Solved

How to implement 3 layer architecture with Entity Framework and ASP.NET Webform app

Posted on 2013-01-14
3
2,943 Views
Last Modified: 2013-03-07
I'm relatively new to the world of the Entity Framework and I'm building an ASP.NET webform application and so far I've been writing the code for my data access but would like to start using the Entity Framework so I've been attempting to find a good sample or tutorial on how to implement the Entity Framework in a 3 layer architecture.  Unfortunately, the ones I have found all revolve around MVC or they use entity data controls etc so I'm hoping someone can point me in the direction of a resource that has sample apps or tutorials which simply focus on using the Entity Framework with a standard web form applications.

Thanks
0
Comment
Question by:obb-taurus
  • 2
3 Comments
 
LVL 21

Expert Comment

by:masterpass
ID: 38776111
This is the best reference, in my opinion, when it comes to MVC with N layer

http://microsoftnlayerapp.codeplex.com/ - It might look a bit complex but just take a little time and you should be all good in no time.

There is another one : http://www.codeproject.com/Articles/434282/A-N-Tier-Architecture-Sample-with-ASP-NET-MVC3-WCF which is relativly simple

Hope this helps:)
0
 

Author Comment

by:obb-taurus
ID: 38776210
masterpass,

I'm actually looking for samples using ASP.NET webforms not MVC.  How will the concepts in these samples translate from MVC to regular web forms?
0
 
LVL 21

Accepted Solution

by:
masterpass earned 500 total points
ID: 38776231
My bad, Have a look at the EISK project in codeplex. It used webforms and EF

http://eisk.codeplex.com/

or a have a look at here : http://www.codeproject.com/Articles/439688/Creating-ASP-NET-application-with-n-tier-architect

Hope this helps :)

PS: On a personal note, I think you should start looking at MVC and Entityframework
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Just a quick little trick I learned recently.  Now that I'm using jQuery with abandon in my asp.net applications, I have grown tired of the following syntax:      (CODE) I suppose it just offends my sense of decency to put inline VBScript on a…
It was really hard time for me to get the understanding of Delegates in C#. I went through many websites and articles but I found them very clumsy. After going through those sites, I noted down the points in a easy way so here I am sharing that unde…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now