Loading learning content...
Every mobile subscriber has a home network—the operator with whom they signed their contract, who issued their SIM card, and who maintains their subscriber records. But what happens when a subscriber travels beyond their home network's coverage area?
Roaming is the capability that allows a mobile subscriber to automatically obtain service from a visited network (also called a serving network) that is different from their home network. This seemingly simple capability requires extensive technical mechanisms and business agreements to function.
Consider the complexity:
When you land in a foreign country and turn on your phone, within seconds you receive a text message: "Welcome to [Country]. Your carrier has partnered with [Local Operator] to provide you service." In that moment, your phone has:
All of this happens automatically, transparently, and within seconds.
By the end of this page, you will understand the architecture and protocols that enable roaming, the distinction between national and international roaming, the security and authentication mechanisms for roaming, the business and economic aspects of roaming agreements, and the evolution of roaming from 2G to 5G networks.
National Roaming:
National roaming occurs when a subscriber uses a different network within their home country. This typically happens when:
National roaming is often transparent to users and may have different (often preferential) charging compared to international roaming.
International Roaming:
International roaming occurs when a subscriber travels to a different country and uses a local network. This requires:
Permanent Roaming:
A subscriber permanently uses a network different from their home network. This is typically against commercial agreements but may occur in:
Home Network (HPLMN - Home Public Land Mobile Network):
Visited Network (VPLMN - Visited Public Land Mobile Network):
Roaming Hub/Clearing House:
| Function | Home Network (HPLMN) | Visited Network (VPLMN) |
|---|---|---|
| Subscriber Profile | Stores permanently (HLR/HSS) | Receives copy for session (VLR/MME) |
| Authentication | Provides authentication vectors | Executes authentication locally |
| Radio Access | N/A while roaming | Provides radio connectivity |
| Services | Defines entitled services | May restrict based on agreement |
| Billing | Bills subscriber | Provides CDRs to home network |
| Location Tracking | Knows current VPLMN | Knows detailed cell location |
| Call Delivery | Routes calls to VPLMN | Delivers within its network |
The GSM/UMTS roaming architecture established the foundational model that continues to influence modern network designs.
Home Location Register (HLR):
The HLR is the master database of subscriber information in the home network. For each subscriber, the HLR stores:
Visitor Location Register (VLR):
The VLR is a database in the visited network that temporarily stores information about roaming subscribers:
The VLR allows the visited network to serve the subscriber without constantly querying the home network's HLR.
When a roaming subscriber attaches to a visited network:
Step 1: Initial Contact
Step 2: Location Update to HLR 4. VLR sends MAP (Mobile Application Part) UPDATE LOCATION message to HLR 5. Message travels via SS7 network (or SIGTRAN over IP) through international gateways 6. HLR receives the update and records the new VLR address
Step 3: Subscriber Data Download 7. HLR sends INSERT SUBSCRIBER DATA message to the VLR 8. Contains subscription profile (services, call barring, supplementary services) 9. VLR stores this data locally
Step 4: Previous VLR Notification 10. HLR sends CANCEL LOCATION to the previous VLR (if any) 11. Previous VLR deletes the subscriber's temporary data
Step 5: Authentication 12. VLR requests authentication vectors from HLR (or AuC) 13. VLR performs local authentication with mobile using received vectors 14. Upon success, subscriber is registered and can receive service
The IMSI contains routing information: MCC (Mobile Country Code, 3 digits) + MNC (Mobile Network Code, 2-3 digits) + MSIN (subscriber ID). When a VLR sees IMSI=310260123456789, it knows: MCC=310 (USA), MNC=260 (T-Mobile US). The VLR uses global tables to route messages to the correct HLR.
One of the most impressive aspects of roaming is the ability for calls to find a subscriber anywhere in the world. The caller simply dials the subscriber's phone number—they don't need to know where the subscriber is.
The Problem:
The Solution: HLR Query + MSRN
The home network queries its HLR to find where the subscriber is, obtains a temporary routable number in the visited network, and routes the call there.
Phase 1: Call Arrival at Home Network
Phase 2: HLR Query and MSRN Assignment 5. HLR looks up the current VLR address (France, in this example) 6. HLR sends SEND ROUTING INFORMATION to the serving VLR 7. VLR/MSC in France allocates an MSRN (Mobile Station Roaming Number) 8. MSRN is a temporary number in the visited network's numbering range 9. MSRN is returned to HLR, which returns it to GMSC
Phase 3: Call Routing to Visited Network 10. GMSC routes call to the MSRN (which looks like a French number) 11. International call routing delivers the call to France 12. Visited MSC receives call on MSRN, maps to TMSI/IMSI 13. Visited MSC pages the mobile and delivers the call
The Key Insight: MSRN
The Mobile Station Roaming Number (MSRN) is a temporary number that makes the roaming subscriber "reachable" via standard telephony routing. It's allocated for each call and released after call setup.
This call delivery mechanism results in 'tromboning'—a call from France to a subscriber who is also in France still routes through the home network in the USA. This adds latency and cost but maintains the architectural simplicity where the HLR is the single source of truth.
| Element | Purpose | Example |
|---|---|---|
| MSISDN | Subscriber's public phone number | +1-555-123-4567 |
| IMSI | Internal subscriber ID (not dialed) | 310260987654321 |
| MSRN | Temporary routable number in visited network | +33-6-12345678 |
| TMSI | Temporary ID for radio interface privacy | 0x12AB34CD |
| VLR Address | Network address of serving VLR | E.164 or GT+SSN |
LTE introduces a new core network architecture (EPC - Evolved Packet Core) with different roaming mechanisms, though the fundamental concepts remain similar.
