Font Size: a A A

Volleyball Tactical Flexibility And Variability In The Study

Posted on:2013-08-09Degree:MasterType:Thesis
Country:ChinaCandidate:N LiFull Text:PDF
GTID:2247330377957335Subject:Physical Education and Training
Abstract/Summary:PDF Full Text Request
With the development of volleyball and the progress of technology and tactics in playing it, each team for the competition continuously research and fumble the attack tactics. In view of the current major three block forms, two kinds of playing have been mainly formed, that is, United States and European party taking the storm as the main attack tactics and Asian team, rapid and changeful. Based on the two kinds of methods in playing, they learn from each other and study the tactics, the combined ways of storm with rapid and changeful tactics is used. The United States and European party learn the rapid and changeful tactics as well as improve the storm, while the Asian team combines the height and speed, storm and quick attack rid of the single tactics with height, strength, speed or skills. They have developed an all-around way toward the combination between storm and quick attack, height and speed, strength and skills. But in the real match, no matter it is storm or rapid and changeful one or the combined, the defender will adapt to the tactics used by attackers. So the attack tactics can not pin down each other and the continuity is lacked. For the adaptation of defenders to attackers, the latter needs to change the tactics on the basis of the adaptation to pin down the rivals to block so as to form an effective attack. The changing attack tactics and the constantly covering the blocking of defenders make the tactics on. The problem of the tactics adaptation and how to change the tactics to realize the continuation and anti-adaptation will be talked about in this research.The aim of the research is to study how to realize the continuation of tactics by changing it after the defenders’ adaptation to the attackers. The significance of the research is adaptation and anti-adaptation to make the tactics on by changing it.Taking the attack tactics in receiving as the example, equipped with "one second transmitter and five attackers", no free man, attackers and second transmitters play alternately. Combined with "9one-meter segments and54areas", the changing of tactics in one round of receiving is researched and analyzed with document literature, video analysis, interview of the specialists, conclusion and analysis.The whole thesis is divided into three parts: preface, body and conclusion. After analyzing the related materials, the related theoretical basis is introduced, basic concepts are defined and the current research situation of tactics applied in the volleyball match is elaborated in the preface. How to define and divide the"9one-meter segments and54areas" and number line are qualitatively described. Then the variability of tactics is put forward for the defenders’ adaptation to it. Take the tactics in one round of receiving as the example, the variability in tactics is researched and analyzed in the blocking form with one to one.The research results indicate that quick attack can pin down the defenders to block and form the attacking tactics in front line and that of combined with front and back line in different segment. These tactics pin down and cover each other. By changing tactics, defenders’ adaptation will be broken to realize the change and continuity of tactics.Based on the number coding of "9one-meter segments and54areas", the attack tactics in a round of receiving in6positions will be introduced as follows:The second transmitter is at the position of number1, assistant attacker of back line number6, main attacker of back line number5, reinforcer number4, assistant attacker of front line number3and the main attacker of front line number2. The assistant attacker of front line can attack the segments from1to9. The main attacker of front line segments5,7and9. The reinfocer segments1and5. The assistant attacker of back line segments7and9. And the main attacker of back line segments1,3and5.The second transmitter is at the position of number6, assistant attacker of back line number5, main attacker of front line number4, reinforcer number3, assistant attacker of front line number2and the main attacker of back line number1. The assistant attacker of front line can attack the segments from3to9. The main attacker of front line segments1,3and5. The reinfocer segments5,7and9. The assistant attacker of back line segments1,3and5. The main attacker of back line segments5,7and9.The second transmitter is at the position of number5, assistant attacker of front line number4, main attacker of front line number3, reinforcer number2and assistant attacker1. The assistant attacker of front line can attack the segments3,5and7. The main attacker of front line segments from1to9. The reinfocer segments7and9. The assistant attacker of back line segments1,3and5. The main attacker of back line segments5,7and9.The second transmitter is at the position of number4, assistant attacker of front line number3, main attacker of front line number2, reinforcer number1, assistant attacker of back line number6and the main attacker of back line number5. The assistant attacker of front line can attack the segments from3to9. The main attacker of front line segments3,5and7. The assistant attacker of back line segments3and5. The main attacker of back line segments1and3. The reinfocer segments5,7and9.The second transmitter is at the position of number3, assistant attacker of front line number2, main attacker of front line number1, reinforcer number6, assistant attacker of back line number5and the main attacker of back line number4. The assistant attacker of front line can attack the segments from3to9. The main attacker of front line segments1,3and5. The assistant attacker of back line segments1and3. The main attacker of back line segments5. The reinfocer segments7and9.The second transmitter is at the position of number2, assistant attacker of back line number1, main attacker of back line number6, reinforcer number5, assistant attacker of front line number4and the main attacker of front line number3. The assistant attacker of front line can attack the segments from1to9to reach the quick attack and covering attack. The main attacker of front line can attack segments from1to9. The assistant attacker of back line segments1and3. The main attacker of back line segments5. The reinfocer segments7and9.Breakthrough the defensive side of the tactics to adapt to the change in tactics:1, a pass in place;2, the second pass, tactical and organizational capacity; the field of game players overall tactical awareness;coaches on the sidelinesspot command;5, the rules of the game dynamic information delivery.
Keywords/Search Tags:volleyball match, receive, attack tactics, adaptability, variabilit
PDF Full Text Request
Related items