First of all, miners do not control the network. They can merely perform attacks like a double spend or denial of service attack if they habe sufficient hash power. But before I write a whole book here, let me show you an extract of the book „Mastering Bitcoin“, which you should read (swipe left for next pages):
