L V5.2 licenses. Neither AIX 5L V5.2 licenses nor SWMA for AIX Operating Systems contracts (processor group per processor usage) are included in the IBM eServer BladeCenter JS20 offering price.

Accessibility by people with disabilities

Using AIX Documentation

The AIX product documentation library is available online at:

http://publib16.boulder.ibm.com/pseries/index.htm

The information center is accessible through assistive technologies, such as screen-reader software and digital speech synthesizers, to hear what is displayed on the screen. In addition, features of the information center can be accessed through the keyboard. The AIX man pages are available from the command line and are accessible through the same assistive technologies used to access commands and output.

Using the Command Line

AIX makes all of its functions available for use through the command line so that they can be supported by assistive technologies that support the Emacs environment. The command interface is also accessible remotely using assistive technologies, such as JAWS, which support Telnet or terminal emulator environments in the Windows operating system.

Using Web-based System Manager and SMIT

Web-based System Manager supports keyboard accessibility for almost all operations available from the graphical user interface. Limited support for changing font sizes and background colors is also available. Screen reader support in the Web-based System Manager Remote Client is significantly improved in this release. Refer to the README file for more information. The Configuration Assistant (invoked via the configassist command) has also been modified to provide improved accessibility support in this release.

System Management Interface Tool (SMIT) menus are accessible through the same assistive technologies that provide command line accessibility. The character-based version of SMIT (which is activated with the smitty command on a graphical terminal) should be used instead of the Motif, or GUI, version activated with the smit command.

Using X Keyboard Extensions to Increase Accessibility in the X Windows System Environment

If you are using Telnet or a terminal emulator program to access AIX, keyboard-accessibility features are provided by either the application or your operating environment. For example, in the Windows operating system you can open the Control Panel and select Accessibility Options to enable and adjust keyboard accessibility settings. Keyboard-accessibility options are also available on an AIX graphical console running the X Window System software or the Common Desktop Environment (CDE). Refer to the Accessibility link on the pSeries Information Center, or your AIX or CDE documentation, for more information on configuring and using accessibility features of the X Window and CDE environments.

AIX Installation

Installation menus and other screens displayed during base AIX installation are not accessible. Use Network Installation Manager (NIM) as an alternative means of installing AIX. IBM assumes that Section 508 applies only to normal and routine end-user operations, and not to setup and service functions.

XPROFILER

The performance tool, xprofiler, is a Motif program that does not meet all accessibility requirements. Use the text-based tool, gprof, to provide the same information in tabular form.

Section 508 of the U.S. Rehabilitation act

IBM AIX 5L for POWER V5.3 is capable as of August 20, 2004, when used in accordance with IBM's associated documentation, of satisfying the applicable requirements of Section 508 of the Rehabilitation Act, provided that any assistive technology used with the product properly interoperates with it.
Back to topBack to top
 
Technical Description
TOC Link Operating Environment TOC Link Hardware Requirements TOC Link Software Requirements

Resource management

Advanced accounting supports tagging of the accounting data with system administrator-defined strings, so that the billable entity can be directly associated with accounting data. This is accommodated through system administrator-defined policies, which are downloaded into the kernel. The policy mechanism supports the manual assignment of project codes so non-privileged users with multiple clients can easily switch back and forth between a controlled set of projects. APIs are also provided, so application-defined projects can be established. This is required for on demand and cluster computing environments where the set of users is very fluid.

Advanced accounting also supports interval accounting, which may be used to profile the use of system resources and capture accounting data for long running jobs. Interval accounting is an important tool for capacity planning, performance analysis, and billing.

Advanced POWER Virtualization supports virtual Ethernet as an in- memory, point-to-point connection to help avoid a failed or misbehaving operating system from being able to impact the communication between two well-behaved operating systems. Each pair of partitions wishing to communicate through this channel will need to create an additional in- memory channel. This will require the ability for a user to request the creation of an in-memory channel between partitions on the hardware system console. The kernel would create a virtual device for each memory channel indicated by the firmware. A normal AIX configuration routine would create the device special files. This function is supported only on future systems with POWER Hypervisor function.

Virtual Storage, supported via the Advanced POWER Virtualization hardware feature, facilitates the sharing of physical resources (I/O slots, adapters and devices) between logical partitions (LPARs). Virtual SCSI (VSCSI) enables partitions running on AIX 5L V5.3 to access SCSI disk devices without requiring physical resources be allocated to the partition.

Advanced POWER Virtualization partitions maintain a client/server relationship in the VSCSI environment. Partitions that contain virtual SCSI devices are referred to as client partitions while the partitions that own the physical resources (adapters, devices) are the server partitions. AIX 5L V5.3 supports booting from virtual SCSI disks.

A fairly common business model is to allocate a partition to a single account and to charge only for the resources that are actually used. Interval accounting supports this model by collecting system level resource utilization information for processors, memory, network adapters, and disks. The accounting subsystem is highly tuned to efficiently deal with large amounts of data. For example, the subsystem internally buffers accounting data and uses asynchronous I/O to write to the accounting file, which is pre-allocated to ensure that disk blocks are contiguously allocated. The system administrator can also configure advanced accounting in different ways to minimize the overhead of running advanced accounting. The administrator can select the type of accounting data to be collected and can specify that it should be automatically aggregated to minimize the volume of data that is produced.

