Difference between revisions of "Edge template VI2a"

From HexWiki
Jump to: navigation, search
Line 23: Line 23:
 
Likewise if blue blocks at F5:
 
Likewise if blue blocks at F5:
 
<hex>R6 C10 Vg1 Vh1 Sa1 Sa2 Sa3 Sa4 Sa5 Sb1 Sb2 Sb3 Sb4 Sc1 Sc2 Sc3 Sd1 Sd2 Se1 Sj1 Sj2 Sj3 B1f5 R2g3 Pf3 Ph3 Pd4 Pe4 Pf4 Pg4 Ph4 Pi4 Pc5 Pd5 Pe5 Pg5 Ph5 Pi5 Pb6 Pc6 Pd6 Pe6 Pf6 Pg6 Ph6 Pi6</hex>
 
<hex>R6 C10 Vg1 Vh1 Sa1 Sa2 Sa3 Sa4 Sa5 Sb1 Sb2 Sb3 Sb4 Sc1 Sc2 Sc3 Sd1 Sd2 Se1 Sj1 Sj2 Sj3 B1f5 R2g3 Pf3 Ph3 Pd4 Pe4 Pf4 Pg4 Ph4 Pi4 Pc5 Pd5 Pe5 Pg5 Ph5 Pi5 Pb6 Pc6 Pd6 Pe6 Pf6 Pg6 Ph6 Pi6</hex>
 +
 +
== Intrusion at E6 ==
 +
 +
<hex>R6 C10 Vg1 Vh1 Sa1 Sa2 Sa3 Sa4 Sa5 Sb1 Sb2 Sb3 Sb4 Sc1 Sc2 Sc3 Sd1 Sd2 Se1 Sj1 Sj2 Sj3 B1e6 R2f3 Pe3 Pc4 Pd4 Pe4 Pb5 Pc5 Pd5 Pa6 Pb6 Pc6 Pd6</hex>
 +
 +
Red threatens to connect via D4. Blue must respond in one of the marked hexs.
 +
 +
<hex>R6 C10 Vg1 Vh1 Sa1 Sa2 Sa3 Sa4 Sa5 Sb1 Sb2 Sb3 Sb4 Sc1 Sc2 Sc3 Sd1 Sd2 Se1 Sj1 Sj2 Sj3 B1e6 R2f3 B3e4 R4h4</hex>
 +
 +
The H4 piece is connected to the bottom with [[defending against intrusions in template 1-IIIa|template III-1-a]], and is connected to the top in two non-overlapping ways:
 +
 +
<hex>R6 C10 Vg1 Vh1 Sa1 Sa2 Sa3 Sa4 Sa5 Sb1 Sb2 Sb3 Sb4 Sc1 Sc2 Sc3 Sd1 Sd2 Se1 Sj1 Sj2 Sj3 B1e6 R2f3 B3e4 R4h4 Pi1 Ph2 Ri2 Ph3 Pi3</hex>
 +
 +
and
 +
 +
<hex>R6 C10 Vg1 Vh1 Sa1 Sa2 Sa3 Sa4 Sa5 Sb1 Sb2 Sb3 Sb4 Sc1 Sc2 Sc3 Sd1 Sd2 Se1 Sj1 Sj2 Sj3 B1e6 R2f3 B3e4 R4h4 Pf2 Pg2 Pg3 Pf4 Rg4</hex>
 +
 +
== Intrusion at F4 ==
 +
 +
<hex>R6 C10 Vg1 Vh1 Sa1 Sa2 Sa3 Sa4 Sa5 Sb1 Sb2 Sb3 Sb4 Sc1 Sc2 Sc3 Sd1 Sd2 Se1 Sj1 Sj2 Sj3 B1f4 R2d4</hex>
 +
 +
The Red piece at D4 is connected to the bottom. Blue has two direct attempts to block:
 +
 +
=== Block at F2 ===
 +
 +
<hex>R6 C10 Vg1 Vh1 Sa1 Sa2 Sa3 Sa4 Sa5 Sb1 Sb2 Sb3 Sb4 Sc1 Sc2 Sc3 Sd1 Sd2 Se1 Sj1 Sj2 Sj3 Bf4 Rd4 B1f2 R2g3 B3f3 R4h4</hex>
 +
 +
Red is now connected to the bottom via [[defending against intrusions in template 1-IIIa|template III-1-a]]. Note that neither of Red's threats overlapped.
 +
 +
=== Block at E3 ===
 +
 +
<hex>R6 C10 Vg1 Vh1 Sa1 Sa2 Sa3 Sa4 Sa5 Sb1 Sb2 Sb3 Sb4 Sc1 Sc2 Sc3 Sd1 Sd2 Se1 Sj1 Sj2 Sj3 Bf4 Rd4 B1e3 R2f3 B3e4 R4h3</hex>
 +
 +
The Red piece at H3 is connected to the top and threatening to connect. Blue has one defense:
 +
 +
<hex>R6 C10 Vg1 Vh1 Sa1 Sa2 Sa3 Sa4 Sa5 Sb1 Sb2 Sb3 Sb4 Sc1 Sc2 Sc3 Sd1 Sd2 Se1 Sj1 Sj2 Sj3 Bf4 Rd4 Be3 Rf3 Be4 Rh3 B1h4 R2g4 B3f6 R4f5 B5e6 R6e5 B7d6 R8d5 B9c6</hex>
 +
 +
Attempts by blue to block the use of the D4 piece as a ladder escape can be shown to not work
 +
 +
And now Red can connect via B5.
  
