Bypass attachment revisited#

Bypass attachment is an operation introduced by K. Honda in [Hon99] to catch the most fundamental “phase changes” among a \(1\)-parameter family of surfaces in a contact \(3\)-manifold. It is in effect equivalent to E. Giroux’s “bifurcations” of characteristic foliations studied in [Gir99]. The difference between the two approaches, however, is that a bypass attachment is performed by really attaching a “bypass”, which is a certain half-disk with Legendrian boundary, to the surface, while a bifurcation of vector field is an abstract phenomenon that can most likely only be observed and difficult to find if we have something specific in mind. Indeed, there exist tools such as the “imbalance principle” from [Hon99] and the “bypass sliding” (aka. “bypass rotation”) from [Hon00] which are designed to find bypasses.

Although the generalization of Giroux’s bifurcation to hypersurfaces in higher-dimensional contact manifolds is rather straightforward [1], at least under the assumption of characteristic foliations being Morse, how a higher-dimensional bypass should look like turns out to be less obvious. A rather ugly model of such a thing – called \(\Delta\) – was worked out in [HH18] (Figure 7.2.3 on page 45): it’s more-or-less a half-ball with certain Legendrian foliation inside and a partially Legendrian boundary. The reason \(\p \Delta\) not being completely Legendrian was that I couldn’t then make it smooth, even with corners. Basically you cannot have three Legendrian planes [2] intersect like a corner between the walls in your room. This psychological barrier disappears when we think of a bypass as a coLegendrian. They are not meant to be smooth: they come with cone singularities! The rest of the article will be devoted to spelling out the details. It would be a bonus if the more elegant construction of higher-dimensional bypasses will lead to a better understanding of contact manifolds, but that is unclear at this point.

Note

The rest of this article assumes familiarity with Honda’s bypass theory in dimension \(3\) and coLegendrians and contact Morse theory in general in higher dimensions.

Bypass in Dimension \(3\)#

We start by reviewing the definition of a bypass in dimension \(3\). In the picture to the right, a bypass \(\psup{3}{\Delta}\) [3] – topologically a half-disk – is standing on a (generic) Morse surface \(\Sigma\) along the diameter. Moreover, the characteristic foliation on \(\psup{3}{\Delta}\) is drawn, together with four singularities divided into two groups with opposite signs: three of one sign (green) and the other of the opposite sign (blue). Finally, the dividing set \(\Gamma\) on both \(\psup{3}{\Delta}\) and \(\Sigma\) are drawn in red.

Now the bypass \(\psup{3}{\Delta}\) can be “attached” to \(\Sigma\) to form a new surface \(\Sigma'\), which is topologically isotopic to \(\Sigma\) but contact-topologically different in general. The original recipe for such an “attachment” as described in [Hon99] is to first slightly thicken \(\psup{3}{\Delta}\) and then round the corners. This procedure is then realized to be equivalent to first attaching a (contact) \(1\)-handle whose core-disk is the semicircle part of \(\p (\psup{3}{\Delta})\), and then a cancelling \(2\)-handle whose core-disk is really a copy of \(\psup{3}{\Delta}\) itself. We might on the one hand prefer the later viewpoint because it’s in line with Morse theory, but on the other hand, we don’t really care how bypasses are attached as long as there is some recipe, and in any case, we already know everything about the contact structure of a bypass attachment via the contact Morse theory on \(\Sigma\).

To wrap up our recollection of the bypass theory in dimension \(3\), let’s remind ourselves that in this dimension, the dividing sets play a dominant role due to Giroux’s convex surface theory. In particular, it doesn’t really matter how the characteristic foliation on \(\psup{3}{\Delta}\) looks like as long as the dividing set \(\Gamma_{\psup{3}{\Delta}}\) is correct. This is not the case in higher dimensions, where dividing sets contain much less information. Indeed, our choice of the characteristic foliation on \(\psup{3}{\Delta}\) is deliberate and important: it is (generically) the characteristic foliation on the core-disk of a \(2\)-handle.

Important

We will assume the characteristic foliation on \(\psup{3}{\Delta}\) is the standard one as shown in the figure above.