Modern wide issue superscalar processors have the ability to execute numerous instructions in a single cycle. However, the execution of single real life code sequences rarely comes close to using the full bandwidth of these processors.

Scalability

AIX 5L V5.3 supports Simultaneous Multi-threading (SMT) which is a processor technology that allows the simultaneous execution of multiple thread contexts within a single processor core.

SMT offers a way to leverage the parallelization of multi-threaded software to achieve a higher use of the processor by dispatching instructions from more than one instruction stream simultaneously.

To the operating system, each hardware thread is treated as an independent logical processor. The result is a natural mapping of the existing SMP capabilities of the operating system to the multi-threaded execution capabilities of the processor. There are two hardware threads per processor. System administrators may enabled or disable SMT at the partition level and it may be used with either dedicated or shared partitions.

  • Dynamic Reconfiguration (DR) support for large pages allows customers to change the size of large page memory without rebooting.

  • The virtual memory pager is enhanced to release paging space blocks earlier, so that paging space may be more efficiently used when a large number of pages have to be paged out at the same time like in a memory removal operation.

  • The memory algorithm is enhanced to page out large blocks of memory. This provides more flexibility for scientific and technical computing and enhances high availability.

Standards

AIX 5L V5.3 is designed to conform to the following:

  • Single UNIX Specification V3 (SUS V3)

  • ISO/IEC 9899:1999 international standard for the C programming language, commonly referred to as C99.

  • SUS V3 Realtime Option Group, which consists of the following options from within IEEE Standard 1003.1-2001:
    • POSIX_ASYNCHRONOUS_IO
    • POSIX_FSYNC
    • POSIX_MAPPED_FILES
    • POSIX_MEMLOCK
    • POSIX_MEMLOCK_RANGE
    • POSIX_MEMORY_PROTECTION
    • POSIX_MESSAGE_PASSING
    • POSIX_PRIORITY_SCHEDULING
    • POSIX_REALTIME_SIGNALS
    • POSIX_SEMAPHORES
    • POSIX_SHARED_MEMORY_OBJECTS
    • POSIX_SYNCHRONIZED_IO
    • POSIX_TIMERS

  • SUS V3 Realtime Threads Option Group, which consists of the following options from within IEEE Standard 1003.1-2001:
    • POSIX_THREAD_PRIO_INHERIT
    • POSIX_THREAD_PRIO_PROTECT
    • POSIX_THREAD_PRIORITY_SCHEDULING

  • SUS V3 Advanced Realtime options from within IEEE Standard 1003.1-2001:
    • POSIX_ADVISORY_INFO
    • POSIX_BARRIERS
    • POSIX_CLOCK_SELECTION
    • POSIX_CPUTIME
    • POSIX_MONOTONIC_CLOCK
    • POSIX_SPIN_LOCKS
    • POSIX_THREAD_CPUTIME
    • POSIX_TIMEOUTS

AIX Expansion Pack and Web Download Pack

The AIX Expansion Pack and the AIX Web Download Pack complements the AIX Operating System with the benefit of additional packaged software at no additional cost. For detailed information, visit:

http://www-1.ibm.com/servers/aix/expansionpack/

The service and support terms and conditions of the products shipped on the Expansion Pack may be different than the terms and conditions for AIX 5L V5.3.

Enterprise storage management

Extension to the chfs command will allow a JFS2 filesystem to be shrunk in place, without taking it offline and without requiring a reboot. This will eliminate unused filesystem space. This also includes the Logical Volume Manager (LVM) necessary to shrink a logical volume in place. This implementation replaces the need to copy the data, take the old version offline (which may require a reboot), and delete the old version.

System management

A new RPM Package Manager (RPM) will allow customers to perform network installations of AIX and a limited set of maintenance operations from a Linux server.

New support provides basic language enablement and localization for the following languages:

  • TA_IN - Tamil
  • TE_IN - Telugu
  • GU_IN - Gujarati
  • MR_IN - Marathi
  • KK_KZ - Kazakh

The Unicode 4.0 standard contains many new character definitions to support the various language scripts of the world. This provides support for all defined Unicode 4.0 characters to the AIX UTF-8 locale set.

New system enablements and functions for existing applications use Web-based System Manager in addition to availability through SMIT, or standalone applications. Enhancements or new functions include:

  • Functionality for Web-based System Manager
    • Resource sets
    • Jobs scheduling

  • A VTERM emulator to execute the topas command in pc-client mode for the wsmperf/monitoring Web-based System Manager application

  • Functionality in System Environment Culture object to "Select a set of primary language environment elements"

  • Automatic refresh of "All Processes" plugin

  • Functionality to Web-based System Manager application System Environments:
    • System hang detection options
    • Remote reboot facility

  • Ability for SysVprint to create a local device when selecting "New Printer" and no device exists

  • Accessibility enhancements:
    • General Web-based System Manager changes to facilitate accessibility enablement
    • Improved color/contrast on overview panels
    • ConfigAssist ported to AUIML to facilitate accessibility enablement.

