Figure 6.3.4. Critical point setup
in-context