Repurpose or extend the useful life of legacy SEL rugged computers running a Microsoft Windows operating system by converting it to an SEL Real-Time Automation Controller (RTAC).
The SEL-3532 RTAC Conversion Kit provides a CompactFlash card that converts the legacy computer to the functionality of an automation controller. Use the available video port to connect the SEL RTAC to a monitor for an optional integrated human-machine interface (HMI) application.
SEL-3532 RTAC Conversion Kit for:
The SEL-3533 RTAC Conversion Kit provides a solid-state drive that converts the SEL-3355 Rugged Computer to the functionality of an SEL RTAC.
Engineering Access and SCADA—Deploy the RTAC as a data concentrator using protocols such as IEC 61850 MMS client, Modbus, DNP3, IEC 61850 GOOSE, LG 8979, IEC 60870-5-101/104, or Mirrored Bits communications, and integrate both serial and Ethernet intelligent electronic devices (IEDs). Enable logging on any system or IED tag to view and archive station-wide event records. Enable multiple SCADA connections via serial or Ethernet communications.
Distribution Automation—Improve the reliability and reduce the cost of a distribution system by commissioning the RTAC as a Distribution Automation Controller (DAC). A DAC provides wide area Automatic Network Reconfiguration to minimize outage size and area by isolating faults and restoring power to un-faulted areas. It also provides Dynamic Feeder Optimization functionality, which allows distribution tap changers, voltage regulators, and capacitor banks to work together as a team to control power factor and reduce voltage.
Substation HMI—Provide cost-effective local and remote monitoring, control, and annunciation for substations and other processes by installing the optional web-based HMI, available for the RTAC and SEL-2240 Axion. acSELerator Diagram Builder SEL-5035 Software easily maps the RTAC tag database to reduce screen development time.
Secure Communications and User Management—Employ the RTAC, SEL-3620 Ethernet Security Gateway, and SEL accessories to secure your automation network. Per-user security profiles provide compliance with role-based requirements. The system supports intrusion detection, notification, and logging to help maintain perimeter integrity. Secure Shell (SSH) and password management provide encrypted engineering access through the RTAC.
Time Synchronization—Implement time-code inputs, such as IRIG-B and Network Time Protocol (NTP), to distribute precise time to connected IEDs. In the absence of an external time source, use the internal information processor clock to generate IRIG-B for connected devices.