-
Bringing Reconfigurability to the Network Stack
Authors:
Akshay Narayan,
Aurojit Panda,
Mohammad Alizadeh,
Hari Balakrishnan,
Arvind Krishnamurthy,
Scott Shenker
Abstract:
Reconfiguring the network stack allows applications to specialize the implementations of communication libraries depending on where they run, the requests they serve, and the performance they need to provide. Specializing applications in this way is challenging because developers need to choose the libraries they use when writing a program and cannot easily change them at runtime. This paper intro…
▽ More
Reconfiguring the network stack allows applications to specialize the implementations of communication libraries depending on where they run, the requests they serve, and the performance they need to provide. Specializing applications in this way is challenging because developers need to choose the libraries they use when writing a program and cannot easily change them at runtime. This paper introduces Bertha, which allows these choices to be changed at runtime without limiting developer flexibility in the choice of network and communication functions. Bertha allows applications to safely use optimized communication primitives (including ones with deployment limitations) without limiting deployability. Our evaluation shows cases where this results in 16x higher throughput and 63% lower latency than current portable approaches while imposing minimal overheads when compared to a hand-optimized versions that use deployment-specific communication primitives.
△ Less
Submitted 13 November, 2023;
originally announced November 2023.
-
TF1 Snowmass Report: Quantum gravity, string theory, and black holes
Authors:
Daniel Harlow,
Shamit Kachru,
Juan Maldacena,
Ibrahima Bah,
Mike Blake,
Raphael Bousso,
Mirjam Cvetic,
Xi Dong,
Netta Engelhardt,
Tom Faulkner,
Raphael Flauger,
Dan Freed,
Victor Gorbenko,
Yingfei Gu,
Jim Halverson,
Tom Hartman,
Sean Hartnoll,
Andreas Karch,
Hong Liu,
Andy Lucas,
Emil Martinec,
Liam McAllister,
Greg Moore,
Nikita Nekrasov,
Sabrina Pasterski
, et al. (13 additional authors not shown)
Abstract:
We give an overview of the field of quantum gravity, string theory and black holes summarizing various white papers in this subject that were submitted as part of the Snowmass process.
We give an overview of the field of quantum gravity, string theory and black holes summarizing various white papers in this subject that were submitted as part of the Snowmass process.
△ Less
Submitted 16 November, 2022; v1 submitted 4 October, 2022;
originally announced October 2022.
-
3PO: Programmed Far-Memory Prefetching for Oblivious Applications
Authors:
Christopher Branner-Augmon,
Narek Galstyan,
Sam Kumar,
Emmanuel Amaro,
Amy Ousterhout,
Aurojit Panda,
Sylvia Ratnasamy,
Scott Shenker
Abstract:
Using memory located on remote machines, or far memory, as a swap space is a promising approach to meet the increasing memory demands of modern datacenter applications. Operating systems have long relied on prefetchers to mask the increased latency of fetching pages from swap space to main memory. Unfortunately, with traditional prefetching heuristics, performance still degrades when applications…
▽ More
Using memory located on remote machines, or far memory, as a swap space is a promising approach to meet the increasing memory demands of modern datacenter applications. Operating systems have long relied on prefetchers to mask the increased latency of fetching pages from swap space to main memory. Unfortunately, with traditional prefetching heuristics, performance still degrades when applications use far memory. In this paper we propose a new prefetching technique for far-memory applications. We focus our efforts on memory-intensive, oblivious applications whose memory access patterns are independent of their inputs, such as matrix multiplication. For this class of applications we observe that we can perfectly prefetch pages without relying on heuristics. However, prefetching perfectly without requiring significant application modifications is challenging.
In this paper we describe the design and implementation of 3PO, a system that provides pre-planned prefetching for general oblivious applications. We demonstrate that 3PO can accelerate applications, e.g., running them 30-150% faster than with Linux's prefetcher with 20% local memory. We also use 3PO to understand the fundamental software overheads of prefetching in a paging-based system, and the minimum performance penalty that they impose when we run applications under constrained local memory.
△ Less
Submitted 15 July, 2022;
originally announced July 2022.
-
The Sky Above The Clouds
Authors:
Sarah Chasins,
Alvin Cheung,
Natacha Crooks,
Ali Ghodsi,
Ken Goldberg,
Joseph E. Gonzalez,
Joseph M. Hellerstein,
Michael I. Jordan,
Anthony D. Joseph,
Michael W. Mahoney,
Aditya Parameswaran,
David Patterson,
Raluca Ada Popa,
Koushik Sen,
Scott Shenker,
Dawn Song,
Ion Stoica
Abstract:
Technology ecosystems often undergo significant transformations as they mature. For example, telephony, the Internet, and PCs all started with a single provider, but in the United States each is now served by a competitive market that uses comprehensive and universal technology standards to provide compatibility. This white paper presents our view on how the cloud ecosystem, barely over fifteen ye…
▽ More
Technology ecosystems often undergo significant transformations as they mature. For example, telephony, the Internet, and PCs all started with a single provider, but in the United States each is now served by a competitive market that uses comprehensive and universal technology standards to provide compatibility. This white paper presents our view on how the cloud ecosystem, barely over fifteen years old, could evolve as it matures.
△ Less
Submitted 14 May, 2022;
originally announced May 2022.
-
Blockaid: Data Access Policy Enforcement for Web Applications
Authors:
Wen Zhang,
Eric Sheng,
Michael Chang,
Aurojit Panda,
Mooly Sagiv,
Scott Shenker
Abstract:
Modern web applications serve large amounts of sensitive user data, access to which is typically governed by data-access policies. Enforcing such policies is crucial to preventing improper data access, and prior work has proposed many enforcement mechanisms. However, these prior methods either alter application semantics or require adopting a new programming model; the former can result in unexpec…
▽ More
Modern web applications serve large amounts of sensitive user data, access to which is typically governed by data-access policies. Enforcing such policies is crucial to preventing improper data access, and prior work has proposed many enforcement mechanisms. However, these prior methods either alter application semantics or require adopting a new programming model; the former can result in unexpected application behavior, while the latter cannot be used with existing web frameworks.
Blockaid is an access-policy enforcement system that preserves application semantics and is compatible with existing web frameworks. It intercepts database queries from the application, attempts to verify that each query is policy-compliant, and blocks queries that are not. It verifies policy compliance using SMT solvers and generalizes and caches previous compliance decisions for better performance. We show that Blockaid supports existing web applications while requiring minimal code changes and adding only modest overheads.
△ Less
Submitted 31 May, 2022; v1 submitted 13 May, 2022;
originally announced May 2022.
-
Snowmass White Paper: Quantum Aspects of Black Holes and the Emergence of Spacetime
Authors:
Raphael Bousso,
Xi Dong,
Netta Engelhardt,
Thomas Faulkner,
Thomas Hartman,
Stephen H. Shenker,
Douglas Stanford
Abstract:
Black holes provide a window into the microscopic structure of spacetime in quantum gravity. Recently the quantum information contained in Hawking radiation has been calculated, verifying a key aspect of the consistency of black hole evaporation with quantum mechanical unitarity.
This calculation relied crucially on recent progress in understanding the emergence of bulk spacetime from a boundary…
▽ More
Black holes provide a window into the microscopic structure of spacetime in quantum gravity. Recently the quantum information contained in Hawking radiation has been calculated, verifying a key aspect of the consistency of black hole evaporation with quantum mechanical unitarity.
This calculation relied crucially on recent progress in understanding the emergence of bulk spacetime from a boundary holographic description. Spacetime wormholes have played an important role in understanding the underpinnings of this result, and the precision study of such wormholes, in this and other contexts, has been enabled by the development of low-dimensional models of holography.
In this white paper we review these developments and describe some of the deep open questions in this subject. These include the nature of the black hole interior, potential applications to quantum cosmology, the gravitational explanation of the fine structure of black holes, and the development of further connections to quantum information and laboratory quantum simulation.
△ Less
Submitted 2 March, 2022; v1 submitted 9 January, 2022;
originally announced January 2022.
