Difference between revisions of "Edge template V1a"
(Merged "Defending against intrusions in template 1-Va" into this page.) |
(Converted to new hexboard diagrams. Some copy-editing.) |
||
Line 8: | Line 8: | ||
/> | /> | ||
− | This | + | This template often appears as a third move, for instance in the [[a3 opening]], because the played piece is guaranteed to link to one edge and is not too far from the other one. Thus it follows the principle of the [[weakest link]]. |
− | Note that | + | Note that there is also a mirror image form of this template. |
+ | |||
+ | It may seem that this template is very strong because it reaches 5 rows into the board, but it rarely occurs outside of the opening, because of the huge size of the template; the template requires 31 empty hexes and 10 hexes along an edge — the entire edge on the 10x10 board! | ||
Furthermore, the large perimeter makes it more vulnerable to encroaching adjacent plays and forcing moves. Additionally, the [[carrier]] surrounds the 5th row piece on both "shoulders" so that non-overlapping plays from the 5th row piece can occur in only two directions. | Furthermore, the large perimeter makes it more vulnerable to encroaching adjacent plays and forcing moves. Additionally, the [[carrier]] surrounds the 5th row piece on both "shoulders" so that non-overlapping plays from the 5th row piece can occur in only two directions. | ||
Line 19: | Line 21: | ||
Reduction to [[defending against intrusions in template 1-IIIb|template III-1-b]]: | Reduction to [[defending against intrusions in template 1-IIIb|template III-1-b]]: | ||
− | < | + | <hexboard size="5x10" |
− | + | visible="area(a5,c3,d3,f1,h1,h2,i2,i3,j3,j5)" | |
− | + | edges="bottom" | |
− | + | coords="none" | |
− | + | contents="R g1 R f3 S area(f2,c5,g5,g2)-e5" | |
− | + | /> | |
+ | |||
Reductions to [[template IVa]]: | Reductions to [[template IVa]]: | ||
− | < | + | <hexboard size="5x10" |
− | + | visible="area(a5,c3,d3,f1,h1,h2,i2,i3,j3,j5)" | |
− | + | edges="bottom" | |
− | + | coords="none" | |
− | + | contents="R g1 R f2 S area(e2,c3,a5,g5,g3,f2)" | |
− | + | /> | |
+ | <hexboard size="5x10" | ||
+ | visible="area(a5,c3,d3,f1,h1,h2,i2,i3,j3,j5)" | ||
+ | edges="bottom" | ||
+ | coords="none" | ||
+ | contents="R g1 R h2 S area(h1,d5,j5,j3)" | ||
+ | /> | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
Reductions to [[template IVb]]: | Reductions to [[template IVb]]: | ||
− | < | + | <hexboard size="5x10" |
− | + | visible="area(a5,c3,d3,f1,h1,h2,i2,i3,j3,j5)" | |
− | + | edges="bottom" | |
− | + | coords="none" | |
− | + | contents="R g1 R f2 S area(e2,c3,a5,h5,h3,g2)-e4" | |
− | + | /> | |
− | + | <hexboard size="5x10" | |
− | < | + | visible="area(a5,c3,d3,f1,h1,h2,i2,i3,j3,j5)" |
− | + | edges="bottom" | |
− | + | coords="none" | |
− | + | contents="R g1 R g2 S area(f2,d3,b5,i5,i3,h2)-f4" | |
− | + | /> | |
− | + | ||
=== Blue's options === | === Blue's options === | ||
These threats only overlap in 3 hexes, so to attempt blocking the template, Blue must move in one of these. | These threats only overlap in 3 hexes, so to attempt blocking the template, Blue must move in one of these. | ||
− | < | + | <hexboard size="5x10" |
− | + | visible="area(a5,c3,d3,f1,h1,h2,i2,i3,j3,j5)" | |
− | + | edges="bottom" | |
− | + | coords="none" | |
− | + | contents="R g1 E x:f3 y:d5 z:f5" | |
− | + | /> | |
− | + | ||
− | + | ||
− | == | + | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | === If Blue moves at x: === | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | Red is | + | Red responds as follows. |
+ | <hexboard size="5x10" | ||
+ | visible="area(a5,c3,d3,f1,h1,h2,i2,i3,j3,j5)" | ||
+ | edges="bottom" | ||
+ | coords="none" | ||
+ | contents="R g1 B 1:f3 R 2:d4 E +:e2" | ||
+ | /> | ||
+ | Red is threatening to connect at "+". Blue must block by playing somewhere between Red's two pieces. Red then continues as follows: | ||
− | < | + | <hexboard size="5x10" |
− | 1: | + | visible="area(a5,c3,d3,f1,h1,h2,i2,i3,j3,j5)" |
− | 2: | + | edges="bottom" |
− | 3: | + | coords="none" |
− | 4: | + | contents="R g1 B 1:f3 R 2:d4 B 3:e2 R 4:h2 B 5:h3 R 6:g3 B 7:f5" |
− | + | /> | |
+ | Red has forced a [[bottleneck]], resulting in a 2nd row [[ladder]]. Red's 2 acts as a [[ladder escape]]. The final position is | ||
− | + | <hexboard size="5x10" | |
+ | visible="area(a5,c3,d3,f1,h1,h2,i2,i3,j3,j5)" | ||
+ | edges="bottom" | ||
+ | coords="none" | ||
+ | contents="R g1 B 1:f3 R 2:d4 B 3:e2 R 4:h2 B 5:h3 R 6:g3 B 7:f5 R 8:f4 B 9:e5 R 10:e4" | ||
+ | /> | ||
− | === If Blue moves at | + | === If Blue moves at y: === |
