Adobe Dreamweaver CS3 Unleashed- P21 doc

50 177 0
Adobe Dreamweaver CS3 Unleashed- P21 doc

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

If you look at the Vecta Corp store example again, you can begin to imagine how the DBMS looks much like the filing cabinet discussed earlier. Unlike a filing cabinet, however, which typically contains two to four drawers, a DBMS can manage hundreds, possibly thousands of databases—all of which are immediately at your fingertips. Later in this chapter, we'll look at the various database management systems that exist on the market today for interacting with SQL Server 2005 Express Edition and MySQL, including the File Manager for Access. The Database Inside your DBMS, you have the potential for storing hundreds, if not thousands, of databases. Although for most projects you would never need more than one database, you may in the future realize that your project has grown far beyond the scope of a single database—that because of security or maintenance reasons, you require more. Figure 22.3 shows MySQL Administrator with a list of three catalogs (otherwise known as databases) housed within its framework. Figure 22.3. MySQL Administrator and a list of the databases it contains. [View full size image] Tables After a database has been created, you might want to begin storing information relevant to a specific part of the store. As mentioned earlier, tables are very similar to file cabinet drawers. It would be a mistake to store all the information about inventory, product information, customers, and even transactions in one drawer; instead, you'll break out these categories of information and create different drawers or tables to store all this information. Figure 22.4 shows the Vecta Corp store database in MySQL Administrator. By selecting the Vecta Corp store database from the view in the left column, you can begin to see all the tables that reside within the store. Figure 22.4. Selecting the vectacorp database reveals all the tables associated with the project. [View full size image] Notice that there are more tables than just the four outlined in the beginning of the chapter. If you think in terms of space and redundancy, you will see exactly why you need to include more than just a few tables. As far as the Employees table is concerned, you could have a customer that has multiple credit cards on file—hence the need for a separate CreditCards table. You will also have customers/employees who belong to a specific department—hence the need for a separate Departments table. We could even go beyond this example and create a separate table for CreditCardTypes, assuming a customer could use more than one credit card. This process of organizing data in an effort to avoid data duplication within tables is known as normalization and is discussed in depth toward the end of this chapter. Note In this example, customers represent employees of Vecta Corp. Remember, we're building an internal web store for Vecta Corp employees. Because this is the case, Vecta Corp customers are employees. For this reason, the database table has been named Employees instead of Customers. Before you begin any project, you will typically sketch all this out in an effort to reduce data duplication in your tables. Again, how you branch out your information and create tables depends on how big in scope your project is. Columns After you outline all your tables, your next step is to decide what information to include within those tables. For instance, you might want to include first name, last name, phone number, address, city, state, ZIP, and so on for all the employees in your company in the Employees table. You might also need to include product names, descriptions, and some sort of unique identification in your EmployeeStore table. You might even want to combine certain aspects of certain tables and place them into the Orders table—for example, you might end up with information from the Employees table as well as from the EmployeeStore table to come up with a final order requisition. Theoretically, columns represent bits of information or more detailed descriptions of the table in which they are contained. Just as you have an Employees table, all employees must have names and physical addresses. Just as you have an EmployeeStore table, all products must have names and descriptions. Figure 22.5 shows what the Employees table might look like after columns have been outlined. Figure 22.5. The Employees table displays all the columns associated with it. [View full size image] Rows Think back to the example I mentioned earlier regarding the documents within the folders and the folders within the drawers contained within the filing cabinet. Rows represent the actual data in those documents. Similar to the columns within the tables, rows represent the actual data within the columns. When employees/customers begin purchasing items, the rows in the Orders table begin to expand and fill up with information, similar to Figure 22.6. Figure 22.6. The Orders table with multiple rows of information. [View full size image] Database tables have the potential for containing millions of rows. Technically, this is your data. The many rows of information contained in your database tables are what you'll ultimately display in your web applications. Whether you're displaying product information for employees to select, order information for the shipping and receiving department to review, or employee information for administrators to configure, the rows in your databases tables and