Figure 8.13
The TCP three-way handshake inhibits
simple spoofing