Base Operating System Install now offers a choice to have the hard disk being installed to, erased of all data, with selectable erasure patterns. This choice is available for New and Complete Overwrite installs from CD and available for Network (NIM) installs using new variables in the bosinst_data NIM resource. Other disks can be erased by entering the maintenance mode in the BOS Install menus.

Support for multiple NIM masters. Customers will be able to define an alternate NIM master, synchronize the NIM database between masters, and failover between masters. This provides a basic way for customers to create a more reliable NIM environment.

The NIM client daemon will have its service ports registered as well- known ports (3901 and 3902) and will install as part of the bos.sysmgt.nim.client fileset. The daemon will serve two purposes:

  • Receive/process NIM master service requests

  • Receive/process NIM master registration requests by passing machine information necessary for defining a client in a NIM environment

While nimsh eliminates the need for rsh and interactive shell environment access, it does not provide a trusted authentication approach based on key encryption. If users wish to have cryptographic authentication during nimsh usage, OpenSSL may be configured within the NIM environment. When OpenSSL is installed on NIM clients, SSL socket connections are established during nimsh service authentication. Options are provided for SSL key generation and includes all cipher suites supported in SSL V3.

In addition to cryptography options, nimsh allows customers the flexibility of 'querying' network machines by hostname. The NIM Service Handler processes query requests and returns NIM client configuration parameters used for defining hosts within a NIM environment. Using nimsh, customers may define NIM clients without knowing any system or network specific information.

Web-based system manager support for LVMs are enhanced to:

  • Reduce the number of icons used in volume group
  • Clearly show the type of volume group in the properties
  • Suppress inappropriate columns in the volume group sub-plugin
  • Hide FS specific properties in the logical volume plugin

CSM is also a key element of the IBM eServer Cluster 1600 and Cluster 1350, platforms that are ideal for workload consolidation or for achieving high degrees of scalability and performance for applications that take advantage of clustered systems architectures. Primary examples are computational modeling in high-performance computing or multi- terabyte data warehouses in large corporations.

CSM is enabled on AIX 5L V5.3 on a trial basis. For production use of CSM, obtain a valid license and key by ordering CSM for AIX 5L (5765-F67).

Documentation technology

Starting with AIX 5L V5.3, IBM eServer pSeries and AIX documentation will be available in one of two information centers:

  • IBM eServer pSeries and AIX Information Center on the Web
  • AIX Information Center on the documentation CD

The pSeries and AIX Information Center is more than a portal to documentation. From this Web site,

http://publib16.boulder.ibm.com/pseries/index.htm

you can access the following tools and resources:

  • A message database that shows what error messages mean and, in many cases, how you can recover. This database also provides information for LED codes and error identifiers.

  • How-to tips with step-by-step instructions for completing system administrator and user tasks.

  • FAQs for quick answers to common questions.

  • The entire AIX software documentation library for V5.1, V5.2, and V5.3. Each publication is available in PDF format and abstracts are provided for books for V5.2 and V5.3.

  • Centralized information, previously located throughout the library, allows easier access to information about some new AIX functions:

    • A new selection in the navigation bar centralizes all partitioning information, including planning, installation, and implementation information for partitioned-system operations.

    • Understanding the Advanced Accounting subsystem provides system administrators with conceptual and procedural information about how to set up, administer, and manage Advanced Accounting. Information about projects, policies, transactional accounting, interval accounting, and data aggregation is included in this topic. This publication is also available on the documentation CD that is shipped with the operating system.

    • A new "Partition Load Manager for AIX Guide and Reference" provides experienced system administrators with information about how to perform such tasks as installing, configuring, and managing Partition Load Manager for AIX. This guide also provides the administrator with reference information about commands and files that are used to run and manage Partition Load Manager for AIX.

    • Links to the entire pSeries hardware documentation library.

    • A resources page that links users to other IBM and non-IBM Web sites proven useful to system administrators, application developers, and users.

    • Links to related documentation from IBM, including white papers, IBM Redbooks, and technical reports on topics such as RS/6000, SP, and HACMP for AIX. Release Notes and readme files are also available through the information center.

    • Several new videos are available for customer-installable features and customer-replaceable parts.

A new application, the AIX Information Center, will be available for installation beginning with AIX 5L V5.3. The information center will provide navigation and search capabilities for all installed AIX 5L V5.3 publications and will be included on the AIX Documentation CD. It can be installed and used on a local system or installed on a documentation server for intranet use. The information center is powered by Eclipse technology.

To order publications included in the AIX documentation library for AIX 5L V5.3, go to the IBM Publications Center at:

http://www.elink.ibmlink.ibm.com/public/ applications/publications/cgibin/pb

The IBM Publications Center offers customized search functions to help you find the publications that you need. A growing number of publications is available for you to view or download free of charge. In a number of countries or regions, you can also order publications listed on the site.

System security

Pluggable Authentication Module (PAM) infrastructure has been enhanced to include additional authentication modules. Use of PAM as an authentication mechanism is now a system wide decision rather than per user. Many native operating system applications have been PAM enabled to recognize this configuration choice.