the data contained within those rows are what you'll ultimately be interacting with inside the web application. Beyond the Basics Now that we've gotten the basic structure of a database out of the way, let's begin thinking about what really drives the database. Aside from the data in the tables, other characteristics and functions of the database can improve performance, reduce network traffic, increase security, decrease development time, and dramatically decrease maintenance efforts. Some of these functions and characteristics are listed next: Stored procedures Triggers Views and queries Security Relationship management Keys Normalization It's important to understand that these concepts are not relevant to all databases. For instance, concepts such as stored procedures, triggers, views, security management, relationship management, and keys are all relevant to SQL Server. Access, being the proverbial little brother of SQL Server, supports only queries, security management, relationships, and keys. In contrast, MySQL is somewhat limited when it comes to these concepts. For instance, the latest recommended release of MySQL supports only a handful of these topics. Stored Procedures Stored procedures are a way of actually storing code that you use to work with your database in the database itself. They are a way of modularizing repetitive code so that you never have to write the same line of code in your applications more than once. You create a stored procedure within your database and call it through your application, passing in parameters as necessary. In return, the stored procedure executes complex tasks and can return information back to the application that is calling it. Let's use the Vecta Corp store as an example. In our application, we might want to create two ways of updating registered users within our database. From a user's standpoint, the customer might want to edit existing passwords, personal information, or perhaps shipping information. From an administrative standpoint, the admin might also want the capability to update a given user's information. Although the front-end user interface will look completely different for the users and administrator, the code that accesses the database and performs the actual data modification can be the same. This concept is outlined visually in Figure 22.7. Figure 22.7. Stored procedures allow you to consolidate repetitive functionality by modularizing it into a single function residing on the database server rather than the web server. [View full size image] By creating a stored procedure, we would essentially eliminate the arduous task of writing repetitive code for both user and administrator instances. We write it once as a stored procedure and allow the user and administrator to access the stored procedure the same way. Triggers Triggers, which are similar to stored procedures, can be set up to run with your database data. Triggers are predefined events that run automatically whenever a specified action (preferably Insert, Delete, or Update command) is performed on a physical file. Although it might sound a bit confusing as to what triggers actually are and what they can do, think of triggers as a way of enforcing business rules you may have described within your database. Triggers enforce stability and integrity within your tables. For example, in the Vecta Corp database you'll have a table for employee orders, called Orders. If the employee ended a relationship with the Vecta Corp store, you would have the potential for orders in the Orders table that are not associated with any employee. Triggers would enforce business rules by making sure that if an employee ended a relationship with Vecta Corp (maybe they quit or were fired), not only is their information in the Employees table deleted, but the data in the Orders table (which had a direct relationship with data in the Employees table) would be deleted as well. Views and Queries Views (SQL Server/MySQL) and queries (Access) are awkward to think about at first because their names are deceiving. Views and queries aren't actually what their names imply; rather, they are virtual tables whose contents are defined by a query. Much like a real table with rows and columns, views and queries exist as stored sets of data values. Rows and columns of data come from the tables that are referenced and are produced dynamically by the database when the view or query is called from the application. For example, you could have multiple databases set up throughout your company—one for sales, one for marketing, and possibly one for operations. You could use views and queries to combine similar data from all those databases to produce a virtual table with sales numbers, marketing reports, and even information from operations. After the query/view has been created, the information is easily accessible by your web application. We'll cover views and queries at a basic level in the next chapter. Security Security is always important to any facet of development, not just web development. Ensuring that your database is secure and accessible only by certain individuals or departments is crucial. Many database management systems provide a way to set security options for users and groups of users who are allowed to access the database either individually or within their own web applications. Figure 22.8 shows how you could modify permissions (select the User Information category and specify details for a new user account) for specific users using MySQL Administrator. Figure 22.8. User