-
Comments on wormholes and factorization
Authors:
Phil Saad,
Stephen Shenker,
Shunyu Yao
Abstract:
In AdS/CFT partition functions of decoupled copies of the CFT factorize. In bulk computations of such quantities contributions from spacetime wormholes which link separate asymptotic boundaries threaten to spoil this property, leading to a "factorization puzzle." Certain simple models like JT gravity have wormholes, but bulk computations in them correspond to averages over an ensemble of boundary…
▽ More
In AdS/CFT partition functions of decoupled copies of the CFT factorize. In bulk computations of such quantities contributions from spacetime wormholes which link separate asymptotic boundaries threaten to spoil this property, leading to a "factorization puzzle." Certain simple models like JT gravity have wormholes, but bulk computations in them correspond to averages over an ensemble of boundary systems. These averages need not factorize. We can formulate a toy version of the factorization puzzle in such models by focusing on a specific member of the ensemble where partition functions will again factorize.
As Coleman and Giddings-Strominger pointed out in the 1980s, fixed members of ensembles are described in the bulk by "$α$-states" in a many-universe Hilbert space. In this paper we analyze in detail the bulk mechanism for factorization in such $α$-states in the topological model introduced by Marolf and Maxfield (the "MM model") and in JT gravity. In these models geometric calculations in $α$ states are poorly controlled. We circumvent this complication by working in $\textit{approximate}$ $α$ states where bulk calculations just involve the simplest topologies: disks and cylinders.
One of our main results is an effective description of the factorization mechanism. In this effective description the many-universe contributions from the full $α$ state are replaced by a small number of effective boundaries. Our motivation in constructing this effective description, and more generally in studying these simple ensemble models, is that the lessons learned might have wider applicability. In fact the effective description lines up with a recent discussion of the SYK model with fixed couplings arXiv:2103.16754. We conclude with some discussion about the possible applicability of this effective model in more general contexts.
△ Less
Submitted 27 July, 2021;
originally announced July 2021.
-
AutoTune: Improving End-to-end Performance and Resource Efficiency for Microservice Applications
Authors:
Michael Alan Chang,
Aurojit Panda,
Hantao Wang,
Yuancheng Tsai,
Rahul Balakrishnan,
Scott Shenker
Abstract:
Most large web-scale applications are now built by composing collections (from a few up to 100s or 1000s) of microservices. Operators need to decide how many resources are allocated to each microservice, and these allocations can have a large impact on application performance. Manually determining allocations that are both cost-efficient and meet performance requirements is challenging, even for e…
▽ More
Most large web-scale applications are now built by composing collections (from a few up to 100s or 1000s) of microservices. Operators need to decide how many resources are allocated to each microservice, and these allocations can have a large impact on application performance. Manually determining allocations that are both cost-efficient and meet performance requirements is challenging, even for experienced operators. In this paper we present AutoTune, an end-to-end tool that automatically minimizes resource utilization while maintaining good application performance.
△ Less
Submitted 28 June, 2021; v1 submitted 18 June, 2021;
originally announced June 2021.
-
Some Complexity Results for Stateful Network Verification
Authors:
Kalev Alpernas,
Aurojit Panda,
Alexander Rabinovich,
Mooly Sagiv,
Scott Shenker,
Sharon Shoham,
Yaron Velner
Abstract:
In modern networks, forwarding of packets often depends on the history of previously transmitted traffic. Such networks contain stateful middleboxes, whose forwarding behaviour depends on a mutable internal state. Firewalls and load balancers are typical examples of stateful middleboxes.
This work addresses the complexity of verifying safety properties, such as isolation, in networks with finite…
▽ More
In modern networks, forwarding of packets often depends on the history of previously transmitted traffic. Such networks contain stateful middleboxes, whose forwarding behaviour depends on a mutable internal state. Firewalls and load balancers are typical examples of stateful middleboxes.
This work addresses the complexity of verifying safety properties, such as isolation, in networks with finite-state middleboxes. Unfortunately, we show that even in the absence of forwarding loops, reasoning about such networks is undecidable due to interactions between middleboxes connected by unbounded ordered channels. We therefore abstract away channel ordering. This abstraction is sound for safety, and makes the problem decidable. Specifically, safety checking becomes EXPSPACE-complete in the number of hosts and middleboxes in the network. To tackle the high complexity, we identify two useful subclasses of finite-state middleboxes which admit better complexities. The simplest class includes, e.g., firewalls and permits polynomial-time verification. The second class includes, e.g., cache servers and learning switches, and makes the safety problem coNP-complete.
Finally, we implement a tool for verifying the correctness of stateful networks.
△ Less
Submitted 2 June, 2021;
originally announced June 2021.
-
Wormholes without averaging
Authors:
Phil Saad,
Stephen H. Shenker,
Douglas Stanford,
Shunyu Yao
Abstract:
After averaging over fermion couplings, SYK has a collective field description that sometimes has "wormhole" solutions. We study the fate of these wormholes when the couplings are fixed. Working mainly in a simple model, we find that the wormhole saddles persist, but that new saddles also appear elsewhere in the integration space -- "half-wormholes." The wormhole contributions depend only weakly o…
▽ More
After averaging over fermion couplings, SYK has a collective field description that sometimes has "wormhole" solutions. We study the fate of these wormholes when the couplings are fixed. Working mainly in a simple model, we find that the wormhole saddles persist, but that new saddles also appear elsewhere in the integration space -- "half-wormholes." The wormhole contributions depend only weakly on the specific choice of couplings, while the half-wormhole contributions are strongly sensitive. The half-wormholes are crucial for factorization of decoupled systems with fixed couplings, but they vanish after averaging, leaving the non-factorizing wormhole behind.
△ Less
Submitted 30 March, 2021;
originally announced March 2021.
-
How to Train your DNN: The Network Operator Edition
Authors:
Michael Alan Chang,
Domenic Bottini,
Lisa Jian,
Pranay Kumar,
Aurojit Panda,
Scott Shenker
Abstract:
Deep Neural Nets have hit quite a crest, But physical networks are where they must rest, And here we put them all to the test, To see which network optimization is best.
Deep Neural Nets have hit quite a crest, But physical networks are where they must rest, And here we put them all to the test, To see which network optimization is best.
△ Less
Submitted 21 April, 2020;
originally announced April 2020.
-
Replica wormholes and the black hole interior
Authors:
Geoff Penington,
Stephen H. Shenker,
Douglas Stanford,
Zhenbin Yang
Abstract:
Recent work has shown how to obtain the Page curve of an evaporating black hole from holographic computations of entanglement entropy. We show how these computations can be justified using the replica trick, from geometries with a spacetime wormhole connecting the different replicas. In a simple model, we study the Page transition in detail by summing replica geometries with different topologies.…
▽ More
Recent work has shown how to obtain the Page curve of an evaporating black hole from holographic computations of entanglement entropy. We show how these computations can be justified using the replica trick, from geometries with a spacetime wormhole connecting the different replicas. In a simple model, we study the Page transition in detail by summing replica geometries with different topologies. We compute related quantities in less detail in more complicated models, including JT gravity coupled to conformal matter and the SYK model. Separately, we give a direct gravitational argument for entanglement wedge reconstruction using an explicit formula known as the Petz map; again, a spacetime wormhole plays an important role. We discuss an interpretation of the wormhole geometries as part of some ensemble average implicit in the gravity description.
△ Less
Submitted 15 April, 2020; v1 submitted 27 November, 2019;
originally announced November 2019.
-
JT gravity as a matrix integral
Authors:
Phil Saad,
Stephen H. Shenker,
Douglas Stanford
Abstract:
We present exact results for partition functions of Jackiw-Teitelboim (JT) gravity on two-dimensional surfaces of arbitrary genus with an arbitrary number of boundaries. The boundaries are of the type relevant in the NAdS${}_2$/NCFT${}_1$ correspondence. We show that the partition functions correspond to the genus expansion of a certain matrix integral. A key fact is that Mirzakhani's recursion re…
▽ More
We present exact results for partition functions of Jackiw-Teitelboim (JT) gravity on two-dimensional surfaces of arbitrary genus with an arbitrary number of boundaries. The boundaries are of the type relevant in the NAdS${}_2$/NCFT${}_1$ correspondence. We show that the partition functions correspond to the genus expansion of a certain matrix integral. A key fact is that Mirzakhani's recursion relation for Weil-Petersson volumes maps directly onto the Eynard-Orantin "topological recursion" formulation of the loop equations for this matrix integral. The matrix integral provides a (non-unique) nonperturbative completion of the genus expansion, sensitive to the underlying discreteness of the matrix eigenvalues. In matrix integral descriptions of noncritical strings, such effects are due to an infinite number of disconnected worldsheets connected to D-branes. In JT gravity, these effects can be reproduced by a sum over an infinite number of disconnected geometries -- a type of D-brane logic applied to spacetime.
