•DBMS requests the appropriate
lock whenever the app program submits a request
to read or write a data item
•If lock is available, the access
is performed
•If lock is not available, the
whole txn is blocked until the
lock is obtained
–After a conflicting lock has
been released by the other txn that held it