administration is easy using MySQL Administrator. [View full size image] Access, on the other hand, enables you to modify security settings by right-clicking the database file, selecting Properties, and choosing the Security tab, as shown in Figure 22.9. Figure 22.9. Adding users and permissions to an Access database file. Access itself allows you to control permissions for a particular database file. You can modify permissions for a database file by first opening the database file. Next, select Tools, Security, and User and Group Permissions. The User and Group Permissions dialog allows you to specify which users get Read and Modify permissions or no permissions at all. You can even modify or set permissions for specific tables, queries, forms, and reports. Relationship Management When you create new tables in your database, an important aspect to consider is that of relationships. We have already touched on what relationships are and how they relate to your tables. For example, you could create a separate table for credit cards and assign that table a relationship with the Employees table. The reason for doing this is simple: It allows you to store more than one credit card for a particular employee. In this scenario, we'd create a separate table for credit cards and assign each row in that column a unique identifier, usually an automatically generated number. The relationship would exist between the unique identifier in the Employees table (CustomerID) and that identifier in the CreditCards table. Figure 22.10 shows a relationship between the Employees table and the CreditCards table using Access's relationship modeler. Figure 22.10. Relationships are added to avoid data duplication in tables. [View full size image] In general, when you work with relationship modeling, three types of relationships exist: One-to-one— A one-to-one relationship means that for each record that exists in one table, only one other related record can exist in another table. One-to-one relationships are rarely used, and when they are, it's usually because of a limitation with the database that requires data to be stored separately—usually because of the database's size. One-to-many— A one-to-many relationship is by far the most common of relationship types. A one- to-many relationship means that for each record in one table, multiple records can exist in a second table. These records are usually related based on a unique number (a primary key). In the employees/credit cards example I mentioned earlier, a one-to-many relationship created a relationship between one customer and the many possible credit card numbers that could be stored in a second (credit cards) table. Many-to-many— A many-to-many relationship exists when many records in one table are related to many records in a second table. Many-to-many relationships are difficult to illustrate in a typical relational database model and are not often used in practice. Keys Many of the records in your database will contain information that is very similar in nature. You might have a thousand customers in your Employees table, and a hundred of those customers might be from San Diego. If you extracted all those records from the database, how would you be able to differentiate among all the records? Obviously you could differentiate by name, but what if you had three records in the database with the name John Smith from San Diego? A way to differentiate is through the use of unique keys. Think about why uniqueness is so important. If you had more than one record in the database that was the same, what would be the sense in storing multiple copies? It would be a waste of space. Also, if you tried to update or delete a record from a database that matched a second record, the database would not be able to match the record you were trying to work with, and you might end up deleting the wrong record, throwing an error, or corrupting the data in your tables. Records can be identified through the use of three kinds of keys: Candidate keys— A candidate key is a set of columns that are unique across the board. Take the following example: ZIP Area 92069 San Marcos 92115 San Diego 92105 San Diego 92128 San Diego In this example, the ZIP column could be considered a candidate key because the values never repeat. Although the Area names do repeat, together with the ZIP value, they become unique and can make up a candidate key. Because the Area column contains repetitive information, it cannot be considered for a candidate key and could never be unique. Primary keys— Whereas candidate keys can be made up of several columns, a primary key (PK) is usually made up of a single column that designates a row in the table as unique. For the most part, primary keys can exist even though they have no relationship to the data being stored. Database developers often create primary keys with an automatically generated number, guaranteeing that the row always increments by 1 and remains unique from any other records. Primary keys are the most useful when referenced from a second table through the use of foreign keys. The table that follows illustrates a simple table within a database that contains information about a user's area. Because the primary key is different, the records remain completely unique even though data within the Area column repeats. AreaPK Area 1 San Marcos 2 San Diego 3 San Diego 4 San Diego Foreign keys— A foreign key (FK) is a column that contains values found in the primary key of another table. A foreign key can be null and almost always is not unique. Consider the following example: ZipPK ZipCode 1 92069 2 92115 3 92105 4 92128 [...]