Bypass in Dimension \(5\)#

Instead of moving onto bypasses in any dimension, let’s first try to understand it in dimension \(5\) for two reasons: first, it’s easier to visualize a \(3\)-dimensional bypass and second, the even higher dimensional cases are not any harder once we understand the \(5\)-dimensional case.

Construction as A Standalone#

We start by describing a standalone bypass \(\psup{5}{\Delta}\) as a coLegendrian which is not attached to anything. It turns out that \(\psup{5}{\Delta}\) is topologically just a suspension of \(\psup{3}{\Delta}\) as shown in the picture to the right [4]. In fact, the restricted Morse vector field on \(\psup{5}{\Delta}\) simply has one (half) source and one (half) sink, both lying on \(\p (\psup{5}{\Delta})\), so that all flow lines come from the source and end at the sink. The source and the sink are depicted as the blue and the green dots in the picture. Finally, the dividing set \(\Gamma_{\psup{5}{\Delta}}\) is precisely a copy of \(\psup{3}{\Delta}\), which is drawn as the red half-disk.

Recall that every coLegendrian lives inside an ambient Morse hypersurface \(\Sigma\) by definition, although it is typically unimportant how \(\Sigma\) looks like away from the coLegendrian. Let’s now put our so-far topological description of \(\psup{5}{\Delta}\) into this context by choosing a particularly simple hypersurface \(\Sigma \cong S^4\) such that both \(R_{\pm} (\Sigma) \cong B^4\) are equipped with the standard (radial) Liouville vector field. In particular \(\Gamma_{\Sigma} \cong (S^3, \xi_{\std})\). If we now pick a bypass \(\psup{3}{\Delta} \subset \Gamma_{\Sigma}\), then \(\psup{5}{\Delta}\) is simply the totality of all flow lines of the characteristic foliation \(\Sigma_{\xi}\) passing through \(\psup{3}{\Delta}\), which is topologically a suspension of \(\psup{3}{\Delta}\).

Attachment to A Hypersurface#

Our real interest lies in how a bypass \(\psup{5}{\Delta}\) can be attached to a hypersurface \(\Sigma\). The basic setup for the attachment is that the ambient hypersurface at the vicinity of \(\psup{5}{\Delta}\) – denoted by \(\psup{5}{\Delta_h}\) – stands on \(\Sigma\), just like in the attachment of \(\psup{3}{\Delta}\) discussed above. In particular, we have \(\psup{5}{\Delta}\) standing on \(\Sigma\) along the “flat bottom”, i.e., the suspension of the diameter part of \(\p (\psup{3}{\Delta})\), and henceforth \(\psup{5}{\Delta_h}\) standing along a thickening of it.

Let’s first examine how the dividing sets \(\Gamma_{\psup{5}{\Delta_h}}\) and \(\Gamma_{\Sigma}\) intersect. The basic principle is that the singular loci of the Legendrian foliation \(\Fcal\) in \(\psup{5}{\Delta}\) – restricted to the flat bottom – is exactly \(\Gamma_{\psup{5}{\Delta}} \cap \Gamma_{\Sigma}\) because it is where the contact structure \(\xi\) is tangent to \(\psup{5}{\Delta}\) [5]. Since \(\Fcal\) is the suspension of the characteristic foliation on \(\psup{3}{\Delta}\), it follows that \(\Gamma_{\psup{5}{\Delta}} \cap \Gamma_{\Sigma}\) is a Legendrian \(\Theta\)-graph in \(\Gamma_{\Sigma}\), and \(\Gamma_{\psup{5}{\Delta_h}} \cap \Gamma_{\Sigma}\) is a ribbon neighborhood of it as shown in the picture to the right. Moreover, the triangles \(\triangle{abc}\) and \(\triangle{abd}\) – making the flat bottom of \(\psup{5}{\Delta}\) – are identified with Lagrangian disks in \(R_{\pm} (\Sigma)\) respectively. Now we know exactly how a bypass – as a coLegendrian – is attached to a hypersurface, at least in dimension \(5\). The result of such an attachment is well-understood in contact Morse theory, so we shall not repeat.

