Guide to Entity Framework with


Create, Read, Update, Delete



Download 11,91 Mb.
Pdf ko'rish
bet37/48
Sana30.03.2022
Hajmi11,91 Mb.
#517122
TuriGuide
1   ...   33   34   35   36   37   38   39   40   ...   48
Bog'liq
Entity Framework Tutorial, Second Edition (1)

Create, Read, Update, Delete
(
CRUD

operations on data-based controls is eliminated. The EntityDataSource control
is a DataSource control that can connect to the data exposed by the EDM to
perform CRUD operations.
In this chapter, we will cover the following points:
• 
Designing the 
UserAuthentication
database
• 
Creating an EDM for the 
UserAuthentication
database
• 
Introducing the EntityDataSource control
• 
Implementing our first application using Entity Framework 6


Getting Started
[
 32 
]
The latest version of Entity Framework is Entity Framework 7. As of this writing, 
Entity Framework 7 hasn't been released. It will be released as a "pre-release" at
the same time ASP.NET 5 is released. You will be able to install the pre-release 
version of EF 7 using NuGet.
There are many changes coming up in Entity Framework 7—it is being rewritten 
from the ground up. The major goals of Entity Framework 7 include its support for 
new platforms and new data stores. So, support for additional providers will also
be included in Entity Framework 7:
We will start this chapter with a discussion on our 
UserAuthentication
database
that we will be using throughout this book, followed by a discussion on how we
can create an EDM using the 
Security
database.


Chapter 2
[
 33 
]
Designing the UserAuthentication 
database
Before we begin implementing a simple application that shows how data retrieved 
from the EDM can be consumed, let's take a quick look at the EDM again:
The Conceptual Model Layer (Defined using .CSDL files)
Database
The Mapping Layer (Defined using .MSDL files)
The Logical layer (Defined using .SSDL files)
Object Services
Object Query
Entity SQL
Entity SQL
LINQ to
Entities
As you can see in this diagram, our application needs to interact with the CSDL 
layer. The SSDL layer will connect to the database (the 
Security
database in 
our example), and the mapping layer will map these two layers so that they can 
communicate.
The 
Security
database comprises of a list of the following tables:
• 
Users
: This table contains the user details.
• 
UsersAuthentication
: This table contains the user authentication details.
• 
UserAuthenticationTypes
: This table contains user authentication type data. 
User authentication type can be 
Windows

Forms

Passport
, and 
Anonymous
.


Getting Started

Download 11,91 Mb.

Do'stlaringiz bilan baham:
1   ...   33   34   35   36   37   38   39   40   ...   48




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish