The most important class of operators with closed range are the Fredholm
operators, where the four subspace picture is as clean as in finite
dimensions, even in non-reflexive spaces.
where T∣Z:Z→Range(T) is an isomorphism and dimW=codimRange(T).
Proof 1
(1) Since codimRange(T)<∞, there
exists a finite-dimensional subspace W⊂Y with Y=Range(T)+W. Define T~:X×W→Y by
T~(x,w)=Tx+w. This is bounded, linear, and surjective, so the open
mapping theorem gives T~ open. It follows that
Range(T) is closed. (Alternatively: any subspace of finite
codimension in a Banach space is closed.)
(2) From (1) and the closed range theorem, Range(T∗) is
closed. We have ker(T∗)=Range(T)⊥, so dimker(T∗)=codimRange(T)<∞. Similarly,
Range(T∗)=ker(T)⊥ (by the closed range theorem), so
codimRange(T∗)=dimker(T)<∞.
Therefore T∗ is Fredholm and ind(T∗)=codimRange(T)−dimker(T)=−ind(T).
(3) Follows from (1) and the closed range theorem.
(4) Every finite-dimensional subspace of a Banach space is complemented. So
ker(T) has a topological complement Z. The restriction T∣Z:Z→Range(T) is bounded, bijective, and between Banach spaces, so
the open mapping theorem makes it an isomorphism. The complement W exists
because Range(T) has finite codimension.
Remark 1 (Fredholm decomposition vs. Hilbert decomposition)
The Fredholm decomposition X=ker(T)⊕Z guarantees that some closed
complement Z exists (since ker(T) is finite-dimensional), but there are
infinitely many such Z. For example, if ker(T)=span{v}
in R2, then any line not parallel to v is a valid complement, and
each gives a different projection onto ker(T): the same vector x
decomposes differently depending on which Z we choose. Without an inner
product, no choice is preferred.
In a Hilbert space, the inner product singles out the orthogonal complement
Z=ker(T)⊥: the unique complement for which the projection is
self-adjoint (equivalently, the decomposition x=xker+xZ minimizes
∥xZ∥). The four subspace theorem identifies this canonical choice
concretely as ker(T)⊥=Range(T∗) — the
closure of what T∗ produces.
Despite the non-uniqueness of Z in a general Banach space, the Fredholm
decomposition still tells us that T is “almost invertible” up to a
finite-dimensional correction, regardless of the geometry of the ambient space.
The shift operators on ℓp (1≤p<∞) illustrate the index:
Right shiftR(x1,x2,…)=(0,x1,x2,…): injective, range has codimension 1. So ind(R)=0−1=−1.
Left shiftL(x1,x2,…)=(x2,x3,…): surjective, kernel is span{e1}. So ind(L)=1−0=1.
Note L=R∗ (under the natural pairing of ℓp and ℓq), confirming ind(L)=−ind(R). These are Fredholm on every ℓp, including the non-reflexive cases p=1 and p=∞.
Compact perturbation: If K:X→Y is compact, then T+K is Fredholm with ind(T+K)=ind(T).
Small perturbation: There exists ε>0 such that if ∥S∥<ε, then T+S is Fredholm with ind(T+S)=ind(T).
In particular, the Fredholm index is a topological invariant: it is constant on connected components of the set of Fredholm operators.
The stability theorem is why the Fredholm index matters: it is computable (often
by deformation to a simpler operator) and robust under perturbation. This makes
it the central tool in index theory, where one relates the analytic index of a
differential operator to topological data of the underlying manifold.
holds, since Range(T) is closed and ker(T∗)=Range(T)⊥ by Theorem 1. However, the
classical Fredholm alternative — the dichotomy that T is either bijective
or has a nontrivial kernel — requires ind(T)=0. When the
index is zero, dimker(T)=codimRange(T), so
injectivity and surjectivity are equivalent: either both hold (and T is
bijective) or neither does.
For nonzero index this dichotomy fails. The right shift R on ℓp
(Example 1) is injective but not surjective:
ker(R)={0} yet codimRange(R)=1. There
is no contradiction with the solvability condition — Rx=y is solvable if
and only if y⊥ker(R∗)=span{e1∗}, i.e., y1=0 — but the “either bijective or...” structure is lost.
When a solution exists, it is unique up to an element of ker(T): the general
solution is x=xp+∑i=1nαivi, where xp is any
particular solution, {v1,…,vn} is a basis of ker(T), and the
αi are arbitrary.
Proof 2
Tx=f is solvable iff f∈Range(T). Since T is
Fredholm, Range(T) is closed (Theorem 1),
so Range(T)=⊥ker(T∗) by
Theorem 1. Therefore f∈Range(T) iff
ψ(f)=0 for all ψ∈ker(T∗), which is equivalent to ψj(f)=0 for each basis element.
In PDE applications, the ψj are typically known explicitly (from the
symmetry or structure of the problem), and the solvability conditions take the
form of integral constraints on the data.
This is the classical compatibility condition: by the divergence theorem,
∫ΩΔudx=∫∂Ω∂n∂udS=0, so ∫Ωfdx=0 is necessary. Fredholm theory shows
it is also sufficient. When satisfied, the solution is unique up to an additive
constant.
