Skip to main content

When Plants Go to War

http://nautil.us/issue/31/stress/when-plants-go-to-war

Compared to the hectic rush of our bipedal world, a plant’s life may appear an oasis of tranquility. But look a little closer. The voracious appetites of pests put plants under constant stress: They have to fight just to stay alive.
And fight they do. Far from being passive victims, plants have evolved potent defenses: chemical compounds that serve as toxins, signal an escalating attack, and solicit help from unlikely allies.
However, all of this security comes at a cost: energy and other resources that plants could otherwise use for growth and repair. So to balance the budget, plants have to be selective about how and when to deploy their chemical arsenal. Here are five tactics they’ve developed to ward off their insect foes without sacrificing their own wellbeing.
Newland_BR
Warning Flares
Rather than pump out chemical defenses 24-7 (a waste of resources), plants hold off production until an attack is underway. As soon as an insect bites a leaf, the leaf sounds the alarm by emitting volatiles—chemical flares that tell other parts of the plant, as well as its neighbors, to start manning the barricades.
This early warning system works via a cascade of molecular events. First, it triggers the release of “jasmonate” hormones, which in turn break down proteins known as JAZ. These proteins silence genes that direct the manufacture of various toxic and protective chemicals. By eliminating JAZ, jasmonate hormones free these genes to express themselves, thus powering up a plant’s weapons assembly line.
Plants also make use of underground networks to warn each other of impending danger. Many species have a symbiotic relationship with a soil-borne fungus, which penetrates the outer layers of a plant’s roots, feeding off its carbon stores and helping it take up vital nutrients such as nitrogen and phosphorus in return. The fungus grows by sending out long, threadlike branches called hyphae, which colonize nearby plants, forming vast underground webs.
In experiments with bean plants, when researchers placed aphids on a plant encased in a polythene bag (so it couldn’t broadcast warnings by air), other plants hooked up to the subterranean fungal web began churning out defensive compounds. Their unconnected neighbors, however, did not. The fungus appears to work like a biological Internet, carrying vital intelligence from plant to plant.
Newland_BR-2
Calls for Backup
Plants also conserve resources by recruiting allies to fight some of their battles for them. Among a plant’s armaments are volatiles that beckon predators of its insect attackers.
When caterpillars graze European maize, for example, the plants emit the volatile β-caryophyllene, which attracts parasitic wasps. The wasps lay their eggs inside the caterpillars, slowing their feeding and eventually, when the eggs hatch a few weeks later, killing them. European maize also releases β-caryophyllene below ground in response to rootworm attacks. This signal drifts through pores in the soil, calling to predatory roundworms: “Dinner’s ready, come and get it!”
In some cases, however, a call for help can invite unwelcome guests. Maize varieties cultivated in the United States, for example, have lost the ability to produce β-caryophyllene, leaving them more vulnerable to insect attacks. But when researchers restored the gene responsible for producing this chemical in laboratory plants, their roots became infested with a pathogenic fungus. The fungus, it seemed, had evolved to recognize β-caryophyllene as an invitation, presenting the maize with a tough choice: Keep its wasp and worm allies, and succumb to the fungus—or take its chances against the herbivores.
 Newland_BR-3
Booby Traps
Why go to the trouble of firing weapons willy-nilly when you can lure your attacker into a carefully set trap? Plants in the Brassicaceae family (including broccoli, cabbage, and mustard) store seemingly harmless compounds known as glucosinolates in cellular compartments next to stores of enzymes called myrosinase. The two reserves are separated only by a thin cell wall. When an unsuspecting herbivore chews through this wall, the myrosinase enzymes mix with the glucosinolates, catalyzing chemical reactions that engulf the attacker in a toxic cloud. (It’s these reactions that give Brassicaceae species their characteristic bitter flavors and antioxidant properties.)
Only when these booby traps are effective, however, will plants put more resources into creating them. When chewing insects such as caterpillars activate the traps, the resulting damage induces the plant to ramp up glucosinolate production. However, sucking insects such as aphids, which avoid setting off the traps by feeding through a needlelike tube, have little effect: The plant doesn’t waste resources on ineffective weapons.
Newland_BR-4
Spy Games
Some plants have learned the communication codes of their enemies and use them to spread false information. Aphids, for example, release the pheromone β-farnesene when a predator attacks. This warning tells other aphids in the area that they’ve been rumbled and it’s time to skedaddle. Plants often emit β-farnesene during an aphid attack, perhaps in an attempt to scare off their aggressors by aping their distress call. But not just any β-farnesene signal will do.
In most cases, plants release the pheromone in a steady stream as part of a mixture of defensive volatiles, and aphids have learned to ignore it. The wild potato, however, has found a way to modify this signal to successful effect: It stores the pheromone in delicate bulbs on the ends of tiny leaf hairs. When an aphid lands on the leaf, its legs stick to the leaf’s tacky surface. As the aphid thrashes about trying to free itself, it breaks the bulbs, releasing β-farnesene in bursts that seem to mimic an aphid’s pulsed alarm call.
 Newland_BR-5
Emergency First Aid
During a hard-fought battle, a plant must tend to its injuries. A range of compounds known as green leaf volatiles act as antiseptics, protecting damaged tissue against bacterial or fungal infection. (These volatiles, which make up the fragrance of freshly cut grass, send another warning to neighboring plants, reminding them that danger is at hand.)
An injured plant also produces traumatic acid, known as the “wound hormone,” which stimulates cell division to close up a laceration in much the same way that blood clots in an animal’s wound. These responses happen within minutes of attack: Plants begin patching themselves up while still fighting off invaders. A plant must therefore constantly decide how to divide its resources between defense and regeneration.
And as the struggle between plants and insects plays out generation after generation, each opponent is continuously revising its playbook to try to gain the upper hand. Insects, for example, are beginning to evolve antidotes to plants’ various defenses, including the ability to neutralize toxins or even steal them for their own ends, thus pressuring plants to develop new tactics. This war is a Red Queen’s arms race: Both sides are running at full tilt just to stand still.