△ Less
Submitted 26 March, 2019;
originally announced March 2019.
-
Revisiting Network Support for RDMA
Authors:
Radhika Mittal,
Alexander Shpiner,
Aurojit Panda,
Eitan Zahavi,
Arvind Krishnamurthy,
Sylvia Ratnasamy,
Scott Shenker
Abstract:
The advent of RoCE (RDMA over Converged Ethernet) has led to a significant increase in the use of RDMA in datacenter networks. To achieve good performance, RoCE requires a lossless network which is in turn achieved by enabling Priority Flow Control (PFC) within the network. However, PFC brings with it a host of problems such as head-of-the-line blocking, congestion spreading, and occasional deadlo…
▽ More
The advent of RoCE (RDMA over Converged Ethernet) has led to a significant increase in the use of RDMA in datacenter networks. To achieve good performance, RoCE requires a lossless network which is in turn achieved by enabling Priority Flow Control (PFC) within the network. However, PFC brings with it a host of problems such as head-of-the-line blocking, congestion spreading, and occasional deadlocks. Rather than seek to fix these issues, we instead ask: is PFC fundamentally required to support RDMA over Ethernet?
We show that the need for PFC is an artifact of current RoCE NIC designs rather than a fundamental requirement. We propose an improved RoCE NIC (IRN) design that makes a few simple changes to the RoCE NIC for better handling of packet losses. We show that IRN (without PFC) outperforms RoCE (with PFC) by 6-83% for typical network scenarios. Thus not only does IRN eliminate the need for PFC, it improves performance in the process! We further show that the changes that IRN introduces can be implemented with modest overheads of about 3-10% to NIC resources. Based on our results, we argue that research and industry should rethink the current trajectory of network support for RDMA.
△ Less
Submitted 21 June, 2018;
originally announced June 2018.
-
A semiclassical ramp in SYK and in gravity
Authors:
Phil Saad,
Stephen H. Shenker,
Douglas Stanford
Abstract:
In finite entropy systems, real-time partition functions do not decay to zero at late time. Instead, assuming random matrix universality, suitable averages exhibit a growing "ramp" and "plateau" structure. Deriving this non-decaying behavior in a large $N$ collective field description is a challenge related to one version of the black hole information problem. We describe a candidate semiclassical…
▽ More
In finite entropy systems, real-time partition functions do not decay to zero at late time. Instead, assuming random matrix universality, suitable averages exhibit a growing "ramp" and "plateau" structure. Deriving this non-decaying behavior in a large $N$ collective field description is a challenge related to one version of the black hole information problem. We describe a candidate semiclassical explanation of the ramp for the SYK model and for black holes. In SYK, this is a two-replica nonperturbative saddle point for the large $N$ collective fields, with zero action and a compact zero mode that leads to a linearly growing ramp. In the black hole context, the solution is a two-sided black hole that is periodically identified under a Killing time translation. We discuss but do not resolve some puzzles that arise.
△ Less
Submitted 23 July, 2019; v1 submitted 18 June, 2018;
originally announced June 2018.
-
Onset of Random Matrix Behavior in Scrambling Systems
Authors:
Hrant Gharibyan,
Masanori Hanada,
Stephen H. Shenker,
Masaki Tezuka
Abstract:
The fine grained energy spectrum of quantum chaotic systems is widely believed to be described by random matrix statistics. A basic scale in such a system is the energy range over which this behavior persists. We define the corresponding time scale by the time at which the linearly growing ramp region in the spectral form factor begins. We call this time $t_{\rm ramp}$. The purpose of this paper i…
▽ More
The fine grained energy spectrum of quantum chaotic systems is widely believed to be described by random matrix statistics. A basic scale in such a system is the energy range over which this behavior persists. We define the corresponding time scale by the time at which the linearly growing ramp region in the spectral form factor begins. We call this time $t_{\rm ramp}$. The purpose of this paper is to study this scale in many-body quantum systems that display strong chaos, sometimes called scrambling systems. We focus on randomly coupled qubit systems, both local and $k$-local (all-to-all interactions) and the Sachdev--Ye--Kitaev (SYK) model. Using numerical results for Hamiltonian systems and analytic estimates for random quantum circuits we find the following results. For geometrically local systems with a conservation law we find $t_{\rm ramp}$ is determined by the diffusion time across the system, order $N^2$ for a 1D chain of $N$ qubits. This is analogous to the behavior found for local one-body chaotic systems. For a $k$-local system with conservation law the time is order $\log N$ but with a different prefactor and a different mechanism than the scrambling time. In the absence of any conservation laws, as in a generic random quantum circuit, we find $t_{\rm ramp} \sim \log N$, independent of connectivity.
△ Less
Submitted 7 February, 2019; v1 submitted 21 March, 2018;
originally announced March 2018.
-
ThrottleBot - Performance without Insight
Authors:
Michael Alan Chang,
Aurojit Panda,
Yuan-Cheng Tsai,
Hantao Wang,
Scott Shenker
Abstract:
Large scale applications are increasingly built by composing sets of microservices. In this model the functionality for a single application might be split across 100s or 1000s of microservices. Resource provisioning for these applications is complex, requiring administrators to understand both the functioning of each microservice, and dependencies between microservices in an application. In this…
▽ More
Large scale applications are increasingly built by composing sets of microservices. In this model the functionality for a single application might be split across 100s or 1000s of microservices. Resource provisioning for these applications is complex, requiring administrators to understand both the functioning of each microservice, and dependencies between microservices in an application. In this paper we present ThrottleBot, a system that automates the process of determining what resource when allocated to which microservice is likely to have the greatest impact on application performance. We demonstrate the efficacy of our approach by applying ThrottleBot to both synthetic and real world applications. We believe that ThrottleBot when combined with existing microservice orchestrators, e.g., Kubernetes, enables push-button deployment of web scale applications.
△ Less
Submitted 2 November, 2017;
originally announced November 2017.
-
Abstract Interpretation of Stateful Networks
Authors:
Kalev Alpernas,
Roman Manevich,
Aurojit Panda,
Mooly Sagiv,
Scott Shenker,
Sharon Shoham,
Yaron Velner
Abstract:
Modern networks achieve robustness and scalability by maintaining states on their nodes. These nodes are referred to as middleboxes and are essential for network functionality. However, the presence of middleboxes drastically complicates the task of network verification. Previous work showed that the problem is undecidable in general and EXPSPACE-complete when abstracting away the order of packet…
▽ More
Modern networks achieve robustness and scalability by maintaining states on their nodes. These nodes are referred to as middleboxes and are essential for network functionality. However, the presence of middleboxes drastically complicates the task of network verification. Previous work showed that the problem is undecidable in general and EXPSPACE-complete when abstracting away the order of packet arrival.
We describe a new algorithm for conservatively checking isolation properties of stateful networks. The asymptotic complexity of the algorithm is polynomial in the size of the network, albeit being exponential in the maximal number of queries of the local state that a middlebox can do, which is often small.
Our algorithm is sound, i.e., it can never miss a violation of safety but may fail to verify some properties. The algorithm performs on-the fly abstract interpretation by (1) abstracting away the order of packet processing and the number of times each packet arrives, (2) abstracting away correlations between states of different middleboxes and channel contents, and (3) representing middlebox states by their effect on each packet separately, rather than taking into account the entire state space. We show that the abstractions do not lose precision when middleboxes may reset in any state. This is encouraging since many real middleboxes reset, e.g., after some session timeout is reached or due to hardware failure.
△ Less
Submitted 4 July, 2018; v1 submitted 19 August, 2017;
originally announced August 2017.