Even though it is possible to increase or decrease the size of the user name, it is advised that the user name size should never be decreased. However if there is a need to decrease the user name, current user names on the system be studied carefully to make sure that the none of the user have names greater the size being planned to be set. If this is not done, system behavior in regards to login and other functions in regards to these users will be unpredictable.

IBM Tivoli Security Clients/Agents for IBM eServer pSeries AIX 5L

Tivoli security-ready clients and agents will be pre-installed on pSeries POWER5 servers running AIX 5L V5.2 beginning in August 2004. Pre-installed Tivoli security-ready clients and agents for pSeries POWER4+ and POWER4 servers running AIX 5L V5.2 will also be available beginning in August 2004. IBM intends to pre-install security-ready clients and agents on pSeries POWER servers that support AIX 5L V5.3 in the future.

The Tivoli security clients and agents software when coupled with optional corresponding and extra cost server-based IBM Tivoli security management solution offerings can provide pSeries customers with security capabilities to help address a fundamental and heightened customer need for more secure on demand systems.

Tivoli security (identity) management solutions provide two critical layers of additional defense beyond the traditional perimeter defense provided by firewalls, anti-virus software and intrusion detection software a security control layer and a security policy compliance layer.

The Tivoli control layer determines which server users can access and what users may view and do. The Tivoli security compliance layer helps to ensure that customers are, and remain in, compliance with security policies while helping assess security risk and initiating responses to security events.

The Tivoli security-ready client and agent software available for pSeries POWER5, POWER4+, and POWER4 server with AIX 5L V5.2 is:

  • Client for IBM Tivoli Access Manager for Operating System AIX
  • Agent for IBM Tivoli Identity Manager
  • Agent for IBM Tivoli Risk Manager
  • Client for IBM Tivoli Security Compliance Manager

To use each Tivoli security-ready client or agent, acquisition of the following corresponding server-based Tivoli security management product offering is required.

  • IBM Tivoli Access Manager for Operating System AIX
  • IBM Tivoli Identity Manager
  • IBM Tivoli Risk Manager
  • IBM Tivoli Security Compliance Manager

When pre-installed, the security-ready clients/agents help simplify the implementation and enablement of Tivoli security management solutions. These Tivoli security management solutions enable a consistent enforcement of security management policies across pSeries and AIX 5L as well as across heterogeneous server environments running UNIX, Linux, and Microsoft Windows operating systems.

Optional IBM Tivoli Security Management Offerings for pSeries AIX 5L

Tivoli security-ready clients and agents for pSeries AIX 5L servers provide the means for Tivoli security management software running on a pSeries AIX 5L server to provide and manage two different layers of security (a control layer and/or a security policy compliance layer) for each connected and enabled server "client". One Tivoli security management server can manage up to thousands of pSeries AIX 5L server "clients". Security management capabilities include:

  • Secure and manage the pSeries AIX 5L server: IBM Tivoli Access Manager for Operating System AIX is optional extra cost server- based enablement software that provides multiple pSeries AIX 5L server clients with IBM main-frame class security. Access Manager can lock down and harden the AIX 5L operating system at the root level thereby helping to secure applications and protect data, meet customer security audit requirements and reduce security administration costs.

  • Setup and manage the users: IBM Tivoli Identity Manager is optional extra cost server-based enablement software that automates the creation and management of multiple user accounts. Identity Manager helps to significantly shorten the time for provisioning users from weeks to minutes and automatically discovers invalid user accounts.

  • Manage security operations: IBM Tivoli Risk Manager is optional extra cost server-based enablement software that centrally monitors, reports and manages security events. Risk Manager helps to radically improve the administration of the whole security management environment.

  • Audit security policies for compliance: IBM Tivoli Security Compliance Manager is optional extra cost server-based enablement software that checks the server system, middleware and applications for vulnerability and adherence to customer security policies. Security Compliance Manager determines violations against security policies that are provided by IBM or modified or written by the customer.

Complementary (Security) Offering -- IBM Tivoli Directory Server

Store Users and Their Identities: IBM Tivoli Directory Server is server-based enablement software. Directory Server is foundation service software for building security-rich and standards compliant identity infrastructure solutions. It provides a robust and light weight directory access protocol (LDAP) and offers a choice of providing simple user ID and password authentication or robust digital certificate-based authentication. Directory Server is provided as a part of the AIX 5L V5.2 Expansion Pack.

Customer Value

Tivoli security management solutions for pSeries AIX 5L can significantly help meet the heightened and growing customer need for a more secure on demand IT and server operating environment.

Tivoli security-ready client and agent software provides customer value when pre-installed. Pre-installation with AIX 5L will help save installation planning and implementation time when the clients/agents are security enabled by Tivoli security management (server) offerings.