Note

In the above analysis, there is no assumption that the Lagrangian disks in \(R_{\pm} (\Sigma)\) are compatible with (i.e., tangent to) the Morse vector field \(\Sigma_{\xi}\), and this is indeed not necessary. Bypass attachments at this level of generality are the basic building blocks of a contact Morse function (i.e., a Morse function whose gradient flow preserves \(\xi\)) and not of a contact Morse theory which lives on (families of) hypersurfaces. However, for all we concern, there is no loss by assuming that all these Lagrangians are compatible with the Morse theory on \(\Sigma\).

What we have described above is actually how a hypersurface \(\Sigma\) can be attached to a bypass \(\psup{5}{\Delta}\), but this is not how it usually works in practice. So let’s turn things around and describe how \(\psup{5}{\Delta}\) is attached to \(\Sigma\). All we need are the following two pieces of data on \(\Sigma\):

  1. A Legendrian \(\Theta\)-graph ⊖ \(\subset \Gamma_{\Sigma}\) such that the contact planes make a half turn from one singular point of the ⊖ to the other through every one of the three connecting paths, i.e., the ◠ , the ⎯ , and the ◡ . Note that this is equivalent to saying that ⊖ has a ribbon neighborhood whose dividing set looks like the one shown in the figure above.

  2. The upper and lower closed semicircles of ⊖ bound Lagrangian disks in \(R_{\pm} (\Sigma)\), respectively.

With these data at hand, we can then attach \(\psup{5}{\Delta}\) to \(\Sigma\) so that the flat bottom of \(\psup{5}{\Delta}\) matches exactly the union of ⊖ and the two Lagrangian disks.

A Fake Bypass#

If all that is desired is to define a bypass and describe how it can be attached to a hypersurface, then we are already done, at least in dimension \(5\). But we would like to understand a bit more about this construction, and the best way to do so is to make mistakes. So here is one “mistake” – which I shall call a “fake bypass” – that had confused me a lot. Surprisingly as it turns out, we shall also learn something new from it.

The starting point is to question if the standalone bypass as constructed above is unique. It turns out not to be the case. On the left-hand-side of the picture to the right, we have a coLegendrian \(\psup{5}{\Delta}^{\ast}\) – the fake bypass [6] – with six singularities \(a, b, c, d, e, f\) (ignore the zoomed-in half-disk about \(b\) for the moment). The first five are of one sign and the last of the opposite sign. Using the theory of handle decompositions of coLegendrians, we can for example build such a \(\psup{5}{\Delta}^{\ast}\) from the following partial handles [7] :

  1. Two (positive) \(0\)-handles corresponding to \(a\) and \(b\).

  2. One (positive) half-\(1\)-handle corresponding to \(e\) which connects \(a\) and \(b\).

  3. Two positive quarter-\(2\)-handles corresponding to \(c\) and \(d\).

  4. One negative \(3\)-handle corresponding to \(f\).

In contrast to the actual bypass, we note that the half-disk in the middle of \(\psup{5}{\Delta}^{\ast}\) – which we denote by \(\psup{3}{\Delta}^{\ast}\) accordingly – no longer lies in the dividing set of the ambient hypersurface containing it. Hence it makes no sense to talk about the characteristic foliation on \(\psup{3}{\Delta}^{\ast}\). Rather, the used-to-be characteristic foliation on \(\psup{3}{\Delta}^{\ast}\) as drawn in the picture above is now just the intersection loci with the Legendrian foliation \(\Fcal^{\ast}\) on \(\psup{5}{\Delta}^{\ast}\), which is also a suspension. It should be noted that although \(\Fcal^{\ast}\) looks exactly like \(\Fcal\), they are actually different because the normal orientations along the singular loci of the Legendrian foliations are different. It follows that the contact germs on \(\psup{5}{\Delta}^{\ast}\) and \(\psup{5}{\Delta}\) are also different.

Another way to see that \(\psup{5}{\Delta}^{\ast}\) and \(\psup{5}{\Delta}\) are different is to, on the one hand, examine a linking half-disk about \(b \in \psup{5}{\Delta}^{\ast}\), shown as the shaded region in the picture above. Indeed, the dividing set – or rather, the (relative) signs of the singularities – on this half-disk makes it the opposite of a 3D bypass. On the other hand, the same link about \(b \in \psup{5}{\Delta}\) is obviously just the usual 3D bypass.