-
Black Holes and Random Matrices
Authors:
Jordan S. Cotler,
Guy Gur-Ari,
Masanori Hanada,
Joseph Polchinski,
Phil Saad,
Stephen H. Shenker,
Douglas Stanford,
Alexandre Streicher,
Masaki Tezuka
Abstract:
We argue that the late time behavior of horizon fluctuations in large anti-de Sitter (AdS) black holes is governed by the random matrix dynamics characteristic of quantum chaotic systems. Our main tool is the Sachdev-Ye-Kitaev (SYK) model, which we use as a simple model of a black hole. We use an analytically continued partition function $|Z(β+it)|^2$ as well as correlation functions as diagnostic…
▽ More
We argue that the late time behavior of horizon fluctuations in large anti-de Sitter (AdS) black holes is governed by the random matrix dynamics characteristic of quantum chaotic systems. Our main tool is the Sachdev-Ye-Kitaev (SYK) model, which we use as a simple model of a black hole. We use an analytically continued partition function $|Z(β+it)|^2$ as well as correlation functions as diagnostics. Using numerical techniques we establish random matrix behavior at late times. We determine the early time behavior exactly in a double scaling limit, giving us a plausible estimate for the crossover time to random matrix behavior. We use these ideas to formulate a conjecture about general large AdS black holes, like those dual to 4D super-Yang-Mills theory, giving a provisional estimate of the crossover time. We make some preliminary comments about challenges to understanding the late time dynamics from a bulk point of view.
△ Less
Submitted 28 August, 2018; v1 submitted 14 November, 2016;
originally announced November 2016.
-
Verifying Reachability in Networks with Mutable Datapaths
Authors:
Aurojit Panda,
Ori Lahav,
Katerina Argyraki,
Mooly Sagiv,
Scott Shenker
Abstract:
Recent work has made great progress in verifying the forwarding correctness of networks . However, these approaches cannot be used to verify networks containing middleboxes, such as caches and firewalls, whose forwarding behavior depends on previously observed traffic. We explore how to verify reachability properties for networks that include such "mutable datapath" elements. We want our verificat…
▽ More
Recent work has made great progress in verifying the forwarding correctness of networks . However, these approaches cannot be used to verify networks containing middleboxes, such as caches and firewalls, whose forwarding behavior depends on previously observed traffic. We explore how to verify reachability properties for networks that include such "mutable datapath" elements. We want our verification results to hold not just for the given network, but also in the presence of failures. The main challenge lies in scaling the approach to handle large and complicated networks, We address by develo** and leveraging the concept of slices, which allow network-wide verification to only require analyzing small portions of the network. We show that with slices the time required to verify an invariant on many production networks is independent of the size of the network itself.
△ Less
Submitted 4 July, 2016;
originally announced July 2016.
-
Recursive SDN for Carrier Networks
Authors:
James McCauley,
Zhi Liu,
Aurojit Panda,
Teemu Koponen,
Barath Raghavan,
Jennifer Rexford,
Scott Shenker
Abstract:
Control planes for global carrier networks should be programmable (so that new functionality can be easily introduced) and scalable (so they can handle the numerical scale and geographic scope of these networks). Neither traditional control planes nor new SDN-based control planes meet both of these goals. In this paper, we propose a framework for recursive routing computations that combines the be…
▽ More
Control planes for global carrier networks should be programmable (so that new functionality can be easily introduced) and scalable (so they can handle the numerical scale and geographic scope of these networks). Neither traditional control planes nor new SDN-based control planes meet both of these goals. In this paper, we propose a framework for recursive routing computations that combines the best of SDN (programmability) and traditional networks (scalability through hierarchy) to achieve these two desired properties. Through simulation on graphs of up to 10,000 nodes, we evaluate our design's ability to support a variety of routing and traffic engineering solutions, while incorporating a fast failure recovery mechanism.
△ Less
Submitted 25 May, 2016;
originally announced May 2016.
-
Chaos in Classical D0-Brane Mechanics
Authors:
Guy Gur-Ari,
Masanori Hanada,
Stephen H. Shenker
Abstract:
We study chaos in the classical limit of the matrix quantum mechanical system describing D0-brane dynamics. We determine a precise value of the largest Lyapunov exponent, and, with less precision, calculate the entire spectrum of Lyapunov exponents. We verify that these approach a smooth limit as $N \rightarrow \infty$. We show that a classical analog of scrambling occurs with fast scrambling scal…
▽ More
We study chaos in the classical limit of the matrix quantum mechanical system describing D0-brane dynamics. We determine a precise value of the largest Lyapunov exponent, and, with less precision, calculate the entire spectrum of Lyapunov exponents. We verify that these approach a smooth limit as $N \rightarrow \infty$. We show that a classical analog of scrambling occurs with fast scrambling scaling, $t_* \sim \log S$. These results confirm the k-locality property of matrix mechanics discussed by Sekino and Susskind.
△ Less
Submitted 13 January, 2016; v1 submitted 30 November, 2015;
originally announced December 2015.
-
Universal Packet Scheduling
Authors:
Radhika Mittal,
Rachit Agarwal,
Sylvia Ratnasamy,
Scott Shenker
Abstract:
In this paper we address a seemingly simple question: Is there a universal packet scheduling algorithm? More precisely, we analyze (both theoretically and empirically) whether there is a single packet scheduling algorithm that, at a network-wide level, can match the results of any given scheduling algorithm. We find that in general the answer is "no". However, we show theoretically that the classi…
▽ More
In this paper we address a seemingly simple question: Is there a universal packet scheduling algorithm? More precisely, we analyze (both theoretically and empirically) whether there is a single packet scheduling algorithm that, at a network-wide level, can match the results of any given scheduling algorithm. We find that in general the answer is "no". However, we show theoretically that the classical Least Slack Time First (LSTF) scheduling algorithm comes closest to being universal and demonstrate empirically that LSTF can closely, though not perfectly, replay a wide range of scheduling algorithms in realistic network settings. We then evaluate whether LSTF can be used {\em in practice} to meet various network-wide objectives by looking at three popular performance metrics (mean FCT, tail packet delays, and fairness); we find that LSTF performs comparable to the state-of-the-art for each of them.
△ Less
Submitted 13 October, 2015;
originally announced October 2015.
-
A bound on chaos
Authors:
Juan Maldacena,
Stephen H. Shenker,
Douglas Stanford
Abstract:
We conjecture a sharp bound on the rate of growth of chaos in thermal quantum systems with a large number of degrees of freedom. Chaos can be diagnosed using an out-of-time-order correlation function closely related to the commutator of operators separated in time. We conjecture that the influence of chaos on this correlator can develop no faster than exponentially, with Lyapunov exponent…
▽ More
We conjecture a sharp bound on the rate of growth of chaos in thermal quantum systems with a large number of degrees of freedom. Chaos can be diagnosed using an out-of-time-order correlation function closely related to the commutator of operators separated in time. We conjecture that the influence of chaos on this correlator can develop no faster than exponentially, with Lyapunov exponent $λ_L \le 2 πk_B T/\hbar$. We give a precise mathematical argument, based on plausible physical assumptions, establishing this conjecture.
△ Less
Submitted 4 March, 2015;
originally announced March 2015.
-
Stringy effects in scrambling
Authors:
Stephen H. Shenker,
Douglas Stanford
Abstract:
In [1] we gave a precise holographic calculation of chaos at the scrambling time scale. We studied the influence of a small perturbation, long in the past, on a two-sided correlation function in the thermofield double state. A similar analysis applies to squared commutators and other out-of-time-order one-sided correlators [2-4]. The essential bulk physics is a high energy scattering problem near…
▽ More
In [1] we gave a precise holographic calculation of chaos at the scrambling time scale. We studied the influence of a small perturbation, long in the past, on a two-sided correlation function in the thermofield double state. A similar analysis applies to squared commutators and other out-of-time-order one-sided correlators [2-4]. The essential bulk physics is a high energy scattering problem near the horizon of an AdS black hole. The above papers used Einstein gravity to study this problem; in the present paper we consider stringy and Planckian corrections. Elastic stringy corrections play an important role, effectively weakening and smearing out the development of chaos. We discuss their signature in the boundary field theory, commenting on the extension to weak coupling. Inelastic effects, although important for the evolution of the state, leave a parametrically small imprint on the correlators that we study. We briefly discuss ways to diagnose these small corrections, and we propose another correlator where inelastic effects are order one.
