Strategy: Attack weak points in HTTP/1.x by
-
Explicitly Describe Layers and Modules for simplicity
-
Introducing well-defined Interfaces for reliable extensibility and
functionality
-
Providing Protocol Stack Flexibility for robustness
-
Optimizing for Bandwidth and RTT for efficiency