You already seem to know a little bit about iptables, such as that it is made up of the various chains. For your purposes, first be aware that a firewall is meant to be a secondary layer of protection that is used in addition to proper configuration of your services. For example, if you want SSH to only allow from a particular host, configure SSH for that purpose and do NOT rely on a firewall to provide that restriction. Always apply security in layers.
Here is a link to the most comprehensive tutorial I have seen on iptables:
http://www.frozentux.net/iptables-tutorial/chunkyhtml/ It is probably a little much for you to start with, but once you get the basic idea of how to work with iptables, it will serve you well. For a more introductory approach try this one:
http://bodhizazen.net/Tutorials/iptables
Writing iptables for your purpose is quite easy, but to write exact rules requires more information than you have provided, such as what ethernet interface(s) you are using. Please do not just answer this question and ask us to write your rules. Try writing your own and if you have a question, we will try to answer it.
As I mentioned, iptables consists of chains, input, output, forward. For your purpose, the primary one of interest will be input. You can add rules to this chain with the -A (Add) command and remove them with the -D (Drop) command. You can include various paramaters, such as the protocol, source, destination, and interface to qualify the rule. At the end, you specify an action, typically drop with the -j command. When writing your rules, it is best to think of it in terms of what you want to allow, not what you want to block. While you can write your rules in terms of NOT logic, this isn't the best practice. The rules will also flow from top to bottom and if a matching rule is fired, it will not check against the other rules, so order is important. At the end, you will want to set the default rule to drop everything else. Alternatively, you can set the policy to drop, but this can cause you to get locked out if you flush the rules and require one to allow access. So, here is an example, to allow your SSH traffic and block everything else. The other rules will follow similarly, but be sure to read at least the Bodhi Zazen tutorial before starting.
As root run the following:
iptables -A INPUT -s 192.168.5.110 -p tcp -m tcp --dport 22 -j ACCEPT
iptables -A INPUT -j DROP
As you can see, the above command specifies the desired port, protocols, address and rules and puts this in the input chain. Below that is the rule that drops all other traffic, that doesn't match this rule. Your other rules will be similar. You can also specify port ranges, and cider notation for ip addresses. You do not, however, want to specify host names as this can be very inefficient.