△ Less
Submitted 20 March, 2015; v1 submitted 18 December, 2014;
originally announced December 2014.
-
Verifying Isolation Properties in the Presence of Middleboxes
Authors:
Aurojit Panda,
Ori Lahav,
Katerina Argyraki,
Mooly Sagiv,
Scott Shenker
Abstract:
Great progress has been made recently in verifying the correctness of router forwarding tables. However, these approaches do not work for networks containing middleboxes such as caches and firewalls whose forwarding behavior depends on previously observed traffic. We explore how to verify isolation properties in networks that include such "dynamic datapath" elements using model checking. Our work…
▽ More
Great progress has been made recently in verifying the correctness of router forwarding tables. However, these approaches do not work for networks containing middleboxes such as caches and firewalls whose forwarding behavior depends on previously observed traffic. We explore how to verify isolation properties in networks that include such "dynamic datapath" elements using model checking. Our work leverages recent advances in SMT solvers, and the main challenge lies in scaling the approach to handle large and complicated networks. While the straightforward application of model checking to this problem can only handle very small networks (if at all), our approach can verify simple realistic invariants on networks containing 30,000 middleboxes in a few minutes.
△ Less
Submitted 25 September, 2014;
originally announced September 2014.
-
Exploring the Limits of Static Failover Routing
Authors:
Marco Chiesa,
Andrei Gurtov,
Aleksander Mądry,
Slobodan Mitrović,
Ilya Nikolaevkiy,
Aurojit Panda,
Michael Schapira,
Scott Shenker
Abstract:
We present and study the Static-Routing-Resiliency problem, motivated by routing on the Internet: Given a graph $G$, a unique destination vertex $d$, and an integer constant $c>0$, does there exist a static and destination-based routing scheme such that the correct delivery of packets from any source $s$ to the destination $d$ is guaranteed so long as (1) no more than $c$ edges fail and (2) there…
▽ More
We present and study the Static-Routing-Resiliency problem, motivated by routing on the Internet: Given a graph $G$, a unique destination vertex $d$, and an integer constant $c>0$, does there exist a static and destination-based routing scheme such that the correct delivery of packets from any source $s$ to the destination $d$ is guaranteed so long as (1) no more than $c$ edges fail and (2) there exists a physical path from $s$ to $d$? We embark upon a systematic exploration of this fundamental question in a variety of models (deterministic routing, randomized routing, with packet-duplication, with packet-header-rewriting) and present both positive and negative results that relate the edge-connectivity of a graph, i.e., the minimum number of edges whose deletion partitions $G$, to its resiliency.
△ Less
Submitted 27 July, 2016; v1 submitted 29 August, 2014;
originally announced September 2014.
-
Multiple Shocks
Authors:
Stephen H. Shenker,
Douglas Stanford
Abstract:
Using gauge/gravity duality, we explore a class of states of two CFTs with a large degree of entanglement, but with very weak local two-sided correlation. These states are constructed by perturbing the thermofield double state with thermal-scale operators that are local at different times. Acting on the dual black hole geometry, these perturbations create an intersecting network of shock waves, su…
▽ More
Using gauge/gravity duality, we explore a class of states of two CFTs with a large degree of entanglement, but with very weak local two-sided correlation. These states are constructed by perturbing the thermofield double state with thermal-scale operators that are local at different times. Acting on the dual black hole geometry, these perturbations create an intersecting network of shock waves, supporting a very long wormhole. Chaotic CFT dynamics and the associated fast scrambling time play an essential role in determining the qualitative features of the resulting geometries.
△ Less
Submitted 21 April, 2014; v1 submitted 11 December, 2013;
originally announced December 2013.
-
Topology of Future Infinity in dS/CFT
Authors:
Shamik Banerjee,
Alexandre Belin,
Simeon Hellerman,
Arnaud Lepage-Jutier,
Alexander Maloney,
Djordje Radicevic,
Stephen Shenker
Abstract:
The dS/CFT proposal of Anninos, Hartman, and Strominger relates quantum Vasiliev gravity in dS_4 to a large N vector theory in three dimensions. We use this proposal to compute the Wheeler-de Witt wave function of a universe having a particular topology at future infinity. This amplitude is found to grow rapidly with the topological complexity of the spatial slice; this is due to the plethora of s…
▽ More
The dS/CFT proposal of Anninos, Hartman, and Strominger relates quantum Vasiliev gravity in dS_4 to a large N vector theory in three dimensions. We use this proposal to compute the Wheeler-de Witt wave function of a universe having a particular topology at future infinity. This amplitude is found to grow rapidly with the topological complexity of the spatial slice; this is due to the plethora of states of the Chern-Simons theory that is needed to impose the singlet constraint. Various mechanisms are considered which might ameliorate this growth, but none seems completely satisfactory. We also study the topology dependence in Einstein gravity by computing the action of complex instantons; the wave function then depends on a choice of contour through the space of metrics. The most natural contour prescription leads to a growth with genus similar to the one found in Vasiliev theory, albeit with a different power of Newton's constant.
△ Less
Submitted 27 June, 2013;
originally announced June 2013.
-
Low latency via redundancy
Authors:
Ashish Vulimiri,
P. Brighten Godfrey,
Radhika Mittal,
Justine Sherry,
Sylvia Ratnasamy,
Scott Shenker
Abstract:
Low latency is critical for interactive networked applications. But while we know how to scale systems to increase capacity, reducing latency --- especially the tail of the latency distribution --- can be much more difficult. In this paper, we argue that the use of redundancy is an effective way to convert extra capacity into reduced latency. By initiating redundant operations across diverse resou…
▽ More
Low latency is critical for interactive networked applications. But while we know how to scale systems to increase capacity, reducing latency --- especially the tail of the latency distribution --- can be much more difficult. In this paper, we argue that the use of redundancy is an effective way to convert extra capacity into reduced latency. By initiating redundant operations across diverse resources and using the first result which completes, redundancy improves a system's latency even under exceptional conditions. We study the tradeoff with added system utilization, characterizing the situations in which replicating all tasks reduces mean latency. We then demonstrate empirically that replicating all operations can result in significant mean and tail latency reduction in real-world systems including DNS queries, database servers, and packet forwarding within networks.
△ Less
Submitted 16 June, 2013;
originally announced June 2013.
-
A cost-benefit analysis of low latency via added utilization
Authors:
Ashish Vulimiri,
P. Brighten Godfrey,
Sri Varsha Gorge,
Zitian Liu,
Scott Shenker
Abstract:
Several recently proposed techniques achieve latency reduction by trading it off for some amount of additional bandwidth usage. But how would one quantify whether the tradeoff is actually beneficial in a given system? We develop an economic cost vs. benefit analysis for answering this question. We use the analysis to derive a benchmark for wide-area client-server applications, and demonstrate how…
▽ More
Several recently proposed techniques achieve latency reduction by trading it off for some amount of additional bandwidth usage. But how would one quantify whether the tradeoff is actually beneficial in a given system? We develop an economic cost vs. benefit analysis for answering this question. We use the analysis to derive a benchmark for wide-area client-server applications, and demonstrate how it can be applied to reason about a particular latency saving technique --- redundant DNS requests.
△ Less
Submitted 4 December, 2014; v1 submitted 14 June, 2013;
originally announced June 2013.
-
Black holes and the butterfly effect
Authors:
Stephen H. Shenker,
Douglas Stanford
Abstract:
We use holography to study sensitive dependence on initial conditions in strongly coupled field theories. Specifically, we mildly perturb a thermofield double state by adding a small number of quanta on one side. If these quanta are released a scrambling time in the past, they destroy the local two-sided correlations present in the unperturbed state. The corresponding bulk geometry is a two-sided…
▽ More
We use holography to study sensitive dependence on initial conditions in strongly coupled field theories. Specifically, we mildly perturb a thermofield double state by adding a small number of quanta on one side. If these quanta are released a scrambling time in the past, they destroy the local two-sided correlations present in the unperturbed state. The corresponding bulk geometry is a two-sided AdS black hole, and the key effect is the blueshift of the early infalling quanta relative to the $t = 0$ slice, creating a shock wave. We comment on string- and Planck-scale corrections to this setup, and discuss points that may be relevant to the firewall controversy.