Mike Newland is a post-doctoral research assistant at the University of East Anglia, looking at interactions between the biosphere and atmosphere.

Comments

Popular posts from this blog

The Difference Between LEGO MINDSTORMS EV3 Home Edition (#31313) and LEGO MINDSTORMS Education EV3 (#45544)

http://robotsquare.com/2013/11/25/difference-between-ev3-home-edition-and-education-ev3/ This article covers the difference between the LEGO MINDSTORMS EV3 Home Edition and LEGO MINDSTORMS Education EV3 products. Other articles in the ‘difference between’ series: * The difference and compatibility between EV3 and NXT ( link ) * The difference between NXT Home Edition and NXT Education products ( link ) One robotics platform, two targets The LEGO MINDSTORMS EV3 robotics platform has been developed for two different target audiences. We have home users (children and hobbyists) and educational users (students and teachers). LEGO has designed a base set for each group, as well as several add on sets. There isn’t a clear line between home users and educational users, though. It’s fine to use the Education set at home, and it’s fine to use the Home Edition set at school. This article aims to clarify the differences between the two product lines so you can decide which

Let’s ban PowerPoint in lectures – it makes students more stupid and professors more boring

https://theconversation.com/lets-ban-powerpoint-in-lectures-it-makes-students-more-stupid-and-professors-more-boring-36183 Reading bullet points off a screen doesn't teach anyone anything. Author Bent Meier Sørensen Professor in Philosophy and Business at Copenhagen Business School Disclosure Statement Bent Meier Sørensen does not work for, consult to, own shares in or receive funding from any company or organisation that would benefit from this article, and has no relevant affiliations. The Conversation is funded by CSIRO, Melbourne, Monash, RMIT, UTS, UWA, ACU, ANU, ASB, Baker IDI, Canberra, CDU, Curtin, Deakin, ECU, Flinders, Griffith, the Harry Perkins Institute, JCU, La Trobe, Massey, Murdoch, Newcastle, UQ, QUT, SAHMRI, Swinburne, Sydney, UNDA, UNE, UniSA, UNSW, USC, USQ, UTAS, UWS, VU and Wollongong.

Building a portable GSM BTS using the Nuand bladeRF, Raspberry Pi and YateBTS (The Definitive and Step by Step Guide)

https://blog.strcpy.info/2016/04/21/building-a-portable-gsm-bts-using-bladerf-raspberry-and-yatebts-the-definitive-guide/ Building a portable GSM BTS using the Nuand bladeRF, Raspberry Pi and YateBTS (The Definitive and Step by Step Guide) I was always amazed when I read articles published by some hackers related to GSM technology. H owever , playing with GSM technologies was not cheap until the arrival of Software Defined Radios (SDRs), besides not being something easy to be implemented. A fter reading various articles related to GSM BTS, I noticed that there were a lot of inconsistent and or incomplete information related to the topic. From this, I decided to write this article, detailing and describing step by step the building process of a portable and operational GSM BTS. Before starting with the “hands on”, I would like to thank all the pioneering Hackers and Researchers who started the studies related to previously closed GSM technology. In particul