 
== Intrusion at G2 ==
 
== Intrusion at G2 ==
Line 58: Line 98:
 
<hex>R6 C10 Vg1 Vh1 Sa1 Sa2 Sa3 Sa4 Sa5 Sb1 Sb2 Sb3 Sb4 Sc1 Sc2 Sc3 Sd1 Sd2 Se1 Sj1 Sj2 Sj3 Bg2 Rf2 Be6 Re4 Bd5 Re5 Bd6 Rg5 B1f5 R2g4 B3f4 R4h2</hex>
 
<hex>R6 C10 Vg1 Vh1 Sa1 Sa2 Sa3 Sa4 Sa5 Sb1 Sb2 Sb3 Sb4 Sc1 Sc2 Sc3 Sd1 Sd2 Se1 Sj1 Sj2 Sj3 Bg2 Rf2 Be6 Re4 Bd5 Re5 Bd6 Rg5 B1f5 R2g4 B3f4 R4h2</hex>
  
== Intrusion at E6 ==
 
 
<hex>R6 C10 Vg1 Vh1 Sa1 Sa2 Sa3 Sa4 Sa5 Sb1 Sb2 Sb3 Sb4 Sc1 Sc2 Sc3 Sd1 Sd2 Se1 Sj1 Sj2 Sj3 B1e6 R2f3 Pe3 Pc4 Pd4 Pe4 Pb5 Pc5 Pd5 Pa6 Pb6 Pc6 Pd6</hex>
 
 
Red threatens to connect via D4. Blue must respond in one of the marked hexs.
 
 
<hex>R6 C10 Vg1 Vh1 Sa1 Sa2 Sa3 Sa4 Sa5 Sb1 Sb2 Sb3 Sb4 Sc1 Sc2 Sc3 Sd1 Sd2 Se1 Sj1 Sj2 Sj3 B1e6 R2f3 B3e4 R4h4</hex>
 
 
The H4 piece is connected to the bottom with [[defending against intrusions in template 1-IIIa|template III-1-a]], and is connected to the top in two non-overlapping ways:
 
 
<hex>R6 C10 Vg1 Vh1 Sa1 Sa2 Sa3 Sa4 Sa5 Sb1 Sb2 Sb3 Sb4 Sc1 Sc2 Sc3 Sd1 Sd2 Se1 Sj1 Sj2 Sj3 B1e6 R2f3 B3e4 R4h4 Pi1 Ph2 Ri2 Ph3 Pi3</hex>
 
 
and
 
 
<hex>R6 C10 Vg1 Vh1 Sa1 Sa2 Sa3 Sa4 Sa5 Sb1 Sb2 Sb3 Sb4 Sc1 Sc2 Sc3 Sd1 Sd2 Se1 Sj1 Sj2 Sj3 B1e6 R2f3 B3e4 R4h4 Pf2 Pg2 Pg3 Pf4 Rg4</hex>
 
 
[[Category:Edge templates]]
 
[[Category:Edge templates]]
 
{{stub}}
 
{{stub}}

Revision as of 19:15, 11 June 2009

The edge template template VI2

Let us first see what possibilities Red has if he moves first.

There are two obvious options:

In both diagrams the possible intrusion points are marked by (+). So we only have to consider the intersection of the intrusion points. They are:

Intrusion at E5 and F5

If Blue blocks at E5 then Red plays F3, reducing to Template IVb

21

Likewise if blue blocks at F5:

21

Intrusion at E6

21

Red threatens to connect via D4. Blue must respond in one of the marked hexs.

2341

The H4 piece is connected to the bottom with template III-1-a, and is connected to the top in two non-overlapping ways:

2341

and

2341

Intrusion at F4

21

The Red piece at D4 is connected to the bottom. Blue has two direct attempts to block:

Block at F2

1324

Red is now connected to the bottom via template III-1-a. Note that neither of Red's threats overlapped.

Block at E3

1243

The Red piece at H3 is connected to the top and threatening to connect. Blue has one defense:

218649753

Attempts by blue to block the use of the D4 piece as a ladder escape can be shown to not work

And now Red can connect via B5.

Intrusion at G2

21

Blue has four options that don't immediately reduce to another edge template:

Block at E4

21

Red's G3 piece is connected to the top via F3 or H2.

2143

Here Red has created a Ladder escape fork. If blue blocks the ladder Red plays at D3.

Block at D5

625413

And Red has connected. If blue choose to play at E6 instead of E5:

87625431

Block at C6

625431

Block at E6

234651

Play continues...

4321