Significant additional customer value is provided when the Tivoli security-ready clients/agents are connected to and enabled by Tivoli security management (server) software:

  • Helps protect and optimize IT resources by controlling "who has access to what"

  • Helps reduce the cost of security administration and support

  • Helps manage complexity with a single user sign-on and unified user experience

  • Helps validate compliance against security policies and audits requirements

IBM Value

SOSWOS (Sell Our Stuff With Our Stuff)... Tivoli security-ready clients/agents and Tivoli security management solution offerings help to further differentiate the value of pSeries and AIX 5L when compared to UNIX-based competitors such as HP and Sun Microsystems. HP and Sun do not have the security management solution portfolio capabilities of IBM. When marketed and sold together as an integrated security management solution, pSeries, AIX 5L and Tivoli is a winning combination.

Development and performance tools

The following performance tools and libraries have been enhanced:

  • PMAPI library now supports threaded applications running in M to N mode, and the new POWER5 and PowerPC970 processors.

  • The perfstat library, and the vmstat, iostat, sar, topas, curt, and splat tools have been enhanced to support micro-partitioning and SMT. Filemon, netpmon, and pprof have been enhanced to support micro- partitioning. Support for SMT will be added to those three tools in a future release.

  • Iostat, vmstat, and sar now detect and tolerate dynamic configuration changes

  • Using the -d option of the sar command, average queue size, and service and wait time can now be monitored for selected disk types.

  • The gprof tool now supports multi-process and multi-threaded applications

  • Trace now support single process and thread tracing.

The following new tools are available:

  • Lparstat which displays partition configuration information and allows monitoring of a set of partition level performance metrics.

  • Mpstat which can be used to monitor a large set of detailed performance metrics at the logical processor level

Network technology and communications

Additional route selection policies will include Random, Weighted Random, Lowest Utilization, Weighted Round-Robin, and Hash based on destination IP address.

The discovered PMTU information is stored in a dedicated table and has a method to manage the table. Separating the PMTU and the routing table makes multi-path routing work better with PMTU discovery.

Wake on LAN technology is used to remotely wake up a machine by sending the machine a specific packet of information, called a Magic Packet. AIX provides a command (wol) to construct and send a Magic Packet frame to wake up a remote machine.

Upgrades to the AIX tcpdump and the libpcap library improve the network traffic debugging capabilities of AIX.

Support has been added for the Service Location Protocol client side API on AIX. Service Location Protocol is described by RFC 2608 and the client side API is described by RFC 2614.

New functions include socket options, ancillary data, library functions, macros to manipulate ancillary data, structure, and constant definitions based on the RFC standard 3542.

Support has been added for the Streams Control Transmission Protocol (SCTP) in AIX. SCTP is a reliable transport layer protocol which runs over IP and is described in RFC 2960. A socket API for applications to communicate using SCTP is also provided.

Support is provided for both the DHCP server (dhcpsdv6) and client (dhcpcdv6) and retains much of the flexibility and ease of configuration that users are accustomed to in the AIX DHCP for IP V4. The DHCP relay agent (dhcprd) has been enhanced to support both IP V4 and IP V6 environments.

AIX TCP/IP remote commands continue to support Kerberos V5 for authentication. Support for Kerberos V4 used by PSSP software on SP systems will be withdrawn.

Fibre Channel is a high-speed, networking technology primarily used for Storage Area Networking (SAN). Currently with AIX, Fibre Channel is only used for communication between storage devices and servers using the SCSI protocol (FCP). This AIX feature adds the support to enable IP packets to be sent over a physical Fibre Channel connection as well. When a Fibre Channel adapter's IP protocol driver is configured and the IP over FC properties are assigned, the Fibre Channel adapter may also be used as a LAN device. Its network activity will function just as if an Ethernet or Token-Ring adapter were being used. In a SAN environment, this will allow servers and storage systems to communicate and perform networking type of management services without additional LAN equipment and infrastructure.

IP over FC is only supported on the IBM 2 Gigabit Fibre Channel Adapter for 64-bit PCI Bus (#6228) and the IBM 2 Gigabit Fibre Channel PCI-X Adapter (#6239) with the configuration of an IP enabled Fibre Channel switch. The Fibre Channel switches that have been verified to work with this feature are: both 1 GB and 2 GB Fibre Channel switches manufactured by Brocade and Cisco.

AIX EtherChannel feature allows Ethernet bandwidth aggregation from several Ethernet adapters. EtherChannel feature is currently available. Dynamic Membership feature allows systems administrators to add or remove adapters from a running EtherChannel and change EtherChannel attributes except Ethernet frame size without having to first detach its interface. This enables the dynamic reallocation or deallocation of adapters, particularly useful when hot-swapping adapters that belong to an EtherChannel.

The maximum number of Fibre Channel logical units supported per target was increased from 1023 to 4095 in AIX 5L V5.2. In FC, each end point is referred to as an N_Port. If that N_Port supports SCSI protocol, then it is also referred to as a target. Each target is composed of one or more logical units.

The iSCSI protocol driver is included as part of AIX Base Operating System. It allows the access of storage devices over gigabit Ethernet TCP/IP networks. The iSCSI driver has been verified to work with the Cisco MDS 9000 IPS module as the iSCSI target, using IBM TotalStorage ESS F20 and IBM TotalStorage ESS 800 storage devices.

