Strategy: Attack weak points in HTTP/1.x by
  - 
    Introducing well-defined Interfaces for reliable extensibility and
    functionality
  
- 
    Explicitly Describe Layers and Modules for simplicity
  
- 
    Providing Protocol stack Independence for robustness
  
- 
    Optimizing for Bandwidth and RTT for efficiency
