Eaton DS-VFI transformer
3:06
Eaton’s Cooper Power series Dual Source VFI (DS-VFI) transformer provides automatic source recovery, built-in overcurrent protection and grid automation schemes for the modern electrical distribution system. Designed for both main-main applications and loop-feed applications, the DS-VFI transformer combines state-of-the-art switchgear controls and automation with proven high-efficiency liquid-filled transformer technology into a single assembly. The solution enables complete medium-to low-voltage distribution protection and automatic outage restoration in a compact, cost-effective package.
Eaton’s Cooper Power series Dual Source VFI (DS-VFI) transformer provides automatic source recovery, built-in overcurrent protection and grid automation schemes for the modern electrical distribution system. Designed for both main-main applications and loop-feed applications, the DS-VFI transformer combines state-of-the-art switchgear controls and automation with proven high-efficiency liquid-filled transformer technology into a single assembly. The solution enables complete medium-to low-voltage distribution protection and automatic outage restoration in a compact, cost-effective package.
Electrical distribution Similar Videos
-
Surge protection considerations | Eaton PSEC
7:41
Surge protection devices (SPDs) safeguard equipment from damaging voltage transients also known as surges. Discover SPD types, proper installation, NEC requirements, and tips for effective protection in residential and industrial applications.
-
Protective relay basics | Eaton PSEC
9:49
Learn about protective relays, the essential devices used to safeguard electrical power systems from faults and abnormal conditions. Explore types, key ANSI functions, and how overlapping zones of protection ensure system reliability and safety.
-
Industrial communication protocols explained | Eaton PSEC
12:23
Learn about industrial communication protocols such as Fieldbus, Ethernet, and wireless communications. Understand how they operate, their features, limitations, and cybersecurity standards.