The current iSCSI driver is based on IETF RFC 3720 iSCSI standard, with certain limits and functional limitations as described in AIX 5L V5.2 and AIX 5L V5.3 release notes.

The configuration of EtherChannel and Virtual IP Address (VIPA) network interfaces will be added to the NIM secondary adapter support.

Network interoperability

AIX Fast Connect offers file and print services for Windows clients on AIX 5L. It includes the following enhancements:

  • Implementation of directory change notification support to improve the performance of the server. Some applications like biztalk can be installed on Fast Connect shares with this feature.

  • Support of direct hosting of SMB over TCP/IP (aka NetBIOS-less connection support). It simplifies the transport of SMB traffic, removes WINS and NetBIOS broadcast as a means of name resolution and standardizes name resolution on DNS for file and printer sharing.

  • Implementation of level II Oplocks helps improve the performance of the server by allowing multiple clients to access files in Read/Deny-Write lock-mode.

  • Support of large files, large sends and large receives are added. Now Fast Connect can handle the file sizes and file offsets supported by AIX.

  • Support of 32-bit NT status codes is added, which improves the communication between server and client and supports newly defined return codes.

  • Implementation of SMB signing in Fast Connect supports mutual authentication of client and server, reduces the "man-in-the-middle" attacks.

  • Fast Connect supports long user names, a new feature of AIX 5.3, which can eliminate the Windows to AIX users name mapping.

  • Support of NT ACLs is implemented. Windows clients can add users or groups to grant NT ACL permissions to files/folders of Fast Connect server. The key/basic NT ACLs are supported prior to AIX 5L V5.3 levels, and complete NT ACLs and ACL inheritance are supported on AIX 5L V5.3.

  • Fast Connect users can be dynamically created in passthrough authentication configuration by reducing the administrative overhead.

  • Windows 2003 clients are supported, in addition to existing support for Windows 98, Windows NT, Windows 2000, and Windows XP.

New system support

  • IBM eServer p5 Model 520 (9111-520) - AIX 5L processor group E5
  • IBM eServer p5 Model 550 (9113-550) - AIX 5L processor group E5
  • IBM eServer p5 Model 570 (9117-570) - AIX 5L processor group F5
  • IBM eServer i5 Model 520 (9406-520) - AIX 5L processor group E5
  • IBM eServer i5 Model 570 (9406-570) - AIX 5L processor group F5

Existing systems supported

AIX 5L V5.3 also runs on existing IBM hardware system models that support AIX 5L V5.2 software.

New I/O support

AIX 5L V5.3 includes support for:

  • 10 Gigabit Ethernet-SR PCI-X adapter. This adapter is designed to provide LAN connections for pSeries systems. The adapter has a 128 K x 8-bit boot FLASH ROM to support NIM functions.

  • 1.44 MB external USB 1.1 diskette drive with an integrated USB attachment cable.

  • DVD media as a dump device. System administrators can configure a DVD RAM as the dump device and the dump will be written out to the DVD media directly.

  • AIX device driver for ATAPI (IDE) optical for write capability. This is important for support of IDE attached DVD-RAM.

AIX 5L V5.3 support removal

The AIX 5L operating system previously contained both a uni-processor kernel and a multi-processor kernel. Effective with this AIX 5L V5.3 release, the operating system will only support the multi-processor kernel. The AIX 5L V5.3 multi-processor kernel will support the following systems: RS/6000, IBM eServer pSeries, or OEM hardware based on the Common Hardware Reference Platform (CHRP) architecture, regardless of the number of processors.

AIX 5L V5.2 will be the last release of AIX that will support the uni- processor kernel.

Removal of obsolete locales

The following is a list of obsolete locales:

Locale       Language       Territory
------       --------       ---------
Ca_ES        Catalan        Spain
Da_DK        Danish         Denmark
De_CH        German         Switzerland
De_DE        German         Germany
En_GB        English        Great Britain
En_US        English        United States
Es_ES        Spanish        Spain
Fi_FI        Finnish        Finland
Fr_BE        French         Belgium
Fr_CA        French         Canada
Fr_CH        French         Switzerland
Fr_FR        French         France
Is_IS        Icelandic      Iceland
It_IT        Italian        Italy
Nl_BE        Dutch          Belgium
Nl_NL        Dutch          Netherlands
No_NO        Norwegian      Norway
Pt_PT        Portuguese     Portugal
Sv_SE        Swedish        Sweden
 

Operating Environment

Hardware Requirements

AIX 5L V5.3 supports the following systems that implement the CHRP architecture:

  • PowerPC systems
  • POWER3 systems
  • POWER4 systems
  • POWER5 systems

Software Requirements

Systems operating on AIX 5L for POWER V5.3 are supported only when used within the system operating environments described in the appropriate hardware announcements and when used within the specified operating environment. When systems operating on AIX 5L V5.3 are used with other software or software in later announcements, other limitations may be included.

AIX 5L V5.3 supports systems and/or partitions with at least 128 MB of physical memory and a disk size of at least 2.2 GB.

IBM Tivoli Directory Server V5.2 software requirements:

To install the IBM Tivoli Directory Server, your computer must meet the following minimum system requirements.