The Fredholm index is ind(T)=1−1=0, but T is not
invertible. To obtain a well-posed problem, we must simultaneously impose a
constraint to select a unique solution (pin the constant) and add a degree of
freedom to absorb right-hand sides that violate the compatibility condition.
The idea is transparent: the functionals ℓj select a unique element of
ker(T) (by prescribing the “coordinates” cj), and the vectors ϕj
span a complement to Range(T), so the extra unknowns αj
allow us to absorb the component of y outside the range.
Theorem 3 (Invertibility of the bordered operator)
Let T:X→Y be Fredholm with ind(T)=0 and n=dimker(T). Let {v1,…,vn} be a basis of ker(T) and {ψ1,…,ψn}⊂Y∗ a basis of ker(T∗). Then the bordered
operator T is boundedly invertible if and only if:
The ℓj detect the kernel: the n×n matrix Mij=ℓi(vj) is invertible.
The ϕj complement the range: the n×n matrix Nij=ψi(ϕj) is invertible.
where T∣Z:Z→Range(T) is an isomorphism and W has
dimension n.
Injectivity. Suppose T(x,α)=(0,0). The second
component gives ℓj(x)=0 for all j. The first gives Tx=−∑αjϕj. Applying each ψi∈ker(T∗)=Range(T)⊥ to the first equation:
Since N is invertible by assumption (2), α=0. Therefore Tx=0, so
x∈ker(T). Writing x=∑βjvj, we have ℓi(x)=∑βjℓi(vj)=(Mβ)i=0. Since M is invertible by assumption
(1), β=0, hence x=0.
Surjectivity. Given (y,c)∈Y×Rn, we must find (x,α) such that Tx+∑αjϕj=y and ℓj(x)=cj.
Step 1. Decompose y=yR+yW with yR∈Range(T) and
yW∈W. Since {ψi} is a basis for Range(T)⊥,
the coordinates of yW relative to the ϕj are determined by ψi(y)=∑αjψi(ϕj), i.e., α=N−1(ψ1(y),…,ψn(y))T. With this choice, y−∑αjϕj∈Range(T).
Step 2. Since T∣Z is an isomorphism onto Range(T), there
exists a unique z∈Z with Tz=y−∑αjϕj.
Step 3. Set x=z+∑βjvj where β=M−1(c1−ℓ1(z),…,cn−ℓn(z))T. Then Tx=Tz=y−∑αjϕj and ℓi(x)=ℓi(z)+(Mβ)i=ci.
Bounded inverse.T is a bounded bijection between Banach
spaces, so the open mapping theorem gives a bounded inverse.
The conditions are easy to check in practice. Condition (1) says: the
constraints ℓj must be linearly independent when restricted to the
kernel. Condition (2) says: the vectors ϕj must be transverse to the
range, i.e., they span a complement. When T is self-adjoint (so ker(T)=ker(T∗)), a natural choice is ϕj=vj — use the kernel elements
themselves to span the cokernel complement.
has a unique solution (u,λ) for every f∈H1(Ω)∗. The
constraint pins the mean of u to zero, and the Lagrange multiplier λ=∣Ω∣1∫Ωfdx absorbs the mean of f.
Proof 4
That λ=∣Ω∣1∫Ωfdx follows by integrating the
first equation: −∫ΩΔudx+λ∣Ω∣=∫Ωfdx. By the divergence theorem and the Neumann condition, ∫ΩΔudx=∫∂Ω∂n∂udS=0,
so λ=∣Ω∣1∫Ωfdx.
The bordered system can be solved using T and T∗ as black boxes — we
never form the bordered matrix, only call the forward and adjoint solvers.
Consider the general bordered system
Step 1: Project f onto ker(T∗) to determine λ.
The right-hand side f∈Y decomposes as f=fR+f⊥ with fR∈Range(T) and f⊥∈ker(T∗). Apply ψ∈ker(T∗)=Range(T)⊥ to the first row: ψ(Tx+λϕ)=ψ(f). Since ψ(Tx)=(T∗ψ)(x)=0, this kills the
Range(T) component entirely and reads off the
ker(T∗) component:
The denominator ψ(ϕ)=0 is the transversality condition from
Theorem 3: ϕ is not in Range(T), so
ψ sees it. This works for anyf — the multiplier λ
absorbs whatever component of f lies outside Range(T).
Step 2: Solve in Range(T) for a particular solution.
By construction, f−λϕ has no ker(T∗) component: Step 1 chose
λ precisely so that f−λϕ∈Range(T).
The restriction T∣Z:Z→Range(T) is an isomorphism
(Theorem 1), so the black-box solver returns the unique
xp∈Z with
This is one call to the forward solver. The solution xp lies in the
complement Z of ker(T), but a general solver may return xp only up to
an element of ker(T) — the next step handles this.
Step 3: Project onto ker(T) using the constraint.
The general solution of the first row is x=xp+αv, decomposed
along X=ker(T)⊕Z. The parameter α is the ker(T)
component, which T cannot see. The second row ℓ(x)=c determines it:
The bordered operator technique is not limited to index-zero operators or to
self-adjoint problems. For a general Fredholm operator with ind(T)=k=0, one can still form a bordered system, but the sizes of Φ and
L differ: if dimker(T)=n and codimRange(T)=m (with n−m=k), then
is invertible under the analogous transversality and detection conditions. The
rectangular bordering reflects the dimensional mismatch measured by the index.