Figure 6.3.3. Critical point setup
in-context