Difference between revisions of "Edge template V1b"
(→Defense against 1. d6: dragging initial moves out of the collapsible section) |
(→... 5. f6: filling the section) |
||
Line 265: | Line 265: | ||
==== ... 5. f6 ==== | ==== ... 5. f6 ==== | ||
− | + | Red can start like this: | |
+ | |||
+ | <hexboard size="6x14" | ||
+ | coords="hide" | ||
+ | contents="E *:a1 E *:b1 E *:c1 E *:d1 R e1 E *:i1 E *:j1 E *:k1 E *:l1 E *:m1 E *:n1 E *:a2 E *:b2 E *:c2 E *:d2 R e2 E *:m2 E *:n2 E *:a3 E *:b3 E *:c3 R g3 E *:n3 E *:a4 E *:b4 R d4 E *:a5 B c5 B d5 R 2:e5 B 1:f6" | ||
+ | /> | ||
+ | |||
+ | Red now has these threats: | ||
+ | |||
+ | <hexboard size="6x14" | ||
+ | coords="hide" | ||
+ | contents="E *:a1 E *:b1 E *:c1 E *:d1 R e1 E *:i1 E *:j1 E *:k1 E *:l1 E *:m1 E *:n1 E *:a2 E *:b2 E *:c2 E *:d2 R e2 E *:m2 E *:n2 E *:a3 E *:b3 E *:c3 E +:d3 E +:e3 R g3 E *:n3 E *:a4 E *:b4 R d4 R 1:e4 E *:a5 B c5 B d5 R e5 E +:d6 E +:e6 B f6" | ||
+ | /> | ||
+ | |||
+ | and | ||
+ | |||
+ | <hexboard size="6x14" | ||
+ | coords="hide" | ||
+ | contents="E *:a1 E *:b1 E *:c1 E *:d1 R e1 E *:i1 E *:j1 E *:k1 E *:l1 E *:m1 E *:n1 E *:a2 E *:b2 E *:c2 E *:d2 R e2 R 1:f2 E +:g2 E *:m2 E *:n2 E *:a3 E *:b3 E *:c3 E +:f3 R g3 E *:n3 E *:a4 E *:b4 R d4 E +:f4 E +:g4 E +:h4 E *:a5 B c5 B d5 R e5 E +:f5 E +:g5 E +:h5 E +:d6 E +:e6 B f6 E +:g6 E +:h6" | ||
+ | /> | ||
+ | |||
+ | using [[Edge_template_IV2e|IV-2-e]]. | ||
+ | |||
+ | Blue has to play on the overlap: | ||
+ | |||
+ | <hexboard size="6x14" | ||
+ | coords="hide" | ||
+ | contents="E *:a1 E *:b1 E *:c1 E *:d1 R e1 E *:i1 E *:j1 E *:k1 E *:l1 E *:m1 E *:n1 E *:a2 E *:b2 E *:c2 E *:d2 R e2 E *:m2 E *:n2 E *:a3 E *:b3 E *:c3 R g3 E *:n3 E *:a4 E *:b4 R d4 E *:a5 B c5 B d5 R e5 E +:d6 E +:e6 B f6" | ||
+ | /> | ||
+ | |||
+ | First move: | ||
+ | |||
+ | <hexboard size="6x14" | ||
+ | coords="hide" | ||
+ | contents="E *:a1 E *:b1 E *:c1 E *:d1 R e1 E *:i1 E *:j1 E *:k1 E *:l1 E *:m1 E *:n1 E *:a2 E *:b2 E *:c2 E *:d2 R e2 R 4:f2 E *:m2 E *:n2 E *:a3 E *:b3 E *:c3 R g3 E *:n3 E *:a4 E *:b4 R d4 B 3:e4 B 5:f4 R 6:g4 E *:a5 B c5 B d5 R e5 B 7:f5 B 8:h5 B 1:d6 R 2:e6 B f6" | ||
+ | /> | ||
+ | |||
+ | You get the the defense against the other move by just swapping 1 and 2 in the diagram above. | ||
==== ... 5. g6 ==== | ==== ... 5. g6 ==== |
Revision as of 09:00, 25 May 2016
Contents
The template
(From the little golem forum)
Even though the diagram shows two pieces and one of them on the sixth row, it makes sense to say this is a fifth row template with one stone, as the stone on the sixth row plays no role whatsoever in connecting to the bottom. It could be removed and the stone on the fifth row will still be connected to the bottom. It is only shown so there is a possibility to connect to the top too, as without that it would not be of much use in a practical sense.
(Note: As I am writing this I have only seen the claim of this being a valid template on the little golem thread. I have not checked it yet and also not if it is minimal. However, as this came from a very competent player I have no reson to doubt it.)
Defense against intrusions
Red has 3 main threads:
using the ziggurat,
using III-1-b and
using IV-1-d.
For a blocking attempt, Blue has to play on the overlap:
Defense against 1. e3
Yet to come ...
Defense against 1. d5
Red can start like this:
Continuation:
Red has this threat:
So all these fields need to be considered:
... 5. f3
Yet to come ...
... 5. e4
Yet to come ...
... 5. f4
Yet to come ...
... 5. g4
Yet to come ...
... 5. e5
Yet to come ...
... 5. f5
Yet to come ...
... 5. g5
Yet to come ...
... 5. d6
The group with 2 is connected to the top in two non-overlapping ways (see area marked with +) and to the bottom with IV-2-b.
... 5. e6
Red can respond here:
Continuation:
Now Red has two threats:
and
Blue has to play on the overlap:
7. f2
7. g2
7. f3
6 is now connected to the left and to the bottom by Tom's move.
7. e4
4 is again connected to the left and to the bottom by Tom's move.
7. f4
Blue has to go on one of the 3 marked fields. However, d6 can't be any better than 35, so it's enough to look at e5 and g6. Let's have a look at g6 first:
4 is now connected to the bottom and to the left in a similar way as in Tom's move. (Just the piece on g3 is connected to the left in a slightly different way.)
The other possible move was e5:
Red 2 is connected to the left by two non-overlapping ways and to the bottom by a 5th row template that has yet to be added to this wiki.
7. g4
Once again 6 is now connected to the bottom and to the left in a similar way as in Tom's move.
7. e5
And Tom's move at the end again.
7. f6
Red 2 is connected to the bottom and to at least one of the red pieces in the middle by Tom's move. Red now has three threats to connect both these pieces to the top:
and
Blue has to play on the overlap:
First move:
Second move:
... 5. f6
Red can start like this:
Red now has these threats:
and
using IV-2-e.
Blue has to play on the overlap:
First move:
You get the the defense against the other move by just swapping 1 and 2 in the diagram above.
... 5. g6
Yet to come ...
Defense against 1. d6
Red has this line:
Blue 3, 5 and 7 are forced.
Continuation:
Red has these threats:
The overlap in which Blue has to play is:
Four of these five possible moves can be analysed in one line. In the following diagram assume Blue has played 1 on any of the fields marked with +:
After Red 2 that group is safely connected to them bottom, now matter which of the pluses Blue chose before.
That leaves only one Blue move to deal with:
Note that Red 4 connects to the bottom with IV-2-b.