Difference between revisions of "Template VI1/Other Intrusion on the 1st row"
(Defending against VI1 right (other) intrusion on the 1st row) |
(fixed diagrams) |
||
Line 26: | Line 26: | ||
Sa6 | Sa6 | ||
− | Bg7 | + | Bg7 red M1h5 Pi3 Pi4 |
</hex> | </hex> | ||
Line 71: | Line 71: | ||
Bg7 Rh5 Bi3 Pe7 Pf6 Pf7 Pg5 Pg6 Ph6 Ph7 Pi5 Pi6 Pi7 | Bg7 Rh5 Bi3 Pe7 Pf6 Pf7 Pg5 Pg6 Ph6 Ph7 Pi5 Pi6 Pi7 | ||
− | + | red M1j3 Mi4 | |
</hex> | </hex> | ||
Line 88: | Line 88: | ||
Bg7 Rh5 Bi5 Bi3 | Bg7 Rh5 Bi5 Bi3 | ||
Rj3 Bi4 | Rj3 Bi4 | ||
− | + | red Mk4 Mk5 Mj5 Mi7 Mi6 Mh7 Mh6 | |
</hex> | </hex> | ||
Line 105: | Line 105: | ||
Bg7 Rh5 Bi3 | Bg7 Rh5 Bi3 | ||
Rj3 Bi4 | Rj3 Bi4 | ||
− | + | red Mj4 Mi5 Mk5 | |
Ph6, Ph7, Pi6 | Ph6, Ph7, Pi6 | ||
</hex> | </hex> | ||
Line 123: | Line 123: | ||
Bg7 Rh5 Bi7 Bi3 | Bg7 Rh5 Bi7 Bi3 | ||
Rj3 Bi4 | Rj3 Bi4 | ||
− | + | red Mj4 Mi5 Mj5 Pj6 Pj7 Pk5 Pk6 Pk7 | |
</hex> | </hex> | ||
Line 142: | Line 142: | ||
Bg7 Rh5 Bi4 Pe7 Pf6 Pf7 Pg5 Pg6 Ph6 Ph7 Pi5 Pi6 Pi7 | Bg7 Rh5 Bi4 Pe7 Pf6 Pf7 Pg5 Pg6 Ph6 Ph7 Pi5 Pi6 Pi7 | ||
− | + | red Mh3 Mh4 | |
</hex> | </hex> | ||
Line 158: | Line 158: | ||
Bg7 Rh5 Bg5 Bi4 Rh3 Bh4 | Bg7 Rh5 Bg5 Bi4 Rh3 Bh4 | ||
− | + | red M1f4 Me5 Mf5 Me7 Mf6 Mf7 Mg6 | |
</hex> | </hex> | ||
Line 174: | Line 174: | ||
Bg7 Rh5 Bi4 Rh3 Bh4 | Bg7 Rh5 Bi4 Rh3 Bh4 | ||
− | + | red M1g4 Mg5 Me5 | |
Pf6, Pf7, Pg6 | Pf6, Pf7, Pg6 | ||
</hex> | </hex> | ||
Line 191: | Line 191: | ||
Bg7 Rh5 Be7 Bi4 Rh3 Bh4 | Bg7 Rh5 Be7 Bi4 Rh3 Bh4 | ||
− | + | red M1g4 Mg5 Mf5 | |
Pc7 Pd6 Pd7 Pe5 Pe6 | Pc7 Pd6 Pd7 Pe5 Pe6 | ||
</hex> | </hex> | ||
Line 227: | Line 227: | ||
Bg7 Rh5 Bi3 Rh6 Bi5 Ri6 Bf6 | Bg7 Rh5 Bi3 Rh6 Bi5 Ri6 Bf6 | ||
− | + | red M1j3 Mi4 Mk4 Mj5 Ml5 | |
</hex> | </hex> | ||
Line 260: | Line 260: | ||
Bg7 Rh5 Bi4 Bg5 Rg6 Rf6 Bi6 | Bg7 Rh5 Bi4 Bg5 Rg6 Rf6 Bi6 | ||
− | + | red M1h3 Mh4 Mf4 Mf5 Md5 | |
</hex> | </hex> | ||
Revision as of 16:34, 22 August 2015
This article deals with a special case in defending against intrusions in template VI1, namely the right-hand ('other') intrusion on the 1st that is not eliminated by sub-templates threats.
Contents
Basic situation
Red should go here:
The Red 1 hex is connected to the bottom, and threatens to connect to the top through
either one of the "+" hexes. It is now Blue's move.
Claim #1: Blue must move in one of the following + squares below
If Blue moves to
If not, Red can move to either i3 or i4 and secure a connection.
Proposed first Red response
If Blue moves to {e7, f6, f7, g5, g6}, Red should take i6 and force a Blue response in either i3 or i4. If Blue moves to {h6, h7, i5, i6, i7}, Red should take f6 and force a Blue response in either i3 or i4. If Blue takes i3 or i4 direcly, proceed with Response to i3 or Response to i4 instructions below.
Response to i3
If we've arrived here, Blue has just taken i3, i4 is free, h5 is securely connected to the bottom and Blue has at most one of the "+" squares below (with one exception; see i3 addendum). In this case, Red should first take j3 and force a Blue response at i4:
CASE #1: Blue has i5. SOLUTION:
CASE #2: Blue has no tiles in {h6, h7, i5, i6, i7}, or has either {h6, h7, i6} (indicated by +). SOLUTION:
CASE #3: Blue has i7. SOLUTION:
Blue must take one of the + hexes or Red wins. Now, Red can play i6 and force h7, then play h6 and connect to h5 (which is already securely connected.
Response to i4
If we've arrived here, Blue has just taken i4, i3 is free, h5 is securely connected to the bottom and Blue has at most one of the "+" squares below (with one exception; see i4 addendum). In this case, Red should first take h3 and force a Blue response at h4:
CASE #1: Blue has g5. SOLUTION:
CASE #2: Blue has no tiles in {e7, f6, f7, g5, g6}, or has either {f6, f7, g6} (indicated by +). SOLUTION:
CASE #3: Blue has e7. SOLUTION:
Blue must take one of the + hexes or Red wins. Now, Red can play f6 and force f7, then play g6 and connect to h5 (which is already securely connected.
i3 addendum
I claimed that Blue can have only one of the + hexes but this is not quite true if Blue first "plays out" the secured bridge. But in this case Red definitely can acquire i6.
In this case, Red can still play j3 to force i4, then k4 to force j5, then l5 wins:
i4 addendum
I claimed that Blue can have only one of the + hexes but this is not quite true if Blue first "plays out" the secured bridge. But in this case Red definitely can acquire f6.
In this case, Red can still play h3 to force h4, then f4 to force f5, then d5 wins: