How to be sweet? Extra floral nectar allocation by Gossypium hirsutum fits optimal defense theory predictions

F.L. Wäckers, C. Bonifay

    Research output: Contribution to journal/periodicalArticleScientificpeer-review

    88 Citations (Scopus)
    541 Downloads (Pure)

    Abstract

    Plants employ nectar for two distinct functions. Floral nectar has traditionally been viewed in the context of pollination. Extrafloral nectar on the other hand, can act as an indirect defense, allowing the plant to recruit predators and parasitoids. Whereas this makes for a clear-cut categorization, in reality the functions may not be so discrete. Extrafloral nectar may serve a role in pollination, while floral nectar can be utilized by predators and parasitoids and thus can contribute to plant defense. Here we use the optimal defense theory to generate predictions with respect to allocation patterns of defensive nectar. These predictions are then tested using novel data on the production patterns of bracteal and foliar nectar in cotton, Gossypium hirsutum. Bracteal nectar production shows a distinct peak on the day of anthesis, followed by a prolonged secretion during fruit maturation. This suggests that bracteal nectaries function in pollination as well as defense. Constitutive nectar production at the bracteal nectaries exceeds foliar nectar secretion by a factor of between 80 and 110. Whereas nectar production at foliar nectaries is induced following herbivore damage to leaves, bracteal nectar production is not induced in response to fruit dama [KEYWORDS: bracteal nectar; cotton; extrafloral nectar; foliar nectar; Gossypium hirsutum; herbivore refuge; indirect defense; multiple functions; nectar allocation; optimal defense theory; pollination]
    Original languageEnglish
    Pages (from-to)1512-1518
    JournalEcology
    Volume85
    Issue number6
    DOIs
    Publication statusPublished - 2004

    Fingerprint

    Dive into the research topics of 'How to be sweet? Extra floral nectar allocation by Gossypium hirsutum fits optimal defense theory predictions'. Together they form a unique fingerprint.

    Cite this