Tunneling
Tunneling is a process used in various fields such as engineering, physics, and computer science. It generally refers to the act of creating a passage or conduit through a barrier or medium.
Engineering[edit]
In civil engineering, tunneling refers to the construction of tunnels, which are underground passages used for transportation, utilities, or other purposes. Tunnels can be constructed using various methods, including cut-and-cover, boring, and drill and blast techniques.
Types of Tunnels[edit]
- Transportation tunnel: Used for vehicular, rail, or pedestrian traffic.
- Utility tunnel: Used for carrying utilities such as water, sewage, or electrical cables.
- Service tunnel: Used for maintenance and service access.
Construction Methods[edit]
- Cut-and-cover: A method where a trench is excavated and then covered over after the tunnel is constructed.
- Boring: Using a tunnel boring machine (TBM) to excavate the tunnel.
- Drill and blast: Using explosives to break rock and create the tunnel passage.
Physics[edit]
In quantum mechanics, tunneling refers to the quantum phenomenon where particles pass through a potential barrier that they classically shouldn't be able to pass. This is a fundamental concept in the study of quantum mechanics and has applications in various technologies, including semiconductors and scanning tunneling microscopy.
Quantum Tunneling[edit]
- Quantum tunneling: The phenomenon where particles pass through a potential barrier.
- Tunneling diode: A type of diode that uses quantum tunneling to achieve fast switching speeds.
- Scanning tunneling microscope: A device that uses quantum tunneling to image surfaces at the atomic level.
Computer Science[edit]
In computer networking, tunneling refers to the practice of encapsulating one type of network protocol within another protocol. This is often used to create secure connections over public networks, such as the Internet.
Types of Tunneling Protocols[edit]
- VPN: Uses tunneling to create secure connections over the internet.
- IPsec: A suite of protocols for securing internet protocol (IP) communications by authenticating and encrypting each IP packet.
- SSH: A protocol for secure remote login and other secure network services over an insecure network.
Related Pages[edit]
- Tunnel
- Quantum mechanics
- Virtual Private Network
- Tunnel boring machine
- Scanning tunneling microscope

This article is a computer science stub. You can help WikiMD by expanding it!
Ad. Transform your life with W8MD's
GLP-1 weight loss injections special from $29.99


W8MD Medical Weight Loss, Sleep and Medspa offers physician-supervised medical weight loss programs: NYC medical weight loss Philadelphia medical weight loss
Affordable GLP-1 Weight Loss ShotsAffordable GLP-1 Weight Loss Shots
Budget GLP-1 injections NYC (insurance & self-pay options) Popular treatments:
- Semaglutide starting from $29.99/week
- Tirzepatide starting from $45.00/week
✔ Most insurances accepted for visits ✔ Prior authorization support when eligible
Start your physician weight loss NYC journey today:
📍 NYC: Brooklyn weight loss center 📍 Philadelphia: Philadelphia weight loss center
📞 Call: 718-946-5500 (NYC) | 215-676-2334 (Philadelphia)
Tags: Affordable GLP1 weight loss NYC, Wegovy NYC, Zepbound NYC, Philadelphia medical weight loss
|
WikiMD Medical Encyclopedia |
Medical Disclaimer: WikiMD is not a substitute for professional medical advice. The information on WikiMD is provided as an information resource only, may be incorrect, outdated or misleading, and is not to be used or relied on for any diagnostic or treatment purposes. Please consult your health care provider before making any healthcare decisions or for guidance about a specific medical condition. WikiMD expressly disclaims responsibility, and shall have no liability, for any damages, loss, injury, or liability whatsoever suffered as a result of your reliance on the information contained in this site. By visiting this site you agree to the foregoing terms and conditions, which may from time to time be changed or supplemented by WikiMD. If you do not agree to the foregoing terms and conditions, you should not enter or use this site. See full disclaimer.
Credits:Most images are courtesy of Wikimedia commons, and templates, categories Wikipedia, licensed under CC BY SA or similar.
Translate this page: - East Asian
中文,
日本,
한국어,
South Asian
हिन्दी,
தமிழ்,
తెలుగు,
Urdu,
ಕನ್ನಡ,
Southeast Asian
Indonesian,
Vietnamese,
Thai,
မြန်မာဘာသာ,
বাংলা
European
español,
Deutsch,
français,
Greek,
português do Brasil,
polski,
română,
русский,
Nederlands,
norsk,
svenska,
suomi,
Italian
Middle Eastern & African
عربى,
Turkish,
Persian,
Hebrew,
Afrikaans,
isiZulu,
Kiswahili,
Other
Bulgarian,
Hungarian,
Czech,
Swedish,
മലയാളം,
मराठी,
ਪੰਜਾਬੀ,
ગુજરાતી,
Portuguese,
Ukrainian