△ Less
Submitted 21 April, 2014; v1 submitted 3 June, 2013;
originally announced June 2013.
-
Shark: SQL and Rich Analytics at Scale
Authors:
Reynold Xin,
Josh Rosen,
Matei Zaharia,
Michael J. Franklin,
Scott Shenker,
Ion Stoica
Abstract:
Shark is a new data analysis system that marries query processing with complex analytics on large clusters. It leverages a novel distributed memory abstraction to provide a unified engine that can run SQL queries and sophisticated analytics functions (e.g., iterative machine learning) at scale, and efficiently recovers from failures mid-query. This allows Shark to run SQL queries up to 100x faster…
▽ More
Shark is a new data analysis system that marries query processing with complex analytics on large clusters. It leverages a novel distributed memory abstraction to provide a unified engine that can run SQL queries and sophisticated analytics functions (e.g., iterative machine learning) at scale, and efficiently recovers from failures mid-query. This allows Shark to run SQL queries up to 100x faster than Apache Hive, and machine learning programs up to 100x faster than Hadoop. Unlike previous systems, Shark shows that it is possible to achieve these speedups while retaining a MapReduce-like execution engine, and the fine-grained fault tolerance properties that such engines provide. It extends such an engine in several ways, including column-oriented in-memory storage and dynamic mid-query replanning, to effectively execute SQL. The result is a system that matches the speedups reported for MPP analytic databases over MapReduce, while offering fault tolerance properties and complex analytics capabilities that they lack.
△ Less
Submitted 26 November, 2012;
originally announced November 2012.
-
Smoothed Transitions in Higher Spin AdS Gravity
Authors:
Shamik Banerjee,
Alejandra Castro,
Simeon Hellerman,
Eliot Hijano,
Arnaud Lepage-Jutier,
Alexander Maloney,
Stephen Shenker
Abstract:
We consider CFTs conjectured to be dual to higher spin theories of gravity in AdS_3 and AdS_4. Two dimensional CFTs with W_N symmetry are considered in the lambda=0 (k --> infinity) limit, where they are conjectured to be described by continuous orbifolds. The torus partition function is computed, using reasonable assumptions, and equals that of a free field theory. We find no phase transition at…
▽ More
We consider CFTs conjectured to be dual to higher spin theories of gravity in AdS_3 and AdS_4. Two dimensional CFTs with W_N symmetry are considered in the lambda=0 (k --> infinity) limit, where they are conjectured to be described by continuous orbifolds. The torus partition function is computed, using reasonable assumptions, and equals that of a free field theory. We find no phase transition at temperatures of order one; the usual Hawking-Page phase transition is removed by the highly degenerate light states associated with conical defect states in the bulk. Three dimensional Chern-Simons-matter CFTs with vector-like matter are considered on T^3, where the dynamics is described by an effective theory for the eigenvalues of the holonomies. Likewise, we find no evidence for a Hawking-Page phase transition at large level k.
△ Less
Submitted 10 October, 2012; v1 submitted 24 September, 2012;
originally announced September 2012.
-
Light States in Chern-Simons Theory Coupled to Fundamental Matter
Authors:
Shamik Banerjee,
Simeon Hellerman,
Jonathan Maltz,
Stephen H. Shenker
Abstract:
Motivated by developments in vectorlike holography, we study SU(N) Chern-Simons theory coupled to matter fields in the fundamental representation on various spatial manifolds. On the spatial torus T^2, we find light states at small `t Hooft coupling λ=N/k, where k is the Chern-Simons level, taken to be large. In the free scalar theory the gaps are of order \sqrt λ/N and in the critical scalar theo…
▽ More
Motivated by developments in vectorlike holography, we study SU(N) Chern-Simons theory coupled to matter fields in the fundamental representation on various spatial manifolds. On the spatial torus T^2, we find light states at small `t Hooft coupling λ=N/k, where k is the Chern-Simons level, taken to be large. In the free scalar theory the gaps are of order \sqrt λ/N and in the critical scalar theory and the free fermion theory they are of order λ/N. The entropy of these states grows like N Log(k). We briefly consider spatial surfaces of higher genus. Based on results from pure Chern-Simons theory, it appears that there are light states with entropy that grows even faster, like N^2 Log(k). This is consistent with the log of the partition function on the three sphere S^3, which also behaves like N^2 Log(k). These light states require bulk dynamics beyond standard Vasiliev higher spin gravity to explain them.
△ Less
Submitted 28 November, 2012; v1 submitted 17 July, 2012;
originally announced July 2012.
-
On the Resilience of Routing Tables
Authors:
Joan Feigenbaum,
Brighten Godfrey,
Aurojit Panda,
Michael Schapira,
Scott Shenker,
Ankit Singla
Abstract:
Many modern network designs incorporate "failover" paths into routers' forwarding tables. We initiate the theoretical study of the conditions under which such resilient routing tables can guarantee delivery of packets.
Many modern network designs incorporate "failover" paths into routers' forwarding tables. We initiate the theoretical study of the conditions under which such resilient routing tables can guarantee delivery of packets.
△ Less
Submitted 3 August, 2012; v1 submitted 16 July, 2012;
originally announced July 2012.
-
The Three Faces of a Fixed Point
Authors:
Daniel Harlow,
Stephen H. Shenker,
Douglas Stanford,
Leonard Susskind
Abstract:
It has been argued that the only mathematically precise quantum descriptions of gravitating systems are from vantage points which allow an unbounded amount of information to be gathered. For an eternally inflating universe that means a hat, i.e., the asymptotic future of a flat FRW universe. The boundary of the hat (the place where it enters the bulk geometry) is the seat of the FRW/CFT duality. I…
▽ More
It has been argued that the only mathematically precise quantum descriptions of gravitating systems are from vantage points which allow an unbounded amount of information to be gathered. For an eternally inflating universe that means a hat, i.e., the asymptotic future of a flat FRW universe. The boundary of the hat (the place where it enters the bulk geometry) is the seat of the FRW/CFT duality. In this paper we discuss the perturbative and non-perturbative fixed points of FRW/CFT as seen from the three regions which share this boundary.
Perturbatively, there is nothing universal about the FRW duality; there is a separate construction for each possible initial vacuum. We explain how bubble collisions induce a non-perturbative flow to a universal fixed point which contains information about the entire landscape. We also argue that there is a duality between the landscape of de Sitter vacua and a discretuum of very low-dimension relevant operators in the FRW/CFT spectrum. In principle this provides us with a precise definition of unstable de Sitter vacua.
Along the way we show that BPS domain walls play a special role in reinforcing the "persistence of memory" and breaking the symmetries of the hat.
△ Less
Submitted 26 March, 2012;
originally announced March 2012.
-
Slick Packets
Authors:
Giang T. K. Nguyen,
Rachit Agarwal,
Junda Liu,
Matthew Caesar,
P. Brighten Godfrey,
Scott Shenker
Abstract:
Source-controlled routing has been proposed as a way to improve flexibility of future network architectures, as well as simplifying the data plane. However, if a packet specifies its path, this precludes fast local re-routing within the network. We propose SlickPackets, a novel solution that allows packets to slip around failures by specifying alternate paths in their headers, in the form of compa…
▽ More
Source-controlled routing has been proposed as a way to improve flexibility of future network architectures, as well as simplifying the data plane. However, if a packet specifies its path, this precludes fast local re-routing within the network. We propose SlickPackets, a novel solution that allows packets to slip around failures by specifying alternate paths in their headers, in the form of compactly-encoded directed acyclic graphs. We show that this can be accomplished with reasonably small packet headers for real network topologies, and results in responsiveness to failures that is competitive with past approaches that require much more state within the network. Our approach thus enables fast failure response while preserving the benefits of source-controlled routing.
△ Less
Submitted 8 January, 2012;
originally announced January 2012.
