Waleed Khalid et al., International Journal of Advanced Trends in Computer Science and Engineering, 10(3), May - June 2021, 2645 – 2650 2645 ABSTRACT Load Balancer helps in increasing the speed of transmission of data across the web. It increases the performance of the network by reducing network traffic and increasing the responsiveness of the application. Two devices can connect and communicate data to one another thanks to a set of standardized rules. Participants on the internet or their service providers are assigned IP addresses by address registries. In certain conditions the protocol performs better by managing the throughput and connectivity.Cloud computing is a pioneer among the rising technologies in the IT world today. Even though cloud computing has been around for a few years, the globe has yet to reap the full benefits of this technology. Among the many revolutionary effects envisaged as a result of theThere have been few successes with cloud computing technology, and the rest of the goals are currently being worked on.research. Cloud Security and Performance are two of the most significant barriers to cloud computing adoption.stability. One of the variables that has an impact on cloud performance stability is load balancing.computing. Key words: Load Balancer, EIGRP, VLAN, Firewall. 1. INTRODUCTION Load balancing is a technique used to distribute load uniformly among multiple servers to increase networks’ efficiency. Load balancing is essential in a network design because it reduces the burden of the network by distributing the load among multiple servers. It makes sure that the server in a network is not overburdened with requests [1]. Load balancing has several security threats that change with time. It happens over a network; during the network management, it becomes more viable towards the cyber-attack. However, in most instances, these algorithms help deal with the attacks. The most attack is a DDoS attack (distributed denial of service attack). In such an attack, a network can be rendered useless due to overwhelming service requests [2]. 1.1. VLAN VLANs stand for Virtual LANS, which is nothing but the logical grouping of network devices in the same broadcast domain. They can help reduce IT costs, improve network security and performance, provide easier management, and ensure network flexibility. VLANs address scalability, safety, and network management. Network architects set up VLANs to provide network segmentation. Routers between VLANs filter broadcast traffic, enhance network security, perform address summarization, and mitigate network congestion. 1.2. ISSP Information Security Policies or Enterprise Information Security Policies are used primarily on organizations, corporate companies, enterprise environments in general, public and private sector companies, government agencies, related companies, and offices. In general, information security policies can be and are used anywhere and everywhere. Information at rest and in transit must be safeguarded to secure them from any confidentiality, integrity, and availability issues [3]. Issue Specific Policies (ISSP) are independent and cover specific topics like a particular department or division and its asset and are meant for specific technologies. System-Specific Security Policies, SysSP, are used primarily on corporate companies or Waleed Khalid 1,2 , Muhammad Waseem Iqbal 2 , Tahir Alyas 3 , Nadia Tabassum 4 , Nida Anwar 5 , Muhammad Asif Saleem 6 1 Lahore Garrison University, Pakistan, ch.waleed001@gmail.com, 2 The Superior University, Pakistan, waseem.iqbal@superior.edu.pk 3 Lahore Garrison University, Pakistan, tahiralyas@lgu.edu.pk, 4 Virtual University of Pakistan, Pakistan, nadiatabassum@vu.edu.pk 5 Virtual University of Pakistan, Pakistan, nidaanwar@vu.edu.pk 6 Lahore Garrison University, Pakistan, asif.saleem@lgu.edu.pk Performance Optimization of network using load balancer Techniques ISSN 2278-3091 Volume 10, No.3, May - June 2021 International Journal of Advanced Trends in Computer Science and Engineering Available Online at http://www.warse.org/IJATCSE/static/pdf/file/ijatcse1581032021.pdf https://doi.org/10.30534/ijatcse/2021/1591032021