Figure 8.21 Avoiding the ACK storm by ARP spoofing