Eaton DS-VFI transformer
3:06
Eaton’s Cooper Power series Dual Source VFI (DS-VFI) transformer provides automatic source recovery, built-in overcurrent protection and grid automation schemes for the modern electrical distribution system. Designed for both main-main applications and loop-feed applications, the DS-VFI transformer combines state-of-the-art switchgear controls and automation with proven high-efficiency liquid-filled transformer technology into a single assembly. The solution enables complete medium-to low-voltage distribution protection and automatic outage restoration in a compact, cost-effective package.
Eaton’s Cooper Power series Dual Source VFI (DS-VFI) transformer provides automatic source recovery, built-in overcurrent protection and grid automation schemes for the modern electrical distribution system. Designed for both main-main applications and loop-feed applications, the DS-VFI transformer combines state-of-the-art switchgear controls and automation with proven high-efficiency liquid-filled transformer technology into a single assembly. The solution enables complete medium-to low-voltage distribution protection and automatic outage restoration in a compact, cost-effective package.
Electrical distribution Similar Videos
-
Motor starting and control methods | Eaton PSEC
8:24
Learn how motor starting methods, ATL, soft staters, and VFDs, can impact inrush current, voltage, and energy use. In this video we explain key benefits, risks, and cost factors to help you choose the best method for your application.
-
Reading electrical one line drawings | Eaton PSEC
19:13
Electrical one-line diagrams are drawings that represent an electrical system by detailing the components, how they are connected, and the power flow. Watch to learn the common symbols and how to correctly read one-line drawings.
-
Industrial communication protocols explained | Eaton PSEC
12:23
Learn about industrial communication protocols such as Fieldbus, Ethernet, and wireless communications. Understand how they operate, their features, limitations, and cybersecurity standards.