Tunneling: Difference between revisions

From Food & Medicine Encyclopedia

CSV import
 
No edit summary
 
(3 intermediate revisions by the same user not shown)
Line 46: Line 46:
{{Physics-stub}}
{{Physics-stub}}
{{Computer-science-stub}}
{{Computer-science-stub}}
{{No image}}

Latest revision as of 17:42, 18 March 2025

Tunneling is a process used in various fields such as engineering, physics, and computer science. It generally refers to the act of creating a passage or conduit through a barrier or medium.

Engineering[edit]

In civil engineering, tunneling refers to the construction of tunnels, which are underground passages used for transportation, utilities, or other purposes. Tunnels can be constructed using various methods, including cut-and-cover, boring, and drill and blast techniques.

Types of Tunnels[edit]

Construction Methods[edit]

  • Cut-and-cover: A method where a trench is excavated and then covered over after the tunnel is constructed.
  • Boring: Using a tunnel boring machine (TBM) to excavate the tunnel.
  • Drill and blast: Using explosives to break rock and create the tunnel passage.

Physics[edit]

In quantum mechanics, tunneling refers to the quantum phenomenon where particles pass through a potential barrier that they classically shouldn't be able to pass. This is a fundamental concept in the study of quantum mechanics and has applications in various technologies, including semiconductors and scanning tunneling microscopy.

Quantum Tunneling[edit]

Computer Science[edit]

In computer networking, tunneling refers to the practice of encapsulating one type of network protocol within another protocol. This is often used to create secure connections over public networks, such as the Internet.

Types of Tunneling Protocols[edit]

  • VPN: Uses tunneling to create secure connections over the internet.
  • IPsec: A suite of protocols for securing internet protocol (IP) communications by authenticating and encrypting each IP packet.
  • SSH: A protocol for secure remote login and other secure network services over an insecure network.

Related Pages[edit]