-
Faster and More Accurate Sequence Alignment with SNAP
Authors:
Matei Zaharia,
William J. Bolosky,
Kristal Curtis,
Armando Fox,
David Patterson,
Scott Shenker,
Ion Stoica,
Richard M. Karp,
Taylor Sittler
Abstract:
We present the Scalable Nucleotide Alignment Program (SNAP), a new short and long read aligner that is both more accurate (i.e., aligns more reads with fewer errors) and 10-100x faster than state-of-the-art tools such as BWA. Unlike recent aligners based on the Burrows-Wheeler transform, SNAP uses a simple hash index of short seed sequences from the genome, similar to BLAST's. However, SNAP greatl…
▽ More
We present the Scalable Nucleotide Alignment Program (SNAP), a new short and long read aligner that is both more accurate (i.e., aligns more reads with fewer errors) and 10-100x faster than state-of-the-art tools such as BWA. Unlike recent aligners based on the Burrows-Wheeler transform, SNAP uses a simple hash index of short seed sequences from the genome, similar to BLAST's. However, SNAP greatly reduces the number and cost of local alignment checks performed through several measures: it uses longer seeds to reduce the false positive locations considered, leverages larger memory capacities to speed index lookup, and excludes most candidate locations without fully computing their edit distance to the read. The result is an algorithm that scales well for reads from one hundred to thousands of bases long and provides a rich error model that can match classes of mutations (e.g., longer indels) that today's fast aligners ignore. We calculate that SNAP can align a dataset with 30x coverage of a human genome in less than an hour for a cost of $2 on Amazon EC2, with higher accuracy than BWA. Finally, we describe ongoing work to further improve SNAP.
△ Less
Submitted 23 November, 2011;
originally announced November 2011.
-
Eternal Symmetree
Authors:
Daniel Harlow,
Stephen Shenker,
Douglas Stanford,
Leonard Susskind
Abstract:
In this paper we introduce a simple discrete stochastic model of eternal inflation that shares many of the most important features of the continuum theory as it is now understood. The model allows us to construct a multiverse and rigorously analyze its properties. Although simple and easy to solve, it has a rich mathematical structure underlying it. Despite the discreteness of the space-time the t…
▽ More
In this paper we introduce a simple discrete stochastic model of eternal inflation that shares many of the most important features of the continuum theory as it is now understood. The model allows us to construct a multiverse and rigorously analyze its properties. Although simple and easy to solve, it has a rich mathematical structure underlying it. Despite the discreteness of the space-time the theory exhibits an unexpected non-perturbative analog of conformal symmetry that acts on the boundary of the geometry. The symmetry is rooted in the mathematical properties of trees, p-adic numbers, and ultrametric spaces; and in the physical property of detailed balance. We provide self-contained elementary explanations of the unfamiliar mathematical concepts, which have have also appeared in the study of the p-adic string.
The symmetry acts on a huge collection of very low dimensional "multiverse fields" that are not associated with the usual perturbative degrees of freedom. They are connected with the late-time statistical distribution of bubble-universes in the multiverse.
The conformal symmetry which acts on the multiverse fields is broken by the existence of terminal decays - to hats or crunches - but in a particularly simple way. We interpret this symmetry breaking as giving rise to an arrow of time.
The model is used to calculate statistical correlations at late time and to discuss the measure problem. We show that the natural cutoff in the model is the analog of the so-called light-cone-time cutoff. Applying the model to the problem of the cosmological constant, we find agreement with earlier work.
△ Less
Submitted 15 March, 2012; v1 submitted 3 October, 2011;
originally announced October 2011.
-
Vector Models in the Singlet Sector at Finite Temperature
Authors:
Stephen H. Shenker,
Xi Yin
Abstract:
We study the thermal properties of the O(N) vector-like scalar theory in the singlet sector in 2+1 dimensions. This theory is conjectured to be the AdS/CFT dual of Vasiliev higher spin gravity. We find that a large N transition occurs but only at a very high temperature of order \sqrt{N}. This corresponds to the bulk Planck energy. The transition signals a decrease in the number of degrees of free…
▽ More
We study the thermal properties of the O(N) vector-like scalar theory in the singlet sector in 2+1 dimensions. This theory is conjectured to be the AdS/CFT dual of Vasiliev higher spin gravity. We find that a large N transition occurs but only at a very high temperature of order \sqrt{N}. This corresponds to the bulk Planck energy. The transition signals a decrease in the number of degrees of freedom from that expected in the simple higher spin gas, due to relations among the O(N) bilinear invariants.
△ Less
Submitted 15 September, 2011;
originally announced September 2011.
-
On the Topological Phases of Eternal Inflation
Authors:
Yasuhiro Sekino,
Stephen Shenker,
Leonard Susskind
Abstract:
Eternal inflation is a term that describes a number of different phenomena which have been classified by Winitzki. According to Winitzki's classification these phases can be characterized by the topology of the percolating structures in the inflating, "white," region. In this paper we discuss these phases, the transitions between them, and the way they are seen by a "Census Taker"; a hypothetica…
▽ More
Eternal inflation is a term that describes a number of different phenomena which have been classified by Winitzki. According to Winitzki's classification these phases can be characterized by the topology of the percolating structures in the inflating, "white," region. In this paper we discuss these phases, the transitions between them, and the way they are seen by a "Census Taker"; a hypothetical observer inside the non-inflating, "black," region. We discuss three phases that we call, "black island," "tubular," and "white island." The black island phase is familiar, comprised of rare Coleman De Luccia bubble nucleation events. The Census Taker sees an essentially spherical boundary, described by the conformal field theory of the FRW/CFT correspondence. In the tubular phase the Census Taker sees a complicated infinite genus structure composed of arbitrarily long tubes. The white island phase is even more mysterious from the black side. Surprisingly, when viewed from the non-inflating region this phase resembles a closed, positively curved universe which eventually collapses to a singularity. Nevertheless, pockets of eternal inflation continue forever. In addition there is an "aborted" phase in which no eternal inflation takes place. Rigorous results of Chayes, Chayes, Grannan and Swindle establish the existence of all of these phases, separated by first order transitions, in Mandelbrot percolation, a simple model of eternal inflation.
△ Less
Submitted 8 April, 2010; v1 submitted 5 March, 2010;
originally announced March 2010.
-
Future Foam
Authors:
Raphael Bousso,
Ben Freivogel,
Yasuhiro Sekino,
Stephen Shenker,
Leonard Susskind,
I-Sheng Yang,
Chen-Pin Yeh
Abstract:
We study pocket universes which have zero cosmological constant and non-trivial boundary topology. These arise from bubble collisions in eternal inflation. Using a simplified dust model of collisions we find that boundaries of any genus can occur. Using a radiation shell model we perform analytic studies in the thin wall limit to show the existence of geometries with a single toroidal boundary.…
▽ More
We study pocket universes which have zero cosmological constant and non-trivial boundary topology. These arise from bubble collisions in eternal inflation. Using a simplified dust model of collisions we find that boundaries of any genus can occur. Using a radiation shell model we perform analytic studies in the thin wall limit to show the existence of geometries with a single toroidal boundary. We give plausibility arguments that higher genus boundaries can also occur. In geometries with one boundary of any genus a timelike observer can see the entire boundary. Geometries with multiple disconnected boundaries can also occur. In the spherical case with two boundaries the boundaries are separated by a horizon. Our results suggest that the holographic dual description for eternal inflation, proposed by Freivogel, Sekino, Susskind and Yeh, should include summation over the genus of the base space of the dual conformal field theory. We point out peculiarities of this genus expansion compared to the string perturbation series.
△ Less
Submitted 11 July, 2008;
originally announced July 2008.
-
Viscosity Bound and Causality Violation
Authors:
Mauro Brigante,
Hong Liu,
Robert C. Myers,
Stephen Shenker,
Sho Yaida
Abstract:
In recent work we showed that, for a class of conformal field theories (CFT) with Gauss-Bonnet gravity dual, the shear viscosity to entropy density ratio, $η/s$, could violate the conjectured Kovtun-Starinets-Son viscosity bound, $η/s\geq1/4π$. In this paper we argue, in the context of the same model, that tuning $η/s$ below $(16/25)(1/4π)$ induces microcausality violation in the CFT, rendering…
▽ More
In recent work we showed that, for a class of conformal field theories (CFT) with Gauss-Bonnet gravity dual, the shear viscosity to entropy density ratio, $η/s$, could violate the conjectured Kovtun-Starinets-Son viscosity bound, $η/s\geq1/4π$. In this paper we argue, in the context of the same model, that tuning $η/s$ below $(16/25)(1/4π)$ induces microcausality violation in the CFT, rendering the theory inconsistent. This is a concrete example in which inconsistency of a theory and a lower bound on viscosity are correlated, supporting the idea of a possible universal lower bound on $η/s$ for all consistent theories.
