Abstract

One of the most abundant proteins in V. cholerae O1 cells grown under inorganic phosphate (Pi) limitation is PstS, the periplasmic Pi-binding component of the high-affinity Pi transport system Pst2 (PstSCAB), encoded in pst2 operon (pstS-pstC2-pstA2-pstB2). Besides its role in Pi uptake, Pst2 has been also associated with V. cholerae virulence. However, the mechanisms regulating pst2 expression and the non-stoichiometric production of the Pst2 components under Pi-limitation are unknown. A computational-experimental approach was used to elucidate the regulatory mechanisms behind pst2 expression in V. cholerae O1. Bioinformatics analysis of pst2 operon nucleotide sequence revealed start codons for pstS and pstC genes distinct from those originally annotated, a regulatory region upstream pstS containing potential PhoB-binding sites and a pstS-pstC intergenic region longer than predicted. Analysis of nucleotide sequence between pstS-pstC revealed inverted repeats able to form stem–loop structures followed by a potential RNAse E-cleavage site. Another putative RNase E recognition site was identified within the pstA-pstB intergenic sequence. In silico predictions of pst2 operon expression regulation were subsequently tested using cells grown under Pi limitation by promoter–lacZ fusion, gel electrophoresis mobility shift assay and quantitative RT-PCR.The experimental and in silico results matched very well and led us to propose a pst2 promoter sequence upstream of pstS gene distinct from the previously annotated. Furthermore, V. cholerae O1 pst2 operon transcription is PhoB-dependent and generates a polycistronic mRNA molecule that is rapidly processed into minor transcripts of distinct stabilities. The most stable was the pstS-encoding mRNA, which correlates with PstS higher levels relative to other Pst2 components in Pi-starved cells. The relatively higher stability of pstS and pstB transcripts seems to rely on the secondary structures at their 3′ untranslated regions that are known to block 3′-5′ exonucleolytic attacks.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.