Now comes the interesting question: can we attach \(\psup{5}{\Delta}^{\ast}\) to a hypersurface \(\Sigma\) in the same way that an actual bypass is attached? The answer is, interestingly enough, yes! Indeed, just as in the case of the actual bypass, all we need is a realization of a ribbon neighborhood of the Legendrian \(\Theta\)-graph ⊖\(^{\ast} \subset \Gamma_{\Sigma}\) as shown in the right-hand-side of the picture above. At first sight, it might appear that such a ribbon neighborhood cannot exist in \(\Gamma_{\Sigma}\) if, for example, the outer-circle ○ \(\subset\)\(^{\ast}\) is topologically unknotted because its Thurston-Bennequin number \(\op{tb}(\)\() = 0\) relative to the ribbon framing. But this is an illusion because the ribbon framing does not have to be the same as the Seifert framing, if the later is defined at all.

Important

When we attach either a bypass or a fake bypass to a hypersurface, the choice of the ribbon neighborhood of the Legendrian ⊖ in \(\Gamma_{\Sigma}\) is not completely arbitrary, although \(\op{tb}(\)\()\) is \(-1\) for the bypass attachment and \(0\) for the fake bypass attachment. Namely, the \(\op{tb}\) of both the upper and lower closed semicircles of ⊖ must be \(-1\). This guarantees that the ribbon framing extends to the Lagrangian disks in \(R_{\pm} (\Sigma)\), respectively.

The above restriction is quite strong but there is yet another possibility for the ribbon neighborhood where \(\op{tb}(\)\() = -2\). It is not the purpose of this article to exhaust all possibilities of bypass-like objects. But the discussion of the fake bypass has hopefully deepened our understanding of the bypass itself.

Back to the Old Bypass#

The bypass attachment described in [HH18], albeit ugly, has an important virtue that it is compatible with the back-then-not-defined contact Morse theory. So let’s briefly recall its setup here. We need the following two pieces of data for the attachment:

  1. Two Legendrian knots \(\Lambda_{\pm} \subset \Gamma_{\Sigma}\) which \(\xi\)-transversely intersect [8] in one point. Here \(\xi\) denotes the (induced) contact structure on \(\Gamma_{\Sigma}\).

  2. \(\Lambda_{\pm}\) bound Lagrangian disks in \(R_{\pm} (\Sigma)\), respectively.

Thinking of \(\Lambda_{\pm}\) as the upper and lower semicircles in ⊖, the second condition poses no issue. The issue, however, is that in ⊖ they do not \(\xi\)-transversely intersect, rather, they overlap along the horizontal diameter in ⊖. Using the fact that the contact planes make a half turn from one end of the diameter to the other end, we can continuously deform \(\Lambda_{\pm}\) by shrinking the diameter to a point as shown in the picture to the right so that they become \(\xi\)-transverse. Here in either (i) or (ii), the horizontal line from \(a\) to \(b\) is the diameter in ⊖, the blue and green segments are parts of \(\Lambda_{\pm}\) respectively, the red dot represents the intersection with the dividing set on the ribbon at \(t=0\), and the time \(t\) runs from \(0\) to \(1\). At \(t=1\), the diameter shrinks down to the red dot, at which \(\Lambda_+\) and \(\Lambda_-\) intersect \(\xi\)-transversely.

It turns out that there are two ways to shrink the diameter to the middle point, and they are shown as (i) and (ii) in the picture. But of course, we end up with the same bypass attachment, i.e., contactomorphic to the one we started with.

Bypass in General#

As promised before, the definition of bypass (attachment) in dimensions greater than \(5\) poses no new difficulties. Namely, the construction in (contact) dimension \(2n+1\) is simply a suspension of the construction in dimension \(2n-1\). For example, since the bypass \(\psup{5}{\Delta}\) is not smooth and has two cone singularities, it follows that \(\psup{7}{\Delta}\) has an \(S^1\)-worth of cone-type singularities, which is expected from the general structure theory of coLegendrians. However, since such a theory has not yet been developed, we shall leave the discussion of bypasses in general dimensions to a later time, if there is anything truly new.

Footnotes