  • IBM Tivoli Directory client

    For the latest information on supported versions of AIX, refer to the client README file in /usr/ldap/doc/(lang)/client.txt.

    A minimum of 128 MB RAM is required; (256 MB is strongly recommended).

    Note: The client is 32-bit.

  • IBM Tivoli Directory Server (including the client)

    For the latest information on supported versions of AIX, refer to the server README file in /usr/ldap/doc/(lang)/server.txt.

    In addition to the client requirements, the server requires the following:

    • A minimum of 512 MB of RAM is required (1 GB or more is strongly recommended).

    • DB2(TM) Universal Database for AIX Version 8.1 Enterprise Server Edition with Fixpack 2 is included with the IBM Tivoli Directory Server. No previous versions of DB2 are supported. If You already have DB2 installed, You need approximately 45 MB of disk space to create the empty database and start the server. DB2 requires about 300-500 MB of disk space. IBM Tivoli Directory Server (including the client and the server) requires about 160 MB of disk space. Disk space required for data storage is dependent upon the number and size of database entries.

    • A 64-bit kernel on 64-bit hardware

The following programs are the fully supported versions:

  • VisualAge C++ Professional for AIX, V6.0

    Install V6.0 by using your existing V6.0 CD, then apply APARs IY57427, IY57430, IY57431, IY57433, and IY57434.

  • C for AIX, V6.0

    Install V6.0 by using your existing V6.0 CD, then apply APARs IY57427, IY57430, IY57431, and IY57434.

  • XL Fortran for AIX, V8.1.1

    • Install V8.1.1 by using your existing V8.1.1 CD, then apply APARs IY57427, IY57430, IY57435, IY57436, and IY57434.

    • XL Fortran Run-Time Environment for AIX, V8.1.1 is a fully supported version of this product. Install V8.1.1 by using your existing V8.1.1 CD, then apply APAR IY57436.

Back to topBack to top
 
Planning Information

Customer Responsibilities

Not applicable.

Compatibility

Applications from earlier AIX Version 5 Releases

AIX 5L V5.1 and V5.2 applications written for RS/6000 POWER3-, POWER4-, POWER5-, and PowerPC-based models can be executed on AIX 5L V5.3 without recompilation for the same and newer models in that processor family (POWER3, POWER4, POWER5, or PowerPC). Exceptions are applications compiled using POWER3-, POWER4-, POWER5-or PowerPC-specific compiler options but executed on models other than POWER3, POWER4, POWER5, or PowerPC, respectively, or applications using:

  • Non-shared compiles of AIX-shared libraries

  • Features explicitly described as nonportable by IBM in the AIX V4 or V5 reference manuals

  • Undocumented AIX internal features

  • X11R5 Server Extensions

  • Locales based on IBM-850 codesets

  • Legacy security library interfaces executing on AIX Version 5 systems with long usernames enabled

Any program that must run in all environments -- POWER3, POWER4, POWER5, and PowerPC (601 and newer PowerPC processors) -- must be compiled using the common mode or PowerPC option of the compiler. Programs compiled to exploit:

  • POWER5 technology must be run on POWER5 processor types

  • POWER4 technology must be run on POWER4 or POWER5 processor types

  • POWER3 technology may be run on POWER3, POWER4, or POWER5 processor types, though there may be some performance penalty when running on POWER4 or POWER5

  • PowerPC-based technology must be run on PowerPC-based processors

Existing binaries need not be recompiled to operate on the target processors.

Applications running on AIX Version 5 Releases with long usernames enabled

AIX 5L V5.3 systems can be configured to accommodate user and group names exceeding eight characters. Applications which have not been specifically structured to handle long user and group names and which use legacy security library interfaces with 8-character name limits or which depend on user and group names not exceeding 8 characters in length may not work correctly on systems which have been enabled for long user and group names. AIX 5.3 commands which display user and group names will truncate user and group names to 8 characters to accommodate existing use unless command-specific options are utilized to display long user and group names.

Legacy Security Library Interface   Long Username-Enabled Alternative
ckuserID()                          authenticatex()
cuserid()                           getpwuid()
getuinfo()                          getuinfox()
getuinfo_r()                        getuinfox()
getuserpw()                         getuserpwx()
newpass()                           newpassx()
putuserpw()                         putuserpwx()
putuserpwhist()                     putuserpwxhist()

AIX 5L V5.3 systems running applications using security library interfaces should not be configured for long usernames unless the applications have been tested successfully for long username support.

32-bit Applications from AIX Version 4 Releases

AIX V4.1, 4.2, or 4.3 applications written for RS/6000 POWER3-, POWER4-, and PowerPC-based models can be executed on AIX 5L V5 without recompilation for same and newer models in that processor family (POWER3, POWER4, POWER5, or PowerPC). Exceptions are applications compiled using POWER3-, POWER4-, or PowerPC-specific compiler options executed on models other than POWER3, POWER4, POWER5, or PowerPC, respectively, or applications using:

  • Non-shared compiles of AIX shared libraries

  • Features explicitly described as nonportable by IBM in the AIX V4 or V5 reference manuals

  • Undocumented AIX internal features

  • X11R5 Server Extensions

  • Locales based on IBM-850 codesets

  • Legacy security interfaces executing on AIX Version 5 systems with long usernames enabled

Programs compiled to exploit:

  • POWER5 technology must be run on POWER5 processor types

  • POWER4 technology must be run on POWER4 or POWER5 processor types

  • POWER3 technology may be run on POWER3, POWER4, or POWER5 processor types, though there may be some performance penalty when running on POWER4 or POWER5

  • PowerPC-based technology must be run on PowerPC-based processors
Existing binaries need not be recompiled to operate on the target processors.

