Node to Node Communication


dbWatch Control Center operates in a distributed architecture, composed of multiple interconnected nodes—including Control Center servers, monitors, routers, and instance hubs. These nodes communicate using a multi-layered protocol designed for security, routing flexibility, and encrypted messaging.

This page explains how node-to-node communication works internally, including how authentication, TLS, and ephemeral encryption are used to securely transmit messages.

This section assumes familiarity with node roles. See Core Concepts & Architecture if you’re new to the terminology.


Layered Protocol Stack

The dbWatch protocol consists of the following layered components:

  1. TCP/IP: Base transport layer for connectivity between nodes
  2. TLS: Encrypted channel with certificate-based mutual authentication
  3. Message Layer: Signed and optionally encrypted messages routed between nodes
  4. Ephemeral Tunnel: Additional end-to-end encryption of message bodies using Diffie-Hellman key exchange

The dbWatch Monitor is considered a node and follows the same communication principles.


1. TCP/IP Layer – Node Connectivity

Nodes connect using standard TCP sockets. Each node may:

Configuration options are available in:

Configuring node connections can be done in the Domain Configuration, by right clicking on a node and selecting Edit connections

The underlying config file is “[dbWatch Work]/config/node/node.connections”

Example of a “node.connections” file:

{
	"versionCutoff":"",
	"nodeCost":"0",
	"listenTo":[
		"dbw://localhost:7100"
	]
,	"connectTo":[
		"dbw://cloudrouter1.dbwatch.com:7100"
	]
}

See also:
Network and Communication Setup


2. TLS Layer – Secure Transport with Routing Privileges

All TCP communication is wrapped inside a TLS channel, offering:

Each node presents its domain-issued certificate. During TLS negotiation:

This ensures zero-trust communication across a multi-node topology.

Learn more about the certificate system here:
Certificate Infrastructure


3. Message Layer – Routed Message Encapsulation

Each dbWatch message includes routing metadata and a cryptographic signature. The message is forwarded across multiple nodes, if necessary, until it reaches its final destination.

Field Description Size (bytes)
time to live Hop count / TTL to avoid loops 1
recipient IPv6-style recipient address 16
sender IPv6-style sender address 16
body category Type of message payload 1
send time Epoch timestamp 8
certificate ID ID of signing certificate 8
is body encrypted Indicates whether payload is encrypted 1
body length Length of message body 4
message body Encrypted or plaintext content variable
signature length Length of digital signature 4
signature Signature of all above fields (except TTL) variable

4. Ephemeral Tunnel – End-to-End Message Encryption

Since TLS only encrypts between directly connected nodes, dbWatch uses a second encryption layer for message confidentiality:

This layered encryption approach protects against:

Learn more:
Encryption and Ephemeral Keys


Key Advantages


Related Topics


If you require assistance with multi-node topologies, secure routing, or troubleshooting connection paths, contact:
support@dbwatch.com