. "They provide control of access to the system for subscribers for whom a base station is ???home???, e.g., where information is stored about the subscribers, including information to authenticate the subscriber's identity and what services are available to the subscriber." . . .