64-bit Applications from AIX Version 4 Releases

Any 64-bit applications produced using AIX V4 will not execute on AIX 5L V5. These applications need to be recompiled from the source on AIX 5L V5 to execute on this version of AIX. The 64-bit applications produced using AIX 5L V5 on any of the 32-bit or 64-bit processor models will execute without recompilation on the 64-bit processor models. The 32-bit applications produced using AIX 5L V5 on either 32-bit or 64-bit processor models will execute without recompilation on both models.

X11R5/X11R6 Compatibility Issues on AIX Version 5

The AIX V5 X-server uses the X-Consortium release 6 of X (commonly known as X11R6). The libraries shipped by IBM with X11R6 are backward compatible and the client applications that access these libraries work as on AIX V4. As on AIX V4, IBM will also ship X11R3, X11R4, X11R5 compatibility installation options for maximum flexibility.

The majority of applications using X fall into this category and will not cause any difficulty. However, a small number of X-applications use the loadable extension facility provided by the X-server.

The X-server allows for the addition of new functionality through its extension mechanism. For each extension, part of the extension is loaded into the X-server before it can be executed. X11R6 has modified how this mechanism works in the course of improvements to X, and it is this part of the extension that must be made compatible with X11R6 to execute properly. All extensions supplied by IBM have been made compatible. In some circumstances, you may have an extension that does not work with X11R6, for example:

  • Sample extension downloaded from the X-Consortium FTP site
  • Customer-developed extension
  • Third-party extension

In these cases, the extension needs to be made compatible with X11R6 before it executes properly. Customer-developed extensions and sample X consortium extensions need to be recompiled with the X11R6 environment. For third-party extensions, contact the vendor for a X11R6-compatible update.

If you use non-IBM display adapters, you may also be using vendor supplied software specific to those devices that uses X11R6 server capabilities. If so, this software must be compatible with X11R6 to operate properly. Contact the vendor of the display adapter for this software.

Between AIX Versions 3 and 5

All AIX applications using AIX V3R3.2 or later, for POWER-, POWER2-, and PowerPC-based models that are written in accordance with the guidelines in this announcement and other AIX announcements run on AIX 5L V5 without recompilation for those same models. The exceptions to this statement are applications compiled using POWER2-or PowerPC-specific compiler options but run on models other than POWER2 or PowerPC, or applications using the following:

  • Their own loadable kernel extensions

  • Certain high-function terminal control interfaces

  • X11R3 input device interfaces

  • The CIO LAN device driver interface

  • SCSI device configuration methods (IHVs)

  • The nlist() interface

  • DCE threads

  • Legacy security interfaces executing on AIX 5L systems with long usernames enabled

Applications must have been created using the AIX shared libraries for these binary compatibility statements to apply.

Limitations

  • IBM Parallel System Support Programs (PSSP) for AIX is not supported running AIX 5L V5.3

  • SP Switch and the SP Switch2 are not supported running AIX 5L V5.3

  • Partition Load Manager for AIX (available via a hardware feature code of Advanced POWER Virtualization) is not targeted for customers that want to implement very small granularity CPU resource management (micro-partitioning) on shared-processor logical partitions. Memory management is fully supported on these configurations, but CPU management may not always give the desired result.

Back to topBack to top
 
Publications

The following publications can be ordered from IBM immediately. To order, contact your IBM representative.

  • AIX 5L Version 5.3 AIX Installation in a Partitioned Environment (SC23-4926)
  • AIX 5L Version 5.3 Installation Guide and Reference (SC23-4887)

Back to topBack to top
 
Security, Auditability, and Control

AIX 5L for POWER V5.3 uses the system and network security features for security and auditability. These features are:

  • System security:
    • Native Kerberos V5 KDC Server/Client Support
    • Trusted Computing Base available as an optional preinstall feature
    • AIX LDAP Security Audit plug-in
    • Pluggable Authentication Mechanism
    • IBM SecureWay Directory Version 3.2.1

  • Network security:
    • PKCS support
    • IP Key Encryption Security
    • Directory-based resolvers

The customer is responsible for evaluation, selection, and implementation of security features, administrative procedures, and appropriate controls in application systems and communication facilities.

Trademarks

(R), (TM), * Trademark or registered trademark of International Business Machines Corporation.

** Company, product, or service name may be a trademark or service mark of others.

Windows is a trademark of Microsoft Corporation.

UNIX is a registered trademark in the United States and other countries licensed exclusively through X/Open Company Limited.
 © IBM Corporation 2005.
Back to topBack to top