△ Less
Submitted 22 May, 2008; v1 submitted 22 February, 2008;
originally announced February 2008.
-
Viscosity Bound Violation in Higher Derivative Gravity
Authors:
Mauro Brigante,
Hong Liu,
Robert C. Myers,
Stephen Shenker,
Sho Yaida
Abstract:
Motivated by the vast string landscape, we consider the shear viscosity to entropy density ratio in conformal field theories dual to Einstein gravity with curvature square corrections. After field redefinitions these theories reduce to Gauss-Bonnet gravity, which has special properties that allow us to compute the shear viscosity nonperturbatively in the Gauss-Bonnet coupling. By tuning of the c…
▽ More
Motivated by the vast string landscape, we consider the shear viscosity to entropy density ratio in conformal field theories dual to Einstein gravity with curvature square corrections. After field redefinitions these theories reduce to Gauss-Bonnet gravity, which has special properties that allow us to compute the shear viscosity nonperturbatively in the Gauss-Bonnet coupling. By tuning of the coupling, the value of the shear viscosity to entropy density ratio can be adjusted to any positive value from infinity down to zero, thus violating the conjectured viscosity bound. At linear order in the coupling, we also check consistency of four different methods to calculate the shear viscosity, and we find that all of them agree. We search for possible pathologies associated with this class of theories violating the viscosity bound.
△ Less
Submitted 13 June, 2008; v1 submitted 5 December, 2007;
originally announced December 2007.
-
Volume Weighted Measures of Eternal Inflation in the Bousso-Polchinski Landscape
Authors:
Timothy Clifton,
Stephen Shenker,
Navin Sivanandam
Abstract:
We consider the cosmological dynamics associated with volume weighted measures of eternal inflation, in the Bousso-Polchinski model of the string theory landscape. We find that this measure predicts that observers are most likely to find themselves in low energy vacua with one flux considerably larger than the rest. Furthermore, it allows for a satisfactory anthropic explanation of the cosmologi…
▽ More
We consider the cosmological dynamics associated with volume weighted measures of eternal inflation, in the Bousso-Polchinski model of the string theory landscape. We find that this measure predicts that observers are most likely to find themselves in low energy vacua with one flux considerably larger than the rest. Furthermore, it allows for a satisfactory anthropic explanation of the cosmological constant problem by producing a smooth, and approximately constant, distribution of potentially observable values of Lambda. The low energy vacua selected by this measure are often short lived. If we require anthropically acceptable vacua to have a minimum life-time of 10 billion years, then for reasonable parameters a typical observer should expect their vacuum to have a life-time of approximately 12 billion years. This prediction is model dependent, but may point toward a solution to the coincidence problem of cosmology.
△ Less
Submitted 21 June, 2007;
originally announced June 2007.
-
Colliding with a Crunching Bubble
Authors:
Ben Freivogel,
Gary T. Horowitz,
Stephen Shenker
Abstract:
In the context of eternal inflation we discuss the fate of Lambda = 0 bubbles when they collide with Lambda < 0 crunching bubbles. When the Lambda = 0 bubble is supersymmetric, it is not completely destroyed by collisions. If the domain wall separating the bubbles has higher tension than the BPS bound, it is expelled from the Lambda = 0 bubble and does not alter its long time behavior. If the do…
▽ More
In the context of eternal inflation we discuss the fate of Lambda = 0 bubbles when they collide with Lambda < 0 crunching bubbles. When the Lambda = 0 bubble is supersymmetric, it is not completely destroyed by collisions. If the domain wall separating the bubbles has higher tension than the BPS bound, it is expelled from the Lambda = 0 bubble and does not alter its long time behavior. If the domain wall saturates the BPS bound, then it stays inside the Lambda = 0 bubble and removes a finite fraction of future infinity. In this case, the crunch singularity is hidden behind the horizon of a stable hyperbolic black hole.
△ Less
Submitted 15 March, 2007;
originally announced March 2007.
-
Inflation in AdS/CFT
Authors:
Ben Freivogel,
Veronika E. Hubeny,
Alexander Maloney,
Robert C. Myers,
Mukund Rangamani,
Stephen Shenker
Abstract:
We study the AdS/CFT correspondence as a probe of inflation. We assume the existence of a string landscape containing at least one stable AdS vacuum and a (nearby) metastable de Sitter state. Standard arguments imply that the bulk physics in the vicinity of the AdS minimum is described by a boundary CFT. We argue that large enough bubbles of the dS phase, including those able to inflate, are des…
▽ More
We study the AdS/CFT correspondence as a probe of inflation. We assume the existence of a string landscape containing at least one stable AdS vacuum and a (nearby) metastable de Sitter state. Standard arguments imply that the bulk physics in the vicinity of the AdS minimum is described by a boundary CFT. We argue that large enough bubbles of the dS phase, including those able to inflate, are described by mixed states in the CFT. Inflating degrees of freedom are traced over and do not appear explicitly in the boundary description. They nevertheless leave a distinct imprint on the mixed state. In the supergravity approximation, analytic continuation connects AdS/CFT correlators to dS/CFT correlators. This provides a framework for extracting further information as well. Our work also shows that no scattering process can create an inflating region, even by quantum tunneling, since a pure state can never evolve into a mixed state under unitary evolution.
△ Less
Submitted 2 March, 2006; v1 submitted 5 October, 2005;
originally announced October 2005.
-
D-Brane Instability as a Large N Phase Transition
Authors:
Lukasz Fidkowski,
Stephen Shenker
Abstract:
In AdS/CFT analyticity suggests that certain singular behaviors expected at large 't Hooft coupling should continue smoothly to weak 't Hooft coupling where the gauge theory is tractable. This may provide a window into stringy singularity resolution and is a promising technique for studying the signature of the black hole singularity discussed in hep-th/0306170. We comment briefly on its status.…
▽ More
In AdS/CFT analyticity suggests that certain singular behaviors expected at large 't Hooft coupling should continue smoothly to weak 't Hooft coupling where the gauge theory is tractable. This may provide a window into stringy singularity resolution and is a promising technique for studying the signature of the black hole singularity discussed in hep-th/0306170. We comment briefly on its status. Our main goal, though, is to study a simple example of this technique. Gross and Ooguri (hep-th/9805129) have pointed out that the D-brane minimal surface spanning a pair of 't Hooft loops undergoes a phase transition as the distance between the loops is varied. We find the analog of this behavior in the weakly coupled Super Yang Mills theory by computing 't Hooft loop expectation values there.
△ Less
Submitted 9 June, 2004;
originally announced June 2004.
-
Comments on Cosmic Censorship in AdS/CFT
Authors:
Veronika E. Hubeny,
Xiao Liu,
Mukund Rangamani,
Stephen Shenker
Abstract:
Recently Hertog, Horowitz, and Maeda (HHM) (hep-th/0310054) have proposed that cosmic censorship can be violated in the AdS/CFT context. They argue that for certain initial data there is insufficient energy available to make a black hole whose horizon is big enough to cloak the singularity that forms. We have investigated this proposal in the models HHM discuss and have thus far been unable to f…
▽ More
Recently Hertog, Horowitz, and Maeda (HHM) (hep-th/0310054) have proposed that cosmic censorship can be violated in the AdS/CFT context. They argue that for certain initial data there is insufficient energy available to make a black hole whose horizon is big enough to cloak the singularity that forms. We have investigated this proposal in the models HHM discuss and have thus far been unable to find initial data that provably satisfy this criterion, despite our development of an improved lower bound on the size of the singular region. This is consistent with recent numerical results (hep-th/0402109). For certain initial data, the energies of our configurations are not far above the lower bound on the requisite black hole mass, and so it is possible that in the exact time development naked singularities do form. We go on to argue that the finite radius cut-off AdS_5 situation discussed by HHM displays instabilities when the full 10D theory is considered. We propose an AdS_3 example that may well be free of this instability.
△ Less
Submitted 13 May, 2004; v1 submitted 21 March, 2004;
originally announced March 2004.