... that we can recommend products to people dynamically in the future Traditionally, we could take all these elements and create a Word document or perhaps a spreadsheet in Excel and physically write on these documents whenever someone orders a product We could take these documents and store them in folders alphabetically and even store all the folders within one central filing cabinet Although this is... displays all the columns associated with it [View full size image] Rows Think back to the example I mentioned earlier regarding the documents within the folders and the folders within the drawers contained within the filing cabinet Rows represent the actual data in those documents Similar to the columns within the tables, rows represent the actual data within the columns When employees/customers begin... SQL Server 2005 It's important to note that the PHP model in Dreamweaver supports only MySQL As it relates to this book, if you choose the PHP server-side technology, you must use MySQL Of course, there's nothing stopping you from installing all three options Access is file based, which makes it no different from having Word, Excel, or even Dreamweaver open SQL Server 2005 Express Edition and MySQL run... core functionality of the Vecta Corp project is added under the assumption that you're using Access For the most part, database integration in Dreamweaver is handled the same, regardless of which database you use Therefore, after you've defined the database in Dreamweaver (covered in Chapter 24, "Working with Dynamic Data") working with database data is the same, regardless of the database you choose... necessary ODBC and OLE drivers used to connect to the database from Dreamweaver Click Next 9 Within the Authentication Mode screen, choose the Mixed Mode option button The Enter and Confirm Password text boxes are enabled Enter the password vecta in both text boxes This is the password that you will use to log in to the database from Dreamweaver The default username will be sa Click Next 10 For the... high-level overview of the Vecta Corp database and its tables As you've done for the rest of the chapters in this book, you can work with the examples in this chapter by downloading the files from www.dreamweaverunleashed.com As you'll see throughout the chapter, the downloadable files include complete versions of the databases used in this chapter Anatomy of a Database In 1970, E F Codd, an IBM employee,... actually choose and install one Just like the server-side technology that you picked, the database you choose should coincide with your business practices, budget, scalability needs, feature wants, and more Dreamweaver supports any ODBC-compliant database; unfortunately, we can't cover them all in this book, so for development purposes, the decision has been made to support the following three databases:... the need for the relational database model The best way to think of a database is in terms of a filing cabinet The filing cabinet contains drawers, the drawers contain folders, and the folders contain documents that have information on them A database is similar in concept A database contains drawers, otherwise known as tables; those tables contain folders, or columns, which in turn contain rows of... CHAPTER Anatomy of a Database Installing a Database Installing SQL Server 2005 Express Edition Installing MySQL An Overview of the Vecta Corp Database As you begin to build dynamic web applications using Dreamweaver, it will become increasingly obvious that you'll need to store data in some sort of storage mechanism and allow access to it through your web application Whether you are building a small, companywide... upon myself to do the dirty work for you What you will have to do, however, is take the database file that I've provided and deploy it to your project folder so that it can be accessed centrally from Dreamweaver You can do this now by creating a new folder within C:\VectaCorp< servermodel >\ called Database Now find the vectacorp.mdb file included with this chapter's downloads and copy it into that . elements and create a Word document or perhaps a spreadsheet in Excel and physically write on these documents whenever someone orders a product. We could take these documents and store them in. mentioned earlier regarding the documents within the folders and the folders within the drawers contained within the filing cabinet. Rows represent the actual data in those documents. Similar to the. mentioned earlier regarding the documents within the folders and the folders within the drawers contained within the filing cabinet. Rows represent the actual data in those documents. Similar to the

Ngày đăng: 01/07/2014, 19:20

Mục lục

  • Adobe Dreamweaver CS3 Unleashed - Graphically Rich Book

  • Table of Contents

  • Copyright

  • About the Author

  • Acknowledgments

  • We Want to Hear from You!

  • Introduction

  • Part I: Getting Up to Speed with Dreamweaver CS3

    • Chapter 1. The Dreamweaver CS3 Interface

      • New Dreamweaver CS3 Features

      • The Welcome Screen

      • The Document Window

      • Context Menus

      • The Insert Bar

      • The Property Inspector

      • Panels

      • The Menu Bar

      • Summary

      • Chapter 2. Building a Web Page

        • Creating a New Document

        • Working with a New Document in Design View

        • Inserting the Time and Date

        • Inserting a Horizontal Rule

Tài liệu cùng người dùng

Tài liệu liên quan