Node to Node Communication


dbWatch Control Center operates in a distributed architecture, composed of multiple interconnected nodes—including Control Center servers, monitors, routers, and instance hubs. These nodes communicate using a multi-layered protocol designed for security, routing flexibility, and encrypted messaging.

This page explains how node-to-node communication works internally, including how authentication, TLS, and ephemeral encryption are used to securely transmit messages.

This section assumes familiarity with node roles. See Core Concepts & Architecture if you’re new to the terminology.


Layered Protocol Stack

The dbWatch protocol consists of the following layered components:

  1. TCP/IP: Base transport layer for connectivity between nodes
  2. TLS: Encrypted channel with certificate-based mutual authentication
  3. Message Layer: Signed and optionally encrypted messages routed between nodes
  4. Ephemeral Tunnel: Additional end-to-end encryption of message bodies using Diffie-Hellman key exchange

The dbWatch Monitor is considered a node and follows the same communication principles.


1. TCP/IP Layer – Node Connectivity

Nodes connect using standard TCP sockets. Each node may:

Configuration options are available in:

Example of a `node.connections` file:

{
  "versionCutoff": "",
  "listenTo": [
    "dbw://localhost:7100"
  ],
  "connectTo": [
    "dbw://cloudrouter1.dbwatch.com:7100"
  ]
}

_See also:_  
"Network and Communication Setup":/ControlCenter/1.0/en/topic/network-and-communications  

---

2. TLS Layer – Secure Transport with Routing Privileges

All TCP communication is wrapped inside a TLS channel, offering:

Each node presents its domain-issued certificate. During TLS negotiation:

This ensures zero-trust communication across a multi-node topology.

Learn more about the certificate system here:
Certificate Infrastructure


3. Message Layer – Routed Message Encapsulation

Each dbWatch message includes routing metadata and a cryptographic signature. The message is forwarded across multiple nodes, if necessary, until it reaches its final destination.

Field Description Size (bytes)
time to live Hop count / TTL to avoid loops 1
recipient IPv6-style recipient address 16
sender IPv6-style sender address 16
body category Type of message payload 1
send time Epoch timestamp 8
certificate ID ID of signing certificate 8
is body encrypted Indicates whether payload is encrypted 1
body length Length of message body 4
message body Encrypted or plaintext content variable
signature length Length of digital signature 4
signature Signature of all above fields (except TTL) variable

4. Ephemeral Tunnel – End-to-End Message Encryption

Since TLS only encrypts between directly connected nodes, dbWatch uses a second encryption layer for message confidentiality:

This layered encryption approach protects against:

Learn more:
Encryption and Ephemeral Keys


Key Advantages


Related Topics


If you require assistance with multi-node topologies, secure routing, or troubleshooting connection paths, contact:
support@dbwatch.com