− | Red's best response is | + | Red's best response is to [[bridge]] to 2. To stop the threatened immediate connection, Blue must block at 3 or intrude on the bridge. If Blue plays at 3, Red plays the following sequence of forcing moves: |
− | < | + | <hexboard size="5x10" |
− | 1: | + | visible="area(a5,c3,d3,f1,h1,h2,i2,i3,j3,j5)" |
− | 2: | + | edges="bottom" |
− | 3: | + | coords="none" |
− | 4: | + | contents="R g1 B 1:d5 R 2:h2 B 3:h3 R 4:f4 B 5:g2 R 6:f2 B 7:f3 R 8:e3 E +:(c4 e4)" |
− | + | /> | |
− | + | Red is now connected to the edge by [[double threat]] at the cells marked "+". | |
+ | If Blue intrudes on the bridge instead, play proceeds similarly: | ||
− | < | + | <hexboard size="5x10" |
− | 1: | + | visible="area(a5,c3,d3,f1,h1,h2,i2,i3,j3,j5)" |
− | 2: | + | edges="bottom" |
− | 3: | + | coords="none" |
− | 4: | + | contents="R g1 B 1:d5 R 2:h2 B 3:g2 R 4:h1 B 5:h3 R 6:f4 B 7:g3 R 8:f2 B 9:f3 R 10:e3 E +:(c4 e4)" |
− | + | /> | |
− | Red is | + | Again, Red is connected by double threat at "+". |
− | + | === If Blue moves at z: === | |
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | + | ||
− | Red is | + | Red's best response is 2, which is connected to the bottom and forms a loose connection with the Red's piece on the 5th row. To stop the immediate connection, Blue must play at a or b. |
− | + | <hexboard size="5x10" | |
+ | visible="area(a5,c3,d3,f1,h1,h2,i2,i3,j3,j5)" | ||
+ | edges="bottom" | ||
+ | coords="none" | ||
+ | contents="R g1 B 1:f5 R 2:e4 E a:f2 b:f3" | ||
+ | /> | ||
− | + | If Blue moves at a, Red plays the following forcing sequence, connecting by double threat at "+". | |
+ | <hexboard size="5x10" | ||
+ | visible="area(a5,c3,d3,f1,h1,h2,i2,i3,j3,j5)" | ||
+ | edges="bottom" | ||
+ | coords="none" | ||
+ | contents="R g1 B 1:f5 R 2:e4 B 3:f2 R 4:g2 B 5:f3 R 6:g3 E +:(f4 h4)" | ||
+ | /> | ||
+ | If Blue moves at b, Red plays the following forcing sequence, again connecting by double threat. | ||
+ | <hexboard size="5x10" | ||
+ | visible="area(a5,c3,d3,f1,h1,h2,i2,i3,j3,j5)" | ||
+ | edges="bottom" | ||
+ | coords="none" | ||
+ | contents="R g1 B 1:f5 R 2:e4 B 3:f3 R 4:e2 B 5:d5 R 6:e5 B 7:e3 R 8:d3 E +:(c4 d4)" | ||
+ | /> | ||
[[Category: Advanced Strategy]] | [[Category: Advanced Strategy]] | ||
[[Category: Edge templates]] | [[Category: Edge templates]] |
Revision as of 04:32, 12 December 2020
Template V1-a is a 5th row edge template with 1 stone.
This template often appears as a third move, for instance in the a3 opening, because the played piece is guaranteed to link to one edge and is not too far from the other one. Thus it follows the principle of the weakest link.
Note that there is also a mirror image form of this template.
It may seem that this template is very strong because it reaches 5 rows into the board, but it rarely occurs outside of the opening, because of the huge size of the template; the template requires 31 empty hexes and 10 hexes along an edge — the entire edge on the 10x10 board!
Furthermore, the large perimeter makes it more vulnerable to encroaching adjacent plays and forcing moves. Additionally, the carrier surrounds the 5th row piece on both "shoulders" so that non-overlapping plays from the 5th row piece can occur in only two directions.
Contents
Defending the template
Red's threats
Reduction to template III-1-b:
Reductions to template IVa:
Reductions to template IVb:
Blue's options
These threats only overlap in 3 hexes, so to attempt blocking the template, Blue must move in one of these.
If Blue moves at x:
Red responds as follows.
Red is threatening to connect at "+". Blue must block by playing somewhere between Red's two pieces. Red then continues as follows:
Red has forced a bottleneck, resulting in a 2nd row ladder. Red's 2 acts as a ladder escape. The final position is
If Blue moves at y:
Red's best response is to bridge to 2. To stop the threatened immediate connection, Blue must block at 3 or intrude on the bridge. If Blue plays at 3, Red plays the following sequence of forcing moves:
Red is now connected to the edge by double threat at the cells marked "+". If Blue intrudes on the bridge instead, play proceeds similarly:
Again, Red is connected by double threat at "+".
If Blue moves at z:
Red's best response is 2, which is connected to the bottom and forms a loose connection with the Red's piece on the 5th row. To stop the immediate connection, Blue must play at a or b.
If Blue moves at a, Red plays the following forcing sequence, connecting by double threat at "+".
If Blue moves at b, Red plays the following forcing sequence, again connecting by double threat.