Eaton DS-VFI transformer
3:06
Eaton’s Cooper Power series Dual Source VFI (DS-VFI) transformer provides automatic source recovery, built-in overcurrent protection and grid automation schemes for the modern electrical distribution system. Designed for both main-main applications and loop-feed applications, the DS-VFI transformer combines state-of-the-art switchgear controls and automation with proven high-efficiency liquid-filled transformer technology into a single assembly. The solution enables complete medium-to low-voltage distribution protection and automatic outage restoration in a compact, cost-effective package.
Eaton’s Cooper Power series Dual Source VFI (DS-VFI) transformer provides automatic source recovery, built-in overcurrent protection and grid automation schemes for the modern electrical distribution system. Designed for both main-main applications and loop-feed applications, the DS-VFI transformer combines state-of-the-art switchgear controls and automation with proven high-efficiency liquid-filled transformer technology into a single assembly. The solution enables complete medium-to low-voltage distribution protection and automatic outage restoration in a compact, cost-effective package.
Electrical distribution Similar Videos
-
Impedance in power systems explained | Eaton PSEC
8:55
Impedance is a measure of how much a circuit resists the flow of alternating current (AC). High impedance means less current, leading to inefficiencies and power losses. Learn where impedance comes from and how it affects electrical systems.
-
Circuit protection | Eaton PSEC
9:15
Circuit protection is a system of devices used to protect electrical circuits from electrical faults such as short circuits, overcurrent, and high temperature. Common circuit protection devices include circuit breakers, fuses, and protective relays.
-
Industrial communication protocols explained | Eaton PSEC
12:23
Learn about industrial communication protocols such as Fieldbus, Ethernet, and wireless communications. Understand how they operate, their features, limitations, and cybersecurity standards.