HSS (Home Subscriber Server):
The HSS is the evolution of the HLR, serving as the central subscriber database in the home network:
MME (Mobility Management Entity):
The MME in the visited network is analogous to the VLR:
PGW (PDN Gateway):
The PGW is the anchor point for the subscriber's IP address and is key to roaming architecture decisions.
Home Routed Architecture:
In home routed roaming, all user data traffic is routed back to the home network:
UE → eNodeB → SGW (VPLMN) → PGW (HPLMN) → Internet
Characteristics:
Local Breakout Architecture:
In local breakout, user data traffic exits to the internet in the visited network:
UE → eNodeB → SGW (VPLMN) → PGW (VPLMN) → Internet
Characteristics:
Many deployments use a hybrid approach: local breakout for general data traffic (web browsing, apps) to reduce latency, but home routed for IMS voice services to maintain consistent VoLTE quality and integration with the home network's telephony infrastructure.
| Aspect | Home Routed | Local Breakout |
|---|---|---|
| PGW Location | Home network | Visited network |
| IP Address Source | Home network | Visited network |
| User Plane Path | All traffic to home network | Direct to local internet |
| Latency | Higher (international backhaul) | Lower (local) |
| Home Network Control | Full control | Limited (policy exchange) |
| Visited Network Load | Signaling only | Signaling + user plane |
| Typical Use Case | Voice (VoLTE) | Data services |
| Protocol Interface | S8 (to home PGW) | S8 with local PGW |
Roaming presents unique security challenges: the home network must trust the visited network to authenticate its subscribers, while the visited network must trust that the subscriber is genuinely authorized by the home network. This mutual trust is established through cryptographic mechanisms and business agreements.
Authentication Vector (AV) Distribution:
Why This Works:
Limitation:
Once AVs are distributed to a visited network, that network could theoretically reuse them for fraud. Modern networks address this with mutual authentication and one-time-use AVs.
LTE and 5G use enhanced authentication (EPS-AKA, 5G-AKA) with stronger security:
Key Improvements:
5G Roaming Security Enhancement:
5G introduces SEPP (Security Edge Protection Proxy) at the network boundary:
Roaming has been exploited for location tracking (SS7 location queries), call/SMS interception (rogue visited networks), and fraud (fake roaming charges). Modern networks address these through SS7 firewalls, Diameter security, and in 5G, the SEPP architecture. The industry initiative 'GSMA Fraud and Security Group' coordinates defensive measures.
Technical capabilities alone don't enable roaming—business agreements between operators are essential. These agreements define which services are available, how much they cost, and how money flows between operators.
Bilateral Agreements:
Traditionally, operators negotiated bilateral roaming agreements with each international partner:
Disadvantages of Bilateral:
Hub/Clearing House Model:
Roaming hubs like BICS, Syniverse, and Comfone simplify the ecosystem:
GRX (GPRS Roaming Exchange):
GRX networks were established for 2G/3G data roaming:
IPX (IP Packet Exchange):
IPX is the evolution of GRX for modern networks:
Wholesale Rates:
The home operator pays the visited operator for services provided:
Retail Rates:
The subscriber pays the home operator:
The EU's 'Roam Like at Home' regulation (2017) eliminated retail roaming surcharges within the EU. Subscribers pay the same rate for calls, SMS, and data whether at home or anywhere in the EU. This required wholesale rate caps to make it economically viable. It's the most consumer-friendly roaming policy globally and has been a model for other regions.
| Model | Mechanism | Subscriber Impact |
|---|---|---|
| Traditional IOT | Wholesale Inter-Operator Tariff + retail markup | Very expensive, bill shock risk |
| Roaming Bundles | Pre-purchased roaming packages | More predictable, requires planning |
| Roam Like Home | No surcharge, home rates apply | Best UX, regulatory mandated |
| Sponsored Roaming | Third party pays (e.g., hotel, airline) | Free to subscriber, limited scope |
| WiFi Offload | Avoid cellular roaming via WiFi | Free but may miss calls |
Home operators don't want their subscribers randomly connecting to any available network abroad. Steering of Roaming (SoR) allows home operators to influence which visited network their subscribers use.
Economic Reasons:
Quality Reasons:
Strategic Reasons:
SIM-Based Steering (Passive):
The SIM card contains a preferred roaming list (PRL) or equivalent:
Limitations: Mobile may connect to non-preferred network first; OTA update may fail.
Network-Based Steering (Active):
Limitations: Subscriber disruption during reselection; may fail if preferred network has no coverage at current location.
In LTE, the HSS can include preferred PLMN information in the Attach Accept, guiding the mobile toward preferred networks without requiring rejection and reattach. This provides smoother steering with less subscriber disruption.
Roaming transforms individual mobile networks into a global interconnected system. The technical complexity behind this seamless experience—from authentication protocols to call delivery to billing settlement—represents decades of standardization and engineering effort.
What's Next:
Now that we understand roaming at the network level, the next page explores the mobile network protocols that underpin handoff and roaming operations. We'll examine MAP, Diameter, GTP, and other protocols that carry the signaling messages enabling mobility.
You now have comprehensive knowledge of mobile roaming—from the fundamental architecture to call delivery mechanisms to the business and security considerations. You can analyze roaming scenarios, understand the trade-offs between architectures, and appreciate the complexity behind seamless global mobility.